KVS 22-12-2018 Part-B

Question 1
Which of the following algorithms use recursion for sorting an array of integers?
A
Bubble sort and Insertion sort
B
Bubble sort and Quicksort
C
Bubble sort and merge sort
D
Quicksort and merge sort
       Algorithms       Sorting
Question 1 Explanation: 
Recursion is used in quicksort and merge sort.
The quick sort and merge sort algorithms are based on the divide and conquer algorithm which works in the quite similar way.
In the both algorithm, the larger problem is divided into smaller one until you find the solution later we will combine all smaller solutions into final solution.
Question 2
______ operation preserves those tuples that would be lost in____
A
Natural join, outer join
B
Outer join, natural join
C
Left outer join, right outer join
D
Left outer join, natural join
       Database-Management-System       Relational-Algebra
Question 2 Explanation: 
→ A NATURAL JOIN is a JOIN operation that creates an implicit join clause for you based on the common columns in the two tables being joined. Common columns are columns that have the same name in both tables.
→ A NATURAL JOIN can be an INNER join, a LEFT OUTER join, or a RIGHT OUTER join. The default is INNER join.
→ The SQL OUTER JOIN returns all rows from both the participating tables which satisfy the join condition along with rows which do not satisfy the join condition. The SQL OUTER JOIN operator (+) is used only on one side of the join condition only.
Question 3
Social network analysts use ____ to access facebook data
A
Facebook system calls
B
Facebook APIs
C
Facebook Scripts
D
Facebook System Libraries
       Operating-Systems       API
Question 3 Explanation: 
→ The Facebook API is a platform for building applications that are available to the members of the social network of Facebook.
→ The API allows applications to use the social connections and profile information to make applications more involving, and to publish activities to the news feed and profile pages of Facebook, subject to individual users privacy settings.
Question 4
In which of the topology, each device has a dedicated point-to-point link to a central controller?
A
Mesh
B
Bus
C
Ring
D
Star
       Computer-Networks       Topologies
Question 4 Explanation: 
→ In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub.
→ The devices are not directly linked to one another.
Question 5
While making bubbled lists, which of the following options are available?
A
Square,disc,tringle
B
Triangle,disc,circle
C
Triangle,square,circle
D
Disc,square,circle
       Computer-Graphics       Shapes
Question 5 Explanation: 
→ Disc: A filled circle
→ Circle : An unfilled circle
→ square : A filled square
Question 6
Resolution of externally defined symbols is performed by____
A
Linker
B
Loader
C
Compiler
D
Editor
       Compiler-Design       Linker
Question 6 Explanation: 
→ A linker is a computer utility program that takes one or more object files generated by a compiler and combines them into a single executable file, library file, or another 'object' file.
→ A loader is a major component of an operating system that ensures all necessary programs and libraries are loaded, which is essential during the startup phase of running a program.
→ It places the libraries and programs into the main memory in order to prepare them for execution.
Question 7
In which case it is mandatory to provide a destructor in a class?
A
Almost in every class
B
Class for which two or more than two objects will be created
C
Class for which copy constructor
D
Class whose objects will be created dynamically
       OOPS       Destructors
Question 7 Explanation: 
→ Destructors are used to de-allocate the memory that has been allocated for the object by the constructor.
→ Unlike constructor a destructor neither takes any arguments nor does it returns value. And destructor can’t be overloaded.
Question 8
Action implementing instructor’s meaning are actually carried out by____
A
Instruction fetch
B
Instruction decode
C
Instruction execution
D
Instruction program
       Computer-Organization       Machine-Instructions
Question 8 Explanation: 
→ The basic function performed by a computer is the execution of a program. The program which is to be executed is a set of instructions which are stored in memory.
→ The central processing unit (CPU) executes the instructions of the program to complete a task.
→ The major responsibility of the instruction execution is with the CPU. The instruction execution takes place in the CPU registers
Question 9
Given a relation schema R(ABCDEFGH) in first normal form. For the set of dependencies F={ A→ B, A→ C, CG→ H, B→ H, G→ F}, which dependency is logically implied?
A
AC→ H
B
C→ H
C
G→ H
D
A→ H
       Database-Management-System       Functional-Dependency
Question 9 Explanation: 
From the dependencies A→ B and B→ H, we can imply A→ H by using transitive dependency
Question 10
To load a byte of data parallelly into a shift register with a synchronous load, there must be__
A
One clock pulse
B
One clock pulse for each 1 in the data
C
Eight clock pulses
D
One clock pulse for each 0 in the data
       Digital-Logic-Design       Sequential-Circuits
Question 10 Explanation: 
The sequential device loads the data present on its inputs and then moves or “shifts” it to its output once every clock cycle, hence the name Shift Register.
