Description : To represent addresses in assembly language we use: a. String characters b Arrays c. Structure d Enum
Last Answer : a. String characters
Description : If a function is friend of a class, which one of the following is wrong ? (A) A function can only be declared a friend by a class itself. (B) Friend functions are not members of a class, they are ... are members of a class. (D) It can have access to all members of the class, even private ones.
Last Answer : (C) Friend functions are members of a class.
Description : .............. predicate calculus allows quantified variables to refer to objects in the domain of discourse and not to predicates or functions. (A) Zero-order (B) First-order (C) Second-order (D) High-order
Last Answer : (B) First-order
Description : A structure brings together a group of A) items of the same data type B) related data items and variables C) integers with user defined names D) floating points with user defined names
Last Answer : B) related data items and variables
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : In constraint satisfaction problem, constraints can be stated as . (A) Arithmatic equations and inequalities that bind the values of variables (B) Arithmatic equations and inequalities ... impose restrictions over variables (D) Arithmatic equations that discard constraints over the given variables
Last Answer : (A) Arithmatic equations and inequalities that bind the values of variables
Description : T cell receptors (or TCR) on CD4+ T cells A.recognize peptides not associated with MHC molecules B.recognize peptides associated with MHC class I molecules C.recognize peptides associated with MHC class II molecules D.are secreted out into the environment to bind antigens
Last Answer : C.recognize peptides associated with MHC class II molecules
Description : cell receptors (or TCR) on CD4+ T cells A-recognize peptides not associated with MHC molecules B- recognize peptides associated with MHC class I moleculesC- recognize peptides associated with MHC class II molecules D- are secreted out into the environment to bind antigens
Last Answer : recognize peptides associated with MHC class II molecules
Description : The DBMS utility, ...................... allows to reconstruct the correct state of database from the backup and history of transactions. A) Backup B) Recovery C) Monitoring D) Data loading
Last Answer : B) Recovery
Description : .................. allows selection of the relevant information necessary for the data warehouse. (A) The Top-Down View (B) Data Warehouse View (C) Data source View (D) Business Query View
Last Answer : Answer: A
Description : In distributed databases, location transparency allows for database users, programmers and administrators to treat the data as if it is at one location. A SQL query with location transparency needs to specify: (A) Inheritances (B) Fragments (C) Locations (D) Local formats
Last Answer : (B) Fragments
Description : State True or False. i) A satic function can have access to only other static members (functions or variables) declared in the same class. ii) A static member function can be called using the class name (instead of its objects) A) True, True B) True, False C) False, True D) False, False
Last Answer : B) True, False
Description : Manager's salary details are to be hidden from Employee Table. This Technique is called as (A) Conceptual level Datahiding (B) Physical level Datahiding (C) External level Datahiding (D) Logical level Datahiding
Last Answer : (C) External level Datahiding
Description : Which of the following differentiates between overloaded functions and overridden functions ? (A) Overloading is a dynamic or runtime binding and overridden is a static or compile time binding. ... function overloading, while redefining a function in a friend class is called function overriding.
Last Answer : (B) Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
Description : Which one of the following is correct, when a class grants friend status to another class? (A) The member functions of the class generating friendship can access the members of the friend class. (B) ... the friendship. (C) Class friendship is reciprocal to each other (D) There is no such concept.
Last Answer : All member functions of the class granted friendship have unrestricted access to the members of the class granting the friendship.
Description : Consider the following statements for priority queue: S1: It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations. S2: The elements of a priority queue ... . (C) SI is incorrect and S2 is correct. (D) Both S1 and S2 are correct.
Last Answer : (D) Both S1 and S2 are correct.
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.
Last Answer : (1) Neither I nor II is correct.
Description : Given the following statements : S1 : SLR uses follow information to guide reductions. In case of LR and LALR parsers, the look-aheads are associated with the items and they make use of the left context available to ... (C) S1 is correct and S2 is not correct. (D) S1 is correct and S2 is correct.
Last Answer : (D) S1 is correct and S2 is correct.
Description : Superficially the term object-oriented , means that, we organize software as a (A) collection of continuous objects that incorporates both data structure and behaviour. (B) collection of ... and behaviour. (D) collection of objects that incorporates both discrete data structure and behaviour.
Last Answer : (C) collection of discrete objects that incorporates both data structure and behaviour.
Description : The friend functions are used in situations where A) We want to exchange data between classes B) We want to have access to unrelated classes C) Dynamic binding is required D) We want to create versatile overloaded operators.
