ASSISTANT PROFESSOR - INFORMATION TECHNOLO0GY- TECHNICAL EDUCATION -ENGINEERING COLLEGES

  1.What is XML?

  1. Super set of SGML, Extendable Markup Language
  2. Subset of SGML, Extensible Markup Language
  3. Like SGML, Extended Markup Language
  4. None Of these
Ans:

2. In TCP a unique sequence number is assigned to each

  1. Byte
  2. Message
  3. Word 
  4. Segment 
3            firewall ito be configured to allow hosts in a private network to freely open TCconnections and send packets on open connections. However, it will only allow external host to send packets on existing open TCP connections or connections that are being opened by internal hosts but not allow them to open TCP connections to host in the private network. To achieve this minimum capability of the firewall should be that of

  1. (A)         combinauonal circuit
  2. (B)        pushdownautomaton with two stacks
  3. (C)        finite automaton
  4. (D)    pushdown automaton with onestacks

4.  HELO and PORTrespectively are commands from the protocoll:

  1. FT'P and HTI'P                                       
  2. TELNet and POP3
  3. HTTP and TELNET                                 
  4. SMTP and FTP


5. 'Which of the following statements ieTRUE about CSMA/CD?

  1. (   IEE802.ll wireless LAN runs CSMA/CD protocol
  2.       Ethernet is not based on CSMA/CDprotocol
  3.        CSMA/CD is not suitable for high propagation delay network like satellite network
  4.         There ino contention in CSMA/CD network


6. Count to infinity is a problem associated with:

  1. Link state routing protocol
  2. DNwhile resolving hostname
  3. Distance vector routing protocol
  4. TCfor congestion control

7. In TCP/IP protocol suite, which onof the following is NOT a part of Iheader?

 

(A)     Fragment Offset

(D)

Destination IAddress

(C)    Source IP Address

(D)

Destination port number

 8. Connected to a department network which is part of a university network. The university network in turn, is part of the internet. The largest network in which the Ethernet address of the host is unique is:
(A)               The subnet to which the host belongs (B)           The department network

(C)    The university network                              (D)    The internet


9.       A sender is employing public key cryptography to send a secret message to a receiver.Which one othe following statements is TRUE?

              (A)    Sender encrypts using receivers public key

(B)       Sender encrypts using his own public key

(C)       Receiver decrypts using senders public key

(D)       Receiver decrypts using his own public key

 10.        Afirewall:

(A)   Is computer or router that sits between the trusted and untrusted

(B)  It limit network accesbetween the two security domains, maintains and logs all connections

(C)       A firewall may need to allohttp to pass

(D)     All of these


11.   linker:
 

(A)

Is not necessary with variable partitions

(B)

Must be run after the loader

(C)

Creates a load module

(D)

Is not needed with good compiler


12.        In real-timeOS,whichof the following is the most suitable scheduling scheme?
 

(A)     Round Robin

(B)

First come first serve

(C)     Preemptive

(D)

Random Scheduling

13.  Dijkstra's banking algorithm in an OSsolves the problem of:
 

(A)

Deadlock avoidance

(B)     Deadlock  recovery

(C)

Mutual exclusion

(D)     Context switching




14. Consider a fully associative cache with 8 cache blocks (numbered 0-7) and the following sequence of memory block requests:

4, 3, 25, 8, 19, 6, 25, 8, 16, 35, 45, 22, 8, 3, 16, 25, 7

If LRU replacement policy is used, which cache block will have memory block 7?

 
(A) 4
(B) 5
(C) 6
(D) 7


Answer: (B)

Explanation: Block size is =8

Given 4, 3, 25, 8, 19, 6, 25, 8, 16, 35, 45, 22, 8, 3, 16, 25, 7

So from 0 to 7 ,we have

  • 4 3 25 8 19 6 16 35    //25,8 LRU so next 16,35 come in the block.
  •  45 3 25 8 19 6 16 35
  • 45 22 25 8 19 6 16 35
  • 45 22 25 8 19 6 16 35
  • 45 22 25 8 3 6 16 35     //16 and 25 already there
  • 45 22 25 8 3 7 16 35   //7 in 5th block

    Therefore , answer is  B

15.Two shared resources R1 and R2 are used by processes P1 and P2. Each process has a certain priority for accessing each resource. Let Tij denote the priority of Pi for accessing  Rj. A process Pi can snatch a resource Rh from process Pj if Tik is greater than Tjk.

