Showing posts with label Computer Science. Show all posts
Showing posts with label Computer Science. Show all posts

Monday, February 2

KERALA PSC LECTURER IN INFORMATION TECHNOLOGY (POLYTECHNICS) Questions and Solution

Hello reader,

In this post we will discuss various questions and its solution from  LECTURER IN INFORMATION TECHNOLOGY (POLYTECHNICS). 388/2013 exam held in  2015 conducted by Kerala PSC.

Hope this will be useful for you.

Here we go.!!

Question Code:  A

Maximum marks :100

Time : 1 hour 15 minutes


1. which state of India has its secretariat in WRITERS BUILDING?
a. West Bengal
b. Tamil nadu
c. Punjab
d. Bihar

2. "NOT JUST AN ACCOUNTANCY" is a service story written by:

a. Dr. Manmohan Singh
b. Dr. Thomas Issac
c. Vinod rai
d. Dr. John Mathai

3. The well known "Kuttankulam satyagraha" was held in:
a. Irinjalakuda
b. Punjab
c.Vaikom
d.Punalur


4. "Guruvinte dukham" written by:
a. MK sanu
b. Sukumar Azhikkode
c. Dr. Babu Paul
d. Ayyappa Paniker

5. The magazine Yuktivadi founded by:
a. EMS
b. Sahodaran Ayyappan
c. K Kelappan
d. AK Gopalan

6. The founder of PratyakshaRaksha Daiva Sabha was:
a. Vaikunda swamikal
b. Ayyankali
c. poykayil Appachan
d. mannathu Padmanabhan

7. BKS Ayyangar recently passed away was a great expert of:
a. Modern medicine
b. Bharatnatyam
c.Kathak
d. Yoga

8. KPAC is a drama troupe of:
a. Kannur
b. Kozhicode
c. Thrissur
d. Alappuzha

9. "kanaleriyum kaalam" is the autobiography of:
a. Kuthattukulam Mary
b. Rosamma Punnose
c. Acama Cheriyan
d. KR Gouri

10. The brand ambassador of " Clean campus, Safe Campus" programme:
a. Mammootty
b. Mohan Lal
c. Fahad Fazil
d. Manju Warrier

11. When 0< x < π/2 the sum of series
1 -cos x +cos2x -cos3x+........
a. 1+sinx
b.  √2 tan x
c. 1/2 sec2 x/2
d. sec x /√2

12. The angle between the lines x - y= 2 and x+y=1 is
a. π/2
b. 0
c. π/4
d. π

13. Let A , B two n x n orthogonal matrices then which of the following is true:
a. AB is orthogonal
b. AB is symmetric
c. AB is triangular
d. AB is singular

14. The greatest rectangular area that can be enclosed by a 20 meter fencing is:
a. 100
b. 50
c. 200
d. 25

15. The area bounded by straight lines x=0, y=0 and x+y=a is
a. a2
b. a/2
c. a2/2
d. a

16. The solution of the system of linear equation x+y=0, 2x+y+z=1 , y+z=-1 is
a. 1,-2,2
b. 1,-1,0
c. 1,2,-2
d. 1,-1,1

17. The value of (cos 15 - sin 15)2 is:
a. 1/2
b. root3/2
c. 1/root2
d. -1/2

18. The solution of differential equation (x+2y3)dy/dx =y is:
a. x2+y2/2  =c
b. x=y3+cy
c. x2/2y+2y3/3=x+c
d. x=y2(c-e-y)

19. ∫x e-x2 dx




20. If A is 2 x 2 matrix with |A|=3 then |A adjA| is:
a. 6
b. 9
c. 4
d. 12

21. the ingredient of brick earth that gives red color to bricks is:
a. Alumina
b. iron oxide
c. Magnesia
d. Silica

22. The steel which is used in RCC is:
a. Cast steel
b. Stainless steel
c. Mild steel
d. Nickel steel

23. The most economical foundation used when heavy structural loads from columns are required to be transferred to a soil of

low bearing capacity is:
a. Raft foundation
b. Stepped Foundation
c. Grillage foundation
d. pile foundation

