Hello reader,
In this post we will discuss various questions and its solution from LECTURER IN INFORMATION TECHNOLOGY (POLYTECHNICS). 388/2013 exam held in 2015 conducted by Kerala PSC.
Hope this will be useful for you.
Here we go.!!
Question Code: A
Maximum marks :100
Time : 1 hour 15 minutes
1. which state of India has its secretariat in WRITERS BUILDING?
a. West Bengal
b. Tamil nadu
c. Punjab
d. Bihar
2. "NOT JUST AN ACCOUNTANCY" is a service story written by:
a. Dr. Manmohan Singh
b. Dr. Thomas Issac
c. Vinod rai
d. Dr. John Mathai
3. The well known "Kuttankulam satyagraha" was held in:
a. Irinjalakuda
b. Punjab
c.Vaikom
d.Punalur
4. "Guruvinte dukham" written by:
a. MK sanu
b. Sukumar Azhikkode
c. Dr. Babu Paul
d. Ayyappa Paniker
5. The magazine Yuktivadi founded by:
a. EMS
b. Sahodaran Ayyappan
c. K Kelappan
d. AK Gopalan
6. The founder of PratyakshaRaksha Daiva Sabha was:
a. Vaikunda swamikal
b. Ayyankali
c. poykayil Appachan
d. mannathu Padmanabhan
7. BKS Ayyangar recently passed away was a great expert of:
a. Modern medicine
b. Bharatnatyam
c.Kathak
d. Yoga
8. KPAC is a drama troupe of:
a. Kannur
b. Kozhicode
c. Thrissur
d. Alappuzha
9. "kanaleriyum kaalam" is the autobiography of:
a. Kuthattukulam Mary
b. Rosamma Punnose
c. Acama Cheriyan
d. KR Gouri
10. The brand ambassador of " Clean campus, Safe Campus" programme:
a. Mammootty
b. Mohan Lal
c. Fahad Fazil
d. Manju Warrier
11. When 0< x < π/2 the sum of series
1 -cos x +cos2x -cos3x+........
a. 1+sinx
b. √2 tan x
c. 1/2 sec2 x/2
d. sec x /√2
12. The angle between the lines x - y= 2 and x+y=1 is
a. π/2
b. 0
c. π/4
d. π
13. Let A , B two n x n orthogonal matrices then which of the following is true:
a. AB is orthogonal
b. AB is symmetric
c. AB is triangular
d. AB is singular
14. The greatest rectangular area that can be enclosed by a 20 meter fencing is:
a. 100
b. 50
c. 200
d. 25
15. The area bounded by straight lines x=0, y=0 and x+y=a is
a. a2
b. a/2
c. a2/2
d. a
16. The solution of the system of linear equation x+y=0, 2x+y+z=1 , y+z=-1 is
a. 1,-2,2
b. 1,-1,0
c. 1,2,-2
d. 1,-1,1
17. The value of (cos 15 - sin 15)2 is:
a. 1/2
b. root3/2
c. 1/root2
d. -1/2
18. The solution of differential equation (x+2y3)dy/dx =y is:
a. x2+y2/2 =c
b. x=y3+cy
c. x2/2y+2y3/3=x+c
d. x=y2(c-e-y)
19. ∫x e-x2 dx
20. If A is 2 x 2 matrix with |A|=3 then |A adjA| is:
a. 6
b. 9
c. 4
d. 12
21. the ingredient of brick earth that gives red color to bricks is:
a. Alumina
b. iron oxide
c. Magnesia
d. Silica
22. The steel which is used in RCC is:
a. Cast steel
b. Stainless steel
c. Mild steel
d. Nickel steel
23. The most economical foundation used when heavy structural loads from columns are required to be transferred to a soil of
low bearing capacity is:
a. Raft foundation
b. Stepped Foundation
c. Grillage foundation
d. pile foundation
24. the basic principle of surveying is:
a. Working from whole to the part
b. working from art to the whole
c. Both A and B
d. Reconnaissance
25. the backsight of a BM of RL 150.205 is 1.505m. calculate the HI of the instrument:
a. 150.755
b. 150.205
c. 148.700
d. 151.710
26. The turning moment of a two stroke cycle engine is more uniform than a four stroke engine because:
a. Valve operations are required in four stroke engine , instead parts are used in two stroke engine.
b. In two stroke engine, there is one power stroke in every revolution of crank shaft
c. Both sides of the piston are effective during the operation of a two stroke engine
d. Fuel supply is more uniform in two stroke engine compared to four stroke engine
27. Higher compression ratio is employed in diesel engine compared to petrol engine because:
a. self ignition temperature of diesel fuel is higher than petrol
b. specific gravity of diesel fuel is higher than petrol
c. hot compressed air is required to ignite the fuel injected in diesel engine
d. residual gas can be reduced at higher compression ratio
28. the function of propeller shaft in an automobile is:
a. to transmit power from gear box to the differential
b. to transmit power from engine to gear box
c. to vary power from minimum to maximum
d. to actuate steering gear mechanism
29. The function of a surge tank in a hydro electric power plant is:
a. to control level of water in reservoir
b. to increase the power output from turbine
c. to store excess water from reservoir
d. to control the pressure fluctuation in pen stock pipe.
