Professional Documents
Culture Documents
[2nd Edition]
JU PMSCS Version
Mail Me: mustakimbilla007@gmail.com
www.youtube.com/c/NetComEducation
N.B. Candidates with third Division Class or CGPA below 2.50 at any level of their academic career are not eligible
to apply. [ Source Admission Notice of CSE department]
Mark Distribution
Total 50 marks
https://youtu.be/Z_z3H_jLVNo
Courses offered by PMSCS
All the courses are not available right now. Approximately 35 courses are available in each season.
Prerequisite Courses
Core Courses:
Jahangirnagar University
• CSE students having CGPA 3.00 or above gets waiver and completes 10 Subjects including project/thesis
• Retake option is there but you have to pay some extra for that and if you extend any semester you will have
to pay more.
• Overall cost 1 Lakh 40k (approx.) for Waived Students and 1 Lakh 65k (approx.)
• Classes are held on only Fridays. But sometimes classes are held on Saturday as a make up class and during
• There are four time slots. 2 classes Before Jumma Salah and 2 classes after that.
• Class duration 1.5 hours (sometimes more, sometime less than that)
• 100 marks for each course. 40 marks for assignments, quiz, CT etc. and rest 60 is written exam.
We have seen that PMSCS mostly follows MCQ based on CSE major Subjects. Almost 80% mcq comes from
CSE and ICT related subjects . Rest 20% includes mathematics, analytical and English. Some mathematics
from differential calculus which is tough to answer. Some math from JSC, SSC, HSC general math book which
is not that tough. English includes mostly prepositions and right form of verb which is also quite easy. So, you
should focus on CSE based subjects MCQ as much as possible.
There are few subjects which is most popular for this admission test and it has been seen that these topics are
touched much more than other subjects. These Subjects/ Topics are:
1. Computer Network
2. Programming
3. Database
4. Data Structure
5. Probability
6. Math from series
It has been seen that almost 10% mcq is been repeated without any change. 20% mcq is slightly changed but
the answer remains same and 20% mcq is changed but the fact is similar to the previous questions. So, If you
can solve previous questions the possibility of getting merit position is much higher. If you read this pdf with
your full attention, I assure you that you will be able to solve more than 90% of the previous questions.
They usually provide two sets of question paper colored differently and You just need to tick the correct answer.
There is no negative marking (so far). Earlier the questions used to be hard enough and that’s why students
obtaining 50% mark used to get chance. Recently we have seen that the questions are bit easy and that’s why
the percentage may get high. So you should keep a target to obtain more than 30 mark out of 50. There are
some tricks and tips to correct mcq. You should also apply this. To learn these tricks watch my video.
https://youtu.be/zJth9N_FvfY
(D) a first in first out approach 10. Choose correct statement about Functions in c
language
(B) a variable for storing address C. Every function may not return a value.
While-loop
12. Choose the correct statement about c language pass
by value.
7. How many values can be returned from a function? A. Pass by value copies the variable value in one more memory
location
(A) 1
B. Pass by value does not use pointers
(B) 2
C. Pass by value protect your source variable from changes in
(C) 3 outside functions.
13. Global variables are 19. Choose the correct statement about c structures.
D. None of the above C. Only integer members of the structure can be initialized at
the time of declaration
A. Variable
20. Choose the correct statement about c structure
B. Functions elements
C. Structures A. Structure elements are stored on random free memory
locations
D. None of the above
B. Structure elements are stored on register memory location
C. auto
21. What is the size of c union?
D. volatile
A. C union is always 128 bytes
D. None of the above 23. User defined data type can be derived by
A. struct
A. Integer C. typedef
C. Char
D. Array
24. What is the main difference between structure and 30. A mode which is used to open an existing file for both
union? reading and writing is
A. There is no difference A. W
C. Union is faster C. A+
D. Structure is faster D. R+
25. The reason for using pointers in c program is 31. Select a function which is used to write a string to a
file
A. Pointers allow different functions to share and modify their
local variable A. pits()
27. Which header file should be included to use function 33. Select a function which is used as a formatted output
like malloc(), calloc()? file function
A. memory.h A. printf()
B. stdlib.h B. fprintf()
C. dos.h C. puts()
D. string.h D. fputs()
28. How will you free the allocated space? 34. The data type of file pointer is
A. remove(variable-name) A. int
B. free(variable-name) B. double
C. delete(variable-name) C. void
D. dealloc(variable-name) D. FILE
A. int type
B. char * type
C. struct type
35. What is the need of closing a file in c language? 41. Which function is related to dynamic memory
allocation:
A. fclose(fp) close a file to release the memory used in opening
a file. a. malloc();
D. Depend on compiler
43. A pointer variable can store
48. Array index is always starts from: 54. C has ………. keywords:
a. 0 a. 30
b. 1 b. 31
c. 2 c. 32
d. 3 d. 33
49. Which is the incorrect statement: 55. What is the only language that a computer
understands directly?
a. An array is the collection of variables.
(a) English
b. All array variables have same type.
(b) BASIC
c. Array variables can be used individually.
(c) machine language
d. None of these.
(d) Assembly Language
59. How will a class protect the code inside it? 65. Variable which uses same name in whole program
and in its all routines thus best classified as
(a) Using Access specifiers
(a) middle variable
(b) Abstraction
(b) default variable
(c) Use of Inheritance
(c) local variable
(d) All of the mentioned
(d) global variable
61. Which of the following supports the concept of 67. Technique of using fixed words for machine code
hierarchical classification? functions is classified as
62. Which of the following concept is often expressed by 68. 'object program' is also called
the phrase, ‘One interface, multiple methods’?
(a) program code
(a) Abstraction
(b) machine code
(b) Polymorphism
(c) assembler
(c) Inheritance
(d) compiler
(d) Encapsulation
71. Which character is used to indicate the end of the 77. Left most bit 0 in Singed representation indicates.?
string?
A) A Positive number
(A) Any alphabet
B) A Negative Number
(B) A
C) An Unsigned number
(C) Null
D) None of the above
(D) None of these
B) Procedural c) Constants
D) Functional
80. What is the valid range of numbers for int type of
data?
74. C language was invented in which laboratories.?
a) 0 to 256
A) Uniliver Labs
b) -32768 to +32767
B) IBM Labs
c) -65536 to +65536
C) AT&T Bell Labs
d) No specific range
D) Verizon Labs
D) Unix
76. Size of float, double and long double in Bytes are.? 82. String constants should be enclosed between ___
A) 4, 8, 16 a) Single quotes
B) 4, 8, 10 b) Double quotes
C) 2, 4, 6 c) Both a and b
D) 4, 6, 8 d) None of these
83. Which of the following is an example of compounded 89. The printf() function retunes which value when an
assignment statement? error occurs?
b) a+=5 b) Zero
84. The operator && is an example for ___ operator. 90. Null character is represented by
a) Assignment a) \n
b) Increment b) \0
c) Logical c) \o
d) Rational d) \e
85. The operator & is used for 91. Which among the following is an unconditional
control structure
a) Bitwise AND
a) do-while
b) Bitwise OR
b) if-else
c) Logical AND
c) goto
d) Logical OR
d) for
87. Which of the following is a ternary operator? 93. Which of the following is a keyword is used for a
storage class
a) ?:
a) printf
b) *
b) external
c) sizeof
c) auto
d) ^
d) scanf
94. A Link is
88. p++ executes faster than p+1 because
a) a compiler
a) p uses registers
b) an active debugger
b) p++ is a single instruction
c) a C interpreter
c) ++ is faster than +
d) an analyzing tool in C
d) None of these
d) None of these
102. In C++, a function contained within a class is called
(A) a method
96. If the size of the array is less than the number of
initializers then, (B) a class function
d) Size is neglected when values are given 103. Which of the following is not an OOPS concept?
a. Encapsulation
b. Polymorphism
c. Exception
97. What is used as a terminator in C?
d. Abstraction
a) ?
b) ;
104. Which feature of OOPS described the reusability of
c) : code?
d) _ a. Abstraction
b. Encapsulation
c. Polymorphism
d. Inheritance
98. What is the answer of: 7%3
a) 2.5
105. Which feature of OOPS derives the class from
b) 1
another class?
c) 2 a. Inheritance
b. Data hiding
d) 3 c. Encapsulation
d. Polymorphism
d) for
108. Which two features of object-oriented programming 115. Which of the following feature is also known as run-
are the same? time binding or late binding?
a. Abstraction and Polymorphism features are the same a. Dynamic typing
b. Inheritance and Encapsulation features are the same b. Dynamic loading
c. Encapsulation and Polymorphism features are the same c. Dynamic binding
d. Encapsulation and Abstraction d. Data hiding
109. Which of the following definition is incorrect for 116. Which of the following OOP concept binds the code
polymorphism? and data together and keeps them secure from the
a. Polymorphism helps in redefining the same functionality outside world?
b. Polymorphism concept is the feature of object-oriented a. Polymorphism
programming (OOP) b. Inheritance
c. It always increases the overhead of function definition c. Abstraction
d. Ease in the readability of the program d. Encapsulation
110. Which among the following cannot be used for the 117. Which member of the superclass is never accessible
concept of polymorphism? to the subclass?
a. Static member function a. Public member
b. Constructor Overloading b. Protected member
c. Member function overloading c. Private member
d. Global member function d. All of the mentioned
111. Which function best describe the concept of 118. Which class cannot create its instance?
polymorphism in programming languages? a. Parent class
a. Class member function b. Nested class
b. Virtual function c. Anonymous class
c. Inline function d. Abstract class
d. Undefined function
113. Which member function is assumed to call first when 120. How can the concept of encapsulation be achieved in
there is a case of using function overloading or the program?
abstract class? a. By using the Access specifiers
a. Global function b. By using the concept of Abstraction
b. Local function c. By using only private members
c. Function with lowest priority d. By using the concept of Inheritance
d. Function with the highest priority
122. Which among the following feature does not come 133. Which of the following operators always takes no
under the concept of OOPS? argument if overloaded?
(d) +
123. Which of the following feature interacts one object
with another object?
124. Message reading 134. The keyword that is used that the variable can not
125. Message passing change state?
126. Data transfer
(a) static
127. Data binding
(b) friend
(c) private
128. Which definition best defines the concept of
abstraction? (d) const
a. Hides the important data
b. Hides the implementation and showing only the features
c. Hiding the implementation 135. In OOP a class is an example of:
d. Showing the important data
(a) Data Type
131. To convert from a user-defined class to a basic type, 137. A static member function cannot be declared
you would most likely use
(a) Explicit
(a) an overloaded = operator
(b) Implicit
(b) a one-argument constructor
(c) Static
(c) a built-in conversion operator
(d) Virtual
(d) a conversion operator that‘s a member of the class
138. We can get only one unique value which can be used
132. The main function of scope resolution operator (::) is, by all the objects of that class by the use of
(c) To link the definition of an identifier to its declaration (c) static variables
139. Friend functions are _____________ functions of a 145. When a variable is define as static in a class then all
class object of this class
140. _______ remain in memory even when all objects of 146. When the base class and the derived class have a
a class have been destroyed member function with the same name, you must be
more specific which function you want to call using
(a) Primitive variables ___________
151. __________ Operator will take only one operand 157. Which of the following best defines a class?
152. Class is _________ abstraction. 158. Which header file is required in C++ to use OOP?
a) Object a) iostream.h
b) Logical b) stdio.h
c) Real c) stdlib.h
156. Which of the following operators cannot be 162. How members of an object are accessed?
overloaded?
a) Using dot operator/period symbol
(a) Scope resolution operator ( :: )
b) Using scope resolution operator
(b) Insertion operator ( << )
c) Using member names directly
(c) Extraction operator ( >> )
d) Using pointer only
(d) The relation operator ( > )
163. Object declared in main() function _____________ 170. Which option is false about the final keyword?
a) Can be used by any other function a) A final method cannot be overridden in its subclasses.
b) A final class cannot be extended.
b) Can be used by main() function of any other program c) A final class cannot extend other classes.
d) A final method can be inherited.
c) Can’t be used by any other function
c) Size of the largest size of variable 172. Who invented Java Programming?
b) James Gosling
165. Which of the following option leads to the portability c) Dennis Ritchie
programs. a) JRE
a) JVM
b) JIT
b) JRE
c) JDK c) JDK
d) JDB
d) JVM
c) JAVA
169. What do you mean by nameless objects?
a) An object created by using the new keyword. d) JAVA_HOME
b) An object of a superclass created in the subclass.
c) An object without having any name but having a
reference.
d) An object that has no reference.
176. What is the extension of compiled java classes? 178. Which of these keywords can be used to prevent
Method overriding in Java?
a) .txt
a) final
b) .js
b) protected
c) .class
c) static
d) .java
d) constant
177. Which exception is thrown when java is out of
memory?
D.JAVAC
To practice small codes that comes in admission test these videos (follow the link) helped me a lot and I believe you will correct most of the
admission test mcq’s if you learn these examples shown in these two videos.
https://youtu.be/EmYvmSoTZko
https://youtu.be/AlOQMTr5zD0
1. The communication mode that supports data in both 7. Which Project 802 standard provides for a collision-
directions at the same time is……….. free protocol?
A. simplex A. 802.2
B. half-duplex B. 802.3
C. full-duplex C. 802.5
D. multiplex D. 802.6
2. Why was the OSI model developed? 8. The 802.5 standard implements a way for preventing
collisions on the network. How are collisions
A. manufacturers disliked the TCP/IP protocol suite prevented when using this standard?
B. the rate of data transfer was increasing exponentially A. CSMA/CD
C. Session
4. CRC stands for __________
D. Presentation
a) Cyclic redundancy check
b) Code repeat check
c) Code redundancy check
d) Cyclic repeat check 10. Bridge works in which layer of the OSI model?
A. Application layer
6. Pure ALOHA has a maximum throughput of --------- B. Packets may arrive out of order
C. 7.4 %
D. 1 %
12. The Internet is an example of……. 18. Which of the following device is used to connect two
systems, especially if the systems use different
A. Cell switched network protocols?
B. circuit switched network A. hub
C. Packet switched network B. bridge
D. repeater
13. What is the use of Ping command?
A. To test a device on the network is reachable 19. _______ can detect burst error of length less than or
equal to degree of the polynomial and detects burst
B. To test a hard disk fault errors that affect odd number of bits.
C. To test a bug in an Application A. Hamming Code
D. To test a Pinter Quality B. CRC
C. VRC
14. The combination of an IP address and a port D. None of the above
number is known as___________
A. network number
20. The PSTN is an example of a …………………
B. socket address network.
C. subnet mask number A. packet switched
D. MAC address B. circuit switched
C. message switched
15. Which of the following is reliable communication? D. None of these
A. TCP
C. spider tree
16. What is the size of Host bits in Class B of IP
address? D. none of the mentioned
A. 04
A. FTP
B. SNMP
C. SMTP
D. RPC
23. FDDI is a 29. A small network making up the Internet and also
having a small numbers of computers within it is
A. ring network called…………..
D. 255.255.255.255
26. Which transmission media has the highest
transmission speed in a network?
32. What is the port number for HTTP?
A. coaxial cable
A. 99
B. twisted pair cable
B. 86
C. optical fiber
C. 80
D. electrical cable
D. 23
D. Microwave C. 255.255.0.0
D. 255.255.255.0
28. What does the acronym ISDN stand for?
34. Which Layer is Responsible for Congestion 40. What is the first octet range for a class A IP
Control? address?
35. Which of these is a feature of hubs? 41. What is the first octet range for a class B IP
address?
A. Hubs amplifies the incoming signal.
A. 128 - 255
B. Hubs understand frames, packets or headers
B. 1 - 127
C. All lines coming into a Hub must operate at a same speed.
C. 192 - 223
D. all of these
D. 128 – 191
D. Data Link
37. The main difference between TCP and UDP is
A. UDP is connection oriented whereas TCP is datagram service 43. A __________ is a device that forwards packets
B. TCP is an Internet protocol whereas UDP is an ATM protocol between networks by processing the routing
information included in the packet.
C. UDP is a datagram whereas TCP is a connection-oriented
service a. Bridge
b. Firewall
D. All of the above c. Router
d. Hub
D. Router
45. Which of the following networks extends a private
39. In OSI model, which of the following layer provides network across public networks?
error-free delivery of data? a) Local area network
b) Virtual private network
A. Data link c) Enterprise private network
d) Storage area network
B. Network
C. transport
D. Session
46. Which of the following layers is an addition to OSI 54. In TDM, the transmission rate of a multiplexed path
model when compared with TCP IP model? is always _______ the sum of the transmission
a) Application layer a) Greater than
b) Presentation layer b) Lesser than
c) Session layer c) Equal to
d) Session and Presentation layer d) Equal to or greater than
47. The functionalities of the presentation layer include 55. Propagation delay depends on ___________
____________ a) Packet length
a) Data compression b) Transmission rate
b) Data encryption c) Distance between the routers
c) Data description d) Speed of the CPU
d) All of the mentioned
B. Gateway
52. The state when dedicated signals are idle are called 59. TELNET used _________ protocol for data
__________ connection
a) Death period
b) Poison period A. TCP
c) Silent period
d) Stop period B. UDP
C. IP
a) digital modulation
D. DHCP server
b) 128 bytes
c) 64 bits
d) 128 bits
63. Which protocol below operates at the network layer
in the OSI model? 70. Communication between a computer and a keyboard
involves……….transmission
A. IP
a) Automatic
B. ICMP
b) Half-duplex
C. RARP c) Full-duplex
64. Which of the IP headers decides when the packet 71. MAC address is of
should be discarded?
a) 24 bits
A. Fragment control b) 36 bits
B. TTL c) 42 bits
d) 48 bits
C. Checksum
65. Which port is reserved for use of the SMTP a) MAC address
protocol? b) IP address
A. 21 c) both MAC address and IP address
d) none of the mentioned
B. 23
a) 10 mbps
d) none of the mentioned
74. What flavor of Network Address 80. A local telephone network is an example of
Translation can be used to have one IP a……network.
address allow many users to connect to
the global Internet? a) Packet switched
b) Circuit switched
a) NAT
c) Both Packet switched and Circuit switched
b) Static
d) Line switched
c) Dynamic
d) PAT 81. Most packet switches use …………. principle
a) CDMA
b) CSMA/CA
83. FTP is built on architecture
c) ALOHA
d) None of the mentioned a) Client-server
b) P2P
77. Multiplexing is used in
c) Both of the mentioned
a) Packet switching d) None of the mentioned
b) Circuit switching
84. FTP uses parallel TCP
c) Data switching connections to transfer a file
d) Packet & Circuit switching
a) 1
b) 2
78. A list of protocols used by a system, one protocol per
layer, is called c) 3
d) 4
a) protocol architecture
b) protocol stack 85. If you have to send multimedia data over SMTP it
has to be encoded into
c) protocol suite
d) none of the mentioned a) Binary
b) Signal
79. Which multiplexing technique transmits digital
signals?
c) ASCII
d) None of the mentioned
a) FDM
b) TDM 86. Secure shell (SSH) network protocol is used for……..
c) WDM
d) FDM & WDM a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned
87. SSH uses to authenticate the 93. Where is a hub specified in the OSI model?
remote computer.