Question 11
Which of the following is the correct declaration of linked list?
A
Struct node*
{
Int data;
node*link;
}
B
Struct node
{
int data;
Struct node*link;
}
C
Struct node
{
int data;
node link;
}
D
Struct node*
{
int data;
struct node*link;
}
       Data-Structures       Linked-List
Question 11 Explanation: 
Declaration syntax is
Struct tag_name
{
Datatype variable_name;
Struct tag_name *pointer_variable;
};
Question 12
The operation executed on data stored in registers is called____
A
Macro operation
B
Micro operation
C
Bit operation
D
Byte operation
       Computer-Organization       Registers
Question 12 Explanation: 
Micro-operations perform basic operations on data stored in one or more registers, including transferring data between registers or between registers and external buses of the central processing unit (CPU), and performing arithmetic or logical operations on registers
Question 13
Which of the following is true about time value assignment in VBscript?
A
The time value should be assigned without double quotes(“).
B
The time value should be enclosed within double quotes(“).
C
The time value should be enclosed within single quotes(‘);
D
The time value should be enclosed within hash symbols(#).
       Web-Technologies       VB-Script
Question 13 Explanation: 
→The numeric values should be declared without double quotes.
→The String values should be enclosed within double quotes(")
→Date and Time variables should be enclosed within hash symbol(#)
Question 14
Shifting a register content to left by one bit is equivalent to____
A
Division by 2
B
Addition by 2
C
Multiplication by 2
D
Subtraction by 2
       Digital-Logic-Design       Number-Systems
Question 14 Explanation: 
→ The left-shift operator (<<), which moves the bits of shift-expression to the left.
→ The bit positions that have been vacated by the shift operation are zero-filled.
→ For example a=5 and equivalent binary value is 101 and shifting one bit left side means the result binary value is 1010 whose decimal value is 10
Question 15
Consider the relation Emp-Dept with SSn as key

Which of the following is (are) invalid operation(s)?
a) Inserting an employee without name and address
b) Inserting an employee with only SSn
c) Inserting a department with no employee
d) Inserting an employee without SSn
A
(a)
B
(d)
C
(c) and (d)
D
(b) and (c)
       Database-Management-System       Relational Schema
Question 15 Explanation: 
Inserting an employee without SSn because SSn is key to the table.
Question 16
What shall be the 2’s complement represented of -24 in a 16 bit computer?
A
1111 1111 1110 1011
B
1111 1111 1110 1001
C
1111 1111 1110 0111
D
1111 1111 1110 1000
       Digital-Logic-Design       Number-Systems
Question 16 Explanation: 
Negative numbers are represented in 2’s complement form.
The binary equivalent of 24 is 0000 0000 0001 1000
One’s complement is 1111 1111 1110 0111 (Flipping the bits 1 by 0 and 0 by 1)
Two’s complement is 1111 1111 1110 1000 (adding 1 to the LSB bit)
Question 17
Which of the following is/are wrong?
a) RAM and ROM are volatile memories
b) ROMs,PROMs and EPROMs are non volatile memories
c) RAM and Dynamic RAM are same
d) A random access memory(RAM) is a read write memory
A
(a) and (b)
B
(a) and (c)
C
(a) and (d)
D
(c) and (d)
       Digital-Logic-Design       RAM
Question 17 Explanation: 
Statements b and d are correct.
Random Access Memory (RAM) –
→ It is also called as read write memory or the main memory or the primary → memory.
→ The programs and data that the CPU requires during execution of a program are stored in this memory.
→ It is a volatile memory as the data loses when the power is turned off.

ROM
→ Stores crucial information essential to operate the system, like the program essential to boot the computer.
→ It is non-volatile memory.
Question 18
The process of removing deficiencies and loopholes in the data is called as____
A
Data aggregation
B
Extraction of data
C
Compression of data
D
Cleaning of data
       Database-Management-System       Data-Cleaning
Question 18 Explanation: 
→ Data cleansing or data cleaning is the process of detecting and correcting (or removing) corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data.
→ Data cleansing may be performed interactively with data wrangling tools, or as batch processing through scripting.
Question 19
The electromagnetic waves ranging in frequencies between 1 GHz and 300 GHz are called____
A
Radio waves
B
Microwaves
C
Infrared waves
D
Light waves
       Computer-Networks       Electromagnetic-Waves
Question 19 Explanation: 
Microwaves have wavelengths approximately in the range of 30 cm (frequency = 1 GHz) to 1 mm (300 GHz).
Question 20
Given the following two statements about SQL
(a) An SQL query can contain HAVING clause only if it has GROUP BY clause.
