Which layer of OS I reference
model is responsible for decomposition of messages and generation of sequence
numbers to ensure correct re-composition from end to end of the network ?
The essential difference between traps and interrupts is
(A) traps are asynchronous and interrupts are synchronous with the program.
(B) traps are synchronous and interrupts are asynchronous with the program.
(C) traps are synchronous and interrupts are asynchronous with the I/O devices.
(D) None of these.
When data and acknowledgement are sent in the same frame, this is called as
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing
Ans.: b.)
Piggybacking is a bi-directional data transmission technique in the network layer (OSI model).
Network question.
Testing of software with actual data and in actual environment is called
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above
Ans.: b.)
Software testing concept.
Beta testing is a part of acceptance test.
(A) Physical
(B) Data-link
(C) Transport (D) Application
(C) Transport (D) Application
Ans.: c.)
Networks
The start and stop bits are used in serial
communication for
(A) error detection
(B) error correction
(C) synchronization
(D) slowing down the communication
(A) error detection
(B) error correction
(C) synchronization
(D) slowing down the communication
Ans.: c.)
Synchronization is
the coordination of events to operate a system in unison
________is a type of transmission impairment in
which the signal looses strength due to the resistance of the transmission
medium.
(A) Attenuation (B) Distortion
(C) Noise (D) Decibel
(A) Attenuation (B) Distortion
(C) Noise (D) Decibel
Ans.: a.)
a. Indexed Addressing
i. is not used when an operand is moved from memory into a register or from a
register to memory.
b. Direct Addressing ii. Memory address is computed by adding up two registers plus an (optional) offset.
c. Register Addressing iii. Addressing memory by giving a register plus a content offset.
d. Base-Indexed Addressing iv. can only be used to access global variables whose address is known at compile time.
Codes :
a b c d
(A) ii i iv iii
(B) ii iv i iii
(C) iii iv i ii
(D) iii i iv ii
b. Direct Addressing ii. Memory address is computed by adding up two registers plus an (optional) offset.
c. Register Addressing iii. Addressing memory by giving a register plus a content offset.
d. Base-Indexed Addressing iv. can only be used to access global variables whose address is known at compile time.
Codes :
a b c d
(A) ii i iv iii
(B) ii iv i iii
(C) iii iv i ii
(D) iii i iv ii
Ans.: c.)
Microprocessor
Synchronization is achieved timing device called
a_______which generates a periodic train of ________.
(A) clock generator, clock pulse
(B) master generator, clock pulse
(C) generator, clock
(D) master clock generator, clock pulse
(A) clock generator, clock pulse
(B) master generator, clock pulse
(C) generator, clock
(D) master clock generator, clock pulse
Ans.: a.)
What will
be the output of the following logic
diagram ?
(A) x OR y
(B) x AND y
(C) x XOR y
(D) X XNOR y
(B) x AND y
(C) x XOR y
(D) X XNOR y
Ans.: c.)
Digital logics
Explanation:
x
|
y
|
-
X
|
-
y
|
-
x.y
|
-
xy
|
-
-
(xy) + (xy)
|
0
|
0
|
1
|
1
|
0
|
0
|
0
|
0
|
1
|
1
|
0
|
0
|
1
|
1
|
1
|
0
|
0
|
1
|
1
|
0
|
1
|
1
|
1
|
0
|
0
|
0
|
0
|
0
|
The essential difference between traps and interrupts is
(A) traps are asynchronous and interrupts are synchronous with the program.
(B) traps are synchronous and interrupts are asynchronous with the program.
(C) traps are synchronous and interrupts are asynchronous with the I/O devices.
(D) None of these.
Ans.: b.)
DLF
Which of the following is not true with respect
to a trackball and/or spaceball ?
I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom.
II. Unlike the trackball a spaceball does not actually move.
III. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom.
(A) I & II (B) II & III
(C) II only (D) III only
I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom.
II. Unlike the trackball a spaceball does not actually move.
III. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom.