A. Session layer
a) public-key cryptography
B. Physical layer
b) private-key cryptography
C. Data Link layer
c) any of public-key or private-key
D. Application layer
d) both public-key & private-key
94. IPsec is designed to provide the security at the
parameters
b) 48 bytes
c) 64 bytes
c) grants a IP address when receives a request from a client
d) 128 bytes
d) all of the mentioned
99. Frame relay has error detection at the
92. Which protocol does DHCP use at the Transport
layer? a) physical layer
b) data link layer
a) IP c) network layer
b) TCP d) transport layer
c) UDP
d) ARP 100. In classless addressing, there are no classes but
addresses are still granted in
a) IPs
b) Blocks
c) Codes
d) Sizes
a) Huge number of systems on the internet 109. In TCP, sending and receiving data is done as
b) Very low number of system on the internet
a) Stream of bytes
c) Providing standard address
b) Sequence of characters
d) None of the mentioned
c) Lines of data
103. Which of the following is the d) Packets
broadcast address for a Class B
network ID using the default
subnetmask? 110. TCP groups a number of bytes together into a packet
called
a) 172.16.10.255
b) 255.255.255.255 a) Packet
c) 172.16.255.255
b) Buffer
d) 172.255.255.255
c) Segment
d) Stack
c) HTTP
d) None of the mentioned 114. What is the main reason the OSI model was created?
A. NCP
C. So different networks could communicate.
B. HDLC
D. So Cisco could use the model.
115. The functions of a DNS server to convert 120. This is an IP address 168.212.226.204 which class
……………… name to ……………….. address? this address belong to?
a. Web address and DNS a. Class A
116. Active HUB is under -----layer but passive HUB is 121. A DNS client is called……….
under -----layer OSI model? a) DNS updater
a. Data link and network
b) DNS resolver
b. Physical and data link
c) DNS handler
c. physical and zero
d) none of the mentioned
d. network and transport
d. None
124. Which one of the following allows client to update
119. The datalink layer takes the packet from---------------
their DNS entry as their IP address change?
-------- and encapsulates them into frame
a) dynamic DNS
transmission.
a. Network layer b) mail transfer agent
d. Application layer
126. Which multiple access technique is used by IEEE 131. In TCP/IP network, the port address is
802.11 standard for wireless LAN? (a) 16-bit
a) CDMA
(b) 32-bit
b) CSMA/CA
(c) 64-bit
c) ALOHA
(d) 128-bit
d) none of the mentioned
135. Bluetooth is the wireless technology for……….. 140. Which protocol assigns IP address to the client
a) local area network connected in the internet?
a) DHCP
b) personal area network
b) IP
c) both (a) and (b)
c) RPC
d) none of the mentioned
d) none of the mentioned
145. After obtaining the IP address, to prevent the IP 150. IPv6 does not use ______ type of address
conflict the client may use a) Broadcast
a) internet relay chat
b) Multicast
b) broader gateway protocol
c) Anycast
c) address resolution protocol
d) None of the mentioned
d) none of the mentioned
147. SSH uses _______ to authenticate the remote 152. An applet __________
computer. (a) is an interpreted program that runs on the client
a) public-key cryptography
(b) tracks the number of visitors to a Website
b) private-key cryptography
(c) is a compiled program that usually runs on the client
c) both (a) and (b)
(d) collects data from visitors to a Website
d) none of the mentioned
155. IPV6 increases the size of the IP address from 160. Which error detection method involves the use of
(a) 64 to 132 bits parity bits?
(b) provide an extra measure of security 161. A DNS response is classified as ----- if the
information comes from a cache memory
(c) None of the above
b) Recursive
157. Frames from one LAN can be transmitted to
another LAN via the device – c) Unauthoritative
(a) Router
d) Iterative
(b) Repeater
(c) Modem
162. ------is a client-server program that provides an IP
(d) Bridge address, subnet mask, IP address of a router, and IP
address of a name server to a computer
d) Packet
163. What is the maximum data rate in IEEE 802.11n?
159. What is the maximum data rate of a channel with a
bandwidth of 200 KHz if we use four levels of digital
a) 300 Mbps
signaling?
b) 600 Mbps
c) 1000 Kbps
d) 1200 Kbps
164. Major function of a transport layer in the OSI 168. An Access point operates in which layer of OSI
model is to perform model?
165. An IPv6 basic header is fixed as 169. Which protocol provides e-mail facility among
different hosts?
A. FTP
a) 32 bytes long
B. SMTP
b) 40 bytes long
C. TELNET
c) 64 bits long
D. SNMP
d) 128 bit long
170. A wireless network uses .......... waves to transmit
signals.
166. Which of the following services uses both TCP and A. Mechanical
UDP ports?
B. Radio
C. Sound
a) DNS
D. Magnetic
b) TFTP
171. Firewalls are used to protect against .......
c) SSH
A. Unauthorized Access
d) TELNET
B. Virus Attacks
d. router
173. Application Layer protocols are HTTP, FTP, SSH, 186. BUS backbone uses LAN and Bridges.
DNS etc.
187. Star backbone uses Switch.
174. Presentation Layer protocols are SSL, MPEG, JPEG
etc. 188. IEEE 802.3 is ETHERNET
175. Session Layer protocols are API’s , Sockets etc. 189. Repeater works with volts or signals.
176. Transport Layer protocols are TCP, UDP 190. Getway connects different networks.
177. Network Layer protocols are routing, IP, IPsec, 191. Class C starts with 110 (binary) or 192 (dotted
ICMP, Packets etc. decimal)
178. Datalink Layer Protocols are Frame, PPP, Switch, 192. Session, Presentation and Application layers are user
Bridge etc. supported.
179. Physical Layer Protocols are Coax, Fiber, Hubs, 193. Kerbaros is an authentication service for passwords.
repeaters etc.
194. TCP is connection Oriented.
180. Address Resolution Protocol (ARP) is used to find
the hardware address of a local device. 195. IEEE 802.11 is a slang name for Wi-Fi
181. BUS, Ring and Star Topologies are mostly used in 196. In class A the range is 1-126 and there are 16M host.
LAN
197. In class B the range is 128-191 and there are 64k
182. Connection of telephone regional office is a practical host.
example of MESH topology.
198. In class C the range is 192-223 and there are 254 host
183. Cable TV and DSL are example of MAN.
199. Class D is used for Broadcasting
184. Repeaters are used in Ring topology.
200. Class E used for future use
185. Modulator and Demodulator combinedly known as
Modem.
1. The logical or mathematical model of a particular 6. Which of the following best describes an array?
organization of data is called a ………
a) A data structure that shows a hierarchical behavior
A) Data structure
b) Container of objects of similar types
B) Data arrangement
c) Arrays are immutable once initialized
C) Data configuration
d) Array is not a data structure
D) Data formation
11. Pushing an element into stack already having five 17. Can linked list be implemented using arrays? Yes
elements and stack size of 5, then stack becomes
a) Overflow
18. The data structure required to check whether an
b) Crash expression contains balanced parenthesis is?
c) Underflow a) Stack
c) Array
13. Which of the following concepts make extensive use (B) Complete binary tree
of arrays?
(C) M-way search tree
a) Binary trees
(D) Full binary tree
b) Scheduling of processes
c) Caching
20. What is the worst case for linear search?
d) Spatial locality
a) O(nlogn)
b) O(logn)
14. A vertex of in-degree zero in a directed graph is
called a/an c) O(n)
(C) Sink 21. If two trees have same structure and node content,
then they are called ____
(D) Articulation point
(A) Synonyms trees
(C) Planar
22. The time complexity of quicksort is ……..
(D) Completely connected
A. O(n)
16. To perform level-order traversal on a binary tree,
which of the following data structure will be B. O(logn)
required?
C. O(n2)
(A) Hash table
D. O(n logn)
(B) Queue
(D) Stack
23. Which of these is not an application of linked list? 29. The total number of comparisons in a bubble sort is
….
a) To implement file systems
A. O(n logn)
b) For separate chaining in hash-tables
B. O(2n)
c) To implement non-binary trees
C. O(n2)
d) Random Access of elements
D. O(n)
25. Quick sort is also known as …….. 31. What is the advantage of recursive approach than
an iterative approach?
A. merge sort
a) Consumes less memory
B. tree sort
b) Less code and easy to implement
C. shell sort
c) Consumes more memory
D. partition and exchange sort
d) More code has to be written
A. Merge A) Stacks
B. Heap B) List
C. Radix C) Strings
D. Bubble D) Trees
28. Two dimensional arrays are also called 34. Which data structure is needed to convert infix
notation to postfix notation?
A. tables arrays
a) Branch
B. matrix arrays
b) Tree
C. both of above
c) Queue
D. none of above
d) Stack
35. What is the result of the following operation? 40. Which of the following statements hold true for
binary trees?
Top (Push (S, X))
A. The left subtree of a node contains only nodes with keys less
a) X than the node’s key
b) X+S B. The right subtree of a node contains only nodes with keys
greater than the node’s key.
c) S
C. Both a and b above
d) SX
D. Noth left and right subtree nodes contains only nodes with keys
less than the node’s key
36. Which data structure is used for implementing
recursion?
41. Binary Search can be categorized into which of the
a) Queue following?
b) Stack a) Brute Force technique
c) Array b) Divide and conquer
d) List c) Greedy algorithm
d) Dynamic programming
37. AVL trees have a faster ________
d) O(M log N)
38. What is the worst case complexity of binary search
using recursion?
d) Tree
39. Which of the following is an infix expression?
a) (a+b)*(c+d)
44. What is an external sorting algorithm?
b) ab+c*
a) Algorithm that uses tape or disk during the sort
c) +ab
b) Algorithm that uses main memory during the sort
d) abc+*
c) Algorithm that involves swapping
45. A queue follows __________ 51. The given array is arr = {1, 2, 4, 3}. Bubble sort is
used to sort the array elements. How many iterations
a) FIFO (First In First Out) principle will be done to sort the array?
d) Linear tree c) 1
d) 0
46. Can stack be described as a pointer?
a) Simulation of recursion
49. What is the peculiarity of red black trees? b) Simulation of arbitrary linked list
A. In red-black trees, the root do not contain data. c) Simulation of limited resource allocation
B. In red-black trees, the leaf nodes are not relevant and do not d) Simulation of heap sort
contain data.
C. In red-black trees, the leaf nodes are relevant but do not contain
data. 55. Which of the following ways below is a In order
traversal?
D. Both a and c above
A. Root->left sub tree-> right sub tree
b) Circular queue
c) Dequeue
d) Priority queue
56. With what data structure can a priority queue be 62. Shell sort is also known as _____________
implemented?
a) diminishing decrement sort
a) Array
b) diminishing increment sort
b) List
c) partition exchange sort
c) Heap
d) diminishing insertion sort
d) Tree
B. Stacks
58. What is the applications of dequeue?
C. Graphs
a) A-Steal job scheduling algorithm
D. Both a and c above
b) Can be used as both stack and queue
b) selection sort
59. Which of the following linked list below have last
node of the list pointing to the first node? c) binary tree sort
C. circular singly linked list 66. Which of the following is the distribution sort?
b) Smooth sort
b) easier computations
c) to delete elements based on priority 67. Key value pair is usually seen in
68. In a heap, element with the greatest key is always in 73. The depth of a complete binary tree is given by
the _______ node.
a. Dn = n log2n
A. leaf
b. Dn = n log2n+1
B. root
c. Dn = log2n
C. first node of left sub tree
d. Dn = log2n+1
D. first node of right sub tree
78. In a Heap tree 84. Two main measures for the efficiency of an
algorithm are
a. Values in a node is greater than every value in left sub tree and
smaller than right sub tree a. Processor and memory
b. Values in a node is greater than every value in children of it b. Complexity and capacity
79. If every node u in G is adjacent to every other node 85. The time factor when determining the efficiency of
v in G, A graph is said to be algorithm is measured by
80. In linked lists there are no NULL links in: 86. The space factor when determining the efficiency of
algorithm is measured by
a. Single linked list
a. Counting the maximum memory needed by the algorithm
b. Lin ear doubly linked list
b. Counting the minimum memory needed by the algorithm
c. circular linked list
c. Counting the average memory needed by the algorithm
d. None of the above
d. Counting the maximum disk space needed by the algorithm
83. The dummy header in linked list contains…… d. Item is the last element in the array or is not there at all
a. First record of the actual data
89. The Average case occur in linear search algorithm 95. Linked lists are best suited
a. When Item is somewhere in the middle of the array a. for relatively permanent collections of data
b. When Item is not in the array at all b. for the size of the structure and the data in the structure are
constantly changing
c. When Item is the last element in the array
c. for both of above situation
d. When Item is the last element in the array or is not there at all
d. for none of above situation
c. both of above
91. The complexity of Bubble sort algorithm is d. none of above
a. O(n)
C. -1
92. The complexity of merge sort algorithm is D. None of these
a. O(n)
b. O(log n) 98. New nodes are added to the _____ of the queue.
c. O(n2) A. front
d. O(n log n) B. back
C. middle
93. The operation of processing each element in the list D. Both 1 and 2
is known as
a. Sorting
99. A _______ is a data structure that organizes data
b. Merging similar to a line in the supermarket, where the first
one in line is the first one out.
c. Inserting
A. queue linked list
d. Traversal
B. stacks linked list
C. both of them
94. Arrays are best data structures
D. neither of them
a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are
constantly changing
100. What happens when you push a new node onto a 105. Which of the following data structure store the
stack? homogeneous data elements?
A. the new node is placed at the front of the linked list. A. Arrays
B. the new node is placed at the back of the linked list. B. Records
C. the new node is placed at the middle of the linked list. C. Pointers
101. The memory address of the first element of an array 106. In the ....... traversal we process all of a vertex’s
is called descendants before we move to an adjacent vertex.
102. Which of the following data structures are indexed 107. A binary search tree whose left subtree and right
structures? subtree differ in height by at most 1 unit is called
……
A. linear arrays
A) AVL tree
B. linked lists
B) Red-black tree
C. both of above
C) Lemma tree
D. none of above
D) None of the above
D) Graph
110. A directed graph is ………………. if there is a path 115. In general, the binary search method needs no more
from each vertex to every other vertex in the digraph. than ……………. comparisons.
111. Which of the following is not the internal sort? 116. Any node is the path from the root to the node is
called
A) Insertion Sort
A) Successor node
B) Bubble Sort
B) Ancestor node
C) Merge Sort
C) Internal node
D) Heap Sort
D) None of the above
D) None
120. Which of the following has search efficiency of Ο(1)? 125. Minimum number of moves required to solve a
Tower of Hanoi puzzle is …………..
(A) Tree
(A) 2^n2
(B) Heap
(B) n-1
(C) Hash Table
(C) 2n – 1
(D) Linked-List
(D) 2n – 2
131. A technique for direct search is ………… 137. Travelling salesman problem is an example of
……………….
(A) Binary Search
(A) Dynamic Algorithm
(B) Linear Search
(B) Greedy Algorithm
(C) Tree Search
(C) Recursive Approach
(D) Hashing
(D) Divide & Conquer
(D) Transposition
136. Which of the following types of expressions do not (D) None of these
require precedence rules for evaluation?
142. Which of the following is an application of stack? 144. Arrays are best data structures
B) tower of Hanoi B) for the size of the structure and the data in the structure are
constantly changing
C) infix to postfix conversion
C) for both of above situation
D) all of the above
D) for none of above situation
A) 0 and 1
B) 0 and -1
C) -1 and 0
D) 1 and 0
a) collection of programs that manages hardware resources a) the number of processes executed per unit time
b) system service provider to the application programs b) the number of processes in the ready queue
c) interface between the hardware and application programs c) the number of processes in the I/O queue
2. Whenever a process needs I/O to or from a disk it 7. Which one of the following is a synchronization
issues a ______________ tool?
3. By operating system, the resource management can 8. Remote Procedure Calls are used ____________
be done via __________
a) for communication between two processes remotely different
a) time division multiplexing from each other on the same system
b) space division multiplexing b) for communication between two processes on the same system
c) time and space division multiplexing c) for communication between two processes on separate systems
4. A “glue” between client and server parts of 9. The initial program that is run when the computer
application is………. is powered up is called __________
b) Firmware b) bootloader
c) Package c) initializer
5. What is interprocess communication? 10. Which one of the following can not be scheduled by
the kernel?
a) communication within the process
a) kernel level thread
b) communication between two process
b) user level thread
c) communication between two threads of same process
c) process
d) none of the mentioned
d) none of the mentioned
11. What is Dispatch latency? 16. The interval from the time of submission of a
process to the time of completion is termed as
a) the speed of dispatching a process from running to the ready ____________
state
a) waiting time
b) the time of dispatching a process from running to ready state
and keeping the CPU idle b) turnaround time
c) the time to stop one process and start running another one c) response time
12. A software that lies between the OS and the 17. Which scheduling algorithm allocates the CPU first
applications running on it. to the process that requests the CPU first?
13. The _______ calls certain procedures on remote 18. In priority scheduling algorithm____________
systems and is used to perform synchronous or
asynchronous interactions between systems. a) CPU is allocated to the process with highest priority
d) DB
d) process queue
21. Which one of the following cannot be scheduled by 27. What is Turnaround time?
the kernel?
a) the total waiting time for a process to finish execution
a) kernel level thread
b) the total time spent in the ready queue
b) user level thread
c) the total time spent in the running queue
c) process
d) the total time from the completion till the submission of a
d) none of the mentioned process
22. CPU scheduling is the basis of___________ 28. What is Waiting time?
a) multiprocessor systems a) the total time in the blocked and waiting queues
b) multiprogramming operating systems b) the total time spent in the ready queue
c) larger memory sized systems c) the total time spent in the running queue
d) none of the mentioned d) the total time from the completion till the submission of a
process
a) time a) the total time taken from the submission time till the completion
time
b) space
b) the total time taken from the submission time till the first
c) money response is produced
d) all of the mentioned c) the total time taken from submission time till the response is
output
32. Which of the following algorithms tends to minimize 37. Which of the following scheduling algorithms gives
the process flow time? minimum average waiting time?
