Friday, 14 October 2016

Computer Programmer - Engineering Colleges - Solved Paper 18.04.2015 - Part 2

21.       Basic steps for filtering in the frequency domain:
(A) Fourier transform                          (B) Filter function
(C) Inverse Fourier transform            (D) All of the above
Answer: D
22.       What is the difference between a simulator and an emulator in embedded system development?
(A) Emulator runs in target system, simulator runs in development system
(B) Simulator runs in target system, emulator runs in development system
(C) Emulator is indented for assembly language testing, simulator intended for high level language testing
(D) Simulator is indented for assembly language testing, emulator intended for high level language testing
Answer: A
23.       Type checking is normally done by:
(A) Lexical analyzer    (B) Code optimizer
(C) Syntax analyzer    (D) Linear analyzer
Answer: X
24.       Producer consumer problem can be solved using:
(A) monitors                  (B) semaphores
(C) event counters      (D) all the above
Answer: D
25.       Time To Live field in the ip header is used:
(A) to find the shortest path   (B) to find alternate path
(C) to avoid infinite loops       (D) to reduce the size of packet
Answer: C
26.       AGING is a technique used in:
(A) FCFS                                   (B) Round Robin
(C) Priority scheduling           (D) Pre-emptive scheduling
Answer: C
27.       The term used to refer to a row in database is:
(A) Field            (B) Tuple
(C) Attribute      (D) Entry
Answer: B
28.       In a microprocessor the register that keeps the results of arithmetic or logic operation is:
(A) Program counter   (B) Flag register
(C) Accumulator          (D) Stack register
Answer: C
29.       Thrashing occurs when a:
(A) Computer’s virtual memory subsystem is in a constant state of paging
(B) Computer’s main memory got exhausted
(C) Computer’s processes are in indefinite dead lock
(D) None of the above
Answer: A
30.    A system program that sets up a program in main memory ready for execution is:
(A) Assembler (B) Linker
(C) Editor           (D) Loader
Answer: D

31.    For large networks, ............... topology is used.
(A) Bus              (B) Star
(C) Ring            (D) Mesh
Answer: B
32.    ARPANET stands for:
(A) American Research Project Agency Network
(B) Asian Research Project Agency Network
(C) Ad-hoc Research Project Agency Network
(D) Advanced Research Project Agency Network
Answer: D
33.    Every context sensitive language is:
(A) Recursive enumerable language
(B) Recursive language
(C) Context free language
(D) Context sensitive language
Answer: X
34.    The permitted values of each attributes of a relation is called its:
(A) Set               (B) Tuple
(C) Schema      (D) Domain
Answer: D
35.    The addressing mode in which you directly give the operand value is:
(A) Relative       (B) Direct
(C) Definite       (D) Immediate
Answer: D
36.    What is the value of j after the execution of the following code?
int j = 0;
int N = 10;
(A) 0       (B) 9
(C) 10     (D) 11
Answer: C
37.    The address generated by CPU is:
(A) Physical address               (B) Absolute address
(C) Logical address                 (D) Memory address
Answer: C
38.    IEEE 802.11 standard for wireless LAN uses ............... multiple access technique.
(A) COMA         (B) ALOHA
(C) CSMA/CA   (D) All of these
Answer: C
39.    The worst case complexity of heap sort is:
(A) n log n         (B) n2
(C) Log n           (D) N
Answer: A
40.    A protocol used for secure sending of data over the Internet is:
(A) SMTP          (B) FTP
(C) HTTPS        (D) TCP/TP
Answer: C

Pages   2   3   4   5 


Post a Comment