24. the basic principle of surveying is:
a. Working from whole to the part
b. working from art to the whole
c. Both A and B
d. Reconnaissance

25. the backsight of a BM of RL 150.205 is 1.505m. calculate the HI of the instrument:
a. 150.755
b. 150.205
c. 148.700
d. 151.710

26. The turning moment of a two stroke cycle engine is more uniform than a four stroke engine because:
a. Valve operations are required in four stroke engine , instead parts are used in two stroke engine.
b. In two stroke engine, there is one power stroke in every revolution of crank shaft
c. Both sides of the piston are effective during the operation of a two stroke engine
d. Fuel supply is more uniform in two stroke engine compared to four stroke engine

27. Higher compression ratio is employed in diesel engine compared to petrol engine because:
a. self ignition temperature of diesel fuel is higher than petrol
b. specific gravity of diesel fuel is higher than  petrol
c. hot compressed air is required to ignite the fuel injected in diesel engine
d. residual gas can be reduced at higher compression ratio


28. the function of propeller shaft in an automobile is:
a. to transmit power from gear box to the differential
b. to transmit power from engine to gear box
c. to vary power from minimum to maximum
d. to actuate steering gear mechanism

29. The function of a surge tank in a hydro electric power plant is:
a. to control level of water in  reservoir
b. to increase the power output from turbine
c. to store excess water from reservoir
d. to control the pressure fluctuation in pen stock pipe.

30. Control rod is used in nuclear power plant in order to:
a. control the pressure of coolant
b. control flow rate of coolant
c. control nuclear chain reaction
d. slow down the fast moving neutrons in reactor

31. The condition with which the Ohm's law is valid when:
a. Voltage is directly proportional to current
b. Voltage is inversely proportional to current
c. Current is proportional o resistance
d. Temperature remains constant

32. lenz's law is used to determine the direction of:
a. Dynamically induced emf
b. statically induced emf
c. magnetic field
d. mutually induced emf

33. Two resistors of 10 ohm and 20 ohm are connected in parallel. if the current in 10 ohm resistor is 2A , what is the current in other resistor?
a. 1 A
b. 3 A
c. 2 A
d. 4 A

34. The main function of earth Leakage Circuit breaker (ELCB) is to protect the circuit against:
a. over current
b. under voltage
c. lightning
d. earth leakage current

35. The voltage across an RLC series ac circuit is 10V. What will be the voltage across the capacitor if the voltage across the

resistance is 8V and inductor is 12V?
a. 8V
b. 18V
c. 5V
d. 12V

36. the ripple factor of a full bridge rectifier without any filter connected to it is:
a. 1.11
b. 0.482
c. 1.00
d. 1.21

37. An LED, 1K ohm resistor and a 5V dc source is connected in series.assume the voltage measured across the LED is 2V. the current flow through the LED is:
a. 1mA
b. 10 mA
c. 2 mA
d. 3 mA

38. A microprocessor is classified into 8 bit microprocessor based on its:
a. Data bus width
b. Address bus width
c. ALU width
d. Control bus width

39. The output voltage of a voltage source pulse width modulated inverter depends on:
a. DC battery voltage
b. DC battery voltage and modulation index
c. Output frequency
d. modulation index

40. A Bipolar Junction Transistor is used to drive an SPDT relay. When the relay is energized, the transistor will be operating in

_____ region?
a. Saturation
b. cut off
c. Active
d. Cut off and saturation

41. Which of the following Access control method is probabilistic?
a. Polling
b. Contention
c. Token passing
d. Sliding window

42. one of the addresses in a block 167.199.82.27. What is the last address in this block?
a. 167.199.170.95
b. 167.199.170.96
c. 167.199.170.255
d. 167.199.170.224

