Sunday, 2 March 2014

COMPUTER NETWORK MCQS

1) IEEE 802.22 standard for 
 A. Wireless LAN (WiFi)
 B. Broadband wireless
 C. Personal Area Network
 D. Wireless Regional Area Network
 Ans:-D

2) IEEE 802.15 standard for 
 A. Wireless LAN (WiFi)
 B. Broadband wireless
 C. Personal Area Network
 D. Wireless Regional Area Network
 Ans:- C

3) IEEE 802.16 standard for 
 A. Wireless LAN (WiFi)
 B. Broadband wireless
 C. Personal Area Network
 D. Wireless Regional Area Network
 Ans:-B

4) IEEE 802.11 standard for 
 A. Wireless LAN (WiFi)
 B. Broadband wireless
 C. Personal Area Network
 D. Wireless Regional Area Network
Ans:- A

5) IEEE 802.10 standard for 
 A. Overview and Architecture
 B. Token bus
 C. Token Ring
 D. Virtual LAN and Security
Ans:- D

6) IEEE 802.5 standard for 
 A. Overview and Architecture
 B. Token bus
 C. Token Ring
 D. Virtual LAN and Security
 Ans:- C

7) IEEE 802.4 standard for 
 A. Overview and Architecture
 B. Token bus
 C. Token Ring
 D. Virtual LAN and Security
 Ans:- B

8) IEEE 802.1 standard for 
 A. Overview and Architecture
 B. Token bus
 C. Token Ring
 D. Virtual LAN and Security
Ans:-A

9) 802.11i standard included an encryption scheme is known as 
 A. Wireless Security
 B. WEP (Wired Equivalent Privacy)
 C. WiFi Protected Access
 D. WiFi Protected Protocol
 Ans:- C

10) 802.11 standard included an encryption scheme was known as 
 A. Wireless Security
 B. WEP (Wired Equivalent Privacy)
 C. WiFi Protected Access
 D. WiFi Protected Access 2
 Ans:-B

11) 802.11n standard running speed is 
 A. Up to 11 Mbps
 B. Up to 54 Mbps
 C. Up to 450 Mbps
 D. Up to 2 Mbps
 Ans:- C

12) 802.11g standard running speed is 
 A. Up to 11 Mbps
 B. Up to 54 Mbps
 C. Up to 450 Mbps
 D. Up to 2 Mbps
 Ans:-  B

13) 802.11a standard running speed is 
 A. Up to 11 Mbps
 B. Up to 54 Mbps
 C. Up to 450 Mbps
 D. Up to 2 Mbps
 Ans:-B

14) 802.11b standard running speed is 
 A. 11 Mbps
 B. 54 Mbps
 C. 450 Mbps
 D. 2 Mbps
 Ans:-A

15) Which is not LAN Standard? 
 A. 802.1 to 802.10
 B. 802.1 to 802.11
 C. 802.3 to 802.10
 D. 802.11 to 802.22
 Ans:-A

16) Which is not LAN Standard? 
 A. 802.1
 B. 802.2
 C. 802.3
 D. 802.11
Ans:-D

17) IEEE 802.16 popularly called 
 A. Ethernet
 B. WiFi
 C. WiMAX
 D. Wireless Network
Ans:-C

18) IEEE 802.3 popularly called 
 A. Switch Ethernet
 B. Ethernet
 C. Wifi
 D. Wireless Network
Ans:-B

19) Maximum speed of LAN(Local Area Network)  
 A. Up to 5 Gbps
 B. Up to 3 Gbps
 C. Up to 10 Gbps
 D. Up to 15 Gbps
Ans:-C

20) SMTP,FTP and DNS are application of the ________layer. 
 A. Data link
 B. Network
 C. Transport
 D. Application
Ans:-D

Saturday, 1 March 2014

NETWORK IMPORTANT QUESTIONS

1) What is the difference between a a router and gateway
Ans.: Gateway: A gateway generally operates at the top levels of OSI architecture.
It is used to translate information between two completely different network architectures.
Routers: Routers have access only up to network layer and particularly used to connect different Local Area Networks(LANS).

2) What is a brouter?
Ans.: Brouter= BRIDGES+ ROUTERS.

3) In networking, what is meant by RAID method?
Ans.: RAID= It is a method that is used to provide fault tolerance using multiple hard disk drives.

