You are on page 1of 12

QUIZ BOWL QUESTIONS (2021)

1. DATA STRUCTURES AND ALGORITHM

EASY
1. Arranging a pack of playing cards real time examples is based on _____________?
a. Selection sort
b. Insertion sort
c. Mergesort
d. Bubble sort

2. The pivot element from the input 8, 1, 4, 9, 6, 3, 5, 2, 7, 0 using median-of-three partitioning method
is ___________
a. 4
b. 1
c. 2
d. 6
3. For which of the following applications is suitable for arrays:
a. Holding the scores on Calculus, History and Design of a class.
b. Holding the name, social security number, age, and income of one individual.
c. Holding the temperature readings taken every hour throughout a day
d. Holding the gross sales and net sales a store made in each of twelve months.

MODERATE

1. Inserting SCARE into an empty BST, the content of the fifth element in array A will be
_____E______
2. If memory address of first node in linked list is 1052 then 3rd node address will be _____. Consider
the type of the elements are characters.
a. 1054
b. 1056
c. 1060
d. 1055

DIFFICULT

1. Consider a two dimensional array A[20][10]. Assume that array A is long int , the base address of
array A is 100, elements are stored in row-major order and first element is A[0][0]. What is the
address of A[11][5] ?
Answer: 560
2. To evaluate the RPN AB+C/D*, where A= 7.0, B= 4.0, C=3.0, D = -2.0 will yield
_________________
Answer: -7.3

2. LOGIC DESIGN AND SWITCHING THEORY


EASY
1. It consists of flip-flops, a bistable circuit composed of four to six transistors. Once a flip-flop
stores a bit, it keeps that value until the opposite value is stored in it.
ANSWER: Static RAM (SRAM)
2. Inside this chip, each memory cell holds one bit of information and is made up of two parts:
a transistor and a capacitor
ANSWER: Dynamic RAM (DRAM)
3. In sequential circuit, a ______ is level-triggered wherein outputs can change as soon as the inputs
changes.
ANSWER: Latch
4. A __________ is edge-triggered which only changes state when a control signal goes from high
to low or low to high.
ANSWER: Flip-flop
5. It is sometimes called data distributor; such that the circuit can distribute or deliver multiple
outputs from a single input.
ANSWER: Demultiplexer (Demux)

AVERAGE
1. Given the 4 JK Flip Flop connected as T-Flip Flop Circuit’ Diagram, the initial state of the circuit
at t=0 is 0001 (Q3Q2Q1Q0)

How many states can the circuit assume?

ANSWER: 16

2. 3012 4
-1230 4
ANSWER: 1122 4

DIFFICULT
1. Simplify the given Boolean function using a map.
F (V,W,X,Y,Z) = Σ m(0,2,4,6,9,13,21,23,25,29,31)

ANSWER: F=V’W’Z’ + VXZ + WY’Z

2. Design a combinational circuit that can detect an error in the representation of a decimal digit in
BCD. In other words, the circuit’s output is equal to 1 when the input ABCD contains any one of
the six unused bit combinations in the BCD code. Determine the Boolean expression of the
outputs signals in SOP form

ANSWER: F=Z

3. Using algebraic manipulation, reduce the given Boolean Expression to its simplest form.
A’B (D’+C’D) + B (A’+A’CD)

ANSWER: A’B

3. COMPUTER SYSTEMS ARCHITECTURE AND ORGANIZATION

EASY

The Von Neumann architecture is also known as IAS computer. What does IAS stand for?

ANSWER Institute for Advanced Studies

AVERAGE

A processor has 40 distinct instructions and 24 general purpose registers. A 32-bit instruction
word has an opcode, two registers operands and an immediate operand. The number of bits
available for the immediate operand field is_______.

ANSWER 16

DIFFICULT

Using DIRECT ADDRESSING MODE IN 8086, what memory address will hexadecimal value
of 18 be loaded?
ORG 100h
MOV AX, 2162H
MOV DS, AX
MOV CX, 24
MOV [481], CX
MOV BX,[481]
RET

ANSWER 2162:01E1 OR 21801H

4. MICROPROCESSOR SYSTEMS

EASY
TASK OF THE MICROPROCESSOR THAT REQUIRES 95% OF ITS TOTAL TIME.
-data transfer
AVERAGE
CONVERT -128 TO 8-BIT USING SIGNED MAGNITUDE REPRESENTATION
- CANNOT BE
DIFFICULT
16-BIT ASSEMBLY LANGUAGE INSTRUCTIONS THAT MUST COPY FFFFH TO THE
DATA SEGMENT REGISTER.
- MOV DX, FFFFH
- MOV DS, DX

5. ENGINEERING ETHICS AND COMPUTER LAWS


EASY

1. The Republic Act 10173 - AN ACT PROTECTING INDIVIDUAL PERSONAL


INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE
GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A
NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES. This is also
known as the ________________ of 2012.