30. Control rod is used in nuclear power plant in order to:
a. control the pressure of coolant
b. control flow rate of coolant
c. control nuclear chain reaction
d. slow down the fast moving neutrons in reactor
31. The condition with which the Ohm's law is valid when:
a. Voltage is directly proportional to current
b. Voltage is inversely proportional to current
c. Current is proportional o resistance
d. Temperature remains constant
32. lenz's law is used to determine the direction of:
a. Dynamically induced emf
b. statically induced emf
c. magnetic field
d. mutually induced emf
33. Two resistors of 10 ohm and 20 ohm are connected in parallel. if the current in 10 ohm resistor is 2A , what is the current in other resistor?
a. 1 A
b. 3 A
c. 2 A
d. 4 A
34. The main function of earth Leakage Circuit breaker (ELCB) is to protect the circuit against:
a. over current
b. under voltage
c. lightning
d. earth leakage current
35. The voltage across an RLC series ac circuit is 10V. What will be the voltage across the capacitor if the voltage across the
resistance is 8V and inductor is 12V?
a. 8V
b. 18V
c. 5V
d. 12V
36. the ripple factor of a full bridge rectifier without any filter connected to it is:
a. 1.11
b. 0.482
c. 1.00
d. 1.21
37. An LED, 1K ohm resistor and a 5V dc source is connected in series.assume the voltage measured across the LED is 2V. the current flow through the LED is:
a. 1mA
b. 10 mA
c. 2 mA
d. 3 mA
38. A microprocessor is classified into 8 bit microprocessor based on its:
a. Data bus width
b. Address bus width
c. ALU width
d. Control bus width
39. The output voltage of a voltage source pulse width modulated inverter depends on:
a. DC battery voltage
b. DC battery voltage and modulation index
c. Output frequency
d. modulation index
40. A Bipolar Junction Transistor is used to drive an SPDT relay. When the relay is energized, the transistor will be operating in
_____ region?
a. Saturation
b. cut off
c. Active
d. Cut off and saturation
41. Which of the following Access control method is probabilistic?
a. Polling
b. Contention
c. Token passing
d. Sliding window
42. one of the addresses in a block 167.199.82.27. What is the last address in this block?
a. 167.199.170.95
b. 167.199.170.96
c. 167.199.170.255
d. 167.199.170.224
43. A network layer firewall works as a :
a. Frame filter
b. packet filter
c. both A and B
d. none
44. A logic circuit that provides a HIGH output for both inputs HIGH or both inputs LOW:
a. ExOR
b. ExNOR
c. OR
d. NOR
45. When referring to instruction words, a mnemonic is?
a. Shorthand for machine language
b. A short abbreviation for data word stored at operand address
c. A short abbreviation for opearnd address
d. A short abbreviation for operation to be performed
46. Dijkstra's Banking Algorithm in an operating system solves the problem of:
a. Deadlock avoidance
b. deadlock recovery
c. Mutual Exclusion
d. Context switching
47. Gray code equivalent of (1000)2 is:
a. 1111
b. 1100
c. 1000
d. None
48. Which operator is used by java run time implementations to free the memory of an object when it is no longer needed?
a. Delete
b. Free
c. New
d. None
49. In which ARQ when a NAK is received all frames sent since the last frame acknowledged are retransmitted?
a. Stop and wait
b. Go back N
c. Selective reject
d. Both A and B
50. A Noiseless 3kHz channel transmits bits with binary level signals. What is the maximum data rate?
a. 3 kbps
b. 6 kbps
c. 12 kbps
d. 24 kbps
51. When an instruction is read from memory it is called?
a. Memory read cycle
b. Fetch cycle
c.Instruction cycle
d. memory write cycle
52. An HTML form is to be designed to enable purchases of office stationery. required items are to be selected . credit card
details are to be entered and then the submit button is to be pressed. Which of the following options would be appropriate for
sending the data to the server?
a. GET
b .POST
c. Either GET or POST
d. Neither GET nor POST
53. Consider different activities related to email:
m1: send an email from a mail client to a mail server
m2: Download an email from mailbox to a mail client
m3: Checking email from a web browser
which is the application level protocol used in each activity?
