Professional Documents
Culture Documents
EASY
1. Arranging a pack of playing cards real time examples is based on _____________?
a. Selection sort
b. Insertion sort
c. Mergesort
d. Bubble sort
2. The pivot element from the input 8, 1, 4, 9, 6, 3, 5, 2, 7, 0 using median-of-three partitioning method
is ___________
a. 4
b. 1
c. 2
d. 6
3. For which of the following applications is suitable for arrays:
a. Holding the scores on Calculus, History and Design of a class.
b. Holding the name, social security number, age, and income of one individual.
c. Holding the temperature readings taken every hour throughout a day
d. Holding the gross sales and net sales a store made in each of twelve months.
MODERATE
1. Inserting SCARE into an empty BST, the content of the fifth element in array A will be
_____E______
2. If memory address of first node in linked list is 1052 then 3rd node address will be _____. Consider
the type of the elements are characters.
a. 1054
b. 1056
c. 1060
d. 1055
DIFFICULT
1. Consider a two dimensional array A[20][10]. Assume that array A is long int , the base address of
array A is 100, elements are stored in row-major order and first element is A[0][0]. What is the
address of A[11][5] ?
Answer: 560
2. To evaluate the RPN AB+C/D*, where A= 7.0, B= 4.0, C=3.0, D = -2.0 will yield
_________________
Answer: -7.3
AVERAGE
1. Given the 4 JK Flip Flop connected as T-Flip Flop Circuit’ Diagram, the initial state of the circuit
at t=0 is 0001 (Q3Q2Q1Q0)
ANSWER: 16
2. 3012 4
-1230 4
ANSWER: 1122 4
DIFFICULT
1. Simplify the given Boolean function using a map.
F (V,W,X,Y,Z) = Σ m(0,2,4,6,9,13,21,23,25,29,31)
2. Design a combinational circuit that can detect an error in the representation of a decimal digit in
BCD. In other words, the circuit’s output is equal to 1 when the input ABCD contains any one of
the six unused bit combinations in the BCD code. Determine the Boolean expression of the
outputs signals in SOP form
ANSWER: F=Z
3. Using algebraic manipulation, reduce the given Boolean Expression to its simplest form.
A’B (D’+C’D) + B (A’+A’CD)
ANSWER: A’B
EASY
The Von Neumann architecture is also known as IAS computer. What does IAS stand for?
AVERAGE
A processor has 40 distinct instructions and 24 general purpose registers. A 32-bit instruction
word has an opcode, two registers operands and an immediate operand. The number of bits
available for the immediate operand field is_______.
ANSWER 16
DIFFICULT
Using DIRECT ADDRESSING MODE IN 8086, what memory address will hexadecimal value
of 18 be loaded?
ORG 100h
MOV AX, 2162H
MOV DS, AX
MOV CX, 24
MOV [481], CX
MOV BX,[481]
RET
4. MICROPROCESSOR SYSTEMS
EASY
TASK OF THE MICROPROCESSOR THAT REQUIRES 95% OF ITS TOTAL TIME.
-data transfer
AVERAGE
CONVERT -128 TO 8-BIT USING SIGNED MAGNITUDE REPRESENTATION
- CANNOT BE
DIFFICULT
16-BIT ASSEMBLY LANGUAGE INSTRUCTIONS THAT MUST COPY FFFFH TO THE
DATA SEGMENT REGISTER.
- MOV DX, FFFFH
- MOV DS, DX
2. Which of the following is NOT one of the three essential elements for a patent to be granted
for an invention?
a. Be a product
b. Be new to the public
c. Involve an inventive step
d. Be capable of industrial application
ANSWER a
ANSWER c
AVERAGE
1. The e-Commerce Law recognizes the data messages as evidence in court. TRUE or FALSE?
ANSWER TRUE
ANSWER d
ANSWER c
DIFFICULT
1. It was founded in 2006 by Julian Assange and has become renowned for publishing
thousands of classified documents covering everything from the film industry to national
security and wars. It has published hundreds of thousands of documents leaked by former US
Army intelligence analyst including documents relating to the war in Afghanistan which
revealed how the US military had killed hundreds of civilians in unreported incidents.
ANSWER WikiLeaks
2. During your spare time, you have a small side business completely unrelated to your
functions at work. You make sure it does not impact your job and you do not devote time to it
while you are working. What is the best thing to do?
a. As it is a personal matter, I do not have to tell about it to anyone.
b. As the business has nothing to do with my work, I do not need to disclose this
information.
c. I should disclose this information following the Conflict of Interest Policy.
d. I can ask my manager to work with me in my side business, so she/he can check that
I am following the Conflict of Interest Policy.
ANSWER c
3. The Transport Layer Security ROBOT vulnerability, allows an attacker to obtain the RSA
key necessary to decrypt TLS traffic under certain conditions. RoBOT is abbreviated as
_______________
6. OPERATING SYSTEMS
EASY
What was the codename of Windows 11 prior to its release last October 5, 2021?
ANSWER Sun Valley
AVERAGE
Consider the following snapshot of a system:
Using banker’s algorithm, determine the safe state sequence of the system
ANSWER Safe sequence: <P1, P4, P2, P3, P0>
DIFFICULT
An operating system uses the Shortest Remaining Time first (SRTF) process scheduling algorithm.
