NIC-NIELIT Scientist-B 2020

Question 1
Directions for question number 1 and 2: Study the information below and answer questions based on it. Five of India’s leading models are posing for a photograph promoting “World Peace and Understanding”. But then, Sachin Malhotra the photographer is having a tough time getting them to stand in a straight line, because Natasha refuses to stand next to Jessica since Jessica had said something about her in a leading gossip magazine. Rachel and Anna want to stand together because they are good friends. Ria on the other hand cannot get along well with Rachel, because there is some talk about Rachel scheming to get a contract already awarded to Ria. Anna believes her friendly astrologer who has asked her to stand at the extreme right for all group photographs. Finally, Sachin managed to pacify the girls and got a beautiful picture of five beautiful girls smiling beautifully in a straight line, promoting world peace. Q1: If Natasha stands at the extreme left, who is standing second from left?
A
Cannot say
B
Jessica
C
Rachel
D
Ria
       Reading-Comprehension       Reading-Comprehension
Question 2
Directions for question number 1 and 2: Study the information below and answer questions based on it. Five of India’s leading models are posing for a photograph promoting “World Peace and Understanding”. But then, Sachin Malhotra the photographer is having a tough time getting them to stand in a straight line, because Natasha refuses to stand next to Jessica since Jessica had said something about her in a leading gossip magazine. Rachel and Anna want to stand together because they are good friends. Ria on the other hand cannot get along well with Rachel, because there is some talk about Rachel scheming to get a contract already awarded to Ria. Anna believes her friendly astrologer who has asked her to stand at the extreme right for all group photographs. Finally, Sachin managed to pacify the girls and got a beautiful picture of five beautiful girls smiling beautifully in a straight line, promoting world peace. Q2: If Anna’s astrologer tells her to stand second from left and Natasha decides to stand second from right, then who is the girl standing at the extreme right?
A
Rachel
B
Jessica
C
Ria
D
None of the options
       Reading-Comprehension       Reading-Comprehension
Question 2 Explanation: 
Option C will be most appropriate among the given options.
Question 3
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000

Q3. If in the year 2018, population of F is increased by 10% and population of B is increased by 12% as compared to the previous year, then ______ is the ratio of population of F and B in 2017.
A
42 : 55
B
62 : 55
C
42 : 11
D
44 : 5
       Data-Interpretation       Data-Interpretation-Ratio
Question 3 Explanation: 
F 2018 = (15/100)*3276000
B 2018 = (20/100)*3276000
F increased by 10% in 2018.
B increases by 12% in 2018.
So, F 2017→ 1.1 times= 15*32760
B 2017→ 1.12 times = 20*32760
F 2017 : B2017 = [(15*3276)*10]/11 : [(20*32760)*100]/112
= 42:55
Question 4
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000

Q4. _______ is the percentage of total number of males in F, B and D together to the total population of all the given states.
A
24%
B
17.5%
C
28.5%
D
29.5%
       Data-Interpretation       Data-Interpretation-Percentages
Question 4 Explanation: 
Let population=X
Males of F in 2018 = (⅗)*15*(X/100) = 9X/100
Males of B in 2018 = (¾)*20*(X/100) = 15X/100
Males of D in 2018 = (⅜)*12*(X/100)=4.5X/100
Total=(28.5*X)/100
X=28.5%
Question 5
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)

Total population of the given States = 3276000

Q5. The number of males in F in the year 2018 is ______.
A
294650
B
294840
C
301470
D
301200
       Data-Interpretation       Data-Interpretation-Addition
Question 5 Explanation: 
Males of F in 2018 = (9X/100) = (9/100)*3276000
=10’s digit is 4
So, Option-B is correct.
Question 6
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)

Total population of the given States = 3276000

Q6. _____ is the ratio of the number of females in G to the number of females in C.
A
16 : 5
B
16 : 7
C
15 : 11
D
15 : 14
       Data-Interpretation       Data-Interpretation-Ratio
Question 6 Explanation: 
=327600*9*(4/7) : 327600*8*(3/5)
=(9*4)/7 * 5/(8*3)
= 15:14
Question 7
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)

Total population of the given States = 3276000

Q7. _____ is the total number of non-educated people in A and B in 2018.

A
1276040
B
1032170
C
1081550
D
1161160
       Data-Interpretation       Data-Interpretation-Addition
Question 7 Explanation: 
Non educated people= A 2018 + B 2018
= (7/9) * (25X/100) + ⅘ * (20X / 100) * 9/9
= 1161160
Question 8
The admission ticket for an Art Gallery bears a password which is changed after every clock hour based on set of words chosen for each day. The following is an illustration of the code and steps of rearrangement for subsequent clock hours.
The Time is 9 a.m. to 3 p.m. Day’s first password:
First Batch - 9 a.m. to 10 a.m.
is not ready cloth simple harmony burning
Second Batch - 10 a.m. to 11 a.m.
ready not is cloth burning harmony simple
Third Batch - 11 a.m. to 12 noon
cloth is not ready simple harmony burning
Fourth Batch - 12 noon to 1 p.m.
not is cloth ready burning harmony simple
Fifth Batch - 1 p.m. to 2 p.m.
ready cloth is not simple harmony burning and so on.
If the password for 11 a.m. to 12 noon was - “soap shy miss pen yet the she”, what was the password for the First Batch?
A
pen miss shy soap she the yet
B
shy miss pen soap yet the she
C
soap pen miss shy she the yet
D
miss shy soap pen she the yet
Question 8 Explanation: 
cloth is not ready simple harmony burning
Soap shy miss pen yet the she
is not ready cloth simple harmony burning
shy miss pen soap yet the she
Question 9
There are 6 boxes numbered 1, 2, …...., 6. Each box is to be filled up either with a red or a green ball in such a way that at least 1 box contains a green ball and the boxes containing green balls are consecutively numbered. The total number of ways in which this can be done is:
A
18
B
19
C
20
D
21
Question 9 Explanation: 