a. m1: HTTP m2: SMTP m3:POP
b .m1:SMTP m2:FTP m3:HTTP
c. m1:SMTP m2:POP m3:HTTP
d. m1:POP m2:SMTP m3:IMAP
54. In an IP packet, the value of HLEN is 15 and the value of total length field is 0028. how many bytes of data are being
carried by this packet?
a. 8
b .40
c. 64
d. 20
55. In asymmetric key cryptography the private key is kept by:
a. sender
b .receiver
c. sender and receiver
d. all connected devices to the network
56. DES encrypts data in block size of______ bits each
a. 64
b .128
c. 32
d. 56
57. Which is true for a typical RISC architecture?
a. Microprogrammed control unit
b . Instruction takes multiple clock cycles
c. Have few registers in CPU
d. Emphasis on optimizing instruction pipelines
58. A top to bottom relationship among the items in a database is established by:
a. Hierarchical schema
b .Network schema
c. Relational schema
d. All of above
59. In a GSM system BTS and BSC together form:
a. Network substation
b .Base station subsystem
c. maintenance subsystem
d. Operational subsystem
60. Mobile phone in roaming is registered in:
a. Visitors Location Registry of another MSC
b. Visitors Location registry of same MSC
c. Home location registry of another MSC
d. Home Location registry of same MSC
61. In a Piconet , there can be upto ----------- parked nodes in the net
a. 63
b. 127
c. 255
d. 511
62. Minimum number of NAND gates required to implement a ExOR function is:
a. 2
b. 3
c. 4
d. 5
63. A circuit in which connections to both AND and OR arrays can be programmed is called?
a. RAM
b. ROM
c. PAL
d. PLA
64. Consider the schema R=(S T U V) and the dependencies :
S --> T
T --> U
U -->V
V-->S
If R=(R1 and R2) be a decomposition such that R1 ^ R2= null then decomposition is :
a. Not in 2NF
b. In 2NF but not in 3NF
c. in 3NF but not in 2NF
d. in both 2NF and 3NF
65. A flipflop is a:
a. Combinational circuit
b. Memory element
c. Arithmetic element
d. Memory or arithmetic
66. Which of the following true:
a. Every relation in 3NF is also in BCNF
b. relation R is in 3NF ife very non prime attribute of R is fully functionally dependent of every key of R
c. Every relation in BCNF is also in 3NF
d. No relation can be both in BCNF and 3NF
67. Offset value of code segment :
a. Base pointer
b. Stack pointer
c. instruction pointer
d. None
68. A JK flip flop can be implemented using D flip flop connected such that
a. D= JQ'+ K'Q
b. D=J'Q+ KQ'
c. D=J'Q'+KQ
d. D=JQ'+KQ'
69. In a software project, COCOMO is used to estimate:
a. Effort and duration based on the size of software
b. Size and duration based on effort of software
c. Effort and cost based on duration of software
d. Size , Effort and duration based on cost of software
70. Arithmetic shift left operation:
a. Produces the same result as obtained with logical shift left operation
b. Causes sign bit to remain always unchanged
c. Needs additional hardware to preserve sign bit
d. is not applicable for signed 2's complement representation
71. Segment number defines:
a. Distance from the beginning to a particular location in a segment
b. The ending of segment within the memory space
c. The starting of segment within the memory space
d. None of above
72. How can you create a node for comment in javascript?
a. comment()
b. createcomment()
c. comm()
d. none
73. Which microprocessor pins are used to request and acknowledge a DMA transfer?
a. reset and ready
b. ready and wait
c. HOLD and HLDA
d. None of the above
74. Consider the following java program segment:
try{
int x=0;
int y=5/x;
}
catch(Exception e)
{
system.out.println("Exception");
}
catch(ArithmetcException ae)
{
System.out.println("Arithmetic exception);
}
System.out.println("Finished");
What will be the output of code segment?
a. Finished
b. Exception
c. Compilation fails
d. Arithmetic exception
75. Which activity does not take place during execution cycle?
a. ALU performs the arithmetic and logical operation
b. Effective address is calculated
c. Next instruction is fetched
d. Branch address is calculated and branching conditions are checked
76. SD RAM refers to:
a. Synchronous RAM
b. Static RAM
c. Semi RAM
d. Second RAM
77. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then:
a. Deadlock can never occur
b. Deadlock may occur
c. Deadlock has to occur
d. None of the above
78. cache memory works on the principle of:
a. Locality of data
b. Locality of reference
c. Locality of memory
d. Locality of reference and memory
79. Consider a logical address space of 8 pages of 104 words mapped into memory of 32 frames. how many bits are there in
logical address?
