Você está na página 1de 22

bsc

4su
cce
ss.c
om

IT OFFICER MCQs
1.

Which of the following is a functionally complete gate?


1) AND
2) OR
3) NAND
4) NOT

5) None of these

2.

The XYZ bank Gujarat branch has all Cisco routers connected in the network. The network
administrator Robert had replaced one of the routers with a nonCisco router. He then
configured PPP encapsulation on a Cisco router to enable communication between them.
Now, he wants to set HDLC back as the default protocol on the Cisco router. Which of the
following combinations will he use?
I. Interface serial [module_0/1] port_l and encapsulation hdlc.
II. Interface type [slot_2] port_l and encapsulation PPP.
III. Interface type [slot_2] port_l and encapsulation ppp and ppp pap sent-username jack
password system
1) III
2) II
3) I
4) I and II
5) None of these

3.

FDDI is
1) Ring Network
4) Bus based Network

4.

5.

2) Star Network
5) None of these

3) Mesh Network

Time sharing
1) Round Robin scheduling
3) First come First served
5) None of these

2) Priority scheduling
4) Non preemptive scheduling

Bankers Algorithm is used as


1) Deadlock occurrence method
3) Deadlock detection method
5) None of these

2) Deadlock avoidence method


4) Deadlock recovery method

6.

Which of the following communications lines is best suited to interactive processing applications?
1) narrow band channel
2) simplex lines
3) full duplex lines
4) mixed band channels
5) None of these

7.

Which of the logic family has the lowest power delay product
1) ECL
2) TTL
3) IIL
4) MOS

8.

What is the output of the following C program main


()
{
int i = 32, j = 0 20, k, l, m;
K = i / j;
l = i & j;
m = k ^ l;
print f(%d%d%d%d, i, j, k, l, m);
1) 32 32 32 32 0
2) 0 0 0 0 0
4) 32 0 32 0 32
5) None of these

5) None of these

3) 32 32 32 32 32

Downloaded From: http://bsc4success.com

A design description of an object can take


1) A protocol description
2) An implementation description
3) Both 1) and 2)
4) Either 1) or 2)
5) None of these

bsc
4su
cce
ss.c
om

9.

10. Applet
1) It is an application that run inside a rectangular region on the web page
2) It can display animation, sound, games and general utilities
3) Its application is calculator and search engine
4) all of the above
5) None of these
11.

When you drop a ............. corresponding indexes are also dropped.


1) Column
2) Sequence
3) View
4) Table

5) None of these

12. What error are you likely to get when you run the following program?
main ( )
{
struct emp;
{
char name [20];
float sal;
}
struct emp e[10];
int i;
for(i = 0; i < =9; i++)
scanf(%s%f,e[i].name & e[i].sal));
}
1) Suspicious pointer conversion
2) floating Point formats not linked
3) Cannot use scanf () structures
4) Strings cannot be nested inside structures
5) None of these
13. The Bankers algorithm is used
1) To prevent deadlock in operating systems
2) To detect deadlock in operating systems
3) To rectify a deadlock state
4) All of the above
5) None of these

14. The following sequence of operations is performed one a stack


PUSH (10), PUSH (20).POP, PUSH (10), PUSH (20), POP, POP, POP PUSH (20), POP
The sequence of values popped out is
1) 20, 10, 20, 10, 20
2) 20, 20, 10, 10, 20
3) 10, 20, 20, 10, 20
4) 20, 20, 10, 20, 20
5) None of these
15. For a 25 MHz processor, what is the time taken by the instruction which needs 3 clock cycles.
1) 120 nano secs
2) 120 micro secs
3) 75 nano secs
4) 75 micro secs
5) None of these

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

16. Which of the following is not an operating system call for process management?
1) CREATE
2) DELETE
3) FORK/JOIN
4) PCB
5) None of these
17. ER diagram is example of which data Model ?
1) Generic Data Model
2) Semantic Data Model
3) Relational Data Model
4) Special Data Model
5) None of these
18. An array can be passed in a function in C language through1) Call by value only
2) Call by reference only
3) Both call by value and call by reference
4) Tuple
5) None of these
19. What is the output of the following C program?
main ()
{
extern, int a;
printf(\n%d,a)
}
int a = 20
1) 0
2) 20
3) Error

4) Garbage value 5) None of these

20. Fragment Free Switches check ............bytes of data.


1) 4
2)16
3) 24
4) 64

5) None of these

21. The range of the numbers that can be stored in 8 bits, if negative number are stored in 2s
complement form, is
1) 128 to + 128
2) 128 to 127
3) 127 to +128
4) 127 to + 127
5) None of these
22. Choose the most appropriate definition of plane graph
1) A graph drawn in a plane in such a way that any pair of edges meet only at their end vertices
2) A graph drawn in a plane in such a way that if the vertex set of graph can be partitioned into
two non-empty disjoint subsets X and Y in such a way that each edge of G has one end in
X and one end in Y
3) A simple graph which is isomorphic to a Hamiltonian graph
4) All of the above
5) None of these
23. Boolean algebra
1) An algebraic system defined by Boolean lattice is known as a boolean algebra
2) For boolean lagebra (x + y)= x. y
3) For boolean algebra (x . y)= x + y
4) All of the above
5) None of these