33. Which is the most optimal scheduling algorithm? 38. To access the services of operating system, the
interface is provided by the ___________
a) FCFS – First come First served
a) System calls
b) SJF – Shortest Job First
b) API
c) RR – Round Robin
c) Library
d) None of the mentioned
d) Assembly instructions
d) increasing the priority of jobs to ensure termination in a finite c) when process is using the CPU
time
d) none of the mentioned
42. The number of processes completed per unit time is 48. What is a long-term scheduler?
known as __________
a) It selects processes which have to be brought into the ready
a) Output queue
a) New
50. What is a short-term scheduler?
b) Old
a) It selects which process has to be brought into the ready queue
c) Waiting
b) It selects which process has to be executed next and allocates
d) Running CPU
b) PCB queue
52. The only state transition that is initiated by the user
c) Device Queue process itself is __________
d) Ready Queue a) block
b) wakeup
47. What will happen when a process terminates? c) dispatch
a) It is removed from all queues d) none of the mentioned
b) It is removed from all, but the job queue
53. In a time-sharing operating system, when the time 58. Which one of the following is a synchronization
slot given to a process is completed, the process goes tool?
from the running state to the__________
a) thread
a) Blocked state
b) pipe
b) Ready state
c) semaphore
c) Suspended state
d) socket
d) Terminated state
a) the processor executes more than one process at a time a) that can not drop below zero
b) the programs are developed by more than one person b) that can not be more than zero
c) more than one process resides in the memory c) that can not drop below one
d) a single user can execute many programs at the same time d) that can not be more than one
55. Suppose that a process is in “Blocked” state waiting 60. When high priority task is indirectly preempted by
for some I/O service. When the service is completed, medium priority task effectively inverting the
it goes to the __________ relative priority of the two tasks, the scenario is
called__________
a) Running state
a) priority inversion
b) Ready state
b) priority removal
c) Suspended state
c) priority exchange
d) Terminated state
d) priority modification
d) critical condition
62. Restricting the child process to a subset of the
parent’s resources prevents any process from
57. If a process is executing in its critical section, then no __________
other processes can be executing in their critical
section. This condition is called? a) overloading the system by using a lot of secondary storage
d) asynchronous exclusion
63. In UNIX, each process is identified by its__________ 69. Bounded capacity and Unbounded capacity queues
are referred to as__________
a) Process Control Block
a) Programmed buffering
b) Device Queue
b) Automatic buffering
c) Process Identifier
c) User defined buffering
d) None of the mentioned
d) No buffering
c) aging
66. Which of the following two operations are provided d) starvation
by the IPC facility?
74. Mutual exclusion implies that____________ 79. The signal operation of the semaphore basically
works on the basic _______ system call.
a) if a process is executing in its critical section, then no other
process must be executing in their critical sections a) continue()
85. A deadlock free solution to the dining philosopher’s 90. What is the drawback of banker’s algorithm?
problem ____________
a) in advance processes rarely know how much resource they will
a) necessarily eliminates the possibility of starvation need
b) does not necessarily eliminate the possibility of starvation b) the number of processes changes as time progresses
c) eliminates any possibility of any kind of problem further c) resource once available can disappear
86. Which of the following condition is required for a 91. A problem encountered in multitasking when a
deadlock to be possible? process is perpetually denied necessary resources is
called ____________
a) mutual exclusion
a) deadlock
b) a process may hold allocated resources while awaiting
assignment of other resources b) starvation
87. A system is in the safe state if____________ 92. To avoid deadlock ____________
a) the system can allocate resources to each process in some order a) there must be a fixed number of resources to allocate
and still avoid a deadlock
b) resource allocation must be done only once
b) there exist a safe sequence
c) all deadlocked processes must be aborted
c) all of the mentioned
d) inversion technique can be used
d) none of the mentioned
b) using thread b) must always be equal to the total number of resources available
in the system
c) using pipes
c) must not exceed the total number of resources available in the
d) all of the mentioned system
a) banker’s algorithm
94. For a deadlock to arise, which of the following
b) round-robin algorithm conditions must hold simultaneously?
c) elevator algorithm a) Mutual exclusion
95. A system is in a safe state only if there exists a 100. What is the solution to starvation?
____________
a) the number of rollbacks must be included in the cost factor
a) safe allocation
b) the number of resources must be included in resource
b) safe resource preemption
96. If no cycle exists in the resource allocation graph 101. The major part of swap time is _______time.
____________
a) waiting
a) then the system will not be in a safe state
b) transfer
b) then the system will be in a safe state
c) execution
c) all of the mentioned
d) none of the mentioned
d) none of the mentioned
a) aborted b) paging
b) a paging technique
106. Transient operating system code is code that 112. A page fault occurs when?
____________
a) a page gives inconsistent data
a) is not easily accessible
b) a page cannot be accessed due to its absence from memory
b) comes and goes as needed
c) a page is invisible
c) stays in the memory always
d) all of the mentioned
d) never enters the memory space
a) internal a) disrupted
b) external b) invalid
a) demand paging 116. When device A has a cable that plugs into device B,
and device B has a cable that plugs into device C and
b) buses device C plugs into a port on the computer, this
arrangement is called a_________
c) virtualization
a) port
d) all of the mentioned
b) daisy chain
c) bus
111. Segment replacement algorithms are more complex
than page replacement algorithms because d) cable
____________
117. The ________ keeps state information about the use 120. The first process launched by the linux kernel is
of I/O components. ___________
b) OS b) zombie process
118. The first linux kernel which supports the SMP 121. A process having multiple threads of control implies
hardware? ___________
b) linux 1.0 b) it can do only one task at a time, but much faster
119. Which one of the following linux file system does not 122. When one thread immediately terminates the target
support journaling feature? thread, it is called ____________
1. In the relational model, cardinality is termed as: 9. An entity set that does not have sufficient attributes
(A) Number of tuples. to form a primary key is a
(B) Number of attributes. (A) strong entity set. (B) weak entity set.
(C) simple entity set. (D) primary entity set.
(C) Number of tables.
(D) Number of constraints.
10. In a Hierarchical model, records are organized as
(A) Graph. (B) List.
2. Relational calculus is a
(C) Links. (D) Tree.
(A) Procedural language.
(B) Non- Procedural language. 11. In an E-R diagram attributes are represented by
(C) Data definition language. (A) rectangle. (B) square.
(D) High level language. (C) ellipse. (D) triangle.
3. The view of total database content is 12. The language used in application programs to
(A) Conceptual view. request data from the DBMS is referred to as the
17. The method in which records are physically stored 24. Relational Algebra is
in a specified order according to a key field in each (A) Data Definition Language
record is (B) Meta Language
(A) hash. (C) Procedural query Language
(B) direct. (D) None of the above
(C) sequential
(D) all of the above. 25. Key to represent relationship between tables is
called
18. A subschema expresses (A) Primary key (B) Secondary Key
(A) the logical view. (C) Foreign Key (D) None of these
(B) the physical view.
(C) the external view. 26. The file organization that provides very fast access
(D) all of the above. to any arbitrary record of a file is
(A) Ordered file (B) Unordered file
19. An advantage of the database management (C) Hashed file (D) B-tree
approach is
(A) data is dependent on programs. 27. Which of the following are the properties of entities?
(B) data redundancy increases. (A) Groups
(C) data is integrated and can be accessed by multiple (B) Table
programs. (C) Attributes
(D) none of the above. (D) Switchboards
20. Transaction processing is associated with everything 28. It is better to use files than a DBMS when there are
below except (A) Stringent real-time requirements.
(A) producing detail, summary, or exception reports. (B) Multiple users wish to access the data.
(B) recording a business activity. (C) Complex relationships among data.
(C) confirming an action or triggering a response. (D) All of the above.
(D) maintaining data.
29. Which of the following operation is used if we are
21. The method of access which uses key transformation interested in only certain columns of a table?
is known as (A) PROJECTION (B) SELECTION
(A) direct. (B) hash. (C) UNION (D) JOIN
(C) random. (D) sequential.
30. …………….data type can store unstructured data
22. The statement in SQL which allows to change the (A) RAW (B) CHAR
definition of a table is (C) NUMERIC (D) VARCHAR
(A) Alter.
(B) Update. 31. The method of access which uses key transformation
(C) Create. is known as
(D) select. (A) Direct
(B) Hash
23. E-R model uses this symbol to represent weak entity (C) Random
set? (D) Sequential
(A) Dotted rectangle.
(B) Diamond
(C) Doubly outlined rectangle
(D) None of these
32. …………. is a virtual table that draws its data from 39. Cross Product is a:
the result of an SQL SELECT statement. (A) Unary Operator (B) Ternary Operator
(A) View (C) Binary Operator (D) Not an operator
(B) Synonym
(C) Sequence 40. In E-R Diagram derived attribute are represented by
(D) Transaction
(A) Ellipse (B) Dashed ellipse
(C) Rectangle (D) Triangle
33. In E-R diagram generalization is represented by
(A) Ellipse
41. A data dictionary is a special file that contains:
(B) Dashed ellipse
(C) Rectangle (A) The name of all fields in all files.
(D) Triangle
(B) The width of all fields in all files.
34. A data manipulation command that combines the
(C) The data type of all fields in all files.
records from one or more tables is called………
(A) SELECT (D) All of the above.
(B) PROJECT
42. Which of the following is a comparison operator in
(C) JOIN SQL?
(D) PRODUCT
(A) = (B) LIKE
35. In E-R Diagram relationship type is represented by (C) BETWEEN (D) All of the above
creates………………..
(A) Parent-Child relationship between the tables that 44. Which of the following describes way of storing and
(B) Many to many relationship between the tables that A) Data model
(C) Network model between the tables that connect them. C) Data manipulation
D) Encapsulation
(D) None of the above.
45. Database Management System can perform
37. The natural join is equal to……………. A) Retrieval of data as per user requirement
(A) Cartesian Product B) Securing data and Maintaining backup of database
C) Allowing multiple users to access database simultaneously
(B) Combination of Union and Cartesian product D) All of them
(C) Combination of selection and Cartesian product
46. .............. are real world objects about which
(D) Combination of projection and Cartesian product
information is to be stored in database.
A) Entities
38. Consider the join of a relation R with relation S. If R B) Objects
has m tuples and S has n tuples, then the maximum C) Data
D) Attributes
size of join is:
(A) mn (B) m+n
(C) (m+n)/2 (D) 2(m+n)
47. Each entity generally has collection of ................ 56. An instance is ___________
associated to it. a) a set of relationships
b) set of attributes
A) attributes
c) set of entities
B) database
d) schema
C) table
D) none of them
57. The language used application programs to request
data from the DBMS is referred to as the
48. Which data type stores up to the specified length
a) DML
and no padding is done? b) DDL
c) query language
A) Var Char
d) none
B) Char
C) Var Char Ignore case
58. The relational database environment has all of the
D) None of them
following components except
49. ______ code that needs only one byte to store a
a) users
character. b) separate files
c) database
A) ASCII
d) query languages
B) ANSI
C) DBMS
59. ______________ is a ‘thing’ in the real world with an
D) RDBMS
independent existence.
a) Entity
50. A _____ value means unknown or missing value.
b) Attribute
A) junk c) Key
B) null d) Relationship
C) litter
D) refuse 60. Which view is normally more stable
a) internal level
b) external level
51. Primary key values cannot contain _______
c) conceptual level
A) Duplicate values d) view level
B) Null values
C) (a) and (b) 61. The ability to modify the conceptual schema without
D) None of them
causing any change to the application program
a) Physical data independence
52. A primary key designed by combining more than b) Logical Data independence
c) External Data independence
one field is known as ______ primary key.
d) none
A) Composite
B) Secondary 62. The information about data in a database is called
C) Tertiary
_____
D) Main
a) Meta data
53. Base will automatically assign ............. extension to b) Tera data
c) hyper data
the database file .
d) none
A) .obd
B) .odb
C) .bas 63. The links between rows of a master table and those
D) .bdo
of a nested table are maintained using:
54. ER model is used in _______ a. pointers.
b. foreign keys.
a) conceptual database b) schema refinement
c. determinants
c) physical refinement d) applications and security
d. clusters.
65. An attribute is also known as a(n) 73. A table with a _____________ cannot exhibit partial
a. table dependencies.
b. relation
A: two rows
c. row
B: single-attribute
d. field
C: three columns
D: none of the above
66. This Relational Algebra operation requires two
tables as input and the two tables must have one 74. Denormalization produces a ____________ normal
common form.
a) RESTRICTION A: higher
b) JOIN B: upper
c) DIVISION C: slower
e) PROJECTION D: lower
67. Which SQL keyword must be used to remove 75. Higher normal forms are better than lower normal
duplicate rows from the result relation ? forms because higher normal forms yield fewer
a) DELETE _______________ in the database.
b) DISTINCT
A: update, delete
c) NOT EXISTS
B: data storage
d) UNIQUE
C: data redundancies
D: none of the above
68. Which SQL keyword is used to return only different
values? 76. The 2NF describes the tabular format in which:
A: COUNT A: there are no repeating groups in the table
B: NOSAME B: all attributes are dependent on the primary key
C: GROUP C: A & B with no partial dependency
D: DISTINCT D: there is no partial dependency
84. Each table has an ______ file that contains the table
92. The database design that consists of multiple tables
definition. that are linked together through matching data
Ans. .frm stored in each table is called a:
A) data dictionary
B) database management system (DBMS) A) link data from remote databases.
C) decision support system B) prevent users from getting to database security
D) relational database information.
C) provide a conceptual view of the data so it is easier to
understand.
88. The modern database report writer: D) store complex data structure to represent the properties of
A) is a career path that focuses on creating, managing and objects
supporting the reports generated from databases
B) provide limited control over how information is displayed
and reported. 95. One of the first phases of a new database project that
involves critical areas, expensive hardware or
C) provides the tools for database designer to display
software within the organization is called
information in the desired format
___________
D)provides the tools for the database administrator to
monitor and report on database use and activity
A) analysis phase
B) feasibility study
C) investigation stage
89. The separation of the data definition from the D) system design
program is known as…………….
97. The primary difference between the Relational 104. The association role defines…………..
database (RDB) and Object oriented database
(OODB) models is:
A) how tables are related in the database
B) the relationship between the class diagram and the tables
A) OODB incorporates methods in with the definition of the in the database
data structure, while RDB does not C) the tables that each attribute is contained
B) OODB supports multiple objects in the same database D) which attribute is the table's primary key
while RDB only supports a single table per database
C) RDB allows the definition of the relationships between
the different tables, while OODB does not allow the 105. The purpose of an N-Ary association is:
relationships to be defined between objects
D) RDB supports indexes, while OODB does not support A) to capture a parent-child relationship
indexes B) to deal with one to many relationships
C) to deal with relationships that involve more than two
tables
98. Which of the following items is not the advantage of D) to represent an inheritance relationship
a DBMS?
106. A composition association is drawn using which
A) Improved ability to enforce standards symbol:
B) Improved data consistency
C) Local control over the data A) A line which loops back onto the same table
D) Minimal data redundancy B) Small closed diamond at the end of a line connecting two
tables
99. The predominant way of storing data today is using C) Small open diamond at the end of a line connecting two
which type of database models? tables
D) Small triangle at the end of a line connecting the
aggregated item and multiple component items
A) Hierarchical
B) Network
C) Object oriented 107. A reflexive association is drawn using which symbol:
D) Relational
A) a line which loops back onto the same table
100. Two different terms are used to describe the B) small closed diamond at the end of a line connecting two
characteristics of interest for an entity. They are tables
attributes and: C) small open diamond at the end of a line connecting two
A) classes tables
B) entities D) small triangle at the end of a line connecting the
C) properties aggregated item and multiple component items
D) traits
108. Assume you are creating a database to handle the
101. When building a database, the data dealing with an data associated with instruction at a university. What
entity is modeled as a: is the most appropriate special association to model
that a class may have multiple pre-requisites?
A) attribute
B) class A) aggregation association
C) object B) generalization association
D) table C) n-ary association
D) reflexive association
109. Assume you are creating a database to handle the
102. The property (or set of properties) that uniquely data associated with instruction at a university. What
defines each row in a table is called the: is the most appropriate special association to model
degree requirements (i.e., required number of courses
in humanity, science, math, etc)?
A) identifier
B) index
C) primary key A) composition association
D) symmetric key B) generalization association
C) n-ary association
103. Business rules can be represented in the database D) reflexive association
through:
110. Assume you are creating a database to handle the 113. The ability to define common properties or functions
data associated with instruction at a university. What in the higher class and then modify them in the lower
is the most appropriate special association to model classes is called:
that a course has an assigned instructor, Teaching A) Inheritance
Assistants, a classroom, meeting time slot, and class B) Polymorphism
roster? C) Reflexive
D) Transformance
A) aggregation association
B) generalization association 114. A reflexive association is one where one class is:
C) n-ary association
D) reflexive association
A) broken down into special cases
B) combined with multiple other classes
111. What is the most appropriate special association that C) combined with one other class
indicates that multiple textbooks make up a course D) linked back to itself
required reading list?
115. Which of the following statements is not correct?
A) aggregation association
B) generalization association
C) n-ary association A) A primary goal of a database system is to share data with
D) reflexive association multiple users
B) It is possible to change a method or property inherited
from a higher level class
112. What is the special association that indicates that one C) While companies collect data all the time, the structure of
object can be broken down into multiple special the data changes very often.
cases? D) In a client / server environment, data independence
causes client-side applications to be essentially independent
of the database stored on the server side.
A) composition association
B) generalization association
C) n-ary association 116. Which of the following statements is not correct?
D) reflexive association A) Data Normalization is the process of defining the table
structure
B) The purpose of class diagrams is to model the
interrelationships between the different classes in the
database
C) Individual objects are stored as rows in a table
D) Properties of an object are stored as columns in a table.
1. Control Unit acts as the central nervous system of the 6. Which of the following is correct about 8086
computer. microprocessor?
a) Physical address
7. Which of the following is a type of microprocessor?
b) Logical address
a) CISC
c) Neither physical nor logical
b) RISC
d) None of the mentioned
c) EPIC
c) Main Memory
a) PC
9. Which of the following addressing method does the
b) MAR instruction, MOV AX,[BX] represent?
5. Whenever the data is found in the cache memory it is d) register relative addressing mode
called as _________
a) HIT
10. Which of the following is not true about the address
b) MISS bus?
d) ERROR b) It is a bidirectional
c) It is 16 bits in length
d) It is Unidirectional
11. Which of the following is true about 17. What does a loader do in a microprocessor?
microprocessors?
a) Converts hexadecimal code to binary
a) It has an internal memory
b) Converts decimal to binary
b) It has interfacing circuits
c) Increments the content of the program counter by 1
c) It contains ALU, CU, and registers
d) Decodes an opcode
d) It uses Harvard architecture
c) Accumulator c) Variable
13. How many address lines are present in 8086 19. In ____________ mapping, the data can be mapped
microprocessor? anywhere in the Cache Memory.
a) 16 a) Associative
b) 20 b) Direct
c) 32 c) Set Associative
d) 40 d) Indirect
14. Which of the following is not a condition flag? 20. The transfer between CPU and Cache
is______________
a) Trap flag
a) Block transfer
b) Auxiliary carry flag
b) Word transfer
c) Parity flag
c) Set transfer
d) Zero flag
d) Associative transfer
15. A memory connected to a microprocessor has 20
address lines and 16 data lines. What will be the
memory capacity?