(b) In an SQL query “SELECT_FROM_WHERE_GROUP BY_HAVING”, HAVING is executed before WHERE.
Which of the following is correct?
A
(a) and (b) are true
B
(a) is true, (b) is false
C
(a) is false, (b) is true
D
(a) and (b) both are false
       Database-Management-System       SQL
Question 20 Explanation: 
→ The GROUP BY clause is a SQL command that is used to group rows that have the same values.
→ HAVING clause is used to filter summarized data or grouped data.
→ WHERE clause introduces a condition on individual rows; HAVING clause introduces a condition on aggregations, i.e. results of selection where a single result, such as count, average, min, max, or sum, has been produced from multiple rows
→ As a rule of thumb, use WHERE before GROUP BY and HAVING after GROUP → BY.
→ The order of execution of Clauses i.e FROM > WHERE > GROUP BY > HAVING > DISTINCT > SELECT > ORDER BY.
Question 21
Which of the following protocol is used for transforming electronic mail messages from one machine to another?
A
FTP
B
SMTP
C
SNMP
D
STTP
       Computer-Networks       Application-Layer-Protocol
Question 21 Explanation: 
Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/IP network. SMTP provides the ability to send and receive email messages.
SMTP is an application-layer protocol that enables the transmission and delivery of email over the Internet
Question 22
Exclusive OR(XOR) is a special gate whose output is 1 only if:
A
All inputs are 0
B
All inputs are 1
C
Odd numbers of inputs are 1
D
Even number of inputs are 1
       Digital-Logic-Design       Logic-Gates
Question 22 Explanation: 
→Exclusive OR gate or XOR gate is a is a digital logic gate that implements an exclusive OR, that is, a true output (1/HIGH) results if one, and only one, of the inputs to the gate is true.
→If both inputs are false (0/LOW) or both are true, a false output results. XOR represents the inequality function, i.e., the output is true if the inputs are not alike otherwise the output is false.
Question 23
MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes_____frames.
A
Voice
B
Spatial
C
Temporal
D
Redundant
       Computer-Graphics       Motion-Pictures
Question 23 Explanation: 
MPEG: The MPEG codec can only be used when the final video file will be in MPEG format (it is not compatible with other file types). It uses a lossy compression scheme (although it may be lossless at high-quality settings) and spatial and temporal compression. MPEG offers the best compression possible, but MPEGs are not yet as widely supported on the Web as other video formats.
Spatial compression:
Spatial (or intraframe) compression takes place on each individual frame of the video, compressing the pixel information as though it were a still image. JPEG, PNG and PICT files are an example of spatial compression.
It is known as the intraframe method.

Temporal compression:
It happens over a series of frames of the video. Temporal (or interframe) compression happens over a series of frames and takes advantage of areas of the image that remain unchanged from frame to frame, throwing out data for repeated pixels.
It is also called the interframe method.
Question 24
Hardware mechanism that enables a device to notify the CPU is called:
A
Busy-waiting
B
Interrupt
C
Polling
D
DMA
       Computer-Organization       Interruption
Question 24 Explanation: 
→ An interrupt is a signal to the processor emitted by hardware or software indicating an event that needs immediate attention.
→ An interrupt alerts the processor to a high-priority condition requiring the interruption of the current code the processor is executing.
Question 25
The device bridge is used at ____ layer of OSI reference model.
A
Datalink
B
Network
C
Transport
D
Application
       Computer-Networks       OSI-TCP-layers
Question 25 Explanation: 
→ A network bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments.
→ Bridges are important in networks because the networks are divided into many parts geographically remote from one another.
→ Bridge works at Data link layer
Question 26
Runtime polymorphism is achieved by _____
A
Friend function
B
Virtual function
C
Operator overloading
D
Function overloading
       OOPS       Properties
Question 26 Explanation: 
→ In Run time Polymorphism, call is not resolved by the compiler.
→ Run time Polymorphism is achieved by virtual functions and pointers.
→ Compile time Polymorphism achieved by function overloading and operator overloading.
Question 27
How many characters per second (7 bits+1 parity) can be transmitted over a 2400 bps line if the transfer is asynchronous(1 start and 1 stop bit)?
A
240
B
250
C
275
D
300
       Computer-Organization       Synchronous-and-asynchronous-Communication
Question 27 Explanation: 
→ Synchronous data transmission is a data transfer method in which a continuous stream of data signals is accompanied by timing signals (generated by an electronic clock) to ensure that the transmitter and the receiver are in step (synchronized) with one another
→ Asynchronous transmission works in spurts and must insert a start bit before each data character and a stop bit at its termination to inform the receiver where it begins and ends.