Downloaded From: http://bsc4success.com

............ is a function that is expanded in line when it is invoked. That is, the compiler replaces
the function call with the corresponding function code.
1) Memory allocation function
2) Member function
3) Inline function
4) Default function
5) None of these

bsc
4su
cce
ss.c
om

24

25. A demand paging system with page table held in registers, takes 5 ms to service a page fault,
if empty page is available or if the page is to replaced is not dirty. It takes 15 ms if the replaced
page is dirty. Memory access time is 1,s. Assume we want an effective access time 23,s
and that the page to be replaced is dirty 60% of the time. What is the approximate page fault
rate to meet this access time requirement?
1) 0.1%
2) 1.0%
3) 2.5%
4) 0.01%
5) None of these
26. Packets are related to which layer
1) Data link layer
2) Physical layer
4) Presentation layer
5) None of these

3) Network layer

27. Feedback queue


1) are very easy to implement
2) dispatch tasks according to execution characteristics
3) are used to favour real-time tasks
4) require manual intervention to implement properly
5) None of these

28. The main advantages of CMOS as compared to TTL


1) lower consumption and better noise margins
2) lower power consumption with low fan-out
3) higher speed operation with low power consumption
4) higher power consumption with high fan-out
5) None of these

29. Rohan has an e-card that he uses to access different parts of his companys R&D offices.
What type of card is he using?
1) Credit card
2) Purchase card
3) Smart card
4) Contact card
5) None of these
30. Which of the following might be output as result of using a CASE tool?
1) Programmable Code
2) Flowcharts and data flow diagrams
3) Prototypes and Cost/benefit analysis
4) All of the above
5) None of these
31. Which TTL sub-family has maximum speed
1) Standard TTL
2) Schottky-clamped TTL
4) Low power TTL
5) None of these

3) High speed TTL

32. Which of the following statements is wrong?


1) no left recursive grammar can be LL1)
Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

2) no LL 1) grammar can be ambiguous


3) every LR1) grammar is an LL1) grammar
4) every grammar can be converted into LR1)
5) None of these
33. Each object is said to be ........ of its class.
1) Attribute
2) Instance
4) Operations
5) None of these

3) Classification

34. Warshalls algorithm


1) A directed graph G with M nodes is maintained in memory by its adjacency matrix A.
2) This algorithm finds the boolean path matrix P of the graph G
3) Both 1) and 2)
4) Either 1) or 2)
5) None of these
35. Which of the following is most general phase-structured grammer?
1) Regular
2) Context-sensitive
3) Context-free
4) All of the above
5) None of these

36. The correct hierarchical relationship among context-free, right-linear, and context-sensitive
language is given by
1) context-free < right-linear < context-sensitive
2) context-free < context-sensitive < right-linear
3) context-sensitive < right-linear < context-free
4) right-linear < context free < context-sensitive
5) None of these
37. Which of the following fields in a student file can be used as a Primary Key?
1) Class
2) Social Security Number
3) GPA
4) Major
5) None of these

38. The ......... device provides a digital interface for connecting routers and digital circuits ?
1) Channel service unit
2) Modem
3) Adapter
4) Router
5) None of these
39. Handshaking is
1) synchronous type
4) All of these

2) asynchronous
5) None of these

40. The class of context-free languages is not closed under


1) union
2) concatenation
4) intersection
5) None of these

3) sequential

3) repeated concatenation

41. The process of macro-expanion is completely segregated from the process of assembly program.
The translator which performs macro-expansions is called
1) Macro Interpreter
2) Macro Pre-Processor
3) Macro Table
4) All of the above
5) None of these

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

42. What is the output of the following C program?


main ()
{
int a[5] = {2,3};
printf(\n%d%d%d,a[2], a[3],a[4]);
1) Garbage Values
2) 2 3 3
4) 0 0 0
5) None of these
43. Which one is not logical
1) ORI
2) ORA

3) XRA

3) 3 2 2

4) OVI

5) None of these

44. RISC processor have


1) Relatively few instruction and addressing modes
2) All operations done within the register and CPU
3) Single cycle instruction execution
4) All of these
5) None of these
45. TCP means
1) transmission content protocol
3) transmission control protocol
5) None of these