1G 5R → 6 ways
2G 4R → 5 ways
3G 3R → 4 ways
4G 2R → 3 ways
5G 1R → 2 ways
6G 0R → 1 way
Total = 21 ways
Question 10
If a cube with length, height and width equal to 10 cm, is reduced to a smaller cube of height, length and width of 9 cm then reduction in volume is:
A
172 cm2
B
729 cm2
C
271 cm2
D
None of the options
Question 10 Explanation: 
= 103 - 93
= 271 cm3
Question 11
If 09/12/2001 (DD/MM/YYYY) happens to be Sunday, then 09/12/1971 would have been a:
A
Wednesday
B
Tuesday
C
Saturday
D
Thursday
Question 11 Explanation: 
In 30 years there are 22 non leap years and 8 leap years are there.
for every non leap year 1 odd day. and for leap year 2 odd days.
total no.of odd days = (22*1) + ( 8 * 2) = 38.
odd days = 38/7 = 3.
sunday - 3 = Thursday.
Note: Might be you did sunday + 3 = wednesday. ( here we need to calculate 30 day previous day )
Question 12
Select a suitable figure from the four alternatives that would complete the figure matrix.
A
B
C
D
Question 13
What is the value of k for which the following system of equations has no solution:
2x - 8y = 3 and kx + 4y = 10
A
-2
B
1
C
-1
D
2
Question 13 Explanation: 
2X - 8Y = 3
KX + 4Y = 10
(a1 / a2) = (b1 / b2) ≠ (c1/c2)
2/K = (-8/4)
K= -1
Question 14
A player rolls a die and receives the same number of rupees as the number of dots on the face that turns up. What should the player pay for each roll if he wants to make a profit of one rupee per throw of the die in the long run?
A
₹ 2.50
B
₹ 2
C
₹ 3.50
D
₹ 4
Question 15
Gopal went to a fruit market with certain amount of money. With this money he can buy either 50 oranges or 40 mangoes. He retains 10% of the money for taxi fare. If he buys 20 mangoes, then the number of oranges he can buy with balance amount is:
A
25
B
20
C
18
D
6
Question 15 Explanation: 
50 0range = 40 Mangoes = X
Orange = X/50
Mangoes = X/40
→ X - 0.1 X - 20 M
→ X - 0.1 X - (20*(X/40))
→ 0.4 X
→ 0.4 * 50 Oranges
= 20 Oranges
Question 16
Number of letters repeated in the given word ‘MEASUREMENTS’ are indicated in front of each alternative. Identify the correct alternative.
A
M2E2A2S2U1R1N1T1
B
M2E3A1S1U2R1N2T1
C
M2E2A1S2U1R1N1T1
D
M2E3A1S2U1R1N1T1
Question 16 Explanation: 
Verify the options by counting the number of characters and matching with the subscript of the every character.
M2E3A1S2U1R1N1T1
Question 17
If X says that his mother is the only daughter of Y’s mother, then how is Y related to X?
A
Brother
B
Son
C
Uncle
D
Father
Question 18
A solid cube of each side 8 cm, has been painted red, blue and black on pairs of opposite faces. It is then cut into cubical blocks of each side 2 cm. How many cubes have no face painted?
A
0
B
4
C
8
D
12
Question 18 Explanation: 
8 → 3 face painted
24 → 2 face painted
24 → 1 face painted
8 → No face painted
Question 19
Find out the alternative figure which contains the given figure as its part.
A
B
C
D
Question 20
Identify the figure that completes the pattern.
A
B
C
D
Question 21
A university library budget committee must reduce exactly five of eight areas of expenditure - I, J, K, K, M, N, O and P - in accordance with the following conditions:
If both I and O are reduced, P is also reduced.
If L is reduced, neither N nor O is reduced.
If M is reduced, J is not reduced.
Of the three areas J, K and N exactly two are reduced.
If both K and N are reduced, which one of the following is a pair of areas neither of which could be reduced?
A
I, L
B
J, L
C
J, M
D
I, J
Question 21 Explanation: 

L i X reduced, Neither N or O are reduced.
K, N are reduced → J can’t be red.
So, the correct answer is J and L
Question 22
Which of these statements reflects a contrast between two flowers?
A
This tulip is as colourful as a rose.
B
This tulip does not smell as bad as a daffodil.
C
This tulip turns towards light just like sunflower.
D
This tulip is grown in bunches, like a lotus.
Question 23
Choose the missing terms out of the given alternatives.
EJO, TYD, INS, XCH, …….?
A
NRW
B
MRW
C
MSX
D
NSX
Question 23 Explanation: 
Question 24
Choose which of the following will be sufficient to find: What time did the bus leave today?
Statements:
The bus normally leaves on time.
The scheduled departure is at 12:30.
A
I alone is sufficient while II alone is not sufficient
B
II alone is sufficient while I alone is not sufficient
C
Either I or II is sufficient
D
Neither I nor II is sufficient
Question 25
In the following question below are given three statements followed by three conclusions numbered I, II and III. You have to take the two statements to be true even if they seem to be at variance from the commonly known facts. Read all the conclusions and then decide which of the given conclusions logically follow from the two given statements, disregarding commonly known facts.
Statements:
Some pigeons are eagles.
All eagles are sparrows.
Some sparrows are not pigeons.
Conclusions:
Some sparrows are pigeons.
All pigeons are sparrows.
All eagles are pigeons.
A
Only I follows
B
Only II follows
C
Only III follows
D
Both I and III follows
Question 25 Explanation: 
Question 26
Find the odd one out in the given series:
ZA, RS, DE, JK, PR, LM, YZ, NO
A
JK
B
LM
C
ZA
D
PR
Question 26 Explanation: 
Question 27
In an office, 30% of the employees were women and 70% of the employees were above the age of 40 years, out of which 60% are men. Find the percentage of women employees who are above 40 years out of the total number of women employees.
A
96%
B
93.33%
C
70.44%
D
80.66%
Question 27 Explanation: 
30% Employee → Women
70% Employee → greater than 40 → 60% Men AND 40% Women
70% → Men
Percentage of women( > 40 out of total women) = [(0.4*0.7Employee)/0.3Employee]*100
= (28/3)*10
= 93.33%
Question 28
What is the next number
16, 30, 54, 88, 132
A
186
B
188
C
190
D
206
Question 28 Explanation: 
Question 29
Three squares are there as shown on the three sides of the triangle; find the area of the triangle from the respective areas of the squares.
A
15√5
B
12√5
C
2√5
D
1
Question 29 Explanation: 

S=(a+b+c)/2
=(7+8+9)/2
=12
√(S(S-a)(S-b)(S-c))
√(12(5)(4)(3)
12√5
Question 30
Two tapes A and B can fill a tank in 12 minutes and 15 minutes respectively. The tank can be emptied by a third tap C in 6 minutes. If A and B are kept open for 5 minutes in the beginning and then C is opened along with A and B being kept open, the time taken to empty the tank is:
A
60 minutes
B
45 minutes
C
30 minutes
D
75 minutes
Question 30 Explanation: 
A → 12 min = 1/12
B → 15 min = 1/15
C → 6 min = -(⅙)
=((1/12)+(1/15))*5
=((15+12)/(12*15))*5
=27/36


