SAT – Sample Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Gauravitchap
G
Gauravitchap
Community Contributor
Quizzes Created: 1 | Total Attempts: 164
| Attempts: 164 | Questions: 19
Please wait...
Question 1 / 19
0 %
0/100
Score 0/100
1. A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet?

Explanation

The subnet mask 255.255.255.192 indicates that the first 26 bits of the IP address are used to identify the network, while the remaining 6 bits are used to identify the hosts within that network. With 6 bits, there are 2^6 = 64 possible combinations, but 2 of them are reserved (all 0s and all 1s). Therefore, the maximum number of hosts that can belong to this subnet is 64 - 2 = 62.

Submit
Please wait...
About This Quiz
SAT Quizzes & Trivia

A score of 80% in the practice exam is a good check for basic knowledge. It is a good practice to give the test at one shot. . . .

Personalize your quiz and earn a certificate with your name on it!
2. What is the availability of a software with the following reliability figures?
Mean Time Between Failure (MTBF) = 25 days
Mean Time To Repair (MTTR) = 6 hours

Explanation

The availability of a software can be calculated using the formula: Availability = MTBF / (MTBF + MTTR). In this case, the MTBF is given as 25 days and the MTTR is given as 6 hours. To calculate the availability, we need to convert the MTTR from hours to days by dividing it by 24 (since there are 24 hours in a day). So, the MTTR becomes 6/24 = 0.25 days. Plugging these values into the formula, we get: Availability = 25 / (25 + 0.25) = 25 / 25.25 ≈ 0.99 or 99%. Therefore, the correct answer is 99%, not 24%.

Submit
3. A student wishes to create symbolic links in a computer system running Unix. Three text files named “file 1”, “file 2” and “file 3” exist in her current working directory, and the student has read and write permissions for all three files. Assume that file 1 contains information about her hobbies, file 2 contains information about her friends and file 3 contains information about her courses. The student executes the following sequence of commands from her current working directory
In -s file 1 file 2
In -s file 2 file 3
Which of the following types of information would be lost from her file system?
(I) Hobbies (II) Friends (III) Courses

Explanation

By executing the command "In -s file 1 file 2", the student creates a symbolic link named "file 2" that points to "file 1". This means that "file 2" now contains the same information as "file 1", which is about her hobbies.

Then, by executing the command "In -s file 2 file 3", the student creates another symbolic link named "file 3" that points to "file 2". This means that "file 3" now contains the same information as "file 2", which is about her hobbies.

Therefore, the original information about her friends (in "file 2") and her courses (in "file 3") would be lost from her file system.

Hence, the correct answer is (II) and (III) only.

Submit
4. A software organization has been assessed at SEI CMM Level 4. Which of the following does the organization need to practice beside Process Change Management and Technology Change Management in order to achieve Level 5 ?

Explanation

To achieve SEI CMM Level 5, the organization needs to practice defect prevention in addition to process change management and technology change management. This means that the organization should focus on identifying potential defects in the early stages of the software development process and implementing measures to prevent them from occurring. This could involve implementing quality assurance techniques, conducting thorough code reviews, using automated testing tools, and improving the overall software development process to minimize the occurrence of defects. By emphasizing defect prevention, the organization can strive for continuous improvement and higher levels of quality in their software products.

Submit
5. Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffle-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key is

Explanation

In the Diffle-Hellman key exchange technique, both parties agree on a modulus and a primitive root. Party A chooses a secret number (2) and party B chooses a secret number (5). Each party then calculates their own public key by raising the primitive root to the power of their secret number modulo the modulus. Party A calculates (3^2) mod 7 = 2, and party B calculates (3^5) mod 7 = 5. The D-H key is the result of raising the other party's public key to the power of their own secret number modulo the modulus. Party A calculates (5^2) mod 7 = 4, and party B calculates (2^5) mod 7 = 6. Therefore, the correct D-H key is 5.

Submit
6. Which one of the following is NOT shared by the threads of the same process ?

Explanation

Threads within the same process share the same address space, file descriptor table, and message queue. However, the stack is not shared among threads. Each thread has its own stack, which is used for storing local variables and function call information. This separation ensures that each thread has its own execution context and can independently execute functions without interfering with other threads.

Submit
7. Which of the following statements is TRUE about CSMA/CD

Explanation

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks to control access to the shared medium. It is not suitable for a high propagation delay network like a satellite network because the time it takes for a signal to travel from one end to the other is significantly longer in a satellite network compared to a wired network. This increased delay makes it difficult for CSMA/CD to detect collisions and respond in a timely manner, leading to decreased efficiency and performance.