21. The number of clock cycles per second is referred as
a) 8 KB ________
b) 2 MB a) Clock speed
c) 16 MB b) Clock frequency
d) 64 KB c) Clock rate
16. Which of the following is not true about 8085 d) Clock timing
microprocessor?
a) It is an 8-bit microprocessor
22. Which of the following processor has a fixed length of 27. If M denotes the number of memory locations and N
instructions? denotes the word size, then an expression that denotes
the storage capacity is ______________
a) CISC
a) M*N
b) RISC
b) M+N
c) EPIC
c) 2M+N
d) Multi-core
d) 2M-N
a) Registers b) 16 bits
b) Cache c) 8 bits
d) Virtual Memory
d) Cache memory 32. CPU fetches the instruction from memory according
to the value of ____________
a) program counter
b) status register
c) instruction register
33. Program always deals with ____________ 39. The registers, ALU and the interconnection between
them are collectively called as _____
a) logical address
a) process route
b) absolute address
b) information trail
c) physical address
c) information path
d) relative address
d) data path
d) Buffer registers
d) Rambus c) Controllers
d) Multiple bus
b) Multiplexer
c) Control unit
44. For a given FINITE number of instructions to be 49. The addressing mode, where you directly specify the
executed, which architecture of the processor operand value is_______
provides for a faster execution?
a) Immediate
a) ISA
b) Direct
b) ANSA
c) Definite
c) Super-scalar
d) Relative
d) All of the mentioned
a) Reduce the clock cycles for a programming task a) Conditional code flags
47. When Performing a looping operation, the 52. The register used to store the flags is called as
instruction gets stored in the ______ _________
48. The addressing mode/s, which uses the PC instead of 53. The Flag ‘V’ is set to 1 indicates that_____________
a general purpose register is ______
a) The operation is valid
a) Indexed with offset
b) The operation is validated
b) Relative
c) The operation has resulted in an overflow
c) Direct
d) None of the mentioned
d) Both Indexed with offset and direct
54. In the implementation of a Multiplier circuit in the 59. When generating physical addresses from a logical
system we make use of_______ address the offset is stored in __________
55. A 24 bit address generates an address space of ______ 60. The technique used to store programs larger than the
locations. memory is ____________
a) 1024 a) Overlays
c) 248 c) Buffers
56. If a system is 64 bit machine, then the length of each 61. The transfer of large chunks of data with the
word will be _______ involvement of the processor is done by _______
b) 8 bytes b) Arbitrator
57. The type of memory assignment used in Intel 62. In a system, which has 32 registers the register id is
processors is _____ __________ long.
a) OP-Code
b) Operators
c) Commands
d) Linker
67. The most efficient way of handling parameter passing a) RST 5.5
is by using ______
b) RST 7.5
a) General purpose registers
c) TRAP
b) Stacks
d) Both RST 5.5 and 7.5
c) Memory locations
68. The data structure suitable for scheduling processes a) Polling method
is _______
b) Vectored interrupts
a) List
c) Interrupt nesting
b) Heap
d) None of the mentioned
c) Queue
d) Stack
74. The processor indicates to the devices that it is ready
to receive interrupts ________
69. The process wherein the processor constantly checks a) By enabling the interrupt request line
the status flags is called as ___________
b) By enabling the IRQ bits
a) Polling
c) By activating the interrupt acknowledge line
b) Inspection
d) None of the mentioned
c) Reviewing
d) Echoing
75. _________ method is used to establish priority by 80. facilities provided by the debugger is __________
serially connecting all devices that request an
interrupt. a) Trace points
d) Polling
81. The instructions which can be run only supervisor
mode are?
76. Interrupts initiated by an instruction is called as
_______ a) Non-privileged instructions
d) Software
82. In DMA transfers, the required signals and addresses
are given by the__________
77. If during the execution of an instruction an exception
is raised then__________ a) Processor
c) The processor completes the execution and saves the data and d) The program itself
then handle the exception
a) Trap b) False
b) Interrupt
b) Compiler
b) Logic circuits
c) Shift registers
89. The pipelining process is also called as ______ 94. If the page table is large then it is stored in
__________
a) Superscalar operation
a) Processor
b) Assembly line operation
b) Main memory
c) Von Neumann cycle
c) Disk
d) None of the mentioned
d) Secondary storage
96. When an operand is stored in a register it is _______ 102. The time lost due to the branch instruction is often
referred to as ____________
a) Stored in the lower order bits of the register
a) Latency
b) Stored in the higher order bits of the register
b) Delay
c) Stored in any of the bits at random
c) Branch penalty
d) None of the mentioned
d) None of the mentioned
d) 128 bits
99. The LEA mnemonic is used to__________
a) Load the effective address of an instruction 105. To reduce the number of external connections
required, we make use of______
b) Load the values of operands onto an accumulator
a) De-multiplexer
c) Declare the values as global constants
b) Multiplexer
d) Store the outcome of the operation at a memory location
c) Encoder
d) Decoder
100. SIMD stands for __________
c) Memory latency
101. Any condition that causes a processor to stall is called d) None of the mentioned
as _________
a) Hazard
b) Page fault
c) System error
107. The fastest data access is provided using _______ 112. ______ translates the logical address into a physical
address.
a) Caches
a) MMU
b) DRAM’s
b) Translator
c) SRAM’s
c) Compiler
d) Registers
d) Linker
117. What kind of instructions usually affect the program 122. The NAND gate output will be low if the two inputs
counter? are
118. Which commands are used for addressing the off- 123. The number of control lines for a 8 – to – 1
chip data and associated codes respectively by data multiplexer is
pointer?
(A) 2
a. MOVX & MOVC
(B) 3
b. MOVY & MOVB
(C) 4
c. MOVZ & MOVA
(D) 5
d. MOVC & MOVY
d. 64K
126. Data can be changed from special code to temporal
code by using
(A)COUNTER
(B)DEMULTIPLEXER
(C)MULTIPLEXER
(D) FLIP-FLOP
(A) 1 sec
(B) 1 msec
(C) 1 µsec
(D) 1 nsec.
(A) 4
(B) 3
(C) 5
(D) 1
(A)5 bits.
(B) 12 bits.
(C) 8 bits.
(D) 10 bits.
1. The high-speed memory between the main memory 7. For large data transfers, _________ is used.
and the CPU called?
a) DMA
a) Register Memory
b) programmed I/O
b) Cache Memory
c) controller register
c) Storage Memory
d) none of the mentioned
d) Virtual Memory
c) RAM
4. ………………. memory is implemented using the
semiconductor chips. d) Fast solid state chips in the motherboard
a) Cache
c) RAM
5. Winchester disks are a type of _______ d) Magnetic disk
a) optical disks
c) I/O devices
6. The software substituted for hardware and stored in d) OS
ROM is…………..
a) Synchronous Software
b) Package Software
c) Firmware
d) Middleware
12. The virtual memory bridges the size and speed gap 18. Why did PROM introduced?
between __________ and__________
a) To increase the storage capacity
a) RAM and ROM
b) To increase the address locations
b) RAM and Secondary memory
c) To provide flexibility
c) Processor and RAM
d) To reduce the size
d) None of the mentioned
c) Dynamic RAM must be refreshed, static RAM does not C) disk pack in disk surface
d) SRAM is slower than DRAM
D) All of above
24. The ALU of a computer responds to the commands 29. Mnemonic a memory trick is used in which of the
coming from following language?
A) Primary memory A) Machine language
25. The output quality of a printer is measured by….. 30. An integrated circuit is………….
A) Dot per sq. inch A) A complicated circuit
C) Dots printed per unit time C) Much costlier than a single transistor
26. A physical connection between the microprocessor 31. The difference between memory and storage is that
memory and other parts of the microcomputer is memory is _____ and storage is __
known as………… A) Temporary, permanent
A) Path
B) Permanent, temporary
B) Address bus
C) Slow, fast
C) Route
D) All of above
D) All of the above
C) Register C) Register
34. Which of the following memories allows 39. Which of the following disk is fixed disk?
simultaneous read and write operations? A) Hard Disks
A) ROM
B) Flash Disks
B) RAM
C) Blu-Ray Disks
C) EPROM
D) DVDs
D) None of above
D) None of these
41. Circular division of disks to store and retrieve data
are known as…………
36. The memory which is programmed at the time it is A) tracks
manufactured
A) ROM B) sectors
B) RAM C) cycles
C) PROM D) rings
D) EPROM
42. Which one of the following statements is true?
a) Cache memory is a small amount of memory which is a part of
37. Which of the following memories needs refreshing? the Random-Access Memory
A) SRAM
b) Cache memory is used to temporarily hold instructions and data
B) DRAM that the CPU is likely to reuse
D. OMR
44. Which of the following memory is non-volatile? 49. The process of determining which pixels will provide
a better approximation to the desired line is known
A. SRAM
as____.
B. DRAM
(a) Scan conversion
C. ROM
(b) Randomization
(d) Recreation
45. ROM is needed for storing an initial program called
_______.
50. Rasterization combined with the process of rendering
A. Computer Startup Loader
the picture scan line order is known as _________
B. OS Version
(a) Scan conversion
C. Kernel
(b) Randomization
D. Bootstrap Loader
(c) Recreation
A. PROM
51. Basic methods of projection are _______ and
B. RAM ________ .
47. What technology of memory is Cache RAM usually? (d) None of the above
A. DRAM
C. A kind of graphics
D. A modem standard
53. For a __________graphics device adjacent pixels on 57. _____ is the process of extracting a portion of the
a scan line are likely to have the same characteristics. database, is fundamental to several aspects of
computer graphics.
(a) Random scan
(a) Projection
(b) Raster scan
(b) Clipping
(c) CRT
(c) Rotation
(d) None of the above
(d) Translation
(b) Non-adjective pixels on a scan line are likely to have different (b) Both a and b
characteristics
(c) Hardware
(c) Adjective pixels on a scan line are likely to have the same
(d) None of the above
characteristics
61. The object is displaced a given distance and 65. An optical drive uses the ……. To read data.
direction its original position is called
a. Magnetize particle
(a) Translation
b. Electric particle
(b) Rotation
c. Reflected light
(c) Transformation
d. Refracted light
(d) Scaling
(a) Translation
(b) Rotation
(c) Transformation
(d) Scaling
a. EPROM
b. EEPROM
c. DRAM
d. SRAM
1. The systematic reduction of logic circuits is 6. Total number of inputs in a half adder is __________
accomplished by……….
a) 2
a) Symbolic reduction
b) 3
b) TTL logic
c) 4
c) Using Boolean algebra
d) 1
d) Using a truth table
11. The difference between half adder and full adder is 16. input circuit will have total of ____________
__________
a) 32 entries
a) Half adder has two inputs while full adder has four inputs
b) 128 entries
b) Half adder has one output while full adder has two outputs
c) 256 entries
c) Half adder has two inputs while full adder has three inputs
d) 512 entries
d) All of the Mentioned
d) A OR B OR C
a) 1, 2, 2 b) c = xy+xz
b) 2, 1, 2 c) c = xy+yz
c) 3, 1, 2 d) c = x+y+z
d) 4, 0, 1
d) A register counts data 21. A ripple counter’s speed is limited by the propagation
delay of _____________
a) Each flip-flop
22. A modulus-10 counter must have ________ 28. Canonical form is a unique way of representing
____________
a) 10 flip-flops
a) SOP
b) 4 Flip-flops
b) Minterm
c) 2 flip-flops
c) Boolean Expressions
d) Synchronous clocking
d) POS
34. Which of the following is the Universal Flip-flop? 40. The Gray code for decimal number 6 is equivalent to
35. The characteristic of J-K flip-flop is similar to 41. The 2’s complement of the number 1101101 is
_____________
(A) 0101110
a) S-R flip-flop
(B) 0111110
b) D flip-flop
(C) 0110010
c) T flip-flop
(D) 0010011
d) Gated T flip-flop
36. _______ is used to store data in registers. 42. The code where all successive numbers differ from
their preceding number by single bit is
a) D flip flop
(A)Binary code.
b) JK flip flop
(B) BCD.
c) RS flip flop
(C) Excess – 3.
d) None of the mentioned
(D) Gray.
39. The bit used to store whether the page has been 45. When the set of input data to an even parity
modified or not is called as _______ generator is 0111, the output will be
46. A full adder logic circuit will have 52. All input of NOR as low produces result as
__________
(A)Two inputs and one output.
a) Low
(B)Three inputs and three outputs.
b) Mid
(C)Two inputs and two outputs.
c) High
(D)Three inputs and two outputs
d) Floating
58. Transistor–transistor logic (TTL) is a class of digital 64. The basic latch consists of ___________
circuits built from ____________
a) Two inverters
a) JFET only
b) Two comparators
b) Bipolar junction transistors (BJT)
c) Two amplifiers
c) Resistors
d) Two adders
d) Bipolar junction transistors (BJT) and resistors
d) A • B = B • A
a) Q(n+1) = (S + Q(n))R’ b) J = 1, K = 0
b) Q(n+1) = SR + Q(n)R c) J = 0, K = 1
d) 3 AND gates
63. What is one disadvantage of an S-R flip-flop? 69. State transition happens _______ in every clock cycle.
1. In which year were chips used inside the computer 7. An error in software or hardware is called a bug.
for the first time? What is the alternative computer jargon for it?
A. Leech
a) 1964 B. Squid
b) 1974 C. Slug
c) 1975 D. Glitch
d) 1981
8. Which of the following are loaded in safe mode?
C. Memory files
D. None of the above 9. A distribute database has which of the following
advantage over a centralized database?
C. Virus
D. Macro Virus 10. Which of the following is not a valid variable name?
a. int 31
5. The majority of computer crimes are committed by: B. To allow people to use the computer
C. Overseas criminals
D. Young teenage computer geniuses 12. What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start
a. Collection of items in an application B. The time taken by the processor to write a file into disk
a. Data structure
13. You should choose this mode if you don't know how 19. UNIX operating system is…………
long you won't use your computer but want to have A. Time sharing operating system
the same desktop state when you resume B. Multi-user operating system
A. Shut Down C. Multi-tasking operating system
B. Restart D. All of the above
C. Sleep
D. Hibernate 20. Semantic error occurs due to…………..
a. Incorrect syntax
14. XML makes it easier for…………. b. incorrect logic
a. Human to read web sites c. wrong input
b. Machine to read web sites d. none of them
c. Both of the above
d. Neither of the above 21. The term MIPS refer to……….
a. millions input processor second
15. What is the method of handling deadlocks? b. megabyte of instructions per second
A. Use a protocol to ensure that the system will never enter a c. multiple instructions per second
deadlock state d. millions of instructions per second
B. Allow the system to enter the deadlock state and then recover
C. Pretend that deadlocks never occur in the system
D. All of the Above 22. A= {2, 3, 4}, what is the cardinality of set A?
a. 24
16. UNIVAC is b. 3
A) Universal Automatic Computer c. 2
B) Universal Array Computer d. 9
C) Unique Automatic Computer
D) Unvalued Automatic Computer 23. What is the main difference between a mainframe
and a super computer?
17. The necessary conditions needed before deadlock A) Super computer is much larger than mainframe computers
can occur? B) Super computers are much smaller than mainframe computers
A. No Mutual Exclusion, Hold and wait, Preemption, Circular C) Supercomputers are focused to execute few programs as fast as
Wait possible while mainframe uses its power to execute as many
B. Mutual Exclusion, No Hold and wait, Preemption, Circular programs concurrently
Wait D) Supercomputers are focused to execute as many programs as
C. Mutual Exclusion, Hold and wait, No Preemption, Circular possible while mainframe uses its power to execute few programs
Wait as fast as possible.
D. Mutual Exclusion, Hold and wait, Preemption, No Circular
Wait 24. Metadata means?
a. Data that describes other data
18. Which is the best way of protecting data from loss? b. unused data
a. Make regular backup of the data c. data used as metaphor
b. Delete all files d. frequently accessed data
c. Lock your computer
d. Change your password 25. Which one makes data access from database faster?
a. Traversing
b. Searching
c. Indexing
d. Partitioning
26. The brain of any computer system is 33. Which of the following does not support more than
A) ALU one program at a time?
B) Memory a. DOS
C) CPU b. Linux
D) Control unit c. Windows
d. Unix
27. Which of the following does the interface between a
process and the operating system? 34. Creating a new class using one or more existing
a. Procedure call classes is known as-----------------?
b. system call a. Polymorphism
c. function optic b. Encapsulation
d. None c. Overloading
d. Inheritance
28. Which technic is Preferable for huge data transfer
between I/O and memory? 35. The automatic execution of some SQL statements
a. Memory Mapped I/O can be started automatically due to any change to a
b. Isolated I/O database relation can be caused by
c. Interrupt I/O a. View
d. DMA b. None
c. Assertion
29. Chief component of first generation computer was d. Trigger
A) Transistors
B) Vacuum Tubes and Valves 36. A high quality CAD system uses the following for
C) Integrated Circuits printing drawing and graphs
D) None of above A) Dot matrix printer
B) Digital plotter
30. Which of the following terms does not describe a C) Line printer
type of flash drive? D) All of the above
a. hard drive
b. pen drive 37. What is interframe gap?
c. jump drive a) idle time between frames
d. thumb drive b) idle time between frame bits
c) idle time between packets
31. What type of RAM is often used for system d) none of the mentioned
memory?
a. SRAM 38. The decimal number -34 is expressed in 2’s
b. PRAM complement form as:
c. SDRAM a. 10000110
d. VRAM b. 11011001
c. 11011110
32. Which computer was considered the first electronic d. 11011100
computer until 1973 when court invalidated the
patent? 39. The digital computer was developed primarily in
A) ENIAC A) USSR
B) MARK I B) Japan
C) Z3 C) USA
D) ABC D) UK
40. The amount of time a program takes from when a 47. If you want your conditional to depend on two
request was submitted until the first result is conditions both being true, what is the proper
processed. notation to put between the two Boolean statements?
a. Waiting time (a) ||
b. Response time (b) &
c. Turnaround time (c) |
d. Through round time (d) &&
41. Which is used for manufacturing chips? 48. The first machine to successfully perform a long
A) Bus series of arithmetic and logical operations was…….
B) Control unit A) ENIAC
C) Semiconductors B) Mark-I
D) A and b only C) Analytic Engine
D) UNIVAC-1
42. Who preside the interface between a process and the
OS? 49. Which one is the largest space?