= (1/12) + (1/15) - (⅙)
= (15+12-(15*2))/15*12
= -3 / (15*12)
= -(1/60)
1 Tank → 60 min
¾ Tank → 45 min
Question 31
In a group of 24 members, each member drinks either tea or coffee or both. If 15 of them drink tea and 18 drink coffee, find the probability that a person selected from the group drinks both tea and coffee.
A
1/8
B
3/8
C
5/24
D
None of the options
Question 31 Explanation: 
n(μ)=24
n(T)=15
n(C)=18
n(T U C) = n(T) + n(C) - n(T ∩ C)
24 = 15+18-n(T∩C)
n(T∩C)=33-24
=9
n(T ∩ C) / n(μ) = 9/24
=3/8
Question 32
Arjun by car takes double the time taken by bus to travel from Delhi to Agra. What is the Speed of the Bus if the Speed of Car is 40 km/hr?
A
40 km/hr
B
60 km/hr
C
80 km/hr
D
30 km/hr
Question 32 Explanation: 
Tcar = 2TBus Dcar = DBus Scar = DBus / 2TBus = SBus / 2 SBus = 2 Scar = 2 * 40 = 80 kmph
Question 33
Directions for question number 33 to 35:
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.

Q33. How is B related to F?
A
Sister
B
Grandmother
C
Wife
D
Data inadequate
Question 33 Explanation: 

B is grandmother of F
Question 34
Directions for question number 33 to 35:
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.
Q34. How is F related to A?
A
Brother
B
Daughter
C
Son
D
None of the options
Question 34 Explanation: 

F is not related to A
Question 35
Directions for question number 33 to 35:
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.
Q35. Which of the following pairs is one of the married couples?
A
E - F
B
B - D
C
E - B
D
A - F
Question 35 Explanation: 

The pairs are E-B and D-C
Question 36
Directions for question number 36 to 37:
Consists of a question and two statements, labelled (1) and (2), in which certain data are given. You have to decide whether the data given in the statements are sufficient for answering the question. Using the data given in the statements, plus your knowledge of mathematics and everyday facts.
Q36. How is R related to S?
Statement (1):
T, the wife of R’s only brother C does not have any siblings.
Statement (2):
S is T’s brother-in-law’s wife.
A
Only Statement (1) is required for answering the question
B
Only Statement (2) is required for answering the question
C
Both Statement together are required to answer the question
D
Answer cannot be ascertained with the given information
Question 37
Directions for question number 36 to 37:
Consists of a question and two statements, labelled (1) and (2), in which certain data are given. You have to decide whether the data given in the statements are sufficient for answering the question. Using the data given in the statements, plus your knowledge of mathematics and everyday facts.
Q37. What is the Standard Deviation (SD) of the four numbers A, B, C, D?
Statement (1):
The sum of A, B, C and D is 24.
Statement (2):
The sum of the squares of A, B, C and D is 224.
A
Only Statement (1) is required for answering the question
B
Only Statement (2) is required for answering the question
C
Both Statement together are required to answer the question
D
Answer cannot be ascertained with the given information
Question 37 Explanation: 
Standard Deviation of A,B,C,D
I) Σ(A,b,C,D) = 24
II) A2 + B2 + C2 + D2 = 224
μ = 24/4 = 6
S.D = √(Σ(X-μ)2)/4
= √(A2 + μ2 - 2Aμ + B2 + μ2 -2μB + C2 + μ2 - 2μC + D62 + μ2 - 2μD) / 4
= √(A2 + B2 + C2 + D2 + 4μ2 - 2μ ( A+B+C+D)/4)
= √(224 + 4 * 24^2 - 2*24 (4*24))/4
Combining I and II
= √-808
Question 38
Directions for question number 38 to 40:
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q38. Assertion (A):
Ventilators are provided near the roof.
Reason (R):
Conduction takes place better near the roof.
A
I
B
II
C
III
D
IV
Question 39
Directions for question number 38 to 40:
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q39. Assertion (A):
Salt is added to cook food at higher altitudes.
Reason (R):
Temperature is lower at higher altitudes.
A
I
B
II
C
III
D
IV
Question 40
Directions for question number 38 to 40:
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q40. Assertion (A):
Moon cannot be used as a satellite for communication.
Reason (R):
Moon does not move in the equatorial plane of the Earth.
A
I
B
II
C
III
D
IV
Question 41
Directions - Question number 41 and 42 are based on the diagram given below: In a class there are 40 students who play at least one game out of Football, Cricket and Badminton.

Q41. What percentage of students play only one game?
A
50%
B
60%
C
65%
D
70%
Question 41 Explanation: 

X(μ)= 40
X(μ)= 9+6+8+4+2+7+X(C ∩ F ∩ B)
40= 36 + X(C ∩ F ∩ B)
X(C ∩ F ∩ B) = 40=36
= 4
According to given data, Percentage of students who play only one game.
= [X(only C) + X(only F) + X(only B)] / X(μ)
= [(9 + 8 +7)/40]*100
= (24/40)*100
= 60%
Question 42
Directions - Question number 41 and 42 are based on the diagram given below: In a class there are 40 students who play at least one game out of Football, Cricket and Badminton.

Q42. What percentage of students play all the three games?
A
4%
B
5%
C
8%
D
10%
Question 42 Explanation: 

