Você está na página 1de 22

8. Which of the following is true about a cross compiler?

(A) It is written in the machine code of one processor and produces code for another processor (B) It is used for compiler porting (C) It may be written in the same language as the one for which it is a compiler of (D) All of these 9. Which of the following phases of a compiler is not in the backend? (A) Syntax analysis (B) Intermediate code generation (C) Code generation (D) Code optimization 10. FORTRAN does not support recursion because: (A) It does not have pointer data type (B) It is used for scientific and engineering applications (C) It uses dynamic allocation (D) It is not a format free language 11. For a given grammar, which among the following parsing tables are likely to have the most number of states? (A) SLR (B) LALR (C) LR(O) (D) LR(l) 12. A parsing algorithm used in top down parsing is : (A) SLR (B) LL (C) LR (D) LALR 13. Which among the following is not used for intermediate code generation? (A) Quadruples (B) Triples (C) Syntax trees (D) Parse trees 14. DAG is used in a compiler for: (A) Intermediate code generation (B) Code generation (C) Code optimization (D) Parsing 15. YACC is a program in UNIX used for: (A) automatic scanner generation (B) automatic parser generation (C) automatic code generation (D) none of these 16. Which of the following identifiers used in LEX contains the sequence of characters forming a token? (A) yylval (B) yyerror (C) yytext (D) yystack 17. Consider the following grammar:

S-> (S) S ->x Which of the following statements is (are) true? (i) The grammar is ambiguous (ii) The grammar is suitable for top-down parsing (iii) The grammar is suitable for bottom-up parsing (A) (iii) only (B) (ii) only (C) (i) only (D) (ii) and (iii) 18. Which of the following operations is context free languages not closed under? (A) Union (B) Closure (C) Intersection (D) Substitution 19. A phenomenon in virtual memory schemes in which the processor spends most of the time swapping pages rather than executing instructions is : (A) loading (B) swapping (C) trashing (D) aging 20.Which among the following is not a reason for process termination? (A) Normal termination (B) Memory unavailable (C) Protection error (D) Invalid time

21. Which of the following is (are) true about virtual memory systems that use pages? (i) The virtual address space can be larger than the amount of physical memory (ii) Programs must be resident in main memory throughout their execution (iii) Pages correspond to semantic characteristics of the program. (A) (i) only (B) (ii) only (C) (i) and (ii) (D) (i) and (iii) 23. Which level of security is implemented in Windows NT? (A) Al (B) Cl (C) B2 (D) C2 24. A method of executing two or more programs concurrently using the same computer describe: (A) multi processing

(B) multiprogramming (C) virtual processing (D) time sharing 25. Windows is a ------- bit operating system. (A) 8 (B) 16 (C) 32 (D) 64 26. The UNIX shell : (A) does not come with the rest of the system (B) forms the interface between the user and the kernal (C) does not give any scope for programming (D) does not allow calling one program from with in another 27. The invalid file in UNIX from among the ones given below is: (A) /bin/unix (B) fete/passwd (C) fete/group (D) fusr/bin/vi 28. The very first process created by the Kernal in UNIX is : (A) init (B) getty (C) fork (D) none among these 29.A software package that includes two or more applications, such as word processing and spreadsheets, providing for easy transfer of data between them is best defined as : (A) software server (B) software set (C) integrated software package (D) application set 30. Which of the following is a software selection criteria? (A) ppropriateness (B) Efficiency (C) Compatibility (D) All of the above 1) Fastest component of a computer system is a) Flash ROM b) Cache memory* c) DDR RAM d) CPU 2. Which tags are placed on animals, to track all of the animals movements. a)POS b) RFID* c) PPS d) GPS 3. _______________ uses an FAT for file allocation? a) WINDOWS* b) Linux c) Unix d) Solaris 4. TLB stands for? a) Table Lookup Buffer b) Translation Look aside Buffer* c) Translation table d) None 5. The address space of 8086 CPU is? a) 1 Megabytes* b) 256 Kilobytes c) 1 Kilobyte d) 64 kilobytes

