0 of 68 questions completed
Questions:
General instruction:
1. The clock will be set at the server. The countdown timer at the top right corner of screen will display the remaining time available for you to complete the examination. When the timer reaches zero, the examination will end by itself. You need not terminate the examination or submit your paper.
2. The Question Palette displayed on the right side of screen will show the status of each question using one of the following symbols.
(White)You have not answered the question
(Green)You have answered the question
(Orange)You have NOT answered the question, but have marked the question for review.
The Mark for Review status for a question simply indicates that you would like to look0 at that question again. If a question is answered, but marked for review, then the answer will be considered for evaluation unless the status is modified by the candidates.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 68 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 marks, (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which word does NOT belong with others?
Suppose a fraud shopkeeper sells rice to the customer at the cost price,but he uses a false weight of 900gm for a kg then his percentage gain is
Let us consider the length of the side of a square represented by 2y+3. The length of the side of an equilateral triangle is 4y. If the square and the equilateral triangle have equal perimeter, then what is the value of y?
A software engineer has the capability of thinking 200 lines of code in five minutes and can type 200 lines of code in 10 minutes. He takes a break for five minutes after every 10 minutes. How many lines of code will he complete typing after an hour?
Look at this sequence SCD TEF UGH _____ WKL, and find the missing sequence.
Here are some words translated from an any language.
dionot means oak tree
blyonot means oak leaf
blycrin means maple leaf
Which word could mean “maple syrup”?
If finch related to bird (i.e.,) FINCH : BIRD. Then, find the pair that has a similar relationship.
Candid is to indirect as honest is to
Divide 88 into four parts such as first part known as a, second part b, third part c, and fourth part is d, when 5 is added to the first part, 5 is subtracted from the second part, 3 is multiplied by the third part and the fourth part is divided by 5, then all results value are equal. Find the value of a, b, c and d respectively.
Look at this series 25,25,37,37,…51,…. What number should fill the blank?
Look at this series:5000, 1001, 201, 41, …….What number should come next?
A construction company ready to finish a construction work in 180 days, hired 80 workers each working 8 hours daily. After 90 days, only 2/7 of the work was completed. How many workers are to be increased to complete the work on time?
Note: If additionally acquired workers do agree to work for 10 hours daily.
A Professor passed one sixth of his life in childhood, one twelfth in youth, and one seventh more as a bachelor, five years after his marriage a son was born who died four years before his father at half his final age, then what is the age of Professor?
Minimum_________ Full Adder and__________ Half adders are required by the BCD adder to add two decimal digits.
Consider the following message M=1010001101. The cyclic redundancy check (CRC) for this message using the divisor polynomial x^{5}+x^{4}+x^{2}+1 is :
Dijkstra algorithm is based on
Which one of the following languages over the alphabet {0,1} is described by the regular expression: (0+1)*1(0+1)*1?
For a given hash table T with 10 slots that stores 1000 elements, the load factor α for T is
Identify the true statements from the given Statements.
(1) HTTP may use different TCP connection for different objects of a webpage if non-persistent connections are used.
(2) FTP uses two TCP connections, one for data and another control.
(3) TELNET and FTP can only use TWO connection at a time.
Identify the total number of tokens in the given statement
Printf(“A%B=”, &i);
__________number of queues to implement stack
For the given nodes:
89,19,50,17,12,15,2,5,7,11,6,9,100
The minimum number of interchanges needed to convert it into a max-heap is
The smallest element can be found in time ___________ in a binary max heap.
________________ is the worst case time complexity for all the operations(i.e search, update and delete) in a general Binary search Tree.
Which of the following code replacements is an example of operator strength reduction?
______IP address can be used in WAN
The following table has two attributes X and Y where X is the primary key and Y is the foreign key referencing X with on-delete cascade.
