Wednesday, 26 February 2014

MOBILE COMPUTING, E-TECHNOLOGY, WINDOWS SOLVED MCQ TEST

1) Mobile IP uses how many types of address.
Two adresses namely:
* A fixed home address
* A care of address

2) What are the special features of IPV6 (Internet Protocol version 6)
# Stateless Address Auto Configuration
# Neighbour discoverys
# Nodes implement strong authentication and encryption techniques to ensure internet security.

3) Expand the following terms.
GSM - Global System for Mobile Communication
CDMA - Code Division Multiplex Access
PDA - Personal Digital Assistant
GPRS - General Packet Radio Service
ATM - Asynchronous Transfer Mode
TDMA - Time Division Multiplex Access
FDMA - Frequency Division Multiplex Access
MS - Mobile Station
BSS Base Station Subsystem
IMEI - International Mobile Equipment Identity
LOS - Line of Sight
MH - Mobile Host
OSI - Open System Interconnection

WWAN - Wireless Wide Area Network

4) The ATM layer in ATM technology deals with
Cell Transport

5) What is WMAN
WMAN stands for Wireless Metropolitan Area Network.
It is a type of wireless network that connects several wireless LANS.
Example: Wi-Max.

6) What is Wi-Max.
Wi-Max is a type of WMAN which is described by IEEE 802.16 standard.

7) What is piconet.
Piconet is a collection of bluetooth devices which are synchronized to the same hopping sequence.
It has four major components namely:
Master(M)- A bluetooth device can be the master of other bluetooth devices.
Slave(S) - The slaves are those bluetooth devices which are dependent on the master bluetooth device.
Parked(P) - They are not active presently but can be reactivated within some time.
Standby(SB) - They do not participate in piconet.

8) What are the ways in which Electronic payments are made.
Digital token
Credit card
Smart card

9) Expand E-commerce ERP, EFT and EDI
E-commerce- Electronic commerce
EDI- Electronic Data Interchange
ERP- Enterprise Resource Planning
EFT- Electronic Fund Transfer

10) The threats to electronic payment systems involves
Trojan horse
Computer virus
Computer worm

11) Activex controls can be developed using
Visual Basic, Java, Visual C++

12) When a bad frame is received, what does the frame relay does
It discards the frame.

13) ALOHA  is used for
Channel allocation problem

14) What are the applications of Slotted ALOHA.
Slotted Aloha divides time in to discrete intervals
It requires global time synchronization.

15) CGI stands for
Common Gateway Interface.

16) OLE growth curve involves
Activex, DirectX, OLE controls

17) A key verifier machine is used to
Control transaction entry.

18)  System integrity involves
Accuracy, security, appropriateness

19) What is a session
A session is the period of time that a unique user interacts with a web application.

20) List out the functions of GIS
Designing
Planning
Spatial imaging
Decision modeling

TEACHING APTITUDE SOLVED QUESTION

1) Effective teaching  is the result of
Clear and factual communication.


2) Man has attained success in various fields of life including education due to
Man's learning capacity.


3) State the reason for becoming a teacher.
It is a reputable job.


4) The best method to teach in class is by
Using audio-visual aids.


5) How to control students in the classroom.
By identifying the cause for restlessness.


6) Who is a teacher.
A teacher is a friend, philosopher, guide to students.


7) One will be an effective communicator if
One is clear about what one communicates.
Use of audio visual aids.


8) The best way to understand the students aptitude is by
Speaking with them freely and identify the aptitude.


9) A teacher in a classroom should be like
A leader.


10) A good research involves
A penetrating and analytical mind.


11) A competent teacher is one who
Creates interest in the subject amongst students.


12) Quality of research depends on
Proper guidance.


13) Moral teachings of teacher would give
Moral values to students.


14) Teachers need to study educational psychology because
It helps the teacher to handle the students in a more progressive way.


15)  According to Plato, the main goal of education is to
Develop the power of thought.


16) Aim of modern education should aim for
Harmonious development of personality of the student.


17) The main advantage of educational values are
To develop healthy and balanced personality.
Generate capacity to earn livelihood
Develop vocational efficiency.


