You are on page 1of 14
AU Rights enero f Information & Communi Name: = Anawer all questions * Inench of the questions 1 to 30, pick one of the alternatives from (1). (2). (3). (4) und (5) which is Correct or most approprinte 2020 September Ge. 2020 October ww jt jon Technologies I 7 Time: 2 Hours Grade 13 Which of the descending order of memory hierarchy as far as price is concerned according to the following ? (1) Hard disk, RAM, Cache, Registers (2) RAM, Hard disk, memory card, External storage (3) Registers, Cache, RAM, Secondary storage (4) Memory card, Magnetic tape, Cache memory, External storage (5) None of these Which of the following characteristic of DRAM is an advantage over that of SRAM ? (1) Speed (2) Capacity (3) Power consumption (4) No. of transistors (5) Low price _____ is a process in which data is temporarily held to be used and executed by @ device, program or the system Which of the following term is suitable to fill the blank above, (1) Spooking (2) Multi-programming (3) Latency (4) Multi-processing (5) Spooling Downloading someone else belonging and present them as your very own is known as, (1) Copyright (2) Phishing (3) Piracy (4) Privacy (5) Plagiarism ‘What is the correct line of code that can be used to display an e-mail address through a HTML form on a web page ? (1) _ (2)__ a (3) (4) (5) <2 php Print email: "Form" ; ? > 6, Which of the following statement or statements is/are trve about Internet OF Things on (A) IOT environment can be monitored remotely _ (B)IOT environment can be built by using hardware, sensors, connectivity ani required software (C) Embeded computer is used to give computing ability to things (1) Aonly (2)Bonly (3)C only (4) A and B only (5) A,B,C all 7. The corresponding External CSS to apply for a webpage is known as, (1) Link {url = "mystyle-ess"} (2) texVess’ href 'mystyle.css") (4) Link {rel = ‘stylesheet’ type (5)
8. Which of the following term best describes the time required for a particular process to complete from submission time to completion ? (1) Throughput time (2) Waiting time (3) Turnaround time (4) Response time (5) Completion time 9, Mechanism in which a process in main memory moving in to virtual memory is identified as, (2) Context switching (2) Demand paging (3) Scheduling (4) Swapping (5) Interrupting © Consider the following process transition diagram to answer 10 - 12 Main Memory 70 Completed 10. Which of the following represent the Process transition diagram above Correct order of letters A - I of seven state (1) A New, B - Ready, C - Running, D - Blocked, E - Exit, F- Reads Suspend, . 2, D - Blocked, F - Fs ; xil, F - Ready/S\ .G (2) A- New, B - Ready, C - Blocked, D - Running, E - Exit, F- G- , ' , D - Running, E - Exit, F- i od 1g, E - Exit, F - Suspend blocked, 3) A - New, B - Ready, C - Running, D - Bloc! F , i, D - Blocked, E - Exit, F - Ready/Suspend, G - Blocked/Suspend. a (4) A - Create, B - Running, C - Ready, D - Ready/Suspend, E - Exit, F - Blocked, G ~ Blocked/Suspend. (5) A - Create, B - Ready, C - Blocked, D - Running, E - Exit, F - Ready/Suspend, G~ Blocked/Suspend. 11. Which is the most correct reason for transition of process C to D in the above diagram (1) Because RAM has no enough space (2) Because a high priority job is in presence (3) When a process terminates (4) Because of secondary memory is not sufficient (5) None of the above 12. Which statement describes the correct reason for transition of process G to F ? (1) To give priority to another process (2) Because RAM has no enough space (3) Because of an effect from an input or output device “@ Because of answer (1) and (2) both (5) None of the above 13. Consider a system where a heat sensor detect an intrusion & alerts the security company what kind of requirement the system is providing (1) Functional Requirement (2) Non- functional Requirement (3) Known Requirement _(4) Nice to have functional requirement (5) Nice to have non-functional requirement Enables the software engineer to derive sets of inputs conditions that will fully exercise all functional requirements for a program (1) White -Box testing (2) Black - Box testing (3) User acceptance testing (4) Unit testing (5) Integrated testing 15. Which of the following system development model is not suitable for accommodating any change in first phases of the system ? 14. 