Professional Documents
Culture Documents
[Trial Edition]
DU MIT Version
Mail Me: mustakimbilla007@gmail.com
www.youtube.com/c/NetComEducation
https://www.facebook.com/groups/858042971559671
https://www.facebook.com/groups/NetComEducation
INSTITUTE OF INFORMATION TECHNOLOGY
(IIT)
UNIVERSITY OF DHAKA
DHAKA-1000, BANGLADESH
Web: http://www.iit.du.ac.bd
July, 2022
Institute of Information Technology (IIT), University of Dhaka
Institute of Information Technology (IIT), University of Dhaka started its journey in June 2001 to
create efficient manpower in information technology. IIT currently offers Bachelor of Science in
Software Engineering (BSSE), Master of Science in Software Engineering (MSSE), and Executive
Master in Information Technology (MIT). Apart from its regular activities, it also produces state-of-
the-art researches and those are published in world class journals and conferences.
IIT has a silent ambience and is adjacent to the Dhaka University Science Library. The four-storied
red ceramic IIT building contains six software laboratories, one seminar library and two large
classrooms. The laboratories and classrooms are air-conditioned and equipped with multimedia,
document camera system and Internet facilities.
The sole purpose of IIT is to plant the seed of professionalism, excellence and respect through
teaching based on real life experience. IIT believes that doing so should aid in realizing its vision.
The main focus of IIT is to enhance the competitiveness of the students through academic
innovation and research which will eventually help them to serve the society effectively.
The program entitled “Executive Master in Information Technology” will be conducted by the
Institute of Information Technology (IIT) of the University of Dhaka. The program extends over 3
(three) semesters (6 months/semester) of study. Classes will be held in the evening. The program
requires 30 credits of course work and 6 credits of project/internship (total 36 credits).
This document serves as the brochure for the MIT program, conducted by the Institute of
Information technology, University of Dhaka.
1. Credit Distribution:
1 Credit Theory = Total 14 hours of class work
1 Credit Lab = Total 28 hours of lab work
The MIT program is a program consisting of 3 (three) semesters. Each semester has
duration of 6 (six) months to be distributed as follows:
(a) Classes : Fifteen weeks
(b) Preparatory Leave : Maximum two weeks
(c) Semester Final Exam : Three weeks
(d) Vacation : Only the usual university’s vacation will be applicable.
1|Page
Institute of Information Technology (IIT), University of Dhaka
Elective Courses:
IIT will offer elective courses from the following tracks based on demand and the availability of the
resource personnel, and IIT preserves the right to add/remove tracks/courses at any semester.
2|Page
Institute of Information Technology (IIT), University of Dhaka
6. Number of seats for MIT is limited to 40 (forty). However, IIT authority will decide the number
for the respective batch considering its available resource prior to the enrollment.
8. The MIT program students will not avail DU hall accommodation privilege.
9. The MIT students will receive an ID card from the institute (IIT).
Admission test will be held in two phases. Written examination will test Computer, Quantitative,
Analytical, and English language proficiency. Successful (written test) candidates will have to
appear a viva voce for final selection to enroll in MIT. Some important points regarding written test
are as follows:
a) All questions will be in English.
b) Questions will be multiple choice type.
c) Total time will be 90 minutes and total marks will be 100.
d) Candidates have to answer in OMR sheet with black ball point pen.
3|Page
Institute of Information Technology (IIT), University of Dhaka
14. The registration for MIT is valid for 5 years after the date of registration.
15. A minimum D grade in a subject will be considered as pass in the corresponding subject. However,
in order to complete the program, a student has to pass a project / internship (minimum D grade)
with a total of 10 subjects and achieve a minimum CGPA of 2.5. As a result, if a student's CGPA
falls below the minimum 2.5 at any stage of the program, he or she will be able to re-take some
courses to improve his or her CGPA.
16. After successful completion of the course, all the students will be awarded a certificate from the
University of Dhaka showing CGPA and transcript showing details of grades obtained in various
semesters.
17. The IIT authority will resolve any other points not mentioned in this document. Application for
admission implies agreeing to abide by all rules and regulations of the IIT and also future decisions
of the IIT.
“Information for Admission” (MIT Brochure) can be downloaded directly from the website
(http://www.iit.du.ac.bd) of the Institute of Information Technology, University of Dhaka.
4|Page
Join this group: https://www.facebook.com/groups/858042971559671
Part 1
Quantitative Analysis
1. A man is 24 years older than his son. In two years, his age will be twice the age of his son. What is the
present age of his son?
Ans 22
2. Present ages of Kiran and Syam are in the ratio of 5 : 4 respectively. Three years hence, the ratio of
their ages will become 11:9 respectively. What is Syam's present age in years?
3. The sum of ages of 5 children born at the intervals of 3 years each is 50 years. Find out the age of the
youngest child.
4. At present, the ratio between the ages of Shekhar and Shobha is 4: 3. After 6 years, Shekhar's age
will be 26 years. Find out the age of Shobha at present?
5. The present ages of A,B and C are in proportions 4:7:9. Eight years ago, the sum of their ages was
56. What are their present ages (in years)?
6. In the first 10 overs of a cricket game, the run rate was only 3.2. What should be the run rate in the
remaining 40 overs to reach the target of 282 runs?
7. A train having a length of 240 metre passes a post in 24 seconds. How long will it take to pass a
platform having a length of 650 metre?
10. How many prime numbers are there less than 50?
Ans: 15
12. If a sweater sells for $48 after a 25% markdown, what was its original price?
0.75*x = 48
x = $64 Ans:
14. If the side of a square is increased by a 20% then area increased by……
15. The product of two numbers is 120 and the sum of their squares is 289. The sums of the number is?
Ans: 23
16. If the average of 5 numbers is 36 and the average of four of those numbers is 34, then what is the value
of the fifth number?
17. If two painters can complete two rooms in two hours, how many painters would it take to do 18
rooms in 6 hours?
2 painter takes 2 hours to Paint 2 rooms means, 1 painter takes 2 hours to paint 1 room.
18. The difference between the squares of two consecutive numbers is 37. Find the numbers.... .........
Answer: 18 and 19
20. In a certain store, the profit is 320% of the cost. If the cost increases by 25% but the selling price
remains constant, approximately what percentage of the selling price is the profit?
21. If m and n are whole numbers such that mn = 121, the value of (m - 1)n + 1 is:
22. Sachin borrows Rs. 5000 for 2 years at 4% p.a. simple interest. He immediately lends money to
Rahul at 25/4% p.a. for 2 years. Find the gain of one year by Sachin.
23. A train 100 m long passes a bridge at the rate of 72 km/h in 25 s. The length of the bridge is
24. An observer 1.6 m tall is 20√3 away from a tower. The angle of elevation from his eye to the top of
the tower is 30º. The heights of the tower is:
25. The perimeter of a rectangle is 26 cm. If its length is 3 cm more than its breadth, find the dimensions
of the rectangle.
26. Mia has a large bag of sweets.If she shares the sweets equally among 2,3,4,5 or 6 people there will
always be 1 sweet left over.What is the smallest number of sweets there could be in the bag?
Mia has a large bag of sweets. If she shares the sweets equally among 2,3,4,5 or 6 people. First find the LCM
that will gives us the least number of sweets distributed equally among 2,3,4,5 or 6 people.
2=2
3=3
4=2×2
5=5
6=2×3
LCM = 2 × 2 × 3 × 5 = 60.
That means if she has 60 sweets, she can shares them equally among 2,3,4,5 or 6 people.
Now we want to be 1 sweet left over.
So add 1 and 60.
60+1=61.
27. A boy was asked to multiply a certain number by 25 He multiplied it by 52 and got his answer more
by 324 than the correct answer The number to be multiplied was?
Let the number is x
The if be multiply by 25 then correct answer =25x
But boy multiply with 52 then boys answer =52 x
As per question boy answer if more then 324 than correct answer
∴52x=25x+324
⇒52x−25x=324
⇒27x=324
⇒x=12
28. A two-digit number is such that the product of its digits is 8.When 18 is added to the number, the
digits are reversed. The number is:
29. Reena took a loan of Rs. 1200 with simple interest for as many years as the rate of interest. If she
paid Rs. 432 as interest at the end of the loan period, what was the rate of interest?
30. Out of 7 consonants and 4 vowels, how many words of 3 consonants and 2 vowels can be formed?
31. On the circle there are 9 points selected. How many triangles in these points exits?
32. Suppose a=2, b=8. Find the arithmetic mean and geometric mean.
AM = (a+b)/2 = (2+8)/2 = 5
GM = √(ab) = √(2*8) = 4
Solution:
The mode is 11 because 11 occurred more times than the other numbers.
If the observations are given in the form of a frequency table, the mode is the value that has the highest
frequency.
Marks 1 2 3 4 5
Frequency 6 7 7 5 3
Solution:
The marks 2 and 3 have the highest frequency. So, the modes are 2 and 3.
Note: The above example shows that a set of observations may have more than one mode.
36. The following frequency table shows the marks obtained by students in a quiz. Given that 4 is the
mode, what is the least value for x?
Marks 1 2 3 4 5 6
Solution:
x is as least 12
(if x is less than 12 then 4 will not be the mode)
When the number of observations is odd, the median is the middle value.
When the number of observations is even, the median is the average of the two middle values.
39. x is the median for 4, 3, 8, x and 7. Find the possible values for x.
Solution:
40. The set of scores 12, 5, 7, -8, x, 10 has a mean of 5. Find the value of x.
Solution:
41. 10 students of a class had a mean score of 70. The remaining 15 students of the class had mean score
of 80. What is the mean score of the entire class?
Solution:
Total score of first 10 students = 10 × 70 = 700
Total score of remaining 15 students = 15 × 80 = 1200
Mean score of whole class
42. A coin is thrown 3 times. what is the probability that at least one head is obtained?
Sample space = [HHH, HHT, HTH, THH, TTH, THT, HTT, TTT]
43. What is the probability of getting a sum of 7 when two dice are thrown?
Favorable cases = (1, 6) (6, 1) (2, 5) (5, 2) (3, 4) (4, 3) --- 6 ways.
44. Three dice are rolled together. What is the probability as getting at least one '4'?
Probability of getting number ‘4’ at least one time = 1 – (Probability of getting no number 4) = 1 – (5/6) x (5/6) x
(5/6) = 91/216
45. Find the probability of getting two heads when five coins are tossed.
46. A die is rolled, find the probability that an even number is obtained.
Solution
A probability is always greater than or equal to 0 and less than or equal to 1, hence only a) and c) above cannot
represent probabilities: -0.00010 is less than 0 and 1.001 is greater than 1.
48. A card is drawn at random from a deck of cards. Find the probability of getting a queen.
49. A jar contains 3 red marbles, 7 green marbles and 10 white marbles. If a marble is drawn from the
jar at random, what is the probability that this marble is white?
color frequency
red 3
green 7
white 10
total=3+7+10=20
P(E) = Frequency for white color / Total frequencies in the above table
= 10 / 20 = 1 / 2
50. Studenst in a math class where 40% are males and 60% are females took a test. 50% of the males
and 70% of the females passed the test. What percent of students passed the test?
Let events E1 "be a male" and E2 "be a female", and event A "passed the test".
P(A)=P(A|E1)P(E1)+P(A|E2)P(E2)
=50%×40%+70%×60%=62%
51. 5% of a population have a flu and the remaining 95% do not have this flu. A test is used to detect the
flu and this test is positive in 95% of people with a flu and is also (falsely) positive in 1% of the people
with no flu. If a person from this population is randomly selected and tested, what is the probability
that the test is positive?
52. A card is drawn form a pack of 52 cards. What is the probability of getting a queen of club or a king
of heart
First, we will find the number of favorable outcomes and total outcomes. The total number of cards in the pack is 52.
Therefore, the total number of possible outcomes when a card is picked from the pack is 52. Next, we will find the
number of favorable outcomes. There are 4 queens (1 each of clubs, spades, diamonds, hearts) in a pack. Thus, there
is only 1 queen of clubs in a pack of 52 cards. Similarly, there are 4 kings (1 each of clubs, spades, diamonds, hearts)
in a pack. Thus, there is only 1 king of hearts in a pack of 52 cards. We need the probability of getting either a king
of hearts, or a queen of clubs when 1 card is drawn from a pack of 52 cards Therefore, the number of favorable
outcomes is 2. Finally, we will use the formula for probability of an event to calculate the probability of getting a card
of diamond. Let E be the event of getting a queen of clubs or a king of hearts. Substituting 2 for the number of favorable
outcomes, and 52 for the number of total outcomes in the formula, we get
⇒P(E)=2/52 = 1/26
53. A certain password must contain 3 distinct digits followed by 2 distinct capital letters. Given ten digits
and 26 capital letters, how many different passwords are possible?
List the number of possible options for each character in the password. There are 10 possibilities for the first digit, 9
left for the second, and 8 left for the third. There are 26 possibilities for the first letter and 25 for the second. There
are 10 × 9 × 8 × 26 × 25 = 468,000 possible passwords.
54. A bag contains 6 black and 8 white balls. One ball is drawn at random. What is the probability that
the ball drawn is white?
55. Find the probability that a number selected from the numbers 1 to 25 is not a prime number when
each of the given numbers is equally likely to be selected.
56. A box contains 3 red, 3 white and 3 green balls. A ball is selected at random. Find the probability
that the ball picked up is neither a white nor a red ball:
57. A letter is chosen at random from the letters of the English alphabet The probability that it is not a
vowel is?
There are 26 letters of which 21 are consonants Therefore
P(not a vowel)=21/26
58. What is the probability of selecting 'W' from the letters of the word SWORD?
59. If the letters of the word RANDOM be arranged at random, the probability that there are exactly 2
letters in between A and O is
• digress: turn aside from the main subject • conscientious: characterized by extreme
of attention care and great effort
President digressed from the economic we need to compile the report
subject to the self-motivated political talk conscientiously
• dissent: a difference of opinion • laudable: worthy of high praise
two members out of five dissented from The goal to keep the firm afloat may have
implementing the product. seemed laudable.
• evince: give expression to • aggravating: making worse
These might be tolerable if they evinced at we should control the damage before it
least a teensy bit of cleverness or humor, but aggravates
no such luck. • palatable: acceptable to the taste or mind
• execrable: of very poor quality or This dish is palatable and finest to my taste.
condition • ubiquitous: being present everywhere at
given their execrable record we are not sure once
they will start performing according to our this man seems to be ubiquitous.
expectation. • conglomerate: collect or gather
• forestall: keep from happening or arising; this company is a conglomerate of various
make impossible technocrats from diverse field.
we need to install the required control to • mull: reflect deeply on a subject
forestall such events he mulled on the subject
• indite: produce a literary work • intrigue: cause to be interested or curious
After that, he added from his own stores, the drops of the water intrigued me to do a
and indited the conclusion as I have already further investigation
described. • riveting: capable of arousing and holding
• interpolate: insert words into texts, often the attention
falsifying it thereby the movie tells a riveting story
extract of the discussion should be • inexplicable: incapable of being
interpolated into the existing paper explained or accounted for
“This kind of deviation in course is simply Their aim is to determine the provenance of
inexplicable.” the audit findings
• immaculate: completely neat and clean • accord: concurrence of opinion
There were golf courses, tennis courts, pools For this exception you may want to accord
and immaculate beach fronts. director's approval
• consummate: perfect and complete in • multitude: a large indefinite number
every respect I think there’s a multitude of reasons for
for this project to be fully consummated, that.
we need to work together • cognizance: having knowledge of
• redact: prepare for publication by Please take cognizance of this issue
correcting, revising, or adapting • contentious: involving or likely to cause
can we redact the questions paper before we controversy
roll it out to the masses? the statement made by the opponents is
• confined: being in captivity likely to be contentious.
we should confine the infestation before it • precision: the quality of being exact
proliferates. In this kind of situation, the tab is not
• disparate: fundamentally different or calculated with any precision.
distinct in quality or kind • conundrum: a difficult problem
These two are seemingly disparate Nevertheless, it is a vexing conundrum that
technologies. frustrates even the billionaire founders of
• dubious: fraught with uncertainty or doubt these firms.
it’s a dubious project. • inundated: covered with water
• imminent: about to occur he was inundated with emails.
this risk is imminent • evasive: avoiding or escaping from
• contention: a dispute where there is difficulty or danger
strong disagreement the management were certainly been evasive
they have point of contention over the in interrogating the criminals.
increase of security incidents. • disparage: express a negative opinion of
• provenance: where something originated Salespeople I know disparage their more
or was nurtured successful competitors as lucky.