18) Operation BlackBoard is related to
Primary education.


19) Evaluation is useful to assess
Knowledge and skill.
Attitudes and study habits.
Interest and appreciations.


20) The degree of brightness possessed by an individual is termed as
Intelligent Quotient.

MOCK TEST SOLVED PAPER

1) The recursively enumerable languages are closed under
Union and intersection


2) What is mono alphabetic substitution.
 A character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.


3)  Bresenhan’s line drawing algorithm is most sought because it uses only
Integer Arithmetic.


4)  What is meant by critical fusion frequency.
The refresh rate above which a picture stops flickering and fuses into a steady image is called as critical fusion frequency.


5) A network schema allows
Many-Many relationship.


6) What is the difference between specialization and generalization.
Specialization is a top-down process.
Generalization is a bottom-up process.

7) Who is an identifying owner.
The entity type on which weak entity type depends is called as an identifying owner.

8) What are the rules of a completeness constraint.
Super type, sub type.

9) An embedded printer provides
An inserted index.

10) Analysis of large database to retrieve information is called as
OLAP (Online Analytical Processing)

11) The end of a sql command is denoted by 
Semicolon(;)

12)  A function that has no partial functional dependencies is in which normal form.
3NF

13) Highest noise margin is offered by
TTL (Transistor-transistor logic)

14) Parallel to serial processing is done by
Multiplexer

15) ANSI X.12 belongs to which standard.
EDI

16) Link analysis operation in data mining makes use of 
Association discovery technique

17) Bluetooth uses which transmission media.
Radio links.

18) What is meant by downflow in data warehouse
It is the process of archiving and backup of data in warehouse.

19) Which synchronizes critical resources to prevent deadlock.
Semaphores.

20) The memory allocation schema subjected to external fragmentation is
Segmentation.

MOCK TEST SOLVED PAPER

1) A  2MB PCM(pulse code modulation) has
31 voice channels & 1 signalling channel.
2) What is Buffering.
Buffering is the process of temporarily storing the data to allow for small variation in device speeds. 

3) What is a terminal emulation.
A software that allows a personal computer to pretend as a computer terminal is called as terminal emulation.

4) What is the use of program counter.
A program counter is used to store address of next instruction to be executed.

5) What is the application of FTP.
File Transfer Protocol(FTP) is used to transfer files with user authentication.

6)  Piggy backing is a technique used for
Acknowledgement.

7) The 2’s complement of 10 is
10
Reason:
Transform 10 using NOT gate which means 01
Add by 1
 01
+ 1
-----
10
-----

8) Producer consumer problem is an example of
Semaphores

9) What is Agglomeration
Agglomeration is the process of grouping tasks in to larger tasks to improve performance.

10) Cycle stealing is a term related to
DMA(Direct Memory Access).

11) The logic family with least fanout is
RTL

12) IP is presented in which layer of OSI.
Network layer.

13)  Context Free Languages are closed under
Union, Kleen, Closure.

14) What is a self join.
A table joined within itself.

15) What is meant by data mining.
Data Mining is the process of extracting previously non known valid and actionable information from large data to make crucial business and strategic decisions.

16) Which error detection method  uses one's complement arithmetic.
Checksum

17) The maximum channel utilization in PURE ALOHA is
18%

18) The maximum channel utilization SLOTTED ALOHA is
36%

19)  A mesh topology is characterized by
Highest reliability.

20) The flow of electrons in CRT is controlled by
Control grid

SOLVED QUESTIONS OF PREVIOUS EXAMS

1) Encryption and Decryption is the responsibility of Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink
Ans.: c.)
Networking related.
Encryption is typically done at this level too, although it can be done on the application, session, transport, or network layers.

2) Software Configuration Management is the discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
Ans.: d.)
Software engineering concept.