6. The following statement printf(%f, 9/5); prints (a) 1.8 *(b) 1.0 (c) 2.0 (d) none of the above 7. C is a? (a) high level language (b) low level language (c) high level language with some low level features.* (d) low level language with some high level features. 8. What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array? (a. The element will be set to 0. (b. The compiler would report an error.* (c. The program may crash if some important data gets overwritten. (d. The array size would appropriately grow. 9. Which of the following operations can be performed on the file "NOTES.TXT" using the below code? FILE *fp; fp = fopen("NOTES.TXT", "r+"); (a. Reading (b. Writing (c. Appending (d,Read and Write * 10. One of the following is not a real RDBMS a) dBase* b) DBII c) MA Access d) Oracle 11. Multi media System involves a) Only Audio and Video b) Animation Video Movies c) Animation movie with Text also d) All type of movie with Animation Graphics and Text * 12. The minimum number of temporary variables needed to swap the contents of two variables is? (a)1 (b)2 (c)3 (d)0 *13. Ping is a command used for a) Checking MAC address b) Checking Networking functionality and validity of IP address* c) Checking cabling performance d) Checking cable connectivity only 14. The candidate key which identifies the tuples in a relation uniquely is called? a) super key b) Primary key* c) Foreign key d) none of the above 15. Back up and restore is preferred for a) All files and data together b) System data areas only c) Selected file system components d) Disk image for recovery* 16. The term bit is short for: A. megabyte. B. binary language. C. binary digit.* D. binary number. 17. A string of eight 0s and 1s is called a: A. megabyte.

B. byte.* C. kilobyte. D. gigabyte. 18. A____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte* D. megabyte 19.____________ is any part of the computer that you can physically touch. A. Hardware* B. A device C. A peripheral D. An application 20. The components that process data are located in the: A. input devices. B. output devices. C. system unit.* D. storage component. 21. A____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte* D. terabyte 22. All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers.* C. floppy disk drives. D. CD drives. 23.The____________, also called the brains of the computer, is responsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU)* 24. The CPU and memory are located on the: A. expansion board. B. motherboard.* C. storage device. D. output device. 25. Word processing, spreadsheet, and photo-editing are examples of: A. application software.* B. system software.

C. operating system software. D. platform software. 26.____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software* C. Memory D. A processor 27. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms.* B. applications. C. programs. D. storage devices. 28. DSL is an example of a(n)____________ connection. A. network B. wireless C. slow D. broadband*

29. Which of the following is the correct order of the four major functions of a computer? A. Process , Output , Input , Storage B. Input , Output, Process , Storage C. Process , Storage , Input , Output D. Input , Process , Output , Storage* 30.____________ bits equal one byte. A. Eight* B. Two C. One thousand D. One million 31. The operating system is the most common type of____________ software. A. communication B. application C. system* D. word-processing software 32. The two broad categories of software are: A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS. D. system and application* 33. All of the following are examples of real security and privacy risks Except_____ (A) hackers (B) spam* (C) viruses

(D) identify theft 34. The OSI model is divided into_______ processes called layers. (A) five (B) six (C) seven* (D) eight 35. Viruses are often transmitted by a floppy disk left in the floppy drive (A) Trojan horse (B) Boot sector* (C) Script (D) Logic bomb 36. Servers are computers that provide resources to other computers connected to a (A) mainframe (B) Network* (C) supercomputer (D) client 37. URL stands for........ (A) Universal Research List (B) Universal Resource List (C) Uniform Resource Locator* (D) Uniform Research Locator 38. You must install a __________ on a network if you want to share a broadband Internet. A) Router* (B) modem (C) node (D) cable 39. Chip is a common nickname for a (n): (A) transistor (B) resistor (C) Integrated circuit* (D) semiconductor 40. The design of the network is called the network: (A) Architecture* (B) server (C) transmission (D) type 41. Personal logs or journal entries posted on the Web are known as: (A) Podcast (B) Webcasts (C) Blogs* (D) subject directories