• indelible: not able to be removed or • profusion: the property of being
erased extremely abundant
A woman showing her thumb marked with we can expect a profusion of this
indelible election ink after voting. technology
• pernicious: exceedingly harmful • elusive: skillful at evading capture
this act was pernicious lets find a elusive skills which can be
• garner: assemble or get together utilized to solve this issue
he launched the website to garner support • polemically: involving controversy
from the leaders the comments made by the president were
• arbitrarily: in a random or indiscriminate polemically
manner • averse: strongly opposed
this code could arbitrarily run a rouge code I am averse of allowing this project risk
in the system • impervious: not admitting of passage or
• intrinsic: belonging to a thing by its very capable of being affected
nature the latest firewall is impervious to virus
As far as chemistry and biology are infestation
concerned, charge is an intrinsic property of • pertinence: relevance by virtue of being
these particles. applicable to the matter at hand
• inhibit: limit the range or extent of The reason to use Google Earth in this
And yet what makes this a good market to exercise is the utility and pertinence of the
expand to might also inhibit growth. zoom function.
• factor: anything that contributes causally • cavalier: showing a lack of concern or
to a result seriousness
we need to factor the cost in the sales Historians might take some offence at
presentation having their subject treated with such
• venerate: regard with feelings of respect cavalier disregard for reality.
and reverence • incongruity: the quality of disagreeing
we need to obey and venerate our parents there was incongruity in the management
• lucrative: producing a sizeable profit with respect to funding.
this deal was very much lucrative • fastidious: giving careful attention to
detail
he is a fastidious professional. the coding has abstruse calculations
• maverick: someone who exhibits • expatiate: add details, as to an account or
independence in thought and action idea
He was a maverick, a visionary, and ahead we need to expatiate the details further
of his time. • derivative: a compound obtained from
• anarchy: a state of lawlessness and another compound
disorder these requirements are derivative from the
this state is under anarchy original contract
• exacerbate: make worse • augment: enlarge or increase
this can exacerbate further If wearable computers take off, augmented
• nefarious: extremely wicked reality games like The Dustcloud could find
hackers carry out nefarious act. a wide audience.
• infuriating: extremely annoying or • unequivocally: in an unambiguous
displeasing manner
this act was infuriating. The project was treated in unequivocally
• annotate: add explanatory notes to or manner
supply with critical comments • behest: an authoritative command or
can you annotate the details in the white request
paper? its at the behest of the king to release the
• pragmatic: concerned with practical funds
matters • intricacy: the quality of having
its pragmatic to incorporate the financial elaborately complex detail
sheet in the plan there could be intricacy in applying these
• remonstrate: argue in protest or opposition patches on the server
"I think your scoreboard is exaggerating a • cardinal: serving as an essential
bit!" he remonstrates. component
• sedulous: marked by care and persistent The industry has committed the cardinal sin
effort of getting high on its own supply.
They were sedulous in carrying out the • onerous: burdensome or difficult to
audits. endure
• abstruse: difficult to understand this could be an onerous task
• relinquish: turn away from; give up • anarchic: without law or control
you may need to relinquish the desire to The other type of fairy tale is completely
have this cab. anarchic and anti-establishment.
• banal: repeated too often; overfamiliar • contour: form the outlines of
through overuse the contour of the political polls is that we
Greek salads are usually banal here. will have a majority.
• interminable: tiresomely long; seemingly • promulgated: formally made public
without end this incident was first promulgated by this
this was an interminable task to complete team
in a record time • erudite: having or showing profound
• preponderate: weigh more heavily knowledge
The evidence in this case does not clearly he is an erudite professional
preponderate in favor of the veteran. • paradigm: the generally accepted
• profusely: in an abundant manner perspective of a discipline
It needs little food, grows quickly and “You have to change the paradigm to get
breeds profusely. out of it.”
• commemorate: call to remembrance • elusive: skillful at evading capture
We commemorate and look back at the the stability of such changes in virus could
goals and objectives of the sorority and be elusive
fraternity. • plummet: drop sharply
• naivete: lack of sophistication or Public school enrollment has plummeted in
worldliness recent years
he was sounding naivete • congregate: come together, usually for a
• gargantuan: of great mass; huge and bulky purpose
this will need gargantuan efforts move this this institution is congregated of various
project divisions
• premise: a statement that is assumed to be • plethora: extreme excess
true and from which a conclusion can be They already use a plethora of cloud/SaaS
drawn services, many of which are already
The premise of this discussion was to align integrated together.
the BC seats.
• avalanche: a slide of large masses of • preponderant: having superior power and
snow, ice and mud down a mountain influence
"I feel like my vote has gotten pretty British trade over last two centuries has been
worthless in the avalanche of sanctimony preponderant
that has swallowed it," Le Batard wrote. • onerous: great deal of efforts, burdensome
• appease: make peace with or difficult to endure
they are trying to appease the other party we need to see that the process should not be
• falter: move hesitatingly, as if about to onerous to the owners.
give way • perpetuate: cause to continue or prevail
the investigation team appears to be the cause for this problem to perpetuate is
faltering for many known reasons absence of anti-virus
• infallible: incapable of failure or error • fallacious: based on an incorrect or
the design of the process is not infallible misleading notion or information
• veracious: habitually speaking the truth this incident is based on fallacious facts
he is a veracious person • enunciate: express or state clearly
• forge: make a copy of with the intent to can you enunciate the issue?
deceive • preamble: make a preliminary
he forged the documentation at his own will introduction, as to a formal document
• clandestine: conducted with or marked by “Well, first of all, that’s a very good
hidden aims or methods preamble for your question,” Alderson said.
they are not prepared for this kind of • corroborative: serving to support or
clandestine activity corroborate
• ratify: approve and express assent, to make this a strong case we will need more
responsibility, or obligation corroborative evidence
The cabinet decision still needs to be • elucidate: make free from confusion or
ratified by the full council. ambiguity; make clear
• pristine: immaculately clean and unused The science is elucidating the possibilities
A pristine environment, they hoped, would and the probabilities but how to act and how
help attract the businesses that would raise to react is your own values.
incomes and swell the population. • naught: a quantity of no importance
"You can spend all the money in the world, the dictum for this account is to follow the
but it is all for naught if you can't get the information security policies
voters out," Armistead said. • propensity: a natural inclination
• slew: a large number or amount or extent Yes, the rich's propensity to buy products is
there have been slew of such incidents in low because they already have everything.
this month • lackadaisical: idle or indolent especially
• purge: rid of impurities in a dreamy way
we need to purge the data to remove all the people were lackadaisical during the fire
anomalies. drill
• transgression • myriad: a large indefinite number
the violation of a law or a duty or moral we have seen myriad images on the
principle network which seems to be having
• internecine: within a group or confidential information
organization • heterogeneous: consisting of elements not
They are in a state of serious internecine of the same kind or nature
conflict. it is a heterogeneous network
• modality: the manner or style in which • analogy: drawing a comparison in order
something is done to show a similarity
we can work out the modality on how to For a start, arguments by analogy are silly,
implement the process he says.
• subtlety: the quality of being difficult to • resonate: evoke or suggest a strong
detect or analyze meaning or belief
There is little reward for subtlety or surprise Management hope that this policy will
on prime time. resonate with the employees requirements.
• caption: brief description accompanying • preclude: keep from happening or arising
an illustration the change in policy will not necessarily
attached is the report on captioned audit preclude users from carrying mobile phones
• interject: speak abruptly, especially as an • embellish: make more attractive, as by
interruption adding ornament or color
Can I interject in this conversation?
• dictum: an authoritative declaration
Sometimes the fraud consists of little more • facet: a distinct feature or element in a
than embellishing stories to make them problem
seem more believable. there are many facets of the same problem
• surreptitiously • colossal: so great in size or force or extent
in a secretive manner as to elicit awe
the act was carried out in surreptitious Some analysts said executing the colossal
manner project could be a challenge.
• transpire: come about, happen, or occur • corollary: an inference following from the
exactly what transpired between the proof of another proposition
management and our team was never known The corollary is that people want to be in
to us. control of how far those lines are blurred.
• plausible: apparently reasonable, valid, or • austerity: excessive sternness
truthful we need to have a short term austerity
its sound plausible to conduct the test within measures
the limited time period • humongous: very large
• imperceptible: impossible or difficult to there can be a humongous returns earned
sense • insurmountable: not capable of being
the threat landscape due to the cloud overcome
computing model is imperceptible to many It is insurmountable to resolve this issue.
securities companies. • tenuous: lacking substance or
• strenuous: taxing to the utmost; testing significance
powers of endurance These arguments have become increasingly
it will be an strenuous efforts for companies tenuous over time.
to deploy such controls • sanguine: confidently optimistic and
• unsavory: morally offensive cheerful
the content on the internet may be unsavory Other investors in the bookseller were much
to a certain class of audience less sanguine about the move.
• satire: witty language used to convey • thwart: hinder or prevent, as an effort,
insults or scorn plan, or desire
there is no need for political satire no controls can thwart the pernicious bug
that has plagued the network.
• deplorable: of very poor quality or • transient: lasting a very short time
condition The viewing of customer data within the
"This is deplorable behavior on the part of a CRM application is transient, and not
member state." stored.
• elongate: lengthen • incendiary: capable of causing fires or
the meeting was elongated due to catching fire spontaneously
unnecessary arguments. he was accused due to his incendiary
• immutable: not subject or susceptible to remarks on the government
change or variation • candor: the quality of being honest and
Really, the idea of an immutable and straightforward
unchangeable text dates only to the printing companies should have trust and candor for
press. its employees
• multifarious: having many aspects • pandemonium: a state of extreme
we need to conduct this test in multifarious confusion and disorder
ways. the scene was all havoc and pandemonium
• gravitas: formality, dignity, or seriousness • amorphous: having no definite form or
This success brought the much-needed distinct shape
gravitas. lets not have amorphous goals.
• moratorium: suspension of an ongoing • empiric: derived from experiment and
activity observation rather than theory
can we impose an immediate moratorium There is no one, no single one, real empiric
on the access of the users till the issue is proof that ratifies the existence of
resolved? anthropogenic global warming.
• polarize: cause to concentrate about two • emolument: compensation received by
conflicting positions virtue of holding an office
can you polarize this issue from the existing His emoluments were gradually augmented
audits? • abashed: feeling or caused to feel uneasy
• expeditiously: with efficiency; in an and self-conscious
efficient manner Ash was abashed seeing his father in the
our team needs to work on this issue movie
expeditiously
• aberrant: markedly different from an • arbitrate: act between parties with a view
accepted norm to reconciling differences
being gay is considered aberrant in the • opprobrium: a state of extreme dishonor
soceity • loquacious: full of trivial conversation
• abet: assist or encourage, usually in some • petulance: an irritable feeling
wrong doing • neophyte: any new participant in some
he abated him to smoke activity
• abeyance: temporary cessation or • poignant: keenly distressing to the mind
suspension or feelings
The project plan is in abeyance due to the • capacious: large in the amount that can be
changes in the infrastructure. contained
• poseur: a person who habitually pretends • veracity: unwillingness to tell lies
to be something he is not
• convoluted: highly complex or intricate
Which ones were the real artists and which
• obsequious: attempting to win favor from
ones were the poseurs?
influential people by flattery
• rumination: a calm, lengthy, intent
• ruminate: reflect deeply on a subject
consideration
• yearn: desire strongly or persistently
we should not ruminate what could go
• grumpy: annoyed and irritable
wrong instead work toward resolving the
• propitious: presenting favorable
issues on hand
circumstances
• petulant: easily irritated or annoyed
• opportune: suitable or advantageous
• impute: attribute or credit to
especially for a particular purpose
• ostentatious: intended to attract notice and
• recapitulate: summarize briefly
impress others
• pivotal: being of crucial importance
• demeanor: the way a person behaves
• prolific: intellectually productive
toward other people
• articulate: express or state clearly
• impromptu: with little or no preparation
• proliferation: a rapid increase in number
or forethought
• destitute: poor enough to need help from
• pronouncement: an authoritative
others
declaration
• eminent: standing above others in quality • obliquely: not in a direct or
or position straightforward manner
• inevitable: incapable of being avoided or • enervate: weaken physically, mentally, or
prevented morally
• exaggerated: enlarged to an abnormal • contentious: showing an inclination to
degree disagree
• insistent: repetitive and persistent • impervious: not admitting of passage or
• induced: brought about or caused capable of being affected
• reconnaissance: the act of scouting, • preposterous: inviting ridicule
especially to gain information. • refutation: the act of determining that
• contemplation: a calm, lengthy, intent something is false
consideration • trivial (informal) small and of little
• repellent: serving or tending to cause importance
aversion • provocative: serving or tending to excite
• elicit: deduce or construe or stimulate
• upsurge: a sudden or abrupt strong • profound: situated at or extending to
increase great depth
• impetus: a force that makes something • horrendous: causing fear or dread or terror
happen • prerogative: a right reserved exclusively
• heed: careful attention by a person or group
• notorious: known widely and usually • gratifying: affording satisfaction or
unfavorably pleasure
• incorrigible: impervious to correction by • dissipated: unrestrained by convention or
punishment morality
• pervasive: spreading or spread throughout • convivial: occupied with or fond of the
• skim: remove from the surface pleasures of good company
• conflate: mix together different elements • denigrate: attack the good name and
behavior a tether
unpredictable undertaking)
holes disparage
Reference: https://www.hitbullseye.com/Vocab/List-of-Synonyms.php
Reference: https://leverageedu.com/blog/synonyms-list/
References:
https://www.frogview.com/preposition-exercise/
https://tripuraexam.in/search_mynote_1-paging-ENGLISH-00000_preposition.php
Join this group: https://www.facebook.com/groups/858042971559671
• We have been living here since 2001. • Neither She nor her sisters are present here.
• The people of Bangladesh are simple. • The committee were divided on the decision.
• The brave are always winners. • The police are the friends of the people.
• The rise and fall is inevitable. • Neither of the two men is responsible.
• Many a student is present here. • Money in addition to honor makes men
• Two dozen makes 24. unhappy.
• One of the boys is nice. • He said that ice floating on water was blue.
• He has been punished. • Many years have passed since I visited Taj
• Half of the work is done. Mahal.
• Neel with his brother is present. • No sooner had they reached the station, then
• There is a book on the Shelf. the train left.
• Without knowing I will not tell her. • The rain having stopped We started our
• The book is worth reading. • No, sooner had the teacher entered the class
• I watched him living away. • The headmaster had entered into the class
• I saw him to go. • When does Mr. Kamal take his breakfast?
• I fancy I turned a trifle pale. • We started the meeting after the guest has
been coming.
• It is many years since I saw you.
• You must better do the work.
• I already have forgot his address.
• Have you ever been to Cox's Bazar? • The boy ran away having taken the first
prize.
• He has left the place just now.
• I went to market last night with a view to
• Have you seen her lately?
buying a shirt.
• A number of students were present in the
• It is high time I changed my character.
class.
• He speaks as though he were a mad.
• We went there with a view to seeing you.
• The book has been published.
• Would you mind taking a cup of tea?
• If you helped the boy he would help you.
• One and a half, lemons are enough.
• He ran fast least he should miss the train.
• Five miles is not a long distance.
• He wanted the picture to be seen.
• While reading a book I saw a picture of an • It is high time you tried for a job.
ox. • I look forward to hearing from you.
• Ill news runs quickly. • Each of the boys is present in the class.
• No buses and no rickshaws are on the road. • I wish I were a philosopher.
• None of the girls has qualified. • Slow and steady wins the race.
• The wall has been printed. • It is high time we left the place.
• Rice and curry is my favorite food. • Would you mind closing the door please?
• Cattle are grazing in the field. • English is spoken across the world.
• The family is unanimous in the opinion. • I wish you could solve the problem.
• The virtuous are always happy. • It is high time we gave up smoking.
• One of the students does his homework. • Have you finished reading the book?
• Two plus two makes four. • An intensive search was conducted by the
• You, he and I are friends. detective to locate those criminals who had
• Rahim as well as his friends does well. Escaped.
• I found the boy crying on the bed. • We waited until the plane had taken off.
• I was called there yesterday. • He gave up playing football when he got
• Why did you go to market yesterday? married.
• It is no use spoiling time by gossiping. • She burnt her hand when she was cooking
• He talked as if he had known everything. dinner.
• You had better do the work. • In many ways riding a bicycle is Similar To
• I wish I met you ten years earlier. • The building has been left unoccupied since
• While he was walking in the garden a snake • The laptop was stolen by a thief.
bit him. • It is many years since he came to Dhaka.
• Lack of exercise and high fat diet have long • You, he and I are going to Dhaka.
been known to be factors in heart attack. • As soon as the teacher entered the classroom,
• Complete shutdown is being observed today all the students stood up.
against new law. • I met my favorite teacher yesterday.
• He talks as though he were a child. • He ran fast lest he should miss the train.
• He advised me to give up smoking. • Would that I could buy the car.
• Why have you done this? • Do not go anywhere until he comes back.
Part 3
Computer
(D) a first in first out approach 10. Choose correct statement about Functions in c
language
(B) a variable for storing address C. Every function may not return a value.
While-loop
12. Choose the correct statement about c language pass
by value.
7. How many values can be returned from a function? A. Pass by value copies the variable value in one more memory
location
(A) 1
B. Pass by value does not use pointers
(B) 2
C. Pass by value protect your source variable from changes in
(C) 3 outside functions.