→ In synchronous mode of transfer we don’t require start and stop bits but in Asynchronous mode of transfer these bits are added to the number of bits in each character.
→ Number of characters per second = (7+1)bits + 1 start + 1 stop = 10 bits
→ Bandwidth = 2400 bps
→ Number of characters to be transmitted = 2400/10 = 240
Question 28
Which of the following flipflops does not have a problem of race condition?
A
T flip flop
B
JK flip flop
C
Clocked-RS flip flop
D
Clocked D flip flop
       Digital-Logic-Design       Sequential-Circuits
Question 28 Explanation: 
In JK flip flop as long as clock is high for the input conditions J&K equals to the output changes or complements its output from 1–>0 and 0–>1. This is called toggling output or uncontrolled changing or racing condition.
Question 29
Time taken to switch between user and kernel models is___the time taken to switch between two processes.
A
More than
B
Independent of
C
Less than
D
Equal to
       Operating-Systems       Context-Switching
Question 29 Explanation: 
Context switch between the processes involves kernel mode.So the time taken to switch between user and kernel models is less compared to switching between the processes
Question 30
The worst case complexity for searching an element in binary search tree is:
A
O(lgn)
B
O(nlogn)
C
O(n2)
D
O(n)
       Data-Structures       Binary-search-tree
Question 30 Explanation: 
→ The worst case scenario is when a binary search tree(skew tree) is fully degenerate, a binary search tree is a chain of n nodes.
→ The worst-case time complexity of a search in a binary search tree is O(n).
Question 31
The period of a signal is 100ms. What is its frequency in kilohertz?
A
10-1 kHz
B
10 -2 kHz
C
10-3 kHz
D
10-4 kHz
       Computer-Networks       Data-and-Signals
Question 31 Explanation: 
First we change 100 ms to seconds, and then we calculate the frequency from the period (1 Hz=10-3 kHz).
100 ms=100*10-3s
= 10-1 s
f=1/T
=1/10-1Hz
=10 Hz
=10*10-3 kHz
=10-2 kHz
Question 32
How many page faults occur in LRU page replacement algorithm for the given reference string, with four page frames
7,0,1,2,0,3,4,2,3,0,3,2,1,2,0,1
A
6
B
8
C
7
D
9
       Operating-Systems       Page-Replacement-algorithm
Question 32 Explanation: 
In the Least Recently Used (LRU) page replacement policy, the page that is used least recently will be replaced.

Question 33
Usually pure virtual function
A
Has complete function body
B
Will never be called
C
Will be called only to delete an object
D
Is defined only in derived class
       OOPS       Properties
Question 33 Explanation: 
→ A virtual function or virtual method is an inheritable and overridable function or method for which dynamic dispatch is facilitated.
→ A pure virtual function or pure virtual method is a virtual function that is required to be implemented by a derived class if the derived class is not abstract.
Question 34
Von neumann computer architecture is____
A
SISD
B
SIMD
C
MIMD
D
MISD
       Computer-Organization       Machine-Instructions
Question 34 Explanation: 
SISD (single instruction stream, single data stream) is a computer architecture in which a single uni-core processor, executes a single instruction stream, to operate on data stored in a single memory. This corresponds to the von Neumann architecture.
Question 35
____key must satisfy referential integrity in a relation, while__key must satisfy entity integrity.
A
Candidate, primary
B
Foreign,primary
C
Primary,foreign
D
Foreign,superkey
       Database-Management-System       Constraints
Question 35 Explanation: 
→ To ensure entity integrity, it is required that every table have a primary key.
→ Neither the primary key nor any part of it can contain null values. This is because null values for the primary key mean we cannot identify some rows.
→ Referential integrity requires that a foreign key must have a matching primary key or it must be null. This constraint is specified between two tables (parent and child); it maintains the correspondence between rows in these tables. It means the reference from a row in one table to another table must be valid.
Question 36
The _____property is used to return or sets value determines whether the conrolcan respond to user generated events.
A
Auto
B
Enable
C
Value
D
Visible
       Visual-basics       Events
Question 36 Explanation: 
→ Enable property specifies whether a control can receive the focus and respond to user-generated events.
Syntax: object.Enabled [= Boolean ]
The Enabled property syntax has these parts:

Question 37
Use of virtual function implies____
A
Overloading
B
Overriding
C
Static binding
D
Dynamic binding
       OOPS       Properties
Question 37 Explanation: 
→ A virtual function or virtual method is an inheritable and overridable function or method for which dynamic dispatch is facilitated.
→ Dynamic binding occurs when a pointer or reference is associated with a member function based on the dynamic type of the object.
→ The member function that is dynamically bound must override a virtual function declared in a direct or indirect base class.
