Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation
Last Answer : B) Static allocation
Last Answer : A) Automatic allocation
Description : ……………. Can be defined as the permanent blocking of a set of processed that either complete for system resources or communicate with each other. A) Deadlock B) Permanent lock C) Starvation D) Mutual exclusion
Last Answer : A) Deadlock
Description : Which preamplifier design (high-impedance or transimpedance) provides improvements in bandwidth and greater dynamic range with some degradation in sensitivity from an increase in noise?
Last Answer : Transimpedance.
Description : At which of the following stage(s), the degeneracy do not occur in transportation problem? (m, n represents number of sources and destinations respectively) (a) While the values of dual variables ui and vj cannot be computed. (b) While ... and (d) (3) (a) and (d) (4) (a), (b), (c) and (d)
Last Answer : (3) (a) and (d)
Description : Which of the following information not included in memory table? A) The allocation of main memory to process. B) The allocation of secondary memory to process C) Any information needed to manage virtual memory D) Any information about the existence of file
Last Answer : D) Any information about the existence of file
Description : ................. maintains the list of free disk blocks in the Unix file system. (A) I-node (B) Boot block (C) Super block (D) File allocation table
Last Answer : (C) Super block
Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.
Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.
Description : In ............ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file is easy. (A) Index (B) Linked (C) Contiguous (D) Bit Map
Last Answer : (B) Linked
Description : Function of memory management unit is : (A) Address translation (B) Memory allocation (C) Cache management (D) All of the above
Last Answer : Answer: A
Description : Suppose there are four processes in execution with 12 instances of a Resource R in a system. The maximum need of each process and current allocation are given below: With reference to current allocation, is system safe? If so, ... B) Yes, P1 P2 P3 P4 (C) Yes, P4 P3 P1 P2 (D) Yes, P2 P1 P3 P4
Last Answer : (C) Yes, P4 P3 P1 P2
Description : In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation required for W-CDMA is .......... (1) 2 MHz (2) 20 KHz (3) 5 KHz (4) 5 MHz
Last Answer : Answer: 4
Description : Which of the following provides the best description of an entity type? (A) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes) (B) A value given to a ... template for a group of things with the same set of characteristics that may exist in the real world
Last Answer : Answer: D
Description : What is the reason for using virtual machine templates? A. Efficiency. B. Scalability. C. Storage. D. Dynamic Allocation.
Last Answer : Efficiency.
Description : What is dynamic memory allocation? Explain with example.
Last Answer : Allocating memory at run time (when program is in execution) is called as dynamic memory allocation. Dynamic memory allocation use malloc ( ) and calloc ( ) functions to allocate memory at run time. C++ supports these ... sample *ptr=new sample; ptr->getdata(); ptr->putdata(); }
Description : Those profits which the person in wrongful possession of such property actually received or might with ordinary diligence have received there from, together with interest on such profits, but shall not include profits ... (a) Means profit (b) Interest (c) Principal sum (d) None of the above
Last Answer : (a) Means profit
Description : State weather the following statement is true or false for EJB. 1. EJB exists in the middle-tier 2. EJB specifies an execution environment 3. EJB supports transaction processing A) 1-true, 2. true, 3. true B) 1- ... false, 3. true C) 1- false, 2- false, 3- false D) 1-true, 2-true, 3-false
Last Answer : A) 1-true, 2. true, 3. true
Description : Windows 32 API supports (A) 16-bit Windows (B) 32-bit Windows (C) 64-bit Windows (D) All of the above
Last Answer : (D) All of the above
Description : Java servlets are an efficient and powerful solution for creating ………….. for the web. A) Dynamic content B) Static content C) Hardware D) Both a and b
Last Answer : A) Dynamic content
Description : ………………….. implies that all subnets obtained from the same subnet mask. A) Static subnetting B) Dynamic subnetting C) Variable length subnetting D) Both B and C
Last Answer : A) Static subnetting
Description : ........ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C
Description : ______ adds pruning and grafting to_______ to create a multicast shortestpath tree that supports dynamic membershipchanges. A) RPM; RPB B) RPB; RPM C) RPF: RPM D) none of the above
Last Answer : RPM; RPB
Description : The friend functions are used in situations where A) We want to exchange data between classes B) We want to have access to unrelated classes C) Dynamic binding is required D) We want to create versatile overloaded operators.