1) Prototype Model (2) Waterfall Model a ‘Agile Model (@) Rapid Application Development Model (5) Spiral Model | eT eT the rules of & DFD correct regarding | Srl one output pach proves souk have at eas PA and BB) Data stores must go through & PFOSESS ro ) ll process in a DFD should £0 19 008 poms Dy Data store should access another Data E) An Entity can handle data store MHADE. ABD G)BCD AcD 16. Which of the following (5) ABC 17. Which of the following information system OP 18 na 7 Specific tasks by suategic management 3nd ee Ti) Transoction Processing system (2) Decision ipport 3. HTTP 4. TFIP 5. FTP 1.DHCP 2. SMTP (1.3 Aand 5 (5)1,3 and ()land2? (@)2.3and5 YI. Zand 19. You ose 1 sboet a network that has 5 subocts, ach with at least 16 hosts Indicate which of the following subnet mask is correct, (0) 25525 394. (3) 255.255.255.240 (4) 255.255.258.248 (5) 255.255.255.128 20. Which layer is respoasibie for processing to process delivery? (1) Network layer (2) Transpo layer (3) Session layer (4) Datalink layer (5) Physical layer 21. What is the size of mac address ? (1) 16bis —(2)32 bits (3)-48 bits AYEH its (5) 128 Bits 2. What is the use of ping command? (1) To test whether 2 device on the nerwork is reached (2) To test a hard disk fauhs (3) To test bugs in an application (4) To detect network exrors: (5) Nome of the above 23. Adigital signanme necdsa_ (1) Private key system (2) Shared key system La Public key system (4) Private and Pubtic both, (5) Manual key system 24. Which of the following correctly represents the binary 1934 is, ry equivalent of the Hexadecimal number (1) 1010101, (2) 10010. B)1101.11; (4) 11001.0101, (3) 10011.0011; 2 25. Which of the following represents the bitwise XOI 01011011 and 10110110. XOR operation of the two binary numbers of 1) TOLOLIOL —()OLOILOL (3)11011101 (4) 11201110 ¢5) 100! @) iui ) « 26. Whach of the follow amg ° anne saleewme Temeseas the esa of the binary arthmensc opension of 0) G0010110 1 12) 1000 (3) 00001011 (4) 1900010 (5) None off these 27. Whe 3 ae he ay agua of te decimal 13.378 2 10 None 960001101.101 (2) 10110.011 (3) 111.011 (4) 00000101 11 (5) of these * Consider the following K = i one K Map 28. Which of the following is the correct logic ex} corresponds pression that tothe two marked ‘segments on the K-Map? ny €= AB 2)C+AB 3) AB=C 14) ABC + ABC 65) None of these | 7 ane ole 29. If M = Nis equivalent to BIN ~ NM, to which of the following the above given diagram belongs to a) WQ@N (2M ON By M-N 4) MIN (5) None of these 30. A computer uses 18-bit virtual memory address and also byte addressable. Which ofthe following represents the correct value of its total virtual memory, | eo aka eo ree ae © Consider the following logic circuit () Boas (TB oe oe oe 31. In which of the SDLC phase DFD's are drawn? (1) Requirments Analysis (2) System Design (3) System Testing (4) System Implementation (5) System Maintenance © Consider the following database table to answer the questions 32-36 Part_Warehouse Pare ID ‘Warebouse ID | Quantity | Warehouse Address aes roots A tT 200 Maredana P002 B i 150 Borella | poo | Cc i 100 Fort Pos) D T 175 Petwsh | pos | B l 185 Borelia Consider the followii ollowing flow chart fo answer the questions 4 estions 40-41 40. Which of the following statements is / are correct about the algorithm expressed by the flowchart? A= It takes exactly 50 input B= It doesn't output an integer. C- Ifit inputs invalid marks it will lerminate the program (2) B only (3) C only (4) A and B only (5) B and C only (1) A only | 41, Which of the following Python program has/have the same functionality ax the algorithm in the flowchart above. a) c=l while ¢ < = 50: m = int (input ("Marks")) ifm Oorm- 100: msg > “Invalid Marks” elif m = 50: msg = “Pass” else: msg = "Fail" print (msg) c=c+l 50: m=int(input('marks)) if m0 or m7100 msg-'Invalid Marks’ elif m>50: msg='Pass’ else: msg=Fail! print(msg) eet! (5).None of these _ (2) oat while o~ ~ 50: m_« int (input ("Marks") if m ~ O08 m + 100: msg ~ "Invalid Marks” elif m ~ 50: msg = "Pass" else: msg = "Pail" print (insg) cactl (4). el while c<=50: m=int{input('marks’)) if m<0 or m>100: msg="Invalid Marks’ elif m>50: msg=Pass’ else: msg>Fail’ print(msg) eet] 42, What will be the output of the following python code segment?” for i in range (10, 20, 2): if 1%3 continue else: print (i) (i) 10 (2) 12 GB) 10 12 18 —l 14 16 16 (5) None of these 43. Which of the following statement 1s correct? (1) Interpreter runs faster than compiler (2) Debugging is more difficult in compiler than interpreter (3) Compiler uses less memory compared with interpreter (4) Easy to modify the code in compiler than interpreter (5) Compiler is less likely to crash the computer than the interpreter 44. What is the value of the following python expression? 2°(25%7)9*2//8 (1) 20 (2)40 (3)2 (4)4 (5) 3.5 — 45. What will be the output if the following Python code is executed with ‘racecar’ as the input? >->s=input() >eest:e=sf: 1] (1) True (2) False @)1 (40 (5)-1 — 46. What will be the output if the following Python code? y=10 for i in range( 1,6): yryss 1 lilies (245 (3) 35 (4) 30 (5) 25 47, What will be the output if the following Python code segment? L=(2,3.7,6,8,10] 10:10; while 1

You might also like