13. Global variables are 19. Choose the correct statement about c structures.
A. Variable
20. Choose the correct statement about c structure
B. Functions elements
C. Structures A. Structure elements are stored on random free memory
locations
D. None of the above
B. Structure elements are stored on register memory location
C. auto
21. What is the size of c union?
D. volatile
A. C union is always 128 bytes
D. None of the above 23. User defined data type can be derived by
A. struct
A. Integer C. typedef
C. Char
D. Array
24. What is the main difference between structure and 30. A mode which is used to open an existing file for both
union? reading and writing is
A. There is no difference A. W
C. Union is faster C. A+
D. Structure is faster D. R+
25. The reason for using pointers in c program is 31. Select a function which is used to write a string to a
file
A. Pointers allow different functions to share and modify their
local variable A. pits()
27. Which header file should be included to use function 33. Select a function which is used as a formatted output
like malloc(), calloc()? file function
A. memory.h A. printf()
B. stdlib.h B. fprintf()
C. dos.h C. puts()
D. string.h D. fputs()
28. How will you free the allocated space? 34. The data type of file pointer is
A. remove(variable-name) A. int
B. free(variable-name) B. double
C. delete(variable-name) C. void
D. dealloc(variable-name) D. FILE
A. int type
B. char * type
C. struct type
35. What is the need of closing a file in c language? 41. Which function is related to dynamic memory
allocation:
A. fclose(fp) close a file to release the memory used in opening
a file. a. malloc();
D. Depend on compiler
43. A pointer variable can store
48. Array index is always starts from: 54. C has ………. keywords:
a. 0 a. 30
b. 1 b. 31
c. 2 c. 32
d. 3 d. 33
49. Which is the incorrect statement: 55. What is the only language that a computer
understands directly?
a. An array is the collection of variables.
(a) English
b. All array variables have same type.
(b) BASIC
c. Array variables can be used individually.
(c) machine language
d. None of these.
(d) Assembly Language
59. How will a class protect the code inside it? 65. Variable which uses same name in whole program
and in its all routines thus best classified as
(a) Using Access specifiers
(a) middle variable
(b) Abstraction
(b) default variable
(c) Use of Inheritance
(c) local variable
(d) All of the mentioned
(d) global variable
61. Which of the following supports the concept of 67. Technique of using fixed words for machine code
hierarchical classification? functions is classified as
62. Which of the following concept is often expressed by 68. 'object program' is also called
the phrase, ‘One interface, multiple methods’?
(a) program code
(a) Abstraction
(b) machine code
(b) Polymorphism
(c) assembler
(c) Inheritance
(d) compiler
(d) Encapsulation
71. Which character is used to indicate the end of the 77. Left most bit 0 in Singed representation indicates.?
string?
A) A Positive number
(A) Any alphabet
B) A Negative Number
(B) A
C) An Unsigned number
(C) Null
D) None of the above
(D) None of these
B) Procedural c) Constants
D) Functional
80. What is the valid range of numbers for int type of
data?
74. C language was invented in which laboratories.?
a) 0 to 256
A) Uniliver Labs
b) -32768 to +32767
B) IBM Labs
c) -65536 to +65536
C) AT&T Bell Labs
d) No specific range
D) Verizon Labs
D) Unix
76. Size of float, double and long double in Bytes are.? 82. String constants should be enclosed between ___
A) 4, 8, 16 a) Single quotes
B) 4, 8, 10 b) Double quotes
C) 2, 4, 6 c) Both a and b
D) 4, 6, 8 d) None of these
83. Which of the following is an example of compounded 89. The printf() function retunes which value when an
assignment statement? error occurs?
b) a+=5 b) Zero
84. The operator && is an example for ___ operator. 90. Null character is represented by
a) Assignment a) \n
b) Increment b) \0
c) Logical c) \o
d) Rational d) \e
85. The operator & is used for 91. Which among the following is an unconditional
control structure
a) Bitwise AND
a) do-while
b) Bitwise OR
b) if-else
c) Logical AND
c) goto
d) Logical OR
d) for
87. Which of the following is a ternary operator? 93. Which of the following is a keyword is used for a
storage class
a) ?:
a) printf
b) *
b) external
c) sizeof
c) auto
d) ^
d) scanf
94. A Link is
88. p++ executes faster than p+1 because
a) a compiler
a) p uses registers
b) an active debugger
b) p++ is a single instruction
c) a C interpreter
c) ++ is faster than +
d) an analyzing tool in C
d) None of these
d) None of these
102. In C++, a function contained within a class is called
(A) a method
96. If the size of the array is less than the number of
initializers then, (B) a class function
d) Size is neglected when values are given 103. Which of the following is not an OOPS concept?
a. Encapsulation
b. Polymorphism
c. Exception
97. What is used as a terminator in C?
d. Abstraction
a) ?
b) ;
104. Which feature of OOPS described the reusability of
c) : code?
d) _ a. Abstraction
b. Encapsulation
c. Polymorphism
d. Inheritance
98. What is the answer of: 7%3
a) 2.5
105. Which feature of OOPS derives the class from
b) 1
another class?
c) 2 a. Inheritance
b. Data hiding
d) 3 c. Encapsulation
d. Polymorphism
d) for
108. Which two features of object-oriented programming 115. Which of the following feature is also known as run-
are the same? time binding or late binding?
a. Abstraction and Polymorphism features are the same a. Dynamic typing
b. Inheritance and Encapsulation features are the same b. Dynamic loading
c. Encapsulation and Polymorphism features are the same c. Dynamic binding
d. Encapsulation and Abstraction d. Data hiding
109. Which of the following definition is incorrect for 116. Which of the following OOP concept binds the code
polymorphism? and data together and keeps them secure from the
a. Polymorphism helps in redefining the same functionality outside world?
b. Polymorphism concept is the feature of object-oriented a. Polymorphism
programming (OOP) b. Inheritance
c. It always increases the overhead of function definition c. Abstraction
d. Ease in the readability of the program d. Encapsulation
110. Which among the following cannot be used for the 117. Which member of the superclass is never accessible
concept of polymorphism? to the subclass?
a. Static member function a. Public member
b. Constructor Overloading b. Protected member
c. Member function overloading c. Private member
d. Global member function d. All of the mentioned
111. Which function best describe the concept of 118. Which class cannot create its instance?
polymorphism in programming languages? a. Parent class
a. Class member function b. Nested class
b. Virtual function c. Anonymous class
c. Inline function d. Abstract class
d. Undefined function
113. Which member function is assumed to call first when 120. How can the concept of encapsulation be achieved in
there is a case of using function overloading or the program?
abstract class? a. By using the Access specifiers
a. Global function b. By using the concept of Abstraction
b. Local function c. By using only private members
c. Function with lowest priority d. By using the concept of Inheritance
d. Function with the highest priority
122. Which among the following feature does not come 133. Which of the following operators always takes no
under the concept of OOPS? argument if overloaded?
(d) +
123. Which of the following feature interacts one object
with another object?
124. Message reading 134. The keyword that is used that the variable can not
125. Message passing change state?
126. Data transfer
(a) static
127. Data binding
(b) friend
(c) private
128. Which definition best defines the concept of
abstraction? (d) const
a. Hides the important data
b. Hides the implementation and showing only the features
c. Hiding the implementation 135. In OOP a class is an example of:
d. Showing the important data
(a) Data Type
131. To convert from a user-defined class to a basic type, 137. A static member function cannot be declared
you would most likely use
(a) Explicit
(a) an overloaded = operator
(b) Implicit
(b) a one-argument constructor
(c) Static
(c) a built-in conversion operator
(d) Virtual
(d) a conversion operator that‘s a member of the class
138. We can get only one unique value which can be used
132. The main function of scope resolution operator (::) is, by all the objects of that class by the use of
(c) To link the definition of an identifier to its declaration (c) static variables
139. Friend functions are _____________ functions of a 145. When a variable is define as static in a class then all
class object of this class
140. _______ remain in memory even when all objects of 146. When the base class and the derived class have a
a class have been destroyed member function with the same name, you must be
more specific which function you want to call using
(a) Primitive variables ___________
(b) Instance variable (a) Operator overloading
(c) Static variables (b) null operator
(d) None of these (c) scope resolution operator
151. __________ Operator will take only one operand 157. Which of the following best defines a class?
152. Class is _________ abstraction. 158. Which header file is required in C++ to use OOP?
a) Object a) iostream.h
b) Logical b) stdio.h
c) Real c) stdlib.h
156. Which of the following operators cannot be 162. How members of an object are accessed?
overloaded?
a) Using dot operator/period symbol
(a) Scope resolution operator ( :: )
b) Using scope resolution operator
(b) Insertion operator ( << )
c) Using member names directly
(c) Extraction operator ( >> )
d) Using pointer only
(d) The relation operator ( > )
163. Object declared in main() function _____________ 170. Which option is false about the final keyword?
a) Can be used by any other function a) A final method cannot be overridden in its subclasses.
b) A final class cannot be extended.
b) Can be used by main() function of any other program c) A final class cannot extend other classes.
d) A final method can be inherited.
c) Can’t be used by any other function
c) Size of the largest size of variable 172. Who invented Java Programming?
b) James Gosling
165. Which of the following option leads to the portability c) Dennis Ritchie
programs. a) JRE
a) JVM
b) JIT
b) JRE
c) JDK c) JDK
d) JDB
d) JVM
c) JAVA
169. What do you mean by nameless objects?
a) An object created by using the new keyword. d) JAVA_HOME
b) An object of a superclass created in the subclass.
c) An object without having any name but having a
reference.
d) An object that has no reference.
176. What is the extension of compiled java classes? 178. Which of these keywords can be used to prevent
Method overriding in Java?
a) .txt
a) final
b) .js
b) protected
c) .class
c) static
d) .java
d) constant
177. Which exception is thrown when java is out of
memory?
D.JAVAC
To practice small codes that comes in admission test these videos (follow the link) helped me a lot and I believe you will correct most of the
admission test mcq’s if you learn these examples shown in these two videos.
https://youtu.be/EmYvmSoTZko
https://youtu.be/AlOQMTr5zD0
1. The communication mode that supports data in both 7. Which Project 802 standard provides for a collision-
directions at the same time is……….. free protocol?
A. simplex A. 802.2
B. half-duplex B. 802.3
C. full-duplex C. 802.5
D. multiplex D. 802.6
2. Why was the OSI model developed? 8. The 802.5 standard implements a way for preventing
collisions on the network. How are collisions
A. manufacturers disliked the TCP/IP protocol suite prevented when using this standard?
B. the rate of data transfer was increasing exponentially A. CSMA/CD
C. Session
4. CRC stands for __________
D. Presentation
a) Cyclic redundancy check
b) Code repeat check
c) Code redundancy check
d) Cyclic repeat check 10. Bridge works in which layer of the OSI model?
A. Application layer
6. Pure ALOHA has a maximum throughput of --------- B. Packets may arrive out of order
C. 7.4 %
D. 1 %
12. The Internet is an example of……. 18. Which of the following device is used to connect two
systems, especially if the systems use different
A. Cell switched network protocols?
D. repeater
13. What is the use of Ping command?
A. To test a device on the network is reachable 19. _______ can detect burst error of length less than or
equal to degree of the polynomial and detects burst
B. To test a hard disk fault errors that affect odd number of bits.
C. To test a bug in an Application A. Hamming Code
D. To test a Pinter Quality B. CRC
C. VRC
14. The combination of an IP address and a port D. None of the above
number is known as___________
A. network number
20. The PSTN is an example of a …………………
B. socket address network.
C. subnet mask number A. packet switched
D. MAC address B. circuit switched
C. message switched
15. Which of the following is reliable communication? D. None of these
A. TCP
C. spider tree
16. What is the size of Host bits in Class B of IP
address? D. none of the mentioned
A. 04
A. FTP
B. SNMP
C. SMTP
D. RPC
23. FDDI is a 29. A small network making up the Internet and also
having a small numbers of computers within it is
A. ring network called…………..
D. 255.255.255.255
26. Which transmission media has the highest
transmission speed in a network?
32. What is the port number for HTTP?
A. coaxial cable
A. 99
B. twisted pair cable
B. 86
C. optical fiber
C. 80
D. electrical cable
D. 23
D. Microwave C. 255.255.0.0
D. 255.255.255.0
28. What does the acronym ISDN stand for?
34. Which Layer is Responsible for Congestion 40. What is the first octet range for a class A IP
Control? address?
35. Which of these is a feature of hubs? 41. What is the first octet range for a class B IP
address?
A. Hubs amplifies the incoming signal.
A. 128 - 255
B. Hubs understand frames, packets or headers
B. 1 - 127
C. All lines coming into a Hub must operate at a same speed.
C. 192 - 223
D. all of these
D. 128 – 191
D. Data Link
37. The main difference between TCP and UDP is
A. UDP is connection oriented whereas TCP is datagram service 43. A __________ is a device that forwards packets
B. TCP is an Internet protocol whereas UDP is an ATM protocol between networks by processing the routing
information included in the packet.
C. UDP is a datagram whereas TCP is a connection-oriented
service a. Bridge
b. Firewall
D. All of the above c. Router
d. Hub
D. Router
45. Which of the following networks extends a private
39. In OSI model, which of the following layer provides network across public networks?
error-free delivery of data? a) Local area network
b) Virtual private network
A. Data link c) Enterprise private network
d) Storage area network
B. Network
C. transport
D. Session
46. Which of the following layers is an addition to OSI 54. In TDM, the transmission rate of a multiplexed path
model when compared with TCP IP model? is always _______ the sum of the transmission
a) Application layer a) Greater than
b) Presentation layer b) Lesser than
c) Session layer c) Equal to
d) Session and Presentation layer d) Equal to or greater than
47. The functionalities of the presentation layer include 55. Propagation delay depends on ___________
____________ a) Packet length
a) Data compression b) Transmission rate
b) Data encryption c) Distance between the routers
c) Data description d) Speed of the CPU
d) All of the mentioned
B. Gateway
52. The state when dedicated signals are idle are called 59. TELNET used _________ protocol for data
__________ connection
a) Death period
b) Poison period A. TCP
c) Silent period
d) Stop period B. UDP
C. IP
a) digital modulation
D. DHCP server
b) 128 bytes
c) 64 bits
d) 128 bits
63. Which protocol below operates at the network layer
in the OSI model? 70. Communication between a computer and a keyboard
involves……….transmission
A. IP
B. ICMP
a) Automatic
b) Half-duplex
C. RARP c) Full-duplex
64. Which of the IP headers decides when the packet 71. MAC address is of
should be discarded?
a) 24 bits
A. Fragment control b) 36 bits
B. TTL c) 42 bits
d) 48 bits
C. Checksum
65. Which port is reserved for use of the SMTP a) MAC address
protocol? b) IP address
A. 21 c) both MAC address and IP address
d) none of the mentioned
B. 23
a) 10 mbps
d) none of the mentioned
74. What flavor of Network Address 80. A local telephone network is an example of
Translation can be used to have one IP a……network.
address allow many users to connect to
the global Internet? a) Packet switched
b) Circuit switched
a) NAT
c) Both Packet switched and Circuit switched
b) Static
d) Line switched
c) Dynamic
d) PAT 81. Most packet switches use …………. principle
a) CDMA
b) CSMA/CA
83. FTP is built on architecture
c) ALOHA
d) None of the mentioned a) Client-server
b) P2P
77. Multiplexing is used in
c) Both of the mentioned
a) Packet switching d) None of the mentioned
b) Circuit switching
84. FTP uses parallel TCP
c) Data switching connections to transfer a file
d) Packet & Circuit switching
a) 1
b) 2
78. A list of protocols used by a system, one protocol per
layer, is called c) 3
d) 4
a) protocol architecture
b) protocol stack 85. If you have to send multimedia data over SMTP it
has to be encoded into
c) protocol suite
d) none of the mentioned a) Binary
b) Signal
79. Which multiplexing technique transmits digital
signals?
c) ASCII
d) None of the mentioned
a) FDM
b) TDM 86. Secure shell (SSH) network protocol is used for……..
c) WDM
d) FDM & WDM a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned
87. SSH uses to authenticate the 93. Where is a hub specified in the OSI model?
remote computer.
A. Session layer
a) public-key cryptography
B. Physical layer
b) private-key cryptography
C. Data Link layer
c) any of public-key or private-key
D. Application layer
d) both public-key & private-key
94. IPsec is designed to provide the security at the
parameters
b) 48 bytes
c) 64 bytes
c) grants a IP address when receives a request from a client
d) 128 bytes
d) all of the mentioned
99. Frame relay has error detection at the
92. Which protocol does DHCP use at the Transport
layer? a) physical layer
b) data link layer
a) IP c) network layer
b) TCP d) transport layer
c) UDP
d) ARP 100. In classless addressing, there are no classes but
addresses are still granted in
a) IPs
b) Blocks
c) Codes
d) Sizes
a) Huge number of systems on the internet 109. In TCP, sending and receiving data is done as
b) Very low number of system on the internet
a) Stream of bytes
c) Providing standard address
b) Sequence of characters
d) None of the mentioned
c) Lines of data
103. Which of the following is the d) Packets
broadcast address for a Class B
network ID using the default
subnetmask? 110. TCP groups a number of bytes together into a packet
called
a) 172.16.10.255
b) 255.255.255.255 a) Packet
c) 172.16.255.255
b) Buffer
d) 172.255.255.255
c) Segment
d) Stack
c) HTTP
d) None of the mentioned 114. What is the main reason the OSI model was created?