2) transfer control protocol


4) all of the above

46. How many bit can accomodate instruction register


1) 8 bit
2) 16 bit
3) 32 bit

4) 4 bit

5) None of these

47. Let A = {l, 2, 3}, B = {a, b} and R= {(1, a), (1, b), (3, a), (2, b)} be a relation from A to B.
The inverse relation R is
1) R1 = {(a, l), (b, l), (a, 3), (b, 2)]}
2) R1 = {(2, b), (3, a), (l, b), (l, a)}
3) R1 = {(b, 2), (a, 3), (b, l), (a, l)}
4) All of the above
5) None of these
48. Yacc source program has 3 parts. Which of the following are Yacc source program parts?
1) Terminal symbol, non-terminal symbol, production rule
2) Declaration, translation rules, user routines
3) Declaration, Translation rules, C programs
4) All of the above
5) None of these
49. A loading scheme in which loading and linking of external and references are postponed until
execution time
1) Direct linking loader
2) Dynamic loading
3) Dynamic linking
4) Relocating loader
5) None of these
50. Back tracking problem is seen in
1) predirective parser

2) LR parsar

3) recursive-descent parsar

Downloaded From: http://bsc4success.com

4) All of the above

5) None of these

bsc
4su
cce
ss.c
om

51. Firewall have


1) two routers for packet filtering
2) application gateway, it is used in application layer
3) both 1 and 2
4) All of the above
5) None of these

52. Which of the following is the correct simplification of Boolean expression A`BC + AC?
1) BC+AC
2) BC+C
3) BC
4) A`C
5) None of these
53. Scope of macro definition
1) cannot be beyond the file in which it is defined
2) may be part of a file
3) is in the entire program
4) a, b, d
5) None of these

54. Cisco switches supports two different trunking protocols ................... and ................. both
providing basic trunking.
1) VLAN1 and VLAN2
2) Cisco 2950 and Cisco 1900
3) ISL and 802.1Q
4) Client and Transparent
5) None of these
55. Which of the following language differ the case of alphabets?
1) FORTRAN
2) BASIC
4) All of the above
5) All of the above

3) C

56. Goal of a relational database design


1) To generate a set of relation schemes that allow us to store information without unnecessary
redundancy
2) Allows us to retrieve information easily
3) Schemes that are in appropriate normal form
4) All of the above
5) None of these
57. On what platform is multithreading supported?
1) IDL5.5
2) IDL 5.6
4) All of the above
5) None of these

3) Support on all platform

58. The first version of UNIX was written by


1) Dennis Ritchie
2) Andrew S.
4) All of the above
5) None of these

3) Ken Thompson

59. Which of the following is used with databases?


1) Data mining
2) EDI
4) All of the above
5) None of these

3) Credit cards

Downloaded From: http://bsc4success.com

60. Which operator has highest priority


1) ( )
2) [ ]
3)

5) None of these

bsc
4su
cce
ss.c
om

61. Match the following:


List-I
(i) TTL
(ii) ECL
(iii) MOS
(iv) CMOS
Codes:
(i) (ii)
(iii)
1) a
b
c
2) b
a
d
3) c
d
a
4) d
a
c
5) None of these

4).

List-II
(a) Unipolar
(b) PMOS connected in a complementary fashion
(c) 5 volts
(d) High Speed

(v)
d
c
b
b

62. To modify existing row of the table, .......... statement is used.


1) ALTER
2) MODIFY
3) UPDATE
4) All of the above 5) None of these
63. The............. is an Interior Gateway Protocol that manage the exchange of routing of table
information.
1) RIP
2) OSPF
3) IGRP
4) EIGRP
5) None of these
64. Recently which operating system launched its Hindi version?
1) MINIX
2) LINUX
3) DOS
4) All of these

5) None of these

65. The receive equalizer reduces delay distortions using a


1) tapped delay time
2) descramber
4) All of the above
5) None of these

3) difference engine

66. Bit is related to which layer


1) physical layer
4) transport layer

3) network layer

2) data link layer


5) None of these

67. n stage ripple counter can count up to


1) 2n
2) 2n l
3) n

4) 2n1

5) None of these

68. Which of the following do you think is used to separate the base classes in a base class list?
1) Comma (,)
2) Colon (:)
3) Semi-colon (;)
4) Tilde (~)
5) None of these
69. Spatial locality refers to the problem that once a location is referenced
1) a nearby location will be referenced soon
2) it will not be referenced again.
3) it will be referenced again
4) All of the above
5) None of these

Downloaded From: http://bsc4success.com

70. What is the minimum number of wires needed to send data over a serial communication link
layer ?
1) 1
2) 2
3) 4
4) 6
5) 7

bsc
4su
cce
ss.c
om

71. To discard all pending data changes


1) COMMIT
2) ROLLBACK
4) LOCK
5) None of these

3) SAVEPOINT

72. When two numbers of n digits each are added and the sum occupies n + 1 digits, the situation
is called
1) Overflow
2) Underflow
3) Normal condition
4) All of the above
5) None of these
73. An assembler is a
1) Program
2) Person who assembles the parts
3) Symbol
4) language
5) None of these

