KVS 22-12-2018 Part-B
Question 1 |
Which of the following algorithms use recursion for sorting an array of integers?
Bubble sort and Insertion sort | |
Bubble sort and Quicksort | |
Bubble sort and merge sort | |
Quicksort and merge sort |
Question 1 Explanation:
Recursion is used in quicksort and merge sort.
The quick sort and merge sort algorithms are based on the divide and conquer algorithm which works in the quite similar way.
In the both algorithm, the larger problem is divided into smaller one until you find the solution later we will combine all smaller solutions into final solution.
The quick sort and merge sort algorithms are based on the divide and conquer algorithm which works in the quite similar way.
In the both algorithm, the larger problem is divided into smaller one until you find the solution later we will combine all smaller solutions into final solution.
Question 2 |
______ operation preserves those tuples that would be lost in____
Natural join, outer join | |
Outer join, natural join | |
Left outer join, right outer join | |
Left outer join, natural join |
Question 2 Explanation:
→ A NATURAL JOIN is a JOIN operation that creates an implicit join clause for you based on the common columns in the two tables being joined. Common columns are columns that have the same name in both tables.
→ A NATURAL JOIN can be an INNER join, a LEFT OUTER join, or a RIGHT OUTER join. The default is INNER join.
→ The SQL OUTER JOIN returns all rows from both the participating tables which satisfy the join condition along with rows which do not satisfy the join condition. The SQL OUTER JOIN operator (+) is used only on one side of the join condition only.
→ A NATURAL JOIN can be an INNER join, a LEFT OUTER join, or a RIGHT OUTER join. The default is INNER join.
→ The SQL OUTER JOIN returns all rows from both the participating tables which satisfy the join condition along with rows which do not satisfy the join condition. The SQL OUTER JOIN operator (+) is used only on one side of the join condition only.
Question 3 |
Social network analysts use ____ to access facebook data
Facebook system calls | |
Facebook APIs | |
Facebook Scripts | |
Facebook System Libraries |
Question 3 Explanation:
→ The Facebook API is a platform for building applications that are available to the members of the social network of Facebook.
→ The API allows applications to use the social connections and profile information to make applications more involving, and to publish activities to the news feed and profile pages of Facebook, subject to individual users privacy settings.
→ The API allows applications to use the social connections and profile information to make applications more involving, and to publish activities to the news feed and profile pages of Facebook, subject to individual users privacy settings.
Question 4 |
In which of the topology, each device has a dedicated point-to-point link to a central controller?
Mesh | |
Bus | |
Ring | |
Star |
Question 4 Explanation:
→ In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub.
→ The devices are not directly linked to one another.
→ The devices are not directly linked to one another.
Question 5 |
While making bubbled lists, which of the following options are available?
Square,disc,tringle | |
Triangle,disc,circle | |
Triangle,square,circle | |
Disc,square,circle |
Question 5 Explanation:
→ Disc: A filled circle
→ Circle : An unfilled circle
→ square : A filled square
→ Circle : An unfilled circle
→ square : A filled square
Question 6 |
Resolution of externally defined symbols is performed by____
Linker | |
Loader | |
Compiler | |
Editor |
Question 6 Explanation:
→ A linker is a computer utility program that takes one or more object files generated by a compiler and combines them into a single executable file, library file, or another 'object' file.
→ A loader is a major component of an operating system that ensures all necessary programs and libraries are loaded, which is essential during the startup phase of running a program.
→ It places the libraries and programs into the main memory in order to prepare them for execution.
→ A loader is a major component of an operating system that ensures all necessary programs and libraries are loaded, which is essential during the startup phase of running a program.
→ It places the libraries and programs into the main memory in order to prepare them for execution.
Question 7 |
In which case it is mandatory to provide a destructor in a class?
Almost in every class | |
Class for which two or more than two objects will be created | |
Class for which copy constructor | |
Class whose objects will be created dynamically |
Question 7 Explanation:
→ Destructors are used to de-allocate the memory that has been allocated for the object by the constructor.
→ Unlike constructor a destructor neither takes any arguments nor does it returns value. And destructor can’t be overloaded.
→ Unlike constructor a destructor neither takes any arguments nor does it returns value. And destructor can’t be overloaded.
Question 8 |
Action implementing instructor’s meaning are actually carried out by____
Instruction fetch
| |
Instruction decode | |
Instruction execution | |
Instruction program |
Question 8 Explanation:
→ The basic function performed by a computer is the execution of a program. The program which is to be executed is a set of instructions which are stored in memory.
→ The central processing unit (CPU) executes the instructions of the program to complete a task.
→ The major responsibility of the instruction execution is with the CPU. The instruction execution takes place in the CPU registers
→ The central processing unit (CPU) executes the instructions of the program to complete a task.
→ The major responsibility of the instruction execution is with the CPU. The instruction execution takes place in the CPU registers
Question 9 |
Given a relation schema R(ABCDEFGH) in first normal form. For the set of dependencies
F={ A→ B, A→ C, CG→ H, B→ H, G→ F}, which dependency is logically implied?
AC→ H | |
C→ H | |
G→ H | |
A→ H |
Question 9 Explanation:
From the dependencies A→ B and B→ H, we can imply A→ H by using transitive dependency
Question 10 |
To load a byte of data parallelly into a shift register with a synchronous load, there must be__
One clock pulse | |
One clock pulse for each 1 in the data | |
Eight clock pulses | |
One clock pulse for each 0 in the data |
Question 10 Explanation:
The sequential device loads the data present on its inputs and then moves or “shifts” it to its output once every clock cycle, hence the name Shift Register.
Question 11 |
Which of the following is the correct declaration of linked list?