A. NCP
C. So different networks could communicate.
B. HDLC
D. So Cisco could use the model.
115. The functions of a DNS server to convert 120. This is an IP address 168.212.226.204 which class
……………… name to ……………….. address? this address belong to?
a. Web address and DNS a. Class A
116. Active HUB is under -----layer but passive HUB is 121. A DNS client is called……….
under -----layer OSI model? a) DNS updater
a. Data link and network
b) DNS resolver
b. Physical and data link
c) DNS handler
c. physical and zero
d) none of the mentioned
d. network and transport
d. None
124. Which one of the following allows client to update
119. The datalink layer takes the packet from---------------
their DNS entry as their IP address change?
-------- and encapsulates them into frame
a) dynamic DNS
transmission.
a. Network layer b) mail transfer agent
d. Application layer
126. Which multiple access technique is used by IEEE 131. In TCP/IP network, the port address is
802.11 standard for wireless LAN? (a) 16-bit
a) CDMA
(b) 32-bit
b) CSMA/CA
(c) 64-bit
c) ALOHA
(d) 128-bit
d) none of the mentioned
135. Bluetooth is the wireless technology for……….. 140. Which protocol assigns IP address to the client
a) local area network connected in the internet?
a) DHCP
b) personal area network
b) IP
c) both (a) and (b)
c) RPC
d) none of the mentioned
d) none of the mentioned
d) 40 piconets
c) bit cipher
145. After obtaining the IP address, to prevent the IP 150. IPv6 does not use ______ type of address
conflict the client may use a) Broadcast
a) internet relay chat
b) Multicast
b) broader gateway protocol
c) Anycast
c) address resolution protocol
d) None of the mentioned
d) none of the mentioned
147. SSH uses _______ to authenticate the remote 152. An applet __________
computer. (a) is an interpreted program that runs on the client
a) public-key cryptography
(b) tracks the number of visitors to a Website
b) private-key cryptography
(c) is a compiled program that usually runs on the client
c) both (a) and (b)
(d) collects data from visitors to a Website
d) none of the mentioned
155. IPV6 increases the size of the IP address from 160. Which error detection method involves the use of
(a) 64 to 132 bits parity bits?
(b) provide an extra measure of security 161. A DNS response is classified as ----- if the
information comes from a cache memory
(c) None of the above
b) Recursive
157. Frames from one LAN can be transmitted to
another LAN via the device – c) Unauthoritative
(a) Router
d) Iterative
(b) Repeater
(c) Modem
162. ------is a client-server program that provides an IP
(d) Bridge address, subnet mask, IP address of a router, and IP
address of a name server to a computer
d) Packet
163. What is the maximum data rate in IEEE 802.11n?
159. What is the maximum data rate of a channel with a
bandwidth of 200 KHz if we use four levels of digital
a) 300 Mbps
signaling?
b) 600 Mbps
c) 1000 Kbps
d) 1200 Kbps
164. Major function of a transport layer in the OSI 168. An Access point operates in which layer of OSI
model is to perform model?
165. An IPv6 basic header is fixed as 169. Which protocol provides e-mail facility among
different hosts?
A. FTP
a) 32 bytes long
B. SMTP
b) 40 bytes long
C. TELNET
c) 64 bits long
D. SNMP
d) 128 bit long
170. A wireless network uses .......... waves to transmit
signals.
166. Which of the following services uses both TCP and A. Mechanical
UDP ports?
B. Radio
C. Sound
a) DNS
D. Magnetic
b) TFTP
171. Firewalls are used to protect against .......
c) SSH
A. Unauthorized Access
d) TELNET
B. Virus Attacks
d. router
173. Application Layer protocols are HTTP, FTP, SSH, 186. BUS backbone uses LAN and Bridges.
DNS etc.
187. Star backbone uses Switch.
174. Presentation Layer protocols are SSL, MPEG, JPEG
etc. 188. IEEE 802.3 is ETHERNET
175. Session Layer protocols are API’s , Sockets etc. 189. Repeater works with volts or signals.
176. Transport Layer protocols are TCP, UDP 190. Getway connects different networks.
177. Network Layer protocols are routing, IP, IPsec, 191. Class C starts with 110 (binary) or 192 (dotted
ICMP, Packets etc. decimal)
178. Datalink Layer Protocols are Frame, PPP, Switch, 192. Session, Presentation and Application layers are user
Bridge etc. supported.
179. Physical Layer Protocols are Coax, Fiber, Hubs, 193. Kerbaros is an authentication service for passwords.
repeaters etc.
194. TCP is connection Oriented.
180. Address Resolution Protocol (ARP) is used to find
the hardware address of a local device. 195. IEEE 802.11 is a slang name for Wi-Fi
181. BUS, Ring and Star Topologies are mostly used in 196. In class A the range is 1-126 and there are 16M host.
LAN
197. In class B the range is 128-191 and there are 64k
182. Connection of telephone regional office is a practical host.
example of MESH topology.
198. In class C the range is 192-223 and there are 254 host
183. Cable TV and DSL are example of MAN.
199. Class D is used for Broadcasting
184. Repeaters are used in Ring topology.
200. Class E used for future use
185. Modulator and Demodulator combinedly known as
Modem.
1. The logical or mathematical model of a particular 6. Which of the following best describes an array?
organization of data is called a ………
a) A data structure that shows a hierarchical behavior
A) Data structure
b) Container of objects of similar types
B) Data arrangement
c) Arrays are immutable once initialized
C) Data configuration
d) Array is not a data structure
D) Data formation
11. Pushing an element into stack already having five 17. Can linked list be implemented using arrays? Yes
elements and stack size of 5, then stack becomes
a) Overflow
18. The data structure required to check whether an
b) Crash expression contains balanced parenthesis is?
c) Underflow a) Stack
c) Array
13. Which of the following concepts make extensive use (B) Complete binary tree
of arrays?
(C) M-way search tree
a) Binary trees
(D) Full binary tree
b) Scheduling of processes
c) Caching
20. What is the worst case for linear search?
d) Spatial locality
a) O(nlogn)
b) O(logn)
14. A vertex of in-degree zero in a directed graph is
called a/an c) O(n)
(C) Sink 21. If two trees have same structure and node content,
then they are called ____
(D) Articulation point
(A) Synonyms trees
(C) Planar
22. The time complexity of quicksort is ……..
(D) Completely connected
A. O(n)
16. To perform level-order traversal on a binary tree,
which of the following data structure will be B. O(logn)
required?
C. O(n2)
(A) Hash table
D. O(n logn)
(B) Queue
(D) Stack
23. Which of these is not an application of linked list? 29. The total number of comparisons in a bubble sort is
….
a) To implement file systems
A. O(n logn)
b) For separate chaining in hash-tables
B. O(2n)
c) To implement non-binary trees
C. O(n2)
d) Random Access of elements
D. O(n)
25. Quick sort is also known as …….. 31. What is the advantage of recursive approach than
an iterative approach?
A. merge sort
a) Consumes less memory
B. tree sort
b) Less code and easy to implement
C. shell sort
c) Consumes more memory
D. partition and exchange sort
d) More code has to be written
A. Merge A) Stacks
B. Heap B) List
C. Radix C) Strings
D. Bubble D) Trees
28. Two dimensional arrays are also called 34. Which data structure is needed to convert infix
notation to postfix notation?
A. tables arrays
a) Branch
B. matrix arrays
b) Tree
C. both of above
c) Queue
D. none of above
d) Stack
35. What is the result of the following operation? 40. Which of the following statements hold true for
binary trees?
Top (Push (S, X))
A. The left subtree of a node contains only nodes with keys less
a) X than the node’s key
b) X+S B. The right subtree of a node contains only nodes with keys
greater than the node’s key.
c) S
C. Both a and b above
d) SX
D. Noth left and right subtree nodes contains only nodes with keys
less than the node’s key
36. Which data structure is used for implementing
recursion?
41. Binary Search can be categorized into which of the
a) Queue following?
b) Stack a) Brute Force technique
c) Array b) Divide and conquer
d) List c) Greedy algorithm
d) Dynamic programming
37. AVL trees have a faster ________
d) O(M log N)
38. What is the worst case complexity of binary search
using recursion?
d) Tree
39. Which of the following is an infix expression?
a) (a+b)*(c+d)
44. What is an external sorting algorithm?
b) ab+c*
a) Algorithm that uses tape or disk during the sort
c) +ab
b) Algorithm that uses main memory during the sort
d) abc+*
c) Algorithm that involves swapping
45. A queue follows __________ 51. The given array is arr = {1, 2, 4, 3}. Bubble sort is
used to sort the array elements. How many iterations
a) FIFO (First In First Out) principle will be done to sort the array?
d) 0
46. Can stack be described as a pointer?
a) Simulation of recursion
49. What is the peculiarity of red black trees? b) Simulation of arbitrary linked list
A. In red-black trees, the root do not contain data. c) Simulation of limited resource allocation
B. In red-black trees, the leaf nodes are not relevant and do not d) Simulation of heap sort
contain data.
C. In red-black trees, the leaf nodes are relevant but do not contain
data. 55. Which of the following ways below is a In order
traversal?
D. Both a and c above
A. Root->left sub tree-> right sub tree
b) Circular queue
c) Dequeue
d) Priority queue
56. With what data structure can a priority queue be 62. Shell sort is also known as _____________
implemented?
a) diminishing decrement sort
a) Array
b) diminishing increment sort
b) List
c) partition exchange sort
c) Heap
d) diminishing insertion sort
d) Tree
B. Stacks
58. What is the applications of dequeue?
C. Graphs
a) A-Steal job scheduling algorithm
D. Both a and c above
b) Can be used as both stack and queue
b) selection sort
59. Which of the following linked list below have last
node of the list pointing to the first node? c) binary tree sort
C. circular singly linked list 66. Which of the following is the distribution sort?
b) Smooth sort
b) easier computations
c) to delete elements based on priority 67. Key value pair is usually seen in
68. In a heap, element with the greatest key is always in 73. The depth of a complete binary tree is given by
the _______ node.
a. Dn = n log2n
A. leaf
b. Dn = n log2n+1
B. root
c. Dn = log2n
C. first node of left sub tree
d. Dn = log2n+1
D. first node of right sub tree
78. In a Heap tree 84. Two main measures for the efficiency of an
algorithm are
a. Values in a node is greater than every value in left sub tree and
smaller than right sub tree a. Processor and memory
b. Values in a node is greater than every value in children of it b. Complexity and capacity
79. If every node u in G is adjacent to every other node 85. The time factor when determining the efficiency of
v in G, A graph is said to be algorithm is measured by
80. In linked lists there are no NULL links in: 86. The space factor when determining the efficiency of
algorithm is measured by
a. Single linked list
a. Counting the maximum memory needed by the algorithm
b. Lin ear doubly linked list
b. Counting the minimum memory needed by the algorithm
c. circular linked list
c. Counting the average memory needed by the algorithm
d. None of the above
d. Counting the maximum disk space needed by the algorithm
83. The dummy header in linked list contains…… d. Item is the last element in the array or is not there at all
a. First record of the actual data
89. The Average case occur in linear search algorithm 95. Linked lists are best suited
a. When Item is somewhere in the middle of the array a. for relatively permanent collections of data
b. When Item is not in the array at all b. for the size of the structure and the data in the structure are
constantly changing
c. When Item is the last element in the array
c. for both of above situation
d. When Item is the last element in the array or is not there at all
d. for none of above situation
c. both of above
91. The complexity of Bubble sort algorithm is d. none of above
a. O(n)
C. -1
92. The complexity of merge sort algorithm is D. None of these
a. O(n)
b. O(log n) 98. New nodes are added to the _____ of the queue.
c. O(n2) A. front
d. O(n log n) B. back
C. middle
93. The operation of processing each element in the list D. Both 1 and 2
is known as
a. Sorting
99. A _______ is a data structure that organizes data
b. Merging similar to a line in the supermarket, where the first
one in line is the first one out.
c. Inserting
A. queue linked list
d. Traversal
B. stacks linked list
C. both of them
94. Arrays are best data structures
D. neither of them
a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are
constantly changing
100. What happens when you push a new node onto a 105. Which of the following data structure store the
stack? homogeneous data elements?
A. the new node is placed at the front of the linked list. A. Arrays
B. the new node is placed at the back of the linked list. B. Records
C. the new node is placed at the middle of the linked list. C. Pointers
101. The memory address of the first element of an array 106. In the ....... traversal we process all of a vertex’s
is called descendants before we move to an adjacent vertex.
102. Which of the following data structures are indexed 107. A binary search tree whose left subtree and right
structures? subtree differ in height by at most 1 unit is called
……
A. linear arrays
A) AVL tree
B. linked lists
B) Red-black tree
C. both of above
C) Lemma tree
D. none of above
D) None of the above
D) Graph
110. A directed graph is ………………. if there is a path 115. In general, the binary search method needs no more
from each vertex to every other vertex in the digraph. than ……………. comparisons.
111. Which of the following is not the internal sort? 116. Any node is the path from the root to the node is
called
A) Insertion Sort
A) Successor node
B) Bubble Sort
B) Ancestor node
C) Merge Sort
C) Internal node
D) Heap Sort
D) None of the above
D) None
120. Which of the following has search efficiency of Ο(1)? 125. Minimum number of moves required to solve a
Tower of Hanoi puzzle is …………..
(A) Tree
(A) 2^n2
(B) Heap
(B) n-1
(C) Hash Table
(C) 2n – 1
(D) Linked-List
(D) 2n – 2
131. A technique for direct search is ………… 137. Travelling salesman problem is an example of
……………….
(A) Binary Search
(A) Dynamic Algorithm
(B) Linear Search
(B) Greedy Algorithm
(C) Tree Search
(C) Recursive Approach
(D) Hashing
(D) Divide & Conquer
(D) Transposition
135. Linked lists are not suitable data structures for
which one of the following problems?
141. Program with highest run-time complexity is
(A) Insertion sort ………………..
(B) Binary search (A) Tower of Hanoi
(C) Radix sort (B) Fibonacci Series
(D) Polynomial manipulation (C) Prime Number Series
136. Which of the following types of expressions do not (D) None of these
require precedence rules for evaluation?
142. Which of the following is an application of stack? 144. Arrays are best data structures
B) tower of Hanoi B) for the size of the structure and the data in the structure are
constantly changing
C) infix to postfix conversion
C) for both of above situation
D) all of the above
D) for none of above situation
A) 0 and 1
B) 0 and -1
C) -1 and 0
D) 1 and 0
a) collection of programs that manages hardware resources a) the number of processes executed per unit time
b) system service provider to the application programs b) the number of processes in the ready queue
c) interface between the hardware and application programs c) the number of processes in the I/O queue
2. Whenever a process needs I/O to or from a disk it 7. Which one of the following is a synchronization
issues a ______________ tool?
3. By operating system, the resource management can 8. Remote Procedure Calls are used ____________
be done via __________
a) for communication between two processes remotely different
a) time division multiplexing from each other on the same system
b) space division multiplexing b) for communication between two processes on the same system
c) time and space division multiplexing c) for communication between two processes on separate systems
4. A “glue” between client and server parts of 9. The initial program that is run when the computer
application is………. is powered up is called __________
b) Firmware b) bootloader
c) Package c) initializer
5. What is interprocess communication? 10. Which one of the following can not be scheduled by
the kernel?
a) communication within the process
a) kernel level thread
b) communication between two process
b) user level thread
c) communication between two threads of same process
c) process
d) none of the mentioned
d) none of the mentioned
11. What is Dispatch latency? 16. The interval from the time of submission of a
process to the time of completion is termed as
a) the speed of dispatching a process from running to the ready ____________
state
a) waiting time
b) the time of dispatching a process from running to ready state
and keeping the CPU idle b) turnaround time
c) the time to stop one process and start running another one c) response time
12. A software that lies between the OS and the 17. Which scheduling algorithm allocates the CPU first
applications running on it. to the process that requests the CPU first?
