Thursday, April 7, 2016

Objective Questions(129-150)



129)what is the output:
void main()
{
printf(5+"computer science");
} Output: ter science
130) the minimum no. of record movement requires to merge five files A (with 10 records), B with(20 records),C (with 15 records),D (with 5 records)and E (with 25 records) in

(a) 165
(b) 90
(c)75
(d) 65
D)65
1.MOVE B-20 RECORDS TO A-->> 20
2.MOVE C-15 RECORDS TO A-->> 15
3.MOVE D-05 RECORDS TO A-->> 05
4.MOVE E-25 RECORDS TO A-->> 25

TOTAL---------------------------->> 65
keep the records of A fixed and insert the records of the other files in A sorted order .this would require 20+15+5+25=65 records movement.
131) We need a data word of atleast 16 bits. The C(n,k) with d-min=3 is. 1.C(26,21). 2.C(28,24) 3.C(31,26) 4.C(30,26)
We need to make k = n - m (where n=(2^m) - 1) >= 16, or 2^ m - 1 - m >=16.
• If we set m = 4, the result is n = 2^4 – 1=16 and k = 16 – 4= 12, which is not acceptable(<=16).
• If we set m = 5, the result is n = 2^5 - 1 =31and k = 31 – 5=26 , which satisfies the condition
So the code is C(n, k)=C(31,26).
132)TO_DS and From DS fields of wireless frame are 11 it means:
a. frame moving from AP to Computer.
b. Frame moving from computer to AP
c. Frame moving from AP to another AP
d. NONE of the above
133) A NOR gate recognizes only the input word whose bits are
(A) 0’s and 1’s
(B) 1’s
(
C) 0’s
(D) 0’s or 1’s
134) Which of the following does not allow multiple users or devices to share one communications line?
A. doubleplexer
B. multipplexer
C. concentrator
D. controller
135) which of the following technology solution a banks may use to transfer an e-cheque (A) XML (B) EDI (C) encrypted (D) Wml
136) Q. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft
.
137) How many different Boolean functions of degree 4 are there
(A)2^4
(B)2^8
(C)2^12
(
D)2^16
138)Inter process communication can be done through __________.
1 Mails
2 Messages
3 System calls
4 Traps
processcomunication can be done through 1. Pipes 2.Message 3.Shared memory 4. Signals
139)The wavelength of a signal depends on the ________.
a. Frequencies of the signal
b. Medium
c. Phase of the signal
d. (a) and (b)
140) If all the pages have been referenced (i-e. have their reference bit set) second chance page replacement algorithm degenerates into.........? a) LRU b)FIFO c)Pure FIFO d)OPT
141)How many relations are there on a set
with n elements that are symmetric and
a set with n elements that are reflexive
and symmetric ?
(A) 2n(n+1)/2 and 2n.3n(n–1)/2
(B) 3n(n–1)/2 and 2n(n–1)
(C) 2n(n+1)/2 and 3n(n–1)/2
(D) 2n(n+1)/2 and 2n(n–1)/2
No. of relations on an n element set that are symmetric is 2^(n(n+1)/2). No. of relations that are both reflexive and symmetric is 2^(n(n-1)/2). The answer is (D) (although there is typing error).
 
142) Concatenation operator in SQL *plus------
(a) &&
(b) +
(c) –
(d) ||
143) Q. Which Programming language is considered the first Object-oriented Programming language?
A. Smalltalk
B. Simula
simula is first time use object in programming language but smalltalk is the first and fully object oriented programming language..........
Simula(1967) but Smalltalk(1970) with the actual idea of object oriented in mind..
144) Internet classifieds follow which e-commerce business model ?
(A)B2B
(B)B2C
(C)C2C
(D)G2B
145) what was originally called the "imitation game" by its creater?

a. the turing test
b. LISP
c. the logic theorist
d. cybernetics
146) the data rate of a isdn-basic access-b-channel is:
1. 32kbps
2. 64 kbps
3.144 kbps
4. 192 kbps
147) Which of the following permutation can be obtained in the output (in the same order) using a stack assuming that
the input is the sequence1, 2, 3, 4, 5 in that order?
(E) 3, 4, 5, 1, 2
(F) 3, 4, 5, 2, 1
(G) 1, 5, 2, 3, 4
(H) 5, 4, 3, 1, 2
Push 1,2,3 stack-> 1,2,3
pop 3 , stack-> 1,2
Push 4, stack->1,2,4
pop 4 , stack->1,2
Push 5, stack->1,2,5
pop 5 , stack->1,2
Pop 2 , stack->1
Pop 1
So output sequence is 3,4,5,2,1 ans F
148) The frame continues to circulate in the ring has bit pattern
a. all 1
b. 10 so on
c. all 0
d. None of the above
149) the mapping of ip addresses by ethernet address is done by ............. protocol.
ARP, in which ip address is mapped into MAC address.
150) Q. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software