42. Linux is a ____________ operating system. (A) Open-source * (B) Microsoft (C) Windows (D) Mac 3. What is a backup? (A) Restoring the information backup (B) An exact copy of a system's information (C) The ability to get a system up and running in the event of a system crash or failure (D) All of these* 44.____________ are lists of commands that appear on the screen. (A) GUIs (B) Icons (C) Menus* (D) Windows 45. Verification of a login name and password is known as: (A) configuration (B) accessibility (C) Authentication* (D) logging in 46. 'MICR' technology used for clearance of cheques by banks refers to (1) Magnetic Ink Character Recognition* (2) Magnetic Intelligence Character Recognition (3) Magnetic Information Cable Recognition (4) Magnetic Insurance Cases Recognition 47. The CPU and memory are located on the: A. expansion board. B. Motherboard.* C. storage device. D. output device. 48. First generation computer systems used (a) Transistors (b) Vacuum tubes* (c) Magnetic cores (d) Silicon chips 49. Charles Babbage invented (a) ENIAC (b) Difference engine (c) Electronic computer* (d) Punched card

50. Which one of the following is not a programming language of a computer? (a) BASIC (b) FORTRAN (c) LASER* (d) PASCAL 1. In a memory, the minimum time delay between the initiation of successive memory operations is : cycle time 2. The first Operating System used in Microprocessor based system was : CP/M 3.C is independent of the Boolean variable : B +A 3. The Boolean expression A(B+C)+AB 4. A byte addressable computer has memory capacity of 4096 KB and can perform 64 operations. An instruction involving 3 memory operands and one operator needs : 72 bits 5. Which addressing mode used in an instruction of the form ADD X, Y : Absolute 6. The addressing mode used in the stack related instruction PUSH B is : Register indirect 7. Parallel printers use : Centronics interface 8. An assembler that runs on one machine, but generating code for another machine is called : Cross assembler 9. A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM chips. The smallest memory that this computer can have is : 32 KB 10. To construct a binary Mod-N counter, the number of flip-flops needs is : Log2N 11. The total number of possible ordered trees using 3 nodes A,B,C is : 12 12. The binary search algorithm is of order : log n 13. The minimum number of edges in a connected cyclic graph on N vertices is : N 14. The execution time of a recursive algorithm is given as ; T(n)=c+T(n-1), if n>1 =d, if n1. The order of the algorithm is : n 15. Assuming 2 sorted lists of sizes S1 and S2, the worst case number of comparisons needed by the merge sort algorithm is : S1+S2 -1 16. If an M x N matrix is stored in column major form, the index calculation required to access the (i, j)th entry is : M .(j-1)+i 17. Four different algorithms L1, L2, L3 and L4 with orders of log(n), log{log(n)}, n log(n) and n/log(n) respectively have been proposed to solve a specified problem. Which of these is the best one : L2 18. The principle of locality of reference is cited to justify the usage of : Cache memory 19. On a particular system, using Quick sort, if it takes 100 msec to sort 1000 records, time taken to sort 100 records will be : 6.7msec 20. In traversing a tree using Breadth First Search, the data structure used is : Queue 21. In a data base, the column of a table is referred to as the : Attribute 22. The part of a program which accesses a shared resource and which should be executed indivisibly is called : Critical section 23. In a database design, if every non-key attribute is functionally dependent on the primary key, then the relation will be in : Third normal form 24. An attribute of one table matching the primary key of another table is known as : Foreign Key 25. Given the functional dependencies X Y; Y Z; X W and Z AB, which of the following does not hold good : W Z