Struct node* { Int data; node*link; } | |
Struct node { int data; Struct node*link; } | |
Struct node { int data; node link; } | |
Struct node* { int data; struct node*link; } |
Question 11 Explanation:
Declaration syntax is
Struct tag_name
{
Datatype variable_name;
Struct tag_name *pointer_variable;
};
Struct tag_name
{
Datatype variable_name;
Struct tag_name *pointer_variable;
};
Question 12 |
The operation executed on data stored in registers is called____
Macro operation | |
Micro operation | |
Bit operation | |
Byte operation |
Question 12 Explanation:
Micro-operations perform basic operations on data stored in one or more registers, including transferring data between registers or between registers and external buses of the central processing unit (CPU), and performing arithmetic or logical operations on registers
Question 13 |
Which of the following is true about time value assignment in VBscript?
The time value should be assigned without double quotes(“). | |
The time value should be enclosed within double quotes(“). | |
The time value should be enclosed within single quotes(‘);
| |
The time value should be enclosed within hash symbols(#). |
Question 13 Explanation:
→The numeric values should be declared without double quotes.
→The String values should be enclosed within double quotes(")
→Date and Time variables should be enclosed within hash symbol(#)
→The String values should be enclosed within double quotes(")
→Date and Time variables should be enclosed within hash symbol(#)
Question 14 |
Shifting a register content to left by one bit is equivalent to____
Division by 2 | |
Addition by 2
| |
Multiplication by 2 | |
Subtraction by 2 |
Question 14 Explanation:
→ The left-shift operator (<<), which moves the bits of shift-expression to the left.
→ The bit positions that have been vacated by the shift operation are zero-filled.
→ For example a=5 and equivalent binary value is 101 and shifting one bit left side means the result binary value is 1010 whose decimal value is 10
→ The bit positions that have been vacated by the shift operation are zero-filled.
→ For example a=5 and equivalent binary value is 101 and shifting one bit left side means the result binary value is 1010 whose decimal value is 10
Question 15 |
Consider the relation Emp-Dept with SSn as key
Which of the following is (are) invalid operation(s)?
a) Inserting an employee without name and address
b) Inserting an employee with only SSn
c) Inserting a department with no employee
d) Inserting an employee without SSn

Which of the following is (are) invalid operation(s)?
a) Inserting an employee without name and address
b) Inserting an employee with only SSn
c) Inserting a department with no employee
d) Inserting an employee without SSn
(a) | |
(d) | |
(c) and (d) | |
(b) and (c)
|
Question 15 Explanation:
Inserting an employee without SSn because SSn is key to the table.
Question 16 |
What shall be the 2’s complement represented of -24 in a 16 bit computer?
1111 1111 1110 1011 | |
1111 1111 1110 1001 | |
1111 1111 1110 0111 | |
1111 1111 1110 1000 |
Question 16 Explanation:
Negative numbers are represented in 2’s complement form.
The binary equivalent of 24 is 0000 0000 0001 1000
One’s complement is 1111 1111 1110 0111 (Flipping the bits 1 by 0 and 0 by 1)
Two’s complement is 1111 1111 1110 1000 (adding 1 to the LSB bit)
The binary equivalent of 24 is 0000 0000 0001 1000
One’s complement is 1111 1111 1110 0111 (Flipping the bits 1 by 0 and 0 by 1)
Two’s complement is 1111 1111 1110 1000 (adding 1 to the LSB bit)
Question 17 |
Which of the following is/are wrong?
a) RAM and ROM are volatile memories
b) ROMs,PROMs and EPROMs are non volatile memories
c) RAM and Dynamic RAM are same
d) A random access memory(RAM) is a read write memory
a) RAM and ROM are volatile memories
b) ROMs,PROMs and EPROMs are non volatile memories
c) RAM and Dynamic RAM are same
d) A random access memory(RAM) is a read write memory
(a) and (b)
| |
(a) and (c) | |
(a) and (d) | |
(c) and (d) |
Question 17 Explanation:
Statements b and d are correct.
Random Access Memory (RAM) –
→ It is also called as read write memory or the main memory or the primary → memory.
→ The programs and data that the CPU requires during execution of a program are stored in this memory.
→ It is a volatile memory as the data loses when the power is turned off.
ROM
→ Stores crucial information essential to operate the system, like the program essential to boot the computer.
→ It is non-volatile memory.
Random Access Memory (RAM) –
→ It is also called as read write memory or the main memory or the primary → memory.
→ The programs and data that the CPU requires during execution of a program are stored in this memory.
→ It is a volatile memory as the data loses when the power is turned off.
ROM
→ Stores crucial information essential to operate the system, like the program essential to boot the computer.
→ It is non-volatile memory.
Question 18 |
The process of removing deficiencies and loopholes in the data is called as____
Data aggregation
| |
Extraction of data | |
Compression of data | |
Cleaning of data |
Question 18 Explanation:
→ Data cleansing or data cleaning is the process of detecting and correcting (or removing) corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data.
→ Data cleansing may be performed interactively with data wrangling tools, or as batch processing through scripting.
→ Data cleansing may be performed interactively with data wrangling tools, or as batch processing through scripting.
Question 19 |
The electromagnetic waves ranging in frequencies between 1 GHz and 300 GHz are called____
Radio waves | |
Microwaves | |
Infrared waves | |
Light waves |
Question 19 Explanation:
Microwaves have wavelengths approximately in the range of 30 cm (frequency = 1 GHz) to 1 mm (300 GHz).
Question 20 |
Given the following two statements about SQL
(a) An SQL query can contain HAVING clause only if it has GROUP BY clause.
(b) In an SQL query “SELECT_FROM_WHERE_GROUP BY_HAVING”, HAVING is executed before WHERE.
Which of the following is correct?
(a) An SQL query can contain HAVING clause only if it has GROUP BY clause.