Submit
8. Let M = (K, å, d, s, F) be a finite state automaton, where
K = {A, B}, å = {a, b}, s = A, F = {B},
d(A, a) = A, d(A, b) = B, d(B,a) = B and d(B, b) = A
A grammar to generate the language accepted by M can be specified as G = (V, å, R, S), where V = K È S, and S = A
Which one of the following set of rules will make L(G) = L(M) ?

Explanation

The set of rules {A ® aA, A ® bB, B ® aB, B ® bA, B ® e} will make L(G) = L(M). This set of rules specifies that starting from the initial symbol A, we can either replace A with aA or bB. If we replace A with aA, we can continue replacing A with aA or bB, and if we replace A with bB, we can continue replacing B with aB or bA. This set of rules ensures that the grammar generates the same language as the given finite state automaton M.

Submit
9. Which one of the following regular expressions is NOT equivalent to the regular expression (a + b + c)* ?

Explanation

The regular expression ((ab)* + c*)* is not equivalent to the regular expression (a + b + c)* because it allows for the sequence "ab" to repeat any number of times, including zero, before being followed by "c". In the original regular expression, the sequence "ab" is not allowed.

Submit
10. Let G be a weighted undirected graph and e be an edge with maximum weight in G. Suppose there is a minimum weight spanning tree in G containing the edge e. Which of the following statements is always TRUE?

Explanation

In a minimum weight spanning tree, all edges are included to connect all vertices with the minimum total weight. If edge e, which has the maximum weight, were to be contained in a cycle, removing it would still allow the remaining edges to connect all vertices. However, since e has the maximum weight, removing it would result in a spanning tree with a lower total weight, contradicting the assumption that the tree is a minimum weight spanning tree. Therefore, edge e cannot be contained in a cycle.

Submit
11. Consider the following message M = 1010001101. The cyclic redundancy check (CRC) for this message using the divisor polynomial x5 + x4 + x2 + 1 is :

Explanation

The correct answer is 10101 because the given message M is divided by the divisor polynomial x5 + x4 + x2 + 1 using the CRC method. The remainder obtained after the division is 10101, which is the CRC for the message.

Submit
12. In a depth-first traversal of a graph G with n vertices, k edges are marked as tree edges. The number of connected components in G is

Explanation

In a depth-first traversal of a graph, the number of connected components can be determined by subtracting the number of tree edges (k) from the total number of vertices (n) and the number of back edges (l). Therefore, the correct answer is n - k - l.

Submit
13. The following C function takes two ASCII strings and determines whether one is an anagram of the other. An anagram of a string s is a string obtained by permuting the letters in s.

int anagram (char *a, char *b){
int count [128], j;
for (j = 0;j < 128; j++) count[j] = 0;
j = 0;
while (a[J] && b[J]){
A;
B;
}
for (j = 0;j < 128; j++) if(count[j]) return 0;
return 1;
}
Choose the correct alternative for statements A and B.

Explanation

not-available-via-ai

Submit
14. Which of the following statements is FALSE regarding a bridge

Explanation

A bridge is a layer 2 device that is used to connect two or more LAN segments. It operates at the data link layer of the OSI model and forwards data packets between different LAN segments based on the MAC addresses. One of the main functions of a bridge is to reduce the collision domain by creating separate collision domains for each LAN segment. However, a bridge does not reduce the broadcast domain. Broadcasts are still forwarded to all LAN segments connected to the bridge, allowing devices on each segment to receive the broadcast messages.

Submit
15. Consider an XML file called intro.xml and a document type defintion (DTD) file intro. dtd as follows:
intro.xml



Welcome to XML

intro.dtd


A validating parser will classify intro.xml as

Explanation

A validating parser checks if an XML document adheres to the rules specified in the DTD or schema. In this case, the intro.xml file is referencing the intro.dtd file, indicating that it is using a DTD for validation. Since the question does not mention any issues with the XML file, we can assume that it is well-formed. Therefore, a validating parser will classify intro.xml as well-formed and validated, meaning it adheres to the syntax rules and the content rules specified in the DTD.