74. Which of the following statement is not True?


1) We use views to restrict data access
2) We use views to make complex queries difficult
3) We use views to allow data independence
4) All of the above
5) None of these

75. The base difference between broad band and baseband is


1) availability 2) capacity
3) transmission 4) reliability

5) None of these

76. Whick of the following statements are true about doubly linked list?
(i) It may be either linear or circular
(ii) it must contain a header node
(iii) it will occupy same memory space as that of linear linked list, both having same number of
nodes.
1) only (i)
2) (ii) and (iii)
3) (i), (ii) and (iii)
4) (i) and (iii)
5) None of these
77. Which one is false
1) shift registers operate in serial fashion one bit at a time
2) parallel processing techniques are economically feasible
3) register with parallel load operate with all the bits of the word simultaneously
4) all of the above are true
5) None of these
78

.......... uses the Diffusing Update Algorithm to update the routing table.
1) RIP
2) OSPF
3) IGRP
4) EIGR
5) None of these

79. A computer system having 64 K memory will have its last address as
1) 65536 2) 64000
3) 65535
4) 65530
5) none of the above
Downloaded From: http://bsc4success.com

80. Function definition void check (int i,char*j) is


1) call by value
2) call by reference
4) invalid function definition
5) None of these

3) both 1) and 2)

bsc
4su
cce
ss.c
om

81. Which of the following is Network Security aspect?


1) Patch management
2) Firewalls
3) Intrusion Detection System (IDS)
4) All of the above
5) None of these

82. The smallest element of an arrays index is called its


1) Smallest bound
2) Lower bound
4) Higher bound
5) None of these

3) First bound

83. Which of the following file name extension suggests that the file is Backup copy of an other
file?
1) TXT
2) COM
3) BAS
4) BAK
5) None of these
84. McCall proposed which of the following quality factors?
1) Correctness, Reliability, Usability, Integrity, Efficiency
2) Maintainability, Flexibility, Testability
3) Portability, Reusability, Interoperability
4) All of the above
5) None of these

85. A communications device that combines transmissions from several I/O devices into one
line is a:
1) concentrator
2) modifier
3) multiplexer 4) full-duplex line
5) None of these
86. Which of the following commands can be used to get information about all users who are
currently logged into the system?
1) which
2) who
3) who am i
4) All of the above 5) None of these
87. A pilot can fly three types of planes and a plane can be piloted by any qualified pilot. The pilotplane type relationship is
1) N : 3
2) 3 : N
3) 1 : 3
4) 3 : 1
5) None of these
88. DES
1) Data Encryption standard was widely adopted by the industry for use in security products
2) It is no longer secure in its original form, but in a modified form it is still useful
3) Plain text is encrypted in blocks of 64 bits
4) All of the above
5) None of these
89. How many transistor is LSI
1) more than 100
4) more than 10

2) more than 1000


5) None of these

3) more than 10,000

Downloaded From: http://bsc4success.com

90. Match the following:


List-I
(i) State Table
(ii) Locality of Reference
(iii) Asynchronous Data Transfer
(iv) 2S Complement Multiplication
Codes:
(i) (ii)
(iii) (v)

bsc
4su
cce
ss.c
om

List-II
(a) Strobe Control Method
(b) Booth Algorithm
(c) Flip-flop
(d) Cache

(i) (ii)
1) a
b
2) d
c
3) c
a
4) c
d
5) None of these

(iii)
c
b
d
a

(iv)
d
a
b
b

91. At the business or enterprise level, the techniques associated with object oriented Analysis can
be coupled with an information engineering approach. This technique is often called
1) Requirement Analysis
2) Domain Analysis
3) Entity Analysis
4) Relationship Analysis
5) None of these
92. Which is the correct statement regarding debit/smart card ?
1) Banks are generally extending this facility to saving account with liquidity features.
2) These cards facility are not extended to cash and loan account.
3) Both 1) and 2).
4) Debit card can be issued to PMRY beneficiaries.
5) None of the above.