26. SQL stands for ------------ Query Language : Structured 27. In SQL databases, the memory area used for internal processing is called : Cursor 28. The number of relationships in which an entity can appear in an E-R diagram is called its : Cardinality 29. The process of analyzing, archived data to obtain tactical and strategic information is often called : Data mining 30. If a relation is in Boyce-Codd normal form, then it is also in : 3rd Normal form 31. RAID is a standard used in the design of : Disk Memory 32. In an OS, the process of buffering data intended for a peripheral device, onto a disk area, for later bulk transfer is known as : Spooling 33. Kernel in Operating System is : A set of primitive functions upon which OS functions are built. 34. Which of the following scheduling policy is most suited for a time sharing OS : Round Robin 35. For real time OS, which of the following is the most suitable scheduling scheme : Preemptive 36. In a paged memory, access times of primary and secondary memories are 10ns and 100ns respectively. If the average access time is 23.5 nsec, hit ratio is : .85 37. The size of the virtual memory depends on the size of : Address bus 38. Three processes A, B, C have peak time demands of 3, 4, 6 resource units respectively of a particular type. What is the minimum number of resources to be provided to ensure that deadlock never occurs : 11 39. A computer has 8 MB in main memory, 128 KB cache with block size of 4KB. If direct mapping scheme is used, how many different main memory blocks can map into a given physical cache block : 64 40. The technique that allows only one user to work with a file at a particular time is called : Locking 41. The UNIX operating system was first installed in : PDP/7 42. MS-DOS makes use of a hardware ROM containing device drivers called : BIOS 43. In UNIX, which of the following system calls transform an executable binary file into a process : Exec 44. Berkeley UNIX is popularly known as : BSD Unix 45. In UNIX, grep program is used for implementing : Filters 46. TSR software refers to : Terminate and Stay Resident 47. Unix and MS-DOS file system differ in the following feature : Mounted file systems 48.In DOS, file allocation is carried out using : FAT 49. In UNIX link refers to : New directory entry pointing to an existing file 50. For implementing recursion in a programming language, its compiler uses the following data structure extensively : Stack 51. In a hypothetical language, assume that all arithmetic operators have equal precedence and associate to the left. The expression 6x3-2-1x2 evaluates to : 18 52. Which of the following instructions is redundant (can be implemented by other conventional ones) : Clear x 53. BNF is a meta language for : Specifying a context free grammar 54. In JAVA language, what will be result of evaluating the expression 25 & 13 : 9 55. In JAVA , after execution of the following statements, the values of x, m, and n will be : int x, m, n;

m=10; n=15; x=++m +n++; : x=26, m=11,n=16 56. What will be the output of the following JAVA code : byte x=64, y; y=(byte)(x<<2); system.out.println(y); : 0 57. Hot Java is a : Web browser 58. Which of the following typecasts result in loss of information : float to int 59. JAVA toolkit package containing classes that implement platform independent GUI is : AWT 60. The JAVA language was originally called : OAK 61. A program Graph has start and end nodes. The total number of paths from start to end is equivalent to the -----------set of test data required to test the software : minimum 62. In a Program Graph, X is an if-then-else node. If the number of paths from start node to X is p number of paths from if part to end node is q and from else part to end node is r, the total number of possible paths through X is : P(q+r) 63. The quality of a software which causes it to continue to operate despite application of invalid input is called : Robustness 64. A program P calls 2 subprograms P1 and P2. If P1 can fail 50% of the times and P2, 40% of the times, P can fail -----------of the times : 70% 65. Consider a Program Graph (PG) with statements as nodes and control as edges. Which of the following is not true for any PG : Always acyclic 66. In program design, if the number of conditions in a decision table is n, the maximum number of rules(columns) possible is : 2n 67. In Data Flow Diagrams(DFD), the procedure of expanding a process in the DFD into a set of equivalent smaller processes is called : levelling 68. In programming languages, literal means : String Constant 69. In Object Oriented Software Design, which of the following is not true : An object can belong to 2 classes 70. Consider the program segment comprising of 3 statements : y=x+y; x=y-x y=y-x where x and y are integers. Execution of these 3 statements do the following : Swap the contents of x and y 71. What will be the output of execution of the following statements in C : for (i=3;i<15;i+=3) {printf(% d, i); ++i; } : 3 7 11 72. In C, puts (arg V[0]; prints the : File name of executable code file 73. Who is credited with the creation of WWW : Tim Berners-Lee 74. Which of the following is not a web browser : HTML 75. MIME is associated with the following : E mail