The set of all tuples that must be additionally deleted to preserve referential integrity when the tuple (3,4) is deleted is(4,3) and (6,4)
X | Y |
2 | 4 |
3 | 4 |
4 | 3 |
5 | 2 |
7 | 2 |
9 | 5 |
6 | 4 |
______ transport layer protocol is used to support electronic mail
______ sorting algorithms has the lowest worst-case complexity.
Baud rate measures the number of ____ transmitted per second
Evaluation of the given post fix expression
10 10 + 60 6 / * 8 –
Identify the subnet mask for the given direct broadcast address of subnet is 201.15.16.31
(A+C′)(B′+C′) simplifies to
____ is used to convert from recursive to iterative implementation of an algorithm
Identify the true statement from the given statements:
1. Number of child pointers in a B/B+ tree node is always equal to number of keys in it plus one
2. B/B+ tree is defined by a term minimum degree. And minimum degree depends on hard disk block size, key and address size
__________ pair of traversals is not sufficient to build a binary tree.
Find the effective access time for the memory for the given data.
Page fault service time =8 ms
Average memory access time =20 ns
One page fault is generated for every memory access =10^{6}
Find the given recurrence equation
T(n)= 2T(n-1), if n>0
= 1, otherwise
____ symbol is used to denote derived attributes in ER model
______ is NOT a part of the ACID properties
Among all given option, ____ must reside in the main memory.
Time to Live(TTL) field in the IP datagram is used ______
Maximum number of superkeys for the relation schema R(X,Y,Z,W) with X as the key is
If the period of a signal is 100 ms. Then its frequency in Hertz is ______
In a system, counting semaphore was initialized to 10, then 6P(wait) operations and 4V (signal) operations were completed on this semaphore. So _____ is the final value of the semaphore.
Identify the correct nodes and edges in the given intermediate code
1. i=1
2. t1=5∗i
3. t2=4∗t1
4. t3=t2
5. a[t3]=0
6. i=i+1
7. if i<15 goto(2)
____ number of gates are required to implement the Boolean function (AB+C) with using only 2-input NOR gates.
A RAM chip has a capacity of 1024 words of 8 bits each (1K×8). The number of 2×4 decoders with enable line needed to construct a 32K×8 RAM from 1K×8 RAM is
___________ number of undirected graph can be constructed using V = {v1, v2, … vn} of n vertices.
The language {W ^{a }X ^{b }Y ^{a+b} ∣a,b >It is context free grammar but not regular because it requires to solve one stack of memory.1} is
To evaluate an expression without any embedded function calls
The number of leaf nodes in a rooted tree of n nodes, with each node having 0 or 3 children is:
Given the language L = {ab, aa, baa}, __________ number of strings are in L*?
(1) baaaba
(2) aabaaaa
(3) baabaaabaa
(4) baaabaaa
Identify the true statement from the given statements. Program relocation at rum time
(1) requires transfer complete block to some memory locations
(2) requires both base address and relative address
(3) requires only absolute address
_____ is holding an entry for each terminal symbol and is acting as permanent database.
In the given truth table f(x,y) represents the boolean function.
x | y | f(x,y) |
0 | 0 | 1 |
0 | 1 | 0 |
1 | 0 | 0 |
1 | 1 | 1 |
The context free grammar S→aSb ∣ bSa ∣ϵ generates:
In the disk, swap space is used to _______.
Consider the following Finite State Automaton. The language accepted by the automaton is given by the regular.
Identify the true statement from the given statements:
(1) A recursive formal language is a recursive subset in the set of all possible words over the alphabet of the language.
(2) The complement of a recursive languages is recursive
(3) The complement of a context-free language is context-free
Identify the true statement from the given statements.
(1) FIFO is non-preemptive
(2) Round robin is non-preemptive
(3) Multilevel Queue Scheduling is non-preemptive
Identify the true statement from the given statements.
Lossless, dependency-preserving Decompositoin into 3 NF is always possible
Any relation with two attributes is BCNF
The ALU uses _____ to store intermediate result
Consider the following functional dependencies in a database:
A→B
B→C
D→E
E→D
F→G
F→H
(E,F)→1
The relation (E,D,A,B) is
The hexadecimal representation of (632)_{8} is
The process executes the following code and after execution ______ number of child process get created
fork();
fork();
fork();
fork();
_____ merges the bodies of two loops
Deceasing the RAM cause