KVS DEC-2017

Question 1
Anti aliasing is important to improve readability of text. It deals with the
A
Elimination of "jaggies"
B
Spacing between two individual characters
C
Underlining letters
D
Spacing of a group of characters
       Computer-Graphics       Anti-Aliasing
Question 1 Explanation: 
● Antialiasing removes jagged edges by adding subtle color changes around the lines, tricking the human eye into thinking that the lines are not jagged.
● The slight changes in color around the edges of an image help the line blend around curves, giving the impression that the line is true.
● These color changes are made on a very small scale that the human eye cannot detect under normal circumstances. In order to be able to see that an image has been antialiased, it would have to be magnified.
Question 2
Consider a set of n tasks with known runtimes R​1​ ,R2​ ,Rn​ , to be run uniprocessor machine. Which of the following processor scheduling algorithm will result in the maximum throughput?
A
Priority scheduling
B
Round robin
C
FCFS
D
SJF
       Operating-Systems       Process-Scheduling
Question 2 Explanation: 
→ In shortest job first scheduling algorithm, the processor selects the process with the smallest execution time to execute next.
→ SJF scheduling algorithm will result in the maximum throughput
Question 3
Which of the following is the appropriate format for graphics that can be embedded within an internet document?
A
HTML
B
BMP
C
TIFF
D
GIF
       Web-Technologies       HTML
Question 3 Explanation: 
Most web browsers (excluding text-only ones like Linux, Mosaic) can display only a handful of these formats inline. The format of about 90% of these files is binary.
1. ​ Graphical interchange format - GIF
For line art (such as one- or two-color logos), simple drawings, animations, and basically any image that has no gradients or blends. GIF is also the best format when you want to display an image with a transparent background.
2. J​ oint Photographic Experts Group - JPEG
JPEG is the best format for colorful, complex images (such as photographs); images containing gradients or color blends; and any other images with millions of colors.
3. ​ Portable Network Graphics - PNG
PNG generally produces better-looking images with smaller file sizes than GIF for the same kinds of limited-color images. Really old browsers, such as IE 3, don’t support the PNG format, but most Web designers now choose this format over GIF because so few people use such old browser. Browsers as recent as IE6 don’t display transparent PNG files properly, which is unfortunate because PNG files tend to handle transparency better.
4. ​ X-Bitmap/X-Pixelmap
X-Bitmaps are a common format on UNIX platforms, and are often found in older image and icon libraries. Here, a bit is used to represent each pixel of the graphics. Consequently, only black and white images are supported. Transparency is possible as in GIF since the white portion is treated as the color of the underlying background (making way for attractive designs). X-Pixel map is the colour equivalent of X-Bitmap. Here, 8 bits represent each pixel(256 colours). Obviously, both methods are very inefficient in terms of storage space required. It is quite uncommon outside the UNIX environment.
Question 4
Which of the following is true to declare variable of ASP?
A
Var
B
Dim
C
S
D
Set
       Web-Technologies       ASP
Question 4 Explanation: 
We can declare VBScript variables with the Dim, Public or the Private statement.
Syntax: ​ Dim variable_name
Example:​ Dim anand
Question 5
In the context of visual basic, multiple controls of the same type can be grouped into an array, in the same manner as a collection of data items. Such a grouping is known as
A
Control array
B
Primary array
C
Secondary array
D
An integer array
       Data-Structures       Arrays
Question 5 Explanation: 
A control array is a group of controls that share the same name type and the same event procedures. Adding controls with control arrays uses fewer resources than adding multiple control of same type at design time.
A control array can be created only at design time, and at the very minimum at least one control must belong to it.
Features:
1. Controls that belong to the same control array share the same set of event procedures; this often dramatically reduces the amount of code you have to write to respond to a user's actions.
2. We can dynamically add new elements to a control array at run time; in other words, you can effectively create new controls that didn't exist at design time.
3. Elements of control arrays consume fewer resources than regular controls and tend to produce smaller executables. Besides, Visual Basic forms can host up to 256 different control names, but a control array counts as one against this number. In other words, control arrays let you effectively overcome this limit.
Question 6
Consider two database relations R and S having 3 tuples in R and 2 tuples in S. What is the maximum number of tuples that could appear in the natural join of R and S?
A
6
B
2
C
3
D
5
       Database-Management-System       Relational-Algebra
Question 6 Explanation: 
→ If the tables R and S contains common attributes and value of that attribute in each tuple in both tables are same, then the natural join will result n*m tuples as it will return all combinations of tuples.
Consider following two tables

→ Result of natural join R * S (If domain of attribute C in the two tables are same )
→ You can see both R and S contain the attribute C whose value is 2 in each and every tuple. Table R contains 3 tuples, Table S contains 2 tuples, where Result table contains 3*2=6 tuples.
Note: While performing a natural join, if there were no common attributes between the two relations, Natural join will behave as Cartesian Product.
Question 7
Which of the following protocol is used for transferring electronic mail messages from one machine to another?
A
HTTP
B
FTP
C
SMTP
D
SNMP
       Computer-Networks       Application-Layer-Protocol
Question 7 Explanation: 
→ Mail servers and other mail transfer agents use SMTP to send and receive mail messages on TCP port 25.
→ SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
→ However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server.
→ In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving email.
Question 8
OLE, a microsoft's component document technology, means
A
Overlay linking and exchange
B
Online linking and embedding
C
Open learning exchange
D
Object linking and embedding
       Operating-Systems       Linker-and-Loader
Question 8 Explanation: 
→ Object Linking & Embedding (OLE) is a proprietary technology developed by Microsoft that allows embedding and linking to documents and other objects. → For developers, it brought OLE Control Extension (OCX), a way to develop and use custom user interface elements. On a technical level, an OLE object is any object that implements the IOleObject interface, possibly along with a wide range of other interfaces, depending on the object's needs.
Question 9
The problem of indefinite blockage of low priority jobs in general priority scheduling algorithm can be solved using
A
Swapping
B
Dirty bit
C
Aging
D
Compaction
       Operating-Systems       Process-Scheduling
Question 9 Explanation: 
→ Ageing is a scheduling technique used to avoid starvation. Fixed priority scheduling is a scheduling discipline, in which tasks queued for utilizing a system resource are assigned a priority each.
→ A task with a high priority is allowed to access a specific system resource before a task with a lower priority is allowed to do the same.
→ A disadvantage of this approach is that tasks assigned with a lower priority may be starved when a large number of high priority tasks are queued. Aging is used to gradually increase the priority of a task, based on its waiting time in the ready queue.
Question 10
What result set is returned from the following SQL query?
SELECT customer_name, telephone FROM customers
WHERE city IN('Jaipur','Delhi','Agra');
A
The cusomer_name of all customers who are not living IN Jaipur,Delhi OR Agra
B
The customer_name and telephone of all customers
C
The customer_name and telephone of all customers living IN either Jaipur,Delhi OR Agra
D
The customer_name and telephone of all customers living IN Jaipur,Delhi AND Agra
       Database-Management-System       SQL
Question 10 Explanation: 
Only logic here is, when we are using keyword IN there must be OR keyword.