13. The _______ calls certain procedures on remote 18. In priority scheduling algorithm____________
systems and is used to perform synchronous or
asynchronous interactions between systems. a) CPU is allocated to the process with highest priority
d) DB
d) process queue
21. Which one of the following cannot be scheduled by 27. What is Turnaround time?
the kernel?
a) the total waiting time for a process to finish execution
a) kernel level thread
b) the total time spent in the ready queue
b) user level thread
c) the total time spent in the running queue
c) process
d) the total time from the completion till the submission of a
d) none of the mentioned process
22. CPU scheduling is the basis of___________ 28. What is Waiting time?
a) multiprocessor systems a) the total time in the blocked and waiting queues
b) multiprogramming operating systems b) the total time spent in the ready queue
c) larger memory sized systems c) the total time spent in the running queue
d) none of the mentioned d) the total time from the completion till the submission of a
process
a) time a) the total time taken from the submission time till the completion
time
b) space
b) the total time taken from the submission time till the first
c) money response is produced
d) all of the mentioned c) the total time taken from submission time till the response is
output
32. Which of the following algorithms tends to minimize 37. Which of the following scheduling algorithms gives
the process flow time? minimum average waiting time?
33. Which is the most optimal scheduling algorithm? 38. To access the services of operating system, the
interface is provided by the ___________
a) FCFS – First come First served
a) System calls
b) SJF – Shortest Job First
b) API
c) RR – Round Robin
c) Library
d) None of the mentioned
d) Assembly instructions
42. The number of processes completed per unit time is 48. What is a long-term scheduler?
known as __________
a) It selects processes which have to be brought into the ready
a) Output queue
a) New
50. What is a short-term scheduler?
b) Old
a) It selects which process has to be brought into the ready queue
c) Waiting
b) It selects which process has to be executed next and allocates
d) Running CPU
b) PCB queue
52. The only state transition that is initiated by the user
c) Device Queue process itself is __________
d) Ready Queue a) block
b) wakeup
47. What will happen when a process terminates? c) dispatch
a) It is removed from all queues d) none of the mentioned
b) It is removed from all, but the job queue
53. In a time-sharing operating system, when the time 58. Which one of the following is a synchronization
slot given to a process is completed, the process goes tool?
from the running state to the__________
a) thread
a) Blocked state
b) pipe
b) Ready state
c) semaphore
c) Suspended state
d) socket
d) Terminated state
a) the processor executes more than one process at a time a) that can not drop below zero
b) the programs are developed by more than one person b) that can not be more than zero
c) more than one process resides in the memory c) that can not drop below one
d) a single user can execute many programs at the same time d) that can not be more than one
55. Suppose that a process is in “Blocked” state waiting 60. When high priority task is indirectly preempted by
for some I/O service. When the service is completed, medium priority task effectively inverting the
it goes to the __________ relative priority of the two tasks, the scenario is
called__________
a) Running state
a) priority inversion
b) Ready state
b) priority removal
c) Suspended state
c) priority exchange
d) Terminated state
d) priority modification
d) critical condition
62. Restricting the child process to a subset of the
parent’s resources prevents any process from
57. If a process is executing in its critical section, then no __________
other processes can be executing in their critical
section. This condition is called? a) overloading the system by using a lot of secondary storage
d) asynchronous exclusion
63. In UNIX, each process is identified by its__________ 69. Bounded capacity and Unbounded capacity queues
are referred to as__________
a) Process Control Block
a) Programmed buffering
b) Device Queue
b) Automatic buffering
c) Process Identifier
c) User defined buffering
d) None of the mentioned
d) No buffering
c) aging
66. Which of the following two operations are provided d) starvation
by the IPC facility?
74. Mutual exclusion implies that____________ 79. The signal operation of the semaphore basically
works on the basic _______ system call.
a) if a process is executing in its critical section, then no other
process must be executing in their critical sections a) continue()
85. A deadlock free solution to the dining philosopher’s 90. What is the drawback of banker’s algorithm?
problem ____________
a) in advance processes rarely know how much resource they will
a) necessarily eliminates the possibility of starvation need
b) does not necessarily eliminate the possibility of starvation b) the number of processes changes as time progresses
c) eliminates any possibility of any kind of problem further c) resource once available can disappear
86. Which of the following condition is required for a 91. A problem encountered in multitasking when a
deadlock to be possible? process is perpetually denied necessary resources is
called ____________
a) mutual exclusion
a) deadlock
b) a process may hold allocated resources while awaiting
assignment of other resources b) starvation
87. A system is in the safe state if____________ 92. To avoid deadlock ____________
a) the system can allocate resources to each process in some order a) there must be a fixed number of resources to allocate
and still avoid a deadlock
b) resource allocation must be done only once
b) there exist a safe sequence
c) all deadlocked processes must be aborted
c) all of the mentioned
d) inversion technique can be used
d) none of the mentioned
b) using thread b) must always be equal to the total number of resources available
in the system
c) using pipes
c) must not exceed the total number of resources available in the
d) all of the mentioned system
a) banker’s algorithm
94. For a deadlock to arise, which of the following
b) round-robin algorithm conditions must hold simultaneously?
c) elevator algorithm a) Mutual exclusion
95. A system is in a safe state only if there exists a 100. What is the solution to starvation?
____________
a) the number of rollbacks must be included in the cost factor
a) safe allocation
b) the number of resources must be included in resource
b) safe resource preemption
96. If no cycle exists in the resource allocation graph 101. The major part of swap time is _______time.
____________
a) waiting
a) then the system will not be in a safe state
b) transfer
b) then the system will be in a safe state
c) execution
c) all of the mentioned
d) none of the mentioned
d) none of the mentioned
a) aborted b) paging
b) a paging technique
106. Transient operating system code is code that 112. A page fault occurs when?
____________
a) a page gives inconsistent data
a) is not easily accessible
b) a page cannot be accessed due to its absence from memory
b) comes and goes as needed
c) a page is invisible
c) stays in the memory always
d) all of the mentioned
d) never enters the memory space
a) internal a) disrupted
b) external b) invalid
a) demand paging 116. When device A has a cable that plugs into device B,
and device B has a cable that plugs into device C and
b) buses device C plugs into a port on the computer, this
arrangement is called a_________
c) virtualization
a) port
d) all of the mentioned
b) daisy chain
c) bus
111. Segment replacement algorithms are more complex
than page replacement algorithms because d) cable
____________
117. The ________ keeps state information about the use 120. The first process launched by the linux kernel is
of I/O components. ___________
b) OS b) zombie process
118. The first linux kernel which supports the SMP 121. A process having multiple threads of control implies
hardware? ___________
b) linux 1.0 b) it can do only one task at a time, but much faster
119. Which one of the following linux file system does not 122. When one thread immediately terminates the target
support journaling feature? thread, it is called ____________
1. In the relational model, cardinality is termed as: 9. An entity set that does not have sufficient attributes
(A) Number of tuples. to form a primary key is a
(B) Number of attributes. (A) strong entity set. (B) weak entity set.
(C) simple entity set. (D) primary entity set.
(C) Number of tables.
(D) Number of constraints.
10. In a Hierarchical model, records are organized as
(A) Graph. (B) List.
2. Relational calculus is a
(C) Links. (D) Tree.
(A) Procedural language.
(B) Non- Procedural language. 11. In an E-R diagram attributes are represented by
(C) Data definition language. (A) rectangle. (B) square.
(D) High level language. (C) ellipse. (D) triangle.
3. The view of total database content is 12. The language used in application programs to
(A) Conceptual view. request data from the DBMS is referred to as the
17. The method in which records are physically stored 24. Relational Algebra is
in a specified order according to a key field in each (A) Data Definition Language
record is (B) Meta Language
(A) hash. (C) Procedural query Language
(B) direct. (D) None of the above
(C) sequential
(D) all of the above. 25. Key to represent relationship between tables is
called
18. A subschema expresses (A) Primary key (B) Secondary Key
(A) the logical view. (C) Foreign Key (D) None of these
(B) the physical view.
(C) the external view. 26. The file organization that provides very fast access
(D) all of the above. to any arbitrary record of a file is
(A) Ordered file (B) Unordered file
19. An advantage of the database management (C) Hashed file (D) B-tree
approach is
(A) data is dependent on programs. 27. Which of the following are the properties of entities?
(B) data redundancy increases. (A) Groups
(C) data is integrated and can be accessed by multiple (B) Table
programs. (C) Attributes
(D) none of the above. (D) Switchboards
20. Transaction processing is associated with everything 28. It is better to use files than a DBMS when there are
below except (A) Stringent real-time requirements.
(A) producing detail, summary, or exception reports. (B) Multiple users wish to access the data.
(B) recording a business activity. (C) Complex relationships among data.
(C) confirming an action or triggering a response. (D) All of the above.
(D) maintaining data.
29. Which of the following operation is used if we are
21. The method of access which uses key transformation interested in only certain columns of a table?
is known as (A) PROJECTION (B) SELECTION
(A) direct. (B) hash. (C) UNION (D) JOIN
(C) random. (D) sequential.
30. …………….data type can store unstructured data
22. The statement in SQL which allows to change the (A) RAW (B) CHAR
definition of a table is (C) NUMERIC (D) VARCHAR
(A) Alter.
(B) Update. 31. The method of access which uses key transformation
(C) Create. is known as
(D) select. (A) Direct
(B) Hash
23. E-R model uses this symbol to represent weak entity (C) Random
set? (D) Sequential
(A) Dotted rectangle.
(B) Diamond
(C) Doubly outlined rectangle
(D) None of these
32. …………. is a virtual table that draws its data from 39. Cross Product is a:
the result of an SQL SELECT statement. (A) Unary Operator (B) Ternary Operator
(A) View (C) Binary Operator (D) Not an operator
(B) Synonym
(C) Sequence 40. In E-R Diagram derived attribute are represented by
(D) Transaction
(A) Ellipse (B) Dashed ellipse
(C) Rectangle (D) Triangle
33. In E-R diagram generalization is represented by
(A) Ellipse
41. A data dictionary is a special file that contains:
(B) Dashed ellipse
(C) Rectangle (A) The name of all fields in all files.
(D) Triangle
(B) The width of all fields in all files.
34. A data manipulation command that combines the
(C) The data type of all fields in all files.
records from one or more tables is called………
(A) SELECT (D) All of the above.
(B) PROJECT
42. Which of the following is a comparison operator in
(C) JOIN SQL?
(D) PRODUCT
(A) = (B) LIKE
35. In E-R Diagram relationship type is represented by (C) BETWEEN (D) All of the above
creates………………..
(A) Parent-Child relationship between the tables that 44. Which of the following describes way of storing and
(B) Many to many relationship between the tables that A) Data model
(C) Network model between the tables that connect them. C) Data manipulation
D) Encapsulation
(D) None of the above.
45. Database Management System can perform
37. The natural join is equal to……………. A) Retrieval of data as per user requirement
(A) Cartesian Product B) Securing data and Maintaining backup of database
C) Allowing multiple users to access database simultaneously
(B) Combination of Union and Cartesian product D) All of them
(C) Combination of selection and Cartesian product
46. .............. are real world objects about which
(D) Combination of projection and Cartesian product
information is to be stored in database.
A) Entities
38. Consider the join of a relation R with relation S. If R B) Objects
has m tuples and S has n tuples, then the maximum C) Data
D) Attributes
size of join is:
(A) mn (B) m+n
(C) (m+n)/2 (D) 2(m+n)
47. Each entity generally has collection of ................ 56. An instance is ___________
associated to it. a) a set of relationships
b) set of attributes
A) attributes
c) set of entities
B) database
d) schema
C) table
D) none of them
57. The language used application programs to request
data from the DBMS is referred to as the
48. Which data type stores up to the specified length
a) DML
and no padding is done? b) DDL
c) query language
A) Var Char
d) none
B) Char
C) Var Char Ignore case
58. The relational database environment has all of the
D) None of them
following components except
49. ______ code that needs only one byte to store a
a) users
character. b) separate files
c) database
A) ASCII
d) query languages
B) ANSI
C) DBMS
59. ______________ is a ‘thing’ in the real world with an
D) RDBMS
independent existence.
a) Entity
50. A _____ value means unknown or missing value.
b) Attribute
A) junk c) Key
B) null d) Relationship
C) litter
D) refuse 60. Which view is normally more stable
a) internal level
b) external level
51. Primary key values cannot contain _______
c) conceptual level
A) Duplicate values d) view level
B) Null values
C) (a) and (b) 61. The ability to modify the conceptual schema without
D) None of them
causing any change to the application program
a) Physical data independence
52. A primary key designed by combining more than b) Logical Data independence
c) External Data independence
one field is known as ______ primary key.
d) none
A) Composite
B) Secondary 62. The information about data in a database is called
C) Tertiary
_____
D) Main
a) Meta data
53. Base will automatically assign ............. extension to b) Tera data
c) hyper data
the database file .
d) none
A) .obd
B) .odb
C) .bas 63. The links between rows of a master table and those
D) .bdo
of a nested table are maintained using:
54. ER model is used in _______ a. pointers.
b. foreign keys.
a) conceptual database b) schema refinement
c. determinants
c) physical refinement d) applications and security
d. clusters.
65. An attribute is also known as a(n) 73. A table with a _____________ cannot exhibit partial
a. table dependencies.
b. relation
A: two rows
c. row
B: single-attribute
d. field
C: three columns
D: none of the above
66. This Relational Algebra operation requires two
tables as input and the two tables must have one 74. Denormalization produces a ____________ normal
common form.
a) RESTRICTION A: higher
b) JOIN B: upper
c) DIVISION C: slower
e) PROJECTION D: lower
67. Which SQL keyword must be used to remove 75. Higher normal forms are better than lower normal
duplicate rows from the result relation ? forms because higher normal forms yield fewer
a) DELETE _______________ in the database.
b) DISTINCT
A: update, delete
c) NOT EXISTS
B: data storage
d) UNIQUE
C: data redundancies
D: none of the above
68. Which SQL keyword is used to return only different
values? 76. The 2NF describes the tabular format in which:
A: COUNT A: there are no repeating groups in the table
B: NOSAME B: all attributes are dependent on the primary key
C: GROUP C: A & B with no partial dependency
D: DISTINCT D: there is no partial dependency
84. Each table has an ______ file that contains the table
92. The database design that consists of multiple tables
definition. that are linked together through matching data
Ans. .frm stored in each table is called a:
A) data dictionary
B) database management system (DBMS) A) link data from remote databases.
C) decision support system B) prevent users from getting to database security
D) relational database information.
C) provide a conceptual view of the data so it is easier to
understand.
88. The modern database report writer: D) store complex data structure to represent the properties of
A) is a career path that focuses on creating, managing and objects
supporting the reports generated from databases
B) provide limited control over how information is displayed
and reported. 95. One of the first phases of a new database project that
involves critical areas, expensive hardware or
C) provides the tools for database designer to display
software within the organization is called
information in the desired format
___________
D)provides the tools for the database administrator to
monitor and report on database use and activity
A) analysis phase
B) feasibility study
C) investigation stage
89. The separation of the data definition from the D) system design
program is known as…………….
97. The primary difference between the Relational 104. The association role defines…………..
database (RDB) and Object oriented database
(OODB) models is:
A) how tables are related in the database
B) the relationship between the class diagram and the tables
A) OODB incorporates methods in with the definition of the in the database
data structure, while RDB does not C) the tables that each attribute is contained
B) OODB supports multiple objects in the same database D) which attribute is the table's primary key
while RDB only supports a single table per database
C) RDB allows the definition of the relationships between
the different tables, while OODB does not allow the 105. The purpose of an N-Ary association is:
relationships to be defined between objects
D) RDB supports indexes, while OODB does not support A) to capture a parent-child relationship
indexes B) to deal with one to many relationships
C) to deal with relationships that involve more than two
tables
98. Which of the following items is not the advantage of D) to represent an inheritance relationship
a DBMS?
106. A composition association is drawn using which
A) Improved ability to enforce standards symbol:
B) Improved data consistency
C) Local control over the data A) A line which loops back onto the same table
D) Minimal data redundancy B) Small closed diamond at the end of a line connecting two
tables
99. The predominant way of storing data today is using C) Small open diamond at the end of a line connecting two
which type of database models? tables
D) Small triangle at the end of a line connecting the
aggregated item and multiple component items
A) Hierarchical
B) Network
C) Object oriented 107. A reflexive association is drawn using which symbol:
D) Relational
A) a line which loops back onto the same table
100. Two different terms are used to describe the B) small closed diamond at the end of a line connecting two
characteristics of interest for an entity. They are tables
attributes and: C) small open diamond at the end of a line connecting two
A) classes tables
B) entities D) small triangle at the end of a line connecting the
C) properties aggregated item and multiple component items
D) traits
108. Assume you are creating a database to handle the
101. When building a database, the data dealing with an data associated with instruction at a university. What
entity is modeled as a: is the most appropriate special association to model
that a class may have multiple pre-requisites?
A) attribute
B) class A) aggregation association
C) object B) generalization association
D) table C) n-ary association
D) reflexive association
109. Assume you are creating a database to handle the
102. The property (or set of properties) that uniquely data associated with instruction at a university. What
defines each row in a table is called the: is the most appropriate special association to model
degree requirements (i.e., required number of courses
in humanity, science, math, etc)?