Given the following :

  1. T11 > T21
  2. T12 > T22
  3. T11 < T21
  4. T12 < T22

Which of the following conditions ensures that P1 and P2 can never deadlock?

 
(A) (I) and (IV)
(B) (II) and (III)
(C) (I) and (II)
(D) None of the above


Answer: (C)

Explanation:
If all the resources are allocated to one process then deadlock will never occur.
So, if we allocate both R1 and R2 to process P1 or both R1 and R2 to process P2 then deadlock can be prevented.
When one process completes its execution then both the resources are allocated to the other process.
So, either condition (I) and (II) or condition (III) and (IV) ensures that deadlock never occurs.

16.    A problem iNP is NP complete if

(A)      Some problem in NP can be reduced to it inp olynomial time
(B)       The 3..SAproblem can be reduced to iipolynomial time
(C)       It can be reduced to any other problem in NP in polynomial time
(D)       It can be reduced to be SAproblem in polynomial time

 

17.                  The maximum number of edges in an acyclic undirected graph with n vertices is:
(A)      n-1                                                        (B)     n+l
(C)     n                                                           (D)      2n-I
18. In  a binary tree, the number of internal nodes odegree1is 5 and  the number of internal nodes of degree 2is10.The number of leaf nodes ithe binary tree is:

 

(A)     15

(B)

11

(C)     12

(D)

10

19.         Which of  the following a sequence of  array elements form a heap?
(A)     (23,17,14,6,13,10,l,12,7,5)                          (B)     (23,17,14,6,13,10,l,5,7,12)
(C)    [23,17,14,7,13,10,l,5,6,12)                          (D)    (23,17,14,7,13,10,l,12,15,7)

=

 

20.  The binary relationr={{l,1),(2,1),(2,2),(2,8),(2. 4),(3,1),(3,2),(3,3),(3,4)}on the set

A     (1,2,3,4,}is:

(A)         Reflexiv.symmetric antransitive
(B)       Neither refJexive, nor irreflexive but transitive
(C)       Irreflexive and antisymetric
(D)      lrrefexive, symmetric and transitive

 

21In a room containing 28people,there are 1people who speak Englih,1people who speakt Hindi and 22 people who speak Kannada, 9persons speak both Engliand Hindi,11 person speak both Hindi and Kannada whereas 13 persons speak both Kannada and English.How many people speak all the three language?

(A)    6                                                                (B)    7

(C)    8                                                                (D)    9

22.      Which one of the fo1lowing regular expreaaion is NOT equivalent to

Other regularexpression ((ab)*+c*)*?


(A)     (a*+b*+c*)*

(C)     (a+b+c)*


(B)    (a*b*c*)

(D)    (a*b*+c*)*


23.        
Which of the following statementTRUE about other regularexpression 01*0?

(A)         Irepresents finite set of finite strings

(B)         Irepresents an infinite set of finite strings

(C)         Irepresents an infinite set of infinite strings

(D)         Irepresents an finite set of infinite strings

24  .  Let be contextfree language and M are regular language.Then the language LnM:

(A)      Always regular

(B)       Always a deterministic context free language

 

(C)       Never regular

(D)      Always a context free language

                                   A major advantage of inheritance

A.   Reducing the time it take to create new objects

B.   Not having to think about how object will be used

C.   Reducing the amount of memory required to execute the program

                             D.   Enabling  people to  create useful application programs    

                               ANSWER : OPTION A 

                       Which of the following is a realization of polymorphism?

A.   Operator  overloading

B.   Function Overloading

C.   Dynamic Binding

D.   All of these


The technique used to summarize the financial, statistical, mathematical,scientific and economic data is ?

A. 

Presentation Graphics

 B. 

Image processing

 C. 

Computer Art

 D 

None of above


Ans: Option A Presentation Graphics

 Graphics and image processing technique used to produce a transformation of one object into another is called ?

A.

Half toning

B.

Morphine

C.

Animation

D.

None of above

Comments