1.
Which command will be used with vi editor to append text at end of line?
Correct Answer
A. A
Explanation
The command "A" will be used with the vi editor to append text at the end of a line.
2.
Which the result of a computation depends on the speed of the processes involved there is said to be
Correct Answer
B. Race condition
Explanation
A race condition occurs when the behavior or outcome of a program depends on the relative timing of events, specifically when multiple processes or threads access shared resources simultaneously and the order of execution becomes unpredictable. In such a scenario, the result of the computation can vary depending on which process or thread executes first, leading to inconsistent or incorrect results. Therefore, the correct answer is "race condition".
3.
Which of the following feature is true regarding concatenated virtual circuits?
Correct Answer
D. None
Explanation
Concatenated virtual circuits refer to a series of virtual circuits that are established from the source to the destination, passing through one or more gateways. Each gateway maintains a table that keeps track of which virtual circuits pass through it. However, the given answer states that none of the features are true regarding concatenated virtual circuits. This suggests that none of the options provided accurately describe the true feature of concatenated virtual circuits.
4.
A compiler which runs on one machine and generates a code for another machine
Correct Answer
B. Cross-compiler
Explanation
A cross-compiler is a type of compiler that runs on one machine and generates code for another machine. It is used to compile programs for a different target platform than the one it is running on. This allows developers to write code on one machine and compile it for a different architecture or operating system. Cross-compilers are commonly used in the development of software for embedded systems or cross-platform applications.
5.
Banker’s algorithm for resource allocation deals with
Correct Answer
B. Dead look avoidance
Explanation
The Banker's algorithm for resource allocation deals with dead lock avoidance. Dead lock is a situation where two or more processes are unable to proceed because each is waiting for resources held by the other. The Banker's algorithm ensures that resources are allocated in a way that prevents deadlocks from occurring. It does this by considering the current allocation, maximum needs, and available resources to determine if a request for resources can be granted without leading to a deadlock.
6.
A method, which transfers the entire block of data from its own buffer to main memory takes place without intervention by cup.
Correct Answer
C. Direct memory access (DMA)
Explanation
Direct memory access (DMA) is the correct answer because it is a method that allows data to be transferred directly from a device's buffer to main memory without the intervention of the CPU. This means that the CPU does not need to be involved in every transfer, which can greatly improve efficiency and performance. DMA is commonly used for high-speed data transfer in devices such as hard drives, network cards, and graphics cards.
7.
Which the maximum clock rate is quoted for a logic family, it applies to a
Correct Answer
A. Shift register
Explanation
The maximum clock rate quoted for a logic family applies to a shift register. A shift register is a sequential logic circuit that can store and shift data bits. The clock rate refers to the speed at which the circuit can operate, and in the case of a shift register, it determines how quickly data can be shifted through the register. Therefore, the maximum clock rate quoted for a logic family would indicate the highest speed at which a shift register within that family can function.
8.
Which of the following table helps in representing the previous and next state of the sequential circuit prior to and after the clock pulse respectively?
Correct Answer
C. Excitation table
Explanation
An excitation table helps in representing the previous and next state of a sequential circuit prior to and after the clock pulse respectively. It provides information about the inputs required to transition from one state to another. A truth table, on the other hand, represents the relationship between the inputs and outputs of a combinational circuit. A characteristic table describes the behavior of a sequential circuit by showing the inputs, outputs, and next state for each possible combination of inputs and current state. Therefore, the correct answer is the excitation table.
9.
A large computer information system maintains many different computer files. Which among them is called a perpetual file?
Correct Answer
C. Master File
Explanation
A perpetual file in a computer information system refers to a master file. A master file is a central file that contains the most up-to-date and comprehensive information about a particular subject. It is continuously updated and serves as the primary source of data for various operations within the system. Other files, such as specialized files, log files, and history files, may contain specific or historical data, but they are not considered perpetual files as they do not hold the most current and complete information.
10.
One method of programming a computer to exhibit intelligence is called modeling
Correct Answer
A. Simulation
Explanation
Simulation is a method of programming a computer to exhibit intelligence. It involves creating a model or representation of a real-world system or process and using it to simulate or imitate the behavior of the system. By simulating different scenarios and analyzing the outcomes, the computer can demonstrate intelligent behavior and make decisions based on the simulated data. This approach allows the computer to learn and improve its performance over time, making it a viable method for achieving artificial intelligence.
11.
In fiber optics the attenuation of light through glass depends on the
Correct Answer
A. Wave length of light
Explanation
The attenuation of light through glass in fiber optics depends on the wavelength of light. This is because different wavelengths of light interact differently with the glass material, causing varying levels of attenuation. The longer the wavelength, the higher the attenuation, and vice versa. Therefore, the wavelength of light is a crucial factor in determining the level of attenuation in fiber optics.
12.
Ap-channel enhancement type MOSFET performs much the same function as a PNP Transistor except that
Correct Answer
C. It is controlled by voltage larger than current
Explanation
The correct answer is that the Ap-channel enhancement type MOSFET is controlled by voltage larger than current. This means that the MOSFET operates based on the voltage applied to its gate terminal, rather than the current flowing through it. This is different from a PNP transistor, which is controlled by current rather than voltage.
13.
Among directory entry-node and the file contents, Which will be changed when a file Is updated ?
Correct Answer
B. Only inode and file contents
Explanation
When a file is updated, both the inode (index node) and the file contents will be changed. The inode is a data structure that stores important metadata about the file, such as its size, permissions, timestamps, and the location of its data blocks. Updating the file will result in changes to the inode to reflect the new information. Additionally, the actual content of the file will be modified to reflect the updates made to its data. Therefore, both the inode and file contents will be affected by the update.
14.
Which of the following is an important component of semantic analysis?