4) Application of Logical Link Control layer(LLC)
Ans.: It is a sub layer of Data link layer of OSI model of IEEE 802 standard.
The LLC is used to maintain link between computers while sending data through physcial network.

5) What is multicasting?
Ans.: Sending a message to a group is called as multicasting.

6) What is meant by kerberos?
Ans.: It is an authentication service technology developed by Masachussets Institute of Technology(MIT) that uses enryption techniques to prevent intruders from finding passwords and gain unauthorized access to files.

7) When does a anonymous FTP is used?
Ans.: An Anonymous FTP is used to connect a host without using a valid login and passsword

8) What is beaconing?
Ans.: Beaconing is a technique used by token-ring/FDDI network to self repair itself.

9) What is baud rate?
Ans.: Baud Rate means number of signals transferred per second
Baud rate= bit rate/N

10) What is the use of Bridges and routers.
Ans.: Bridges: They work on Physical and Data link layers of LANS of same type.
Routers: They help to relay packets among interconnected multiple network(LANS of different type).

OPERATING SYSTEM SOLVED MCQS

1) An example of a distributed OS is
a.) Amoeba
b.) Unix 
c.) Microsoft DOS
d.) Multics
Ans.: c.)

2) In process management, Round-Robin is essentially the pre-emptive mechanism of
a.) FILO
b.) FIFO
c.) SSF
d.) LTF
Ans.: b.)

3) Which of the following treats hardware as a file system
a.) DOS
b.) UNIX
c.) Windows NT
d.) Linux
Ans.: b.) 

4) Find the pre-emptive scheduling algorithm from the following
a.) Round robin technique
b.) Priority based 
c.) Shortest job first
d.) Shortest job next
Ans.: a.)

5) The directory found in most UNIX systems is
a.) waitpid
b.) brk
c.) unmap
d.)usr
Ans.: d.)

6) The storage replacement strategy program placed in the largest hole in memory is
a.)Best fit
b.) First fit
c.) Worst fit
d.) Conference fit
Ans.: c.)

7) Banker's algorithm is used for
a.) Deadlock recovery
b.) Deadlock avoidance
c.) Deadlock prevention
d.) Deadlock comparison
Ans.: b.)

8) Peer hole optimization is an example of
a.) Local optimization
b.) Laptop optimization
c.) Data flow analysis
d.) Constant folding
Ans.: d.)

9) A software used to create job queue is
a.) Linkage editor
b.) Interpreter
c.) Caller
d.) Spooler
Ans.: d.)

10) Loading an OS from secondary memory to primary memory
a.) Compiling
b.) Booting
c.) Refreshing
d.) Recovering
Ans.: b.)

11) A page fault 
a.) is an error specific page.
b.) is an acess to the page not currently in memory.
c.) occur when a page program occur in a page memory.
d.) pages used in previous page referencee.
Ans.: b.)

12) Moving process from main memory to disk is called 
a.) Caching
b.) Swapping
c.) Termination
d.) Interruption
Ans.: b.)

13)Windows is 
a.) Real time
b.) Multi-user
c.) Multi-structured
d.) Pre-emptive
Ans.: d.)

14) The page replacement policy that suffers from belady's anamoly is 
a.) LRV
b.) FIFO
c.) LFU
d.) OPTIMAL
Ans.: b.)

15) Cache memory is
a.) High speed register
b.)Low speed RAM
c.) Non-Volatile ram
d.)High speed RAM
Ans.: d.)

16) A system program that combines the separately compiled modules of a program into a form suitable for execution 
 A. Assembler
 B. Linking loader
 C. Cross compiler
 D. None of the above
Ans.:B

17) Where does the swap space residable? 
 A. RAM
 B. Disk
 C. ROM
 D. On chip cache
Ans.:B

18) Multilevel feedback queue scheduling 
 A. Allows to select a process and load it to memory for execution
 B. Allows to select a process ,that are ready to execute and allows CPU to one of them
 C. Does not allow a process to move between queues.
 D. Allows processes which are permanently assigned to a queue on the entry to the system
Ans.:D

19) Which of the following scheduler reduces the degree of multiprogramming? 
 A. Long term scheduler
 B. Short term scheduler
 C. Mid term scheduler
 D. None of these
Ans.:C

20) Which of the following types of terminals is entirely dependent for all its capabilities on the computer system to which it is connected? 
 A. Smart terminal
 B. Dumb terminal
 C. Micro computer
 D. None of these
Ans.:B