Question 11
Which of the following data structures is most suitable for evaluating postfix expressions?
A
Tree
B
Stack
C
Linked List
D
Queue
       Data-Structures       Queues-and-Stacks
Question 11 Explanation: 
Postfix Expression are usually converted from infix Expression using Stack Data structure.
Algorithm
We have Postfix[ ] Array, Stack, Infix[ ] Array
1. Scan the given expression (Infix ) from Left to Right [ one character at a time].
2. Check Whether the given character is an operator [+, -, *, /, ^ etc] or operand.
3. If it is an operand, then copy it in the Prefix Array.
4. If it is a operator then,
1. Check whether, Stack is empty or not
2. If it is empty then, push the operator in the stack and go to step
3. If Stack is not empty then compare the precedence of Top of stack with operator.
4. If the Top of Stack has higher or equal precedence then pop it and copy in the postfix array.
5. If the operator has higher precedence, push it in the stack and go to step 5.
6. If Stack is not empty go back to step 4(1).
5. Continue solving the expression in usual manner until the expression come to end.
6. Pop the remaining operand in the stack and copy it to postfix array.
Question 12
The major goal of object oriented programming is
A
top down program development
B
Speed
C
User interface
D
Reuse
       OOPS       Properties
Question 12 Explanation: 
Languages that support object oriented programming typically use inheritance for code reuse and extensibility in the form of either classes or prototypes. Those that use classes support two main concepts:
1. Classes – the definitions for the data format and available procedures for a given type or class of object; may also contain data and procedures (known as class methods) themselves, i.e. classes contain the data members and member functions
2. Objects – instances of classes
Question 13
Which of the following is the default scripting language in Active server pages(ASP)?
A
JavaScript
B
PHP
C
HTML
D
VBScript
       Web-Technologies       VB-Script
Question 13 Explanation: 
The default scripting language used for writing ASP is VBScript, although you can use other scripting languages like JScript (Microsoft's version of JavaScript).
Question 14
What is the bitrate for transmitting uncompressed 800x600 pixel color frame with 8 bits/pixel at 40 frames/Second?
A
1536 Mbps
B
2.4 Mbps
C
15.36 Mbps
D
153.6 Mbps
       Computer-Graphics       Bit-Rate
Question 14 Explanation: 
Step-1: Given data, Uncompressed pixel = 800*600
Step-2: Each of 8 bit = 800*600 *8
Step-3: Bit rate for transmitting = 800*600 *8 *40 =153600000 bits
Step-4: Here, they are given in Mbps. 153600000 bits =153.6Mbps
Question 15
Assume the C++ definitions: Class circle: public point which of the following is false?
A
'point' is the base class and 'circle' is the derived class
B
The colon(:) in the header of class definition indicates inheritance
C
The keyword 'public' indicates type of inheritance
D
All the public and protected members of class 'circle' are inherited as public and protected members respectively into class point.
       OOPS       Class
Question 15 Explanation: 
True: point' is the base class and 'circle' is the derived class
True: The colon(:) in the header of class definition indicates inheritance
True: The keyword 'public' indicates type of inheritance
False: All the public and protected members of class 'circle' are inherited as public and protected members respectively into class point.
Question 16
Which of the following java statement declare and allocate a 2-dimensional array integers with four rows and five columns?
A
int array[ ] [ ]=new int [5][4];
B
int array [4][5];
C
int array[5][4];
D
int array[ ] [ ]=new int[4][5];
       OOPS       JAVA
Question 16 Explanation: 
→ In question they are clearly mentioned that 4 rows and 5 columns.
→ ​ Syntax int array[ ] [ ]=new int[row size][column size];
(or)
int[ ] [ ] array=new int[row size][column size];
So, Option D is correct answer.
Question 17
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
A
MIMD
B
CISC
C
RISC
D
SIMD
       Computer-Organization       Machine-Instructions
Question 17 Explanation: 
A reduced instruction set computer(or)RISC is one whose instruction set architecture (ISA) allows it to have fewer cycles per instruction (CPI) than a complex instruction set computer (CISC).
Question 18
Ten signals, each requiring 3000 hz, are multiplexed onto a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel? Assume that the guard bands are 300 Hz wide.
A
33,700
B
30,000
C
32,700
D
33,000
       Computer-Networks       FDM
Question 18 Explanation: 
Step-1: Given data, 10 signals. Each signal requires 3000. So, 10*3000=30000 Hz
Step-2: Guard band (or gaps)=(10-9)=9.
300x9 =2700 Kz
Step-3: Minimum bandwidth is required for the multiplexed channel 30000+2700= 32700Hz
Question 19
Which of the following methods in JavaScript will display a window having a dialog box with a specific message, along with an OK and a CANCEL button as options?
A
prompt()
B
alert()
C
confirm()
D
request()
       Web-Technologies       Java-Script
Question 19 Explanation: 
confirm(): Displays a dialog box with a message and an OK and a Cancel button
alert(): Displays an alert box with a message and an OK button
prompt(): Displays a dialog box that prompts the visitor for input
Question 20
To declare the version of XML, the correct syntax is
A
< / xml version='1.0'/ >
B
< ? xml version=”1.0”/ >
C
< *xml version='1.0'/ >
D
< ?xml version=*1.0*/ >
       Web-Technologies       XML
Question 20 Explanation: 
This line is called the XML prolog:

→ The XML prolog is optional. If it exists, it must come first in the document.
→ XML documents can contain international characters, like Norwegian øæå or French êèé.
→ To avoid errors, you should specify the encoding used, or save your XML files as UTF-8.
→ UTF-8 is the default character encoding for XML documents.
Question 21
Which of the following statements best describes the main reasons for normalising relational database?
(i) To achieve physical data independence
(ii) To remove data anomalies (insertion,update,delete,anomalies)
(iii) To save space on disk.
A
(i),(ii) and (iii)
B
(i) and (ii)
C
(i) and (iii)
D
(ii) and (iii)
       Database-Management-System       Normalization
Question 21 Explanation: 
Normalising relational database reasons are
1. To remove data anomalies (insertion,update,delete,anomalies)
2. To save space on disk(It happens because of avoiding redundancy)
Question 22
A Thread is also called
A
a scheduler
B
a virtual process
C
a heavyweight process
D
a lightweight process
       Operating-Systems       Threads
Question 22 Explanation: 
→ A light-weight process (LWP) is a means of achieving multitasking.
→ A LWP runs in user space on top of a single kernel thread and shares its address space and system resources with other LWPs within the same process. Multiple user level threads, managed by a thread library, can be placed on top of one or many LWPs - allowing multitasking to be done at the user level, which can have some performance benefits.
Question 23
Copying a process from memory to disk to allow space for other processes is called___
A
Demand paging
B
Deadlock
C
page fault
D
Swapping
       Operating-Systems       Memory-Management
Question 23 Explanation: 
→ Swapping is a mechanism in which a process can be swapped temporarily out of main memory (or move) to secondary storage (disk) and make that memory available to other processes. At some later time, the system swaps back the process from the secondary storage to main memory.