Correct Answer
B. Type checking
Explanation
Type checking is an important component of semantic analysis because it ensures that the types of the variables and expressions in a program are compatible and consistent. It helps to detect and prevent type-related errors, such as assigning a value of one type to a variable of a different type. Type checking also helps in determining the correct interpretation and behavior of the program, as it enforces the rules and constraints specified by the programming language.
15.
Which of the following systems implementation approaches should be used if you want to run the old system and the new system at the same time for a specified period?
Correct Answer
D. Parallel
Explanation
Parallel implementation approach should be used if you want to run the old system and the new system at the same time for a specified period. In parallel implementation, both the old and new systems are run simultaneously for a certain period of time to ensure that the new system functions properly and to minimize any potential disruptions or errors. This approach allows for a smooth transition from the old system to the new system, as any issues can be identified and resolved before fully transitioning to the new system.
16.
Which of the following derivation does a top-down parser? The input is assumed to be scanned in left to right order.
Correct Answer
A. Left most derivation
Explanation
A top-down parser starts with the start symbol and tries to derive the input string by expanding non-terminals from left to right. In a leftmost derivation, the leftmost non-terminal is always expanded first. Therefore, a top-down parser uses a leftmost derivation to parse the input string.
17.
CIDR (Classless Inter Domain Routing)
Correct Answer
A. It is used in class C Net works
Explanation
CIDR (Classless Inter Domain Routing) is a routing technique that allows for more efficient allocation of IP addresses. It is used in classless networks, which means it can be used in class A, class B, and class C networks. CIDR eliminates the need for strict class-based addressing and allows for flexible allocation of IP addresses based on the actual network requirements. Therefore, the correct answer is "All of the above".
18.
Internal auditors should review data system design before they are
Correct Answer
B. Implemented
Explanation
Internal auditors should review data system design before they are implemented because this allows them to assess the effectiveness and efficiency of the design. By reviewing the design before implementation, auditors can identify any potential weaknesses or vulnerabilities in the system and recommend necessary improvements. This helps to ensure that the data system is robust, secure, and aligned with the organization's objectives. Reviewing the design also allows auditors to provide valuable insights and recommendations to enhance the system's performance and mitigate risks.
19.
Which language has recently become the defector standard for interfacing application programs with relational database system?
Correct Answer
B. SQL
Explanation
SQL (Structured Query Language) has recently become the defector standard for interfacing application programs with relational database systems. SQL is a programming language that is specifically designed for managing and manipulating data in relational databases. It allows users to create, modify, and retrieve data from databases using a standardized syntax. SQL is widely used in various database management systems, including Oracle, MySQL, and Microsoft SQL Server, making it the most common language for interacting with relational databases.
20.
A program that places programs into main memory and prepares them for execution-
Correct Answer
C. Loader
Explanation
A loader is a program that places other programs into main memory and prepares them for execution. It loads the necessary program files from the secondary storage into the main memory, resolves any external references or dependencies, and performs any necessary address relocation. Once the loading process is complete, the program is ready to be executed by the computer's processor. Therefore, the correct answer is Loader.
21.
A generalizations of the Boyce Codd Normal Form to relation schemes which includes the mulltivated dependencies is called –
Correct Answer
C. Fourth Normal Form
Explanation
The Boyce Codd Normal Form (BCNF) is a normal form in database normalization that eliminates redundancy and dependency issues. However, BCNF does not handle all types of dependencies, such as multivalued dependencies. The Fourth Normal Form (4NF) is an extension of BCNF that addresses these multivalued dependencies. It further eliminates redundancy by allowing the decomposition of relations into smaller ones, where each relation contains a single-valued attribute. Therefore, the correct answer is Fourth Normal Form.
22.
Lexical Analyzer transforms an input streams in to –
Correct Answer
B. Sequence of tokens
Explanation
The correct answer is "Sequence of tokens" because a lexical analyzer is responsible for breaking down an input stream into smaller units called tokens. These tokens represent the different elements of the input, such as keywords, identifiers, operators, and literals. By transforming the input stream into a sequence of tokens, the lexical analyzer enables further processing and analysis of the input in subsequent stages of a compiler or interpreter.
23.
If we traverse s binary search tree, in which manner that we get in ascending manner
Correct Answer
A. InOrder
Explanation
InOrder traversal of a binary search tree visits the nodes in ascending order. This means that when we traverse the tree in InOrder manner, we first visit the left subtree, then the root node, and finally the right subtree. Since a binary search tree follows the property that the left child of a node is always smaller than the node and the right child is always greater, traversing in InOrder allows us to visit the nodes in ascending order. Therefore, InOrder is the correct answer for getting the nodes in ascending manner.
24.
Binary number 10 11 10 000 is equivalent to decimal
Correct Answer
A. 716
Explanation
The binary number 10 11 10 000 can be converted to decimal by multiplying each digit by its corresponding power of 2 and then summing the results. Starting from the rightmost digit, we have 0 * 2^0 = 0, 0 * 2^1 = 0, 0 * 2^2 = 0, 1 * 2^3 = 8, 1 * 2^4 = 16, 0 * 2^5 = 0, 1 * 2^6 = 64, and 0 * 2^7 = 0. Adding these values together, we get 0 + 0 + 0 + 8 + 16 + 0 + 64 + 0 = 88. Therefore, the binary number 10 11 10 000 is equivalent to decimal 88.
25.
The collection of communication line and routers from the –
Correct Answer
C. Subnet
Explanation
A subnet is a collection of communication lines and routers that are grouped together based on their IP address range. This allows for better organization and management of network traffic. Subnets help to divide a larger network into smaller, more manageable networks, which can improve network performance and security. By grouping communication lines and routers together, a subnet enables efficient routing of data packets within a network.