43. A network layer firewall works as a :
a. Frame filter
b. packet filter
c. both A  and B
d. none

44. A logic circuit that provides a HIGH output for both inputs HIGH or both inputs LOW:
a. ExOR
b. ExNOR
c. OR
d. NOR

45. When referring to instruction words, a mnemonic is?
a. Shorthand for machine language
b. A short abbreviation for data word stored at operand address
c. A short abbreviation for opearnd address
d. A short abbreviation for operation to be performed

46. Dijkstra's Banking Algorithm in an operating system solves the problem of:
a. Deadlock avoidance
b.  deadlock recovery
c. Mutual Exclusion
d. Context switching

47. Gray code equivalent of (1000)2 is:
a. 1111
b. 1100
c. 1000
d. None

48. Which operator is used by java run time implementations to free the memory of an object when it is no longer needed?
a. Delete
b.  Free
c. New
d. None

49. In which ARQ when a NAK is received all frames sent since the last frame acknowledged are retransmitted?
a. Stop and wait
b. Go back N
c. Selective reject
d. Both A and B

50. A Noiseless 3kHz channel transmits bits with binary level signals. What is the maximum data rate?
a.  3 kbps
b. 6 kbps
c. 12 kbps
d. 24 kbps

51. When an instruction is read from memory it is called?
a. Memory read cycle
b. Fetch cycle
c.Instruction cycle
d. memory write cycle

52. An HTML form is to be designed to enable purchases of office stationery. required  items are to be selected . credit card

details are to be entered and then the submit button is to be pressed. Which of the following options would be appropriate for

sending the data to the server?
a. GET
b .POST
c. Either GET or POST
d. Neither GET nor POST

53. Consider different activities related to email:
m1: send an email from a  mail client to a mail server
m2: Download an email from mailbox to a mail client
m3: Checking email from a web browser
which is the application level protocol used in each activity?

a.  m1: HTTP     m2: SMTP        m3:POP
b .m1:SMTP    m2:FTP        m3:HTTP
c. m1:SMTP    m2:POP        m3:HTTP
d. m1:POP        m2:SMTP        m3:IMAP

54. In an IP packet, the value of HLEN is 15 and the value of total length field is 0028. how many bytes of data are being

carried by this packet?
a. 8
b .40
c. 64
d. 20

55. In asymmetric key cryptography the private key is kept by:
a. sender
b .receiver
c. sender and receiver
d. all connected devices to the network

56. DES encrypts data in block size of______ bits each
a. 64
b .128
c. 32
d. 56

57. Which is true for a typical RISC architecture?
a.  Microprogrammed control unit
b . Instruction takes multiple clock cycles
c. Have few registers in CPU
d. Emphasis on optimizing instruction pipelines

58. A top to bottom relationship among the items in a database is established by:
a.  Hierarchical schema
b .Network schema
c. Relational schema
d. All of above

59. In a GSM system BTS and BSC together form:
a.  Network substation
b .Base station subsystem
c. maintenance subsystem
d. Operational subsystem

60. Mobile phone in roaming is registered in:
a.  Visitors Location Registry of another MSC
b.  Visitors Location registry of same MSC
c.  Home location registry of another MSC
d.  Home Location registry of same MSC


61. In a Piconet , there can be upto ----------- parked nodes in the net
a.  63
b.  127
c.  255
d.  511

62. Minimum number of NAND gates required to implement a ExOR function is:
a.  2
b.  3
c.  4
d.  5

63. A circuit in which connections to both AND and OR arrays can be programmed is called?
a.  RAM
b.  ROM
c.  PAL
d. PLA

64. Consider the schema R=(S  T  U  V) and the dependencies :
S --> T
T --> U
U -->V
V-->S
If R=(R1 and R2) be a decomposition such that R1 ^ R2= null then decomposition is :
a.  Not in 2NF
b.  In 2NF but not in 3NF
c.  in 3NF but not in 2NF
d. in both 2NF and 3NF

65. A flipflop is a:
a.  Combinational circuit
b.  Memory element
c.  Arithmetic element
d.  Memory or arithmetic

66. Which of the following true:
a.  Every relation in 3NF is also in BCNF
b.   relation R is in 3NF ife very non prime attribute of R is fully functionally dependent of every key of R
c.  Every relation in BCNF is also in 3NF
d.  No relation can be both in BCNF and 3NF