a. 9
b. 11
c. 13
d. 15
80. in a virtual memory system, the addresses used by the programmer belongs to:
a. memory space
b. physical address
c. address space
d. main memory address
81. What will be the output of the following PHP code
<?php
$a=5;
$b=5;
echo($a===$b);
?>
a. 5===5
b. error
c. 1
d. false
82. Determine the number of page faults when references to pages occur in the following orddr: 1,2,4,5,2,1,2,4. Assume that
main memory can accommodate 3 pages and the main memory already has pages 1 and 2 with page 1 having brought earlier than page 2. (LRU algorithm is used).
a. 3
b. 5
c. 4
d. None of above
83. Which of the following is FALSE?
a. Segmentation suffers from external fragmentation
b. Paging suffers from internal fragmentation
c. Segmented memory can be paged
d. Virtual memory is used only in multi user systems
84. Ready pin of a microprocessor is used:
a. To indicate that microprocessor is ready to receive inputs
b. To indicate that microprocessor is ready to receive outputs.
c. To provide direct memory access
d. To introduce wait states
85. An operating system uses shortest remaining time first (SRT) process scheduling algorithm. Consider the arrival times and
execution times for the following processes:
Process Execution time Arrival Time
P1 20 0
P2 25 15
P3 10 30
P4 15 45
What is the total waiting time for P2?
a. 5
b. 15
c. 40
d. 55
86. Let R(a,b,c) and S(d,e,f) be two relations in wich d is the foreign key of S that refers to the primary key of R. Consider the
following four operations R and S:
I. Insert into R
II. Insert to S
III. Delete from R
IV. Delete from S
Which of the following can cause violation of referntial integrity constraint above?
a. Bith I and IV
b. Both II and III
c. All of above
d. None of above
87. Given a class named student , which of the following is a valid constructor declaration for the class?
a. Student(student s) {}
b. Student student(){}
c. Private final student(){}
d. void student(){}
88. A binary tree T has n leaf nodes. the number of nodes of degree 2 in T is:
a. logn
b. 2n
c. n
d. 2^n
89. Following sequence of operations is performed on a stack push(1), push(2), pop(),push(1),push(2),pop(),pop(),pop(),push
(2),pop(). The sequence of popped out values are:
a. 2,2,1,1,2
b. 2,2,1,2,2
c. 2,1,2,2,1
d. 2,1,2,2,2
90. What can be said about the array represenation of a circular queue when it contains only one element?
a. FRONT=REAR+1
b. FRONT=REAR-1
c. FRONT=REAR=null
d. None of above
91. In the spiral model of software development the primry determinant in selecting activities in each iteartion is:
a. Iteration size
b. Cost
c. Adopted process such as relational unified process or extreme programming
d. risk
92. A software organization as been assessed at SEICMM level 4. Which of the following does the organization need to practice
beside proces change management anf technology change management in order to acheieve level 5?
a. Defect detection
b. Defect prevention
c. Defect isolation
d. Defect propagation
93. The extent to which a software can control to operate correctly despite the introduction of invalid input is called as:
a. Reliability
b. Robustness
c. Fault tolerance
d. Probability
94. Consider the following code segment in JAVA:
class X implements Runnable
{
public static void main(String args[])
{
/*Missing code*/
}
public void run()
{
}
}
Which of the following line of code is suitable to start a thread?
a. Thread t= nw Thread(X);
b. Thread t=new Thread(X); t.start();
c. X run=new X(); Thread t=new Thread(run); t.start();
d. Thread t=new Thread(); x.run();
95. Consider the following tree:
(1)
(2) (3)
(4) (5) (6) (7)
If the post order traversl gives ab-cd*+ then the label of nodes 1,2,...7 wll be?
a. + , -, * , a, b , c , d
b. a , - , b , + ,c ,* , d
c. a , b , c , d , - , * , +
d. - , a , b ,+ , * , c , d
96. The SQL expression
Select distinct T.branchName from branch T,branch S where T.assets>S.assets and S.branchCity = "COCHIN"
Finds the names of:
a. All branches that have greater assets than some branch located in cochin
b. All branches that have greater assets than all branches located in cochin
c. The branch that has greatest asset in COCHIN
d. Any branch that have greater assets than any branch located in cochin
97. Relationship produced from an ER model will always be in:
a. 1NF
b. 2NF
c. 3NF
d. BCNF
98. Which syntax is used to describe elemnts in CSS?
a. Protectors
b. Selectors
c. Both A and B
d. None of above
99. Which object is the main entry point to all client side javascript features and APIs?
a. Standard
b. Location
c. Window
d. Position
100. The let keyword in java script can be used in:
a. in a for or for/in loop as substitute for var
b. as a block statement to define new variables
c. to define variables that are scoped to single expression
d. All the mentioned
Solution:
In this post we will discuss various questions and its solution from LECTURER IN INFORMATION TECHNOLOGY (POLYTECHNICS). 388/2013 exam held in 2015 conducted by Kerala PSC.