(a) Kernel A) kilobyte
(b) System Calls B) petabyte
(c) API C) terabyte
(d) Processor D) gigabyte
44. When was the world’s first laptop computer 51. Analog computer works on the supply of
introduced in the market and by whom? A) Continuous electrical pulses
A) Hewlett-Packard, 1980 B) Electrical pulses but not continuous
B) Epson, 1981 C) Magnetic strength
C) Laplink Traveling Software Inc, 1982 D) None of the above
D) Tandy Model-200, 1985
52. The personal computer industry was started by
45. The degree of detail that should be incorporated into A) IBM
a database depends on what? B) Apple
(a) Data integrity C) Compaq
(b) The type of database D) HCL
(c) The user's perspective
(d) The business practices and policies 53. Which number system is usually followed in a
typical 32-bit computer?
46. Before a package can be used in a java program it A) Binary
must be___. B) Decimal
(a) executed C) Hexadecimal
(b) referenced D) Octal
(c) imported
(d) declared
68. The first microprocessor built by the Intel 75. Cursor is a ____
corporation was called A) Pixel
A) 8008 B) Thin blinking line
B) 8080 C) Pointing device
C) 4004 D) None of these
D) 8800
76. Which of the following are the two main components
69. Who invented the microprocessor? of the CPU?
A) Marcian E Huff A) Control Unit and Registers
B) Herman H Goldstein B) Registers and Main Memory
C) Joseph Jacquard C) Control unit and ALU
D) All of above D) ALU and bus
70. Which of the following does not affect the resolution 77. Which of the following statement about directories
of a video display image? is false?
A) Bandwidth A. Directories can exist inside directories
B) Raster scan rage B. The root directory is always at the highest level
C) Vertical and horizontal lines of resolution C. Directories cannot be renamed
D) Screen size D. Directories can be deleted
71. The number of records contained within a block of 78. In which language is source program written?
data on magnetic tape is defined by the A) English
A) Block definition B) Symbolic
B) Record contain clause C) High level
C) Blocking factor D) Temporary
D) Record per block
79. Copying a process from memory to disk to allow
72. What hole will allocates in "Worst-Fit" algorithm of space for other processes is called
memory management? A. Swapping
A. It allocates the smaller hole than required memory hole B. Deadlock
B. It allocates the smallest hole from the available memory holes C. Demand Paging
C. It allocates the largest hole from the available memory holes D. Page Fault
D. It allocates the exact same size memory hole
80. The computer that process both analog and digital is
73. Which of the following are the cheapest memory called
devices in terms of Cost/Bit? A) Analog computer
A) Semiconductor memories B) Digital computer
B) Magnetic Disks C) Hybrid computer
C) Compact Disks D) Mainframe computer
D) Magnetic Tapes
81. The memory resident portion of operating system is
74. Which of the following is the allocation method of a called the
disk space? A. Registry
A. Contiguous allocation B. API
B. Linked allocation C. CMOS
C. Indexed allocation D. Kernel
D. All of the Above
82. What was the name of the first commercially 88. Java Virtual Machine
available microprocessor chip?
A) Intel 308 a) Acts as a full-fledged hypervisor
B) Intel 33 b) Converts byte codes to Operating System dependent code
C) Intel 4004 c) Is known as the Compiler of Java programming language
D) Motorola 639 d) Manages system memory and provides a portable execution
environment for Java-based applications
83. Which of the following class of computers can not
support multiple users simultaneously? 89. Which one of the following is a No-SQL Database?
A) Mainframe Computer
B) Mini Computers a) MongoDB
C) Micro Computers b) CasperDB
D) All of them can support c) ZBase
d) All of the above
84. Which of the following devices can be used to
directly image printed text?
A) OCR 90. Which of the following statements is false?
B) OMR
C) MICR a) 64-bit processor is more capable than a 32-bit processor because
D) All of above it can handle more data at once
b) A Computer works with Hexa Decimal number System
c) A 32-bit system can access 232 memory addresses
85. Which one of the following is false with respect to d) None of the above statements is false
4G and 5G cellular network?
91. Which one of the following statements is true with
a) 5G supports faster bandwidth compared to 4G. respect to a Database Management System?
b) Latency in 4G networks is much higher than 5G network
c) 4G uses a narrow slice of the available spectrum from 600 MHz a) Super key and candidate keys are similar
to 2.5 GHz b) Candidate Keys and Unique Keys are similar
d) There will be data session handoff feature in 5G network which c) Unique Keys and Primary keys are similar
is not available in 4G network d) Candidate Keys and Primary Keys are similar
86. Finding useful pattern from the data in a database is 92. The Average-case Time Complexity of the binary
known as search algorithm is
87. .NET can be used in the following 93. An Ethernet LAN using the OSPF protocol with five
attached routers can be called a ------- network.
a) Development of Desktop Applications
b) Development of Micro services and containers a) Point-to-point
c) Development of Cloud Applications b) Stub
d) All of the above statements are true c) Transient
d) Virtual
94. The term LPDDR means 100. Which is the type of white box testing:
a. Path Testing
a) Low-Power Discrete Data Rate. b. Loop Testing
b) Low-processing Double Data Rate c. Domain Testing.
e) Low-Programmable Double Data Rate d. All of these
d) Low-Power Double Data Rate
101. The person who ensures that systems are developed
95. Which of the following neural networks uses on time, within budget, and with acceptable quality
supervised learning? is a
a. systems designer
(a) Multilayer perceptron b. project manager
(b) Self organizing feature map c. systems owner
(c) Hopfield network d. external system user
(d) Singlelayer Perceptron
102. A task of developing a technical blueprint and
96. In software development, value adjustment factors specifications for a solution that fulfills the business
include the following among others: requirements is undertaken in the following phase of
the system development process
a) the criticality of the performance and reusability of the code. a. system initiation
b) number of lines of code in the software. b. system implementation
c) number of technical manpower and hardware costs. c. system analysis
d) time period available and the level of user friendliness. d. system design
97. Which of the following Process scheduling algorithm 103. If a university sets up a web-based information
is highly improbable to be implemented? system that faculty could access to record student
grades and to advise students, that would be an
a) FCFS Scheduling example of a/an
b) Priority Scheduling a. CRM
c) Shortest Job First Scheduling b. intranet
d) None of the above c. ERP
d. Extranet
98. How many core/threads does the Intel Core i7-
9700K processor have? 104. To improve the performance of a business process,
which of the following is most relevant?
a) 6/12 a. Input.
b) 4/8 b. Processing.
c) 8/8 c. Control and feedback
d) 8/16 d. Output.
99. Assuming the existence of a start and end nodes for 105. The majority of publicly available Internet
a program graph (PG), the total number of Paths is information sources are:
equivalent to------------. set of fest data required to a. created in XML.
test software, b. structured information.
a) Minimum c. normal information.
b) Maximum d. unstructured information.
c) Optimum
d) Supreme
106. A web blueprint depicts: 113. Which of the following is(are) an input process
a. the layout of an individual web page method(s)?
b. the layout of the home page a. smart card
c. the layout of an index page b. biometric
d. the layout of a website c. optical mark
d. all of the above
107. UML depicts information systems as a collection of: 114. A form used to record data about a transaction is
a. Entities a(n)
b. Processes a. batch document
c. Data b. source document
d. Objects c. on-line document
d. data entry document
108. Which of the following relates to enterprise
interoperability? 115. Fifth generation computers are based on
a. DFD A. Artificial Intelligence
b. Information flow diagram B. Programming Intelligence
c. XML C. System Knowledge C. System Knowledge
d. Entity relationship diagram D. VVLSI
109. Which of the following is part of a static view of 116. Time during which a job is processed by the
information? computer is:
a. Logical data model A. Execution Time
b. Meta data B. Delay Time
c. Data flow model C. Real Time
d. Information process model D. Waiting Time
110. Open database connectivity (OBDC) tools are an 117. Which of the following circuit is used as a 'Memory
example of: device' in computers?
a. layerware A. Rectifier
b. tool kit B. Flip Flop
c. interfaceware C. Comparator
d. middleware D. Attenuator
111. All of the following are phases of systems analysis, 118. Operating System is the most common type of
except _________ software.
a. decision analysis phase A. Communication
b. requirements analysis phase B. Application
c. design analysis phase C. System
d. problem analysis phase D. Word Processing Software
112. A property or quality the system must have is called 119. Super computers are mainly useful for
a……………. A. Mathematical intensive scientific applications
a. scope B. Data-retrieval operations
b. functional requirement C. Input-output intensive processing
c. preliminary requirement D. All of the above
d. nonfunctional requirement
120. Which of the following is the product of data 127. Which of the following would most likely NOT be a
processing? symptom of a virus?
A. Information A. Existing program files and icons disappear.
B. Data B. The CD-ROM stops functioning.
C. Software Program C. The Web browser opens to an unusual home page.
D. System D. Odd messages or images are displayed on the screen.
121. Where is computer's BIOS stored? 128. By default, your documents print in ..........mode
A. DRAM A. Page setup
B. Flash B. Portrait
C. SRAM C. Landscape
D. EEPROM D. Print preview
122. Which company is not a microprocessor 129. Chip is a common nickname for ………….?
manufacturer? A. Transistor
A. IBM B. Resistor
B. AMD (Advanced Micro Devices) C. Integrated Circuit
C. Microsoft D. Semiconductor
D. Intel
130. Which of the following is not an manufacturer of
123. Basic Building Blocks for a Digital Circuit is ______ Hard Disk drives?
A. CMOS A. Samsung
B. Logic Gate B. Intel
C. BIOS C. Seagate
D. DMOS D. Western Digital
124. The most important or powerful computer in a 131. The main purpose of a primary key in a database
typical network is _____ table is………
A. Desktop a. updating
B. Network client b. deleting
C. Network server c. modifying
D. Network station d. searching
125. When sending an e-mail, the _____ line describes the 132. A result of a computer virus can not lead to......
contents of the message. A. Disk Crash
A. To B. Mother Board Crash
B. Subject C. Corruption of program
C. Contents D. Deletion of files
D. CC
133. What is the function of Recycle Bin?
126. Personal logs or journal entries posted on the Web A. Store deleted file
are known as: B. Store temporary file
A. Listservs C. Store corrupted file
B. Webcasts D. Store Document file
C. Blogs
D. Subject Directories
134. Concurrent access to share data may result in 141. Which of these is the first web-based e-mail service?
data………… A. Gmail
a. recovery B. Yahoo Mail
b. inconsistency C. Hotmail
c. repository D. Rediff Mail
d. consistency
142. Protocols are…………..
135. A computer assisted method for the recording and A. Sets of rules
analyzing of existing hypothetical systems is known B. Sets of maps
as……… C. Sets of computers
A. Distributed processing D. Sets of product
B. Data transmission
C. Data link 143. Hyper-threading (HT) is related to-
D. Data flow A. Processor
B. RAM
136. Which provides the fastest access to large video C. Mother board
files? D. Hard Disk
a. SCSI hard drives
b. IDE hard drives 144. Datagram is related with ……………… service and
c. EIDE hard drives virtual circuit is related to………………..service.
d. Optical drives a. both are connectionless
b. Connectionless and connection oriented.
137. Logical design of database is called…. c. connection oriented and connectionless
a. Database schema d. None
b. All of them
c. Database Instance 145. Computers ability to use disk storage as memory is
d. Database snapshot called
a. Cashe memory
138. In a network, the computer that stores the files and b. Associative memory
process the data is named as c. Virtual memory
A. Server d. CMOS memory
B. Terminal
C. Modem
D. All of these
146. Which type of ROM is used in pen drives? EEPROM 172. Bluetooth operations use ……………….
147. In data communication which device converts digital Technology? Radio
data to analog signal? MODEM 173. Bluetooth is the popular name for the ………………..
148. Which one can be both as input and output device? wireless networking standard? 802.11
Touch Screen 174. If a computer on the network shares resources for
149. Which unit is known as nerve center of computer? others to use it is called ………..? Server
ALU 175. The process of loading the operating system in the
150. The word length of a computer is measured in? Bits memory is known as ………? Booting
151. The process of identifying and correcting mistakes in 176. …………………. is the machine readable form of a
a computer program is referred to as? Debugging program? Object code
152. Which computer memory is never erased? ROM 177. Which utility program could improve the speed of
153. ……………… is Permanent memory of a computer? disk? Defragmentation
ROM 178. ……………….. works first when you start your
154. When you start your computer than which computer? Processor
component works first? BIOS 179. ……………….. is not a part of motherboard? Power
155. One nibble means? 4 bits Supply
156. The file system ‘NTFS’ stands for? New Technology 180. ………………. Scanner is used in Banking? MICR
File System 181. …………………. Is the function of RAM in
157. Bridge works in which layer of OSI model? Data computer? Storing data temporarily
Link Layer 182. In ……………. Mode windows starts with only the
158. The last address of IP address represents? Broadcast core drivers and services? Safe
Address 183. …………………………….. is the primary job of the
159. CD ROM is ……………….? Optical Memory operating systems of a computer? Managing
160. The function of Gateway is to connect to……………. Resources
network? Dissimilar 184. How many keys are available in the numerical
161. Flash memory is ……………….? Non-Volatile keypad of a standard keyboard? 17
162. Most frequently used instructions are kept in? Cache 185. The common keyboard arrangement is called the
Memory ………….. layout? QWERTY
163. A computer connected with server is called? Work 186. Which of the following converts scanned text into
Station editable text? OCR
164. …………….. is the most common type of storage 187. The term ‘Dot Per Inch’ (DPI) refers to
device? Magnetic device ……………………? Resolution
165. …………….. permanently stores information 188. Which printer usually not used in official work? Line
without program? PROM chips printer
166. …………….. memory needs refresh? DRAM 189. Leaser full form ……………… ? Light Amplification
167. Computer can understand and execute …………… by Stimulated Emission of Radiation
Language? Machine 190. Leaser printers are known as ………………. ? Page
168. The local antenna for satellite connection is called? printers
VSAT 191. Which one works as an output and input device?
169. A destination for data going outside the system is Modem
called? Sink 192. Which of the following is an example of optical
170. A hard disk is divided into tracks which are storage device? CD ROM
subdivided into ………….. ? Sectors 193. Pen drive takes the place of ………………… ? Floppy
171. ………………. is a small piece of text stored on Disk
computer, phone or wherever you use to surf 194. The most frequently used instructions are kept in
internet? Cookie the………………? Cache Memory.
195. In binary number system each bit represents a 220. What is the unit of measurement for drive access
………….? Signal time? Milliseconds
196. Which of the following private banks of Bangladesh 221. The smallest unit of information is ………………?
introduced mobile banking first? Dutch Bangla Bank Bit
Ltd. 222. An electrical pathway within a computer is called
197. bKash is an example of …………… ? Mobile ……………… ? Bus
Banking 223. When you boot a computer you are ………………….
198. Which protocol assigns IP address to the client ? Loading the operating system.
connected in the Internet? DHCP 224. Process of combining string is known as…………….?
199. Internet works on……………….? Packet Switching Concatenation
200. Every WEB page has a unique address called 225. Collecting personal information and effectively
………………….. ? Uniform Resource Locator posing as another individual is known as the crime of
201. Which one of the following enables the mobile devices ………………..? Identity theft
to access internet resources? WAP 226. The common name for the crime of stealing password
202. What is ‘Cookie’ ? Internet Information File is……………….? Spoofing
203. When was @ chosen for its use in e-mail addresses? 227. The thing that eventually terminates a worm virus is
1972 a lack of………………… ? memory/disk space
204. Which is the first program of Microsoft? MS DOS 228. What is the name of an application program that
205. Which one is the social networking site developed by gathers user information and sends it to someone
Google? Google Plus through the internet? Spybot
206. Windows media player is an example of …………..? 229. Software program that close potential security
Application Software breaches in an operating system is known
207. VSAT full form is ………..? Very Small Apparatus as…………..? Security patches
Terminal 230. When customers of a website are unable to access it
208. Trojan Horse is a …………? Virus due to a bombardment of fake traffic is known
209. Which of the following is the most commonly used as………………? Denial of service attack
HTTP methods? GET and POST 231. The scrambling of code is known
210. Which of the following refers to the correctness and as…………………….? Encryption
completeness of the data in a database? Data 232. If you want to secure a message use…………………
Integrity ? Cryptosystem
211. Which memory allocation policy allocates the largest 233. When data is entered into a memory location it
hole to the process? Worst-Fit ……………….? Erases the previous content
212. Portable program means ……………? Independent 234. The ALU of a computer responds to the command
Platform coming from……………..? control section
213. How do the main components of the computer 235. Which key on a keyboard of a computer does not
communicate with each other? System bus have its name printed on the key? SPACE
214. When a computer is first turn on or restarted a 236. Where would you find a magnetic strip? Credit card
special type of absolute loader is executed called 237. Magnetic tape is a …………………… ? Serial access
……………? Bootstrapped Loader medium
215. Which class of IP address has the most host addresses 238. What program runs first after computer is booted
available by default? Class A and loading GIU? Authentication
216. The ASCII code of A is……………? 65 239. The Bankers algorithm is used to ………………….. ?
217. In most applications F1 stands for………….? Help prevent deadlock
218. In a flow chart a diamond generally stands for 240. A page fault occurs when ……………. ? the page is
……………. ? Decision not found in the memory
219. What is the standard storage capacity of a CD ROM
disk? 700 MB
241. …………………….. is a compromise mode between 260. High entropy means that the partitions in
shut down and sleep mode because it does not classification are …………..? Not pure
consume power and remembers the current state of 261. All data is labelled and the algorithm learn to predict
your desktop? Hibernate the output from the input data is …………………?
242. The problem with …………………. File is that they Supervised Learning.
slow your computers operation? Fragmented 262. The term machine learning is coined by
243. The chunks of a memory are known as ……………….? Arthur Samuel
……………………. ? Frame 263. …………………. Data used to build a data mining
244. ………………….. used to operate the mobile phone? model? Training
Embedded OS
245. When you cut or copy the text or picture it stores
temporarily in …………………. ? Clipboard
246. First in First out (FIFO) scheduling is
……………………..? Non Preemptive Scheduling
247. Voice/video is a network is …………….............
traffic? Real time
248. Which method do we use to find the best fit line for
data in Linear Regression?Least square error
249. Linear regression errors values has to be normally
distributed but in case of Logistic Regression it is not
the case? True.
250. Which of the following is true about residuals? Lower
is better
251. Which of the following method do we use to best fit
the data in Logistic Regression? Maximum
Likelihood
252. Regression Trees are often used to model …………..
data? Non-Linear
253. Simple regression assumes a ……………….
Relationship between the input attribute and output
attribute? Linear
254. The average squared difference between classifier
predicted output and actual output? Mean squared
error.
255. Which language is best for machine learning? Python
256. Overfitting is a type of modelling error which results
in the failure to predict future observations
effectively or fit additional data in the existing model?
True
257. …………….. is a part of machine learning that works
with neural networks? Deep Learning.
258. A nearest neighbor approach is best used
when……………? Irrelevant attributes have been
removed from the data
259. Supervised learning differs from unsupervised
clustering in that supervised learning requires
…………………? Input attributes to be categorical.