Consider the arrival times and execution times for the following processes:
Process Execution time Arrival time
P1 20 0
P2 25 15
P3 10 30
P4 15 45
What is the total waiting time for process P2?
ANSWER 15
7. COMPUTER NETWORKS
EASY
1. From a command prompt window, you can determine the current network settings for your PC.
Which of the following commands will display the IP addresses assigned to each NIC on your
Windows laptop?
ANSWER: Ipconfig
3. Given the network address 172.16.0.0 16, how many host bits need to be borrowed to create 8
subnets?
ANSWER: 3
4. Which field in the IPv4 header Is used to prevent a packet from traversing a network endlessly?
ANSWER: Time-to-Live
5. Given 210.10.10.121 and a subnet mask with 28 bits, find the subnet number to which the host
belongs.
ANSWER: 7
6. Running the command to find out what IP address has been assigned to your network adapter
reveals an IP address of 169.254.10.22. Can you conclude that your network adaptor has
successfully acquired an address from the DHCP server?
ANSWER: NO
10. To directly open the Windows Network Connections Control Panel you can use Start -> Run and
enter _______ [command] into the dialog box.
ANSWER: ncpacpl
11. A network administrator subnets the 192.168.10.0/28 network into subnets with /24 masks. How
many equal-sized subnets are created?
a. 2
b. 4
c. 8
d. 16
e. 64
12. How many valid host addresses are available on an IPv4 subnet that is configured with a /25
mask?
a. 254
b. 128
c. 126
d. 62
e. 64
13. How many bits must be borrowed from the host portion of an address to accommodate a router
with 3 connected networks?
a. two
b. three
c. four
d. five
14. Which of the following blocks of addresses are defined by RFC 1918 for private network use?
a. 10.0.0.0/8
b. 100.64.0.0/14
c. 169.254.0.0/16
d. 239.0.0.0/8
15. A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1.
What does this code represent?
a. host unreachable
b. protocol unreachable
c. port unreachable
d. network unreachable
MODERATE
16. How many host addresses are available on the 192.168.10.128/26 network?
a. 30
b. 32
c. 60
d. 62
e. 64
17. A site administrator has been told that a particular network at the site must accommodate 126
hosts. Which subnet mask would be used that contains the required number of host bits?
a. 255.255.255.0
b. 255.255.255.128
c. 255.255.255.224
d. 255.255.255.240
18. A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The
company wants to create a subnetwork with 18 hosts. Which networks would achieve that?
a. 192.168.1.16/28
b. 192.168.1.64/27
c. 192.168.1.128/27
d. 192.168.1.96/28
DIFFICULT
19. An administrator wants to create four subnetworks from the network address 192.168.1.0/26.
What is the network address and subnet mask of the second useable subnet?
a. subnetwork 192.168.1.64; subnet mask 255.255.255.192
b. subnetwork 192.168.1.32;subnet mask 255.255.255.240
c. subnetwork 192.168.1.64; subnet mask 255.255.255.240
d. subnetwork 192.168.1.128; subnet mask 255.255.255.192
e. subnetwork 192.168.1.8 ;subnet mask 255.255.255.224
20. An administrator wants to create four subnetworks from the network address 192.168.1.0/26.
What is the broadcast address and subnet mask of the second useable subnet?
a. Broadcast address 192.168.1.63; subnet mask; 255.255.255.192
b. Broadcast address 192.168.1.127; subnet mask; 255.255.255.192
c. Broadcast address 192.168.1.31; subnet mask; 255.255.255.240
d. Broadcast address 192.168.1.1; subnet mask; 255.255.255.192
EASY
A ____________ is the term used to describe a central storehouse of information about a system's
data
AVERAGE
The key graphical model of the systems requirements used with structured analysis is the ____.
DIFFICULT
One of the rights cited by IBM usability expert Dr. Clare-Marie Karat is compliance, compliance means?
a. the user has the right to a system that performs exactly as promised
b. the user is always right
c. the user has the right to know the limits of the system’s capabilities
d. the user has the right to be informed clearly about all systems requirements
9. SOFTWARE ENGINEERING
EASY
AVERAGE
Which document is created by system analyst after the requirements are collected from various
stakeholders?
A qualitative indication of the degree to which a module is connected to other modules and the
outside world is
ANSWER: Coupling
What is the normal order of activities in which traditional software testing is organized?
a. integration testing
b. system testing
c. unit testing
d. validation testing
ANSWER: c, a, d and b
EASY
A symbol used to comment a single line in PHP?
ANSWER # or //
The RSA is a public key cryptosystem wherein the encryption key is known to everybody while
the decryption key is kept secret. What does RSA stands for?
ANSWER Rivest, Shamir, Adleman
DIFFICULT
Decrypt the message AYLHJOLYVBZ encrypted using the shift cipher
f (p) = (p + 7) mod 26
ANSWER TREACHEROUS
Given the following in an RSA cryptosystem:
43 and 59 are two large primes
Encryption key is 13
Find the decryption key
ANSWER 937