(b) In an SQL query “SELECT_FROM_WHERE_GROUP BY_HAVING”, HAVING is executed before WHERE.
Which of the following is correct?
(a) and (b) are true | |
(a) is true, (b) is false | |
(a) is false, (b) is true | |
(a) and (b) both are false |
Question 20 Explanation:
→ The GROUP BY clause is a SQL command that is used to group rows that have the same values.
→ HAVING clause is used to filter summarized data or grouped data.
→ WHERE clause introduces a condition on individual rows; HAVING clause introduces a condition on aggregations, i.e. results of selection where a single result, such as count, average, min, max, or sum, has been produced from multiple rows
→ As a rule of thumb, use WHERE before GROUP BY and HAVING after GROUP → BY.
→ The order of execution of Clauses i.e FROM > WHERE > GROUP BY > HAVING > DISTINCT > SELECT > ORDER BY.
→ HAVING clause is used to filter summarized data or grouped data.
→ WHERE clause introduces a condition on individual rows; HAVING clause introduces a condition on aggregations, i.e. results of selection where a single result, such as count, average, min, max, or sum, has been produced from multiple rows
→ As a rule of thumb, use WHERE before GROUP BY and HAVING after GROUP → BY.
→ The order of execution of Clauses i.e FROM > WHERE > GROUP BY > HAVING > DISTINCT > SELECT > ORDER BY.
Question 21 |
Which of the following protocol is used for transforming electronic mail messages from one machine to another?
FTP | |
SMTP | |
SNMP | |
STTP |
Question 21 Explanation:
Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/IP network. SMTP provides the ability to send and receive email messages.
SMTP is an application-layer protocol that enables the transmission and delivery of email over the Internet
SMTP is an application-layer protocol that enables the transmission and delivery of email over the Internet
Question 22 |
Exclusive OR(XOR) is a special gate whose output is 1 only if:
All inputs are 0 | |
All inputs are 1 | |
Odd numbers of inputs are 1 | |
Even number of inputs are 1 |
Question 22 Explanation:
→Exclusive OR gate or XOR gate is a is a digital logic gate that implements an exclusive OR, that is, a true output (1/HIGH) results if one, and only one, of the inputs to the gate is true.
→If both inputs are false (0/LOW) or both are true, a false output results. XOR represents the inequality function, i.e., the output is true if the inputs are not alike otherwise the output is false.
→If both inputs are false (0/LOW) or both are true, a false output results. XOR represents the inequality function, i.e., the output is true if the inputs are not alike otherwise the output is false.
Question 23 |
MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes_____frames.
Voice | |
Spatial | |
Temporal | |
Redundant |
Question 23 Explanation:
MPEG: The MPEG codec can only be used when the final video file will be in MPEG format (it is not compatible with other file types). It uses a lossy compression scheme (although it may be lossless at high-quality settings) and spatial and temporal compression. MPEG offers the best compression possible, but MPEGs are not yet as widely supported on the Web as other video formats.
Spatial compression:
Spatial (or intraframe) compression takes place on each individual frame of the video, compressing the pixel information as though it were a still image. JPEG, PNG and PICT files are an example of spatial compression.
It is known as the intraframe method.
Temporal compression:
It happens over a series of frames of the video. Temporal (or interframe) compression happens over a series of frames and takes advantage of areas of the image that remain unchanged from frame to frame, throwing out data for repeated pixels.
It is also called the interframe method.
Spatial compression:
Spatial (or intraframe) compression takes place on each individual frame of the video, compressing the pixel information as though it were a still image. JPEG, PNG and PICT files are an example of spatial compression.
It is known as the intraframe method.
Temporal compression:
It happens over a series of frames of the video. Temporal (or interframe) compression happens over a series of frames and takes advantage of areas of the image that remain unchanged from frame to frame, throwing out data for repeated pixels.
It is also called the interframe method.
Question 24 |
Hardware mechanism that enables a device to notify the CPU is called:
Busy-waiting | |
Interrupt | |
Polling | |
DMA |
Question 24 Explanation:
→ An interrupt is a signal to the processor emitted by hardware or software indicating an event that needs immediate attention.
→ An interrupt alerts the processor to a high-priority condition requiring the interruption of the current code the processor is executing.
→ An interrupt alerts the processor to a high-priority condition requiring the interruption of the current code the processor is executing.
Question 25 |
The device bridge is used at ____ layer of OSI reference model.
Datalink | |
Network | |
Transport | |
Application |
Question 25 Explanation:
→ A network bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments.
→ Bridges are important in networks because the networks are divided into many parts geographically remote from one another.
→ Bridge works at Data link layer
→ Bridges are important in networks because the networks are divided into many parts geographically remote from one another.
→ Bridge works at Data link layer
Question 26 |
Runtime polymorphism is achieved by _____
Friend function | |
Virtual function | |
Operator overloading | |
Function overloading |
Question 26 Explanation:
→ In Run time Polymorphism, call is not resolved by the compiler.
→ Run time Polymorphism is achieved by virtual functions and pointers.
→ Compile time Polymorphism achieved by function overloading and operator overloading.
→ Run time Polymorphism is achieved by virtual functions and pointers.
→ Compile time Polymorphism achieved by function overloading and operator overloading.
Question 27 |
How many characters per second (7 bits+1 parity) can be transmitted over a 2400 bps line if the transfer is asynchronous(1 start and 1 stop bit)?
240 | |
250 | |
275 | |
300 |
Question 27 Explanation:
→ Synchronous data transmission is a data transfer method in which a continuous stream of data signals is accompanied by timing signals (generated by an electronic clock) to ensure that the transmitter and the receiver are in step (synchronized) with one another
→ Asynchronous transmission works in spurts and must insert a start bit before each data character and a stop bit at its termination to inform the receiver where it begins and ends.