X(μ)= 40
X(μ)= 9+6+8+4+2+7+ X(C ∩ F ∩ B)
40= 36 + X(C ∩ F ∩ B)
X(C ∩ F ∩ B) = 40=36
= 4
According to given data, Percentage of X(C ∩ F ∩ B)
= [ X(C ∩ F ∩ B) / X(μ) ]*100
= (4/40)*100
=10%
Question 43
Which of the following machine model can be used in a necessary and sufficient sense for lexical analysis in modern computer language?
A
Deterministic Push down Automata
B
Finite Automata
C
Non-Deterministic Finite Automata
D
Turing Machine
       Compiler-Design       Phases-of-Compilers
Question 43 Explanation: 
Lexical Analysis is implemented by using finite automata or Regular Expression
Question 44
58000 LOC gaming software is developed with effort of 3 person-year. What is the productivity of person-month?
A
1.9 KLOC
B
1.6 KLOC
C
4.8 KLOC
D
4.2 KLOC
       Software-Engineering       LOC
Question 44 Explanation: 
Productivity= KLOC/ effort
Productivity=58/12*3
=1.61 KLOC (approximately)
Question 45
An instance of relational schema R(A, B, C) has distinct values of A including NULL values. Which one of the following is true?
A
A is a candidate key
B
A is not a candidate key
C
A is a primary key
D
Both "A is a candidate key" and "A is a primary key"
       Database-Management-System       Candidate-key
Question 45 Explanation: 
Candidates key can take up NULL values so A should be true.
Question 46
The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is:
A
B-Tree File
B
Hashed File
C
Indexed File
D
Sequential File
       Database-Management-System       Databases
Question 46 Explanation: 
Hash File organization method is the one where data is stored at the data blocks whose address is generated by using a hash function.
Question 47
Debugger is a program that:
A
Allows to examine and modify the contents of registers
B
Allows to set breakpoints, execute a segment of program and display contents of register
C
Does not allow execution of a segment of program
D
All the options
       Software-Engineering       Debugger
Question 47 Explanation: 
Debugger is a program that allows you to set breakpoints, execute a segment of a program and display contents of a register.
Question 48
Which of the following Page Replacement Algorithm suffers from the belady’s anomaly?
A
LRU
B
Optimal Page Replacement
C
FIFO
D
Both LRU and FIFO
       Operating-Systems       Page-Replacement-algorithm
Question 48 Explanation: 
FIFO Page Replacement Algorithm suffers from the belady’s anomaly.
Question 49
Binary search tree contains the values 1, 2, 3, 4, 5, 6, 7, 8. The tree is traversed in pre-order and the values are printed out. Which of the following sequences is a valid output?
A
53124786
B
53126487
C
53241678
D
53124768
       Data-Structures       Binary-search-tree
Question 49 Explanation: 
Preorder traversal means (Root, left, right)
Option D:
Let draw binary search tree for the given sequence,

After traversing through this tree we will get the same sequence.
Question 50
Most NoSQL databases support automatic ________ meaning that you get high availability and disaster recovery.
A
Processing
B
Scalability
C
Replication
D
All of the options
       Database-Management-System       SQL
Question 50 Explanation: 
→ Most NoSQL databases support automatic Replication meaning that you get high availability and disaster recovery.
→ The storage environment is essentially virtualized from the developer’s perspective.
Question 51
In an operating system, processors that are terminated but, for some reason must have its task structure in the process table are referred as _______.
A
Zombies
B
Orphans
C
Parent Process
D
Child Process
       Operating-Systems       Process-state-transition-diagram
Question 51 Explanation: 
In an operating system, processors that are terminated but, for some reason must have its task structure in the process table are referred as Zombies.
Question 52
In _______, other nodes verify the validity of the block by checking that the hash of the data of the block is less than a present number.
A
Proof of Burn
B
Proof of STAKE
C
Proof of Work
D
All of the options
       Computer-Networks       Network-Security
Question 52 Explanation: 
In Proof of Work, other nodes verify the validity of the block by checking that the hash of the data of the block is less than a preset number.
Question 53
Which of the following can be used when creating a pool of global addresses instead of the netmask command?
A
/ (slash notation)
B
prefix-length
C
no mask
D
block-size
       Computer-Networks       Network-Security
Question 53 Explanation: 
Prefix-length can be used when creating a pool of global addresses instead of the netmask command.
Question 54
Which of the following is a component of Hadoop?
A
YARN
B
HDFS
C
Map reduce
D
All of the options
       Big-Data       Hadoop
Question 54 Explanation: 
YARN, HDFS and Map reduce are components of Hadoop.
Question 55
The __________ command will show you the translation table containing all the active NAT entries.
A
show ip nat translation
B
show ip nat t1
C
show ip nat states
D
none of the options
       Computer-Networks       Subnetting
Question 55 Explanation: 
The show ip nat translation command will show you the translation table containing all the active NAT entries.
Question 56
Which of the following is correct Content-Type header that a server side script should send for SSE in HTML5?
A
Content-Type: text/event-stream
B
Content-Type: text/ application-stream
C
Content-Type: text/data-stream
D
None of the options
       Web-Technologies       HTML
Question 57
_________ is automatically loaded and operates as part of browser.
A
Add-ons
B
Plug-ins
C
Utilities
D
Widgets
       Web-Technologies       Plug-ins
Question 57 Explanation: 
Plug-ins is automatically loaded and operate as part of the browser.
Question 58
In an IPv6 header, the traffic class field is similar to the _______ field in the IPv4 header.
A
TOS field
B
Fragmentation field
C
Fast Switching
D
Option field
       Computer-Networks       IPv6
Question 58 Explanation: 
In an IPv6 header, the traffic class field is similar to the TOS field in the IPv4 header.
Question 59
_______ tells a firewall about how to reassemble a data stream that has been divided into packets.
A
The source routing feature
B
The number in the header’s identification field
C
The destination IP address
D
The header checksum field in the packet header
       Computer-Networks       Network-Security
Question 59 Explanation: 
The source routing feature provides a path address for the packet to help the firewall to reassemble the data stream that was divided into packets. After reassembling, the firewall can then filter the stream.
Question 60
Match the following:
A
(1)-(a), (2)-(b), (3)-(c), (4)-(d)
B
(1)-(d), (2)-(a), (3)-(b), (4)-(c)
C
(1)-(d), (2)-(b), (3)-(a), (4)-(c)
D
(1)-(c), (2)-(a), (3)-(b), (4)-(d)
       Software-Engineering       Types-of-Models
Question 60 Explanation: 
Waterfall model → Inflexible partitioning of the project into stages
Evolutionary model → Specifications can be Developed incrementally
Component-based software engineering → Re-usability in development
Spiral development → Explicit recognition of risk
Question 61
Which of the following property is related to a cryptographic hash functions?
A
One way Function
B
Inversible
C
Non-Deterministic
D
All of the options
       Data-Structures       Hashing
Question 61 Explanation: 
A one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here, "easy" and "hard" are to be understood in the sense of computational complexity theory, specifically the theory of polynomial time problems. Not being one-to-one is not considered sufficient for a function to be called one-way.
Question 62
In classful addressing, a large part of the available addresses are ______.
A
Dispersed
B
Blocked
C
Wasted
D
Reserved
       Computer-Networks       IP-Address
Question 62 Explanation: 
In classful addressing, a large part of the available addresses are Wasted.
Question 63
To the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be ______.
A
5
B
6
C
10
D
8
       Digital-Logic-Design       Number-Systems
Question 63 Explanation: 
To guarantee detection of up to "t" errors in all cases, the minimum Hamming distance in a block code must be dmin = t + 1.
t=5
= 5+1
=6
Question 64
Which element is used to define discrete unit of content such as a blogpost, comment and so on?
A
section
B
class
C
article
D
none of the options
       Web-Technologies       article
Question 65
On computers where there are multiple operating system, the decision to load a particular one is done by ________.
A
PCB
B
Inode
C
File Control Block
D
Boot Loader
       Operating-Systems       Boot-Loader
Question 65 Explanation: 
On computers where there are multiple operating system, the decision to load a particular one is done by Boot Loader.
Question 66
Which one of the following statements is incorrect?
A
The number of regions corresponds to the cyclomatic complexity.
B
Cyclomatic complexity for a flow graph G is V(G) = N - E + 2, where E is the number of edges and N is the number of nodes in flow graph.
C
Cyclomatic complexity for a flow graph G is V(G) = E - N + 2, where E is the number of edges and N is the number of nodes in flow graph.
D
Cyclomatic complexity for a flow graph G is V(G) = P + 1, where P is the number of predicate nodes contained in the flow graph G.
       Software-Engineering       Cyclomatic-metric
Question 66 Explanation: 
To find the cyclomatic complexity using three formulas.
The number of regions
Predicate(P) + 1 [ Predicate divides minimum 2 or more ]
E-N+2
Question 67
Which type of linked list stores the address of the header node in the next field of the last node?
A
Singly linked list
B
Circular linked list
C
Doubly linked list
D
Hashed list
       Data-Structures       Linked-List
Question 67 Explanation: 
In the last node of a list, the link field often contains a null reference, a special value is used to indicate the lack of further nodes. A less common convention is to make it point to the first node of the list; in that case, the list is said to be 'circular' or 'circularly linked'; otherwise, it is said to be 'open' or 'linear'. It is a list where the last pointer points to the first node.