Hope this will be useful for you.
Here we go.!!
Question Code: A
Maximum marks :100
Time : 1 hour 15 minutes
1. which state of India has its secretariat in WRITERS BUILDING?
a. West Bengal
b. Tamil nadu
c. Punjab
d. Bihar
2. "NOT JUST AN ACCOUNTANCY" is a service story written by:
a. Dr. Manmohan Singh
b. Dr. Thomas Issac
c. Vinod rai
d. Dr. John Mathai
3. The well known "Kuttankulam satyagraha" was held in:
a. Irinjalakuda
b. Punjab
c.Vaikom
d.Punalur
4. "Guruvinte dukham" written by:
a. MK sanu
b. Sukumar Azhikkode
c. Dr. Babu Paul
d. Ayyappa Paniker
5. The magazine Yuktivadi founded by:
a. EMS
b. Sahodaran Ayyappan
c. K Kelappan
d. AK Gopalan
6. The founder of PratyakshaRaksha Daiva Sabha was:
a. Vaikunda swamikal
b. Ayyankali
c. poykayil Appachan
d. mannathu Padmanabhan
7. BKS Ayyangar recently passed away was a great expert of:
a. Modern medicine
b. Bharatnatyam
c.Kathak
d. Yoga
8. KPAC is a drama troupe of:
a. Kannur
b. Kozhicode
c. Thrissur
d. Alappuzha
9. "kanaleriyum kaalam" is the autobiography of:
a. Kuthattukulam Mary
b. Rosamma Punnose
c. Acama Cheriyan
d. KR Gouri
10. The brand ambassador of " Clean campus, Safe Campus" programme:
a. Mammootty
b. Mohan Lal
c. Fahad Fazil
d. Manju Warrier
11. When 0< x < π/2 the sum of series
1 -cos x +cos2x -cos3x+........
a. 1+sinx
b. √2 tan x
c. 1/2 sec2 x/2
d. sec x /√2
12. The angle between the lines x - y= 2 and x+y=1 is
a. π/2
b. 0
c. π/4
d. π
13. Let A , B two n x n orthogonal matrices then which of the following is true:
a. AB is orthogonal
b. AB is symmetric
c. AB is triangular
d. AB is singular
14. The greatest rectangular area that can be enclosed by a 20 meter fencing is:
a. 100
b. 50
c. 200
d. 25
15. The area bounded by straight lines x=0, y=0 and x+y=a is
a. a2
b. a/2
c. a2/2
d. a
16. The solution of the system of linear equation x+y=0, 2x+y+z=1 , y+z=-1 is
a. 1,-2,2
b. 1,-1,0
c. 1,2,-2
d. 1,-1,1
17. The value of (cos 15 - sin 15)2 is:
a. 1/2
b. root3/2
c. 1/root2
d. -1/2
18. The solution of differential equation (x+2y3)dy/dx =y is:
a. x2+y2/2 =c
b. x=y3+cy
c. x2/2y+2y3/3=x+c
d. x=y2(c-e-y)
19. ∫x e-x2 dx
20. If A is 2 x 2 matrix with |A|=3 then |A adjA| is:
a. 6
b. 9
c. 4
d. 12
21. the ingredient of brick earth that gives red color to bricks is:
a. Alumina
b. iron oxide
c. Magnesia
d. Silica
22. The steel which is used in RCC is:
a. Cast steel
b. Stainless steel
c. Mild steel
d. Nickel steel
23. The most economical foundation used when heavy structural loads from columns are required to be transferred to a soil of
low bearing capacity is:
a. Raft foundation
b. Stepped Foundation
c. Grillage foundation
d. pile foundation
24. the basic principle of surveying is:
a. Working from whole to the part
b. working from art to the whole
c. Both A and B
d. Reconnaissance
25. the backsight of a BM of RL 150.205 is 1.505m. calculate the HI of the instrument:
a. 150.755
b. 150.205
c. 148.700
d. 151.710
26. The turning moment of a two stroke cycle engine is more uniform than a four stroke engine because:
a. Valve operations are required in four stroke engine , instead parts are used in two stroke engine.
b. In two stroke engine, there is one power stroke in every revolution of crank shaft
c. Both sides of the piston are effective during the operation of a two stroke engine
d. Fuel supply is more uniform in two stroke engine compared to four stroke engine
27. Higher compression ratio is employed in diesel engine compared to petrol engine because:
a. self ignition temperature of diesel fuel is higher than petrol
b. specific gravity of diesel fuel is higher than petrol
c. hot compressed air is required to ignite the fuel injected in diesel engine
d. residual gas can be reduced at higher compression ratio
28. the function of propeller shaft in an automobile is:
a. to transmit power from gear box to the differential
b. to transmit power from engine to gear box
c. to vary power from minimum to maximum
d. to actuate steering gear mechanism
29. The function of a surge tank in a hydro electric power plant is:
a. to control level of water in reservoir
b. to increase the power output from turbine
c. to store excess water from reservoir
d. to control the pressure fluctuation in pen stock pipe.