Miscellaneous
1. If the probability of sending successful data packet 6. What is the following is the subset of {b c d}?
is 80%, what will be the probability of successful
delivery if a packet is sent twice? a. { }
a. 64% b. {n}
b. 96% c. {1, 2, 3}
c. 100% d. {a, b, c}
d. 80%
7. The perpendicular of the line 2x+3y=4 is
d. None
8. Arithmetic and geometric mean of X and Y will be
the same if
d. Nephew
9. _________ refers to the weakness in the security
system.
d. 2x+3y=0
a. Probability A. Decryption
b. Honesty B. Cryptanalysis
c. Peaceful C. Cryptosystem
d. Carelessness D. Encryption
11. One of the major drawbacks of symmetric system is 17. Unsupervised learning is an example of………..
_____.
a. Classification and prediction
A. Key Distribution
b. Classification and Regression
B. Key Diffusion
c. clustering
C. Key Confusion
d. Data Mining
D. Key Construction
14. The security services that IPSec provide requires 20. Unit testing is to test the ____ of the units.
shared keys to perform___________.
a. Performance
A. Privacy
b. System issues
B. Reliability
c. Functionality
C. Authentication
d. Hardware failure
D. Security
A. Hash A) Cost
B. NULL B) Risks
C. Encryption C) Time
D. Decryption D) Quality
23. Which of the following is not an object-oriented 39. Which device can forward data packet from one
programming language? Ans: Pascal network to another network? Ans: Router
24. Which of the following is a possible IP address 40. “BAUD” means …………….? Ans: The rate at
in a network with IP address 172.16.10.5 and which the signal changes
subnet mask 255.255.248.0? Ans: 172.16.8.0 41. Who invented OOP? Alan Kay
25. What is the inner most part of optical fiber? Ans: 42. Which was the first purely object oriented
Core programming language developed? SmallTalk
26. To correctly send binary data from one computer 43. Which feature of OOP indicates code
to another, which type of redundant bits are reusability? Inheritance
27. added? Ans: Parity bit 44. The feature by which one object can interact
28. Which device support circuit switching? Ans: with another object is _____________ Message
Switch Passing
29. For providing connection between networks 45. What is an abstraction in object-oriented
which of the following sends data from one programming? Hiding the implementation and
30. network protocol by translating it to other showing only the features
network protocol so that data can be transmitted 46. What happens when an object is passed by
between these dissimilar networks? Ans: reference? Destructor is not called
Gateway 47. Which access specifier is usually used for data
31. If the screen resolution is 1024x768, then what members of a class? Private
would be the aspect ratio? Ans: 4:3 48. Which feature of OOP reduces the use of nested
32. A physical connection between the classes? Inheritance
microprocessor memory and other parts of the 49. Which keyword among the following can be
microcomputer is known as? Ans: address bus used to declare an array of objects in java? new
33. Data in the form of continuous flow is known 50. Single level inheritance supports
as? Ans: analog data _____________ inheritance? runtime
34. Which of the following processors use RISC 51. How to overcome diamond problem? Using
technology? Ans: 486dx virtual keyword with same name function
35. IPv6 is ……….. addressing. Ans: 16 bytes 52. What happens if non static members are used in
(16*8=128 bits) static member function? Compile time error
36. CSA stands for……………….? Ans: Cloud 53. Where is the memory allocated for the objects?
service Alliance Ram
37. Sending signals to the all ports means 54. Encapsulation and abstraction differ as
………….. ? Ans: broadcast ____________Binding and Hiding respectively
38. In general a monitor with refresh rate of 55. Which feature of OOP is exhibited by the
…………… should not cause eyestrain. Ans: 72 function overriding? Polymorphism
Hz or higher 56. How to access the private member function of a
class? Using address of member function
57. Which is correct syntax for declaring pointer to 72. The bit used to signify that the cache location is
object? className* objectName; updated is ________ Dirty bit
58. Object being passed to a copy constructor 73. Software is defined as ___________set of
___________Must be passed by reference programs, documentation & configuration of
59. Instance of which type of class can’t be created? data
Abstract class 74. CASE stands for……………..Computer-Aided
60. Which feature in OOP is used to allocate Software Engineering
additional functions to a predefined operator in 75. ________ is defined as the process of generating
any language? Operator Overloading analysis and designing documents? Reverse
61. Which of the following is a type of architecture engineering
used in the computers nowadays? Von-Neumann 76. Attributes of good software is ____________
Architecture Maintainability & functionality
62. Which of the architecture is power efficient? 77. Who proposed the spiral model? Barry Boehm
RISC 78. __________ is not suitable for accommodating
63. What does CSA stands for? Computer Speed any change? Waterfall Model
Addition 79. Software Debugging is known as
64. If an exception is raised and the succeeding _________________ finding and correcting
instructions are executed completely, then the errors in the program code
processor is said to have ______ Imprecise 80. To access the services of the operating system,
exceptions the interface is provided by the ___________
65. The IA-32 system follows which of the System calls
following design? CISC 81. CPU scheduling is the basis of
66. The VLIW architecture follows _____ approach ___________multiprogramming operating
to achieve parallelism. MIMD systems
67. What does VLIW stands for? Very Long 82. If a process fails, most operating system write
Instruction Word the error information to a ______log file
68. In CISC architecture most of the complex 83. What does OS X has? hybrid kernel
instructions are stored in _____ CISC 84. In a timeshare operating system, when the time
69. Both the CISC and RISC architectures have been slot assigned to a process is completed, the
developed to reduce the ______ Semantic gap process switches from the current state to? Ready
70. The reason for the cells to lose their state over state
time is ________ Usage of capacitors to store the 85. When a process is in a “Blocked” state waiting
charge for some I/O service. When the service is
71. The memory devices which are similar to completed, it goes to the __________Ready state
EEPROM but differ in the cost effectiveness is 86. A deadlock avoidance algorithm dynamically
______ Flash memory examines the __________ to ensure that a
circular wait condition can never exist? resource memory. Which of the following helps in
allocation state achieving this goal? Buffer
87. For real time operating systems, interrupt latency 101. Who is responsible for the creation of the symbol
should be ____________minimal table? Compiler
88. The priority of a process will ______________ if 102. Characters are grouped into tokens in which of
the scheduler assigns it a static priority. remain the following phase of the compiler design?
unchanged Lexical analyzer
89. On systems where there are multiple operating 103. Bitmap is a collection of ____________ that
system, the decision to load a particular one is describes an image. Pixels
done by _____________boot loader 104. Among the following process, which process is
90. Which of the following architecture is followed known as the elimination of parts of a scene
by general-purpose microprocessors? Von outside a window or a viewport? Clipping
Neumann architecture 105. Which of the following is the process of
91. Which memory storage is widely used in PCs digitizing a given picture definition into a set of
and Embedded Systems? DRAM pixel-intensity for storage in the frame buffer?
92. Which type of memory is suitable for low Scan conversion
volume production of embedded systems? Non- 106. Which of the following is commonly known as
volatile frame buffer on a black and white system with
93. Which of the following unit protects the one bit per pixel? Bitmap
memory? memory management unit 107. Which of the following algorithm is a faster
94. Which of the architecture is more complex? method for calculating pixel positions? DDA line
SPARC algorithm
95. Which one of the following offers CPUs as 108. ‘Skala’ is an example of which of the following
integrated memory or peripheral interfaces? type of clipping? line clipping
Microcontroller 109. The Unix shell is both _______ and _______
96. What is information about data called? Meta data language. scripting, interpreter
97. The ability to query data, as well as insert, 110. Which part of the Unix operating system
delete, and alter tuples, is offered by interacts with the hardware? Kernel
____________ DML (Data Manipulation 111. Which of the following is the first and foremost
Language step in Image Processing? Image acquisition
98. ______________ is a set of one or more 112. Caesar Cipher is an example of? Mono-
attributes taken collectively to uniquely identify alphabetic Cipher
a record. Super key 113. Which layer is used for wireless connection in
99. Procedural language among the following is IoT devices? Data link layer
__________ Relational algebra 114. Which of the following is used to capture data
100. A major goal of the db system is to minimize the from the physical world in IoT devices? Sensors
number of block transfers between the disk and
English Part
Synonyms
Word Synonym-1 Synonym-2 Synonym-3 Synonym-4
Amazing Incredible Unbelievable Improbable Astonishing
Anger Enrage Infuriate Arouse Nettle
Angry Wrathful Furious Enraged Indignant
Answer Reply Respond Retort Acknowledge
Ask Question Inquire Query Interrogate
Awful Dreadful Terrible Abominable Unpleasant
Bad Depraved Rotten Contaminated Sinful
Beautiful Gorgeous Dazzling Splendid Magnificent
Begin Start Open Launch Initiate
Big Enormous Huge Immense Gigantic
Brave Courageous Fearless Dauntless Intrepid
Break Fracture Wreck Crash Demolish
Bright Sparkling Shimmering Radiant Vivid
Calm Quiet Peaceful Unruffled Tranquil
Come Approach Advance Near Arrive
Cool Chilly Cold Frosty Frigid
Crooked Bent Twisted Zigzag Hooked
Cry Weep Wail Sob Bawl
Cut Slice Carve Cleave Slit
Dangerous Perilous Hazardous Risky Uncertain
Dark Shadowy Unlit Murky Gloomy
Decide Determine Settle Choose Resolve
Definite Certain Sure Positive Determined
Delicious Savory Delectable Appetizing Luscious
Describe Portray Characterize Picture Narrate
Destroy Ruin Demolish Raze Slay
Difference Disagreement Inequity Contrast Dissimilarity
Do Execute Enact Carry Out Finish
Dull Unimaginative Lifeless Tedious Tiresome
Eager Keen Fervent Enthusiastic Involved
End Stop Finish Terminate Conclude
Enjoy Appreciate Delight In Be Pleased Indulge In
Explain Elaborate Clarify Define Interpret
Reference: https://www.hitbullseye.com/Vocab/List-of-Synonyms.php
Reference: https://leverageedu.com/blog/synonyms-list/
Goliath A person or thing that is very large or Giant, titan, whopper, colossus
powerful (
Ferment A state of political or social excitement and Tumult, uproar, mayhem, furore
confusion
Mangled Destroy or severely damaged by tearing or Mutilated, lacerated maimed, marred
crushing
Febrile Nervous/excited/ Showing fever Tense, edgy, fidgety, feverish, flushed, jittery
Connote To suggest a feeling, an idea, etc Recommend, indicate, signify, denote
Serpentine Winding and twisting like a snake Winding, zigzag, meandering, twisting
Heyday The period of a person’s or thing’s greatest Prime, zenith, acme, salad days
success
Fret Anxious/nervous Worry, agonize, bother, distress
Inkling A slight knowledge or suspicion Clue, hunch, glimmering
Dangerous Something which is likely to cause injury or Perilous
damage
Dark With no light or very little light Shadowy
Decide To think about two or more possibilities and Determine
choose one of them
Definite Having certain or distinct limits a definite Certain
period of time
Delicious Having a very pleasant taste or smell Savory
Describe To say what somebody/something is like, or Portray
what happened
Dull Not interesting or exciting; boring Unimaginative
Eager Strongly wanting to do or have something. Keen
Explain To make something clear or easy to Elaborate
understand
Fair Appropriate and acceptable in a particular Just
situation
Fat Weighing too much; covered with too much Stout
flesh
Fear The feeling that you have when something Fright
dangerous, painful or frightening might
happen
Fly To move through the air Soar
Great Large in amount, degree, size, etc.; a lot of Noteworthy
Gross Being the total amount before anything is Improper
taken away
Hate To have a very strong feeling of not liking Despise
somebody/something at all
24. Miserly people are incapable of trusting life and 45. I could not prevail ___________ him. (upon)
that’s why life does not open its treasures ….. 46. She dwells to much ________ her past. (upon)
them. (to) 47. I could hardly hear the song …. the music in the
25. He is _______ the phone right now. (on) background. (above)
26. His father is angry __________ his behavior. (at) 48. My friend stood _______ me during my
27. There are so many people of Indian origin settled misfortune. (by)
….. the globe, from different professions. 49. Everyone has to be at work ________ seven. (by)
(across) 50. The standard of your work is well ….. the
28. Fluctuations in business fortunes is another average of your class. (below)
reason for companies going in …. a floating 51. I like this tree _____ the river. (by)
workforce. (for) 52. He is blind _________ one eye. (of)
29. She hopes to be a teacher but her real talent lies 53. He is thoroughly conversant ____________ the
in wielding the brush …. aplomb. (with) situation. (with)
30. You should devote your time ________ studies. 54. I agree ________ your proposal. (to)
(to) 55. The police was informed ________ the matter.
31. Today, the youth are so self centered, they are not (of)
bothered ….. the poverty around them. (about) 56. She persists _________ wearing that old
32. There has been a large accession of books …. the fashioned ornament.
library. (to) 57. His dead body was found ….. the debris caused
33. My wife always grumbles ________ her bad by earthquake. (beneath)
luck. (at) 58. There are so many mistakes in these books,
34. We searched _______ happiness in vain. (for) sometimes I feel like trying my hand ….. it. (at)
35. Literature cannot close its eyes ….. the ambient 59. The plan will be sanctioned ________ a fortnight.
society. (upon) (within)
36. His habit of interfering made him extremely 60. We never know life ….. we have borne its trials
unpopular ….. his colleagues. (at) and hardships. (until)
37. We cannot comply _______ your request. (with) 61. You may surprised ________ the news. (at)
38. It is difficult for an over scrupulous person to live 62. A gentleman should be true to his words.
….. coarse people. (amongst) 63. I beg pardon of you for being late.
39. After the earthquake, the whole city appeared to 64. Eventually, I pursued it her to comply with my
be …. a shambles. (in) requests.
40. There is no exception ________ this rule. (to) 65. The Village was plunged into Darkness due to a
41. …… circumstances compelled him, the lazy sudden power failure.
refused to work for his living. (until) 66. His statement is very much similar to mine.
42. A shocked nation was trying to come to terms 67. Beware of backbiters.
….. the sudden death of the Prime Minister. 68. He has been living in this house since 1985.
(with) 69. The dog ran down the street.
43. He never deviated …. his commitment to serve 70. Turn the lights off before you go to bed.
the people of Bangladesh with exceptional 71. He will be cured of this disease at the earliest.
devotion. (in) 72. I have no desire for fame.
44. Driving ….. the sun, we had to shade our eyes. 73. The mother was concerned about the safety of a
(into) child.
74. Competitors around the globe, took part in the 86. After an inquiry, he was relieved of his post.
game. 87. He cannot cope with the pressure.
75. He took the man to hospital. 88. We do not go for work on Sunday.
76. There was a queue of people in the rain patiently 89. He is very good at making stories.
waiting to get onto the coach. 90. He has been absent for a fortnight.
77. The minister had promised to look into the 91. He is jealous of me.
matter. 92. He comes of a noble family.
78. The dwell among the wicked is bad. 93. Sheila gained an advantage over me.
79. His house is adjacent to mine. 94. He held his breath for several minutes.
80. She is suffering from fever. 95. He has some respite from suffering.
81. The shopkeeper deals in household goods. 96. I am sick of the whole business.
82. The room has been empty for several years. 97. The store house was infested with rats.
83. Place a ladder against the wall. 98. He tried to prevent me from doing my duty.
84. A crime is charged against him. 99. Did you watch the football on TV last night?
85. He was involved in a crime.
References:
https://www.frogview.com/preposition-exercise/
https://tripuraexam.in/search_mynote_1-paging-ENGLISH-00000_preposition.php
• We have been living here since 2001. • I made her do the work.
• The people of Bangladesh are simple. • I watched him living away.
• The brave are always winners. • You would rather go there.
• The rise and fall is inevitable. • I saw him to go.
• Many a student is present here. • I met him last night.
• Two dozen makes 24. • I wish I could fly.
• One of the boys is nice. • I fancy I turned a trifle pale.
• He has been punished. • It is many years since I saw you.
• Half of the work is done. • I already have forgot his address.
• Neel with his brother is present. • Have you ever been to Cox's Bazar?
• There is a book on the Shelf. • He has left the place just now.
• Without knowing I will not tell her. • Have you seen her lately?
• We can't help laughing. • A number of students were present in the
• The book is worth reading. class.
• I prefer running to playing. • We went there with a view to seeing you.
• Would you mind taking a cup of tea?
• One and a half, lemons are enough. • I went to market last night with a view to
• Five miles is not a long distance. buying a shirt.
• He wanted the picture to be seen. • It is high time I changed my character.
• Neither She nor her sisters are present here. • He speaks as though he were a mad.
• The committee were divided on the decision. • The book has been published.
• The police are the friends of the people. • If you helped the boy he would help you.
• Neither of the two men is responsible. • He ran fast least he should miss the train.
• Money in addition to honor makes men • While reading a book I saw a picture of an
unhappy. ox.
• He said that ice floating on water was blue. • Ill news runs quickly.
• Many years have passed since I visited Taj • No buses and no rickshaws are on the road.
Mahal. • None of the girls has qualified.
• No sooner had they reached the station, then • The wall has been printed.
the train left. • Rice and curry is my favorite food.
• The rain having stopped We started our • Cattle are grazing in the field.
journey. • The family is unanimous in the opinion.
• No, sooner had the teacher entered the class • The virtuous are always happy.
Then the students stood up. • One of the students does his homework.
• We caught a thief last night. • Two plus two makes four.
• The headmaster had entered into the class • You, he and I are friends.
before the students came. • Rahim as well as his friends does well.
• When does Mr. Kamal take his breakfast? • I found the boy crying on the bed.
• I have read the book recently. • I was called there yesterday.
• It is many years since I came to your house. • Why did you go to market yesterday?
• We started the meeting after the guest has • It is no use spoiling time by gossiping.
been coming. • He talked as if he had known everything.
• You must better do the work. • You had better do the work.
• The boy ran away having taken the first • As soon as I have thought about her, she calls
prize. me.
Written Part
10 marks
PMSCS
Red Color Questions are Most important Mustakim Billah Bedar
www.youtube.com/c/NetComEducation
Types:
A CD-ROM drive (Compact Disk – Read Only Memory) is a type of device used by your computer to read CDs.
These CDs are used for a variety of purposes such as installing software and playing music. A CD-ROM drive
operates by using a laser to reflect light off the bottom of the CD or disc. The reflected light pulses are read by a
photo detector. These incoming pulses are decoded by the microprocessor and then sent as usable data to the rest
of the computer where it is processed and used.
CD-ROM drives can open documents on data CDs, such as music files, pictures, word documents and other files.
However, CD-ROM drives cannot write information to a CD (burn) because they are read-only drives; writing
information to a CD is done with a CD-R drive.
