1.
A floating point is said to be normalized if the most significant digit of the mantissa is —–
Correct Answer
B. Non Zero
Explanation
A floating point number is said to be normalized if the most significant digit of the mantissa is non-zero. This means that the mantissa, which represents the significant digits of the number, starts with a non-zero digit. Normalizing a floating point number helps to represent it in a standardized form and allows for efficient arithmetic operations.
2.
Which of the following applications is suitable for FIFO Queue?
Correct Answer
C. A program to solve a maze is to back track to an earlier position when a dead end position is reached.
Explanation
A FIFO (First-In-First-Out) queue is suitable for the program to solve a maze and backtrack to an earlier position when a dead end position is reached. This is because the queue follows the principle of processing elements in the order they were added, which aligns with the concept of backtracking in a maze. Each time a dead end is reached, the previous positions can be stored in the queue, and then the program can backtrack by retrieving and processing the positions in the order they were added.
3.
The field that investigates the mechanics of human intelligence is:
Correct Answer
A. Cognitive science
Explanation
Cognitive science is the field that investigates the mechanics of human intelligence. It combines various disciplines such as psychology, neuroscience, linguistics, and computer science to understand how the mind works, how people perceive, think, learn, and solve problems. This interdisciplinary approach allows researchers to study human intelligence from multiple angles, using both empirical data and computational models. By studying cognitive processes, cognitive scientists aim to gain insights into human intelligence and develop applications in areas such as artificial intelligence, human-computer interaction, and education.
4.
Which data structure is needed to convert infix notation to post fix notation is
Correct Answer
D. Stack
Explanation
To convert infix notation to postfix notation, a stack data structure is needed. In infix notation, operators are placed between operands, which makes it difficult to evaluate expressions. However, in postfix notation, operators are placed after operands, making it easier to evaluate expressions using a stack. The stack is used to store operators temporarily and to determine the order of operations. When encountering an operator, it is pushed onto the stack, and when encountering an operand, it is added to the postfix expression. The operators in the stack are then popped and added to the postfix expression based on their precedence. This process continues until the entire infix expression is converted to postfix notation.
5.
Data are followed to be transmitted in only one direction in a:
Correct Answer
A. Simplex channel
Explanation
A simplex channel is a communication channel that allows data to be transmitted in only one direction. In this type of channel, information flows from the sender to the receiver, but not in the opposite direction. This means that data can only be sent or received, but not both simultaneously. Therefore, the correct answer is a simplex channel.
6.
Which of the following statement is not true regarding graph?
Correct Answer
C. A tree is a grapH
Explanation
A tree is a special type of graph that does not contain any cycles or loops. While all trees are graphs, not all graphs are trees. Therefore, the statement "A tree is a graph" is true, and the statement "A graph is a tree" is false.
7.
Implementation of an inverted list to maintain the record list for each value for a given attribute can be done by —
Correct Answer
A. Sequential file
Explanation
An inverted list is a data structure that stores a list of records for each unique value of a given attribute. In this case, the implementation of an inverted list can be done using a sequential file. A sequential file stores records in a sequential order, allowing for efficient insertion and retrieval of records. By organizing the records sequentially, it becomes easier to maintain the record list for each value of the attribute. Therefore, a sequential file is a suitable choice for implementing an inverted list in this scenario.
8.
A 6-MHz channel is used by digital signaling system utilizing 4 – level signals. What is maximum possible transmission rate?
Correct Answer
C. 12 M band/sec
Explanation
The maximum possible transmission rate in a digital signaling system utilizing 4-level signals on a 6-MHz channel is 12 M band/sec. This is because each level can transmit 2 bits of information, and since there are 4 levels, the total transmission rate is 4 times the channel bandwidth. Therefore, 4 * 6 MHz = 24 M band/sec is the maximum possible transmission rate.
9.
Which of the following is a type of ISDN (Integrated Services Digital Network)?
Correct Answer
D. Both 1 and 2
Explanation
Both narrow band and broadband are types of ISDN (Integrated Services Digital Network). ISDN is a telecommunications network that allows for the transmission of voice, video, and data over digital lines. Narrow band ISDN refers to a lower bandwidth connection, typically used for voice communications. Broadband ISDN, on the other hand, provides a higher bandwidth connection, capable of transmitting larger amounts of data at faster speeds. Therefore, the correct answer is "Both 1 and 2" because both narrow band and broadband are types of ISDN.
10.
Which of the following is easiest software development process model?
Correct Answer
A. Waterfall model
Explanation
The Waterfall model is considered the easiest software development process model because it follows a linear and sequential approach. It consists of distinct phases such as requirements gathering, design, implementation, testing, and maintenance, with each phase being completed before moving on to the next. This model is easy to understand and implement as it provides a clear structure and defined steps to follow, making it ideal for small and straightforward projects where requirements are well-defined and unlikely to change.
11.
Which of the following feature is related to virtual circuit?
Correct Answer
A. Connection oriented
Explanation
The feature related to virtual circuit is "Connection oriented". This means that before any data transfer occurs, a dedicated path or circuit is established between the sender and receiver. This ensures that all packets follow the same route and are delivered in the correct order. Connection-oriented communication provides reliability and guarantees that the data will be delivered without errors.
12.
Which one of the following interrupt is non-makeable?
Correct Answer
A. TRAP
Explanation
The TRAP interrupt is non-makeable because it is a non-maskable interrupt. Non-maskable interrupts cannot be disabled or ignored by the processor, and they have the highest priority. The TRAP interrupt is typically used for critical system events that require immediate attention and cannot be delayed or interrupted by other interrupts.