In the case of a circular doubly linked list, the first node also points to the last node of the list.
Question 68
Which sorting algorithm sorts by moving the current data element past the already sorted values and repeatedly interchanges it with the preceding value until it is in its correct place?
A
Insertion sort
B
Internal sort
C
External sort
D
Radix sort
       Algorithms       Sorting
Question 68 Explanation: 
Inserting sorting algorithm sorts by moving the current data element past the already sorted values and repeatedly interchanges it with the preceding value until it is in its correct place.
Question 69
The resistance to be connected across terminal a, b for maximum power transfer to it is:
A
40Ω
B
C
2.5Ω
D
10Ω
       Data-Communication       Resisters
Question 70
Which open addressing technique is free from Clustering problems?
A
Linear probing
B
Quadratic probing
C
Double hashing
D
Rehashing
       Data-Structures       Hashing
Question 70 Explanation: 
Linear probing suffers from primary clustering and Quadratic probing suffers from secondary clustering.
Question 71
_______ is a partitioning of single physical server into multiple logical servers.
A
Virtualization
B
Private cloud
C
Hybrid cloud
D
Public cloud
       Cloud-Computing       Virtualization
Question 71 Explanation: 
Virtualization is a partitioning of a single physical server into multiple logical servers.
Question 72
The recurrence relation T(n) = 7T(n/7) + n has the solution:
A
O(n)
B
O(logn)
C
O(nlog(n))
D
O(n2)
       Algorithms       Time-Complexity
Question 72 Explanation: 
Apply masters theorem
a=7, b=7, k=1 and p=0
Case-2: a=bk
I: p>=1
=O(n logn)
Question 73
________ has a feature of remote access through which a customer can access the data from anywhere and at any time with the help of internet connection.
A
IaaS
B
PaaS
C
NaaS
D
SaaS
       Cloud-Computing       Services
Question 74
A special PCM system uses 32 channels of data, one whose purpose is an identification (ID) and synchronization. The sampling rate is 4 kHz. The word length is 5 bits. Find the serial data rate.
A
1280 kHz
B
160 kHz
C
320 kHz
D
640 kHz
       Data-Communication       PCM
Question 75
Which of the following tag is used intended for navigation in HTML5?
A
nav
B
footer
C
section
D
navigation tag
       Web-Technologies       HTML
Question 75 Explanation: 
The < nav > tag defines a set of navigation links.
Notice that NOT all links of a document should be inside a < nav > element. The < nav > element is intended only for major blocks of navigation links.
Browsers, such as screen readers for disabled users, can use this element to determine whether to omit the initial rendering of this content.
Question 76
Contiguous memory allocation having variable size partition suffers from:
A
External Fragmentation
B
Internal Fragmentation
C
Both External and Internal Fragmentation
D
None of the options
       Operating-Systems       Memory-Management
Question 76 Explanation: 
1. Each Fixed partitioning is suffer from internal as well as external fragmentation
2. Variable partitioning suffers from only external fragmentation but not internal that's why we went to the paging concept to avoid external fragmentation. External fragmentation is a more serious problem than internal fragmentation.
Question 77
Consider the algorithm that solves problems of size n by recursively solving two subproblems of size n-1 and then and then combining the solutions in constant time. Then the running time of the algorithm would be:
A
O(n)
B
O(logn)
C
O(nlogn)
D
O(n2)
E
O(2n)
       Algorithms       Time-Complexity
Question 77 Explanation: 
The given explanations are wrong.
Observe that the number of subproblems doubles n times and each subproblem uses O(1) time.
When we call two times t(n-1) then it becomes T(n-1)+T(n-1) = 2T(n-1)+1
So, the complexity is O(2n).
Question 78
Let X1, … X50 be independent random variables following N(0, 1) distribution. Let and E(Y) = a and Var(Y) = b. Then, the ordered pair (a, b) is :
A
(50, 100)
B
(50, 50)
C
(25, 50)
D
(25, 100)
       Engineering-Mathematics       Probability-and-statistics
Question 79
Calculate the modulation percentage if the modulating signal is 8 V and carrier is of 12 V?
A
50
B
67
C
150
D
33
       Data-Communication       Modulation-Index
Question 79 Explanation: 
Modulation index(m) = Vm/Vc
= (8/12)*100
= 66.66.
Question 80
The program written for binary search, calculates the midpoint of the span as mid := (Low + High)/2. The program works well if the number of elements in the list is small (about 32,000) but it behaves abnormally when the number of elements is large. This can be avoided by performing the calculation as:
A
mid := (High - Low)/2 + Low
B
mid := (High - Low + 1)/2
C
mid := (High - Low)/2
D
mid := (High + Low)/2
       Algorithms       Searching
Question 81
Identify the odd one out.
A
Amazon web service
B
Microsoft Azure
C
Google cloud Platform
D
Twitter Platform
       Latest-Technologies       Twitter-Platform
Question 81 Explanation: 
Options A, B ,and C are provides cloud services to the user but not by Twitter platform
Question 82
Considering binary relationships, possible cardinality ratios are:
A
one : one
B
1 : N
C
M : N
D
All the options
       Database-Management-System       ER-Model
Question 83
Typical time requirement for operations on queues is:
A
O(1)
B
O(n)
C
O(logn)
D
O(n2)
       Data-Structures       Queues-and-Stacks
Question 83 Explanation: 
Typical time requirement for operations on queues is O(1).
Question 84
In the congestion avoidance algorithm, the size of the congestion window increases _____ until congestion is detected.
A
Exponentially
B
Additively
C
Multiplicatively
D
Suddenly
       Computer-Networks       TCP-Congestion-Window
Question 84 Explanation: 
In the congestion avoidance algorithm, the size of the congestion window increases Additively until congestion is detected.
Question 85
______ possible labels are allowed in the first level of generic domain.
A
10
B
12
C
16
D
None of the options
       Computer-Networks       Domain
Question 86
Which of the following techniques deals with sorting the data stored in the computer’s memory?
A
Distribution sort
B
Internal sort
C
External sort
D
Radix sort
       Algorithms       Sorting
Question 86 Explanation: 
Here internal and external means using additional space or not. External means using additional array space we can sort the elements. Internal space does not take any extra space. But Main memory is limited in space so it can take internal sort help.
Question 87
How to specify the comment in the XML document?
A
< ?- -- >
B
< !-- --! >
C
< !-- -- >
D
< /-- -- >
       Web-Technologies       XML
Question 87 Explanation: 
The syntax for writing comments in XML is similar to that of HTML:
< !-- This is a comment -->
Question 88
The preorder traversal of a tree given below is:
A
A B D F E C G I H J K L
B
A B C D E G H F I J K L
C
A B E D F C G H I J K L
D
A B D F E C G I J H K L
       Data-Structures       Binary-Trees
Question 88 Explanation: 
Preorder traversal means during the tree traversal the node which is first visited will print output first. In inorder traversal first it goes to left subtree then root and then right subtree. In post order traversal first it goes left then right subtree after that it visits root then prints output.
Preorder: A B D F E C G I H J K L
Question 89
What is the basis of KVL?
A
Conservation of charge
B
Conservation of energy
C
Conservation of power
D
All of the options
       Data-Communication       KVL
Question 89 Explanation: 
Kirchhoff’s Voltage Law
Kirchhoff’s Voltage Law (KVL) is Kirchhoff’s second law that deals with the conservation of energy around a closed circuit path.
Question 90
Limitations of the XML Data Type are:
A
It cannot be compared or sorted. This means an XML data type cannot be used in a GROUP BY statement.
B
It cannot be used as a key column in an index.
C
The value() method of the XML data type returns a scalar value, so it can be specified anywhere where scalar values are allowed.
D
All of the options.
       Web-Technologies       XML
Question 90 Explanation: 
Limitations of the xml Data Type:
Note the following general limitations that apply to the xml data type:
The stored representation of xml data type instances cannot exceed 2 GB.
It cannot be used as a subtype of a sql_variant instance.
It does not support casting or converting to either text or ntext. Use varchar(max) or nvarchar(max) instead.
It cannot be compared or sorted. This means an xml data type cannot be used in a GROUP BY statement.
It cannot be used as a parameter to any scalar, built-in functions other than ISNULL, COALESCE, and DATALENGTH.
It cannot be used as a key column in an index. However, it can be included as data in a clustered index or explicitly added to a nonclustered index by using the INCLUDE keyword when the nonclustered index is created.
XML elements can be nested up to 128 levels.
Question 91
In which modulation discrete values of carrier frequencies is used to transmit binary data?
A
Phase Shift Keying
B
Amplitude Shift Keying
C
Frequency Shift Keying
D
Disk Shift Keying
       Data-Communication       Frequency-Shift-Keying
Question 91 Explanation: 
Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier signal. The technology is used for communication systems such as telemetry, weather balloon radiosondes, caller ID, garage door openers, and low frequency radio transmission in the VLF and ELF bands. The simplest FSK is binary FSK (BFSK). BFSK uses a pair of discrete frequencies to transmit binary (0s and 1s) information. With this scheme, the "1" is called the mark frequency and the "0" is called the space frequency.
Question 92
If one uses straight two-way merge sort algorithm to sort the following elements in ascending order 20, 47, 15, 8, 9, 4, 40, 30, 12, 17 then the order of these elements after the second pass of the algorithm is:
A
8, 9, 15, 20, 47, 4, 12, 17, 30, 40
B
8, 15, 20, 47, 4, 9, 30, 40, 12, 17
C
15, 20, 47, 4, 8, 9, 12, 30, 40, 17
D
4, 8, 9, 15, 20, 47, 12, 17, 30, 40
       Algorithms       Sorting
Question 92 Explanation: 
Merge sort divides the node until the node itself is sorted. In the merging process two nodes are compared bcz of two way merge. Pass1:(20,47), (8,15), (4,9), (30,40), (12,17)
Pass2: (8,15,20,47), (4,9,30,40), (12,17)
Pass3: (4,8,9,15,20,30,40,47),(12,17)
Pass4: (4,8,9,12,15,17,20,30,40,47)
So within 4 passed we can sort all the elements
Question 93
Consider the basic COCOMO model where E is the effort applied in person-months, D is the development time in chronological months, KLOC is the estimated number of delivered lines of code (in thousands) and ab, bb, cb, db have their usual meanings. The basic COCOMO equations are of the form.
A
E=ab(KLOC) exp(bb), D=cb(E) exp(db)
B
D=ab(KLOC) exp(bb), E=cb(D) exp(db)
C
E=ab exp(bb), D=cb(KLOC) exp(db)
D
E=ab exp(db), D=cb(KLOC) exp(bb)
       Software-Engineering       COCOMO-Model
Question 93 Explanation: 
The basic COCOMO equations are of the form.
E=ab(KLOC) exp(bb), D=cb(E) exp(db)
Question 94
If main memory access time is 400 μs, TLB access time 50 μs, considering TLB hit 90%, what will be the overall access time?
A
800 μs
B
490 μs
C
485 μs
D
450 μs
       Operating-Systems       Virtual Memory
Question 94 Explanation: 
Effective access time= Hit*(access of TLB+Main memory access) + Miss*(access of TLB+2*main memory access)
EAT=0.9*(50+400)+0.1(50+2*400)
=490
Question 95
Consider a software project with the following information domain characteristic for calculation of function point metric. Number of external inputs (I) = 30 Number of external output (O) = 60 Number of external inquiries (E) = 23 Number of files (F) = 08 Number of external interfaces (N) = 02 It is given that the complexity weighting factors for I, O, E, F and N are 4, 5, 4, 10 and 7, respectively. It is also given that, out of fourteen value adjustment factors that influence the development effort, four factors are not applicable, each of the other four factors have value 3, and each of the remaining factors have value 4. The computed value of function point metric is ________.
A
612.06
B
212.05
C
305.09
D
806.9
       Software-Engineering       Functional-Points
Question 95 Explanation: 
FP=UFP(unadjusted function point)+ VAF(variable adjustment point)
UFP=No.of inputs*(simple or avg or complex)+No.of outputs*(simple or avg or complex)+No.of inquiries*(simple or avg or complex)+No.of files*(simple or avg or complex)+No.of interfaces*(simple or avg or complex)
VAF=0.65+0.01*Summation of 14 factors
In given problem UFP=30*4+60*5+23*4+8*10+2*7
VAF=0.65+0.01*(4*0+4*3+6*4)
FP=UFP+VAF=612.06
Question 96
Consider a software program that is artificially seeded with 100 faults. While testing this program, 159 faults are detected, out of which 75 faults are from those artificially seeded faults. Assuming that both real and seeded faults are of same nature and have same distribution, the estimated number of undetected real faults is ______.
A
28
B
175
C
56
D
84
       Software-Engineering       Software-Reliabiliy
Question 96 Explanation: 
Total faults detected = 159
Real faults detected among all detected faults = 159 - 75 = 84
Since probability distribution is same, total number of real faults is (100/75)*84 = 112
Undetected real faults = 112- 84 = 28
Question 97
A direct mapped cache is of size 32 KB and has block size 32 Bytes. CPU also generates 32 bit address. Number of bits needed for indexing the cache:
A
14
B
15
C
10
D
17
       Computer-Organization       Cache
Question 97 Explanation: 
Question 98
Suppose we have to insert the following sequence of keys into an empty binary search tree: 5, 7, 45, 60, 50, 23, 15, 54 What would be the height of binary search tree?
A
3
B
4
C
5
D
6
       Data-Structures       Binary-search-tree
Question 98 Explanation: 
The explanation saying the tree height would be the number of edges in the longest simple downward path from root to leaf. According to this the height must be 5 for the given question.
BST with the elements is as follows