76. The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called : Half Duplex 77. Error detection at the data link layer is achieved using : CRC codes 78. In Serial communication, start and stop bits are used for : Synchronization 79. In a transmitter, the unmodulated signal is known as : Baseband signal 80. In a computer network, routing issues are handled in : Network Layer 81. In a computer network, functions of dialog management and synchronization are taken care of in the : Sessions layer 82. Which of the following topologies has the highest reliability : Mesh 83. In data communications, bauds signify ---------- rate : Signaling 84. ADSL is abbreviation for : Asymmetric Digital Subscriber Line 85. The topmost layer in the ISO model that needs to be implemented in an intermediate node is the -----------layer : Network 86. VPN denotes a : Virtual Private Network 87. Data rate of a ring network is 20Mbps and signal propagates at 200m/ sec. The number of bits that can be placed on the channel of length 200km is : 20000bits 88. The frequency range over which coaxial cables are typically used is : 106 to 108 Hz 89. In internet, the well known port 21 refers to the application : FTP 90. The maximum data rate possible through a noise free 4 kHz binary channel is : 8000 bps 91. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as : Replication transparency 92. Which of the following configurations can be said to be tightly coupled : Shared memory multiprocessors 93. In distributed systems, RPC stands for : Remote Procedure Call 94. Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is : 1-(.05)4 95. Which of the following category of classification of multiple computer systems is not generally used in practice : MISD 96. In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property : Serializability 97. Translation Lookaside Buffer(TLB) is also called : Associative Memory 98. In Internet Standards Terminology, RFC refers to : Request For Comments 99. Which of the following denotes a network management protocol in an internet : SNMP 100. IEEE 802.11 is an IEEE standard for : Wireless LAN OS Q. The operating system is the most common type of____________ software. A. communication B. application C. system* D. word-processing software Q. The two broad categories of software are: A. word processing and spreadsheet. B. transaction and application.

C. Windows and Mac OS. D. system and application* Q. Which level of security is implemented in Windows NT? (A) Al (B) Cl (C) B2 (D) C2 * Q. The UNIX shell : (A) does not come with the rest of the system (B) forms the interface between the user and the kernal * (C) does not give any scope for programming (D) does not allow calling one program from with in another Q. YACC is a program in UNIX used for: (A) automatic scanner generation (B) automatic parser generation (C) automatic code generation (D) none of these Q. The invalid file in UNIX from among the ones given below is: (A) /bin/unix (B) fete/passwd (C) fete/group (D) fusr/bin/vi Q. The very first process created by the Kernal in UNIX is : (A) init (B) getty (C) fork (D) none among these Networks Q. Ping is a command used for a) Checking MAC address b) Checking Networking functionality and validity of IP address* c) Checking cabling performance d) Checking cable connectivity only Q. DSL is an example of a____________ connection. A. network B. wireless C. slow D. broadband* Q. Internet is A. a local computer network B. a world wide network of computers C. an interconnected network of computers D. a world wide interconnected network of computers which use a common protocol to communicate with one another.*

Q. By an intranet we mean A. a LAN of an organization B. a Wide Area Network connecting all branches of an organization C. a corporate computer network D. a network connecting all computers of an organization and using the internet protocol* Q) Which layer is closer to the user? (A) Network layer. (B) Physical Layer (C) Data Link Layer (D) Application Layer* Q) What is the port number of DNS? (A) 21 (B) 23 (C) 43 (D) 53* Q. You have one IP: 192.168.10.29. In which layer this IP works? (A) Network layer.* (B) Physical Layer (C) Data Link Layer (D) Application Layer Q) What is the port number of Telnet ? (A) 21 (B) 23* (C) 43 (D) 53 Q. Flow control in TCP/IP is handled using: (A) Urgent pointer (B) Acknowledgement number (C) Checksum (D) Variable-size sliding window Q. Which among the following is a protocol 'of Wireless LAN? (A) 802.2 (B)802.3 (C) 802.5 (D) 802.11* 4. Which is the protocol among the following that is used for translating from physical address to Internet address? (A) ICMP (B) ARP (C) IGRP (D)RARP * Q. Which property among the ones given below is not possessed by the HTTP protocol? (A) Non-cached (B) Lightweight