3) Which one of the following is not a step of requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysts
(C) Requirement design
(D) Requirement documentation
Ans.: c.)STEPS IN REQUIREMENT ENGINEERING:
—  Requirements inception
—  Requirements identification
—  Requirements analysis and negotiation
—  Requirements specification
(Software Requirements Specification)
—  System modeling
—  Requirements validation
—  Requirements management


4) The student marks should not be greater than 100. This is
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
Ans.: a.)
Rdbms concept
Easy question.
Note: Integrity means to ensure accuracy and consistency of data


5) GO  BOTTOM  and  SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to
(A) 28th record      (B) 27th record
(C) 3rd record       (D) 4th record
Ans.: b.)
Simple logical question. Go to the last record and leave the last 3 recrods, therefore, the control will be shifted to 27th record. 


6) An ER Model includes
I.   An ER diagram portraying entity types.
II.  Attributes for each entity type
III. Relationships among entity types.
IV.  Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV   (B) I&IV
(C) I, II & IV        (D) I & III
Ans.: a.)
Rdbms concept



7) What does the following declaration mean ?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
Ans.: b.)
Simple question.
Related to c language.



8) Which of the following operators can not be overloaded in C+ + ?
(A) *     (B) + =
(C) = =     (D) ::
Ans.: d.)
Very simple.



9) allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members.
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation
Ans.: b.)
OOPS concept.




10)  _________ is often used to prove the correctness of a recursive function.
(A) Diagonaliization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
Ans.: c.)


11) Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right.
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation
Ans.: a.)
Compiler design.



12) The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called    ____________
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation
Ans.: d.)
Operating systems
program relocatability refer to the ability to load and execute a program into an arbitrary place in memory



13) Active X controls are Pentium binary programs that can be embedded in ____________
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages
Ans.: d.)
Windows programming
ActiveX is a loosely defined set of technologies developed by Microsoft in 1996 for sharing information among different applications
Example:  Internet Explorer's Flash player is an ActiveX control. 



14) Match the following :
List-I                                                       List - II
a. Wireless Application Environment      i.    HTTP      
b. Wireless Transaction Protocol           ii.    IP
c. Wireless Datagram Protocol             iii    Scripts
d. Wireless                                          iv.    UDP
Codes :      
     a     b     c    d
(A) ii    iv     i    iii
(B) iv    iii     ii    i
(C) iv    iii     i    ii
(D) iii    i     iv    ii
Ans.: d.)
Mobile computing



15) Which of the following is widely used inside the telephone system for long-haul data traffic ?
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN
Ans.: b.)
Networks



16) The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation :
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE
Ans.: b.)
ANSI (American National Standards Institute)
Current trends and technologies



17) Electronic Data Interchange Software consists of the following four layers :
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope
Ans.: d.)
Current trends and technologies



18) Linux operating system uses
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next
Ans.: b.)
OS



19) The VLF and LF bauds use propagation for communication.
(A) Ground          (B) Sky
(C) Line of sight   (D) Space
Ans.: a.)
Mobile computing



20) Data Integrity control uses  
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
Ans.: d.)
RDBMS concept

DATA STRUCTURES MCQS

1) Number of arcs incident to a node is called as
Ans:-Predecessor

2) Methods of graph traversal
Ans:-Depth First Search(DFS)

3) Breadth First Search(BFS)

 Representation of two dimensional array in memory is called as

Ans:-Row-major and column-major

 4) A heap allows very efficient implementation of 

Ans:-Priority queue

5) The shortest path in weighted graph or network is found out using
Ans:-Dijkastra's algorithm

Kruskal algorithm

 6) The smallest element of a array is called as

Ans:-Lower bound.

7) Which of the following is tautology?
a.)x v y
b.)x v (~y)
c.)x v(~x)
d.)(x=<y)^(x<=y)
Ans.: c.)
Explanation: 


X

~X

X V(~X)
T

F

T
F

T

T
 Tip: '~' denotes negation that is '1' means '0' and '0' means '1'
'V' means 'OR' operator.
Side note: Tautolgy means all the results should be True(T) or 1