Question 38
Machine that places the request to access the data, is generally called as___
A
Server machine
B
Client machine
C
Request machine
D
Intelligent machine
       Computer-Networks       Client-Server-Computing
Question 38 Explanation: 
→ A client is a piece of computer hardware or software that accesses a service made → available by a server.
→ The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network.
Question 39
Which of the following applications may use a stack?
(a) Parenthesis balancing program
(b) Process scheduling operating system
(c) Conversion of infix arithmetic expression to postfix form
A
(a) and (b)
B
(b) and (c)
C
(a) and (c)
D
(a),(b) and (c)
       Data-Structures       Queues-and-Stacks
Question 39 Explanation: 
Process scheduling operating system is application of queue.
Question 40
Consider the following code segment in C++. How many times the for loop will be repeated?
int main()
{
int f=1;
for(;f;)
cout<<”f=”<<f++<<”\n”;
Return 0;
}
A
10 times
B
Not even once
C
Repeated forever
D
Only once
       Programming       Control Flow
Question 40 Explanation: 
There is no termination condition for the loop and value “f” incremented every time. So it will execute infinite number of times.
Question 41
Which of the following are language processor?
A
Assembler and editor
B
Compiler and word processor
C
Only Assembler and compiler
D
Assembler,Compiler and Interpreter
       Compiler-Design       Compilers-and-Parsers
Question 41 Explanation: 
→ Compiler : Compilers are used to convert high level languages (like C, C++ ) into machine code Example : gcc , Microsoft Visual Studio
→ Assembers : Assembler are used to convert assembly language code into machine code.
→ Interpreter : An interpreter is a computer program which executes a statement directly (at runtime).
→ Examples: python , LISP
Question 42
Consider the following code segment:
int x=22,y=15;
x=(x>y)?(x+y):(x-y);
What will be the value of x after the code is executed?
A
22
B
37
C
7
D
37 and 7
       Programming       Operator
Question 42 Explanation: 
The condition 22>15 is true so it will execute 22+15 which is 37
Question 43
Given below are several usages of the anchor tag in HTML.
(a) <A href=”http://w3c.org/test.html” >
(b) <A href=”/HTML/test.html”> Test </A >
(c) <A href=”test.html”>Test < /A >
(d) <A href=”test.html#top”>Test < /A >
Which of the above are valid?

A
(a) and (b) only
B
(a),(b) and (c) only
C
(b),(c) and (d) only
D
(a),(b),(c) and(d)
       Web-Technologies       HTML
Question 43 Explanation: 
I. statement 1 represents absolute URL. But since Statement A does not contain a closing tag so it is a wrong statement.
II. Statement 2 relative URL starting from website root
III. Statement 3 relative URL starting from the current page location
IV. Statement 4 relative URL starting from the current page location and then going to "test" part of the loaded page
Hence option C is right answer.
Question 44
The function setcookie() is used to____
A
Enable or disable cookie support
B
Declare cookie variables
C
Store data in cookie variables
D
Clear data from cookie variables
       Computer-Networks       Application-Layer-Protocol
Question 44 Explanation: 
→ The setcookie() function defines a cookie to be sent along with the rest of the HTTP headers.
→ A cookie is often used to identify a user. A cookie is a small file that the server embeds on the user's computer. Each time the same computer requests a page with a browser, it will send the cookie too. With PHP, you can both create and retrieve cookie values.
→ Syntax
→ setcookie(name,value,expire,path,domain,secure,httponly);
Question 45
In which of the following, the density of the core remains constant from the center to the edges?
A
Single mode fiber
B
Multimedia step-index fiber
C
Multimode graded index fiber
D
Single mode step index fiber
       Computer-Graphics       Multimode-Step-Index
Question 45 Explanation: 
Multimode Step-index: In multimode step-index fiber, the density of the core remains constant from the center to the edges. A beam of light moves through this constant density in a straight line until it reaches the interface of the core and the cladding
Question 46
A device which converts BCD to seven segment is called____
A
Encoder
B
Decoder
C
Decoder
D
Demultiplexer
       Digital-Logic-Design       Combinational-Circuit
Question 46 Explanation: 
A Display Decoder is a combinational circuit which decodes and n-bit input value into a number of output lines to drive a display
Question 47
Additional information sent when an exception is thrown may be placed in___
A
Additional information sent when an exception is thrown may be placed in___
B
The function that caused the error
C
The catch block
D
An object of the exception class
       OOPS       Properties
Question 47 Explanation: 
→ A catch block is where you handle the exceptions, this block must follow the try block.
→ A single try block can have several catch blocks associated with it. You can catch different exceptions in different catch blocks.