(C) Stateless (D) Application level Q. The port number assigned to FTP protocol is: (A) 23 (B) 22 (C) 69 (D) 21* Q. The protocol used in TCPIIP for dynamic address assignment is : (A) ARP (B) RARP (C) DHCP (D) ICMP Q) Normal Switch operates on which layer of OSI model? (A) Network layer. (B) Physical Layer (C) Data Link Layer* (D) Application Layer Q)What is the upper layer name of OSI layer? (A) Network layer. (B) Physical Layer (C) Data Link Layer (D) Application Layer.*

Q) ARP sents the request in broadcast, response is unicast Error control is down in which layer? (A) Layer 4* (B) Layer 5 (C) Layer 1 (D) Layer 3 1. The banks use ................ device to minimize conversion process. (a) Keyboard (b) MICR (c) OCR (d) Scanner 2. .................. can't be used for source of data automation. (a) POS terminal (b) OCR (c) Keyboard (d) UPC 3. Under which case will intranet be an effective networking tool? (a) In a distributed decision-making environment (b) Where heterogeneous applications are involved (c) In a centralised organization (d) In a decentralised organization 4. When an organization gives contract for development of software, it has to give data to the service provider. In Such cases, the ownership of data should be_________ (a) Transferred to the service provider (b) With the client/organization that outsource services

(c) Shared by both parties (d) Not transferred 5. A modem performs_________ (a) Modulation (b) Demodulation (c) Data compression (d) All of these 6. Which of the following is NOT done by modem? (a) Transmission Speed (b) Data Accuracy (b) Error detection and Correction (d) Data Compression 7. A program coded in programming language is____________. (a) Target code (b) Source code (c) Block (d) None of these 8. "Platform" in computer world means___________. (a) Computer hardware used (b) Operating Systems used (c) Both of these (d) None of these 9. Which of these biometric tools use thermal sensors along with infrared rays for identification? (a) Key stroke dynamics (b) Iris Retinal scans (c) Speech recognition (d)Fingerprint scanning 10. What is incorrect about software? (a) It can manipulate computer (b) It has programs, instructions (c) It can be touched (d) It can be touched 11. Disadvantage of distributed database is. (a) Unreliability (b) Easy implementation (c) Insecurity (d) High communication cost 12. Which of the following transmission techniques let computer to alternatively send and receive data? (a) Simplex (b) Half duplex (c) Full duplex

(d) Multiplexing 13. What is NOT a feature of networking? (a) Reliability (b) Greater storage space (c) Connectivity (d) All are features of networking 14. Taking back-up of a file against crash is a (a) Preventive measure (b) Curative measure (c) Decisive measure (d) None of these 15. A memory that is referred by its contents instead of physical address is called ________ (a) Associative memory (b) Content addressable storage (c) Both (a) and (b) (d) None of these 16. Most dangerous risk in leaking of information is : (a) Ready access to online terminals (b) Online processing of data (c) Ignorance about the existence of risk (d) All of these 17. A camera is an (a) Input device (b) Can be either input or output (c) Processing machine (b) Output device 18. Using anti-virus software is (a) Preventive measure (b) Detective measure (c) Corrective measure (d) All the above 19. An online transaction is (a) One that is done in real time (b) Transaction done via internet (c) One that is done via telephone (d) None of these 20. A clerk in a bank has to access data n customer account. Logical access control for these users would be. (a) Use of individual passwords (b) Use of an Accounts Receivable Section password (c) Use of individual passwords plus separate access passwords for customer data and product data