→ In synchronous mode of transfer we don’t require start and stop bits but in Asynchronous mode of transfer these bits are added to the number of bits in each character.
→ Number of characters per second = (7+1)bits + 1 start + 1 stop = 10 bits
→ Bandwidth = 2400 bps
→ Number of characters to be transmitted = 2400/10 = 240
→ Asynchronous transmission works in spurts and must insert a start bit before each data character and a stop bit at its termination to inform the receiver where it begins and ends.
→ In synchronous mode of transfer we don’t require start and stop bits but in Asynchronous mode of transfer these bits are added to the number of bits in each character.
→ Number of characters per second = (7+1)bits + 1 start + 1 stop = 10 bits
→ Bandwidth = 2400 bps
→ Number of characters to be transmitted = 2400/10 = 240
Question 28 |
Which of the following flipflops does not have a problem of race condition?
T flip flop
| |
JK flip flop | |
Clocked-RS flip flop | |
Clocked D flip flop |
Question 28 Explanation:
In JK flip flop as long as clock is high for the input conditions J&K equals to the output changes or complements its output from 1–>0 and 0–>1. This is called toggling output or uncontrolled changing or racing condition.
Question 29 |
Time taken to switch between user and kernel models is___the time taken to switch between two processes.
More than | |
Independent of | |
Less than | |
Equal to |
Question 29 Explanation:
Context switch between the processes involves kernel mode.So the time taken to switch between user and kernel models is less compared to switching between the processes
Question 30 |
The worst case complexity for searching an element in binary search tree is:
O(lgn) | |
O(nlogn) | |
O(n2) | |
O(n) |
Question 30 Explanation:
→ The worst case scenario is when a binary search tree(skew tree) is fully degenerate, a binary search tree is a chain of n nodes.
→ The worst-case time complexity of a search in a binary search tree is O(n).
→ The worst-case time complexity of a search in a binary search tree is O(n).
Question 31 |
The period of a signal is 100ms. What is its frequency in kilohertz?
10-1 kHz | |
10 -2 kHz | |
10-3 kHz | |
10-4 kHz |
Question 31 Explanation:
First we change 100 ms to seconds, and then we calculate the frequency from the period (1 Hz=10-3 kHz).
100 ms=100*10-3s
= 10-1 s
f=1/T
=1/10-1Hz
=10 Hz
=10*10-3 kHz
=10-2 kHz
100 ms=100*10-3s
= 10-1 s
f=1/T
=1/10-1Hz
=10 Hz
=10*10-3 kHz
=10-2 kHz
Question 32 |
How many page faults occur in LRU page replacement algorithm for the given reference string, with four page frames
7,0,1,2,0,3,4,2,3,0,3,2,1,2,0,1
7,0,1,2,0,3,4,2,3,0,3,2,1,2,0,1
6 | |
8 | |
7 | |
9 |
Question 32 Explanation:
In the Least Recently Used (LRU) page replacement policy, the page that is used least recently will be replaced.


Question 33 |
Usually pure virtual function
Has complete function body | |
Will never be called | |
Will be called only to delete an object | |
Is defined only in derived class |
Question 33 Explanation:
→ A virtual function or virtual method is an inheritable and overridable function or method for which dynamic dispatch is facilitated.
→ A pure virtual function or pure virtual method is a virtual function that is required to be implemented by a derived class if the derived class is not abstract.
→ A pure virtual function or pure virtual method is a virtual function that is required to be implemented by a derived class if the derived class is not abstract.
Question 34 |
Von neumann computer architecture is____
SISD | |
SIMD | |
MIMD | |
MISD |
Question 34 Explanation:
SISD (single instruction stream, single data stream) is a computer architecture in which a single uni-core processor, executes a single instruction stream, to operate on data stored in a single memory. This corresponds to the von Neumann architecture.
Question 35 |
____key must satisfy referential integrity in a relation, while__key must satisfy entity integrity.
Candidate, primary | |
Foreign,primary | |
Primary,foreign | |
Foreign,superkey |
Question 35 Explanation:
→ To ensure entity integrity, it is required that every table have a primary key.
→ Neither the primary key nor any part of it can contain null values. This is because null values for the primary key mean we cannot identify some rows.
→ Referential integrity requires that a foreign key must have a matching primary key or it must be null. This constraint is specified between two tables (parent and child); it maintains the correspondence between rows in these tables. It means the reference from a row in one table to another table must be valid.
→ Neither the primary key nor any part of it can contain null values. This is because null values for the primary key mean we cannot identify some rows.
→ Referential integrity requires that a foreign key must have a matching primary key or it must be null. This constraint is specified between two tables (parent and child); it maintains the correspondence between rows in these tables. It means the reference from a row in one table to another table must be valid.
Question 36 |
The _____property is used to return or sets value determines whether the conrolcan respond to user generated events.
Auto | |
Enable | |
Value | |
Visible |
Question 36 Explanation:
→ Enable property specifies whether a control can receive the focus and respond to user-generated events.
Syntax: object.Enabled [= Boolean ]
The Enabled property syntax has these parts:

Syntax: object.Enabled [= Boolean ]
The Enabled property syntax has these parts:

Question 37 |
Use of virtual function implies____
Overloading | |
Overriding | |
Static binding | |
Dynamic binding |
Question 37 Explanation:
→ A virtual function or virtual method is an inheritable and overridable function or method for which dynamic dispatch is facilitated.
→ Dynamic binding occurs when a pointer or reference is associated with a member function based on the dynamic type of the object.
→ The member function that is dynamically bound must override a virtual function declared in a direct or indirect base class.
→ Dynamic binding occurs when a pointer or reference is associated with a member function based on the dynamic type of the object.
→ The member function that is dynamically bound must override a virtual function declared in a direct or indirect base class.