67. Offset value of code segment :
a.  Base pointer
b.  Stack pointer
c.  instruction pointer
d.  None

68. A JK flip flop can be implemented using D flip flop connected such that
a.  D= JQ'+ K'Q
b. D=J'Q+ KQ'
c.  D=J'Q'+KQ
d.  D=JQ'+KQ'


69. In a software project, COCOMO is used to estimate:
a.  Effort and duration based on the size of software
b.  Size and duration based on effort of software
c.  Effort and cost based on duration of software
d.  Size , Effort and duration based on cost of software

70. Arithmetic shift left operation:
a.  Produces the same result as obtained with logical shift left operation
b.  Causes sign bit to remain always unchanged
c.  Needs additional hardware to preserve sign bit
d.  is not applicable for signed 2's complement representation


71. Segment number defines:
a.  Distance from the beginning to a particular location in a segment
b.  The ending of segment within the memory space
c.  The starting of segment within the memory space
d.  None of above


72. How can you create a node for comment in javascript?
a.  comment()
b.  createcomment()
c.  comm()
d.  none

73. Which microprocessor pins are used to request and acknowledge a DMA transfer?
a.  reset and ready
b.  ready and wait
c.  HOLD and HLDA
d.  None of the above

74. Consider the following java program segment:
try{
int x=0;
int y=5/x;
}
catch(Exception e)
{
system.out.println("Exception");
}
catch(ArithmetcException ae)
{
System.out.println("Arithmetic exception);
}
System.out.println("Finished");
What will be the output of code segment?
a.  Finished
b.  Exception
c.  Compilation fails
d.  Arithmetic exception


75. Which activity does not take place during execution cycle?
a.  ALU performs the arithmetic and logical operation
b.  Effective address is calculated
c.  Next instruction is fetched
d.  Branch address is calculated and branching conditions are checked

76. SD RAM refers to:
a.  Synchronous RAM
b.  Static RAM
c.  Semi RAM
d.  Second RAM

77. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then:
a.   Deadlock can never occur
b.  Deadlock may occur
c.  Deadlock has to occur
d.  None of the above

78. cache memory works on the principle of:
a.  Locality of data
b.  Locality of reference
c.  Locality of memory
d.  Locality of reference and memory

79. Consider a logical address space of 8 pages of 104 words mapped into memory of 32 frames. how many bits are there in

logical address?
a.  9
b.  11
c.  13
d.  15

80. in a virtual memory system, the addresses used by the programmer belongs to:
a.  memory space
b.  physical address
c.  address space
d.  main memory address

81. What will be the output of the following PHP code
<?php
$a=5;
$b=5;
echo($a===$b);
?>
a.  5===5
b.  error
c.  1
d.  false

82. Determine the number of page faults when references to pages occur in the following orddr: 1,2,4,5,2,1,2,4. Assume that

main memory can accommodate 3 pages and the main memory already has pages 1 and 2 with page 1 having brought earlier than page 2. (LRU algorithm is used).
a. 3
b. 5
c. 4
d. None of above

83. Which of the following is FALSE?
a. Segmentation suffers from external fragmentation
b. Paging suffers from internal fragmentation
c. Segmented memory can be paged
d. Virtual memory is used only in multi user systems

84. Ready pin of a microprocessor is used:
a. To indicate that microprocessor is ready to receive inputs
b. To indicate that microprocessor is ready to receive outputs.
c. To provide direct memory access
d. To introduce wait states

85. An operating system uses shortest remaining time first (SRT) process scheduling algorithm. Consider the arrival times and

execution times for the following processes:
Process        Execution time        Arrival Time
P1        20            0
P2        25            15
P3        10            30
P4        15            45
What is the total waiting time for P2?
a. 5
b. 15
c. 40
d. 55

86. Let R(a,b,c) and S(d,e,f) be two relations in wich d is the foreign key of S that refers to the primary key of R. Consider the

following four operations R and S:
I. Insert into R
II. Insert to S
III. Delete from R
IV. Delete from S