(d) Can't say 21. To stop unauthorized access to the computer system we should (a) Have a trustworthy system administrator (b) Have a good passwords policy (c) Have a sound encryption policy (d) All of the above 22. Which cannot assure data accuracy in an application? (a) Limit and reasonableness test (b) Echo checking (c) Control total (d) None of these 23. Maximum storage space is available on (a) CDs (b) ROM (c) Hard disks (d) Floppies 24. Jon Von Neumann developed: (a) First electronic chip flip flop (b) Stored-program concept (c) The first electronic computer (d) None of these 25. Which of the following is single user computer with many features and good processing power? (a) Minicomputer (b) Workstation (c) Macintosh (d) None of these 1. _________ is a powder used in laser printers to form the images on a paper. Toner 2. Worms and Trojan Horses are examples of: Malware 3. ___________ Printers work by selectively heating regions of special heat-sensitive paper. Thermal 4.The ISI mark is given by: BIS 5. The laser printer was invented at: Xerox 7. A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a: Race condition

8. A 56k modem can transfer data at up to bits per second over the phone line. 56000 9. The original implementation of the C programming language was standardized by : ANSI 10. ________Is a signaling method that handles a relatively wide range of frequencies. Broadband 11. The port number used by SMTP is: 25 13. A packet filter is a type of Firewall 15. Which among the following utilities can detect a bad sector? CHKDSK and SCANDISK 16. In 100BASE-T, 'T' stands for: Twisted pair 17. A head crash is said to occur when the read-write head of a hard disk drive: Touches the magnetic media 18. Category 5 cable includes ---twisted pairs in a single cable jacket. 4 19. The port number used by the HTTP protocol is80 21. Power-on-self-test is built into the: BIOS 22. PowerPoint can embed content from other applications through: OLE 23. The latest release of Microsoft Windows is called: Vista 24. GRUB is an: Boot loader 25. __________Is a family of programmable interrupt controller chips. 8259 26.card allows television signals to be received by a computer. TV tuner 27. ________Is an IEEE 1394 implementation. Fire Wire 28 'Windows protection error' messages may result from: Damage to the system registry

29 Sound Blaster line of audio cards were made by : Creative Technology Ltd. 31 Indiscriminate sending of unsolicited bulk messages is known as : Spamming 33 FAT manages files in contiguous groups of sectors called: Clusters 34 The utility which can be used to clean the windows registry is: regedit 36. Ultra Wide SCSI had a throughput of: 40 MB/s 37. A dual-core processor has L1 cache. 2 40. Port 110 is used by _______ POP3 41. A file extension .ogg indicates an ______format Audio codec 42. Kerberos ts a__________protocol. Network authentication 43. Athlon series of processors are made by: AMD 44. Which among the following is a real-time operating system? QNX 45. The internet top level domain .cn refers to : China 47. _____________ Is a protocol used by networked computers (clients) to obtain IP addresses and other parameters from a server. DHCP 48. is the brand name for 64-bit Intel microprocessors with IA-64 architecture. Itanium 49. is an organization which develops internet standards through RFCs. IETF 50. The ability to replace components of a computer, while it is operating, is called: Hot swapping Q. "STORED PROGRAM CONCEPT " Postulated By a. Richard Stalman b. Henry Dunant c. Pascal d. John von neumann Q? : Founder of the social networking website 'Facebook' a. Mark Elliot Zuckerberg b. Henry Dunant c. Pascal

d. John von neumann Q? Name associated with Open Source Program a. Pascal b. Henry Dunant c. Richard Stalman d. John von neumann C & C++ Q. Which of the following special symbol allowed in a variable? A. * (asterisk) B. | (pipeline) C. - (hyphen) D. _ (underscore) Q.How would you round off a value from 1.66 to 2.0? A. ceil(1.66) B. floor(1.66) C. roundup(1.66) D. roundto(1.66) Q.Which of the definition is correct? A. int length; B. char int; C. int long; D. float double; Q. What is the output of the program given below ? #include int main() { enum status { pass, fail, atkt}; enum status stud1, stud2, stud3; stud1 = pass; stud2 = atkt; stud3 = fail; printf("%d, %d, %d\n", stud1, stud2, stud3); return 0; } A. 0, 1, 2 B. 1, 2, 3 C. 0, 2, 1 D. 1, 3, 2 Q. What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array? (a. The element will be set to 0. (b. The compiler would report an error. (c. The program may crash if some important data gets overwritten. (d. The array size would appropriately grow.

Você também pode gostar