Question 38 |
Machine that places the request to access the data, is generally called as___
Server machine | |
Client machine | |
Request machine | |
Intelligent machine |
Question 38 Explanation:
→ A client is a piece of computer hardware or software that accesses a service made → available by a server.
→ The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network.
→ The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network.
Question 39 |
Which of the following applications may use a stack?
(a) Parenthesis balancing program
(b) Process scheduling operating system
(c) Conversion of infix arithmetic expression to postfix form
(a) Parenthesis balancing program
(b) Process scheduling operating system
(c) Conversion of infix arithmetic expression to postfix form
(a) and (b) | |
(b) and (c) | |
(a) and (c) | |
(a),(b) and (c) |
Question 39 Explanation:
Process scheduling operating system is application of queue.
Question 40 |
Consider the following code segment in C++. How many times the for loop will be repeated?
int main()
{
int f=1;
for(;f;)
cout<<”f=”<<f++<<”\n”;
Return 0;
}
int main()
{
int f=1;
for(;f;)
cout<<”f=”<<f++<<”\n”;
Return 0;
}
10 times | |
Not even once | |
Repeated forever | |
Only once |
Question 40 Explanation:
There is no termination condition for the loop and value “f” incremented every time. So it will execute infinite number of times.
Question 41 |
Which of the following are language processor?
Assembler and editor | |
Compiler and word processor | |
Only Assembler and compiler | |
Assembler,Compiler and Interpreter |
Question 41 Explanation:
→ Compiler : Compilers are used to convert high level languages (like C, C++ ) into machine code Example : gcc , Microsoft Visual Studio
→ Assembers : Assembler are used to convert assembly language code into machine code.
→ Interpreter : An interpreter is a computer program which executes a statement directly (at runtime).
→ Examples: python , LISP
→ Assembers : Assembler are used to convert assembly language code into machine code.
→ Interpreter : An interpreter is a computer program which executes a statement directly (at runtime).
→ Examples: python , LISP
Question 42 |
Consider the following code segment:
int x=22,y=15;
x=(x>y)?(x+y):(x-y);
What will be the value of x after the code is executed?
int x=22,y=15;
x=(x>y)?(x+y):(x-y);
What will be the value of x after the code is executed?
22 | |
37 | |
7 | |
37 and 7 |
Question 42 Explanation:
The condition 22>15 is true so it will execute 22+15 which is 37
Question 43 |
Given below are several usages of the anchor tag in HTML.
(a) <A href=”http://w3c.org/test.html” >
(b) <A href=”/HTML/test.html”> Test </A >
(c) <A href=”test.html”>Test < /A >
(d) <A href=”test.html#top”>Test < /A >
Which of the above are valid?
(a) <A href=”http://w3c.org/test.html” >
(b) <A href=”/HTML/test.html”> Test </A >
(c) <A href=”test.html”>Test < /A >
(d) <A href=”test.html#top”>Test < /A >
Which of the above are valid?
(a) and (b) only
| |
(a),(b) and (c) only | |
(b),(c) and (d) only | |
(a),(b),(c) and(d) |
Question 43 Explanation:
I. statement 1 represents absolute URL. But since Statement A does not contain a closing tag so it is a wrong statement.
II. Statement 2 relative URL starting from website root
III. Statement 3 relative URL starting from the current page location
IV. Statement 4 relative URL starting from the current page location and then going to "test" part of the loaded page
Hence option C is right answer.
II. Statement 2 relative URL starting from website root
III. Statement 3 relative URL starting from the current page location
IV. Statement 4 relative URL starting from the current page location and then going to "test" part of the loaded page
Hence option C is right answer.
Question 44 |
The function setcookie() is used to____
Enable or disable cookie support
| |
Declare cookie variables | |
Store data in cookie variables | |
Clear data from cookie variables |
Question 44 Explanation:
→ The setcookie() function defines a cookie to be sent along with the rest of the HTTP headers.
→ A cookie is often used to identify a user. A cookie is a small file that the server embeds on the user's computer. Each time the same computer requests a page with a browser, it will send the cookie too. With PHP, you can both create and retrieve cookie values.
→ Syntax
→ setcookie(name,value,expire,path,domain,secure,httponly);
→ A cookie is often used to identify a user. A cookie is a small file that the server embeds on the user's computer. Each time the same computer requests a page with a browser, it will send the cookie too. With PHP, you can both create and retrieve cookie values.
→ Syntax
→ setcookie(name,value,expire,path,domain,secure,httponly);
Question 45 |
In which of the following, the density of the core remains constant from the center to the edges?
Single mode fiber | |
Multimedia step-index fiber | |
Multimode graded index fiber | |
Single mode step index fiber |
Question 45 Explanation:
Multimode Step-index: In multimode step-index fiber, the density of the core remains constant from the center to the edges. A beam of light moves through this constant density in a straight line until it reaches the interface of the core and the cladding
Question 46 |
A device which converts BCD to seven segment is called____
Encoder | |
Decoder | |
Decoder | |
Demultiplexer |
Question 46 Explanation:
A Display Decoder is a combinational circuit which decodes and n-bit input value into a number of output lines to drive a display
Question 47 |
Additional information sent when an exception is thrown may be placed in___
Additional information sent when an exception is thrown may be placed in___
| |
The function that caused the error | |
The catch block
| |
An object of the exception class
|
Question 47 Explanation:
→ A catch block is where you handle the exceptions, this block must follow the try block.
→ A single try block can have several catch blocks associated with it. You can catch different exceptions in different catch blocks.
→ When an exception occurs in try block, the corresponding catch block that handles that particular exception executes
→ A single try block can have several catch blocks associated with it. You can catch different exceptions in different catch blocks.