93. The network administrator Paul requires configuring a primary rate interface for the XYZ bank
Hyderabad branch. He needs to specify the switch type for ISDN while configuring PRI.
Which command will he use?
1) isdn switch-type basic-ni
2) isdn switch basic-ni
3) isdn switch-type pri-4ess
4) isdn switch pri-4ess
5) None of these
94. Which of the following is not a type of graph?
1) Euler
2) Hamiltonian
3) Tree

4) Path

5) None of these

95. A video editing system for Linux


1) DVDL
2) LIVES

4) LVS

5 ) None of these

3) VSL

96. What is the output of given C fragment program.


if (a = 0)
printf (a is zero);
Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

else
printf (a is not zero);
1) a is zero
2) prints nothing
3) a is not zero
4) Garbage value
5) None of these

97. A system program that separately compiles modules of a program into a form suitable for
execution is
1) Assembler
2) Linking loader
3) Cross compiler
4) Load and go
5) None of these
98. Which of the following is not characteristic of a relational database model?
1) Tables
2) treelike structure
3) complex logical relationship
4) records
5) None of these
99. concept of developing a compiler for a language by using subsets of the same language
1) Bootstrap 2) Lex
3) Yacc
4) Analyzer
5) None of these
100. Which of the following software tool is a parser generator?
1) Lex
2) Yacc
3) Both 1 and 2 4) Either 1) or 2) 5) None of these
101. You are writing classes that will bypass the operating system which directly access several
system resources, such as memory and disk drives. Which language is probably the best?
1) C++
2) Cobol
3) Java
4) Small talk
5) None of these
102. Which of the following performs modulation and demodulation?
1) Fiber optic
2) satellite
4) modem
5) none of the above

3) coaxial cable

103. VSAT means


1) Very Small Amplitude Transmission
2) Very Small Apertual Terminal
3) Very Small Apertual Transmission
4) Very Small Amplitude Terminal
5) None of these
104. In fiber optics index angle is
1) less than cladding angle
2) greater than cladding angle
3) equal to the cladding angle
4) All of the above
5) None of these

105. Speed of optical fiber depends on


1) number of photon
2) dispersion
4) All of these
5) None of these

3) attenuation

Downloaded From: http://bsc4success.com

106. When both inputs are different, then output is high in


1) NAND GATE
2) NOR GATE
4) EX-OR Gate
5) None of these

3) OR Gate

bsc
4su
cce
ss.c
om

107. In a synchronous modem, the digital-to-analog converter transmits signal to the


1) equalizer
2) modulator
3) demodulator
4) terminal
5) none of the above
108. The function of a database is
1) to check all input data
2) to check all spelling
3) to collect and organize input data
4) to output data
5) None of these

109. The ............ command enables you to switch from the user mode to privileged mode.
1) enable
2) disable
3) config
4) switch
5) None of these
110. Railway reservation is example of
1) On line system
2) Off line system
4) time sharing
5) None of these

3) batch processing

111. A relation schema is said to be in ............ form if the values in the domain of each attribute of
the relation are atomic.
1) Unnormalized
2) First Normal
3) Boyce Codd
4) All of these
5) None of these
112. Which kind of lock includes a keypad that can be used to control access into areas ?
1) Cipher
2) Warded
3) Device
4) Tumbler
5) Typelock
113. Which gate is known as Universal gate?
1) NOT gate
2) AND gate
4) XOR gate
5) None of these

3) NAND gate

114. Context switching changes the process mode from


1) user to kernel mode
2) kernel to user mode
3) kernel mode to the k process
4) both 1 and 2
5) None of these
115. UNIX operating syste based on
1) Language structure
4) Time sharing

2) Kernel approach
5) None of these

116. Type checking is normally done during


1) Lexical analysis
2) Syntax Analysis
4) Code optimization
5) None of these

3) Virtual machine

3) Syntax directed translation

117. How many NAND gates are needed to perform the logic function X.Y?
Downloaded From: http://bsc4success.com

1) 1

2) 2

3) 3

4) 4

5) None of these

bsc
4su
cce
ss.c
om

118. Wait and notify used in


1) A synchronous method
2) Synchronous method
3) Sequential method
4) Parallel method
5) None of these

119. HTTP means


1) Hypertext transfer protocol
2) Hypertext transmission protocol
3) Hypertension transfer protocol
4) All of the above
5) None of these

120. Which directory implementation is used in most Operating System ?


1) Single level directory structure
2) Two level directory structure
3) Tree directory structure
4) Acyclic directory structure
5) None of these
121. Which of the following printers cannot print graphics?
1) Ink-jet
2) Daisywheel
3) Laser
4) Dot-matrix
5) None of these

122. The............. command enables you to change the name for the router.
1) hostname
2) name
3) banner
4) router

5) None of these

123. Software quality metrics like productivity metrics, focus on the


1) Process
2) Project
3) Product
4) All of these

5) None of these

124. When ray passes through fused silica to air, the ray is refracted, then light trapped by
1) refraction
2) reflection
3) total internal reflection
4) All of the above
5) None of these
125. Which one is input device
1) DVD
2) Trackball

3) Digitizers

126. The model for a record management system might be


1) handwritten list
2) a Rolodex Card file
4) All of the above
5) None of these
127. Which of them is not a valid DBMS Data Model ?
1) Relational 2) Hierarchical
3) Complex

