1) C programming : Match the following:
a. calloc( ) ------- i. Frees previouslyallocated space. b. free( ) ----------- ii. Modifiespreviouslyallocated space. c. malloc( ) ------- iii. Allocates spacefor array. d. realloc( ) ------- iv. Allocatesrequested size ofspace.
a. a-iii, b-i, c –iv, d -ii
b. a-iii, b-ii, c –i, d -iv
c. a-iii, b-iv, c –i, d -ii
d. a-iv, b-ii, c –iii, d -i
Answer
Explanation
|
ANSWER: a-iii, b-i, c –iv, d -ii
Explanation: No explanation is available for this question!
|
|
2) C programming : Trace the output.
void main() { int i=2,j=2; while(i+1?--i:j++) printf("%d",i); }
a. 1
b. 2
c. ERROR
d. None of the above.
Answer
Explanation
|
ANSWER: 1
Explanation: No explanation is available for this question!
|
|
3) C programming : Trace the output
int main() { int a=12,b=39; printf ("%d",a&b); return 0; }
a. 468
b. 0
c. 4
d. None of the above.
Answer
Explanation
|
ANSWER: 4
Explanation: No explanation is available for this question!
|
|
4) C programming : If you want to store dissimilar data together, then which type you will use?
a. array
b. structure
c. stack
d. None of the above.
Answer
Explanation
|
ANSWER: structure
Explanation: No explanation is available for this question!
|
|
5) C programming : Suppose that x is a one dimensional array, then choose the correct answer regarding array.
a. *(x + n) is same as &x[n]
b. *&x[n] is same as x + n
c. *(x + n) is same as x[n] +1
d. *(x + n) is same as *x[n]
Answer
Explanation
|
ANSWER: *(x + n) is same as &x[n]
Explanation: No explanation is available for this question!
|
|
6) C programming : State true of false.
It is possible to pass a structure variable to a function either by value or by address.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: No explanation is available for this question!
|
|
7) C++: A collection of generic class and function is called as
a. Standard Template Library (STL)
b. Header file
c. Function template.
d. None of the above.
Answer
Explanation
|
ANSWER: Standard Template Library (STL)
Explanation: No explanation is available for this question!
|
|
8) C++: Which of the following is\are true about virtual function?
a. Function call is resolved at run-time
b. It is member function of a class.
c. Generally has a different functionality in the derived class.
d. All of the above.
Answer
Explanation
|
ANSWER: All of the above.
Explanation: No explanation is available for this question!
|
|
9) C++: The Standard Template Library (STL) consists of three main components. What are those components?
a. ADT, Structure,class.
b. Containers, Algorithms, and statements.
c. Containers, Algorithms, and Iterators.
d. None of the above.
Answer
Explanation
|
ANSWER: Containers, Algorithms, and Iterators.
Explanation: No explanation is available for this question!
|
|
10) C++: What is RTTI?
a. Run-Time Type Identification (RTTI) is a technique that is used to know the type of any object at run time.
b. RTTI is a technique that is used to know the type of any object at compile time.
c. RTTI reserve memory of function at run time.
d. None of the above.
Answer
Explanation
|
ANSWER: Run-Time Type Identification (RTTI) is a technique that is used to know the type of any object at run time.
Explanation: No explanation is available for this question!
|
|
11) C++: Trace the output
void execute (int x, int y = 200) { Int temp = x + y;
x +=temp; if (y!= 200) cout << temp << ” ” << x << ” ” << y << ” ” << endl; } void main ( ) {
int a = 50, b = 20; execute (b); cout << a << ” ” << b << ” ” << endl; execute (a, b); }
a. 2202050 50 20
b. 50 20 70 120 20
c. 20 200
d. None of the above.
Answer
Explanation
|
ANSWER: 50 20 70 120 20
Explanation: No explanation is available for this question!
|
|
12) C++: Which of the following is\are correct statements about inline function and macros.
a. Inline functions are parsed by the compiler but Macros are expanded by the C++ preprocessor.
b. Inline functions follow strict parameter type checking.
c. Macros do not follow parameter type checking.
d. All of the above.
Answer
Explanation
|
ANSWER: All of the above.
Explanation: No explanation is available for this question!
|
|
13) Operating System: Which of the following scheduling policy is well suited for a time shared operating system?
a. First come first serve.
b. Shortest job first
c. Round robin
d. None of the above.
Answer
Explanation
|
ANSWER: Round robin
Explanation: No explanation is available for this question!
|
|
14) Operating System: Which RAID level refers to disk mirroring?
a. 0
b. 1
c. 2
d. 3
Answer
Explanation
|
ANSWER: 1
Explanation: No explanation is available for this question!
|
|
15) Operating System: Which one of the following is not a valid state of a thread?
a. running
b. destroying
c. ready
d. blocked
Answer
Explanation
|
ANSWER: destroying
Explanation: No explanation is available for this question!
|
|
16) Operating System: The address generated by the CPU is referred to as:
a. physical address
b. logical address
c. physical as well as logical address.
d. None of the above.