13.
Binding the same name to multiple operations whose signatures differ in number or types of arguments?
Correct Answer
A. Overloading
Explanation
Overloading refers to the practice of binding the same name to multiple operations whose signatures differ in the number or types of arguments. This allows programmers to create multiple methods with the same name but different parameters, improving code readability and reusability. Overloading is an important concept in object-oriented programming and is used to provide multiple ways of performing a similar operation based on different input parameters.
14.
The C declaration in A [3] [5] of containing …….. elements is itself an array containing …… integers.
Correct Answer
A. 3,5
Explanation
The answer 3,5 suggests that the declaration A[3][5] creates an array of 3 elements, where each element is an array of 5 integers. This means that A is a two-dimensional array with 3 rows and 5 columns, where each element in the array can hold an integer value.
15.
What is the drawback of infrared and millimeter waves?
Correct Answer
B. They cannot pass through solid objects.
Explanation
The drawback of infrared and millimeter waves is that they cannot pass through solid objects. This limitation restricts their ability to penetrate obstacles and limits their range and effectiveness in certain applications.
16.
Indexes created from a sequential (or sorted) set of primary keys are referred to as —
Correct Answer
C. Index sequential
Explanation
Indexes created from a sequential set of primary keys are referred to as index sequential. This type of index combines the benefits of both sequential file organization and indexed file organization. It allows for efficient retrieval of records based on the primary key values while also maintaining the sequential order of the records. This makes it suitable for applications that require both sequential access and direct access to records.
17.
A central computer surrounded by one or more satellite computers is called
Correct Answer
C. Star network
Explanation
A star network consists of a central computer (also known as a hub or switch) that is connected to multiple satellite computers or devices. The central computer acts as a central point of control and communication, facilitating the exchange of data between the satellite computers. This network configuration is commonly used in modern computer networks as it provides a high level of reliability and scalability.
18.
Which of the following is a major component of the telephone system?
Correct Answer
D. All of these
Explanation
All of these options are major components of the telephone system. The local loop refers to the physical connection between the telephone exchange and the subscriber's premises. Trunks are the high-capacity lines that connect different telephone exchanges. The switching office is a central location where calls are routed and switched between different lines. Therefore, all of these components are essential for the functioning of the telephone system.
19.
A linear list of elements in which deletion can be done from one end and insertion can take place only at other end (rear) is known as
Correct Answer
A. Queues
Explanation
A linear list of elements in which deletion can be done from one end and insertion can take place only at the other end (rear) is known as a queue. In a queue, the elements follow the First-In-First-Out (FIFO) principle, meaning the element that is inserted first will be the first one to be removed. This makes queues suitable for scenarios where order matters, such as processing tasks in the order they are received. Stacks, on the other hand, follow the Last-In-First-Out (LIFO) principle, where the last element inserted is the first one to be removed. Trees and branches are different data structures used for organizing and representing hierarchical relationships between elements.
20.
For tree, which of the following list traversing through the entire list is not necessary?
Correct Answer
A. Circular list
Explanation
In a circular list, every node is connected to the next node and the last node is connected back to the first node, forming a loop. Therefore, traversing through the entire list is not necessary because starting from any node, we can reach all other nodes by following the links.
21.
Which of the following communications service provides messages preparation and transmission facilities
Correct Answer
A. Teletex
Explanation
Teletex is the correct answer because it is a communication service that provides facilities for preparing and transmitting messages. Teletex allows users to create and send text-based messages electronically, similar to faxing but with additional features such as the ability to include graphics and formatting. Teletex was commonly used for business communications and was widely adopted in the 1980s and 1990s before being replaced by email and other digital communication methods.
22.
Which of the following is not included in DML (data manipulation language)?
Correct Answer
D. CAREATE
Explanation
The correct answer is "CAREATE". This option is not included in DML (data manipulation language). DML is used to manipulate data in a database, such as inserting new data using the INSERT statement or updating existing data using the UPDATE statement. However, "CAREATE" is not a valid DML statement. It seems to be a typo or misspelling of the CREATE statement, which is actually a part of DDL (data definition language) used to create database objects like tables, views, or indexes.
23.
Which of the following scheduler is in charge of handling the swapped out process?
Correct Answer
C. Medium term
Explanation
The medium term scheduler is responsible for handling the swapped out process. This scheduler is responsible for selecting processes from the job pool and bringing them into main memory for execution. It decides which processes should be swapped in and out of main memory based on factors such as memory availability and process priority. Therefore, it is the medium term scheduler that handles the swapped out process.
24.
Which of the following is not used as a data structure?
Correct Answer
D. Directory
Explanation
The directory is not typically used as a data structure in computer science. It is a hierarchical structure used in file systems to organize and store files and folders. While it can be used to organize and retrieve data, it is not commonly referred to as a data structure in the context of computer science. Instead, data structures such as arrays, linked lists, and graphs are commonly used to store and manipulate data in various algorithms and applications.
25.
Which of the following statement is not true in context of strings in c language?
Correct Answer
D. Any string in c can be read by the function getchar 0
Explanation
The statement "Any string in c can be read by the function getchar 0" is not true in the context of strings in the C language. The function `getchar()` is used to read a single character from the standard input, not an entire string. To read a string in C, the function `gets()` or `fgets()` is typically used.