4) All of the above 5) None of these

3) a business form

4) Network

5) None of these

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

128. Which of the following consists of an array of gates which can be used to patch an error in a
ROM or alter the meaning of instruction
1) RAM
2) EAPROM
3) PLA
4) PSW
5) None of these
129. The ........ comand enables you to set encrypted passwords for the privileged mode.
1) line console
2) line vty
3) enable password
4) enable secret
5) None of these

130. Actions are performed in an object oriented systems by sending ....... to an object.
1) Statements 2) Messages
3) Control
4) All of these
5) None of these
131. In K-map, the adjacent squares represent minterms that differ by
1) One variable
2) Two variable
3) Three variable
4) All of these
5) None of these
132. Data transfer rate of a double density floppy disk is about
1) 5K bits/sec
2) 50K bits/sec
4) 5000K bits/sec
5) None of these

3) 500K bits/sec

133. How many bits are required to encode all 26 letters, 10 symbols and 10 numerals
1) 5
2) 6
3) 7
4) 46
5) None of these
134. Which of the following operator is used to access the value of structure pointer?
1)
2) &
3) *
4) .
5) None of these
135. If initialization is a part of declaration of a structure, then the storage class can be
1) automatic
2) register
3) static
4) anything
5) None of these
136. The ................ model remains operative until the software is retired.
1) Waterfall
2) Incremental
3) Spiral
4) All of these

5) None of these

137. When a cracker attempts to misuse or steal data from a system, it is called
1) Stealing
2) Intrusion
3) Virus
4) All of these
5) None of these
138. Which of the following does not allow multiple users or devices to share one communication
line?
1) double-plexer 2) multiplexer 3) concentrator 4) controller
5) None of these
139. One can display all columns of data in a table by following the SELECT keyword with
1) +
2) *
3)
4) ?
5) None of these
140. Raid configuration of disks are used to provide
1) Fault tolerance
2) High speed
4) All of the above
5) None of these
141. 8085 memory is
1) 1 M byte
2) 64 Kbte

3) 64 K bit

3) High data density

4) 64 byte

5) None of these

142. Link encryption


Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

1) is more secure than end to end encryption


2) is less secure than end to end encryption
3) cannot be used in public network
4) is used only to debug
5) None of these
143. HDLC is
1) Bit oriented
4) All of the above

2) Code transparent
5) None of these

3) Code dependent

144. What is the name of the printer which print all the As in a line before all the Bs?
1) Thermal printer
2) Electrostatic printer
3) Line printer
4) Ink-jet printer
5) None of these
145. Fiber optics frequency have
1) 105 to 107
4) 1014 to 1015

2) 106 to 109
5) None of these

3) 109 to 1011

146. Which one is related to modulator and demodulator


1) multiplexer
2) decoder
4) modem
5) None of these

3) encoder

147. Seeta has an e-card that she uses to purchase office supplies for the company she works for.
What type of smart card is she using?
1) Credit card
2) Purchase card
3) Smart card
4) Contact card
5) None of these
148. Stack is sometimes called a
1) Push down list
4) Pop up array

2) Pushdown array
5) None of these

3) Pop down list

149. Periodically adding, changing and delecting file records is called file
1) Updating
2) Upgrading
3) Restructuring
4) History file
5) None of these
150. What is hamming distance code for correcting?
1) 2d + l
2) d + 1
3) 2d + 3

4) d + 3

5) None of these

151. Subnet Mask of class A is


1) 255.0.0.0 2) 192.0.0.0

4) 224.0.0.0

5) None of these

3) 255.0.0.1

152. The relational model includes two general integrity rules. Integrity rule 1 is concerned with
......... and integrity rule 2 is concerned with .........
1) Primary key, Foreign key
2) Composite key, Primary key
3) Foreign key, Primary key
4) Transaction key, Foreign key
5) None of these

Downloaded From: http://bsc4success.com

153. Which is the output of the following program fragment in C?


int x, y =2, z, a ;
x = (y* = 2) + (z = a = y);
printf (% d, x);
1) 7
2) 8
3) Garbage value
4) Error

bsc
4su
cce
ss.c
om

5) None of these

154. In comparison with static RAM memory, the dynamic RAM memory has
1) lower bit density and higher power consumption
2) higher bit density and higher power consumption
3) lower bit density and lower power consumption
4) higher bit density and lower power consumption
5) None of these
155. V.24
1) It is similar to multiplexer
2) It is similar to Modem
3) It is similar to Demultiplexer
4) All of the above
5) None of these

156. The ABC bank needs to decide on a routing protocol for its large enterprise networks. The
bank has a mixed vendor environment and may need to replace any of its existing routers. It
needs to follow the bank policy and requires an open standard routing protocol. Which routing
protocol will you implement for the ABC bank
1) OSPF
2) RIP
3) IGRP
4) EIGRP
5) None of these
157. Which of the following operators can be overloaded in C++?
1) Scope resolution operator
2) Size of operator
3) Conditional operator
4) Arithmetic operator
5) None of these
158. A multiplexer with a 4 bit data select input is a
1) 4 : 1 multiplexer
2) 2 : 1 multiplexer
4) 8 : 1 multiplexer
5) None of these