Twisted Pair:
Twisted pair is the most widely used and least expensive guided medium. It consists of two conductors (copper)
that is twisted together with its own plastic insulation. One of the wire is used to carry signal to the receiver and
the other one is used for ground reference only. The receiver uses the difference among them. There are two types
of twisted pair cable.
• Unshielded Twisted Pair (UTP)
• Shielded Twisted Pair (STP)
Coaxial Cable:
Coaxial Cable has better shielding than twisted pairs, so it can span longer distances at higher speeds. A Coaxial
cable is consist of a stiff copper wire as the core, surrounding by an insulating material. The construction and
shielding of the coaxial cable give it a good combination of high bandwidth and excellent immunity. Coaxial
cable is widely used for cable television and Metropolitan Area Network.
Distributed processing is the organization of processing to be carried out on a distributed system. Each process is
free to process local data and make local decisions. The processes exchange information with each other over a
data communication network to process data or to read decisions that affect multiple processes. In a distributed
processing system the various cooperating processes that jointly make up the total activity may run on separate
processing systems linked only by communications channels. In an open distributed system, the components are
physically separated and are linked by communications channels that use open systems standards for their
interfaces and protocols, and the intercommunication between the processes is again in accordance with a
(different) set of open systems standards. It is clear that there is still a long way to go before open distributed
processing will be a commercial reality.
Claude Shannon extended Nyquist's work for actual channels that are subject to noise. Noise can be of various
types like thermal noise, impulse noise, cross-talks etc. Among all the noise types, thermal noise is unavoidable.
The random movement of electrons in the channel creates an extraneous signal not present in the original signal,
called the thermal noise. The amount of thermal noise is calculated as the ratio of the signal power to noise power,
SNR.
Shannon's Capacity gives the theoretical maximum data rate or capacity of a noisy channel. It is expressed as:
Capacity = Bandwidth × log2( 1+SNR ) [Here, Capacity is the maximum data rate of the channel in bps,
Bandwidth is the bandwidth of the channel, SNR is the signal – to – noise ratio]
For example, if the bandwidth of a noisy channel is 4 KHz, and the signal to noise ratio is 100, then the maximum
bit rate can be computed as:
Capacity = 4000 × log2( 1+100 ) = 26,633 bps = 26.63 kbps
Nyquist bit rate was developed by Henry Nyquist who proved that the transmission capacity of even a perfect
channel with no noise has a maximum limit.
The theoretical formula for the maximum bit rate is:
For example, if there is a noiseless channel with a bandwidth of 4 KHz that is transmitting a signal with 4 discrete
levels, then the maximum bit rate will be computed as, maximum bit rate = 2 × 4000 × log24 = 16,000 bps = 16
kbps
There are three types of error: logic, run-time and compile-time error:
Logic errors occur when programs operate incorrectly but do not terminate normally (or crash). Unexpected or
undesired outputs or other behavior may result from a logic error, even if it is not immediately recognized as such.
Logic errors occur when executed code does not produce the expected result. Logic errors are best handled by
meticulous program debugging.
A run-time error is an error that takes place during the execution of a program and usually happens because of
adverse system parameters or invalid input data. The lack of sufficient memory to run an application or a memory
conflict with another program and logical error is an example of this.
Compile-time errors rise at compile-time, before the execution of the program. Syntax error or missing file
reference that prevents the program from successfully compiling is an example of this.
The cyclic redundancy check (CRC) is a technique used to detect errors in digital data. As a type of checksum,
the CRC produces a fixed-length data set based on the build of a file or larger data set. In terms of its use, CRC
is a hash function that detects accidental changes to raw computer data commonly used in digital
telecommunications networks and storage devices such as hard disk drives. In the cyclic redundancy check, a
fixed number of check bits, often called a checksum, are appended to the message that needs to be transmitted.
The data receivers receive the data, and inspect the check bits for any errors.
Hamming code is a set of error-correction codes that can be used to detect and correct the errors that can occur
when the data is moved or stored from the sender to the receiver. Redundant bits are extra binary bits that are
generated and added to the information-carrying bits of data transfer to ensure that no bits were lost during the
data transfer.
The number of redundant bits can be calculated using the following formula:
2r ≥ m + r + 1
where, r = redundant bit, m = data bit
A firewall is a division between a private network and an outer network, often the internet, that manages traffic
passing between the two networks. It’s implemented through either hardware or software. Firewalls allow, limit,
and block network traffic based on preconfigured rules in the hardware or software, analyzing data packets that
request entry to the network. In addition to limiting access to computers and networks, a firewall is also useful
for allowing remote access to a private network through secure authentication certificates and logins.
Repeaters are network devices operating at physical layer of the OSI model that amplify or regenerate an incoming
signal before retransmitting it. They are incorporated in networks to expand its coverage area. They are also
known as signal boosters.
When an electrical signal is transmitted via a channel, it gets attenuated depending upon the nature of the channel
or the technology. This poses a limitation upon the length of the LAN or coverage area of cellular networks. This
problem is alleviated by installing repeaters at certain intervals. Repeaters amplifies the attenuated signal and then
retransmits it. Digital repeaters can even reconstruct signals distorted by transmission loss. So, repeaters are
popularly incorporated to connect between two LANs thus forming a large single LAN.
ER Diagrams contain different symbols that use rectangles to represent entities, ovals to define attributes and
diamond shapes to represent relationships.
At first look, an ER diagram looks very similar to the flowchart. However, ER Diagram includes many specialized
symbols, and its meanings make this model unique. The purpose of ER Diagram is to represent the entity
framework infrastructure.
Polymorphism is the ability of an object to take on many forms. The most common use of polymorphism in
OOP occurs when a parent class reference is used to refer to a child class object.
The graphics processing unit, or GPU, has become one of the most important types of computing technology,
both for personal and business computing. Designed for parallel processing, the GPU is used in a wide range of
applications, including graphics and video rendering. Although they’re best known for their capabilities in
gaming, GPUs are becoming more popular for use in creative production and artificial intelligence (AI).
GPUs were originally designed to accelerate the rendering of 3D graphics. Over time, they became more flexible
and programmable, enhancing their capabilities. This allowed graphics programmers to create more interesting
visual effects and realistic scenes with advanced lighting and shadowing techniques. Other developers also began
to tap the power of GPUs to dramatically accelerate additional workloads in high performance computing (HPC),
deep learning, and more.
void recurse()
{
... .. ...
recurse();
... .. ...
}
int main()
{
... .. ...
recurse();
... .. ...
}
There are four different conditions that result in Deadlock. These four conditions are also known as Coffman
conditions and these conditions are not mutually exclusive. Let's look at them one by one.
Mutual Exclusion: A resource can be held by only one process at a time. In other words, if a process P1 is using
some resource R at a particular instant of time, then some other process P2 can't hold or use the same resource R
at that particular instant of time. The process P2 can make a request for that resource R but it can't use that resource
simultaneously with process P1.
Hold and Wait: A process can hold a number of resources at a time and at the same time, it can request for other
resources that are being held by some other process. For example, a process P1 can hold two resources R1 and
R2 and at the same time, it can request some resource R3 that is currently held by process P2.
No preemption: A resource can't be preempted from the process by another process, forcefully. For example, if
a process P1 is using some resource R, then some other process P2 can't forcefully take that resource. If it is so,
then what's the need for various scheduling algorithm. The process P2 can request for the resource R and can wait
for that resource to be freed by the process P1.
Circular Wait: Circular wait is a condition when the first process is waiting for the resource held by the second
process, the second process is waiting for the resource held by the third process, and so on. At last, the last process
is waiting for the resource held by the first process. So, every process is waiting for each other to release the
resource and no one is releasing their own resource. Everyone is waiting here for getting the resource. This is
called a circular wait.
39. What is the basic structure of SQL and what are its use?
SQL stands for Structured Query Language. It is a widely used programming language designed for working with
Relational DataBase Management System. SQL can be used to insert, search, update, and delete database records.
Basic structure of an SQL expression consists of select, from and where clauses.
Linear search is a very simple search algorithm. In this type of search, a sequential search is made over all items
one by one. Every item is checked and if a match is found then that particular item is returned, otherwise the
search continues till the end of the data collection.
The Fibonacci numbers are the numbers in the following integer sequence.
0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, ……..
In mathematical terms, the sequence Fn of Fibonacci numbers is defined by the recurrence relation
Fn = Fn-1 + Fn-2 with seed values F0 = 0 and F1 = 1.
Big O Notation (O): It represents the upper bound of the runtime of an algorithm. Big O Notation's role is to
calculate the longest time an algorithm can take for its execution, i.e., it is used for calculating the worst-case time
complexity of an algorithm.
Omega Notation (Ω(n)): It represents the lower bound of the runtime of an algorithm. It is used for calculating
the best time an algorithm can take to complete its execution, i.e., it is used for measuring the best case time
complexity of an algorithm.
Theta Notation (Θ(n)): It carries the middle characteristics of both Big O and Omega notations as it represents
the lower and upper bound of an algorithm.
NoSQL databases are purpose built for specific data models and have flexible schemas for building modern
applications. NoSQL databases are widely recognized for their ease of development, functionality, and
performance at scale. This page includes resources to help you better understand NoSQL databases and to get
started.
NoSQL databases use a variety of data models for accessing and managing data. These types of databases are
optimized specifically for applications that require large data volume, low latency, and flexible data models,
which are achieved by relaxing some of the data consistency restrictions of other databases.
Triggers are the SQL statements that are automatically executed when there is any change in the database. The
triggers are executed in response to certain events(INSERT, UPDATE or DELETE) in a particular table. These
triggers help in maintaining the integrity of the data by changing the data of the database in a systematic fashion.
A transaction in a database system must maintain Atomicity, Consistency, Isolation, and Durability − commonly
known as ACID properties − in order to ensure accuracy, completeness, and data integrity.
Atomicity − This property states that a transaction must be treated as an atomic unit, that is, either all of its
operations are executed or none. There must be no state in a database where a transaction is left partially
completed. States should be defined either before the execution of the transaction or after the
execution/abortion/failure of the transaction.
Consistency − The database must remain in a consistent state after any transaction. No transaction should have
any adverse effect on the data residing in the database. If the database was in a consistent state before the execution
of a transaction, it must remain consistent after the execution of the transaction as well.
Durability − The database should be durable enough to hold all its latest updates even if the system fails or
restarts. If a transaction updates a chunk of data in a database and commits, then the database will hold the
modified data. If a transaction commits but the system fails before the data could be written on to the disk, then
that data will be updated once the system springs back into action.
Isolation − In a database system where more than one transaction are being executed simultaneously and in
parallel, the property of isolation states that all the transactions will be carried out and executed as if it is the only
transaction in the system. No transaction will affect the existence of any other transaction.
Inheritance is the capability of one class to derive or inherit the properties from another class.
The benefits of inheritance are:
• It represents real-world relationships well.
• It provides reusability of a code. We don’t have to write the same code again and again. Also, it allows us to
add more features to a class without modifying it.
• It is transitive in nature, which means that if class B inherits from another class A, then all the subclasses of
B would automatically inherit from class A.
A temporary storage of memory, cache makes data retrieving easier and more efficient. It is the fastest memory
in a computer, and is typically integrated onto the motherboard and directly embedded in the processor or main
random access memory (RAM).
Unicode is a universal character encoding standard that assigns a code to every character and symbol in every
language in the world. Since no other encoding standard supports all languages, Unicode is the only encoding
standard that ensures that you can retrieve or combine data using any combination of languages. Unicode is
required with XML, Java, JavaScript, LDAP, and other web-based technologies.
A data set is homogeneous if it is made up of things that are similar to each other it means data from the exact
same source. In a typical scenario of supervised learning, this will result in the data set to have the exact same
label across the entire set.
The heterogeneous data refer to any data that has a high variability of data formats. They are perhaps indefinite
and pose low qualities due to missing values, high data redundancy, and untruthfulness. It is very complicated to
combine heterogeneous data for meeting the demands of business information.
Storage (either a hard drive or a solid state drive) stores data long-term for permanent access. It's the component
that accesses and stores your files, applications, and operating system. The storage drive is non-volatile, which
means the data is stored even if you turn off the computer. For more information about solid state drives, read
here. Memory and storage work in tandem with your computer's processor (CPU) to access and use data.
Example:
class_name( arguments if any )
{
};
Destructor
• It deallocates the memory of an object.
• It doesn’t take any argument.
• It is called automatically when the block is exited or when the program terminates.
• They allow objects to execute code when it is being destroyed.
• They are called in the reverse order of their creation.
• There is a single destructor in a class.
• Destructor can’t be overloaded.
Example:
~ class_name( no arguments )
{
};
Applications of WSN:
• Internet of Things (IOT)
• Surveillance and Monitoring for security, threat detection
• Environmental temperature, humidity, and air pressure
• Noise Level of the surrounding
• Medical applications like patient monitoring
• Agriculture
• Landslide Detection
Instance
• It refers to the collection of information that is stored in the database at a specific moment.
• Data in these instances can be changed.
• This can be done using addition, deletion, and updating.
• The instance changes frequently.
• It is the set of Information that is stored at a particular time
Syntax errors and "semantic" errors are not the same. The syntax error is an incorrect construction of the source
code, whereas a semantic error is erroneous logic that produces the wrong result when executed.
An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It represents
the fundamental building block of the central processing unit (CPU) of a computer. The ALU performs simple
addition, subtraction, multiplication, division, and logic operations, such as OR and AND. The memory stores
the program’s instructions and data.
Referential integrity refers to the relationship between tables. In order to maintain referential integrity, the
relational data in database tables has to be universally configurable so that changes in one part of the system don't
lead to unanticipated problems elsewhere.
Specifically, keys that reference elements of other tables need to be connected to those other fields, so that if there
is a change, everything gets updated together, and not separately.
SQL Index
Indexes are special lookup tables. It is used to retrieve data from the database very fast. An Index is used to speed
up select queries and where clauses. But it shows down the data input with insert and update statements. Indexes
can be created or dropped without affecting the data. An index in a database is just like an index in the back of a
book.
For example: When you reference all pages in a book that discusses a certain topic, you first have to refer to the
index, which alphabetically lists all the topics and then referred to one or more specific page numbers.
Views in SQL
Views in SQL are considered as a virtual table. A view also contains rows and columns. To create the view, we
can select the fields from one or more tables present in the database. A view can either have specific rows based
on certain condition or all the rows of a table.
72. Full form of RAID? Why do we use RAID? What are the Levels of RAID?
RAID stands for Redundant Array of Inexpensive/Independent Disks. RAID is a technique of data virtualization
that uses multiple hard disks or solid-state drives to provide for data redundancy and performance improvement.
Redundancy provides threat resilience to the data in case of unforeseen events, thus proving advantageous over
the conventional storage technique of having a “single large expensive disk” (SLED). So instead of having all the
data on one SLED, RAID instead makes use of multiple small-sized disks allowing faster I/O operations and
providing robustness to the whole system. In case one of the disks in the system crashes the others remain safe
and the whole system doesn’t collapse.
Advantages
• Data access speed: Data access speed in RAID systems is undeniably better that SLED systems. RAID
0, RAID 4 and RAID 5 are specially designed for fast and cheap data access.
• Reundant data: Data redundancy provided by RAID systems provides for a reliable storage system.
RAID 1 uses data mirroring to keep copies of data to ensure reliability.
• Error Correction: RAID 2, RAID 3, RAID 4 and RAID 5 use hamming code parity for error correction
in data.
• Simultaneous I/O requests: RAID 0, RAID 4 and RAID 5 use the striping storage techniques hence
support multiple I/O operations at the same time.
• Bulk data transfer: RAID 3 provides for quick bulk data transfers.
• Data security: Striping and continuous parity checks provide for high data security.
Disadvantages
• Cost: The cost of RAID systems is more than SLED systems.
• Data loss: The RAID systems that do not use mirroring are vulnerable to some data loss.
• Choice of RAID level: Given that there are so many RAID levels with each having some drawbacks and
features of their it is a difficult choice as to what system can be used.
• Improper use: If RAID is not use properly, the overall performance of the system as a whole may
decrease.
• Complex technology: RAID is a difficult to use architecture of data storage and requires skilled and
proficient people to unlock the full potential of RAID.
RAID levels:
RAID 0 – striping
RAID 1 – mirroring
RAID 5 – striping with parity
RAID 6 – striping with double parity
RAID 10 – combining mirroring and striping
74. What is BIOS? What are the Properties of BIOS? What happens when BIOS fails?
Every computer with a motherboard includes a special chip referred to as the BIOS or ROM BIOS (Read
Only Memory Basic Input/Output System). The BIOS includes instructions on how to load basic computer
hardware. The BIOS also includes a test referred to as a POST (Power On Self Test) which will ensure that
the computer meets requirements to boot up properly. If the computer does not pass the POST you will
receive a combination of beeps indicating what is malfunctioning within the computer.
BIOS is a piece of program. When the system starts, the register EIP is initialized to FFFF0 to execute the JMP
instruction there, which leads to the execution of the system BIOS code.
BIOS will initialize other devices; initialize the interrupt vector; find other BIOS programs and run them.
If your BIOS update procedure fails, your system will be useless until you replace the BIOS code.
You have two options:
Install a replacement BIOS chip (if the BIOS is located in a socketed chip).
Use the BIOS recovery feature (available on many systems with surface-mounted or soldered-in-place BIOS chips).
Software Development Life Cycle is the application of standard business practices to building software
applications. It’s typically divided into six to eight steps: Planning, Requirements, Design, Build, Document, Test,
Deploy, Maintain. Some project managers will combine, split, or omit steps, depending on the project’s scope.
These are the core components recommended for all software development projects.
SDLC is a way to measure and improve the development process. It allows a fine-grain analysis of each step of
the process. This, in turn, helps companies maximize efficiency at each stage. As computing power increases, it
places a higher demand on software and developers. Companies must reduce costs, deliver software faster, and
meet or exceed their customers’ needs. SDLC helps achieve these goals by identifying inefficiencies and higher
costs and fixing them to run smoothly.
Phases of SDLC:
1. Planning
2. Define Requirements
3. Design and Prototyping
4. Software Development
5. Testing
6. Deployment
7. Operations and Maintenance
An optical disk is an electronic data storage medium that can be written to and read from using a low-powered
laser beam. Most of today's optical disks are available in three formats: compact disks (CDs), digital versatile
disks (DVDs) -- also referred to as digital video disks -- and Blu-ray disks, which provide the highest capacities
and data transfer rates of the three.
Optical disks rely on a red or blue laser to record and read data. Most of today's optical disks are flat, circular and
12 centimeters in diameter. An optical disk drive uses a laser beam to read the data from the disk as it is spinning.
It distinguishes between the pits and lands based on how the light reflects off the recording material. The drive
uses the differences in reflectivity to determine the 0 and 1 bits that represent the data.
The weight of an object is zero when the net gravitational force acting on the object is zero. However, the mass
of an object can never be zero since mass is a property of matter.