(A) I & II (B) II & III
(C) II only (D) III only
Ans.: d.)
Windows
Which of the following statement(s) is (are)
true ?
I. Two successive translations are additive.
II. Two successive rotations are additive.
III. Two successive scaling operations are multiplicative.
(A) I and II
(B) I and III
(C) II and III
(D) All the above
I. Two successive translations are additive.
II. Two successive rotations are additive.
III. Two successive scaling operations are multiplicative.
(A) I and II
(B) I and III
(C) II and III
(D) All the above
Ans.: d.)
Computer Graphics
In Unix, how do you check that two given
strings a and b are equal ?
(A) test $a -eq $b
(B) test Sa -equal $b
(C) test $a = Sb
(D) Sh -C test $a = = $b
(A) test $a -eq $b
(B) test Sa -equal $b
(C) test $a = Sb
(D) Sh -C test $a = = $b
Ans.: c.)
Unix
To place a sound into a word document,
following feature of windows is used :
(A) Clip board
(B) Task switching
(C) C Win App
(D) OLE
(A) Clip board
(B) Task switching
(C) C Win App
(D) OLE
Ans.: d.)
Windows
Translation Look-aside Buffer (TLB) is
(A) a cache-memory in which item to be searched is compared one-by-one with the keys.
(B) a cache-memory in which item to be searched is compared with all the keys simultaneously.
(C) an associative memory in which item to be searched is compared one-by-one with the keys.
(D) an associative memory in which item to be searched is compared with all the keys simultaneously.
(A) a cache-memory in which item to be searched is compared one-by-one with the keys.
(B) a cache-memory in which item to be searched is compared with all the keys simultaneously.
(C) an associative memory in which item to be searched is compared one-by-one with the keys.
(D) an associative memory in which item to be searched is compared with all the keys simultaneously.
Ans.: d.)
OS
Simplest way of deadlock recovery is
(A) Roll back
(B) Preempt resource
(C) Lock one of the processes
(D) Kill one of the processes
(A) Roll back
(B) Preempt resource
(C) Lock one of the processes
(D) Kill one of the processes
Ans.: a.)
OS
The directory structure used in Unix file
system is called
(A) Hierarchical directory
(B) Tree structured directory
(C) Directed acyclic graph
(D) Graph structured directory
(A) Hierarchical directory
(B) Tree structured directory
(C) Directed acyclic graph
(D) Graph structured directory
Ans.: a.)
Unix
Unix
Possible thread states in Windows 2000
operating system include :
(A) Ready, running and waiting
(B) Ready, standby, running, waiting, transition and terminated
(C) Ready, running, • waiting, transition and terminated
(D) Standby, running, transition and terminated
(A) Ready, running and waiting
(B) Ready, standby, running, waiting, transition and terminated
(C) Ready, running, • waiting, transition and terminated
(D) Standby, running, transition and terminated
Ans.: b.)
Windows
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing
Ans.: b.)
Piggybacking is a bi-directional data transmission technique in the network layer (OSI model).
Network question.
Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is
(A) 101 (C) 105
(B) 103 (D) 107
(A) 101 (C) 105
(B) 103 (D) 107
Ans.: b.)
Network security and cryptography
FAN IN of a component A is defined as
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
Ans.: a.)
Fan-in is the number of inputs a gate can handle
Fan out is the number of gate inputs you can connect to a gate output
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
Ans.: a.)
Fan-in is the number of inputs a gate can handle
Fan out is the number of gate inputs you can connect to a gate output
The relationship of data elements in a module is called
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity
Ans.: c.)
Software engineering
cohesion refers to the degree to which the elements of a module belong together. the tendency to stick together
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity
Ans.: c.)
Software engineering
cohesion refers to the degree to which the elements of a module belong together. the tendency to stick together
Testing of software with actual data and in actual environment is called
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above
Ans.: b.)
Software testing concept.
Beta testing is a part of acceptance test.
No comments:
Post a Comment