REASONING AND ANALOGY SOLVED QUESTIONS

1) Complete the series.
6,9,13,18,24,31,?
a.)35
b.)30
c.)45
d.)39
Ans.:d.)
Explanation:
6
6+3=9
9+4=13
13+5=18
18+6=24
24+7=31
31+8=39

2) If  'WINNER' is written as 'YKPPGT'  then  'VICTOR' is written as ?
a.)UVMNREF
b.)XKEVQT
c.)QDWERS
d.)SCNMJK
Ans.:b.)
Reason:
V+2=X
I+2=K
C+2=E
T+2=V
O+2=Q
R+2=T

3) Find the missing number
2,4,3,6,4,8,5,?
a.)5
b.)7
c.)10
d.)9
Ans.:c.)
Explanation: 
2*2=4
3*2=6
4*2=8
5*2=10
Note carefully: 
When the first number '2' multiplied by '2' you get the second number as '4'
When the third number '3' multiplied by '2' you get the fourth number as '6'
When the fifth number '4' multiplied by '2' you get the sixth number as '8'
When the seventh number '5' multiplied by '2' you get the eigth number as '10'

4) Car is related to petrol. In the same way lorry is related to
a.)Fuel
b.)Diesel
c.)Petrol
d.)Oil
Ans.:b.)
Car generally runs on petrol and similarly Lorry generally runs on diesel.

5) Find the next number:
3,10,5,12,7,14,9,?
a.)12
b.)10
c.)16
d.)8
Ans.:c.)
Explanation:
3
3+7=10
10-5=5
5+7=12
12-5=7
7+7=14
14-5=9
9+7=16
Logic: Add 7 and subtract 5 consecutively.

6)  Zoology:Animals ::Mycology:?
a.)Skull
b.)Virus
c.)Fungi
d.)Algae
Ans.: c.)
Note: Zoology is the study of animals
Mycology is the study of fungi.

7) Carbondioxide:Extinguish  ::  Oxygen:?
a.)Isolate
b.)Foam
c.)Burn
d.)Cease
Ans.: c.)
Reason: Carbondioxide is used to extinguish fire whereas oxygen is used to burn fire. 

8) Pituitary:Brain  ::  Thyroid:?
a.)Liver
b.)Neck
c.)Mouth
d.)Stomach
Ans.: b.)
Pituitary is a gland of brain whereas Thyroid gland belongs to neck region. 

9) Cardiology:Heart  ::  Phycology:?
a.) Lungs
b.)Liver
c.)Algae
d.)Fungi
Ans.: c.)

10) Find the missing number:
15,22,36,?,85.
a.)45
b.)55
c.)57
d.)60
Ans.: c.)
Explanation:
15
15+7=22
22+14=36
36+21=57
57+28=85
Note: Add with multiples of '7' consecutively. 

11)  Find the number:
43,54,76,109,153,?
a.)209
b.)208
c.)221
d.)190
Ans.:b.)
Explanation:
43
43+11=54
54+22=76
76+33=109
109+44=153
153+55=208
Reason:Add with multiples of 11. 

12) Bee:Apiary :: Birds:?
Ans.: Aviary
Explanation: Apiary is the place where bees live
Aviary is the place where birds live.
12. 72,84,97,?,126
Ans.: 111
Explanation: 72
72+12=84
84+13=97
97+14=111

111+15=126

13)  Asia:Continent :: Gobi:?
Ans.: Desert
Note: Asia is a continent whereas Gobi is a largest desert in Asia.

14) Odometer:Speed :: Sphygmomanometer:?
Ans.: Blood pressure
Note: Odometer is used to measure speed. Similarly, Sphygmomanometer us used to measure blood pressure.

15) Ghemer:Rajasthan :: Kaima:?
Ans.: Bihar.
Ghemer is the folk dance of Rajasthan.
Kaima is the folk dance of Bihar.

JUNE 2013 SOLVED QUESTIONS

1) While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Ans.: B.)
 A famous software engineering question. Self explanatory.

2) A good software design must have
(A) High module coupling, High module cohesion
(B) High module coupling, Low module cohesion
(C) Low module coupling, High module cohesion
(D) Low module coupling, Low module cohesion
Ans.: C.)
Frequently asked question in the exam.Shortcut: Always remember Coupling = Low and Cohesion = High.