→ When an exception occurs in try block, the corresponding catch block that handles that particular exception executes
Question 48 |
When a mobile telephone physically moves from one cell to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as____
Handoff | |
Mobile routing | |
Mobile switching
| |
Cell Switching
|
Question 48 Explanation:
→ A handoff refers to the process of transferring an active call or data session from one cell in a cellular network to another or from one channel in a cell to another.
→ A well-implemented handoff is important for delivering uninterrupted service to a caller or data session user.
→ In satellite communications it is the process of transferring satellite control responsibility from one earth station to another without loss or interruption of service.
→ A well-implemented handoff is important for delivering uninterrupted service to a caller or data session user.
→ In satellite communications it is the process of transferring satellite control responsibility from one earth station to another without loss or interruption of service.
Question 49 |
Which of the following expression results in zero?
(0+0+1)(0+0+1) | |
(0+0+0)(0+1+1) | |
(1+0+0)(1+1+1) | |
(0+1+0)(1+0+1) |
Question 49 Explanation:
→ The second option gives zero value.
→ (0+0+0) gives the value 0
→ (0+1+1) gives either 0 or 1.
→ (0+0+0)(0+1+1) gives ), as product of 0 with anything is 0
→ (0+0+0) gives the value 0
→ (0+1+1) gives either 0 or 1.
→ (0+0+0)(0+1+1) gives ), as product of 0 with anything is 0
Question 50 |
Which of the following is a special effect in motion pictures and animation that changes one image/picture into another through a seamless transition?
Modeling | |
Morphing | |
Animating | |
Wrapping |
Question 50 Explanation:
→ Morphing is a special effect in motion pictures and animations that changes (or morphs) one image or shape into another through a seamless transition.
→ Morphing means stretching or as part of a fantasy or surreal sequence.
→ Morphing means stretching or as part of a fantasy or surreal sequence.
Question 51 |
______ variables are not reinitialized each time visual basic invokes a procedure and thus retains or preserves value even when a procedure ends
Static | |
Dynamic | |
Virtual | |
Private |
Question 51 Explanation:
→ Static variable is a variable which has been allocated “statically” so that it’s lifetime extends across the entire run of the program.
→ Thus, static variable continues to exist even after the block in which they are defined terminates. Furthermore, you can initialize a static variable during it’s declaration but this must be a constant expression.
→ Thus, static variable continues to exist even after the block in which they are defined terminates. Furthermore, you can initialize a static variable during it’s declaration but this must be a constant expression.
Question 52 |
Which of the following is not correct in C++?
x-=2; is the same as x=x-2; | |
x*=2; is the same as x=x*2; | |
x%=2; is the same as x=x/2; | |
x/=2; is the same as x=x/2; |
Question 52 Explanation:
→ x%=2; is not the same as x=x/2;
→ x%=2; is the same as x=x%2;
→ x%=2; is the same as x=x%2;
Question 53 |
Consider the following Java code segment:
Public class while /*line1*/
{
Public void loop()
{
int x=0;
while(1) /*line 6*/
{
system.out.println(“x plus one is”+(x+1));
}
}
}
Which of the following is true?
Public class while /*line1*/
{
Public void loop()
{
int x=0;
while(1) /*line 6*/
{
system.out.println(“x plus one is”+(x+1));
}
}
}
Which of the following is true?
There is a syntax error in line -1
| |
There are syntax errors in,line -1 and line -6 | |
There is a syntax error in line -6 | |
No syntax error |
Question 53 Explanation:
We can’t used the keyword “while” as class name.So it will give syntax error.
Question 54 |
The Communication between the components in a microcomputer takes place via the address and ____
I/O bus | |
Data bus | |
Address bus | |
Control lines |
Question 54 Explanation:
→ A data bus is a system within a computer or device, consisting of a connector or set of wires, that provides transportation for data.
→ A data bus is also called a processor bus, front side bus, frontside bus or backside bus—is a group of electrical wires used to send information (data) between two or more components.
→ A data bus is also called a processor bus, front side bus, frontside bus or backside bus—is a group of electrical wires used to send information (data) between two or more components.
Question 55 |
Which of the following statements is incorrect?
Data definition languages is used by DBA and database designers to define schemas | |
Storage definition language is used to specify the internal schema. | |
Storage definition language is used to insert,delete and update data | |
Data definition languages is used to retrieve data from the database |
Question 55 Explanation:
→ A database system provides a data definition language to specify the database schema and a data manipulation language to express database queries and updates.
→ Storage definition language is to specify the internal schema. This language may specify the mapping between two schemas.
→ A data manipulation language (DML) is a computer programming language used for adding (inserting), deleting, and modifying (updating) data in a database.
→ Storage definition language is to specify the internal schema. This language may specify the mapping between two schemas.
→ A data manipulation language (DML) is a computer programming language used for adding (inserting), deleting, and modifying (updating) data in a database.
Question 56 |
Given the list of tasks in Col-A and list of data structure in Col-B. Identify the best match


(i) (iii) (ii)
| |
(ii) (i) (iii) | |
(iii) (ii) (i) | |
(ii) (iii) (i) |
Question 56 Explanation:
→ Recursion is implemented stack
→ Scheduling can be implemented using Queue.
→ The inorder traversal of binary search gives sorting order.
→ Scheduling can be implemented using Queue.
→ The inorder traversal of binary search gives sorting order.
Question 57 |
In the context of while loop do while loop in C++, which of the following is not true?
Both the loops are repetitive in nature | |
Boh are conditional loops | |
Both will be executed at least once | |
Both are terminated when the condition become false |
Question 57 Explanation:
Do-while will execute at least one time while loop will execute minimum of zero times.
Question 58 |
In single-precision, double-precision and extended-precision representation of floating point numbers, as defined by ANSI/IEEE standard 754-1985, the no.of bits used are____ respectively.