8) Minimum number of individual shoes to be picked up from a dark room (containing 10 pair of shoes) if we have to get atleast one proper pair.
a.)3
b.)11
c.)10
d.)20
Ans.: b.)
Explanation of logic: There are 10 pair of shoes.
A single proper matching pair can be found out only when we pick the 11th shoe because till 10th shoe we cannot be very sure that we will get the right pair. But the 11th shoe that we take will definitely let us match the right pair surely. (LOGICAL REASONING QUESTION)

9)  Circle has how many vertices?
a.) No vetices
b.) 2 vertex
c.) 5 vertex
d.) Infinite vertices

Ans.: d.)
Note: A simple but logic question.
You can mark as much vertices as possible on a circle.
Example:
Ugc net computer science
10) The logic of pumping lemma is and example of
a.)Recursion
b.) Divide and conquer rule
c.) Pigeon hole principle
d.) Iteration
Ans.: c.)

11) An undirected graph possesses an eulerian circuit only if it is connected and its vertices are
a.) All of even degree
b.) All of odd degree
c.) of any degree
d.) even in number
Ans.: a.)

12) The number of edges in a complete graph with N vertices is equal to
a.) N(N-1)
b.) 2N-1
c.) N-1
d.) N(N-1)/2
Ans.: d.)

13) The number of edges in a connected graph with 'n' vertices is
a.) n-1
b.) n(n-1)/2
c.) n^2
d.) 2n-1
Ans.: a.)

14) A graph G  4,5  has                     
a.) 4 edges
b.) 5 edges
c.) 20 edges
d.) 15 edges
Ans.: c.)
Logic: Number of edges in Graph G(m,n)=m*n

15) A self complemented,distributed lattice is
a.) Boolean algebra
b.) Modular lattice
c.) Complete lattice
d.) Self dual lattice.
Ans.: a.)

16) A graph with all nodes of equal importance is called as
a.) Complete graph
b.) Regular graph
c.) Non regular graph
d.) Multigraph
Ans.: b.) 

17) A partial ordered relation is transitive, reflexive and
a.) bisymmetric
b.) antisymmetric
c.) antireflexive
d.) asymmetric
Ans.: b.)

18) If n is an integer, and n^2 is odd then 'n' is
a.) even
b.) odd
c.) even or odd
d.) prime
Ans.: b.)
Reason:1.) Let n be 7 then,
n^2=49 

19) Let n be 9 then,
n^2=81
In both cases, the result is an odd number 
Therefore, answer is odd.

DATA STRUCTURES MCQS

What is Data structure?
Ans.: The logical or mathematical representation of data.
It is way of organizing data that considers the data stored and also their relationship with each other.

Applications of data structures in computer science
Ans.: Compiler design
DBMS
Artificial intelligence
Statistical analysis
Numerical analysis
Graphics
Operating system

Simulation

What is the minimum number of queue needed to implement priority queue?
Ans.: Two

Explanation: One queue for actual storing of data and another queue for storing priorities.

Arithmetic expressions cam be evaluated using

Ans.: Polish and reverse polish notations.

Methods used to store sequential files
Ans.: Straight merging
Polyphase sort
Distribution of initial runs.

Natural merging

How many different trees possible with 7 nodes.
Ans.: 121
Explanation: 2^n-n

2^7-7=128-7=121

 Which is the condition that occurs when two distinct key values are mapped to the same memory location.

Ans.: Collision

Simplest file structure is

Ans.: Sequential file structure

What is computational procedure
Ans.: An algorithm that does not terminate.

Example: Operating System

8 queens problem can be solved by

Ans.: Backtracking method.

Which is the memory address of the first element of the array.

Ans.:Base address.

Stack is also called as

Ans.:Push down list.

A descending heap is also called as

Ans.:Max heap

A linked list with no nodes is called as

Ans.:Empty list or null list.

A strictly binary tree with n leaves have how many nodes.

Ans.:2n-1 nodes

Which is the most commonly used hash functions to compute hash address.

Ans.:Division method

Which graph shows basic blocks and the success of relationships

Ans.:Flow graph

Commonly used language processors are
Ans.:Compilers
Interpreters

Assembler

In queue, the end from which data is inserted is called as

Ans.:Rear

Through linked list, we can implement

Ans.:Stack, queue, graph