A) identifier
B) index
C) primary key A) composition association
D) symmetric key B) generalization association
C) n-ary association
103. Business rules can be represented in the database D) reflexive association
through:
110. Assume you are creating a database to handle the 113. The ability to define common properties or functions
data associated with instruction at a university. What in the higher class and then modify them in the lower
is the most appropriate special association to model classes is called:
that a course has an assigned instructor, Teaching A) Inheritance
Assistants, a classroom, meeting time slot, and class B) Polymorphism
roster? C) Reflexive
D) Transformance
A) aggregation association
B) generalization association 114. A reflexive association is one where one class is:
C) n-ary association
D) reflexive association
A) broken down into special cases
B) combined with multiple other classes
111. What is the most appropriate special association that C) combined with one other class
indicates that multiple textbooks make up a course D) linked back to itself
required reading list?
115. Which of the following statements is not correct?
A) aggregation association
B) generalization association
C) n-ary association A) A primary goal of a database system is to share data with
D) reflexive association multiple users
B) It is possible to change a method or property inherited
from a higher level class
112. What is the special association that indicates that one C) While companies collect data all the time, the structure of
object can be broken down into multiple special the data changes very often.
cases? D) In a client / server environment, data independence
causes client-side applications to be essentially independent
of the database stored on the server side.
A) composition association
B) generalization association
C) n-ary association 116. Which of the following statements is not correct?
D) reflexive association A) Data Normalization is the process of defining the table
structure
B) The purpose of class diagrams is to model the
interrelationships between the different classes in the
database
C) Individual objects are stored as rows in a table
D) Properties of an object are stored as columns in a table.
1. Control Unit acts as the central nervous system of the 6. Which of the following is correct about 8086
computer. microprocessor?
a) Physical address
7. Which of the following is a type of microprocessor?
b) Logical address
a) CISC
c) Neither physical nor logical
b) RISC
d) None of the mentioned
c) EPIC
c) Main Memory
a) PC
9. Which of the following addressing method does the
b) MAR instruction, MOV AX,[BX] represent?
5. Whenever the data is found in the cache memory it is d) register relative addressing mode
called as _________
a) HIT
10. Which of the following is not true about the address
b) MISS bus?
d) ERROR b) It is a bidirectional
c) It is 16 bits in length
d) It is Unidirectional
11. Which of the following is true about 17. What does a loader do in a microprocessor?
microprocessors?
a) Converts hexadecimal code to binary
a) It has an internal memory
b) Converts decimal to binary
b) It has interfacing circuits
c) Increments the content of the program counter by 1
c) It contains ALU, CU, and registers
d) Decodes an opcode
d) It uses Harvard architecture
c) Accumulator c) Variable
13. How many address lines are present in 8086 19. In ____________ mapping, the data can be mapped
microprocessor? anywhere in the Cache Memory.
a) 16 a) Associative
b) 20 b) Direct
c) 32 c) Set Associative
d) 40 d) Indirect
14. Which of the following is not a condition flag? 20. The transfer between CPU and Cache
is______________
a) Trap flag
a) Block transfer
b) Auxiliary carry flag
b) Word transfer
c) Parity flag
c) Set transfer
d) Zero flag
d) Associative transfer
15. A memory connected to a microprocessor has 20
address lines and 16 data lines. What will be the
memory capacity?
21. The number of clock cycles per second is referred as
a) 8 KB ________
b) 2 MB a) Clock speed
c) 16 MB b) Clock frequency
d) 64 KB c) Clock rate
16. Which of the following is not true about 8085 d) Clock timing
microprocessor?
a) It is an 8-bit microprocessor
22. Which of the following processor has a fixed length of 27. If M denotes the number of memory locations and N
instructions? denotes the word size, then an expression that denotes
the storage capacity is ______________
a) CISC
a) M*N
b) RISC
b) M+N
c) EPIC
c) 2M+N
d) Multi-core
d) 2M-N
a) Registers b) 16 bits
b) Cache c) 8 bits
d) Virtual Memory
d) Cache memory 32. CPU fetches the instruction from memory according
to the value of ____________
a) program counter
b) status register
c) instruction register
33. Program always deals with ____________ 39. The registers, ALU and the interconnection between
them are collectively called as _____
a) logical address
a) process route
b) absolute address
b) information trail
c) physical address
c) information path
d) relative address
d) data path
d) Buffer registers
d) Rambus c) Controllers
d) Multiple bus
b) Multiplexer
c) Control unit
44. For a given FINITE number of instructions to be 49. The addressing mode, where you directly specify the
executed, which architecture of the processor operand value is_______
provides for a faster execution?
a) Immediate
a) ISA
b) Direct
b) ANSA
c) Definite
c) Super-scalar
d) Relative
d) All of the mentioned
a) Reduce the clock cycles for a programming task a) Conditional code flags
47. When Performing a looping operation, the 52. The register used to store the flags is called as
instruction gets stored in the ______ _________
48. The addressing mode/s, which uses the PC instead of 53. The Flag ‘V’ is set to 1 indicates that_____________
a general purpose register is ______
a) The operation is valid
a) Indexed with offset
b) The operation is validated
b) Relative
c) The operation has resulted in an overflow
c) Direct
d) None of the mentioned
d) Both Indexed with offset and direct
54. In the implementation of a Multiplier circuit in the 59. When generating physical addresses from a logical
system we make use of_______ address the offset is stored in __________
55. A 24 bit address generates an address space of ______ 60. The technique used to store programs larger than the
locations. memory is ____________
a) 1024 a) Overlays
c) 248 c) Buffers
56. If a system is 64 bit machine, then the length of each 61. The transfer of large chunks of data with the
word will be _______ involvement of the processor is done by _______
b) 8 bytes b) Arbitrator
57. The type of memory assignment used in Intel 62. In a system, which has 32 registers the register id is
processors is _____ __________ long.
a) OP-Code
b) Operators
c) Commands
d) Linker
67. The most efficient way of handling parameter passing a) RST 5.5
is by using ______
b) RST 7.5
a) General purpose registers
c) TRAP
b) Stacks
d) Both RST 5.5 and 7.5
c) Memory locations
68. The data structure suitable for scheduling processes a) Polling method
is _______
b) Vectored interrupts
a) List
c) Interrupt nesting
b) Heap
d) None of the mentioned
c) Queue
d) Stack
74. The processor indicates to the devices that it is ready
to receive interrupts ________
69. The process wherein the processor constantly checks a) By enabling the interrupt request line
the status flags is called as ___________
b) By enabling the IRQ bits
a) Polling
c) By activating the interrupt acknowledge line
b) Inspection
d) None of the mentioned
c) Reviewing
d) Echoing
75. _________ method is used to establish priority by 80. facilities provided by the debugger is __________
serially connecting all devices that request an
interrupt. a) Trace points
d) Polling
d) Software
82. In DMA transfers, the required signals and addresses
are given by the__________
77. If during the execution of an instruction an exception
is raised then__________ a) Processor
c) The processor completes the execution and saves the data and d) The program itself
then handle the exception
a) Trap b) False
b) Interrupt
b) Compiler
b) Logic circuits
c) Shift registers
89. The pipelining process is also called as ______ 94. If the page table is large then it is stored in
__________
a) Superscalar operation
a) Processor
b) Assembly line operation
b) Main memory
c) Von Neumann cycle
c) Disk
d) None of the mentioned
d) Secondary storage
96. When an operand is stored in a register it is _______ 102. The time lost due to the branch instruction is often
referred to as ____________
a) Stored in the lower order bits of the register
a) Latency
b) Stored in the higher order bits of the register
b) Delay
c) Stored in any of the bits at random
c) Branch penalty
d) None of the mentioned
d) None of the mentioned
d) 128 bits
99. The LEA mnemonic is used to__________
a) Load the effective address of an instruction 105. To reduce the number of external connections
required, we make use of______
b) Load the values of operands onto an accumulator
a) De-multiplexer
c) Declare the values as global constants
b) Multiplexer
d) Store the outcome of the operation at a memory location
c) Encoder
d) Decoder
100. SIMD stands for __________
c) Memory latency
101. Any condition that causes a processor to stall is called d) None of the mentioned
as _________
a) Hazard
b) Page fault
c) System error
107. The fastest data access is provided using _______ 112. ______ translates the logical address into a physical
address.
a) Caches
a) MMU
b) DRAM’s
b) Translator
c) SRAM’s
c) Compiler
d) Registers
d) Linker
117. What kind of instructions usually affect the program 122. The NAND gate output will be low if the two inputs
counter? are
118. Which commands are used for addressing the off- 123. The number of control lines for a 8 – to – 1
chip data and associated codes respectively by data multiplexer is
pointer?
(A) 2
a. MOVX & MOVC
(B) 3
b. MOVY & MOVB
(C) 4
c. MOVZ & MOVA
(D) 5
d. MOVC & MOVY
d. 64K
126. Data can be changed from special code to temporal
code by using
(A)COUNTER
(B)DEMULTIPLEXER
(C)MULTIPLEXER
(D) FLIP-FLOP
(A) 1 sec
(B) 1 msec
(C) 1 µsec
(D) 1 nsec.
(A) 4
(B) 3
(C) 5
(D) 1
(A)5 bits.
(B) 12 bits.
(C) 8 bits.
(D) 10 bits.
1. The high-speed memory between the main memory 7. For large data transfers, _________ is used.
and the CPU called?
a) DMA
a) Register Memory
b) programmed I/O
b) Cache Memory
c) controller register
c) Storage Memory
d) none of the mentioned
d) Virtual Memory
c) RAM
4. ………………. memory is implemented using the
semiconductor chips. d) Fast solid state chips in the motherboard
a) Cache
c) RAM
5. Winchester disks are a type of _______ d) Magnetic disk
a) optical disks
c) I/O devices
6. The software substituted for hardware and stored in d) OS
ROM is…………..
a) Synchronous Software
b) Package Software
c) Firmware
d) Middleware
12. The virtual memory bridges the size and speed gap 18. Why did PROM introduced?
between __________ and__________
a) To increase the storage capacity
a) RAM and ROM
b) To increase the address locations
b) RAM and Secondary memory
c) To provide flexibility
c) Processor and RAM
d) To reduce the size
d) None of the mentioned
c) Dynamic RAM must be refreshed, static RAM does not C) disk pack in disk surface
d) SRAM is slower than DRAM
D) All of above
24. The ALU of a computer responds to the commands 29. Mnemonic a memory trick is used in which of the
coming from following language?
A) Primary memory A) Machine language
25. The output quality of a printer is measured by….. 30. An integrated circuit is………….
A) Dot per sq. inch A) A complicated circuit
C) Dots printed per unit time C) Much costlier than a single transistor
26. A physical connection between the microprocessor 31. The difference between memory and storage is that
memory and other parts of the microcomputer is memory is _____ and storage is __
known as………… A) Temporary, permanent
A) Path
B) Permanent, temporary
B) Address bus
C) Slow, fast
C) Route
D) All of above
D) All of the above
C) Register C) Register
34. Which of the following memories allows 39. Which of the following disk is fixed disk?
simultaneous read and write operations? A) Hard Disks
A) ROM
B) Flash Disks
B) RAM
C) Blu-Ray Disks
C) EPROM
D) DVDs
D) None of above
D) None of these
41. Circular division of disks to store and retrieve data
are known as…………
36. The memory which is programmed at the time it is A) tracks
manufactured
A) ROM B) sectors
B) RAM C) cycles
C) PROM D) rings
D) EPROM
42. Which one of the following statements is true?
a) Cache memory is a small amount of memory which is a part of
37. Which of the following memories needs refreshing? the Random-Access Memory
A) SRAM
b) Cache memory is used to temporarily hold instructions and data
B) DRAM that the CPU is likely to reuse
D. OMR
44. Which of the following memory is non-volatile? 49. The process of determining which pixels will provide
a better approximation to the desired line is known
A. SRAM
as____.
B. DRAM
(a) Scan conversion
C. ROM
(b) Randomization
D. All of the above
(c) Rasterization
(d) Recreation
45. ROM is needed for storing an initial program called
_______.
50. Rasterization combined with the process of rendering
A. Computer Startup Loader
the picture scan line order is known as _________
B. OS Version
(a) Scan conversion
C. Kernel
(b) Randomization
D. Bootstrap Loader
(c) Recreation
A. PROM
51. Basic methods of projection are _______ and
B. RAM ________ .
47. What technology of memory is Cache RAM usually? (d) None of the above
A. DRAM
C. A kind of graphics
D. A modem standard
53. For a __________graphics device adjacent pixels on 57. _____ is the process of extracting a portion of the
a scan line are likely to have the same characteristics. database, is fundamental to several aspects of
computer graphics.
(a) Random scan
(a) Projection
(b) Raster scan
(b) Clipping
(c) CRT
(c) Rotation
(d) None of the above
(d) Translation
(b) Non-adjective pixels on a scan line are likely to have different (b) Both a and b
characteristics
(c) Hardware
(c) Adjective pixels on a scan line are likely to have the same
(d) None of the above
characteristics
61. The object is displaced a given distance and 65. An optical drive uses the ……. To read data.
direction its original position is called
a. Magnetize particle
(a) Translation
b. Electric particle
(b) Rotation
c. Reflected light
(c) Transformation
d. Refracted light
(d) Scaling
(a) Translation
(b) Rotation
(c) Transformation
(d) Scaling
a. EPROM
b. EEPROM
c. DRAM
d. SRAM
1. The systematic reduction of logic circuits is 6. Total number of inputs in a half adder is __________
accomplished by……….
a) 2
a) Symbolic reduction
b) 3
b) TTL logic
c) 4
c) Using Boolean algebra
d) 1
d) Using a truth table
11. The difference between half adder and full adder is 16. input circuit will have total of ____________
__________
a) 32 entries
a) Half adder has two inputs while full adder has four inputs
b) 128 entries
b) Half adder has one output while full adder has two outputs
c) 256 entries
c) Half adder has two inputs while full adder has three inputs
d) 512 entries
d) All of the Mentioned
d) A OR B OR C
a) 1, 2, 2 b) c = xy+xz
b) 2, 1, 2 c) c = xy+yz
c) 3, 1, 2 d) c = x+y+z
d) 4, 0, 1
19. Decimal digit in BCD can be represented by
____________
14. The register is a type of ___________
a) 1 input line
a) Sequential circuit
b) 2 input lines
b) Combinational circuit
c) 3 input lines
c) CPU
d) 4 input lines
d) Latches
d) A register counts data 21. A ripple counter’s speed is limited by the propagation
delay of _____________
a) Each flip-flop
22. A modulus-10 counter must have ________ 28. Canonical form is a unique way of representing
____________
a) 10 flip-flops
a) SOP
b) 4 Flip-flops
b) Minterm
c) 2 flip-flops
c) Boolean Expressions
d) Synchronous clocking
d) POS
34. Which of the following is the Universal Flip-flop? 40. The Gray code for decimal number 6 is equivalent to
35. The characteristic of J-K flip-flop is similar to 41. The 2’s complement of the number 1101101 is
_____________
(A) 0101110
a) S-R flip-flop
(B) 0111110
b) D flip-flop
(C) 0110010
c) T flip-flop
(D) 0010011
d) Gated T flip-flop
36. _______ is used to store data in registers. 42. The code where all successive numbers differ from
their preceding number by single bit is
a) D flip flop
(A)Binary code.
b) JK flip flop
(B) BCD.
c) RS flip flop
(C) Excess – 3.
d) None of the mentioned
(D) Gray.
39. The bit used to store whether the page has been 45. When the set of input data to an even parity
modified or not is called as _______ generator is 0111, the output will be
46. A full adder logic circuit will have 52. All input of NOR as low produces result as
__________
(A)Two inputs and one output.
a) Low
(B)Three inputs and three outputs.
b) Mid
(C)Two inputs and two outputs.
c) High
(D)Three inputs and two outputs
d) Floating
58. Transistor–transistor logic (TTL) is a class of digital 64. The basic latch consists of ___________
circuits built from ____________
a) Two inverters
a) JFET only
b) Two comparators
b) Bipolar junction transistors (BJT)
c) Two amplifiers
c) Resistors
d) Two adders
d) Bipolar junction transistors (BJT) and resistors
d) A • B = B • A
a) Q(n+1) = (S + Q(n))R’ b) J = 1, K = 0
b) Q(n+1) = SR + Q(n)R c) J = 0, K = 1
d) 3 AND gates
63. What is one disadvantage of an S-R flip-flop? 69. State transition happens _______ in every clock cycle.
1. In which year were chips used inside the computer 7. An error in software or hardware is called a bug.
for the first time? What is the alternative computer jargon for it?
A. Leech
a) 1964 B. Squid
b) 1974 C. Slug
c) 1975 D. Glitch
d) 1981
8. Which of the following are loaded in safe mode?
C. Memory files
D. None of the above 9. A distribute database has which of the following
advantage over a centralized database?
