1.What is XML?
- Super set of SGML, Extendable Markup Language
- Subset of SGML, Extensible Markup Language
- Like SGML, Extended Markup Language
- None Of these
Ans:
2. In TCP a unique sequence number is assigned to each
3 A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external host to send packets on existing open TCP connections or connections that are being opened by internal hosts but not allow them to open TCP connections to host in the private network. To achieve this minimum capability of the firewall should be that of
- Byte
- Message
- Word
- Segment
- (A) A combinauonal circuit
- (B) A pushdownautomaton with two stacks
- (C) A finite automaton
- (D) A pushdown automaton with onestacks
4. HELO and PORT, respectively are commands from the protocoll:
- FT'P and HTI'P
- TELNet and POP3
- HTTP and TELNET
- SMTP and FTP
5. 'Which of the following statements ieTRUE about CSMA/CD?
- ( IEE802.ll wireless LAN runs CSMA/CD protocol
- Ethernet is not based on CSMA/CDprotocol
- CSMA/CD is not suitable for a high propagation delay network like satellite network
- There is no contention in a CSMA/CD network
6. Count to infinity is a problem associated with:
- Link state routing protocol
- DNS while resolving hostname
- Distance vector routing protocol
- TCP for congestion control
7. In a TCP/IP protocol suite, which one of the following is NOT a part of IP header?
(A) Fragment Offset
(D)
Destination IP Address
(C) Source IP Address
(D)
Destination port number
8. Connected to a department network which is part of a university network. The university network in turn, is part of the internet. The largest network in which the Ethernet address of the host is unique is:
(A) The subnet to which the host belongs (B) The department network(C) The university network (D) The internet
9. A sender is employing public key cryptography to send a secret message to a receiver.Which one of the following statements is TRUE?
(A) Sender encrypts using receivers public key
(B) Sender encrypts using his own public key
(C) Receiver decrypts using senders public key
(D) Receiver decrypts using his own public key
10. Afirewall:
12. In real-timeOS,whichof the following is the most suitable scheduling scheme?11. A linker:(A) Is a computer or router that sits between the trusted and untrusted
(B) It limit network access between the two security domains, maintains and logs all connections
(C) A firewall may need to allow http to pass
(D) All of these
(A)
Is not necessary with variable partitions
(B)
Must be run after the loader
(C)
Creates a load module
(D)
Is not needed with a good compiler
13. Dijkstra's banking algorithm in an OS, solves the problem of:
(A) Round Robin
(B)
First come first serve
(C) Preemptive
(D)
Random Scheduling
(A) | Deadlock avoidance | (B) Deadlock recovery |
(C) | Mutual exclusion | (D) Context switching |
14. Consider a fully associative cache with 8 cache blocks (numbered 0-7) and the following sequence of memory block requests:
4, 3, 25, 8, 19, 6, 25, 8, 16, 35, 45, 22, 8, 3, 16, 25, 7
If LRU replacement policy is used, which cache block will have memory block 7?
(A) 4
(B) 5
(C) 6
(D) 7
Answer: (B)
Explanation: Block size is =8Given 4, 3, 25, 8, 19, 6, 25, 8, 16, 35, 45, 22, 8, 3, 16, 25, 7
So from 0 to 7 ,we have
- 4 3 25 8 19 6 16 35 //25,8 LRU so next 16,35 come in the block.
- 45 3 25 8 19 6 16 35
- 45 22 25 8 19 6 16 35
- 45 22 25 8 19 6 16 35
- 45 22 25 8 3 6 16 35 //16 and 25 already there
- 45 22 25 8 3 7 16 35 //7 in 5th block
Therefore , answer is B
15.Two shared resources R1 and R2 are used by processes P1 and P2. Each process has a certain priority for accessing each resource. Let Tij denote the priority of Pi for accessing Rj. A process Pi can snatch a resource Rh from process Pj if Tik is greater than Tjk.
Given the following :
- T11 > T21
- T12 > T22
- T11 < T21
- T12 < T22
Which of the following conditions ensures that P1 and P2 can never deadlock?
(A) (I) and (IV)
(B) (II) and (III)
(C) (I) and (II)
(D) None of the above
Answer: (C)
Explanation:
If all the resources are allocated to one process then deadlock will never occur.
So, if we allocate both R1 and R2 to process P1 or both R1 and R2 to process P2 then deadlock can be prevented.
When one process completes its execution then both the resources are allocated to the other process.
So, either condition (I) and (II) or condition (III) and (IV) ensures that deadlock never occurs.16. A problem in NP is NP complete if
(A) Some problem in NP can be reduced to it inp olynomial time
(B) The 3..SAT problem can be reduced to it in polynomial time
(C) It can be reduced to any other problem in NP in polynomial time
(D) It can be reduced to be 3 SAT problem in polynomial time
17. The maximum number of edges in an acyclic undirected graph with n vertices is:
(A) n-1 (B) n+l
(C) n (D) 2n-I
18. In a binary tree, the number of internal nodes of degree1is 5 and the number of internal nodes of degree 2is10.The number of leaf nodes in the binary tree is:
(A) 15
(B)
11
(C) 12
(D)
10
19. Which of the following a sequence of array elements form a heap?
(A) (23,17,14,6,13,10,l,12,7,5) (B) (23,17,14,6,13,10,l,5,7,12)
(C) [23,17,14,7,13,10,l,5,6,12) (D) (23,17,14,7,13,10,l,12,15,7)
=
20. The binary relationr={{l,1),(2,1),(2,2),(2,8),(2. 4),(3,1),(3,2),(3,3),(3,4)}on the set
A (1,2,3,4,}is:
(A) Reflexive .symmetric and transitive
(B) Neither refJexive, nor irreflexive but transitive
(C) Irreflexive and antisymetric
(D) lrrefexive, symmetric and transitive
21. In a room containing 28people,there are 18 people who speak Engli•h,15 people who speakt Hindi and 22 people who speak Kannada, 9persons speak both Engli•h and Hindi,11 person speak both Hindi and Kannada whereas 13 persons speak both Kannada and English.How many people speak all the three language?
(A) 6 (B) 7
(C) 8 (D) 9
22. Which one of the fo1lowing regular expreaaion is NOT equivalent to
Other regularexpression ((ab)*+c*)*?
(A) (a*+b*+c*)*
(C) (a+b+c)*
(B) (a*b*c*)
(D) (a*b*+c*)*
23.
Which of the following statements TRUE about other regularexpression 01*0?(A) It represents finite set of finite strings
(B) It represents an infinite set of finite strings
(C) It represents an infinite set of infinite strings
(D) It represents an finite set of infinite strings
24 . Let L be a contextfree language and M are regular language.Then the language LnM:
(A) Always regular
(B) Always a deterministic context free language
(C) Never regular
(D) Always a context free language
A major advantage of inheritance
A.
Reducing the time it take to create new
objects
B.
Not having to think about how object
will be used
C.
Reducing the amount of memory
required to execute the program
D. Enabling people to create useful application programs
ANSWER : OPTION A
Which of the following is a realization of polymorphism?
A.
Operator
overloading
B.
Function
Overloading
C.
Dynamic
Binding
D.
All
of these
The technique used to summarize the financial, statistical, mathematical,scientific and economic data is ?
|
|
||||||||
|
|
||||||||
|
|
||||||||
|
Ans: Option A Presentation Graphics Graphics and image processing technique used to produce a transformation of one object into another is called ?
|
Comments
Post a Comment