→ The performance is usually affected by swapping process but it helps in running multiple and big processes in parallel and that's the reason Swapping is also known as a technique for memory compaction.
Question 24
When a subroutine is called, the add the instruction following the instruction stored in/on the____
A
Program counter
B
Stack
C
Stack pointer
D
accumulator
       Computer-Organization       Interrupt-Service-Routing
Question 24 Explanation: 
The Program Counter is incremented after fetching an instruction, and holds the memory address of ("points to") the next instruction that would be executed.
Question 25
Consider the following code segment
if(Y<0)
{
X=-X;
Y=-Y;
}
Z=0;
while(Y>0)
{
Z=Z+X;
Y=Y-1;
}
Assume that X,Y and Z are integer variables, and that X and Y have be initialized. Which of the following best describes what this code segment does?
A
Sets Z to be the product X*Y
B
Sets Z to be the sum X+Y
C
Sets Z to be the absolute value of Y
D
Sets Z to be the value of Y
       Programming       Control Flow
Question 25 Explanation: 
Assume X=3 and Y=3
So, it satisfying condition while(Y>0)
Iteration-1: while(3>0)
Z=0+3⇒ Z=3
Y=3-1⇒ Y=2
Iteration-2: while(2>0)
Z=3+3=6
Y=2-1=1
Iteration-3:while(1>0)
Z=6+3
Y=1-1=0
Iteration-4 while(0>0) fails.
So,It Sets Z to be the product X*Y=3*3=9
Question 26
A combinational logic circuit that is used when it is desired to send data from two more source through a single transmission line is known as__
A
Demultiplexer
B
Encoder
C
Decoder
D
Multiplexer
       Digital-Logic-Design       Combinational-Circuits
Question 26 Explanation: 
→ In electronics, a multiplexer (or mux) is a device that combines several analog or digital input signals and forwards them into a single output line.
→ A multiplexer of 2​ n​ inputs has n select lines, which are used to select which input line to send to the output. Multiplexers are mainly used to increase the amount of data that can be sent over the network within a certain amount of time and bandwidth.
→ A multiplexer is also called a data selector. Multiplexers can also be used to implement Boolean functions of multiple variables.
Question 27
What is garbage collection in the context of java?
A
The java virtual machine(JVM) checks the output of any java program and deletes anything that does not make sense at all
B
The operating system periodically deletes all of the java files available on the system
C
Any java packages imported in a program and not being used, is automatically deleted
D
When all references to an object are going, then the memory used by the object is automatically reclaimed
       OOPS       JAVA
Question 27 Explanation: 
Garbage collection is happened when all references to an object are going, then the memory used by the object is automatically reclaimed
Question 28
What is the full form of DTD that is used to describe content is an XHTML document?
A
Document to Definition
B
Document Type Definition
C
Document Towards Definition
D
Document Text Definition
       Web-Technologies       HTML
Question 28 Explanation: 
→ A DTD defines the structure and the legal elements and attributes of an XML document.
→ With a DTD, independent groups of people can agree on a standard DTD for interchanging data.
→ An application can use a DTD to verify that XML data is valid.
Question 29
A register in the microprocessor that keeps track of the answer or resulting of any arithmetic or logic operation is the___
A
Accumulator
B
Stack pointer
C
Program Counter
D
Instruction pointer
       Computer-Organization       Registers
Question 29 Explanation: 
→ In a computer's central processing unit (CPU), the accumulator is a register in which intermediate arithmetic and logic results are stored.
→ Without a register like an accumulator, it would be necessary to write the result of each calculation (addition, multiplication, shift, etc.) to main memory, perhaps only to be read right back again for use in the next operation.
Question 30
If the time quantum size is 2 units of an there is only one job of 14 time unit in a ready queue, the round robin scheduling algorithm will cause___ connected switches.
A
1
B
5
C
6
D
7
       Operating-Systems       Process-Scheduling
Question 30 Explanation: 
→ Actually they are given single job, so when we are using round robin algorithm it won’t perform any context switch because we are executing same job.
→ But according to their intention will cause total 6 switches. 0-2, 2-4, 4-6, 6-8, 8-10, 10-12, 12-14. We are initially started with 0. So, It will take 6 connected switches
Note: We thought they made this question wrong.
Question 31
The memory which does not lose its content on failure of power supply is known as___memory.
A
Main memory
B
Volatile
C
Non volatile
D
ROM
       Operating-Systems       Basics
Question 31 Explanation: 
Non-volatile memory (NVM) or non-volatile storage is a type of computer memory that can retrieve stored information even after having been power cycled. In contrast, volatile memory needs constant power in order to retain data. Examples of non-volatile memory include read-only memory, flash memory, ferroelectric RAM, most types of magnetic computer storage devices (e.g. hard disk drives, solid state drives, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.
Question 32
The easiest method in flash to draw a heptagon, is to use the___
A
Polystar tool with the "Polygon" style
B
Polygon Tool
C
Lasso Tool with the "create star" option
D
Polystar Tool with the "star" style
       Computer-Graphics       Tools
Question 32 Explanation: 
There are 3 tools for drawing geometric shapes
1. Rectangle(Rectangle tool)
2. Oval(Oval tool)
3. Polygon(Polystar tool)
Note: We are not using Option A,C and D for drawing heptagon.
Question 33
If the period of a signal is 1000ms, then what is its frequency in kilohertz?
A
10​ -1​ Khz
B
1 KHz
C
10​ -3​ Khz
D
10​ -2​ Khz
       Computer-Networks       Data-and-Signals
Question 33 Explanation: 
Step-1: Frequency=1/time
Step-2: Time=1000 ms which is equals to =1 sec
Step-3: Frequency=1/1 sec
=1000/1000 sec
=1K/1000 sec
=10​ -3​ Khz
Note: 1 sec = 10​ -3​ ms
Question 34
Which of the following visual basic statements will assign the value "QUICK" from the variable y to the string variable x?
y="THE QUICK RED FOX JUMPED OVER THE DOG"
A
x=middle(y,5,5)
B
x=left(y,5)
C
x=mid(y,5,5)
D
x-Instr(5,y,"QUICK")
       Visual-basics       String-Declaration
Question 34 Explanation: 
String: y="THE QUICK RED FOX JUMPED OVER THE DOG"
Step-1: The QUICK word start from 5 character onwards. So, according to mid syntax. Starting character in QUICK word is 5 and length is 5. So, option C is correct.
→ The Mid function returns a specified number of characters from a string.
Syntax: Mid(string,start[,length])
Note: Use the Len function to determine the number of characters in a string.
Question 35
In structured programming, a program is decomposed into modules. Coupling and Cohesion describe the characteristics of modules. A good decomposition should attempt to
A
Minimize coupling and minimize cohesion
B
Maximize coupling and minimize cohesion
C
Minimize coupling and maximize cohesion
D
Maximize coupling and maximize cohesion
       Programming       Coupling-and-Cohesion
Question 35 Explanation: 
→ In order to maximize cohesion, make sure you are always able to summarize the purpose of a single module in a single phrase.
→ If it turns out to be impossible to capture the purpose of a module into a single discriminative phrase, then that's a smell.
→ At the other hand, don't go totally overboard by making everything a separate module.
→ It will have a dramatic effect on the number of dependencies between modules, and therefore hurt you in terms of coupling.
→ One of the tools that might help you organizing your dependencies is the Dependency Structure Matrix.
Question 36
Consider the database table "persons" having Person_ID as the primary key.

what are the violated by the above table?
A
Relationship integrity
B
Referential integrity only
C
Entity and domain integrities
D
Referential and domain integrities
       Database-Management-System       Constraints
Question 36 Explanation: 
→ Entity integrity ensures that each row of a table is uniquely identified, so that it can be retrieved separately if necessary. The value set of a primary key is unique; no two values may be the same.
→ The rules of entity integrity state that no primary key can be null and that no change can render the primary key null. These rules guarantee that every row of a table is accessible, whether you're retrieving data or modifying it. You can retrieve each row separately by specifying the value of a primary key.
→ Domain integrity ensures that all the data items in a column fall within a defined set of valid values. Each column in a table has a defined set of values. When you limit the value assigned to an instance of that column (an attribute), you are enforcing domain integrity.
→ Domain integrity enforcement can be as simple as choosing the correct data type and length for a column.
Question 37
On which of the following storage media, storage of information is organized as a single continuous spiral groove?
A
CD-ROM
B
RAM
C
Hard disk
D
Floppy disk
       Computer-Organization       Secondary-Memory
Question 37 Explanation: 
Compact Disk: ​ original physical design for audio
Question 38
The kernel keeps track of the state of each executing program by using a data structure called__
A
Process control block
B
User control block
C
File control block
D
memory control block
       Operating-Systems       Process-Control-Block
Question 38 Explanation: 
Process Control Block (PCB, also called Task Controlling Block, Entry of the Process Table, Task Struct, or Switchframe) is a data structure in the operating system kernel containing the information needed to manage the scheduling of a particular process.
Question 39
Remove procedure is implemented using
A
String
B
Queue
C
Stack
D
Linked list
       Data-Structures       Queues-and-Stacks
Question 39 Explanation: 
→ Every processor provides us with some form of call instruction, which pushes the address of the next instruction on the stack and transfers control to the address specified by the call.
→ When the called procedure is done, it issues a return instruction, which pops the address from the top of the stack and transfers control there.
→ That’s just the basic processor mechanism that makes it easy to implement procedure calls. The actual details of identifying the parameters, placing them on the stack, executing a call instruction are up to the compiler.
→ In the called function, the compiler is responsible for ensuring any registers that may be clobbered are saved, allocating stack space for local variables, and then restoring the registers and stack prior to a return.
Question 40
For a tree just one node, the root node is the height of a binary tree is defined to zero, if there are 2 levels of nodes, the height is 1 and so on. A binary search tree is built according to the usual rules with the following six key inserted one at a time as given B,I,N,A,R,Y. What is the height of the tree?
A
5
B
2
C
3
D
4
       Data-Structures       Binary-search-tree
Question 40 Explanation: 
Step-1: Given data, binary tree starts with height 0. It means root node.
Step-2: According to BST, the properties are left child is smaller than his root node and right subtree is greater than his root node.
Step-3: They given characters B,I,N,A,R,Y. And corresponding alphabetical number are B=2,I=9,N=14,A=1,R=18,Y=25.
Question 41
Which of the following sorting algorithms uses recursion?
A
Insertion sort
B
Heap sort
C
Merge sort
D
Bubble sort
       Algorithms       Sorting
Question 41 Explanation: 
Recursion uses two sorting algorithms for reducing time complexity.
1. Mergesort
2. Quicksort.
Question 42
Mechanism that is used to convert domain name into IP address is known___
A
HTTP
B
URL
C
FTP
D
DNS
       Computer-Networks       IPv4-an-Fragmentation
Question 42 Explanation: 
The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.
Question 43
The unit receiving the data item response with another control signal to acknowledgement receipt of the data. This type of argument between two independent units is known as
A
Storage control
B
Multitasking
C
Handshaking
D
Piggybacking
       Computer-Networks       Types-of-Acknowledgement
Question 43 Explanation: 
Handshaking Handshake is a method used in a TCP/IP network to create a connection between a local host/client and server. Handshaking is the exchange of information between two sender and receiver. So, it is like a agreement between them.
Piggybacking In two-way communication, wherever a frame is received, the receiver waits and does not send the control frame back to the sender immediately. The receiver waits until its network layer passes in the next data packet. The delayed acknowledgement is then attached to this outgoing data frame.
Question 44
What correction is required for following Java code snippet to compile?
int[]x=new int[10];
for(int P=0;P<=X.length();P++)
X[P]=5;
A
X[P]=5 should be X(p)=5
B
P<=X.length() should be P
C
X.length() should be X.length
D
P++ should be P+1
       OOPS       JAVA
Question 44 Explanation: 
Integer data type we are using X.length and character data type we are using function X.length().
→ array.length : length is a final variable applicable for arrays. With the help of length variable, we can obtain the size of the array.
→ string.length() : length() method is a final variable which is applicable for string objects. length() method returns the number of characters presents in the string.
Question 45
Which of the following is not a transaction management SQL command?
A
Rollback
B
Commit
C
Select
D
Savepoint
       Database-Management-System       Transactions
Question 45 Explanation: 
Transaction Control Language(TCL) commands are used to manage transactions in the database. These are used to manage the changes made to the data in a table by DML statements. It also allows statements to be grouped together into logical transactions.
1. Rollback
2. Savepoint
3. Commit
Question 46
Concurrency control in RDBMS is important for which of the following reasons?
A
To ensure data integrity when reads occur to the database in a multi user environment
B
To ensure data integrity when updates occur to the database in a single user environment
C
To ensure data integrity when updates occur to the database in a multi user environment
D
To ensure data integrity when reads occur to the database in a single user environment
       Database-Management-System       Relational-databases
Question 46 Explanation: 
Concurrency control in RDBMS is important to ensure data integrity when updates(insert/delete/modify) occur to the database in a multi user environment
Question 47
An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlock will ever occur is
A
5
B
2
C
3
D
4
       Operating-Systems       Deadlock
Question 47 Explanation: 
There are three processes, so there is a possibility to occur deadlock when we are taking 3 resources. If we are taking 3+1 resources means it will never occur deadlock.
Note: If there are ‘n’ processes then ‘n+1’ resources allocated, will never occur deadlock.
Question 48
The number of bits required to represent decimal number 4096 in binary form is___
A
16
B
10
C
12
D
13
       Digital-Logic-Design       Number-Systems
Question 48 Explanation: 
(4098)​ 10​ =(1000000000010)​ 2
So, total 13 bits required to represent 4096 decimal number.
Question 49
Which of the following memory improves the speed of execution of a program?
A
Virtual memory
B
Primary memory
C
Secondary memory
D
Cache memory
       Computer-Organization       Cache
Question 49 Explanation: 
Cache memory improves the speed of execution of a program. But it is costly. When compare to registers, registers are more faster than cache memory.
Question 50
Which of the following statements is false with respect to relational DBMS?
A
A disadvantage of highly normalized tables is that queries may require too many time consuming joins
B
Foreign key constraints are referential integrity constraints
C
A primary key uniquely identifies a row in a table
D
Nulls reduce space requirements in tables
       Database-Management-System       Relational-databases
Question 50 Explanation: 
Option A: True: depends upon the query, it will give the response
Option B & C: True: Foreign key constraints are referential integrity constraints. A primary key uniquely identifies a row in a table.
Option D: False: Null won’t reduce space requirements in tables.
Question 51
How many gate(s) would be required to implement the following boolean expression after simplification Expression:AC+ABC
A
4
B
1
C
2
D
3
       Digital-Logic-Design       Boolean-Function
Question 51 Explanation: 
Step-1: We have to check whether we can minimize the boolean expression or not
Step-2: AC+ABC
AC common in both.
=AC(1+B)
=AC
Step-3: It requires one AND gate is enough.
Question 52
What do data warehouse support?
A
Operational database
B
OLAP
C
OLTP
D
OLAP and OLTP
       Database-Management-System       Data-ware-housing
Question 52 Explanation: 
Data warehousing will support OLAP and OLTP.
→ ​ OLTP (Online Transaction Processing)​ is characterized by a large number of short online transactions (INSERT, UPDATE, DELETE). The main emphasis for OLTP systems is put on very fast query processing, maintaining data integrity in multi-access environments and an effectiveness measured by number of transactions per second. In OLTP database there is detailed and current data, and schema used to store transactional databases is the entity model (usually 3NF).
→ ​ OLAP (Online Analytical Processing)​ is characterized by relatively low volume of transactions. Queries are often very complex and involve aggregations. For OLAP systems a response time is an effectiveness measure. OLAP applications are widely used by Data Mining techniques. In OLAP database there is aggregated, historical data, stored in multi-dimensional schemas (usually star schema).
Question 53
The term sum of product in boolean algebra means
A
The AND function of several AND functions
B
The AND function of several OR functions
C
The OR function of several AND functions
D
The OR function of several OR functions
       Digital-Logic-Design       Boolean-Algebra
Question 53 Explanation: 
Sum of product: A boolean expression consisting purely of Minterms (product terms) is said to be in canonical sum of products form.
Example: F=AB+AC+AD Product of sum: A boolean expression consisting purely of Maxterms (sum terms) is said to be in canonical product of sums form.
Example: F=(A+B).(A+C).(A+D)
Question 54
What is the correct HTML tag for the largest heading?
A

B
=large
C
=large
D
       Web-Technologies       HTML
Question 54 Explanation: 
The HTML < h1 > to < h6 > tag is used to define headings in an HTML document.
→ < h1 > defines largest heading
→ < h6 > defines smallest heading.
Question 55
Which of the following technique allows execution of programs larger than the size of physical memory?
A
Thrashing
B
DMA
C
Buffering
D
Demand Paging
       Operating-Systems       Memory-Management
Question 55 Explanation: 
Virtual memory technique allows execution of programs larger than the size of physical memory. Demand paging we are using for virtual memory technique.
Question 56
For the following binary tree, in operate the traversal yields the expression
A
-+*/abdef
B
a+bd*-ef/
C
abdef*/+-
D
a+b*d-e/f
       Data-Structures       Binary-Trees
Question 56 Explanation: 
Here, inoperate the traversal yields the expression means INORDER.
Inorder→ left,root and right.
a+b*d-c/f
Question 57
___ is a special effect in motion pictures and animations that changes one image or sharp into another through a seamless transition
A
Tweening
B
Inverse kinematics
C
Morphing
D
Tweaking
       Computer-Graphics       Transformations
Question 57 Explanation: 
Morphing is a special effect in motion pictures and animations that changes (or morphs) one image or shape into another through a seamless transition. morphing means stretching or as part of a fantasy or surreal sequence. Traditionally such a depiction would be achieved through cross-fading techniques on film.
Question 58
In which addressing mode, the operand is given explicitly in the instruction(example instruction: ADD R4,#3?
A
Based indexed mode
B
Absolute mode
C
Immediate mode
D
Register indirect mode
       Computer-Organization       Addressing-Modes
Question 58 Explanation: 
Here, we are adding R4+3.
Immediate mode
In immediate addressing the operand is specified in the instruction itself. In this mode the data is 8 bits or 16 bits long and data is the part of instruction.
Example: MOV AL, 35H (move the data 35H into AL register)
Question 59
Which of the following is not a program instruction?
A
CMP
B
MOV
C
JMP
D
CALL
       Computer-Organization       Machine-Instructions
Question 59 Explanation: 
CMP The CMP instruction compares two operands. It is generally used in conditional execution. This instruction basically subtracts one operand from the other for comparing whether the operands are equal or not. It does not disturb the destination or source operands. It is used along with the conditional jump instruction for decision making.
Syntax: CMP destination, source
MOV
The MOV instruction is the most important command in the 8086 because it moves data from one location to another. It also has the widest variety of parameters; so it the assembler programmer can use MOV effectively, the rest of the commands are easier to understand.
Syntax: MOV destination,source
JMP Conditional execution often involves a transfer of control to the address of an instruction that does not follow the currently executing instruction. Transfer of control may be forward, to execute a new set of instructions or backward, to re-execute the same steps.
Syntax: JMP label
CALL
The CALL instruction interrupts the flow of a program by passing control to an internal or external subroutine. An internal subroutine is part of the calling program. An external subroutine is another program.
Question 60
Based on the current technology,___ is the fastest logic family
A
CMOS
B
TTL
C
MOS
D
ECL
       Digital-Logic-Design       Logic-Families
Question 60 Explanation: 
Question 61
Which of the following represents the life cycle of software development?
A
Design → Analysis → Coding→ Operations and maintenance→ Testing
B
Analysis→ Design→ Coding→ Testing→ Operation and Maintenance
C
Design→ Analysis→ Coding→ Testing→ Operation and Maintenance
D
Analysis→ Design→ Coding→ Operation and maintenance→ Testing
       Software-Engineering       Software-quality
Question 61 Explanation: 
Life cycle of software development phases
1. Planning: Without the perfect plan, calculating the strengths and weaknesses of the project, development of software is meaningless. Planning kicks off a project flawlessly and affects its progress positively.
2. Analysis: This step is about analyzing the performance of the software at various stages and making notes on additional requirements. Analysis is very important to proceed further to the next step.
3. Design: Once the analysis is complete, the step of designing takes over, which is basically building the architecture of the project. This step helps remove possible flaws by setting a standard and attempting to stick to it.
4. Development & Implementation: The actual task of developing the software starts here with data recording going on in the background. Once the software is developed, the stage of implementation comes in where the product goes through a pilot study to see if it’s functioning properly.
5. Testing: The testing stage assesses the software for errors and documents bugs if there are any.
6. Maintenance: Once the software passes through all the stages without any issues, it is to undergo a maintenance process wherein it will be maintained and upgraded from time to time to adapt to changes.
Question 62
Given that a 22 inch monitor with an aspect ratio of 16:9 has a monitor of 1920x1080, what is the width of the monitor?
A
22 inches
B
8:53 inches
C
10:79 inches
D
19:17 inches
       Computer-Graphics       Aspect-Ratio
Question 62 Explanation: 

Step-1: To check the ratio [width/height= 1920 /1080 ]
Step-2: Ratio: 16/9.
Step-3: Using Pythagoras theorem (9x)​ 2​ +(16x)​ 2​ =(22)​ 2
x=19.17 inch
Question 63
The five items P<Q<R
A
S
B
P
C
Q
D
R
       Data-Structures       Queues-and-Stacks
Question 63 Explanation: 
Step-1: Initially P,Q,R,S and T are pushed in a stack. The stack elements will be placed in LIFO manner. It beans that bottom of the stack value from P to T.
Step-2: Then we have to pop 4 elements. So, present having only one element,that is P.
Step-3: 4 elements we have to insert into a Queue. Queue follows FIFO manner.
Step-4: Again we have to delete two elements from queue and inserted into stack.
Step-5: The inserted elements are T and S.
Step-6: Final pop element is S.
Step-7: Stack having only two elements. P and T.
Question 64
How many bits are used in the exponent part of IEEE single precision for the representation of floating point numbers?
A
32 bits
B
8 bits
C
16 bits
D
24 bits
       Digital-Logic-Design       Number-Systems
Question 64 Explanation: 
The IEEE 754 standard specifies a binary floating point format(binary32) as having:
→ Sign bit: 1 bit
→ Exponent width: 8 bits
→ Significand precision: 24 bits (23 explicitly stored)
Question 65
Buying and selling goods over the internet is called:
A
Euro-conversion
B
Hyper-marketing
C
Cyber-Selling
D
E-Commerce
       Database-Management-System       E-Commerce
Question 65 Explanation: 
→ Online shopping is a form of ​ electronic commerce​ which allows consumers to directly buy goods or services from a seller over the Internet using a web browser.
→ Consumers find a product of interest by visiting the website of the retailer directly or by searching among alternative vendors using a shopping search engine, which displays the same product's availability and pricing at different e-retailers.
Question 66
Which of the following most accurately describes "multiple inheritance"?
A
When a child class has both an "is a" and "has a" relationship with its parent class
B
When two classes inherit from each other
C
When a base class has two or more derived classes
D
When a child class has two or more parent class
       OOPS       Properties
Question 66 Explanation: 
→ Multiple inheritance is a feature of some object-oriented computer programming languages in which an object or class can inherit characteristics and features from more than one parent object or parent class. It is distinct from single inheritance, where an object or class may only inherit from one particular object or class.
Question 67
When an ASP.NET file is placed on an IIS server and viewed through a browser, the resulting HTML page contains?
A
a mix of ASP.NET and HTML code
B
all ASP.NET code
C
all HTML code
D
as much ASP.NET code as is in the ASP.NET file.
       Web-Technologies       HTML
Question 67 Explanation: 
When an ASP.NET file is placed on an IIS server and viewed through a browser, the resulting HTML page contains all HTML code.
Question 68
In C++, which of the following statements correctly returns the memory from the dynamic array pointer PP to the free store?
A
delete pp;
B
delete pp[]
C
delete []pp;
D
delete *pp;
       Programming       Arrays
Question 68 Explanation: 
The "free store is just another name of heap. It is an area of memory that is used for dynamic allocation of memory while the program is running(i.e., at run time). Dynamic allocation of memory from the heap allows us to create,use and dispose of objects as needed. It allows us to grow and shrink dynamic data structure(Eg:Linked list,tree,graphs) while the program executes. there is no distinction between the "free store" and the heap. they refer to the same thing.
Question 69
The addressing mode used in an instruction of the form ADD X,Y is:
A
index
B
absolute
C
immediate
D
indirect
       Computer-Organization       Addressing-Modes
Question 69 Explanation: 
The addressing mode used in an instruction of the form ADD X,Y is absolute addressing mode.
Question 70
The 10Base5 cabling is also known as___
A
fast ethernet
B
thick ethernet
C
thin ethernet
D
gigabit ethernet
       Computer-Networks       Ethernet
Question 70 Explanation: 
→ 10BASE5 (also known as thick Ethernet or thicknet) was the first commercially available variant of Ethernet.
→ 10BASE5 uses a thick and stiff coaxial cable up to 500 metres (1,600 ft) in length. Up to 100 stations can be connected to the cable using vampire taps and share a single collision domain with 10 Mbit/s of bandwidth shared among them. The system is difficult to install and maintain.
Question 71
In a positive edge triggered JK flip flop, a low J and a low K produces
A
no change
B
low state
C
high state
D
toggle state
       Digital-Logic-Design       Sequential-Circuits
Question 71 Explanation: 
→ In JK Flip Flop if J=K=0 then it holds its current state. There will be no change.
Question 72
An entity set that does not have sufficient attribute to form a key is termed as:
A
Primary entity set
B
Strong entity set
C
Weak entity set
D
Simple entity set
       Database-Management-System       ER-Model
Question 72 Explanation: 
→ An entity set that does not have sufficient attribute to form a key is termed as weak entity set.
→ It means a relation(or table) doesn’t have primary key. We are calling that relation is weak entity set.
Question 73
Which of the following devices understands the formats and contents of the data and translate message from one format to another?
A
Gateway
B
Hub
C
Switch
D
Router
       Computer-Networks       Hardware-and-various-devices-in-networking
Question 73 Explanation: 
→ The gateway (or default gateway) is implemented at the boundary of a network to manage all the data communication that is routed internally or externally from that network.
→ Besides routing packets, gateways also possess information about the host network's internal paths and the learned path of different remote networks.
→ If a network node wants to communicate with a foreign network, it will pass the data packet to the gateway, which then routes it to the destination using the best possible path. holds its current state. There will be no change.
Question 74
In which of the following state, the process is waiting for processor?
A
Running
B
New
C
Ready
D
Waiting
       Operating-Systems       CPU-Scheduling
Question 74 Explanation: 
New→ The process is being created
Running→ Instructions are being executed
Ready→ The process is waiting to be assigned to a processor
Waiting→ The process is waiting for some event to occur(such as IO exception or reception of a signal)
Terminated: The process has finished execution.
Question 75
The complexity of linear search algorithm is
A
O(nlogn)
B
O(n)
C
O(logn)
D
O(n*n)
       Algorithms       Searching
Question 75 Explanation: 
→ Linear search algorithm will traverse all nodes with increment by one element in linear fashion(order).
→ So, it takes time complexity O(n)
Question 76
In relational databases, the natural join of two tables is
A
cartesian product always
B
combination of union and filtered cartesian product
C
combination of selection and filtered cartesian product
D
combination of projection and filtered cartesian product
       Database-Management-System       Relational-Algebra
Question 76 Explanation: 
→While performing a natural join, if there were no common attributes between the two relations, Natural join will behave as Cartesian Product.
→ Example: If the tables R and S contains common attributes and value of that attribute in each tuple in both tables are same, then the natural join will result n*m tuples as it will return all combinations of tuples.
Question 77
java is a___language. This means that you must be explicit about what type of data you are working with
A
Weakly typed
B
strongly typed
C
Dynamically typed
D
Loosely typed
       OOPS       JAVA
Question 77 Explanation: 
→ Java is a strongly typed programming language because every variable must be declared with a data type. A variable cannot start off life without knowing the range of values it can hold, and once it is declared, the data type of the variable cannot change.
Question 78
With SQL, how can you return the number of records in the "person's" table?
A
SELECT COUNT (*) FROM persons
B
SELECT COUNT () FROM persons
C
SELECT COLUMN () FROM persons
D
SELECT COLUMN (*) FROM Persons
       Database-Management-System       SQL
Question 78 Explanation: 
→ Normally we want print all records from database, we use SQL command is SELECT * from filename.
→ Suppose we want to return the number of records, it means count total number of records from relation(or table).
SELECT COUNT(*) FROM persons
Question 79
Assume X and Y are non zero positive integers. Consider the following pseudo code
fragment:
while X< >Y do
if X > Y then
X ← X-Y
else
Y← Y-X
endif
end while
print(X)
What is the code doing?
A
It computes the GCD of two numbers
B
It computes the LCM of two numbers
C
It finds the smallest of two numbers
D
It divides the largest number by the smaller
       Programming       Control Flow
Question 79 Explanation: 
Let X=3 and Y=5
1​ st​ pass : X=3 and Y=2
2​ nd​ pass : X=1 and Y=2
3​ rd​ pass : X=1 and Y=1
Write(X), which writes 1. Which is nothing but GCD of 3 & 5.
Question 80
The boolean expression (A+C)(AB'+AC)(AC'+B') can be simplified as
A
A'B+BC
B
AB'
C
AB+BC
D
AB+A'C
       Digital-Logic-Design       Boolean-Algebra
Question 80 Explanation: 
(A+C)(AB'+AC)(AC'+B')
First compute one and primes
(AAB'+AAC+AB'C+ACC)(AC'+B')
to take common AC then we get
(AB'+AC+AB'C+AC)(AC'+B')
To take common AB'
(AB'(1+C)+AC)(AC'+B')
(AB'+AC)(AC'+B')
AB'AC'+AB'B'+ACAC'+ACB'
AB'C'+AB'+0+ACB'
AB'(C'+1)+ACB'
AB'+ACB'
AB'(1+C)
AB'
(or)
We can also use truth table to get same solution.
Question 81
In a relational database model, cardinality of a relation means
A
The number of constraints
B
The number of tuples
C
The number of attributes
D
The number of tables
       Database-Management-System       Relational-databases
Question 81 Explanation: 
→ Cardinality of a relation means the number of tuples.
→ The degree of relationship (also known as cardinality) is the number of occurrences in one entity which are associated (or linked) to the number of occurrences in another.
There are three degrees of relationship, known as:
1. one-to-one (1:1)
2. one-to-many (1:M)
3. many-to-many (M:N)
Question 82
Conceptual level, Internal level and external level are three components of the three level RDBMS architecture Which of the following is not a part of the conceptual level?
A
Storage dependent details
B
Entities,attributes and relationships
C
Constraints
D
Semantic information
       Database-Management-System       Relational-databases
Question 82 Explanation: 
Three levels of database architecture:
1. Physical Level
2. Conceptual Level
3. External Level

→ Mapping is the process of transforming request response between various database levels of architecture.
→ Mapping is not good for small database, because it takes more time.
→ In External / Conceptual mapping, DBMS transforms a request on an external schema against the conceptual schema.
→ In Conceptual / Internal mapping, it is necessary to transform the request from the conceptual to internal levels.
1. Physical Level
Physical level describes the physical storage structure of data in database.It is also known as Internal Level. This level is very close to physical storage of data. At lowest level, it is stored in the form of bits with the physical addresses on the secondary storage device. At highest level, it can be viewed in the form of files.The internal schema defines the various stored data types. It uses a physical data model.
2. Conceptual Level
Conceptual level describes the structure of the whole database for a group of users. It is also called as the data model. Conceptual schema is a representation of the entire content of the database. These schema contains all the information to build relevant external records. It hides the internal details of physical storage.
3. External Level
External level is related to the data which is viewed by individual end users. This level includes a no. of user views or external schemas. This level is closest to the user. External view describes the segment of the database that is required for a particular user group and hides the rest of the database from that user group.
Question 83
Which of the following transmission media works on the principle of total internal reflection?
A
Optical fiber cable
B
Shielded twisted pair cable
C
Unshielded twisted pair cable
D
coaxial cable
       Computer-Networks       Transmission-Modes
Question 83 Explanation: 
→ Optical fiber consists of a core and a cladding layer, selected for total internal reflection due to the difference in the refractive index between the two.
→ In practical fibers, the cladding is usually coated with a layer of acrylate polymer or polyimide. This coating protects the fiber from damage but does not contribute to its optical waveguide properties.
Question 84
The mechanism that brings a page memory only when it is needed in___
A
page replacement
B
segmentation
C
fragmentation
D
demand paging
       Operating-Systems       Memory-Management
Question 84 Explanation: 
→ Demand paging follows that pages should only be brought into memory if the executing process demands them. This is often referred to as lazy evaluation as only those pages demanded by the process are swapped from secondary storage to main memory. Contrast this to pure swapping, where all memory for a process is swapped from secondary storage to main memory during the process startup.
→ Demand paging is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory (i.e., if a page fault occurs).
→ It follows that a process begins execution with none of its pages in physical memory, and many page faults will occur until most of a process working set of pages are located in physical memory. This is an example of a lazy loading technique.
Question 85
Which of the following topologies highest reliability?
A
Mesh topology
B
Bus topology
C
Star topology
D
Ring topology
       Computer-Networks       Topologies
Question 85 Explanation: 
→ A network setup where each computer and network device is interconnected with one another, allowing for most transmissions to be distributed even if one of the connections go down. It is a topology commonly used for wireless networks.
→ A mesh topology can be a full mesh topology or a partially connected mesh topology. In a full mesh topology, every computer in the network has a connection to each of the other computers in that network.
→ The number of connections in this network can be calculated using the following formula (n is the number of computers in the network): ​ n(n-1)/2.
→ This network having highest reliability.
Question 86
What is the length of an IP address in (Pre-1PU6)?
A
8
B
1
C
2
D
4
       Computer-Networks       IPv4-an-Fragmentation
Question 86 Explanation: 
→ Actually they given typing mistake instead of Pre-IPv6 they given Pre-1PU6.
→ Pre-IPv6 is nothing but IPv4. So, total size in 32 bits=4 bytes
Question 87
Consider the following statements respect to JavaScript
(i) A variable is created using the keyword
(ii) JavaScript is untyped language
Which of the above are true?
A
Neither (i) nor (ii)
B
Only (i)
C
Only(ii)
D
Both (i) and (ii)
       Web-Technologies       Java-Script
Question 87 Explanation: 
(i)True: Because we are using “var” keyword.
(ii) False: Untyped means the operation of dividing integer by string would result in treating the first four bytes of strings as integer. This is because untyped take place directly on bits, there are no types to observe. Javascript is typed language.