C. Virus
D. Macro Virus 10. Which of the following is not a valid variable name?
a. int 31
5. The majority of computer crimes are committed by: B. To allow people to use the computer
C. Overseas criminals
D. Young teenage computer geniuses 12. What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start
a. Collection of items in an application B. The time taken by the processor to write a file into disk
a. Data structure
13. You should choose this mode if you don't know how 19. UNIX operating system is…………
long you won't use your computer but want to have A. Time sharing operating system
the same desktop state when you resume B. Multi-user operating system
A. Shut Down C. Multi-tasking operating system
B. Restart D. All of the above
C. Sleep
D. Hibernate 20. Semantic error occurs due to…………..
a. Incorrect syntax
14. XML makes it easier for…………. b. incorrect logic
a. Human to read web sites c. wrong input
b. Machine to read web sites d. none of them
c. Both of the above
d. Neither of the above 21. The term MIPS refer to……….
a. millions input processor second
15. What is the method of handling deadlocks? b. megabyte of instructions per second
A. Use a protocol to ensure that the system will never enter a c. multiple instructions per second
deadlock state d. millions of instructions per second
B. Allow the system to enter the deadlock state and then recover
C. Pretend that deadlocks never occur in the system
D. All of the Above 22. A= {2, 3, 4}, what is the cardinality of set A?
a. 24
16. UNIVAC is b. 3
A) Universal Automatic Computer c. 2
B) Universal Array Computer d. 9
C) Unique Automatic Computer
D) Unvalued Automatic Computer 23. What is the main difference between a mainframe
and a super computer?
17. The necessary conditions needed before deadlock A) Super computer is much larger than mainframe computers
can occur? B) Super computers are much smaller than mainframe computers
A. No Mutual Exclusion, Hold and wait, Preemption, Circular C) Supercomputers are focused to execute few programs as fast as
Wait possible while mainframe uses its power to execute as many
B. Mutual Exclusion, No Hold and wait, Preemption, Circular programs concurrently
Wait D) Supercomputers are focused to execute as many programs as
C. Mutual Exclusion, Hold and wait, No Preemption, Circular possible while mainframe uses its power to execute few programs
Wait as fast as possible.
D. Mutual Exclusion, Hold and wait, Preemption, No Circular
Wait 24. Metadata means?
a. Data that describes other data
18. Which is the best way of protecting data from loss? b. unused data
a. Make regular backup of the data c. data used as metaphor
b. Delete all files d. frequently accessed data
c. Lock your computer
d. Change your password 25. Which one makes data access from database faster?
a. Traversing
b. Searching
c. Indexing
d. Partitioning
26. The brain of any computer system is 33. Which of the following does not support more than
A) ALU one program at a time?
B) Memory a. DOS
C) CPU b. Linux
D) Control unit c. Windows
d. Unix
27. Which of the following does the interface between a
process and the operating system? 34. Creating a new class using one or more existing
a. Procedure call classes is known as-----------------?
b. system call a. Polymorphism
c. function optic b. Encapsulation
d. None c. Overloading
d. Inheritance
28. Which technic is Preferable for huge data transfer
between I/O and memory? 35. The automatic execution of some SQL statements
a. Memory Mapped I/O can be started automatically due to any change to a
b. Isolated I/O database relation can be caused by
c. Interrupt I/O a. View
d. DMA b. None
c. Assertion
29. Chief component of first generation computer was d. Trigger
A) Transistors
B) Vacuum Tubes and Valves 36. A high quality CAD system uses the following for
C) Integrated Circuits printing drawing and graphs
D) None of above A) Dot matrix printer
B) Digital plotter
30. Which of the following terms does not describe a C) Line printer
type of flash drive? D) All of the above
a. hard drive
b. pen drive 37. What is interframe gap?
c. jump drive a) idle time between frames
d. thumb drive b) idle time between frame bits
c) idle time between packets
31. What type of RAM is often used for system d) none of the mentioned
memory?
a. SRAM 38. The decimal number -34 is expressed in 2’s
b. PRAM complement form as:
c. SDRAM a. 10000110
d. VRAM b. 11011001
c. 11011110
32. Which computer was considered the first electronic d. 11011100
computer until 1973 when court invalidated the
patent? 39. The digital computer was developed primarily in
A) ENIAC A) USSR
B) MARK I B) Japan
C) Z3 C) USA
D) ABC D) UK
40. The amount of time a program takes from when a 47. If you want your conditional to depend on two
request was submitted until the first result is conditions both being true, what is the proper
processed. notation to put between the two Boolean statements?
a. Waiting time (a) ||
b. Response time (b) &
c. Turnaround time (c) |
d. Through round time (d) &&
41. Which is used for manufacturing chips? 48. The first machine to successfully perform a long
A) Bus series of arithmetic and logical operations was…….
B) Control unit A) ENIAC
C) Semiconductors B) Mark-I
D) A and b only C) Analytic Engine
D) UNIVAC-1
42. Who preside the interface between a process and the
OS? 49. Which one is the largest space?
(a) Kernel A) kilobyte
(b) System Calls B) petabyte
(c) API C) terabyte
(d) Processor D) gigabyte
44. When was the world’s first laptop computer 51. Analog computer works on the supply of
introduced in the market and by whom? A) Continuous electrical pulses
A) Hewlett-Packard, 1980 B) Electrical pulses but not continuous
B) Epson, 1981 C) Magnetic strength
C) Laplink Traveling Software Inc, 1982 D) None of the above
D) Tandy Model-200, 1985
52. The personal computer industry was started by
45. The degree of detail that should be incorporated into A) IBM
a database depends on what? B) Apple
(a) Data integrity C) Compaq
(b) The type of database D) HCL
(c) The user's perspective
(d) The business practices and policies 53. Which number system is usually followed in a
typical 32-bit computer?
46. Before a package can be used in a java program it A) Binary
must be___. B) Decimal
(a) executed C) Hexadecimal
(b) referenced D) Octal
(c) imported
(d) declared
68. The first microprocessor built by the Intel 75. Cursor is a ____
corporation was called A) Pixel
A) 8008 B) Thin blinking line
B) 8080 C) Pointing device
C) 4004 D) None of these
D) 8800
76. Which of the following are the two main components
69. Who invented the microprocessor? of the CPU?
A) Marcian E Huff A) Control Unit and Registers
B) Herman H Goldstein B) Registers and Main Memory
C) Joseph Jacquard C) Control unit and ALU
D) All of above D) ALU and bus
70. Which of the following does not affect the resolution 77. Which of the following statement about directories
of a video display image? is false?
A) Bandwidth A. Directories can exist inside directories
B) Raster scan rage B. The root directory is always at the highest level
C) Vertical and horizontal lines of resolution C. Directories cannot be renamed
D) Screen size D. Directories can be deleted
71. The number of records contained within a block of 78. In which language is source program written?
data on magnetic tape is defined by the A) English
A) Block definition B) Symbolic
B) Record contain clause C) High level
C) Blocking factor D) Temporary
D) Record per block
79. Copying a process from memory to disk to allow
72. What hole will allocates in "Worst-Fit" algorithm of space for other processes is called
memory management? A. Swapping
A. It allocates the smaller hole than required memory hole B. Deadlock
B. It allocates the smallest hole from the available memory holes C. Demand Paging
C. It allocates the largest hole from the available memory holes D. Page Fault
D. It allocates the exact same size memory hole
80. The computer that process both analog and digital is
73. Which of the following are the cheapest memory called
devices in terms of Cost/Bit? A) Analog computer
A) Semiconductor memories B) Digital computer
B) Magnetic Disks C) Hybrid computer
C) Compact Disks D) Mainframe computer
D) Magnetic Tapes
81. The memory resident portion of operating system is
74. Which of the following is the allocation method of a called the
disk space? A. Registry
A. Contiguous allocation B. API
B. Linked allocation C. CMOS
C. Indexed allocation D. Kernel
D. All of the Above
82. What was the name of the first commercially 88. Java Virtual Machine
available microprocessor chip?
A) Intel 308 a) Acts as a full-fledged hypervisor
B) Intel 33 b) Converts byte codes to Operating System dependent code
C) Intel 4004 c) Is known as the Compiler of Java programming language
D) Motorola 639 d) Manages system memory and provides a portable execution
environment for Java-based applications
83. Which of the following class of computers can not
support multiple users simultaneously? 89. Which one of the following is a No-SQL Database?
A) Mainframe Computer
B) Mini Computers a) MongoDB
C) Micro Computers b) CasperDB
D) All of them can support c) ZBase
d) All of the above
84. Which of the following devices can be used to
directly image printed text?
A) OCR 90. Which of the following statements is false?
B) OMR
C) MICR a) 64-bit processor is more capable than a 32-bit processor because
D) All of above it can handle more data at once
b) A Computer works with Hexa Decimal number System
c) A 32-bit system can access 232 memory addresses
85. Which one of the following is false with respect to d) None of the above statements is false
4G and 5G cellular network?
91. Which one of the following statements is true with
a) 5G supports faster bandwidth compared to 4G. respect to a Database Management System?
b) Latency in 4G networks is much higher than 5G network
c) 4G uses a narrow slice of the available spectrum from 600 MHz a) Super key and candidate keys are similar
to 2.5 GHz b) Candidate Keys and Unique Keys are similar
d) There will be data session handoff feature in 5G network which c) Unique Keys and Primary keys are similar
is not available in 4G network d) Candidate Keys and Primary Keys are similar
86. Finding useful pattern from the data in a database is 92. The Average-case Time Complexity of the binary
known as search algorithm is
87. .NET can be used in the following 93. An Ethernet LAN using the OSPF protocol with five
attached routers can be called a ------- network.
a) Development of Desktop Applications
b) Development of Micro services and containers a) Point-to-point
c) Development of Cloud Applications b) Stub
d) All of the above statements are true c) Transient
d) Virtual
94. The term LPDDR means 100. Which is the type of white box testing:
a. Path Testing
a) Low-Power Discrete Data Rate. b. Loop Testing
b) Low-processing Double Data Rate c. Domain Testing.
e) Low-Programmable Double Data Rate d. All of these
d) Low-Power Double Data Rate
101. The person who ensures that systems are developed
95. Which of the following neural networks uses on time, within budget, and with acceptable quality
supervised learning? is a
a. systems designer
(a) Multilayer perceptron b. project manager
(b) Self organizing feature map c. systems owner
(c) Hopfield network d. external system user
(d) Singlelayer Perceptron
102. A task of developing a technical blueprint and
96. In software development, value adjustment factors specifications for a solution that fulfills the business
include the following among others: requirements is undertaken in the following phase of
the system development process
a) the criticality of the performance and reusability of the code. a. system initiation
b) number of lines of code in the software. b. system implementation
c) number of technical manpower and hardware costs. c. system analysis
d) time period available and the level of user friendliness. d. system design
97. Which of the following Process scheduling algorithm 103. If a university sets up a web-based information
is highly improbable to be implemented? system that faculty could access to record student
grades and to advise students, that would be an
a) FCFS Scheduling example of a/an
b) Priority Scheduling a. CRM
c) Shortest Job First Scheduling b. intranet
d) None of the above c. ERP
d. Extranet
98. How many core/threads does the Intel Core i7-
9700K processor have? 104. To improve the performance of a business process,
which of the following is most relevant?
a) 6/12 a. Input.
b) 4/8 b. Processing.
c) 8/8 c. Control and feedback
d) 8/16 d. Output.
99. Assuming the existence of a start and end nodes for 105. The majority of publicly available Internet
a program graph (PG), the total number of Paths is information sources are:
equivalent to------------. set of fest data required to a. created in XML.
test software, b. structured information.
a) Minimum c. normal information.
b) Maximum d. unstructured information.
c) Optimum
d) Supreme
106. A web blueprint depicts: 113. Which of the following is(are) an input process
a. the layout of an individual web page method(s)?
b. the layout of the home page a. smart card
c. the layout of an index page b. biometric
d. the layout of a website c. optical mark
d. all of the above
107. UML depicts information systems as a collection of: 114. A form used to record data about a transaction is
a. Entities a(n)
b. Processes a. batch document
c. Data b. source document
d. Objects c. on-line document
d. data entry document
108. Which of the following relates to enterprise
interoperability? 115. Fifth generation computers are based on
a. DFD A. Artificial Intelligence
b. Information flow diagram B. Programming Intelligence
c. XML C. System Knowledge C. System Knowledge
d. Entity relationship diagram D. VVLSI
109. Which of the following is part of a static view of 116. Time during which a job is processed by the
information? computer is:
a. Logical data model A. Execution Time
b. Meta data B. Delay Time
c. Data flow model C. Real Time
d. Information process model D. Waiting Time
110. Open database connectivity (OBDC) tools are an 117. Which of the following circuit is used as a 'Memory
example of: device' in computers?
a. layerware A. Rectifier
b. tool kit B. Flip Flop
c. interfaceware C. Comparator
d. middleware D. Attenuator
111. All of the following are phases of systems analysis, 118. Operating System is the most common type of
except _________ software.
a. decision analysis phase A. Communication
b. requirements analysis phase B. Application
c. design analysis phase C. System
d. problem analysis phase D. Word Processing Software
112. A property or quality the system must have is called 119. Super computers are mainly useful for
a……………. A. Mathematical intensive scientific applications
a. scope B. Data-retrieval operations
b. functional requirement C. Input-output intensive processing
c. preliminary requirement D. All of the above
d. nonfunctional requirement
120. Which of the following is the product of data 127. Which of the following would most likely NOT be a
processing? symptom of a virus?
A. Information A. Existing program files and icons disappear.
B. Data B. The CD-ROM stops functioning.
C. Software Program C. The Web browser opens to an unusual home page.
D. System D. Odd messages or images are displayed on the screen.
121. Where is computer's BIOS stored? 128. By default, your documents print in ..........mode
A. DRAM A. Page setup
B. Flash B. Portrait
C. SRAM C. Landscape
D. EEPROM D. Print preview
122. Which company is not a microprocessor 129. Chip is a common nickname for ………….?
manufacturer? A. Transistor
A. IBM B. Resistor
B. AMD (Advanced Micro Devices) C. Integrated Circuit
C. Microsoft D. Semiconductor
D. Intel
130. Which of the following is not an manufacturer of
123. Basic Building Blocks for a Digital Circuit is ______ Hard Disk drives?
A. CMOS A. Samsung
B. Logic Gate B. Intel
C. BIOS C. Seagate
D. DMOS D. Western Digital
124. The most important or powerful computer in a 131. The main purpose of a primary key in a database
typical network is _____ table is………
A. Desktop a. updating
B. Network client b. deleting
C. Network server c. modifying
D. Network station d. searching
125. When sending an e-mail, the _____ line describes the 132. A result of a computer virus can not lead to......
contents of the message. A. Disk Crash
A. To B. Mother Board Crash
B. Subject C. Corruption of program
C. Contents D. Deletion of files
D. CC
133. What is the function of Recycle Bin?
126. Personal logs or journal entries posted on the Web A. Store deleted file
are known as: B. Store temporary file
A. Listservs C. Store corrupted file
B. Webcasts D. Store Document file
C. Blogs
D. Subject Directories
134. Concurrent access to share data may result in 141. Which of these is the first web-based e-mail service?
data………… A. Gmail
a. recovery B. Yahoo Mail
b. inconsistency C. Hotmail
c. repository D. Rediff Mail
d. consistency
142. Protocols are…………..
135. A computer assisted method for the recording and A. Sets of rules
analyzing of existing hypothetical systems is known B. Sets of maps
as……… C. Sets of computers
A. Distributed processing D. Sets of product
B. Data transmission
C. Data link 143. Hyper-threading (HT) is related to-
D. Data flow A. Processor
B. RAM
136. Which provides the fastest access to large video C. Mother board
files? D. Hard Disk
a. SCSI hard drives
b. IDE hard drives 144. Datagram is related with ……………… service and
c. EIDE hard drives virtual circuit is related to………………..service.
d. Optical drives a. both are connectionless
b. Connectionless and connection oriented.
137. Logical design of database is called…. c. connection oriented and connectionless
a. Database schema d. None
b. All of them
c. Database Instance 145. Computers ability to use disk storage as memory is
d. Database snapshot called
a. Cashe memory
138. In a network, the computer that stores the files and b. Associative memory
process the data is named as c. Virtual memory
A. Server d. CMOS memory
B. Terminal
C. Modem
D. All of these
146. Which type of ROM is used in pen drives? EEPROM 172. Bluetooth operations use ……………….
147. In data communication which device converts digital Technology? Radio
data to analog signal? MODEM 173. Bluetooth is the popular name for the ………………..