→ When an exception occurs in try block, the corresponding catch block that handles that particular exception executes
Question 48
When a mobile telephone physically moves from one cell to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as____
A
Handoff
B
Mobile routing
C
Mobile switching
D
Cell Switching
       Computer-Networks       Handoff
Question 48 Explanation: 
→ A handoff refers to the process of transferring an active call or data session from one cell in a cellular network to another or from one channel in a cell to another.
→ A well-implemented handoff is important for delivering uninterrupted service to a caller or data session user.
→ In satellite communications it is the process of transferring satellite control responsibility from one earth station to another without loss or interruption of service.
Question 49
Which of the following expression results in zero?
A
(0+0+1)(0+0+1)
B
(0+0+0)(0+1+1)
C
(1+0+0)(1+1+1)
D
(0+1+0)(1+0+1)
       Theory-of-Computation       Regular-Expression
Question 49 Explanation: 
→ The second option gives zero value.
→ (0+0+0) gives the value 0
→ (0+1+1) gives either 0 or 1.
→ (0+0+0)(0+1+1) gives ), as product of 0 with anything is 0
Question 50
Which of the following is a special effect in motion pictures and animation that changes one image/picture into another through a seamless transition?
A
Modeling
B
Morphing
C
Animating
D
Wrapping
       Computer-Graphics       Transformations
Question 50 Explanation: 
→ Morphing is a special effect in motion pictures and animations that changes (or morphs) one image or shape into another through a seamless transition.
→ Morphing means stretching or as part of a fantasy or surreal sequence.
Question 51
______ variables are not reinitialized each time visual basic invokes a procedure and thus retains or preserves value even when a procedure ends
A
Static
B
Dynamic
C
Virtual
D
Private
       Visual-basics       Access-Specifiers
Question 51 Explanation: 
→ Static variable is a variable which has been allocated “statically” so that it’s lifetime extends across the entire run of the program.
→ Thus, static variable continues to exist even after the block in which they are defined terminates. Furthermore, you can initialize a static variable during it’s declaration but this must be a constant expression.
Question 52
Which of the following is not correct in C++?
A
x-=2; is the same as x=x-2;
B
x*=2; is the same as x=x*2;
C
x%=2; is the same as x=x/2;
D
x/=2; is the same as x=x/2;
       OOPS       C++
Question 52 Explanation: 
→ x%=2; is not the same as x=x/2;
→ x%=2; is the same as x=x%2;
Question 53
Consider the following Java code segment:
Public class while /*line1*/
{
Public void loop()
{
int x=0;
while(1) /*line 6*/
{
system.out.println(“x plus one is”+(x+1));
}
}
}
Which of the following is true?
A
There is a syntax error in line -1
B
There are syntax errors in,line -1 and line -6
C
There is a syntax error in line -6
D
No syntax error
       OOPS       JAVA
Question 53 Explanation: 
We can’t used the keyword “while” as class name.So it will give syntax error.
Question 54
The Communication between the components in a microcomputer takes place via the address and ____
A
I/O bus
B
Data bus
C
Address bus
D
Control lines
       Computer-Organization       Microprocessor
Question 54 Explanation: 
→ A data bus is a system within a computer or device, consisting of a connector or set of wires, that provides transportation for data.
→ A data bus is also called a processor bus, front side bus, frontside bus or backside bus—is a group of electrical wires used to send information (data) between two or more components.
Question 55
Which of the following statements is incorrect?
A
Data definition languages is used by DBA and database designers to define schemas
B
Storage definition language is used to specify the internal schema.
C
Storage definition language is used to insert,delete and update data
D
Data definition languages is used to retrieve data from the database
       Database-Management-System       SQL
Question 55 Explanation: 
→ A database system provides a data definition language to specify the database schema and a data manipulation language to express database queries and updates.
→ Storage definition language is to specify the internal schema. This language may specify the mapping between two schemas.
→ A data manipulation language (DML) is a computer programming language used for adding (inserting), deleting, and modifying (updating) data in a database.
Question 56
Given the list of tasks in Col-A and list of data structure in Col-B. Identify the best match
A
(i) (iii) (ii)
B
(ii) (i) (iii)
C
(iii) (ii) (i)
D
(ii) (iii) (i)
       Data-Structures       Queues-and-Stacks
Question 56 Explanation: 
→ Recursion is implemented stack
→ Scheduling can be implemented using Queue.
→ The inorder traversal of binary search gives sorting order.
Question 57
In the context of while loop do while loop in C++, which of the following is not true?
A
Both the loops are repetitive in nature
B
Boh are conditional loops
C
Both will be executed at least once
D
Both are terminated when the condition become false
       Programming       Control Flow
Question 57 Explanation: 
Do-while will execute at least one time while loop will execute minimum of zero times.
