1. The number of integers between 1 and 250 that are divisible by 2,5 and 7 is
- 2
- 3
- 5
- 8
2. An undirected graph possesses an eulerian circuit if and only if it is connected and its vertices are
- all of even degree
- all of odd degree
- of any degree
- even in number
3. A partially ordered set is said to be a lattice if every two elements in the set have
- a unique lease upper bound
- a unique greatest lower bound
- both A and B
- none of the above
4. The minimum number of edges in a connected graph with ‘n’ vertices is equal to
- n(n-1)
- n(n-1)/2
- n2
- n-1
5. Consider the problem of connecting 19 lamps to a single electric outlet by using extension cords, each of which has four outlets. The number of extension cords required is
- 4
- 5
- 6
- 7
6. The decimal number equivalent of (4057.06)8 is
- 2095.75
- 2095.075
- 2095.937
- 2095.0937
7. is equivalent to
- A ⊕ B
- A ⊙ B
- (A ⊕ B)⊙ C
- (A⊙B)⊕C
8. An astable multi vibrator has
- one stable state
- two stable states
- no stable states
- none of these
9. 12-bit 2’s complement of -73.75 is
- 01001001.1100
- 11001001.1100
- 10110110.0100
- 10110110.1100
10. Encoding of data bits 0011 into 7-bit even Parity Hamming Code is
- 0011110
- 0101110
- 0010110
- 0011100
11. How many of the following declarations are correct?
int z = 7.0;
double void = 0.000;
short array[2] = {0,1,2};
char c = “\n”;
- None
- One is correct
- Two are correct
- All four are correct
12. The value of the following expression (13/4*3)%5+1 is
- 5.75
- 2.95
- 1.4875
- 5
13. Which one of the following will set the value of y to 5 if x has the value 3, but not otherwise?
- if (x = 3) y = 5
- if x = = 3 (y = 5)
- if (x = = 3); y = 5
- if (x = = 3) y = 5
14. Which one of the following sentences is true?
- The body of a while loop is executed at least once.
- The body of a do … while loop is executed at least once.
- The body of a do … while loop is executed zero or more times.
- A for loop can never be used in place of a while loop.
15. “Black” refers in the “Black-box” testing means
- Characters of the movie “Black”
- I-O is hidden
- Design is hidden
- Users are hidden
16. In generalization, the differences between members of an entity is
- maximized
- minimized
- both 1 and 2
- None of these
17. The dependency preservation decomposition is a property to decompose database schema D, in which each functional dependency X → Y specified in F.
- appeared directly in one of the relation schemas Ri in the decomposed D.
- could be inferred from dependencies that appear in some Ri.
- both 1 and 2.
- None of these
18. Which of the following is an optimistic concurrency control method?
- Validation based
- Time stamp ordering
- Lock-based
- None of these
19. Optical storage is a
- high-speed direct access storage device.
- low-speed direct access storage device.
- medium-speed direct access storage device.
- high-speed sequential access storage device.
20. Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges?
- Authorization
- Authentication
- Access Control
- All of these
21. What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root at depth 0) ?
- 111
- 999
- 9999
- None of the above
22. A binary tree with 27 nodes has _____ null branches.
- 54
- 27
- 26.
- None of the above
23. The time complexity to build a heap of n elements is
- O(1)
- O(logn)
- O(n)
- O(nlgn)
24. Linear probing suffers from a problem known as
- Secondary clustering
- Primary clustering
- Both 1 and 2
- None of these
25. Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88?
- 90, 40, 65, 50, 88
- 90, 110, 80, 85, 88
- 190, 60, 90, 85, 88
- 65, 140, 80, 70, 88
26. Frequency shift keying is used mostly in
- Radio transmission
- Telegraphy
- Telephone
- None of the above
27. The baud rate is
- always equal to the bit transfer rate
- equal to twice the bandwidth of an ideal channel
- not equal to the signaling rate
- equal to half of the bandwidth of an ideal channel
28. How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron?
- 300 MHz
- 3 GHz
- 300 THz
- 30 KHz
29. Which of the following file transfer protocols use TCP and established two virtual circuits between the local and remote server?
- FTP
- TFTP
- TELNET
- NFS
30. The threshold effect in demodulator is
- exhibited by all demodulator, when the input signal to noise ratio is low
- the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
- the property exhibited by all A.M. suppressed carrier coherent demodulator.
- the property exhibited by correlation receiver.
31. Object code is the output of ______
- Operating System
- Compiler or Assembler
- only assembler
- only Compiler
32. ‘Macro’ in and assembly level program is ____.
- sub program
- a complete program
- a hardware portion
- relative coding
33. Grammar of the programming is checked at ______ phase of compiler.
- semantic analysis
- code generation
- syntax analysis
- code optimization
34. the register or main memory location which contains the effective address of the operand is known as
- pointer
- special location
- indexed register
- None of the above
35. Macor-processors are______.
- Hardware
- Compiler
- Registers
- None of the above
36. The dynamic allocation of storage areas with VSAM files is accomplished by
- Hashing
- Control splits
- Overflow areas
- Relative recoding
37. Which of the following command the file names in multiple columns?
- IS – X
- IS
- IS – I
- IS – f – X
38. WINDOWS is a __________ operating.
- Real time
- Multi – user
- Preemptive
- Non-preemptive
39. Page making process from main memory to disk is called
- Interruption
- Termination
- Swapping
- None of the above
40. A Dead-lock in an Operating System is
- Desirable process
- Undesirable process
- Definite waiting process
- All of the above
41. Prototyping is used to
- test the software as an end product.
- expand design details
- refine and establish requirements gathering
- None of the above
42. Which of these are not software maintenance activity ?
- Error correction
- Adaption
- Implementation of Enhancement
- Establishing scope
43. The system specification is the first deliverable in the computer system engineering process which does not include
- Functional Description
- Cost
- Schedule
- Technical Analysis
44. The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
- Abrham Silber Shatz
- Barry Boehm
- C.J. Date
- D.E. Kenith
45. The Warnier diagram enabled analyst
- to represent information hierarchy in compact manner
- to further identify requirement
- to estimate the total cost involved
- None of the above
46. A data mart may contain
- summarized data
- de-normalized data
- aggregate departmental data
- All of the above
47. Data mining is
- the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions
- a tool that allows end users direct access and manipulation of data from within data warehousing environment without the intervention of customized programming activity.
- a tool that helps end users extract useful business information from large database.
- All of the above
48. E-Choupal refers to
- calling meeting of Surpanches electronically.
- conducting Panchayat meeting using latest electronic gadgets.
- providing window of information to villagers and farmers in NIC network.
- None of above
49. The basic concepts of ethics in information society is/are
- Responsibility
- Accountability
- Liability
- All of the above
50. One of the distinguished features of super-computer over other category of computer is
- parallel processing
- highest accuracy lever
- more speed
- more capacity