It is a very easy question. By default height starts from 0.
Question 99
An attribute(s) that is used to look up for records in a file is called a:
A
Function key
B
Catalog key
C
Access key
D
Search key
       Database-Management-System       B-and-B+-Trees
Question 100
Consider a Simple Checkpointing protocol and the following set of operations in the log. (start, T4); (write, T4, y, 2, 3); (start, T1); (commit, T4); (write, T1, z, 5, 7); (Checkpoint); (start, T2); (write, T2, x, 1, 9); (commit, T2); (start, T3); (write, T3, z, 7, 2); if a crash happens now and the system tries to recover using both undo and redo operations, what are the contents of the undo list and the redo list?
A
Undo : T3, T1; Redo T2
B
Undo : T3, T1; Redo T2, T4
C
Undo : none; Redo T2, T4, T3 T1
D
Undo : T3, T1, T4; Redo T2
       Database-Management-System       Transactions
Question 100 Explanation: 
As T1 & T3 are not yet committed they must be undone. The transactions which are after the latest checkpoint must be redone. So T2 must be redone. No need to redo the records which are before the last checkpoint, so T4 need not be redone.
Question 101
Point out the wrong statement:
A
Non-Relational databases require that schemas be defined before you can add data.
B
NoSQL databases are built to allow the insertion of data without a predefined schema.
C
NewSQL databases are built to allow the insertion of data without a predefined schema.
D
All of the options.
       Database-Management-System       SQL
Question 102
In which of the following hash functions, do consecutive keys map to consecutive hash values?
A
Division method
B
Multiplication method
C
Folding method
D
Mid-square method
       Data-Structures       Hashing
Question 102 Explanation: 
Division method: X mod N. Here, X is key and N is the number of locations in the array. Here Number of locations are consecutive in nature bcz it acts as a reminder.
Question 103
One disk queue with requests for I/O to blocks on cylinders. The Request are in the following manner: 98 183 37 122 14 124 65 67 Considering SSTF (shortest seek time first) scheduling, the total number of head movements is, if the disk head is initially at 53:
A
236
B
246
C
220
D
240
       Operating-Systems       Disk-Scheduling
Question 103 Explanation: 