3) How many times the word 'print' shall be printed by the following program segment?
for(i=1, i≤2, i++)
for(j=1, J≤2, J++)
for(k=l, k≤2, k++)
printf("print/n")
(A) 1        
(B) 3
(C) 6
(D) 8
Ans.: D.)
Trick: There are 3 for loops and each for loop remains true till '2' times before the condition fails.

Therefore, 2^3=8.

4)  Which of the following is not a type of Database Management System?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Ans.: D.)
Very basic question

5) Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e+n-2
(B) V(G) = e-n+2
(C) V(G) = e+n+2
(D) V(G) = e-n-2
Ans.: B.)
Software engineering question. Particularly used in Software testing. The formula was designed by Mccabe.
Note: In Dec 2013 exam, UGC may ask who developed Cycometric complexity.
Be alert.

6) Which normal form is considered as adequate for usual database design ?
(A) 2NF     
(B) 3NF
(C) 4NF
(D) 5NF
Ans.: B.)
an ideal Database design is possible through 3NF.

7) Manager's salary details are to be hidden from Employee Table. This Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Ans.: A.)
Explanation: Generally, when we say employee table, It includes the personal details of the employee. But salary of an employee is something that  describes the things of significance to an organization.Therefore, hiding things of utmost significance is called as Conceptual Data hiding.

8) Which of the following addresses is used to deliver a message to the correct application program running on a host?
(A) Port
(B) IP
(C) Logical
(D) Physical
Ans.: A.)

9) In classful addressing, the IF address 190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Ans.: B.)
Explanation:

Class
Address Range
Class A
0.0.0.0
Class B
128.0.0.0
Class C
192.0.0.0
Class D
224.0.0.0
Class E
240.0.0.0
Trick: 0-127 -Class A
128-191-Class B
192-223- Class C
224-239-Class D
240-above- Class E

10) In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.
(A) identification
(B) fragment offset
(C) time to live
(D) header checksum
Ans.: A.)
Information: An IPV4 requires 32 bit address field IPV6 requires 128 bit address field

11) For a B-tree of height h and degree t, the total CPU time used to insert a node is
(A) O(h log t)
(B) O(t log h)(C) O(t2h)
(D) O(th)
Ans.: D.)

12) The time complexity to build a heap with a list of n numbers is
(A) O(log n)
(B) O(n)
(C) O(n log n)
(D) O(n2)
Ans.: B.)
Binary search: O(logn)
Merge sort: O(nlogn)
Quick sort: O(nlogn)
Selecton sort: O(n)
Insertion sort: O(n*n)

13) Consider the following statements for priority queue:

S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2: The elements of a priority queue may be complex structures that are ordered on one or several fields.
Which of the following is correct?
(A) Both S1 and S2 are incorrect.
(B) S1 is correct and S2 is incorrect.
(C) SI is incorrect and S2 is correct.
(D) Both S1 and S2 are correct.
Ans.: D.)

14) The task of correcting and pre processing data is called as
(A) Data streaming
(B) Data cleaning
(C) Data mining
(D) Data storming
Ans.: B.)

15) Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
(A) Data mining
(B) Meta data
(C) Data warehousing
(D) Database
Ans.: C.)

16) A test contains 100 true/false questions. How many different ways can a student answer the questions on the test, if the answer may be left blank also.
(A) 100P2    
(B) 100C2     
(C) 2100    
 (D) 3100 
Ans.: D.)
Reason: A question can be answered True or False or Left Blank. So there are 3 possibilities. So the answer is 3^100.

17) How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components?
(A) M+N-C
(B) M-N-C
(C) M-N+C
(D) M+N+C
Ans.: C.)

18) In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
(A) polyalphabetic
(B) monoalphabetic
(C) transpositional
(D) multialphabetic
Ans.: B.)

19) The mv command changes
(A) the inode
(B) the inode-number
(C) the directory entry
(D) both the directory entry and the inode
Ans.: C.)

20) The relation "divides" on a set of positive integers is ________
(A) Symmetric and transitive
(B) Anti symmetric and transitive
(C) Symmetric only
(D) Transitive only
Ans.: B.)

21) COCOMO stands for
(A) Composite Cost Model
(B) Constructive Cost Model
(C) Constructive Composite Model
(D) Comprehensive Construction Model
Ans.: B.)