Which of the following can cause violation of referntial integrity constraint above?
a. Bith I and IV
b. Both II and III
c. All of above
d. None of above

87. Given a class named student , which of the following is a valid constructor declaration for the class?
a. Student(student s) {}
b. Student student(){}
c. Private final student(){}
d. void student(){}

88. A binary tree T has n leaf nodes. the number of nodes of degree 2 in T is:
a. logn
b. 2n
c. n
d. 2^n


89. Following sequence of operations is performed on a stack push(1), push(2), pop(),push(1),push(2),pop(),pop(),pop(),push

(2),pop(). The sequence of popped out values are:
a. 2,2,1,1,2
b. 2,2,1,2,2
c. 2,1,2,2,1
d. 2,1,2,2,2

90. What can be said about the array represenation of a circular queue when it contains only one element?
a. FRONT=REAR+1
b. FRONT=REAR-1
c. FRONT=REAR=null
d. None of above


91. In the spiral model of software development the primry determinant in selecting activities in each iteartion is:
a. Iteration size
b. Cost
c. Adopted process such as relational unified process or extreme programming
d. risk


92. A software organization as been assessed at SEICMM level 4. Which of the following does the organization need to practice

beside proces change management anf technology change management in order to acheieve level 5?
a. Defect detection
b. Defect prevention
c. Defect isolation
d. Defect propagation


93. The extent to which a software can control to operate correctly despite the introduction of invalid input is called as:
a. Reliability
b. Robustness
c. Fault tolerance
d. Probability

94. Consider the following code segment  in JAVA:
class X implements Runnable
{
public static void main(String args[])
{
/*Missing code*/
}
public void run()
{
}
}

Which of the following line of code is suitable to start a thread?
a. Thread t= nw Thread(X);
b. Thread t=new Thread(X); t.start();
c. X run=new X(); Thread t=new Thread(run); t.start();
d. Thread t=new Thread(); x.run();

95. Consider the following tree:


                   (1)
       
    (2)                           (3)
(4)        (5)            (6)        (7)



If the post order traversl gives ab-cd*+ then the label of nodes 1,2,...7 wll be?
a.                + , -, * , a, b , c , d
b.                 a , - , b , + ,c ,* , d
c.                a , b , c , d , - , * , +
d.                 - , a , b ,+ , * , c , d


96. The SQL expression
Select distinct T.branchName from branch T,branch S where T.assets>S.assets and S.branchCity = "COCHIN"
Finds the names of:
a. All branches that have greater assets than some branch located in cochin
b. All branches that have greater assets than all branches located in cochin
c. The branch that has greatest asset in COCHIN
d. Any branch that have greater assets than any branch located in cochin


97. Relationship produced from an ER model will always be in:
a. 1NF
b. 2NF
c. 3NF
d. BCNF

98. Which syntax is used to describe elemnts in CSS?
a. Protectors
b. Selectors
c. Both A and B
d. None of above

99. Which object is the main entry point to all client side javascript features and APIs?
a. Standard
b. Location
c. Window
d. Position

100. The let keyword in java script can be used in:
a. in a for or for/in loop as substitute for var
b. as a block statement to define new variables
c. to define variables that are scoped to single expression
d. All the mentioned



Solution:

Thursday, January 22

C code implementing a simple DFA



Hello freinds, 

Here I am posting my C implementation of DFA shown below. This DFA will accept any string containing 'a's and 'b' and last symbol should be 'a'.