=(67-53)+(67-14)+(183-14)
=236
Question 104
What is the advantage of bubble sort over other sorting techniques?
A
It is faster
B
Consumes less memory
C
Detects whether the input is already sorted
D
All of the options
       Algorithms       Sorting
Question 104 Explanation: 
The options are not appropriate.
Option-A is definitely FALSE.
Option-B is not an advantage when compared to other sorting techniques.
Option-C Bubble sort will give the best case O(n) when elements are in sorted order.
Question 105
One-megabyte memory storage in the form of bytes is equal to ______.
A
1024 bytes
B
10242 bytes
C
10243 bytes
D
10244 bytes
       Computer-Organization       memory
Question 105 Explanation: 
1k=1024=210, 1M=220
Option B can written as (210)2=220= 1 MB
Question 106
Which table is used in MS DOS for linked list allocation?
A
TLB
B
Page Table
C
FAT
D
Index Table
       Operating-Systems       File system-I/O-protection
Question 106 Explanation: 
FAT table is used in MS DOS for linked list allocation
Question 107
What is the best case complexity of QuickSort?
A
O(nlogn)
B
O(logn)
C
O(n)
D
O(n2)
       Algorithms       Sorting
Question 107 Explanation: 
In quick sort best case is possible when the pivot element can be placed in the middle of the elements on each pass.
T(n)=2T(n/2)+n
=O(nlogn)
Question 108
Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?
A
Data leak from stolen credentials from desk
B
Data leak by partners
C
Data leak by 3rd Party apps
D
All of the options
       Computer-Networks       Network-Security
Question 108 Explanation: 
The Option-C is not an example of an internal data leakage threat.
Question 109
A
x.y’
B
x.y’+z
C
x.z’
D
none of the options
       Digital-Logic-Design       Boolean-Function
Question 109 Explanation: 
Question 110
______ uses a pretty good privacy algorithm.
A
Electronic mails
B
File encryption
C
Both Electronic mails and File encryption
D
None of the options
       Computer-Networks       network-Security
Question 110 Explanation: 
Both Electronic mails and File encryption use pretty good privacy algorithms.
Question 111
Set of key attributes that identify weak entities related to some owner entity is classified as:
A
Structural key
B
String key
C
Partial key
D
Foreign key
       Database-Management-System       ER-Model
Question 112
Given the truth table of a Binary Operation $ as follows:

Identify the matching Boolean Expression.
A
X $ Y'
B
X' $ Y
C
X' $ Y'
D
None of the above
       Digital-Logic-Design       Boolean-Function
Question 112 Explanation: 
X$Y= X+Y'
So,
X $ ¬Y= X+Y
¬X $ Y= X' + Y'
¬X $ ¬Y= X' + Y
Question 113
An expression in the domain relational calculus is of the form:
A
{P(x1,x2,...,xn) | ⟨x1,x2,...,xn⟩}
B
{x1,x2,...,xn | ⟨x1,x2,...,xn)}
C
{x1,x2,...,xn | x1,x2,...,xn}
D
⟨x1,x2,...,xn⟩ | P(x1,x2,...,xn)}
       Database-Management-System       Relational-Calculus
Question 113 Explanation: 
Domain relational calculus (DRC) is a calculus that was introduced by Michel Lacroix and Alain Pirotte as a declarative database query language for the relational data model. In DRC, queries have the form: {(X1,X2,....,Xn) | p( X1,X2,....,Xn ) where each Xi is either a domain variable or constant, and p(X1,X2,....,Xn)} denotes a DRC formula. The result of the query is the set of tuples X1 to Xn that make the DRC formula true. This language uses the same operators as tuple calculus, the logical connectives ∧ (and), ∨ (or) and ¬ (not). The existential quantifier (∃) and the universal quantifier (∀) can be used to bind the variables.
Question 114
The best running time is defined as/obtained as/by:
A
the least or smallest of all the running times the algorithm takes, on inputs of a particular size.
B
an input that requires maximum computations or resources
C
averaging the different running times for all inputs of a particular kind.
D
none of the options.
       Algorithms       Time-Complexity
Question 114 Explanation: 
The best running time is defined as/obtained as/by the least or smallest of all the running times the algorithm takes, on inputs of a particular size.
Question 115
In ______ VMs do not simulate the underlying hardware.
A
Para Virtualization
B
Full Virtualization
C
Hardware-Assisted Virtualization
D
Network Virtualization
       Cloud-Computing       Virtualization
Question 115 Explanation: 
Para-virtualization is a virtualization technique that presents a software interface to the virtual machines which is similar, yet not identical to the underlying hardware–software interface. Paravirtualization (PV) is an enhancement of virtualization technology in which a guest operating system (guest OS) is modified prior to installation inside a virtual machine (VM) in order to allow all guest OS within the system to share resources and successfully collaborate, rather than attempt to emulate an entire hardware environment. Full virtualization is a virtualization technique used to provide a VME that completely simulates the underlying hardware. network virtualization is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization. Hardware-assisted virtualization is a platform virtualization approach that enables efficient full virtualization using help from hardware capabilities, primarily from the host processors
Question 116
Consider a control unit generating the control signals. These control signals are divided into five mutually exclusive groups as shown below:

How many bits are saved using the Vertical Microprogrammed instead of Horizontal Microprogrammed control unit?
A
14
B
34
C
20
D
None
       Computer-Organization       Microprogrammed-Control-Unit
Question 116 Explanation: 
In horizontal microprogramming we need 1 bit for every control word, therefore total bits in horizontal microprogramming
= 3 + 7 + 10 + 12 + 2
= 34
Now lets consider vertical microprogramming. In vertical microprogramming no. of bits required to activate 1 signal in group of N signals, is ⌈log2 N⌉. And in the question 5 groups contains mutually exclusive signals,
group 1 = ⌈log2 3⌉ = 2
group 2 = ⌈log2 7⌉ = 3
group 3 = ⌈log2 10⌉ = 4
group 4 = ⌈log2 12⌉ = 4
group 5 = ⌈log2 2⌉ = 1
Total bits required in vertical microprogramming
= 2+ 3 + 4 + 4+ 1
= 14
So, number of bits saved is
= 34 - 14
= 20
Question 117
The number of tokens in the following C statement is printf("i=%d, &i=%x", i, &i);
A
8
B
4
C
7
D
10
       Compiler-Design       Lexical-Analyzer
Question 117 Explanation: 
Question 118
The number of 4 digit numbers which contain not more than two different digits is:
A
576
B
567
C
513
D
504
       Aptitude       Numerical
Question 118 Explanation: 
The first (non-zero) digit of the number thousands digit (A)can be any one of nine. The second digit is hundred digit(B) which is used if there are two digits can be any one of the nine digits different from the first. Now consider the Hundreds Tens and Units digits in the case that there are two digits used in the number. We have two possibilities A or B to fill each place - but we exclude AAA as not involving two digits, so there are 23−1=7 possible patterns with exactly two different digits and 9×9 ways of choosing the pair of digits in the first place. Then there are nine possibilities with just one digit. Total possibilities are 9×9×7+9=576
Question 119
You are working with a network that is 172.16.0.0 and would like to support 600 hosts per subnet. What subnet mask should you use?
A
255.255.192.0
B
255.255.224.0
C
255.255.252.0
D
None of the options
       Computer-Networks       Subnetting
Question 119 Explanation: 
Question 120
PI in XML specification stands for _______.
A
priceless instruction
B
processing instruction
C
polymorphic inheritance
D
primary instruction
       Web-Technologies       XML
Question 120 Explanation: 
A Processing Instruction (PI) is an SGML and XML node type, which may occur anywhere in the document, intended to carry instructions to the application.
Processing instructions are exposed in the Document Object Model as Node.PROCESSING_INSTRUCTION_NODE, and they can be used in XPath and XQuery with the 'processing-instruction()' command.
There are 120 questions to complete.