A monitor or TV screen generates three colors of light (red, green, and blue) and the different colors we see are
due to different combinations and intensities of these three primary colors.
80. What are the programming languages that are interpreter based?
An Interpreter directly executes instructions written in a programming or scripting language without previously
converting them to an object code or machine code. Examples of interpreted languages are Perl, Python and
Matlab.
82. What do you know about active hub and passive hub?
Active hub: These hubs regenerate our signals as well as amplifies the signal. Active hubs need electricity to
work.
Passive hub: Talking about passive hubs, it simply distributes the signal coming from the previous ports. Passive
hub neither regenerates any signal nor amplifies, therefore it does not require electricity to work.
2-Tier Architecture: A 2 Tier Architecture in DBMS is a Database architecture where the presentation layer
runs on a client (PC, Mobile, Tablet, etc.), and data is stored on a server called the second tier. Two tier
architecture provides added security to the DBMS as it is not exposed to the end-user directly. It also provides
direct and faster communication.
3-Tier Architecture: A 3 Tier Architecture in DBMS is the most popular client server architecture in DBMS in
which the development and maintenance of functional processes, logic, data access, data storage, and user
interface is done independently as separate modules. Three Tier architecture contains a presentation layer, an
application layer, and a database server.
84. What are the functions of LLC sublayer and MAC sublayer?
Logical Link Control (LLC) sublayer provides the logic for the data link. Thus, it controls the synchronization,
flow control, and error checking functions of the data link layer.
Media Access Control (MAC) sublayer provides control for accessing the transmission medium. It is
responsible for moving data packets from one network interface card (NIC) to another, across a shared
transmission medium. Physical addressing is handled at the MAC sublayer.
In computing, a system call is the programmatic way in which a computer program requests a service from the
kernel of the operating system it is executed on. A system call is a way for programs to interact with the operating
system. A computer program makes a system call when it makes a request to the operating system’s kernel.
System call provides the services of the operating system to the user programs via Application Program
Interface(API). It provides an interface between a process and operating system to allow user-level processes to
request services of the operating system. System calls are the only entry points into the kernel system. All
programs needing resources must use system calls.
A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a
public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually
untraceable. Most important, VPN services establish secure and encrypted connections to provide greater privacy
than even a secured Wi-Fi hotspot.
A page fault occurs when a program attempts to access a block of memory that is not stored in the physical
memory, or RAM. The fault notifies the operating system that it must locate the data in virtual memory, then
transfer it from the storage device, such as an HDD or SSD, to the system RAM.
SRAM DRAM
SRAM stands for Static Random Access Memory. DRAM stands for Dynamic Random Access Memory.
Transistors are used to store information in SRAM Capacitors are used to store information in DRAM
Refreshing is not required. Refreshing is required.
SRAM offers low packaging density. DRAM offers high packaging density.
SRAM storage capacity is in Mega Bytes. DRAM storage capacity is in Giga Bytes.
SRAM consumes less power. DRAM consumes much power.
SRAM is costlier than DRAM DRAM is cheap compared to SRAM
Hub Switch
Hub transmits the signal to every port except the Switch do not transmit to every port rather it sends
port that received the signal to specific addresses
Hub operates on the physical layer Switch operates on the data link layer
Transmission mode for Hub is Half Duplex Transmission mode for Switch is Full Duplex
Hub is a passive device Switch is an active device
Hub Not an intelligent device Switch is an intelligent device
Speed is up to 10 Mbps Speed is more than Hub, up to 10 Gbps
Hub does not use software Switch has software for administration
Hub can have maximum 4 ports. Switch can have 24 to 28 ports
Hub does not provide packet filtering Switch provides packet filtering
DDL DML
It stands for Data Definition Language. It stands for Data Manipulation Language.
It is used to create database schema and can be used to It is used to add, retrieve or update the data.
define some constraints as well.
It basically defines the column (Attributes) of the table. It add or update the row of the table. These rows are called
as tuple.
It doesn’t have any further classification. It is further classified into Procedural and Non-Procedural
DML.
Basic command present in DDL are CREATE, DROP, BASIC command present in DML are UPDATE, INSERT,
RENAME, ALTER etc. MERGE etc.
DDL does not use WHERE clause in its statement. While DML uses WHERE clause in its statement.
Stack Queue
The stack is based on LIFO(Last In First Out) principle The queue is based on FIFO(First In First Out) principle.
Push and Pop Operation takes place from one end of the Enqueue and Dequeue Operation takes place from a
stack different end of the queue
The most accessible element is called Top and the least The insertion end is called Rear End and the deletion end
accessible is called the Bottom of the stack is called the Front End.
Only one pointer is used for performing operations Two pointers are used to perform operations
Used to solve the recursive type problems Used to solve the problem having sequential processing
Interpreter Compiler
Interpreter translates just one statement of the Compiler scans the entire program and translates the
program at a time into machine code. whole of it into machine code at once.
An interpreter takes very less time to analyze the source A compiler takes a lot of time to analyze the source
code. However, the overall time to execute the process code. However, the overall time taken to execute the
is much slower. process is much faster.
An interpreter does not generate an intermediary code. A compiler always generates an intermediary object
Hence, an interpreter is highly efficient in terms of its code. It will need further linking. Hence more memory
memory. is needed.
Keeps translating the program continuously till the first A compiler generates the error message only after it
error is confronted. If any error is spotted, it stops scans the complete program and hence debugging is
working and hence debugging becomes easy. relatively harder while working with a compiler.
Interpreters are used by programming languages like Compliers are used by programming languages like C
Ruby and Python for example. and C++ for example.
It uniquely identifies a record in the relational It refers to the field in a table which is the primary
database table. key of another table.
Only one primary key is allowed in a table. Whereas more than one foreign key are allowed in a
table.
It is a combination of UNIQUE and Not Null It can contain duplicate values and a table in a
constraints. relational database.
It does not allow NULL values. It can also contain NULL values.
Its value cannot be deleted from the parent table. Its value can be deleted from the child table.
It constraint can be implicitly defined on the It constraint cannot be defined on the local or global
temporary tables. temporary tables.
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It can generate 4.29×109 address space Address space of IPv6 is quite large it can produce
The Security feature is dependent on application IPSEC is an inbuilt security feature in the IPv6 protocol
Fragmentation performed by Sender and forwarding In IPv6 fragmentation performed only by the sender
routers
In IPv4 Packet flow identification is not available In IPv6 packet flow identification are Available and uses
It has broadcast Message Transmission Scheme In IPv6 multicast and anycast message transmission
scheme is available
In IPv4 Encryption and Authentication facility not In IPv6 Encryption and Authentication are provided
provided
IPv4 has a header of 20-60 bytes. IPv6 has header of 40 bytes fixed
Accessing any element in an array is faster as the element Accessing an element in a linked list is slower as it
in an array can be directly accessed through the index. starts traversing from the first element of the linked
list.
In the case of an array, memory is allocated at compile- In the case of a linked list, memory is allocated at
time. run time.
3 Actual and formal arguments are created at the Actual and formal arguments are created at the same
different memory location memory location
Domain HTTP website do not need SSL. HTTPS requires SSL certificate.
Name
Validation
Search HTTP does not improve search rankings. HTTPS helps to improve search ranking.
Ranking
3. Out of 7 consonants and 4 vowels, how many words of 3 consonants and 2 vowels can be formed?
4. On the circle there are 9 points selected. How many triangles in these points exits?
5. Suppose a=2, b=8. Find the arithmetic mean and geometric mean.
AM = (a+b)/2 = (2+8)/2 = 5
GM = √(ab) = √(2*8) = 4
Ans: e^x
Ans: 8,13
Here, n = CIDR = 27
Network bit = 27
So, Host bit = 32 - n
= 32 - 27
=5
11. A man is 24 years older than his son. In two years, his age will be twice the age of his son. What is the
present age of his son?
Ans 22
12. Present ages of Kiran and Syam are in the ratio of 5 : 4 respectively. Three years hence, the ratio of
their ages will become 11:9 respectively. What is Syam's present age in years?
13. The sum of ages of 5 children born at the intervals of 3 years each is 50 years. Find out the age of the
youngest child.
14. At present, the ratio between the ages of Shekhar and Shobha is 4: 3. After 6 years, Shekhar's age
will be 26 years. Find out the age of Shobha at present?
15. The present ages of A,B and C are in proportions 4:7:9. Eight years ago, the sum of their ages was
56. What are their present ages (in years)?
16. In the first 10 overs of a cricket game, the run rate was only 3.2. What should be the run rate in the
remaining 40 overs to reach the target of 282 runs?
17. A train having a length of 240 metre passes a post in 24 seconds. How long will it take to pass a
platform having a length of 650 metre?
20. How many prime numbers are there less than 50?
Ans: 15
Solution:
The mode is 11 because 11 occurred more times than the other numbers.
If the observations are given in the form of a frequency table, the mode is the value that has the highest
frequency.
Marks 1 2 3 4 5
Frequency 6 7 7 5 3
Solution:
The marks 2 and 3 have the highest frequency. So, the modes are 2 and 3.
Note: The above example shows that a set of observations may have more than one mode.
24. The following frequency table shows the marks obtained by students in a quiz. Given that 4 is the
mode, what is the least value for x?
Marks 1 2 3 4 5 6
Solution:
x is as least 12
(if x is less than 12 then 4 will not be the mode)
When the number of observations is odd, the median is the middle value.
When the number of observations is even, the median is the average of the two middle values.
27. x is the median for 4, 3, 8, x and 7. Find the possible values for x.
Solution:
28. The set of scores 12, 5, 7, -8, x, 10 has a mean of 5. Find the value of x.
Solution:
29. 10 students of a class had a mean score of 70. The remaining 15 students of the class had mean score
of 80. What is the mean score of the entire class?
Solution:
Total score of first 10 students = 10 × 70 = 700
Total score of remaining 15 students = 15 × 80 = 1200
Mean score of whole class
30. A coin is thrown 3 times. what is the probability that at least one head is obtained?
Sample space = [HHH, HHT, HTH, THH, TTH, THT, HTT, TTT]
31. What is the probability of getting a sum of 7 when two dice are thrown?
Favorable cases = (1, 6) (6, 1) (2, 5) (5, 2) (3, 4) (4, 3) --- 6 ways.
32. Three dice are rolled together. What is the probability as getting at least one '4'?
Probability of getting number ‘4’ at least one time = 1 – (Probability of getting no number 4) = 1 – (5/6) x (5/6) x
(5/6) = 91/216
33. Find the probability of getting two heads when five coins are tossed.
34. A die is rolled, find the probability that an even number is obtained.
a) -0.00001
b) 0.5
c) 1.001
d) 0
e) 1
f) 20%
Solution
A probability is always greater than or equal to 0 and less than or equal to 1, hence only a) and c) above cannot
represent probabilities: -0.00010 is less than 0 and 1.001 is greater than 1.
36. A card is drawn at random from a deck of cards. Find the probability of getting a queen.
37. A jar contains 3 red marbles, 7 green marbles and 10 white marbles. If a marble is drawn from the
jar at random, what is the probability that this marble is white?
color frequency
red 3
green 7
white 10
total=3+7+10=20
P(E) = Frequency for white color / Total frequencies in the above table
= 10 / 20 = 1 / 2
38. Studenst in a math class where 40% are males and 60% are females took a test. 50% of the males
and 70% of the females passed the test. What percent of students passed the test?
Let events E1 "be a male" and E2 "be a female", and event A "passed the test".
P(A)=P(A|E1)P(E1)+P(A|E2)P(E2)
=50%×40%+70%×60%=62%
39. 5% of a population have a flu and the remaining 95% do not have this flu. A test is used to detect the
flu and this test is positive in 95% of people with a flu and is also (falsely) positive in 1% of the people
with no flu. If a person from this population is randomly selected and tested, what is the probability
that the test is positive?
Solution
40. A card is drawn form a pack of 52 cards. What is the probability of getting a queen of club or a king
of heart
First, we will find the number of favorable outcomes and total outcomes. The total number of cards in the pack is 52.
Therefore, the total number of possible outcomes when a card is picked from the pack is 52. Next, we will find the
number of favorable outcomes. There are 4 queens (1 each of clubs, spades, diamonds, hearts) in a pack. Thus, there
is only 1 queen of clubs in a pack of 52 cards. Similarly, there are 4 kings (1 each of clubs, spades, diamonds, hearts)
in a pack. Thus, there is only 1 king of hearts in a pack of 52 cards. We need the probability of getting either a king
of hearts, or a queen of clubs when 1 card is drawn from a pack of 52 cards Therefore, the number of favorable
outcomes is 2. Finally, we will use the formula for probability of an event to calculate the probability of getting a card
of diamond. Let E be the event of getting a queen of clubs or a king of hearts. Substituting 2 for the number of favorable
outcomes, and 52 for the number of total outcomes in the formula, we get
⇒P(E)=2/52 = 1/26
41. Which number should be come next in this series: 10, 17, 26, 37? Ans: 50
43. If n and k are positive integers and 8n=2k. What is the value of n/k? Ans: 1/3
44. The decimal number -34 is expressed in 2’s complement form as? Ans: 11011110
45. If a sweater sells for $48 after a 25% markdown, what was its original price?
0.75*x = 48
x = $64 Ans:
47. If the side of a square is increased by a 20% then area increased by……
48. The product of two numbers is 120 and the sum of their squares is 289. The sums of the number is?
Ans: 23
49. A certain password must contain 3 distinct digits followed by 2 distinct capital letters. Given ten digits
and 26 capital letters, how many different passwords are possible?
List the number of possible options for each character in the password. There are 10 possibilities for the first digit, 9
left for the second, and 8 left for the third. There are 26 possibilities for the first letter and 25 for the second. There
are 10 × 9 × 8 × 26 × 25 = 468,000 possible passwords.
50. If the average of 5 numbers is 36 and the average of four of those numbers is 34, then what is the value
of the fifth number?
51. If two painters can complete two rooms in two hours, how many painters would it take to do 18
rooms in 6 hours?
2 painter takes 2 hours to Paint 2 rooms means, 1 painter takes 2 hours to paint 1 room.
52. The difference between the squares of two consecutive numbers is 37. Find the numbers.... .........
Answer: 18 and 19
53. In a certain store, the profit is 320% of the cost. If the cost increases by 25% but the selling price
remains constant, approximately what percentage of the selling price is the profit?
54. If m and n are whole numbers such that mn = 121, the value of (m - 1)n + 1 is:
55. Sachin borrows Rs. 5000 for 2 years at 4% p.a. simple interest. He immediately lends money to
Rahul at 25/4% p.a. for 2 years. Find the gain of one year by Sachin.
56. An observer 1.6 m tall is 20√3 away from a tower. The angle of elevation from his eye to the top of
the tower is 30º. The heights of the tower is:
57. A train 100 m long passes a bridge at the rate of 72 km/h in 25 s. The length of the bridge is
58. The perimeter of a rectangle is 26 cm. If its length is 3 cm more than its breadth, find the dimensions
of the rectangle.
59. Mia has a large bag of sweets.If she shares the sweets equally among 2,3,4,5 or 6 people there will
always be 1 sweet left over.What is the smallest number of sweets there could be in the bag?
Mia has a large bag of sweets. If she shares the sweets equally among 2,3,4,5 or 6 people. First find the LCM
that will gives us the least number of sweets distributed equally among 2,3,4,5 or 6 people.
2=2
3=3
4=2×2
5=5
6=2×3
LCM = 2 × 2 × 3 × 5 = 60.
That means if she has 60 sweets, she can shares them equally among 2,3,4,5 or 6 people.
Now we want to be 1 sweet left over.
So add 1 and 60.
60+1=61.
60. A boy was asked to multiply a certain number by 25 He multiplied it by 52 and got his answer more
by 324 than the correct answer The number to be multiplied was?
Let the number is x
The if be multiply by 25 then correct answer =25x
But boy multiply with 52 then boys answer =52 x
As per question boy answer if more then 324 than correct answer
∴52x=25x+324
⇒52x−25x=324
⇒27x=324
⇒x=12
61. A two-digit number is such that the product of its digits is 8.When 18 is added to the number, the
digits are reversed. The number is:
62. Reena took a loan of Rs. 1200 with simple interest for as many years as the rate of interest. If she
paid Rs. 432 as interest at the end of the loan period, what was the rate of interest?
63. A bag contains 6 black and 8 white balls. One ball is drawn at random. What is the probability that
the ball drawn is white?
64. Find the probability that a number selected from the numbers 1 to 25 is not a prime number when
each of the given numbers is equally likely to be selected.
65. A box contains 3 red, 3 white and 3 green balls. A ball is selected at random. Find the probability
that the ball picked up is neither a white nor a red ball:
66. A letter is chosen at random from the letters of the English alphabet The probability that it is not a
vowel is?
There are 26 letters of which 21 are consonants Therefore
P(not a vowel)=21/26
67. What is the probability of selecting 'W' from the letters of the word SWORD?
68. If the letters of the word RANDOM be arranged at random, the probability that there are exactly 2
letters in between A and O is
PMSCS
Mustakim Billah Bedar
In future if they take viva voce after written exam or if there is any occurrence for
which online admission test is held again then this part will be crucial. The suggestion
is prepared based on Previous Viva question Analysis. This can also be helpful for
written (10 marks). If you want to make strong preparation you should learn these
question answers too no matter whether the exam is online or offline.
•
•
• https://youtu.be/EfkfFxaHOPs
References:
https://www.javatpoint.com/ https://techdifferences.com/
https://www.guru99.com/ https://byjus.com/
https://onlinecomputertips.com/ https://study.com/
https://www.tutorialspoint.com/ https://www.maximintegrated.com/
https://techdifferences.com/ https://www.w3schools.com/
https://www.encyclopedia.com/ https://www.omnisci.com/
https://www.vedantu.com/ https://www.educba.com/
https://en.wikipedia.org/ https://www.examveda.com/
https://www.tutorialspoint.com/ https://www.javatpoint.com/
https://www.dictionary.com/ https://www.tutorialspoint.com/
https://www.geeksforgeeks.org/ https://www.sanfoundry.com/
https://www.webopedia.com/ https://www.examtray.com/
https://www.techtarget.com/ https://www.geeksforgeeks.org/
https://www.edureka.co/ https://tutorialslink.com/
https://www.diffen.com/ https://www.udemy.com/
https://studyelectrical.com/ https://studymaterialz.in/
https://www.programiz.com/ https://easyengineering.net/
https://www.programiz.com/ https://unacademy.com/
https://favtutor.com/ https://lastmomenttuitions.com/
https://www.computerhope.com/ https://www.examtray.com/
https://thirdspacelearning.com/ https://www.courseya.com/
http://flint.cs.yale.edu/ https://www.toppr.com
https://www.investopedia.com/
www.youtube.com/c/NetComEducation