PAPER 3 SOLVED MCQS

1) Match the following:
a. Watson- Felix model intensity                        i. Failure
b. Quick-Fix model                                               ii. Cost estimation
c. Putnam  resource allocation model                iii. Project planning
d. Logarithmetic- Poisson Model                       iv. Maintenance
Codes:
       a b c d
(A) ii i iv iii
(B) i ii iv iii
(C) ii i iii iv (D) ii iv iii i
Ans. D.)
Frequently aked software engineering question.

2) Equivalence partitioning is a ______ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) White-box testing (B) Black-box testing
(C) Orthogonal amIy testing
(D) Stress testing
Ans.: B.)
Very simple question from software testing.

3)  ________is a process model that removes defects before they can precipitate serious hazards.
(A) Incremental model
(B) Spiral model (C) Clean room software engineering
(D) Agile model
Ans.:C)

4) Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
(A) Risk mitigation, monitoring and management
(B) Software quality assurance
(C) Software cost estimation
(D) Defect removal efficiency
Ans.: A.)

5) The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is __________
(A) 3600
(B) 100
(C) 6/600
(D) None of the above
Ans.: A.)
Tip: baudrate * bit =bit rate 
 Explanation: Bit rate=600*6=3600

6) Match the following:
a. Data link layer                              i. Flow  control
b. Network layer                             ii. Node to node delivery
c. Transport layer                            iii. Mail services
d. Application layer                         iv  Routing
Codes:
       a b c d
(A) ii i iv iii (B) ii iv i iii
(C) ii i iii iv 
(D) ii iv iii i
Ans.: B.)

7) The ______ measures the relative strengths of two signals or a signal at two different points.
(A) frequency
(B) attenuation
(C) throughput (D) decibel
Ans.: D.)

8)  An actor in an animation is a small  program invoked _______ per frame to detennine the characteristics of some object in the animation.
(A) once    
(B) twice     
 (C) 30 times       
(D) 60 times
Ans.: A.)

9) The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection. concatenation, substitution and inverse homomorphism.
s2 Context free languages are closed under complementation. substitution and homomorphism.
Which of the following is correct statement?
(A) Both s1 and s2 are correct.
(B) s1 is correct and s2 is not correct.
(C) s1 is not correct and s2 is correct.
(D) Both s1 and s2 are not correct.
Ans.: D.)

10) Which one of the following is not an addressing mode?
(A) Register indirect
(B) Autoincrement
(C) Relative indexed
(D) Immediate operand
Ans.: D.)

11) Which is not a typical program control instruction?
(A) BR   
(B) JMP    
(C) SHL     
 (D) TST
Ans.: C.)
Tip: SHL means Shift Left which is a logical instruction.

12) Match the following:
a. Foreign keys                                  i. Domain constraint
b. Private key                                    ii. Referential integrity
c. Event control action model             iii. Encryption 
d. Data security                                 iv. Trigger
codes:
        a   b    c   d
(A)   iii   ii    i    iv
(B)   ii    i    iv   iii
(C)   iii  iv    i    ii
(D)   i   ii    iii    iv
Ans.: B.)

13) Match the following:
a. calloc()                      i. Frees previously allocated space
b. free()                        ii. Modifies previously allocated space
c. malloc()                   iii. Allocates space for array
d. realloc()                   iv. Allocates requested size of space
codes:
        a   b    c   d
(A)   iii   i    iv    ii
(B)   iii    ii    i    iv
(C)   iii  iv    i    ii
(D)   iv   ii    iii    i
Ans.: A.) 

14)  Interrupt which arises from illegal or erroneous use of an instruction or data is
(A) Software interrupt
(B) Internal interrupt
(C) External interrupt
(D) All ofthe above
Ans.: B.)

15) Hom clauses are special kinds of propositions which can be described as
(A) Single atomic proposition on left side.
(B) Single or multiple atomic proposition on left side.
(C) A single atomic proposition on left side and a single atomic proposition on right side.
(D) A single atomic proposition on left side or an empty left side.
Ans.: D.)

16) The following three golden rules
(i) Place the user in control
(ii) Reduce the user's memory load
(iii) Make the interface consistent are for
(A) User satisfaction
(B) Good interface design
(C) Saving system's resources
(D) None of these
Ans.: B.)

17) Working set model is used in memory management to implement the concept of
(A) Swapping
(B) Principal of Locality
(C) Segmentation
(D) Thrashing
Ans.: B.)

18) Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation?
(A) Semantic network
(B) Frames
(C) Scripts
(D) Conceptual Dependency
Ans.: D.)