30. Control rod is used in nuclear power plant in order to:
a. control the pressure of coolant
b. control flow rate of coolant
c. control nuclear chain reaction
d. slow down the fast moving neutrons in reactor
31. The condition with which the Ohm's law is valid when:
a. Voltage is directly proportional to current
b. Voltage is inversely proportional to current
c. Current is proportional o resistance
d. Temperature remains constant
32. lenz's law is used to determine the direction of:
a. Dynamically induced emf
b. statically induced emf
c. magnetic field
d. mutually induced emf
33. Two resistors of 10 ohm and 20 ohm are connected in parallel. if the current in 10 ohm resistor is 2A , what is the current in other resistor?
a. 1 A
b. 3 A
c. 2 A
d. 4 A
34. The main function of earth Leakage Circuit breaker (ELCB) is to protect the circuit against:
a. over current
b. under voltage
c. lightning
d. earth leakage current
35. The voltage across an RLC series ac circuit is 10V. What will be the voltage across the capacitor if the voltage across the
resistance is 8V and inductor is 12V?
a. 8V
b. 18V
c. 5V
d. 12V
36. the ripple factor of a full bridge rectifier without any filter connected to it is:
a. 1.11
b. 0.482
c. 1.00
d. 1.21
37. An LED, 1K ohm resistor and a 5V dc source is connected in series.assume the voltage measured across the LED is 2V. the current flow through the LED is:
a. 1mA
b. 10 mA
c. 2 mA
d. 3 mA
38. A microprocessor is classified into 8 bit microprocessor based on its:
a. Data bus width
b. Address bus width
c. ALU width
d. Control bus width
39. The output voltage of a voltage source pulse width modulated inverter depends on:
a. DC battery voltage
b. DC battery voltage and modulation index
c. Output frequency
d. modulation index
40. A Bipolar Junction Transistor is used to drive an SPDT relay. When the relay is energized, the transistor will be operating in
_____ region?
a. Saturation
b. cut off
c. Active
d. Cut off and saturation
41. Which of the following Access control method is probabilistic?
a. Polling
b. Contention
c. Token passing
d. Sliding window
42. one of the addresses in a block 167.199.82.27. What is the last address in this block?
a. 167.199.170.95
b. 167.199.170.96
c. 167.199.170.255
d. 167.199.170.224
43. A network layer firewall works as a :
a. Frame filter
b. packet filter
c. both A and B
d. none
44. A logic circuit that provides a HIGH output for both inputs HIGH or both inputs LOW:
a. ExOR
b. ExNOR
c. OR
d. NOR
45. When referring to instruction words, a mnemonic is?
a. Shorthand for machine language
b. A short abbreviation for data word stored at operand address
c. A short abbreviation for opearnd address
d. A short abbreviation for operation to be performed
46. Dijkstra's Banking Algorithm in an operating system solves the problem of:
a. Deadlock avoidance
b. deadlock recovery
c. Mutual Exclusion
d. Context switching
47. Gray code equivalent of (1000)2 is:
a. 1111
b. 1100
c. 1000
d. None
48. Which operator is used by java run time implementations to free the memory of an object when it is no longer needed?
a. Delete
b. Free
c. New
d. None
49. In which ARQ when a NAK is received all frames sent since the last frame acknowledged are retransmitted?
a. Stop and wait
b. Go back N
c. Selective reject
d. Both A and B
50. A Noiseless 3kHz channel transmits bits with binary level signals. What is the maximum data rate?
a. 3 kbps
b. 6 kbps
c. 12 kbps
d. 24 kbps
51. When an instruction is read from memory it is called?
a. Memory read cycle
b. Fetch cycle
c.Instruction cycle
d. memory write cycle
52. An HTML form is to be designed to enable purchases of office stationery. required items are to be selected . credit card
details are to be entered and then the submit button is to be pressed. Which of the following options would be appropriate for
sending the data to the server?
a. GET
b .POST
c. Either GET or POST
d. Neither GET nor POST
53. Consider different activities related to email:
m1: send an email from a mail client to a mail server
m2: Download an email from mailbox to a mail client
m3: Checking email from a web browser
which is the application level protocol used in each activity?