3) 16 : 1 multiplexer

159. Which of the following is an advantage to using fibre optics data transmission ?
1) resistance to data theft
2) fast data transmission rate
3) low noise level
4) all of these
5) None of these

160. An interactive computer system


1) It provides on line communication between user and system
2) user gives instruction to the operating system or to a program directly, and receives an
immediate response
3) both 1) and 2)
4) None of these
Downloaded From: http://bsc4success.com

5) None of these
161. Which of the following is different from the group?
1) Private
2) Protected
3) Public

4) Friend

5) None of these

bsc
4su
cce
ss.c
om

162. Which of the following sorting method is stable?


1) Straight insertion sort
2) Binary insertion sort
3) Shell sort
4) Heap sort
5) None of these

163. Which of the following C++ statement is correct?


1) int*p = new int
2) int new = *p
3) int*new = *p
4) int*p = int new
5) None of these

164. The ....... metric specifies the amount of data that can travel over the network segment.
1) Hops
2) Load
3) Delay
4) Bandwidth
5) None of these
165. Length of the walk of a graph is
1) The number of vertices in walk W
2) The number of edges in walk W
3) Total number of edges in a graph
4) Total number of vertices in a graph
5) None of these
166. Each item in a linked list is called
1) Element
2) Information

3) Data

4) Node

5) None of these

167. ............. is the situation in which a process is waiting on another process, which is also waiting
on another process, which is waiting on the first process. None of the processes involved in
this circular wait are making progress.
1) Deadlock
2) Starvation 3) Dormant
4) All of the above 5)None of these
168. Consider a machine with 64 MB physical memory and a 32 bit virtual address space. If the
page size is 4 KB, what is the approximate size of the page table?
1) 16 MB
2) 8 MB
3) 2 MB
4) 24 MB
5) None of these
169. The access time of magnetic bubble memory is approximately
1) 30 ns
2) 30 ms
3) 30 ms
4) 0.3 sec

5) None of these

170. Which of the following gates would output 0 if inputs are equal.
1) NAND
2) NOR
3) EX-OR
4) OR

5) None of these

171. Which of the following is not a page replacement algorithm?


1) LIFO
2) FIFO
3) LRU
4) Optimal

5) None of these

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

172. Subnet is related to which layer


1) data link layer, Network layer, transport layer
2) physical layer, Network layer, transport layer
3) network, transport, physical layer
4) all of the above
5) None of these
173. Parsing can be
1) Top-down 2) Bottom up

3) Both 1) and 2) 4) Either 1) or 2) 5) None of these

174. What is the alternative name for a diskette?


1) Winchester disk
2) flexible disk
4) floppy disk
5) None of these

3) hard disk

175. A tree having a main node, which has no predecessor is


1) Spanning tree
2) Rooted tree
4) All of the above
5) None of these

3) Weighted tree

176. If an entity appears in not more than 5 relationships then it is a :


1) 1 : 1 relationship
2) 1 : 5 relationship
4) 5 : 5 relationship
5) None of these

3) 5 : 1 relationship

177. The.......... metric measures traffic over the network.


1) Hops
2) Load
3) Delay

4) Bandwidth

178. In a JK flip-flop, if J = K, the resulting flip-flop is referred to as a


1) D flip-flop
2) T flip-flop
4) All of the above
5) None of these

5) None of these

3) S-R flip-flop

179. The XYZ bank has all Cisco routers connected in the network. A host connects to a router
through telnet connection. Which command will the administrator Robert uses to print the
messages or the console part:
1) terminal monitor
2) terminal print
3) console print
4) console monitor
5) None of these
180. In C++ a function contained in a class is called
1) Member function
2) an operator
4) a method
5) None of these

3) a class function

181. In data transmission, the bit coding scheme used to represent a byte is typically
1) EBCDIC
2) ASCII
3) SNA
4) Hexadecimal
5) None of these
182. An unnormalized relation contains values
1) Atomic
2) Non-atomic
4) All of the above
5) None of these

3) Classified

183. Memory protection is normally done by


1) the processor and the associated hardware
Downloaded From: http://bsc4success.com

2) the operating system


3) the compiler
4) the user program
5) None of these

bsc
4su
cce
ss.c
om

184. Most significant bit is


1) S
2) CY

3) Z

4) P

5) None of these

185. When any positive integer is divided by zero, then error be catch by at
1) Compiler time 2) Intrepreter 3) Debugging
4) Run time