32,64 and 80 | |
32,64 and 128 | |
16,32 and 64 | |
16,32 and 80 |
Question 58 Explanation:

Extended precision, the third format, is usually an 80-bit word, with 1 bit sign, 15 bit exponent and 64 bit significand, with leading bit of a normalized number not hidden
Question 59 |
Parent class of all java classes is____
Java.lang.system
| |
Java.lang.object | |
Java.lang.class | |
Java.lang,reflect.object |
Question 59 Explanation:
public class Object:
Class Object is the root of the class hierarchy. Every class has Object as a superclass. All objects, including arrays, implement the methods of this class.
Class Object is the root of the class hierarchy. Every class has Object as a superclass. All objects, including arrays, implement the methods of this class.
Question 60 |
Which of the following method is used to refresh the webpage in javascript?
window.reload() | |
location.reload() | |
window.refresh() | |
page.refresh() |
Question 60 Explanation:
→ Reload the current document:
→ location.reload();
→ The reload() method is used to reload the current document.
→ The reload() method does the same as the reload button in your browser.
→ By default, the reload() method reloads the page from the cache
→ location.reload();
→ The reload() method is used to reload the current document.
→ The reload() method does the same as the reload button in your browser.
→ By default, the reload() method reloads the page from the cache
Question 61 |
In Vb, to change the size of a dynamic array,___ is used at the point in the code where you want it to change
Dim | |
Redim | |
Chdim | |
Bydim |
Question 61 Explanation:
Re-allocates storage space for an array variable.
Syntax:
ReDim [ Preserve ] name(boundlist) [ , name(boundlist) [, ... ] ]
Syntax:
ReDim [ Preserve ] name(boundlist) [ , name(boundlist) [, ... ] ]
Question 62 |
Consider the code segment written below in C++:
if (count<10) //if#1
if((count%4)==2) //if#2
count<<”condition:white\n”;
else //(indentation is wrong)
count<<”condition is:tan\n”;
There are 2 if statements and one else. To which if, the else statement belong?
if (count<10) //if#1
if((count%4)==2) //if#2
count<<”condition:white\n”;
else //(indentation is wrong)
count<<”condition is:tan\n”;
There are 2 if statements and one else. To which if, the else statement belong?
It belongs to if#1 | |
It belongs to if#2 | |
It belongs to both the if statements | |
It is independent |
Question 62 Explanation:
→ The else statement belongs its immediate previous if statement.
→ If there are no braces ({}) following the if statement then only the next immediate statement belongs to the if statement. The same thing is true for else and else-if clause
→ If there are no braces ({}) following the if statement then only the next immediate statement belongs to the if statement. The same thing is true for else and else-if clause
Question 63 |
An interface that provides I/o transfer of data directly to and from the memory unit and the peripheral is termed as_____
DDA | |
Serial Interface | |
BR | |
DMA |
Question 63 Explanation:
Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations
Question 64 |
The _____attribute of <TABLE> tag is used to control the distance between the data in a cell and the boundaries of the cell.
Colspan | |
Rowspan | |
Cellpadding | |
cellspacing |
Question 64 Explanation:
Cellpadding:
Cellpadding is used to specify the distance between a cell contents and its boundaries.Cellpadding is an important formatting feature of web document.cellpadding used to specify the space between edges of the cells it also used in cell contents.
Cellspacing:
Cellspacing is an important attribute of < Table > tag in HTML.Is the property which increases the space between the cells of the table. you can see that Cellspacing increases the border of the table.its default value is zero
Cellpadding is used to specify the distance between a cell contents and its boundaries.Cellpadding is an important formatting feature of web document.cellpadding used to specify the space between edges of the cells it also used in cell contents.
Cellspacing:
Cellspacing is an important attribute of < Table > tag in HTML.Is the property which increases the space between the cells of the table. you can see that Cellspacing increases the border of the table.its default value is zero
Question 65 |
For which of the following tasks, stack is not suitable data structure?
(a) Binary search in an array
(b) Breadth first search
(c) Implementing function calls
(d) Process scheduling
(a) Binary search in an array
(b) Breadth first search
(c) Implementing function calls
(d) Process scheduling
(b) and (d) | |
(b) and (c) | |
(a) and (c) | |
(c) and (d) |
Question 65 Explanation:
Breadth first search and Process scheduling can be implemented by using Queue.
Binary search can be implemented by using recursion. So Stack is suitable for implementing function calls.
Binary search can be implemented by using recursion. So Stack is suitable for implementing function calls.
Question 66 |
Which of the following is correct?
In asymmetric multiprocessing, the processor are peers. | |
In symmetric multiplexing, the processors are placed symmetrically on the motherboard | |
Clustered systems are used for high performance computing | |
All multiprocessor systems are multicore systems |
Question 66 Explanation:
→ The clustered systems are a combination of hardware clusters and software clusters. The hardware clusters help in sharing of high performance disks between the systems. The software clusters makes all the systems work together.
→ Each node in the clustered systems contains the cluster software. This software monitors the cluster system and makes sure it is working as required. If any one of the nodes in the clustered system fail, then the rest of the nodes take control of its storage and resources and try to restart.
→ asymmetric multiprocessing using master-slave strategy but symmetric multiprocessing using peer to peer.
→ In symmetric multiplexing, the processors are not placed symmetrically on the motherboard.
→ Each node in the clustered systems contains the cluster software. This software monitors the cluster system and makes sure it is working as required. If any one of the nodes in the clustered system fail, then the rest of the nodes take control of its storage and resources and try to restart.
→ asymmetric multiprocessing using master-slave strategy but symmetric multiprocessing using peer to peer.
→ In symmetric multiplexing, the processors are not placed symmetrically on the motherboard.