Submit
16. A channel has a bit rate of 4 kbps and one-way propagation delay of 20 ms. The channel uses stop and wait protocol. The transmission time of the acknowledgement frame is negligible. To get a channel efficiency of at least 50%, the minimum frame size should be

Explanation

To calculate the minimum frame size, we need to consider the channel bit rate and the one-way propagation delay. The channel efficiency is given by the formula: Efficiency = (Frame Size / (Frame Size + 2 * Propagation Delay)) * Bit Rate. We need to find the minimum frame size that gives us an efficiency of at least 50%. By substituting the given values, we can solve for the frame size. In this case, a frame size of 160 bits gives us an efficiency of exactly 50%, making it the minimum frame size required.

Submit
17. A CPU has only three instructions II, 12 and 13, which use the following signals in time steps T1-T5:
I1: T1: Ain, Bout, Cin
T2: PCout, Bin
T3: Zout, Ain
T4: PCin, Bout
T5: End
I2: Tl: Cin, Bout, Din
T2: Aout,Bin
T3: Zout, Ain
T4: Bin, Cout
T5: End
I3: Tl: Din, out
T2: Din,Bout
T3: Zout, Ain
T4: Dout,Ain
T5: End
Which of the following logic functions will generate the hardwired control for the signal Ain?

Explanation

The correct answer is T1.I1 + T2.I3 + T4 . I3 + T3. This logic function includes the signals T1, T2, T3, and T4, which are the time steps in which the instruction I1 is executed. It also includes the signals I1 and I3, which are the instructions that use the signal Ain. By combining these signals using logical operators (AND, OR), this function generates the hardwired control for the signal Ain.

Submit
18. In an inventory management system implemented at a trading corporation, there are several tables designed to hold all the information. Amongst these, the following two tables hold information on which items are supplied by which suppliers, and which warehouse keeps which items along with the stock-level of these items.
Supply = (supplierid, itemcode)
Inventory = (itemcode, warehouse, stocklevel)
For a specific information required by the management, following SQL query has been written
Select distinct STMP supplierid
From Supply as STMP
Where not unique (Select ITMP . supplierid
From Inventory, Supply as ITMP
Where STMP . supplierid = ITMP . supplierid
And ITMP . itemcode = Inventory . itemcode
And Inventory . warehouse = ‘Nagpur’);
For the warehouse at Nagpur, this query will find all suppliers who

Explanation

The given SQL query is selecting distinct supplier IDs from the Supply table where the supplier ID is not unique in the result of a subquery. The subquery checks for supplier IDs in the Inventory table that match the supplier ID from the outer query, the item code from the Inventory table, and the warehouse 'Nagpur'.

Since the subquery is checking for supplier IDs that have a match in the Inventory table, the outer query will return supplier IDs that have two or more items supplied to the warehouse at Nagpur. Therefore, the correct answer is "supply two or more items".

Submit
19. In a population of N families, 50% of the families have three children, 30% of the families have two children and the remaining families have one child. What is the probability that a randomly picked child belongs to a family with two children?

Explanation

The probability that a randomly picked child belongs to a family with two children can be calculated by dividing the number of families with two children by the total number of families. In this case, since 30% of the families have two children, the probability is 30% or 6/20. Therefore, the correct answer is 6/23. The answer 3/5 is incorrect because it represents the probability of a randomly picked child belonging to a family with three children, which is not what the question is asking for.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 03, 2009
    Quiz Created by
    Gauravitchap
Cancel
  • All
    All (19)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A subnet has been assigned a subnet mask of 255.255.255.192. What is...
What is the availability of a software with the following reliability...
A student wishes to create symbolic links in a computer system running...
A software organization has been assessed at SEI CMM Level 4. Which of...
Suppose that two parties A and B wish to setup a common secret key...
Which one of the following is NOT shared by the threads of the same...
Which of the following statements is TRUE about CSMA/CD
Let M = (K, å, d, s, F) be a finite state automaton, whereK = {A, B},...
Which one of the following regular expressions is NOT equivalent to...
Let G be a weighted undirected graph and e be an edge with maximum...
Consider the following message M = 1010001101. The cyclic redundancy...
In a depth-first traversal of a graph G with n vertices, k edges are...
The following C function takes two ASCII strings and determines...
Which of the following statements is FALSE regarding a bridge
Consider an XML file called intro.xml and a document type defintion...
A channel has a bit rate of 4 kbps and one-way propagation delay of 20...
A CPU has only three instructions II, 12 and 13, which use the...
In an inventory management system implemented at a trading...
In a population of N families, 50% of the families have three...
Alert!

Advertisement