21. Consider a
rooted tree in
which every node
has at least
three children. What
is the minimum number of nodes at
level i (i > 0) of the tree? Assume
that the root is at level 0:
(A) 3i (B) 3i
(C) 3 (D)
3i + 1
Answer: A
22. Which
of the following data structure is used to implement recursion?
(A) Arrays (B)
Stacks
(C) Queues (D)
Linked lists
Answer: B
23. The
height of a binary tree with ‘n’ nodes, in the worst case is:
(A) O(log n) (B)
O(n)
(C) Ω(n log n) (D) Ω(n2)
Answer: B
24. An
example of a file extension is:
(A) text (B)
pict
(C) mp3 (D)
web
Answer: C
25. The
performance of a file system depends upon the cache hit rate. If it takes 1
msec to satisfy a request from the cache but 10 msec to satisfy a request if a
disk read is needed, then the mean time (ms) required for a hit rate ‘h’ is
given by:
(A) 1 (B)
h+10(1-h)
(C) (1-h) +10h (D) 10
Answer: B
26. The
best known example of a MAN is:
(A) Ethernet (B)
Cable Television
(C) FDDI (D)
IEEE 802.3
Answer: B
27. In
a broadcast network, a layer that is often thin or non-existent is:
(A) network layer
(B) transport
layer
(C) presentation layer
(D) application layer
Answer: A
28. The
maximum data rate of binary signals on a noiseless 3 KHz channel is:
(A) 3000 bps (B)
6000 bps
(C) 9000 bps (D)
12,000 bps
Answer: B
29. For
pure ALOHA, the maximum channel utilization is:
(A) 100% (B)
50%
(C) 36% (D)
18%
Answer: D
30. An
example of an adaptive routing algorithm is:
(A) distance vector routing
(B) flooding
(C) selective flooding
(D) shortest path routing
Answer: A
31. In
a two pass compiler, during the first pass:
(A) user defined address symbols are
correlated with their binary equivalent
(B) the syntax of the statement is checked
and mistakes, if any, are listed
(C) object program is generated
(D) semantic of the source program is
elucidated.
Answer: A
32. A
single instruction in an assembly language program contains:
(A) one micro operation
(B) one macro operation
(C) one instruction to be completed in a
single pulse
(D) one machine code instruction
Answer: B
33. Absolute
loader demands that the programmer needs to know the:
(A) start address of the available main
memory
(B) total size of the program
(C) actual address of the data location
(D) absolute values of the operands used
Answer: A
34. Top-down
parsers are predictive parsers, because:
(A) next tokens are predicted
(B) length of the parse tree is predicted
before hand
(C) lowest node in the parse tree is
predicted
(D) next lower level of the parse tree is
predicted
Answer: A
35. In
the context of compiler design, “reduction in strength” refers to:
(A) code optimization obtained by the use of
cheaper machine instructions
(B) reduction in accuracy of the output
(C) reduction in the range of values of input
variables
(D) reduction in efficiency of the program
Answer: A
36. How
many states can a process be in?
(A) 2 (B)
3
(C) 4 (D)
5
Answer: D
37. A
program has five virtual pages, numbered from 0 to 4. If the pages are
referenced in the order 012301401234, with three page frames, the total number
of page faults with FIFO will be equal to:
(A) 0 (B)
4
(C) 6 (D)
9
Answer: D
38. Average
process size=s bytes. Each page entry requires e bytes. The optimum page size
is given by:
(A) √(se) (B)
√(2se)
(C) s (D)
e
Answer: B
39. An
example of a directory found in most UNIX system is:
(A) usr (B)
waitpid
(C) brk (D)
unmap
Answer: A
40. The
aging algorithm with a=0.5 is used to predict run times. The previous four runs
from oldest to most recent are 40, 20, 20 and 15 msec. The prediction for the
next time will be:
(A) 15 msec (B)
25 msec
(C) 39 msec (D)
40 msec
Answer: B
41. A
major defect in water fall model in software development is that:
(A) the documentation is difficult
(B) a blunder at any stage can be disastrous
(C) a trial version is available only at the
end of the project
(D) the maintenance of the software is
difficult
Answer: C
42. Function
point metric of a software also depends on the:
(A) number of function needed
(B) number of final users of the software
(C) number of external inputs and outputs
(D) time required for one set of output from
a set of input data
Answer: C
43. An
error message produced by an interactive system should have:
(A) always the error code
(B) the list of mistakes done by the user
displayed
(C) a non-judgemental approach
(D) the past records of the occurrence of the
same mistake
Answer: B
44. System
development cost estimation with use-cases is problematic because:
(A) of paucity of examples
(B) the data can be totally incorrect
(C) the expertise and resource available are
not used
(D) the problem is being over simplified
Answer: B
45. The
approach to software testing is to design test cases to:
(A) break the software
(B) understand the software
(C) analyze the design of sub processes in
the software
(D) analyze the output of the software
Answer: A
46. Given
a parallel algorithm A with computation time t, if parallel
algorithm A performs m computational operation, then p
processors can execute algorithm A in time given by:
(A) t/p (B) mt/p
(C) t+(m-t)/p (D) (m-t)/p
Answer: C
47. With
reference to implementation of different association mining algorithms, identify
the correct statement:
(A) The FP growth method was usually better
than the best implementation of the apriori algorithm
(B) Apriori algorithm is usually better than
CHARM
(C) Apriori algorithm is good when the
support required is low
(D) At very low support the number of
frequent items becomes less
Answer: A
48. Consider
a typical mobile communication system. If 840 frequencies are available, how
many can be used in a given cell?
(A) 140 (B)
120
(C) 84 (D)
60
Answer: A
49. Identify
the incorrect statement:
(A) The internet has evolved into
phenomenally successful e-commerce engine
(B) e-business is synonymous with e-commerce
(C) The e-commerce model B2C did not begin
with billboard ware
(D) The e-commerce model G2C began with
billboard ware
Answer: B
50. Identify
the incorrect statement:
(A) ATM provides both real time and non-real
time service
(B) ATM provides faster packet switching than
X.25
(C) ATM was developed as part of the work on
broadband ISDN
(D) ATM does not have application in non-ISDN
environments where very high data rates are required
Answer: D
2 Comments
Ques 48 is looking incomplete? ---missing hexagonal cells
ReplyDeleteSuppose there are 840 frequencies in a cellular phone system with hexagonal cells How many frequencies can be allocated in one cell?
Answer:-
Each cell is surrounded by six other cells, so a total of 7 cells. that gives us 840/7=120 frequencies
49. Identify the incorrect statement:
ReplyDelete(A) The internet has evolved into phenomenally successful e-commerce engine
(B) e-business is synonymous with e-commerce
(C) The e-commerce model B2C did not begin with billboard ware
(D) The e-commerce model G2C began with billboard ware
Please someone explain the answer Because somewhere ans C is also iven