Question 67 |
File operations that manipulate the ‘open-count’ maintained for each entry in open file table include:
Open,write | |
Read,write | |
Write,close | |
Open,close |
Question 67 Explanation:
The open file table also has an open count associated with each file to indicate how many processes have the file open. Each close() decreases this open count, and when open count reaches zero, the file no longer in use, and file’s entry is removed from the open file table.
Question 68 |
Given an instance of the relation R(ABCD).
Which of the following functional dependencies hold?

Which of the following functional dependencies hold?
{AB} → D and D → A | |
{AB → D and B → D | |
{AB} → C and B → C | |
{AB} → D and A → D |
Question 68 Explanation:
Rules for determining functional dependency hold or not :
→ If LHS of a functional dependency is not repeating any value then you. you can say that LHS of a functional dependency is determining RHS of a functional dependency.
→ If LHS of a functional dependency is repeating then see the value of RHS. If values of RHS are same for repeated value of LHS then you can say that LHS of a functional dependency is determining RHS of a functional dependency else not determining.
Now if you see the given options then only option(C) is satisfying above two rules.
→ If LHS of a functional dependency is repeating then see the value of RHS. If values of RHS are same for repeated value of LHS then you can say that LHS of a functional dependency is determining RHS of a functional dependency else not determining.
Now if you see the given options then only option(C) is satisfying above two rules.
Question 69 |
The simplified form of the boolean expression:
(AB’(C+BD)+A’B’)C is:
B’C | |
A’B’C | |
AB’C | |
A’BC |
Question 69 Explanation:
(AB’(C+BD)+A’B’)C
(AB'C + AB'BD + A'B')C
(AB'C + A'B')C
AB'C + A'B'C
(A+A') B'C
B'C
(AB'C + AB'BD + A'B')C
(AB'C + A'B')C
AB'C + A'B'C
(A+A') B'C
B'C
Question 70 |
When a circular queue is implemented in an array of the following condition holds when there is only one element in the queue?
Front=rear=null | |
Front=Rear!=null | |
Front=Rear+1 | |
Front=Rear-1 |
Question 70 Explanation:
Front and rear initially points to same location and once rear is incremented by 1 it means element is added and front is used to delete so here we don't need front for 1 element in the queue.
Question 71 |
In a computer system, memory mapped access takes 100 nanoseconds when a page is found in TLB. In case the page is not TLB, it takes 400 nanoseconds to access. Assuming a hit ratio of 80%, the effective access time is:
120ns | |
160ns | |
200ns | |
500ns |
Question 71 Explanation:
EAT := TLB_miss_time * (1- hit_ratio) + TLB_hit_time * hit_ratio
TLB time = 100ns,
Memory time = 400ns
Hit Ratio= 80%
E.A.T. = (0.80)*(500)+0.20*900
0.8*100+.2*400=160
TLB time = 100ns,
Memory time = 400ns
Hit Ratio= 80%
E.A.T. = (0.80)*(500)+0.20*900
0.8*100+.2*400=160
Question 72 |
The producer and consumer processes share the following variables:
int n;
Semaphore M=1
Semaphore E=n
Semaphore F=0
The consumer process must execute ______ and before removing an item from buffer.
int n;
Semaphore M=1
Semaphore E=n
Semaphore F=0
The consumer process must execute ______ and before removing an item from buffer.
signal(M), signal(F) | |
signal(M), wait(F) | |
Signal(F), wait(M) | |
wait(F), wait(M) |
Question 72 Explanation:
F is given 0 then no items would be produced
→ Two standard operations, wait and signal are defined on the semaphore.
→ Entry to the critical section is controlled by the wait operation and exit from a critical region is taken care by signal operation.
→ The manipulation of semaphore (S) takes place as following:
→ The wait command P(S) decrements the semaphore value by 1. If the resulting value becomes negative then P command is delayed until the condition is satisfied.
→ The V(S) i.e. signals operation increments the semaphore value by 1.
→ The wait, signal operations are also called P and V operations.
→ Two standard operations, wait and signal are defined on the semaphore.
→ Entry to the critical section is controlled by the wait operation and exit from a critical region is taken care by signal operation.
→ The manipulation of semaphore (S) takes place as following:
→ The wait command P(S) decrements the semaphore value by 1. If the resulting value becomes negative then P command is delayed until the condition is satisfied.
→ The V(S) i.e. signals operation increments the semaphore value by 1.
→ The wait, signal operations are also called P and V operations.
Question 73 |
Which of the following is not true in case of public inheritance in c++?
Each public member in the base class is public in the derived class
| |
Each protected member in the base class is protected in the derived class | |
Each private member in the base class remains private in the base class | |
Each private member in the base class remains private in the derived class |
Question 73 Explanation:
→ Public Inheritance − When deriving a class from a public base class, public members of the base class become public members of the derived class and protected members of the base class become protected members of the derived class.
→ A base class's private members are never accessible directly from a derived class, but can be accessed through calls to the public and protected members of the base class. We can summarize the different access types according to - who can access them in the following way −

→ A base class's private members are never accessible directly from a derived class, but can be accessed through calls to the public and protected members of the base class. We can summarize the different access types according to - who can access them in the following way −

Question 74 |
The elements of the triangular array are stored as a vector in the A[1,1], A[2,1],A[2,2],A[3,1]
A[3,2], A[3,3]..A[n,n]
Assuming that A[1,1] is stored at location 1, addressing function for A[i,j] is given by;
(i-1)/2 +j | |
((i-1)*i)/2 +j | |
(i*i)/2 +j | |
(i*j-1)/2 |
Question 74 Explanation:
This is lower triangular matrix. For 4,4 we need to cross 4 rows and 4 columns. So, most suitable answer is Option C.
There are 74 questions to complete.