a. m1: HTTP m2: SMTP m3:POP
b .m1:SMTP m2:FTP m3:HTTP
c. m1:SMTP m2:POP m3:HTTP
d. m1:POP m2:SMTP m3:IMAP
54. In an IP packet, the value of HLEN is 15 and the value of total length field is 0028. how many bytes of data are being
carried by this packet?
a. 8
b .40
c. 64
d. 20
55. In asymmetric key cryptography the private key is kept by:
a. sender
b .receiver
c. sender and receiver
d. all connected devices to the network
56. DES encrypts data in block size of______ bits each
a. 64
b .128
c. 32
d. 56
57. Which is true for a typical RISC architecture?
a. Microprogrammed control unit
b . Instruction takes multiple clock cycles
c. Have few registers in CPU
d. Emphasis on optimizing instruction pipelines
58. A top to bottom relationship among the items in a database is established by:
a. Hierarchical schema
b .Network schema
c. Relational schema
d. All of above
59. In a GSM system BTS and BSC together form:
a. Network substation
b .Base station subsystem
c. maintenance subsystem
d. Operational subsystem
60. Mobile phone in roaming is registered in:
a. Visitors Location Registry of another MSC
b. Visitors Location registry of same MSC
c. Home location registry of another MSC
d. Home Location registry of same MSC
61. In a Piconet , there can be upto ----------- parked nodes in the net
a. 63
b. 127
c. 255
d. 511
62. Minimum number of NAND gates required to implement a ExOR function is:
a. 2
b. 3
c. 4
d. 5
63. A circuit in which connections to both AND and OR arrays can be programmed is called?
a. RAM
b. ROM
c. PAL
d. PLA
64. Consider the schema R=(S T U V) and the dependencies :
S --> T
T --> U
U -->V
V-->S
If R=(R1 and R2) be a decomposition such that R1 ^ R2= null then decomposition is :
a. Not in 2NF
b. In 2NF but not in 3NF
c. in 3NF but not in 2NF
d. in both 2NF and 3NF
65. A flipflop is a:
a. Combinational circuit
b. Memory element
c. Arithmetic element
d. Memory or arithmetic
66. Which of the following true:
a. Every relation in 3NF is also in BCNF
b. relation R is in 3NF ife very non prime attribute of R is fully functionally dependent of every key of R
c. Every relation in BCNF is also in 3NF
d. No relation can be both in BCNF and 3NF
67. Offset value of code segment :
a. Base pointer
b. Stack pointer
c. instruction pointer
d. None
68. A JK flip flop can be implemented using D flip flop connected such that
a. D= JQ'+ K'Q
b. D=J'Q+ KQ'
c. D=J'Q'+KQ
d. D=JQ'+KQ'
69. In a software project, COCOMO is used to estimate:
a. Effort and duration based on the size of software
b. Size and duration based on effort of software
c. Effort and cost based on duration of software
d. Size , Effort and duration based on cost of software
70. Arithmetic shift left operation:
a. Produces the same result as obtained with logical shift left operation
b. Causes sign bit to remain always unchanged
c. Needs additional hardware to preserve sign bit
d. is not applicable for signed 2's complement representation
71. Segment number defines:
a. Distance from the beginning to a particular location in a segment
b. The ending of segment within the memory space
c. The starting of segment within the memory space
d. None of above
72. How can you create a node for comment in javascript?
a. comment()
b. createcomment()
c. comm()
d. none
73. Which microprocessor pins are used to request and acknowledge a DMA transfer?
a. reset and ready
b. ready and wait
c. HOLD and HLDA
d. None of the above
74. Consider the following java program segment:
try{
int x=0;
int y=5/x;
}
catch(Exception e)
{
system.out.println("Exception");
}
catch(ArithmetcException ae)
{
System.out.println("Arithmetic exception);
}
System.out.println("Finished");
What will be the output of code segment?
a. Finished
b. Exception
c. Compilation fails
d. Arithmetic exception
75. Which activity does not take place during execution cycle?
a. ALU performs the arithmetic and logical operation
b. Effective address is calculated
c. Next instruction is fetched
d. Branch address is calculated and branching conditions are checked
76. SD RAM refers to:
a. Synchronous RAM
b. Static RAM
c. Semi RAM
d. Second RAM
77. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then:
a. Deadlock can never occur
b. Deadlock may occur
c. Deadlock has to occur
d. None of the above
78. cache memory works on the principle of:
a. Locality of data
b. Locality of reference
c. Locality of memory
d. Locality of reference and memory
79. Consider a logical address space of 8 pages of 104 words mapped into memory of 32 frames. how many bits are there in
logical address?