Last Answer : A) We want to exchange data between classes
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only
Last Answer : D) All i, ii, iii, iv and v only
Description : The full form of DDL is (A Dynamic Data Language (B) Detailed Data Language (C) Data Definition Language (D) Data Derivation Language
Last Answer : C) Data Definition Language
Description : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method
Last Answer : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method
Description : In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called (A) NTFS file system (B) Hardware abstraction layer (C) Microkernel (D) Process Manager
Last Answer : (B) Hardware abstraction layer
Description : Which of the following concepts means adding new concepts to a program as it runs? (A) Data hiding (B) Dynamic loading (C) Dynamic typing (D) Dynamic binding
Last Answer : (B) Dynamic loading
Description : Which of the following differentiates between overloaded functions and overridden functions ? (A) Overloading is a dynamic or runtime binding and overridden is a static or compile time binding. ... function overloading, while redefining a function in a friend class is called function overriding.
Last Answer : (B) Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
Description : Which of the following statements is true for Branch-and-Bound search? (A) Underestimates of remaining distance may cause deviation from optimal path. (B) Overestimates can't cause right path to be ... Dynamic programming principle can be used to discard redundant partial paths. (D) All of the above
Last Answer : (C) Dynamic programming principle can be used to discard redundant partial paths.
Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process
Last Answer : (C) It is a chip to map virtual address to physical address
Description : The travelling salesman problem can be solved in: (A) Polynomial time using dynamic programming algorithm (B) Polynomial time using branch-and-bound algorithm (C) Exponential time using dynamic programming algorithm or branch-andbound algorithm. (D) Polynomial time using backtracking algorithm.
Last Answer : (C) Exponential time using dynamic programming algorithm or branch-andbound algorithm.
Description : The translator which performs macro calls expansion is called : (A) Macro processor (B) Micro pre-processor (C) Macro pre-processor (D) Dynamic linker
Last Answer : (C) Macro pre-processor
Description : A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 nsec and a memory cycle requires 250 nsec. What percentage of memory’s total operating time is required for refreshes? (A) 0.64 (B) 0.96 (C) 2.00 (D) 0.32
Last Answer : Answer: D Explanation: in 1ms : refresh = 32 times Memory cycle = 1ms/250ns = 106ns/250ns = 4000 times Therefore, % of refresh time = (32 x 100ns)/(4000 x 250ns) = 3200ns/1000000 x 100% = 0.32%
Description : Match the following types of variables with the corresponding programming languages: (a) Static variables (i) Local variables in Pascal (b) Stack dynamic (ii) All variables in APL (c) Explicit heap dynamic (iii) Fortran 77 (d) Implicit ... (ii) (C) (iii) (i) (iv) (ii) (D) (ii) (i) (iii) (iv)
Last Answer : (C) (iii) (i) (iv) (ii)
Description : Which of the following is not typically a benefit of dynamic linking? I. Reduction in overall program execution time. II. Reduction in overall space consumption in memory. III. Reduction in overall space consumption on disk. IV. ... updates. (A) I and IV (B) I only (C) II and III (D) IV only
Last Answer : (B) I only
Description : Dijkstra’s algorithm is based on (1) Divide and conquer paradigm (2) Dynamic Programming (3) Greedy Approach (4) Backtracking paradigm
Last Answer : 3
Description : Red-black trees are one of many Search tree schemes that are "balanced” in order to guarantee that basic dynamic-set operations take ............. time in the worst case. (1) O(1) (2) O(log n) (3) O(n) (4) O(n log n)
Last Answer : (2) O(log n)
Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database
Last Answer : Answer: 3
Description : Which of the following statements is false? (A) Optimal binary search tree construction can be performed efficiently using dynamic programming. (B) Breadth-first search cannot be used to find connected components of a graph. (C) ... used to find the components of a graph. (1) A (2) B (3) C (4) D
Last Answer : Answer: 2
Description : For using a specific database …………… command is used. A) use database B) databasename use C) Both A &B D) None of them
Last Answer : A) use database
Description : The symmetric difference of two sets S1 and S2 is defined as S1ΘS2 = {x|xϵS1 or xϵS2, but x is not in both S1 and S2} The nor of two languages is defined as nor (L1,L2) = ... symmetric difference and nor. (D) The family of regular languages are not closed under both symmetric difference and nor.
Last Answer : (C) The family of regular languages are closed under both symmetric difference and nor.
Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. False, 3. true
Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A) i only B) ii only C) Both A and B D) None of the above
Last Answer : A) i only
Description : This strategy is an expression of desired strategic direction deliberately formulated & planned in terms of resource allocation, control systems, organizational structure etc. A. Intended strategy B. Realized strategy C. Emergent strategy D. None of these options are valid.
Last Answer : Intended strategy
Description : Which of the following is/are correct with reference to Abstract class and interface ? (a) A class can inherit only one Abstract class but may inherit several interfaces. (b) An Abstract class can provide complete and default ... true (C) Both (a) and (b) are true (D) Neither (a) nor (b) is true
Last Answer : Answer: C