ANSWER Data Privacy Act

2. Which of the following is NOT one of the three essential elements for a patent to be granted
for an invention?
a. Be a product
b. Be new to the public
c. Involve an inventive step
d. Be capable of industrial application

ANSWER a

3. Data leakage is popularly known as __________


a. Data theft
b. Data crack
c. Low and slow data theft
d. Data threat

ANSWER c

AVERAGE
1. The e-Commerce Law recognizes the data messages as evidence in court. TRUE or FALSE?

ANSWER TRUE

2. What is the duration of copyright protection for a novel?


a. A novel will not gain copyright protection.
b. The day the author dies.
c. The end of the calendar year in which the author died.
d. 70 years from the end of the calendar year in which the author died.

ANSWER d

3. Which of the below-mentioned tool is used for Wi-Fi hacking?


a. Wireshark
b. Nessus
c. Aircrack-ng
d. Snort

ANSWER c

DIFFICULT

1. It was founded in 2006 by Julian Assange and has become renowned for publishing
thousands of classified documents covering everything from the film industry to national
security and wars. It has published hundreds of thousands of documents leaked by former US
Army intelligence analyst including documents relating to the war in Afghanistan which
revealed how the US military had killed hundreds of civilians in unreported incidents.

ANSWER WikiLeaks

2. During your spare time, you have a small side business completely unrelated to your
functions at work. You make sure it does not impact your job and you do not devote time to it
while you are working. What is the best thing to do?
a. As it is a personal matter, I do not have to tell about it to anyone.
b. As the business has nothing to do with my work, I do not need to disclose this
information.
c. I should disclose this information following the Conflict of Interest Policy.
d. I can ask my manager to work with me in my side business, so she/he can check that
I am following the Conflict of Interest Policy.

ANSWER c
3. The Transport Layer Security ROBOT vulnerability, allows an attacker to obtain the RSA
key necessary to decrypt TLS traffic under certain conditions. RoBOT is abbreviated as
_______________

ANSWER Return of Bleichenbacher’s Oracle Threat

6. OPERATING SYSTEMS

EASY
What was the codename of Windows 11 prior to its release last October 5, 2021?
ANSWER Sun Valley

AVERAGE
Consider the following snapshot of a system:

Processes Allocation Max Available


A B C A B C A B C
P0 1 1 2 4 3 3 2 1 0
P1 2 1 2 3 2 2
P2 4 0 1 9 0 2
P3 0 2 0 7 5 3
P4 1 1 2 1 1 2

Using banker’s algorithm, determine the safe state sequence of the system
ANSWER Safe sequence: <P1, P4, P2, P3, P0>

DIFFICULT

An operating system uses the Shortest Remaining Time first (SRTF) process scheduling algorithm.
Consider the arrival times and execution times for the following processes:
Process Execution time Arrival time
P1 20 0
P2 25 15
P3 10 30
P4 15 45
What is the total waiting time for process P2?
ANSWER 15

7. COMPUTER NETWORKS

EASY

1. From a command prompt window, you can determine the current network settings for your PC.
Which of the following commands will display the IP addresses assigned to each NIC on your
Windows laptop?
ANSWER: Ipconfig

2. What is the purpose of the subnet mask in conjunction with an IP address?


ANSWER: To determine the subnet to which the host belongs

3. Given the network address 172.16.0.0 16, how many host bits need to be borrowed to create 8
subnets?
ANSWER: 3

4. Which field in the IPv4 header Is used to prevent a packet from traversing a network endlessly?
ANSWER: Time-to-Live

5. Given 210.10.10.121 and a subnet mask with 28 bits, find the subnet number to which the host
belongs.
ANSWER: 7

6. Running the command to find out what IP address has been assigned to your network adapter
reveals an IP address of 169.254.10.22. Can you conclude that your network adaptor has
successfully acquired an address from the DHCP server?
ANSWER: NO

7. Is a switch more intelligent than a hub?


ANSWER: YES

8. NIC stands for?


ANSWER: Network Interface Card
9. The most common type of network cable for a LAN is

ANSWER: Ethernet Twisted Pair Cable/ Twisted Pair Cable

10. To directly open the Windows Network Connections Control Panel you can use Start -> Run and
enter _______ [command] into the dialog box.