Last Answer : A) We want to exchange data between classes
Description : Which of the following is/are the functions of operating system? i) Sharing hardware among users. ii) Allowing users to share data among themselves. iii) Recovering from errors. iv) Preventing users from interfering with one another. ... only C) i, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : Which of the following is/are the Database server functions? i) Data management ii) Transaction management iii) Compile queries iv) Query optimization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv
Last Answer : A) i, ii, and iv only
Description : A segment is any object described by GKS commands and data that start with CREATE SEGMENT and Terminates with CLOSE SEGMENT command. What functions can be performed on these segments? (1) Translation ... 2) Panning and Zooming (3) Scaling and Shearing (4) Translation, Rotation, Panning and Zooming
Last Answer : Translation, Rotation, Panning and Zooming
Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program
Last Answer : (B) provide a mechanism to map physical device to file names
Description : Data items grouped together for storage purposes are called a A) record B) title C) list D) string
Last Answer : A) record
Description : .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. (A) Overloading (B) Inheritance (C) Polymorphism (D) Encapsulation
Last Answer : (B) Inheritance
Description : What is the function of a tendon? A A. To link muscles to bones B. To bind bone cells close together C. To link muscles to ligaments D. To link bones to bones
Last Answer : To link muscles to bones
Last Answer : To link muscles to bone
Description : Which of the following is not a characteristic of organic compounds? (a) They usually have low melting points. (b) They usually are only slightly soluble or insoluble in water. (c) If water ... they seldom conduct an electric current. (d) Bonds which bind the atoms together are nearly always ionic.
Last Answer : Bonds which bind the atoms together are nearly always ionic.
Description : Which type of hypersensitivity reaction involves immune complexes formed when antigens bind to antibodies? a) Type III Type III hypersensitivity is associated with systemic lupus erythematosus, rheumatoid ... , or delayed-type, hypersensitivity occurs 24-72 hours after exposure to an allergen.
Last Answer : a) Type III Type III hypersensitivity is associated with systemic lupus erythematosus, rheumatoid arthritis, serum sickness, certain types of nephritis, and some types of bacterial endocarditis.
Description : Java Servlet i) is key component of server side java development ii) is a small pluggable extension to a server that enhances functionality iii) runs only in Windows Operating System iv) allows developers to customize any java ... & iv are true C) ii, iii & iv are true D) i, ii & iv are true
Last Answer : D) i, ii & iv are true
Description : The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC drivers B) Drivers, Application C) ODBC drivers, JDBC drivers D) Application, drivers
Last Answer : C) ODBC drivers, JDBC drivers
Description : .................. is a facility that allows programmers to address memory from a logical point of view, without regard to the main memory, physically available. A) Visual memory B) Real memory C) Virtual memory D) Secondary memory
Last Answer : C) Virtual memory
Description : ................ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement. A) Procedure B) Trigger C) Curser D) None of above
Last Answer : C) Curser
Description : ……………. Allows definitions and query language statements to be entered; query results are formatted and displayed. A) Schema Processor B) Query Processor C) Terminal Interface D) None of the above
Last Answer : C) Terminal Interface
Description : A ……………… allows to make copies of the database periodically to help in the cases of crashes & disasters. A) Recovery utility B) Backup Utility C) Monitoring utility
Last Answer : B) Backup Utility
Description : A simple cabling method, known as the ……………… topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh
Last Answer : B) Bus
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : The statement in SQL which allows to change the definition of a table is (A) Alter. (B) Update. (C) Create. (D) select
Last Answer : (A) Alter.
Description : Which e-business model allows consumers to name their own price for products and services ? (A) B2 B (B) B2 G (C) C2 C (D) C2 B
Last Answer : (D) C2 B
Description : Debugger is a program that (A) allows to examine and modify the contents of registers (B) does not allow execution of a segment of program (C) allows to set breakpoints, execute a segment of program and display contents of register (D) All of the above
Last Answer : (C) allows to set breakpoints, execute a segment of program and display contents of register
Description : In electronic mail, which of the following protocols allows the transfer of multimedia messages? (A) IMAP (B) SMTP (C) POP 3 (D) MIME
Last Answer : (D) MIME
Description : ………… is not the component of data structure. A) Operations B) Storage Structures C) Algorithms D) None of above
Last Answer : D) None of above
Description : Which if the following is/are the levels of implementation of data structure A) Abstract level B) Application level C) Implementation level D) All of the above
Last Answer : D) All of the above
Description : A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following ... separate stack for each thread. (D) OS does not maintain virtual memory state for each thread.
Last Answer : (B) OS maintains only CPU registers for each thread.
Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack
Last Answer : (C) Scheduling parameters
Description : A ……….. is a graph that has weights of costs associated with its edges. A) Network B) Weighted graph C) Both A and B D) None A and B
Last Answer : C) Both A and B
Description : Data input is A) an abstract class defined in java.io B) a class we can use to read primitive data types C) an interface that defines methods to open files. D) an interface that defines methods to read primitive data types.
Last Answer : D) an interface that defines methods to read primitive data types.