#include <stdio.h>

#define TOTAL_STATES 2
#define FINAL_STATES 1
#define ALPHABET_CHARCTERS 2

#define UNKNOWN_SYMBOL_ERR 0
#define NOT_REACHED_FINAL_STATE 1
#define REACHED_FINAL_STATE 2


enum DFA_STATES{q0,q1};
enum input{a,b};
int Accepted_states[FINAL_STATES]={q1};
char alphabet[ALPHABET_CHARCTERS]={'a','b'};
int Transition_Table[TOTAL_STATES][ALPHABET_CHARCTERS];

int Current_state=q0;
void DefineDFA()
{

    Transition_Table[q0][a] = q1;
    Transition_Table[q0][b] = q0;
    Transition_Table[q1][a] = q1;
    Transition_Table[q1][b] = q0;
}

int DFA(char current_symbol)
{
int i,pos;
    for(pos=0;pos<ALPHABET_CHARCTERS; pos++)
        if(current_symbol==alphabet[pos])   
            break;//stops if any character other than a or b
    if(pos==ALPHABET_CHARCTERS)
         return UNKNOWN_SYMBOL_ERR;
    for(i=0;i<FINAL_STATES;i++)
 if((Current_state=Transition_Table[Current_state][pos])
==Accepted_states[i])
            return REACHED_FINAL_STATE;
    return NOT_REACHED_FINAL_STATE;

}


int main(void)
{

    char current_symbol;
    int result;
 
    DefineDFA();    //Fill transition table
 
    printf("Enter a string with 'a' s and 'b's:\n
                Press Enter Key to stop\n");
 
 
    while((current_symbol=getchar())!= '\n')
        if((result= DFA(current_symbol))==UNKNOWN_SYMBOL_ERR)
            break;
    switch (result) {
    case UNKNOWN_SYMBOL_ERR:printf("Unknown Symbol %c",
  current_symbol); 
 break;
    case NOT_REACHED_FINAL_STATE:printf("Not accepted"); break;
    case REACHED_FINAL_STATE:printf("Accepted");break;
    default: printf("Unknown Error");
    }

    printf("\n\n\n");

    return 0;
}


Thursday, May 23

KALQ is gonna outdate QWERTY?



Hai buddies,

 You must be familiar with the term QWERTY. But you ever heard about KALQ?

Simply speaking, KALQ is a new split screen keyboard designed to speed up thumb typing on tablets and large smart phones.


 In this post am gonna say a few words about what is KALQ, why it s needed and a small comparison between QWERTY and KALQ.

Here we go.!

As Alexander the great said ,touchscreen tablets also came ,saw, conquered our hearts. It taught our thumbs to pinch and swipe, slide and scroll. Yes, we are pretty habituated. But still texting through touch screen is sometimes not handy.

I think many will agree with this statement.

Heard  a good news that  Researchers at the University of St Andrews have developed a split-screen keyboard, specifically optimized for thumbs, which they claim can increase typing speeds by more than a third.its KALQ.

Why the name KALQ?

New keyboard KALQ got its name from the letters at the bottom right of the keyboard.

What is new in KALQ?

Keys in two Blocks:
Designed to save your thumbs stretching across the screen and making repeated taps, Kalq splits the keys into two blocks, 16 to the left, 12 to the right. Commonly used letters are clustered together and frequent pairs of letters placed on alternate sides, so each hand does the same amount of work.'

Researchers say "Tests show that after only 10 hours of training, users were able to reach 37 words a minute, compared with the average of 20 words a minute on a qwerty device..!!"


Did you know?

The  mechanism of typewrite, the pioneer,  staggered letters diagonally across the keyboard, rather than arranged in a rectilinear grid, to prevent the levers from running into one another.Qwerty followed the same just for purely mechanical considerations, yet it has endured until today and been unquestioningly translated into the touchscreen arena.

Will Kalq finally have what it takes to revolutionize typing in our increasingly thumbs-only world?? 
Time will give the answer.
Wait n C..!!

Monday, July 16

EIL (Engineers India Ltd) Exam questions and answer key

Hi reader,

Here I'm posing some questions asked and its solution / key in EIL Management
Trainee recruitment test in July 2012.

All the information is collected from my freinds..!!!