Question 58
In single-precision, double-precision and extended-precision representation of floating point numbers, as defined by ANSI/IEEE standard 754-1985, the no.of bits used are____ respectively.
A
32,64 and 80
B
32,64 and 128
C
16,32 and 64
D
16,32 and 80
       Digital-Logic-Design       Number-Systems
Question 58 Explanation: 

Extended precision, the third format, is usually an 80-bit word, with 1 bit sign, 15 bit exponent and 64 bit significand, with leading bit of a normalized number not hidden
Question 59
Parent class of all java classes is____
A
Java.lang.system
B
Java.lang.object
C
Java.lang.class
D
Java.lang,reflect.object
       OOPS       JAVA
Question 59 Explanation: 
public class Object:
Class Object is the root of the class hierarchy. Every class has Object as a superclass. All objects, including arrays, implement the methods of this class.
Question 60
Which of the following method is used to refresh the webpage in javascript?
A
window.reload()
B
location.reload()
C
window.refresh()
D
page.refresh()
       Web-Technologies       Java-Script
Question 60 Explanation: 
→ Reload the current document:
→ location.reload();
→ The reload() method is used to reload the current document.
→ The reload() method does the same as the reload button in your browser.
→ By default, the reload() method reloads the page from the cache
Question 61
In Vb, to change the size of a dynamic array,___ is used at the point in the code where you want it to change
A
Dim
B
Redim
C
Chdim
D
Bydim
       Visual-basics       ReDim
Question 61 Explanation: 
Re-allocates storage space for an array variable.
Syntax:
ReDim [ Preserve ] name(boundlist) [ , name(boundlist) [, ... ] ]
Question 62
Consider the code segment written below in C++:
if (count<10) //if#1
if((count%4)==2) //if#2
count<<”condition:white\n”;
else //(indentation is wrong)
count<<”condition is:tan\n”;
There are 2 if statements and one else. To which if, the else statement belong?
A
It belongs to if#1
B
It belongs to if#2
C
It belongs to both the if statements
D
It is independent
       Programming       if-else
Question 62 Explanation: 
→ The else statement belongs its immediate previous if statement.
→ If there are no braces ({}) following the if statement then only the next immediate statement belongs to the if statement. The same thing is true for else and else-if clause
Question 63
An interface that provides I/o transfer of data directly to and from the memory unit and the peripheral is termed as_____
A
DDA
B
Serial Interface
C
BR
D
DMA
       Computer-Organization       DMA
Question 63 Explanation: 
Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations
Question 64
The _____attribute of <TABLE> tag is used to control the distance between the data in a cell and the boundaries of the cell.
A
Colspan
B
Rowspan
C
Cellpadding
D
cellspacing
       Visual-basics       Cell-Padding
Question 64 Explanation: 
Cellpadding:
Cellpadding is used to specify the distance between a cell contents and its boundaries.Cellpadding is an important formatting feature of web document.cellpadding used to specify the space between edges of the cells it also used in cell contents.
Cellspacing:
Cellspacing is an important attribute of < Table > tag in HTML.Is the property which increases the space between the cells of the table. you can see that Cellspacing increases the border of the table.its default value is zero
Question 65
For which of the following tasks, stack is not suitable data structure?
(a) Binary search in an array
(b) Breadth first search
(c) Implementing function calls
(d) Process scheduling
A
(b) and (d)
B
(b) and (c)
C
(a) and (c)
D
(c) and (d)
       Data-Structures       Queues-and-Stacks
Question 65 Explanation: 
Breadth first search and Process scheduling can be implemented by using Queue.
Binary search can be implemented by using recursion. So Stack is suitable for implementing function calls.
Question 66
Which of the following is correct?
A
In asymmetric multiprocessing, the processor are peers.
B
In symmetric multiplexing, the processors are placed symmetrically on the motherboard
C
Clustered systems are used for high performance computing
D
All multiprocessor systems are multicore systems
       Operating-Systems       Clustered-Systems
Question 66 Explanation: 
→ The clustered systems are a combination of hardware clusters and software clusters. The hardware clusters help in sharing of high performance disks between the systems. The software clusters makes all the systems work together.
→ Each node in the clustered systems contains the cluster software. This software monitors the cluster system and makes sure it is working as required. If any one of the nodes in the clustered system fail, then the rest of the nodes take control of its storage and resources and try to restart.
→ asymmetric multiprocessing using master-slave strategy but symmetric multiprocessing using peer to peer.
→ In symmetric multiplexing, the processors are not placed symmetrically on the motherboard.