Answer
Explanation
|
ANSWER: logical address
Explanation: No explanation is available for this question!
|
|
17) Operating System: Which of the following scheduling algorithm is non-pre-emptive?
a. Multilevel feedback queue.
b. Round Robin
c. FIFO
d. None of the above.
Answer
Explanation
|
ANSWER: FIFO
Explanation: No explanation is available for this question!
|
|
18) Operating System: The optimal page replacement algorithm will select the page that
a. has been used least number of times.
b. has been used most number of times.
c. has been used for the longest time in the past.
d. will not be used for the longest time in future.
Answer
Explanation
|
ANSWER: will not be used for the longest time in future.
Explanation: No explanation is available for this question!
|
|
19) Data Structure: Which amongst the following cannot be a balance factor of any node of an AVL tree?
a. 0
b. 1
c. –1
d. 2
Answer
Explanation
|
ANSWER: 2
Explanation: No explanation is available for this question!
|
|
20) Data Structure: A complete Binary Tree contains 15 nodes, then how many edges are there in the tree?
a. 15
b. 30
c. 14
d. 16
Answer
Explanation
|
ANSWER: 14
Explanation: No explanation is available for this question!
|
|
21) Data Structure: Preorder and in order of a tree is give
Preorder ----- A B D H E C F I G J K Inorder -------- D H B E A I F C J G K
What will be the postorder?
a. H D E B I F J K G C A
b. H D E B F I J K G C A
c. H D E B I F J K CG A
d. None of the above.
Answer
Explanation
|
ANSWER: H D E B I F J K G C A
Explanation: No explanation is available for this question!
|
|
22) Data Structure: A complete binary tree with the property that key value in any node is greater than or equal to the key values in both its children is called as.
a. Binary search tree
b. Threaded binary tree
c. Heap
d. AVL tree
Answer
Explanation
|
ANSWER: Heap
Explanation: No explanation is available for this question!
|
|
23) Data Structure: K4 and K3 are graphs with the following structure.
Which one of the following statements is TRUE in relation to these graphs?
a. K4 is planar while Q3 is not
b. Q3 is planar while K4 is not
c. Both K4 and Q3 are planar
d. Neither K4 nor Q3 is planar
Answer
Explanation
|
ANSWER: Both K4 and Q3 are planar
Explanation: No explanation is available for this question!
|
|
24) Data Structure: What is the infix version of the following postfix expression?
x 12 + z 17 y + 42 * / +
a. x + 12 + z / 17 + y * 42
b. x + 12 + z / ((17 + y) * 42)
c. (x + 12 + z) / (17 + y * 42)
d. None of the above.
Answer
Explanation
|
ANSWER: x + 12 + z / ((17 + y) * 42)
Explanation: No explanation is available for this question!
|
|
25) Networking: Why Piggybacking technique is used?
a. To take the backup of data packets.
b. To improve the efficiency of the unidirectional protocols.
c. To improve the efficiency of the bidirectional protocols.
d. None of the above.
Answer
Explanation
|
ANSWER: To improve the efficiency of the bidirectional protocols.
Explanation: No explanation is available for this question!
|
|
26) Networking: Which of the following addresses is used to deliver a message to the correct application program running on a host?
a. Port
b. IP
c. Logical
d. Physical
Answer
Explanation
|
ANSWER: Port
Explanation: No explanation is available for this question!
|
|
27) Networking: In classful addressing, the IP address 190.255.254.254 belongs to which class?
a. Class A
b. Class B
c. Class C
d. Class D
Answer
Explanation
|
ANSWER: Class B
Explanation: No explanation is available for this question!
|
|
28) Networking: Match the following :
a. Data linklayer --------- i. Flowcontrol b. Network layer --------- ii. Node tonodedelivery c. Transport layer ------- iii. Mailservices d. Application layer ---- iv. Routing
a. a-ii , b-i , c-iv , d-iii
b. a-ii , b-iv , c-i , d-iii
c. a-ii , b-i , c-iii , d-iv
d. a-ii , b-iv , c-iii , d-i
Answer
Explanation
|
ANSWER: a-ii , b-iv , c-i , d-iii
Explanation: No explanation is available for this question!
|
|
29) Networking: Which one of the following uses UDP as the transport protocol?
a. SMTP
b. HTTP
c. Telnet
d. DNS
Answer
Explanation
|
ANSWER: DNS
Explanation: No explanation is available for this question!
|
|
30) Networking: The period of a signal is 10 ms. What is its frequency in Hertz?
a. 10
b. 100
c. 1000
d. 10000
Answer
Explanation
|
ANSWER: 100
Explanation: No explanation is available for this question!
|
|