The Test comprises of 150 questions eacxh carrying 1 mark . for each wrong answer 0.25 marks will be deducted.
Technical section(100 qustions)


General Awareness
Aptitude questions

English.(Non technical 50 questions)



General awareness section had some questions based on current affais , especiall on
April 2012( note Exam held on July 2012)
Sample:
* Name of the British Citizn caputred by Maoists recently.
* Richter scale reading of the drastic earthquake hit in Sumara islends recently

 ( 8.7, 8, 7.1, None of these)
*Name of the satellite successfully launched in April 2012
* Name the Indian company successfully dveloped medicine for meningitis.

* During which period first five year plan was established?(1952-56)
* Indiragandhi award was bagged this year by?


..and some more...



English section comprised of this pattern of questions
* Spot the error.
* Pick the synonym
*Reading comprehension




Aptitude section contained questions from
*Profit percentage
*Ralative velocity
*Circular arrangement of 6 persons form 6 different countries.
*Rate of work done.




Here I'm posting some of the etchnical questions asked.




1.The datastructure in which values can be added form bith ends, not fron the
middle?
-- Dequeue


2. In a circular linked list if a new node is insertted, how many links will get modified?
(0  ,  1,  2 ,  3)



3. Find the hamming distance between 010011 and 101011
4. In software tesing which path will give maximum performance?
*Hamiltonian path
*Eulearian path
*BFS
*DFS



5. Which of the folloing will give the minimal path between a node S to other nodes in
a connected unweighted, undirested graph?
*Dijikstra algorith
*Warshalls algorithm



6. Which of the following is false about C?
*C has no I/O functions
*C has no File functions
* None of these



7. In a C progra main( int argc, cahr argv[]),
argv[0] indicates?

Ans-- Name of the C program

8. In a C code exit() will act for
Ans-- to exit from the current working function.


9. The uninitialized automatc variable in C contains?
Ans-- garbage value




10. The variables that ca be accessed fro any part of the program is called?
Ans-- Global variable



11. the unmodulated wave in data transmission is called?
- Carrier wave



12. End to end connection, error detection error correction are donr by?
-- Transport Layer



13.Encryption and Decrytption are done by?
-- Presentation Layer



14. what is Thrashing?


15. What is the maximum number of processes which ensure that no dead lock will
occur, if there are 6 tapes and each process demand for at most 2 tapes.
Ans: 3



16. Bankers alogithm deals with?
-- Deadlock avoidance.


17. Spot the function of Type IV Firewall


18. What is Trojan?

19. what is Worm?

20. readability of a code can be enhance by?
-- Giving meaningful names to variables.



21. Any HTML code starts with?
<html>




22. We can align text in a teble o left by which code?

23. www belongs to which category?
*Local server
*Client server
*3 - tier architectre



24.Resolution of an image doesnt depend on?
-- bandwidth



25. Plotter image quality depends on repeatability and__________?

26. what is data warehosing?

27. File is?
collection of data



28. Phone number is an example of_?
Field


29. If the input is larger than the field , then..
Ans-- actual input will be shortened.



30. Which of the following will  depend on a high speed internet?
Email


31. In a complete binary tree, if there are N leaves, total number of internal  nodes will
be?
2N-1




32. If a inary tree is of 4 levels, total number of nodes will be
15


33. For a 3-ary tree, if there are 6 internal nodes, toal number of leaves will be?

34. What is  the maximum number of fulll duplex connection with 10 hubs.

35. Networking will not depend upon
stateless end hubs




36. snowflake schema is related with?
Dimension




37 Hub is related with?
Star Topology


38. One token policy is strictly followed by?
IEEE or FDDI




39. What is the advantage of OOP concept?

40. What is data hiding in C++



41. In a Lan connection each device is conneted using a cable and._________?
Interface card.


42. if new() is failed it will return?
*value 0
*NULL
*Exception
*Unexpected results




43. The return value of destructor is
-- Destructor has no return value




44return type of this function   int fun ( char t, char u)
ans-- int  



45. In stop and wait protocol, for sending N frames how many acknowledgemnets are
there?
Ans -- N



46. QPSK with 16 levels, 4600bps the rate will be?

47. How many bit address are used in TCP/IP connction?




Do you know any other question??  Please comment here..!! :)