ANSWER: ncpacpl

11. A network administrator subnets the 192.168.10.0/28 network into subnets with /24 masks. How
many equal-sized subnets are created?
a. 2
b. 4
c. 8
d. 16
e. 64
12. How many valid host addresses are available on an IPv4 subnet that is configured with a /25
mask?
a. 254
b. 128
c. 126
d. 62
e. 64
13. How many bits must be borrowed from the host portion of an address to accommodate a router
with 3 connected networks?
a. two
b. three
c. four
d. five
14. Which of the following blocks of addresses are defined by RFC 1918 for private network use?
a. 10.0.0.0/8
b. 100.64.0.0/14
c. 169.254.0.0/16
d. 239.0.0.0/8

15. A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1.
What does this code represent?
a. host unreachable
b. protocol unreachable
c. port unreachable
d. network unreachable

MODERATE

16. How many host addresses are available on the 192.168.10.128/26 network?
a. 30
b. 32
c. 60
d. 62
e. 64

17. A site administrator has been told that a particular network at the site must accommodate 126
hosts. Which subnet mask would be used that contains the required number of host bits?

a. 255.255.255.0
b. 255.255.255.128
c. 255.255.255.224
d. 255.255.255.240

18. A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The
company wants to create a subnetwork with 18 hosts. Which networks would achieve that?

a. 192.168.1.16/28
b. 192.168.1.64/27
c. 192.168.1.128/27
d. 192.168.1.96/28

DIFFICULT
19. An administrator wants to create four subnetworks from the network address 192.168.1.0/26.
What is the network address and subnet mask of the second useable subnet?
a. subnetwork 192.168.1.64; subnet mask 255.255.255.192
b. subnetwork 192.168.1.32;subnet mask 255.255.255.240
c. subnetwork 192.168.1.64; subnet mask 255.255.255.240
d. subnetwork 192.168.1.128; subnet mask 255.255.255.192
e. subnetwork 192.168.1.8 ;subnet mask 255.255.255.224

20. An administrator wants to create four subnetworks from the network address 192.168.1.0/26.
What is the broadcast address and subnet mask of the second useable subnet?
a. Broadcast address 192.168.1.63; subnet mask; 255.255.255.192
b. Broadcast address 192.168.1.127; subnet mask; 255.255.255.192
c. Broadcast address 192.168.1.31; subnet mask; 255.255.255.240
d. Broadcast address 192.168.1.1; subnet mask; 255.255.255.192

8. SYSTEMS ANALYSIS AND DESIGN

EASY

A ____________ is the term used to describe a central storehouse of information about a system's
data

ANSWER: Data dictionary

AVERAGE
The key graphical model of the systems requirements used with structured analysis is the ____.

ANSWER: data flow diagram (DFD)

DIFFICULT

One of the rights cited by IBM usability expert Dr. Clare-Marie Karat is compliance, compliance means?
a. the user has the right to a system that performs exactly as promised
b. the user is always right
c. the user has the right to know the limits of the system’s capabilities
d. the user has the right to be informed clearly about all systems requirements

A knowledge management system ____.


a. indexes all the knowledge contained within an organization
b. supports the storage of and access to documents within an organization
c. is another term for a library system
d. requires a very large amount of online storage space

9. SOFTWARE ENGINEERING

EASY

The spiral model of software development


a. Ends with the delivery of the software product
b. Is more chaotic than the incremental model
c. Includes project risks evaluation during each iteration
d. Only appropriate for computer hardware design.

The incremental model of software development is


a. A good approach when a working core product is required quickly
b. A reasonable approach when requirements are well defined
c. The best approach to use for projects with large development teams
d. A revolutionary model that is not used for commercial products

AVERAGE

Which document is created by system analyst after the requirements are collected from various
stakeholders?

ANSWER: Software requirement specification

The prototyping model of software development is


a. A reasonable approach when requirements are well-defined
b. A useful approach when a customer cannot define requirements clearly
c. The best approach to use for projects with large development teams
d. A risky model that rarely produces a meaningful product
DIFFICULT

A qualitative indication of the degree to which a module is connected to other modules and the
outside world is

ANSWER: Coupling

What is the normal order of activities in which traditional software testing is organized?
a. integration testing
b. system testing
c. unit testing
d. validation testing

ANSWER: c, a, d and b

10. GENERAL INFORMATION

EASY
A symbol used to comment a single line in PHP?
ANSWER # or //

The RSA is a public key cryptosystem wherein the encryption key is known to everybody while
the decryption key is kept secret. What does RSA stands for?
ANSWER Rivest, Shamir, Adleman

Which tags are commonly used by search engines?


a. Headings
b. Title
c. Paragraph
d. Body
AVERAGE
Find gcd(102, 66)
ANSWER 6
Find an inverse of 5 modulo 19
ANSWER 4
Which of the following protocol is not used in the internet?
a. Telnet
b. WIRL
c. HTTP
d. Gopher

DIFFICULT
Decrypt the message AYLHJOLYVBZ encrypted using the shift cipher
f (p) = (p + 7) mod 26
ANSWER TREACHEROUS
Given the following in an RSA cryptosystem:
43 and 59 are two large primes
Encryption key is 13
Find the decryption key
ANSWER 937

You might also like