a. 9
b. 11
c. 13
d. 15
80. in a virtual memory system, the addresses used by the programmer belongs to:
a. memory space
b. physical address
c. address space
d. main memory address
81. What will be the output of the following PHP code
<?php
$a=5;
$b=5;
echo($a===$b);
?>
a. 5===5
b. error
c. 1
d. false
82. Determine the number of page faults when references to pages occur in the following orddr: 1,2,4,5,2,1,2,4. Assume that
main memory can accommodate 3 pages and the main memory already has pages 1 and 2 with page 1 having brought earlier than page 2. (LRU algorithm is used).
a. 3
b. 5
c. 4
d. None of above
83. Which of the following is FALSE?
a. Segmentation suffers from external fragmentation
b. Paging suffers from internal fragmentation
c. Segmented memory can be paged
d. Virtual memory is used only in multi user systems
84. Ready pin of a microprocessor is used:
a. To indicate that microprocessor is ready to receive inputs
b. To indicate that microprocessor is ready to receive outputs.
c. To provide direct memory access
d. To introduce wait states
85. An operating system uses shortest remaining time first (SRT) process scheduling algorithm. Consider the arrival times and
execution times for the following processes:
Process Execution time Arrival Time
P1 20 0
P2 25 15
P3 10 30
P4 15 45
What is the total waiting time for P2?
a. 5
b. 15
c. 40
d. 55
86. Let R(a,b,c) and S(d,e,f) be two relations in wich d is the foreign key of S that refers to the primary key of R. Consider the
following four operations R and S:
I. Insert into R
II. Insert to S
III. Delete from R
IV. Delete from S
Which of the following can cause violation of referntial integrity constraint above?
a. Bith I and IV
b. Both II and III
c. All of above
d. None of above
87. Given a class named student , which of the following is a valid constructor declaration for the class?
a. Student(student s) {}
b. Student student(){}
c. Private final student(){}
d. void student(){}
88. A binary tree T has n leaf nodes. the number of nodes of degree 2 in T is:
a. logn
b. 2n
c. n
d. 2^n
89. Following sequence of operations is performed on a stack push(1), push(2), pop(),push(1),push(2),pop(),pop(),pop(),push
(2),pop(). The sequence of popped out values are:
a. 2,2,1,1,2
b. 2,2,1,2,2
c. 2,1,2,2,1
d. 2,1,2,2,2
90. What can be said about the array represenation of a circular queue when it contains only one element?
a. FRONT=REAR+1
b. FRONT=REAR-1
c. FRONT=REAR=null
d. None of above
91. In the spiral model of software development the primry determinant in selecting activities in each iteartion is:
a. Iteration size
b. Cost
c. Adopted process such as relational unified process or extreme programming
d. risk
92. A software organization as been assessed at SEICMM level 4. Which of the following does the organization need to practice
beside proces change management anf technology change management in order to acheieve level 5?
a. Defect detection
b. Defect prevention
c. Defect isolation
d. Defect propagation
93. The extent to which a software can control to operate correctly despite the introduction of invalid input is called as:
a. Reliability
b. Robustness
c. Fault tolerance
d. Probability
94. Consider the following code segment in JAVA:
class X implements Runnable
{
public static void main(String args[])
{
/*Missing code*/
}
public void run()
{
}
}
Which of the following line of code is suitable to start a thread?
a. Thread t= nw Thread(X);
b. Thread t=new Thread(X); t.start();
c. X run=new X(); Thread t=new Thread(run); t.start();
d. Thread t=new Thread(); x.run();
95. Consider the following tree:
(1)
(2) (3)
(4) (5) (6) (7)
If the post order traversl gives ab-cd*+ then the label of nodes 1,2,...7 wll be?
a. + , -, * , a, b , c , d
b. a , - , b , + ,c ,* , d
c. a , b , c , d , - , * , +
d. - , a , b ,+ , * , c , d
96. The SQL expression
Select distinct T.branchName from branch T,branch S where T.assets>S.assets and S.branchCity = "COCHIN"
Finds the names of:
a. All branches that have greater assets than some branch located in cochin
b. All branches that have greater assets than all branches located in cochin
c. The branch that has greatest asset in COCHIN
d. Any branch that have greater assets than any branch located in cochin
97. Relationship produced from an ER model will always be in:
a. 1NF
b. 2NF
c. 3NF
d. BCNF
98. Which syntax is used to describe elemnts in CSS?
a. Protectors
b. Selectors
c. Both A and B
d. None of above
99. Which object is the main entry point to all client side javascript features and APIs?
a. Standard
b. Location
c. Window
d. Position
100. The let keyword in java script can be used in:
a. in a for or for/in loop as substitute for var
b. as a block statement to define new variables
c. to define variables that are scoped to single expression
d. All the mentioned
Solution: