## APPSC-2012-DL CA

 Question 1

Which error detection method involves polynomials?

 A VRC B LRC C CRC D Checksum
Computer-Networks       CRC
Question 1 Explanation:
CRC error detection method involves polynomials.
The divisor in the CRC generator is most often represented not as a string of 1s and 0s, but as an algebraic polynomial. The polynomial format is used for it is short and it can be used to prove the concept mathematically. A string of 0s and 1s can be represented as a polynomial with coefficients of 0 and 1, where the power of each term in the polynomial indicates the position of the bit and the corresponding coefficient reflects the value of the bit (0 or 1).
 Question 2

Which one from the following is memory of a volatile nature?

 A Flash B Masked ROM C DRAM D EPROM
Computer-Organization       Types-of-Memory
Question 2 Explanation:
Volatile memory is computer storage that only maintains its data while the device is powered.
Most RAM (random access memory) used for primary storage in personal computers is volatile memory. RAM is much faster to read from and write to than the other kinds of storage in a computer, such as the hard disk or removable media. However, the data in RAM stays there only while the computer is running; when the computer is shut off, RAM loses its data.
 Question 3

For a Binomial distribution mean is always

 A greater than variance B less than variance C equal to variance D greater than or equal to variance
Engineering-Mathematics       Probability
Question 3 Explanation:
Mean = np
Variance = npq, where q=(1-p)
Logically we are multiplying some number q =1-p to mean to get variance and q belongs to [ 0,1]. so if we multiply a value less than 1 to np to get npq then
np>=npq.
 Question 4

Which layer of OSI model is responsible for transmitting raw bit stream over on physical cable?

 A Presentation B Physical C Transport D Network
Computer-Networks       ISO-OSI-layers
Question 4 Explanation:
Physical layer is responsible for bit rate control over physical cable.
 Question 5

Which one from the following is a true statement about Binary trees (BST)?

 A A BST is the Binary tree in which data in the nodes is ordered in a particular way. B The data in any nodes of right subtree of BST must be greater than or equal to the data in the given node. C A BST have worst case when the data is already in order. D All (1), (2) and (3).
Data-Structures       Binary-Trees
Question 5 Explanation:
1. In Binary search tree the right child of a node is greater than or equal to given node and left child of a node is less than the given node. So true.
2. True.
3. True, in this case the tree will be skewed.
 Question 6

Which of the following is not a logical database structure?

 A Chain B Network C Tree D Relational
Database-Management-System       Databases
Question 6 Explanation:
Chain is not a logical database structure.
 Question 7

Which layer of OSI model is responsible to translates logical network address and names to their physical address?

 A Session B Presentation C Data D Network
Computer-Networks       ISO-OSI-layers
Question 7 Explanation:
 Question 8

The number of tuples in the result of a left outer join operation will always be

 A greater than the number of tuples in the result of the corresponding join operation. B at least equal to the number of tuples in the result of the corresponding join operation. C less than the number of tuples in the result of the corresponding join operation. D greater than the number of tuples in the result of the corresponding right outer join operation.
Database-Management-System       Relational-Algebra
Question 8 Explanation:
The number of tuples in the result of a left outer join operation will always be at least equal to the number of tuples in the result of the corresponding join operation, because if all the tuples of left relation is not included during join operation then the remaining tuples of left relation will also be included in the final output.
 Question 9

If A and B are independent events then

 A P(A∪B) = P(A) + P(B) + (A∩B) B P(A∪B) = 0 C P(A∪B) = P(A) + P(B) – (A∩B) D P(A∪B) = P(A) + P(B) E None of the above
Engineering-Mathematics       Probability
Question 9 Explanation:
If A and B are independent events then
P(A∩B) = P(A)P(B)
So finally we can say that,
P(AUB) = P(A) + P(B) - P(A∩B)
= P(A) + P(B) - P(A)P(B)
 Question 10

A vertex of how many degree is isolated?

 A 0 B 1 C 2 D 3
Engineering-Mathematics       Graph-Theory
Question 10 Explanation:
A vertex is isolated if and only if it is not connected to any other vertices. Means a vertex of degree zero is said to be isolated.
 Question 11

Which network component is not associated at physical layer of OSI model?

 A Multiplexer B Hubs C Amplifier D Router
Computer-Networks       ISO-OSI-layers
Question 11 Explanation:
Router is associated with network layer and rest of the devices are associated with physical layer.
 Question 12

A closed path with no other repeated vertices than the starting and ending vertices is known as

 A Steiner tree B Cycle C Complement graph D Spanning tree
Engineering-Mathematics       Graph-Theory
Question 12 Explanation:
A closed path with no other repeated vertices than the starting and ending vertices is called cycle.
 Question 13

Which one from the following is a false statement about TCP/IP model?

 A Network Access layer performs encapsulation of IP datagrams into frames and mapping IP addresses to physical hardware addresses. B Transport layer has primary two protocols – TCP and UDP. C The Internet Layer is in between Network Access layer and Transport layer. D The IP is a primary protocol at Transport Layer.
Computer-Networks       TCP/IP
Question 13 Explanation:
Option 4 is wrong because TCP and UDP is a primary protocol at transport layer.
There are 13 questions to complete.

Register Now