Question 67
File operations that manipulate the ‘open-count’ maintained for each entry in open file table include:
A
Open,write
B
Read,write
C
Write,close
D
Open,close
       Operating-Systems       File system-I/O-protection
Question 67 Explanation: 
The open file table also has an open count associated with each file to indicate how many processes have the file open. Each close() decreases this open count, and when open count reaches zero, the file no longer in use, and file’s entry is removed from the open file table.
Question 68
Given an instance of the relation R(ABCD).

Which of the following functional dependencies hold?
A
{AB} → D and D → A
B
{AB → D and B → D
C
{AB} → C and B → C
D
{AB} → D and A → D
       Database-Management-System       Functional-Dependency
Question 68 Explanation: 
Rules for determining functional dependency hold or not : → If LHS of a functional dependency is not repeating any value then you. you can say that LHS of a functional dependency is determining RHS of a functional dependency.
→ If LHS of a functional dependency is repeating then see the value of RHS. If values of RHS are same for repeated value of LHS then you can say that LHS of a functional dependency is determining RHS of a functional dependency else not determining.
Now if you see the given options then only option(C) is satisfying above two rules.
Question 69
The simplified form of the boolean expression: (AB’(C+BD)+A’B’)C is:
A
B’C
B
A’B’C
C
AB’C
D
A’BC
       Digital-Logic-Design       Boolean-Expression
Question 69 Explanation: 
(AB’(C+BD)+A’B’)C
(AB'C + AB'BD + A'B')C
(AB'C + A'B')C
AB'C + A'B'C
(A+A') B'C
B'C
Question 70
When a circular queue is implemented in an array of the following condition holds when there is only one element in the queue?
A
Front=rear=null
B
Front=Rear!=null
C
Front=Rear+1
D
Front=Rear-1
       Data-Structures       Queues-and-Stacks
Question 70 Explanation: 
Front and rear initially points to same location and once rear is incremented by 1 it means element is added and front is used to delete so here we don't need front for 1 element in the queue.
Question 71
In a computer system, memory mapped access takes 100 nanoseconds when a page is found in TLB. In case the page is not TLB, it takes 400 nanoseconds to access. Assuming a hit ratio of 80%, the effective access time is:
A
120ns
B
160ns
C
200ns
D
500ns
       Operating-Systems       Memory-Management
Question 71 Explanation: 
EAT := TLB_miss_time * (1- hit_ratio) + TLB_hit_time * hit_ratio
TLB time = 100ns,
Memory time = 400ns
Hit Ratio= 80%
E.A.T. = (0.80)*(500)+0.20*900
0.8*100+.2*400=160
Question 72
The producer and consumer processes share the following variables:
int n;
Semaphore M=1
Semaphore E=n
Semaphore F=0
The consumer process must execute ______ and before removing an item from buffer.
A
signal(M), signal(F)
B
signal(M), wait(F)
C
Signal(F), wait(M)
D
wait(F), wait(M)
       Operating-Systems       Process-Synchronization
Question 72 Explanation: 
F is given 0 then no items would be produced
→ Two standard operations, wait and signal are defined on the semaphore.
→ Entry to the critical section is controlled by the wait operation and exit from a critical region is taken care by signal operation.
→ The manipulation of semaphore (S) takes place as following:
→ The wait command P(S) decrements the semaphore value by 1. If the resulting value becomes negative then P command is delayed until the condition is satisfied.
→ The V(S) i.e. signals operation increments the semaphore value by 1.
→ The wait, signal operations are also called P and V operations.
Question 73
Which of the following is not true in case of public inheritance in c++?
A
Each public member in the base class is public in the derived class
B
Each protected member in the base class is protected in the derived class
C
Each private member in the base class remains private in the base class
D
Each private member in the base class remains private in the derived class
       OOPS       Properties
Question 73 Explanation: 
→ Public Inheritance − When deriving a class from a public base class, public members of the base class become public members of the derived class and protected members of the base class become protected members of the derived class.
→ A base class's private members are never accessible directly from a derived class, but can be accessed through calls to the public and protected members of the base class. We can summarize the different access types according to - who can access them in the following way −

Question 74
The elements of the triangular array are stored as a vector in the A[1,1], A[2,1],A[2,2],A[3,1] A[3,2], A[3,3]..A[n,n] Assuming that A[1,1] is stored at location 1, addressing function for A[i,j] is given by;
A
(i-1)/2 +j
B
((i-1)*i)/2 +j
C
(i*i)/2 +j
D
(i*j-1)/2
       Data-Structures       Arrays
Question 74 Explanation: 
This is lower triangular matrix. For 4,4 we need to cross 4 rows and 4 columns. So, most suitable answer is Option C.
There are 74 questions to complete.