148. Which one can be both as input and output device? wireless networking standard? 802.11
Touch Screen 174. If a computer on the network shares resources for
149. Which unit is known as nerve center of computer? others to use it is called ………..? Server
ALU 175. The process of loading the operating system in the
150. The word length of a computer is measured in? Bits memory is known as ………? Booting
151. The process of identifying and correcting mistakes in 176. …………………. is the machine readable form of a
a computer program is referred to as? Debugging program? Object code
152. Which computer memory is never erased? ROM 177. Which utility program could improve the speed of
153. ……………… is Permanent memory of a computer? disk? Defragmentation
ROM 178. ……………….. works first when you start your
154. When you start your computer than which computer? Processor
component works first? BIOS 179. ……………….. is not a part of motherboard? Power
155. One nibble means? 4 bits Supply
156. The file system ‘NTFS’ stands for? New Technology 180. ………………. Scanner is used in Banking? MICR
File System 181. …………………. Is the function of RAM in
157. Bridge works in which layer of OSI model? Data computer? Storing data temporarily
Link Layer 182. In ……………. Mode windows starts with only the
158. The last address of IP address represents? Broadcast core drivers and services? Safe
Address 183. …………………………….. is the primary job of the
159. CD ROM is ……………….? Optical Memory operating systems of a computer? Managing
160. The function of Gateway is to connect to……………. Resources
network? Dissimilar 184. How many keys are available in the numerical
161. Flash memory is ……………….? Non-Volatile keypad of a standard keyboard? 17
162. Most frequently used instructions are kept in? Cache 185. The common keyboard arrangement is called the
Memory ………….. layout? QWERTY
163. A computer connected with server is called? Work 186. Which of the following converts scanned text into
Station editable text? OCR
164. …………….. is the most common type of storage 187. The term ‘Dot Per Inch’ (DPI) refers to
device? Magnetic device ……………………? Resolution
165. …………….. permanently stores information 188. Which printer usually not used in official work? Line
without program? PROM chips printer
166. …………….. memory needs refresh? DRAM 189. Leaser full form ……………… ? Light Amplification
167. Computer can understand and execute …………… by Stimulated Emission of Radiation
Language? Machine 190. Leaser printers are known as ………………. ? Page
168. The local antenna for satellite connection is called? printers
VSAT 191. Which one works as an output and input device?
169. A destination for data going outside the system is Modem
called? Sink 192. Which of the following is an example of optical
170. A hard disk is divided into tracks which are storage device? CD ROM
subdivided into ………….. ? Sectors 193. Pen drive takes the place of ………………… ? Floppy
171. ………………. is a small piece of text stored on Disk
computer, phone or wherever you use to surf 194. The most frequently used instructions are kept in
internet? Cookie the………………? Cache Memory.
195. In binary number system each bit represents a 220. What is the unit of measurement for drive access
………….? Signal time? Milliseconds
196. Which of the following private banks of Bangladesh 221. The smallest unit of information is ………………?
introduced mobile banking first? Dutch Bangla Bank Bit
Ltd. 222. An electrical pathway within a computer is called
197. bKash is an example of …………… ? Mobile ……………… ? Bus
Banking 223. When you boot a computer you are ………………….
198. Which protocol assigns IP address to the client ? Loading the operating system.
connected in the Internet? DHCP 224. Process of combining string is known as…………….?
199. Internet works on……………….? Packet Switching Concatenation
200. Every WEB page has a unique address called 225. Collecting personal information and effectively
………………….. ? Uniform Resource Locator posing as another individual is known as the crime of
201. Which one of the following enables the mobile devices ………………..? Identity theft
to access internet resources? WAP 226. The common name for the crime of stealing password
202. What is ‘Cookie’ ? Internet Information File is……………….? Spoofing
203. When was @ chosen for its use in e-mail addresses? 227. The thing that eventually terminates a worm virus is
1972 a lack of………………… ? memory/disk space
204. Which is the first program of Microsoft? MS DOS 228. What is the name of an application program that
205. Which one is the social networking site developed by gathers user information and sends it to someone
Google? Google Plus through the internet? Spybot
206. Windows media player is an example of …………..? 229. Software program that close potential security
Application Software breaches in an operating system is known
207. VSAT full form is ………..? Very Small Apparatus as…………..? Security patches
Terminal 230. When customers of a website are unable to access it
208. Trojan Horse is a …………? Virus due to a bombardment of fake traffic is known
209. Which of the following is the most commonly used as………………? Denial of service attack
HTTP methods? GET and POST 231. The scrambling of code is known
210. Which of the following refers to the correctness and as…………………….? Encryption
completeness of the data in a database? Data 232. If you want to secure a message use…………………
Integrity ? Cryptosystem
211. Which memory allocation policy allocates the largest 233. When data is entered into a memory location it
hole to the process? Worst-Fit ……………….? Erases the previous content
212. Portable program means ……………? Independent 234. The ALU of a computer responds to the command
Platform coming from……………..? control section
213. How do the main components of the computer 235. Which key on a keyboard of a computer does not
communicate with each other? System bus have its name printed on the key? SPACE
214. When a computer is first turn on or restarted a 236. Where would you find a magnetic strip? Credit card
special type of absolute loader is executed called 237. Magnetic tape is a …………………… ? Serial access
……………? Bootstrapped Loader medium
215. Which class of IP address has the most host addresses 238. What program runs first after computer is booted
available by default? Class A and loading GIU? Authentication
216. The ASCII code of A is……………? 65 239. The Bankers algorithm is used to ………………….. ?
217. In most applications F1 stands for………….? Help prevent deadlock
218. In a flow chart a diamond generally stands for 240. A page fault occurs when ……………. ? the page is
……………. ? Decision not found in the memory
219. What is the standard storage capacity of a CD ROM
disk? 700 MB
241. …………………….. is a compromise mode between 260. High entropy means that the partitions in
shut down and sleep mode because it does not classification are …………..? Not pure
consume power and remembers the current state of 261. All data is labelled and the algorithm learn to predict
your desktop? Hibernate the output from the input data is …………………?
242. The problem with …………………. File is that they Supervised Learning.
slow your computers operation? Fragmented 262. The term machine learning is coined by
243. The chunks of a memory are known as ……………….? Arthur Samuel
……………………. ? Frame 263. …………………. Data used to build a data mining
244. ………………….. used to operate the mobile phone? model? Training
Embedded OS
245. When you cut or copy the text or picture it stores
temporarily in …………………. ? Clipboard
246. First in First out (FIFO) scheduling is
……………………..? Non Preemptive Scheduling
247. Voice/video is a network is …………….............
traffic? Real time
248. Which method do we use to find the best fit line for
data in Linear Regression?Least square error
249. Linear regression errors values has to be normally
distributed but in case of Logistic Regression it is not
the case? True.
250. Which of the following is true about residuals? Lower
is better
251. Which of the following method do we use to best fit
the data in Logistic Regression? Maximum
Likelihood
252. Regression Trees are often used to model …………..
data? Non-Linear
253. Simple regression assumes a ……………….
Relationship between the input attribute and output
attribute? Linear
254. The average squared difference between classifier
predicted output and actual output? Mean squared
error.
255. Which language is best for machine learning? Python
256. Overfitting is a type of modelling error which results
in the failure to predict future observations
effectively or fit additional data in the existing model?
True
257. …………….. is a part of machine learning that works
with neural networks? Deep Learning.
258. A nearest neighbor approach is best used
when……………? Irrelevant attributes have been
removed from the data
259. Supervised learning differs from unsupervised
clustering in that supervised learning requires
…………………? Input attributes to be categorical.
Miscellaneous
1. If the probability of sending successful data packet 6. What is the following is the subset of {b c d}?
is 80%, what will be the probability of successful
delivery if a packet is sent twice? a. { }
a. 64% b. {n}
b. 96% c. {1, 2, 3}
c. 100% d. {a, b, c}
d. 80%
7. The perpendicular of the line 2x+3y=4 is
d. None
8. Arithmetic and geometric mean of X and Y will be
the same if
d. Nephew
9. _________ refers to the weakness in the security
system.
d. 2x+3y=0
a. Probability A. Decryption
b. Honesty B. Cryptanalysis
c. Peaceful C. Cryptosystem
d. Carelessness D. Encryption
11. One of the major drawbacks of symmetric system is 17. Unsupervised learning is an example of………..
_____.
a. Classification and prediction
A. Key Distribution
b. Classification and Regression
B. Key Diffusion
c. clustering
C. Key Confusion
d. Data Mining
D. Key Construction
14. The security services that IPSec provide requires 20. Unit testing is to test the ____ of the units.
shared keys to perform___________.
a. Performance
A. Privacy
b. System issues
B. Reliability
c. Functionality
C. Authentication
d. Hardware failure
D. Security
A. Hash A) Cost
B. NULL B) Risks
C. Encryption C) Time
D. Decryption D) Quality
23. Which of the following is not an object-oriented 39. Which device can forward data packet from one
programming language? Ans: Pascal network to another network? Ans: Router
24. Which of the following is a possible IP address 40. “BAUD” means …………….? Ans: The rate at
in a network with IP address 172.16.10.5 and which the signal changes
subnet mask 255.255.248.0? Ans: 172.16.8.0 41. Who invented OOP? Alan Kay
25. What is the inner most part of optical fiber? Ans: 42. Which was the first purely object oriented
Core programming language developed? SmallTalk
26. To correctly send binary data from one computer 43. Which feature of OOP indicates code
to another, which type of redundant bits are reusability? Inheritance
27. added? Ans: Parity bit 44. The feature by which one object can interact
28. Which device support circuit switching? Ans: with another object is _____________ Message
Switch Passing
29. For providing connection between networks 45. What is an abstraction in object-oriented
which of the following sends data from one programming? Hiding the implementation and
30. network protocol by translating it to other showing only the features
network protocol so that data can be transmitted 46. What happens when an object is passed by
between these dissimilar networks? Ans: reference? Destructor is not called
Gateway 47. Which access specifier is usually used for data
31. If the screen resolution is 1024x768, then what members of a class? Private
would be the aspect ratio? Ans: 4:3 48. Which feature of OOP reduces the use of nested
32. A physical connection between the classes? Inheritance
microprocessor memory and other parts of the 49. Which keyword among the following can be
microcomputer is known as? Ans: address bus used to declare an array of objects in java? new
33. Data in the form of continuous flow is known 50. Single level inheritance supports
as? Ans: analog data _____________ inheritance? runtime
34. Which of the following processors use RISC 51. How to overcome diamond problem? Using
technology? Ans: 486dx virtual keyword with same name function
35. IPv6 is ……….. addressing. Ans: 16 bytes 52. What happens if non static members are used in
(16*8=128 bits) static member function? Compile time error
36. CSA stands for……………….? Ans: Cloud 53. Where is the memory allocated for the objects?
service Alliance Ram
37. Sending signals to the all ports means 54. Encapsulation and abstraction differ as
………….. ? Ans: broadcast ____________Binding and Hiding respectively
38. In general a monitor with refresh rate of 55. Which feature of OOP is exhibited by the
…………… should not cause eyestrain. Ans: 72 function overriding? Polymorphism
Hz or higher 56. How to access the private member function of a
class? Using address of member function
57. Which is correct syntax for declaring pointer to 72. The bit used to signify that the cache location is
object? className* objectName; updated is ________ Dirty bit
58. Object being passed to a copy constructor 73. Software is defined as ___________set of
___________Must be passed by reference programs, documentation & configuration of
59. Instance of which type of class can’t be created? data
Abstract class 74. CASE stands for……………..Computer-Aided
60. Which feature in OOP is used to allocate Software Engineering
additional functions to a predefined operator in 75. ________ is defined as the process of generating
any language? Operator Overloading analysis and designing documents? Reverse
61. Which of the following is a type of architecture engineering
used in the computers nowadays? Von-Neumann 76. Attributes of good software is ____________
Architecture Maintainability & functionality
62. Which of the architecture is power efficient? 77. Who proposed the spiral model? Barry Boehm
RISC 78. __________ is not suitable for accommodating
63. What does CSA stands for? Computer Speed any change? Waterfall Model
Addition 79. Software Debugging is known as
64. If an exception is raised and the succeeding _________________ finding and correcting
instructions are executed completely, then the errors in the program code
processor is said to have ______ Imprecise 80. To access the services of the operating system,
exceptions the interface is provided by the ___________
65. The IA-32 system follows which of the System calls
following design? CISC 81. CPU scheduling is the basis of
66. The VLIW architecture follows _____ approach ___________multiprogramming operating
to achieve parallelism. MIMD systems
67. What does VLIW stands for? Very Long 82. If a process fails, most operating system write
Instruction Word the error information to a ______log file
68. In CISC architecture most of the complex 83. What does OS X has? hybrid kernel
instructions are stored in _____ CISC 84. In a timeshare operating system, when the time
69. Both the CISC and RISC architectures have been slot assigned to a process is completed, the
developed to reduce the ______ Semantic gap process switches from the current state to? Ready
70. The reason for the cells to lose their state over state
time is ________ Usage of capacitors to store the 85. When a process is in a “Blocked” state waiting
charge for some I/O service. When the service is
71. The memory devices which are similar to completed, it goes to the __________Ready state
EEPROM but differ in the cost effectiveness is 86. A deadlock avoidance algorithm dynamically
______ Flash memory examines the __________ to ensure that a
circular wait condition can never exist? resource memory. Which of the following helps in
allocation state achieving this goal? Buffer
87. For real time operating systems, interrupt latency 101. Who is responsible for the creation of the symbol
should be ____________minimal table? Compiler
88. The priority of a process will ______________ if 102. Characters are grouped into tokens in which of
the scheduler assigns it a static priority. remain the following phase of the compiler design?
unchanged Lexical analyzer
89. On systems where there are multiple operating 103. Bitmap is a collection of ____________ that
system, the decision to load a particular one is describes an image. Pixels
done by _____________boot loader 104. Among the following process, which process is
90. Which of the following architecture is followed known as the elimination of parts of a scene
by general-purpose microprocessors? Von outside a window or a viewport? Clipping
Neumann architecture 105. Which of the following is the process of
91. Which memory storage is widely used in PCs digitizing a given picture definition into a set of
and Embedded Systems? DRAM pixel-intensity for storage in the frame buffer?
92. Which type of memory is suitable for low Scan conversion
volume production of embedded systems? Non- 106. Which of the following is commonly known as
volatile frame buffer on a black and white system with
93. Which of the following unit protects the one bit per pixel? Bitmap
memory? memory management unit 107. Which of the following algorithm is a faster
94. Which of the architecture is more complex? method for calculating pixel positions? DDA line
SPARC algorithm
95. Which one of the following offers CPUs as 108. ‘Skala’ is an example of which of the following
integrated memory or peripheral interfaces? type of clipping? line clipping
Microcontroller 109. The Unix shell is both _______ and _______
96. What is information about data called? Meta data language. scripting, interpreter
97. The ability to query data, as well as insert, 110. Which part of the Unix operating system
delete, and alter tuples, is offered by interacts with the hardware? Kernel
____________ DML (Data Manipulation 111. Which of the following is the first and foremost
Language step in Image Processing? Image acquisition
98. ______________ is a set of one or more 112. Caesar Cipher is an example of? Mono-
attributes taken collectively to uniquely identify alphabetic Cipher
a record. Super key 113. Which layer is used for wireless connection in
99. Procedural language among the following is IoT devices? Data link layer
__________ Relational algebra 114. Which of the following is used to capture data
100. A major goal of the db system is to minimize the from the physical world in IoT devices? Sensors
number of block transfers between the disk and
❖ ………………
❖ ………………………
❖ ………………………
❖ ……………
❖ ………………
❖ ………………
❖ ………………
❖ ……………
❖ …………
❖ …………………
Part 4
Analytical
Unfortunately এই পার্ট এর জন্য এই মু হূর্তট ক ার্ন্া ব্যব্স্থা রর্ত পারলাম ন্া। তর্ব্ গুগল ক্লাসরুর্ম দুই এ র্া PDF Provide রা হর্ব্ এই
ররর্লর্র্ড। ইন্ফ্যাক্ট আপন্ার্েরর্ প্ররতর্া Part কের্ আপন্ার্ের কেয়ার মত আমার আরও অর্ন্ র ছু আর্ছ। তাই ASAP google classroom এ
জর্য়ন্ রুন্।
•
•
• https://youtu.be/EfkfFxaHOPs
References:
https://www.javatpoint.com/ https://techdifferences.com/
https://www.guru99.com/ https://byjus.com/
https://onlinecomputertips.com/ https://study.com/
https://www.tutorialspoint.com/ https://www.maximintegrated.com/
https://techdifferences.com/ https://www.w3schools.com/
https://www.encyclopedia.com/ https://www.omnisci.com/
https://www.vedantu.com/ https://www.educba.com/
https://en.wikipedia.org/ https://www.examveda.com/
https://www.tutorialspoint.com/ https://www.javatpoint.com/
https://www.dictionary.com/ https://www.tutorialspoint.com/
https://www.geeksforgeeks.org/ https://www.sanfoundry.com/
https://www.webopedia.com/ https://www.examtray.com/
https://www.techtarget.com/ https://www.geeksforgeeks.org/
https://www.edureka.co/ https://tutorialslink.com/
https://www.diffen.com/ https://www.udemy.com/
https://studyelectrical.com/ https://studymaterialz.in/
https://www.programiz.com/ https://easyengineering.net/
https://www.programiz.com/ https://unacademy.com/
https://favtutor.com/ https://lastmomenttuitions.com/
https://www.computerhope.com/ https://www.examtray.com/
https://thirdspacelearning.com/ https://www.courseya.com/
http://flint.cs.yale.edu/ https://www.toppr.com
https://www.investopedia.com/
www.youtube.com/c/NetComEducation