Question 88
A condition that is caused by run time error in a computer program is known as
A
Exception
B
Syntax error
C
Semantic error
D
Fault
       Programming       Compilation
Question 88 Explanation: 
● An exception is an abnormal or unprecedented event that occurs after the execution of a software program or application. It is a runtime error of an undesired result or event affecting normal program flow.
● An exception is also known as a fault.
Question 89
Program counter contents indicate
A
The time needed to execute a program
B
The time elapsed since execution begins
C
The address where next instruction is stored
D
The count of programs being executed after switching the power ON
       Computer-Organization       Registers
Question 89 Explanation: 
The Program Counter is incremented after fetching an instruction, and holds the memory address of ("points to") the next instruction that would be executed.
Question 90
Semaphores are used to solve the problem of
A
mutual exclusion
B
race condition
C
Process synchronization
D
The belady problem
       Operating-Systems       Process-Synchronization
Question 90 Explanation: 
Semaphores are used to solve the problem of process synchronization. There are two types of semaphores
1. Counting Semaphore
2. Binary semaphore
Question 91
A multimedia project is said to be ___ and user interactive when users are given navigational control
A
Secure
B
hypertext
C
linear
D
non linear
       Web-Technologies       HTML
Question 91 Explanation: 
A multimedia project is said to be hypertext and user interactive when users are given navigational control
Question 92
An analog signal carries 4 bits in each signal unit. if 1000 signal units are sent per second, then baud rate and bit rate of the signal are___ and ___
A
1000 bauds/sec, 4000 bps
B
1000 bauds/sec, 500 bps
C
4000 bauds/sec, 1000 bps
D
2000 bauds/sec, 1000 bps
       Computer-Networks       Transmission-and-Propagation-Delay
Question 92 Explanation: 
Actually there is a typing mistake in this question. They given 1000 bauds/sec, 1000 bps but it is wrong option. So, we are corrected and given correct option.
Step-1: Important formulas to find a solution is
Bit rate=baud rate*no.of bits per signal
Baud rate(or signal rate)=bit rate/no.of bits per signal
Step-2:They are expecting to find bit rate. Given data, 1000 bauds(signal)per second and number of bits per signal=4
Step-3: Bit rate=1000*4=4000 bits per second.
Question 93
__ is an intermediate storage area used for data processing during the extract transformation and load process of data warehousing
A
Inter storage area
B
Buffer
C
Staging area
D
Virtual memory
       Database-Management-System       Data-ware-housing
Question 93 Explanation: 
→ A staging area, or landing zone, is an intermediate storage area used for data processing during the extract, transform and load (ETL) process. The data staging area sits between the data source(s) and the data target(s), which are often data warehouses, data marts, or other data repositories.
→ Data staging areas are often transient in nature, with their contents being erased prior to running an ETL process or immediately following successful completion of an ETL process.
→ There are staging area architectures, however, which are designed to hold data for extended periods of time for archival or troubleshooting purposes.
Question 94
____ refers to the amount of time required to position the read write head of a hard disk on appropriate sector
A
Load Time
B
Seek time
C
Access time
D
Rotational latency
       Computer-Organization       Secondary-Memory
Question 94 Explanation: 
Seek time → It measures the time it takes the head assembly on the actuator arm to travel to the track of the disk where the data will be read or written. The data on the media is stored in sectors which are arranged in parallel circular tracks (concentric or spiral depending upon the device type) and there is an actuator with an arm that suspends a head that can transfer data with that media.
→ ​ Average seek time​ is the average of all possible seek times which technically is the time to do all possible seeks divided by the number of all possible seeks, but in practice it is determined by statistical methods or simply approximated as the time of a seek over one third of the number of tracks.
Rotational latency (sometimes called rotational delay or just latency​ :
It is the delay waiting for the rotation of the disk to bring the required disk sector under the read-write head. It depends on the rotational speed of a disk (or spindle motor), measured in revolutions per minute (RPM).
→ Maximum latency = 60/rpm
→ Average latency = 0.5*Latency Time
Transfer Time Transfer time is the time to transfer the data. It depends on the rotating speed of the disk and number of bytes to be transferred. Disk Access Time Disk Access Time = Seek Time + Rotational Latency + Transfer Time
Question 95
The maximum number of comparisons for a particular record among 32 sorted recorder through binary search method will be
A
2
B
10
C
8
D
5
       Algorithms       Searching
Question 95 Explanation: 
Step-1: Binary search we are using formula O(log​ 2​ n)
Sep-2: The maximum number of comparisons for a particular record among 32 sorted recorder through binary search method will be O(log​ 2​ 32)=5
Question 96
What is the octal equivalent of the hexadecimal number 132A?
A
46252
B
11450
C
11452
D
45250
       Digital-Logic-Design       Number-Systems
Question 96 Explanation: 
Step-1: Convert hexadecimal number in binary format. It is nothing but representing 4 binary values of each character.
Step-2: (132A)​ 16​ =(0001 0011 0010 1010)​ 2 Step-3: Divide 4 binary numbers in to 3 binary numbers from right to left.
Step-4: (0 001 001 100 101 010)​ 2
(0 1 1 4 5 2)​ 8
Question 97
When is EOQ in inventory control?
A
Economics of quantity
B
Economics occuring quantity
C
Economics over quantity
D
Economics order quantity
       Database-Management-System       EOQ
Question 97 Explanation: 
→ The Economic Order Quantity (EOQ) is the number of units that a company should add to inventory with each order to minimize the total costs of inventory such as holding costs, order costs, and shortage costs.
→ The EOQ is used as part of a continuous review inventory system in which the level of inventory is monitored at all times and a fixed quantity is ordered each time the inventory level reaches a specific reorder point.
Question 98
The comment in XML document is given by
A
< /---- >
B
< ?---- >
C
< !---- >
D
< !----! >
       Web-Technologies       XML
Question 98 Explanation: 
A comment is a character, a line or a paragraph that is not considered as part of the XML code that needs to be processed. A comment allows you to insert notes or personal observations inside an XML file.
Syntax:
Question 99
Consider the following statements
S1: a small page size causes large page tables
S2: Internal fragmentation is increase with small pages
S3: I/O transfers are more efficient with large pages
Which of the following is true?
A
S1 is true and S3 is false
B
S1 and S2 are true
C
S2 and S3 are true
D
S1 is true and S2 is false
       Operating-Systems       Memory-Management
Question 99 Explanation: 
S1: True:A small page size causes large page tables
S2: True:Internal fragmentation is increase with small pages. Actually Internal fragmentation is decrease with small pages
S3:True:I/O transfers are more efficient with large pages
Question 100
The logic circuits binary adder which is used to add two 4-bits binary numbers, requires___half adder(s) and _____full adder(s).
A
4,0
B
1,3
C
2,2
D
3,1
       Digital-Logic-Design       Adder
Question 100 Explanation: 
Half Adder takes two input bits and output sum and carry. Full Adder takes three input bits(which includes one carry bit) and output sum and carry.
One Half- Adder adds least significant bits of the two numbers. Three Full Adders
There are 100 questions to complete.
PHP Code Snippets Powered By : XYZScripts.com