5) None of these

186. What is the min number of two input NAND gates used to perform the function of two input
OR gate?
1) 1
2) 2
3) 3
4) 4
5) None of these
187. An audit trail
1) is used to make back-up copies
2) is the recorded history of operations performed on a file
3) can be used to restore lost information
4) none of the above
5) None of these

188. Gopher is
1) Gopher was text only global set of linked menus and files
2) Gopher is a browser
3) Both 1 and 2
4) Either 1) or 2)
5) None of these
189. The sum of weights in self complement BCD code is
1) 8
2) 9
3) 10

4) 16

5) None of these

190. Port number of HTTP is


1) 25
2) 80

4) 123

5) None of these

3) 125

191. Consider two regular languages L1= (a + b) *a and L2 = b(a + b)*. The intersection of L1 and
L2 is given by
1) (a+b)*ab
2) ab(a+b)*
3) a(a+b)*b
4) b(a+b)*a
5) None of these
192. Which of the following is not functionally a complete set?
1) AND, OR
2) NOR
4) AND, OR, NOT
5) None of these

3) NAND

193. Thedesign goal refers to the ability of the routers to agree on optimal routes.
1) Robustness
2) Flexibility
3) Convergence
4) Optimal Route
5) None of these

194. Which of the following TCP/ IP protocol is used for remote terminal connection services?
1) TELNET
2) FTP
3) RARP
4) UDP
5) None of these
Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

195. Which of the following TCP/ IP protocol is used for transferring electronic mail messages from
one machine to another?
1) FTP
2) SNMP
3) SMTP
4) RPC
5) None of these
196. Software design is
1) Process 2) Model

3) Both 1) and 2)

4) Either 1) or 2)

5) None of these

197. Smart card


1) has an integrated with micro processor chip embedded in it so it could perform calculation
and maintain records
2) has built for protection against fraudulent operations
3) can either be recharge or exchangeable
4) All of the above
5) None of these
198. Which of the following calls never returns an error
1) getpid
2) fork
3) ioctl

4) open

5) None of these

199 .................. time is expressed as turnaround time less actual execution time.
1) Response 2) Waiting
3) CPU
4) Process
5) None of these
200. Port number of SMTP is
1) 25
2) 80

3) 123

4) 243

5) None of these

ANSWERS
1. 3
6. 3
11. 4
16. 4
21. 2
26. 3
31. 2
36. 4
41. 2
46. 2
51. 3
56. 4
61. 3
66. 1
71. 2
76. 1
81. 4
86. 2
91. 2

2. 2
7. 3
12. 2
17. 2
22. 1
27. 2
32. 4
37. 2
42. 4
47. 1
52. 1
57. 3
62. 3
67. 2
72. 1
77. 4
82. 2
87. 1
92. 3

3. 1
8. 1
13. 1
18. 3
23. 4
28. 1
33. 2
38. 1
43. 4
48. 3
53. 4
58. 3
63. 1
68. 1
73. 1
78. 4
83. 4
88. 4
93. 3

4. 1
9. 3
14. 2
19. 4
24. 3
29. 3
34. 3
39. 2
44. 4
49. 3
54. 3
59. 1
64. 2
69. 1
74. 2
79. 3
84. 4
89. 2
94. 4

5. 2
10. 4
15. 1
20. 4
25. 4
30. 4
35. 2
40. 4
45. 3
50. 3
55. 3
60. 1
65. 1
70. 2
75. 2
80. 3
85. 3
90. 4
95. 2

Downloaded From: http://bsc4success.com

97. 2
102. 4
107. 1
112. 1
117. 2
122. 1
127. 3
132. 3
137. 2
142. 2
147. 2
152. 1
157. 4
162. 1
167. 1
172. 1
177. 2
182. 2
187. 2
192. 1
197. 4

98. 2
103. 2
108. 3
113. 3
118. 4
123. 4
128. 3
133. 2
138. 1
143. 1
148. 1
153. 2
158. 3
163. 1
168. 3
173. 3
178. 2
183. 1
188. 3
193. 3
198. 1

99. 1
104. 1
109. 1
114. 4
119. 1
124. 3
129. 4
134. 1
139. 2
144. 3
149. 1
154. 4
159. 4
164. 4
169. 3
174. 4
179. 1
184. 1
189. 2
194. 1
199. 2

100. 2
105. 1
110. 1
115. 2
120. 3
125. 4
130. 2
135. 3
140. 1
145. 2
150. 1
155. 2
160. 3
165. 2
170. 3
175. 2
180. 1
185. 4
190. 2
195. 3
200. 1

bsc
4su
cce
ss.c
om

96. 3
101. 2
106. 4
111. 2
116. 3
121. 2
126. 4
131. 1
136. 3
141. 2
146. 4
151. 1
156. 1
161. 4
166. 4
171. 1
176. 2
181. 2
186. 3
191. 4
196. 3

Downloaded From: http://bsc4success.com

Você também pode gostar