COMPUTER PROGRAMMER,TECHNICAL EDUCATION(ENGINNERING
COLLEGES)
EXAM DATE:18-04-2015
1.If 110011012
is divided by1102 the remainder is:
A.101
B.11
C.0
D.1
Ans:D
2.The program that
brings the object code into memory for execution is:
A.Loader
B.Fetcher
C.Extractor
D.Linker
Ans:A
3.The order in which
the return addresses are generated and used is:
A.LIFO
B.FIFO
C.Random
D.Highest priority
Ans:A
4.The classification
of BUSes into synchronous and asynchronous is based on:
A.The devices connected to them
B.The type of data transfer
C.The timing of data
transfers
D.None of the above
Ans:C
5.Which is not a
magnetic storage device?
A.Hard disk
B.Tape drive
C.Compact disk
D.All of these
Ans:C
6.In a digital
representation of voltages using an 8-bit binary code,how many values can be
defined?
A.128
B.256
C.64
D.16
Ans:B
7.The memory used to
hold the address of data stored in the cache is:
A.Associative memory
B.Primary memory
C.Secondary memory
D.Register
Ans:A
8.------------is a
black box testing method.
A.Basic path testing
B.Code path analysis
C.Boundary value
analysis
D.Recovery testing
Ans:C
9.The strategy of
temporarily suspending the running process is called:
A.First come first serve
B.Shortest job first
C.Preemptive
scheduling
D.Non-preemptive scheduling
Ans:C
10.Fork is:
A.Creation of a new job
B.Dispatching of new task
C.Creation of new
process
D.Increasing priority of process
Ans:C
11.Resolution of
externally defined symbol is done by:
A.Linker
B.Loader
C.Compiler
D.Assembler
Ans:A
12.In--------topology,whole
network goes down,if a computer’s network cable is broken
A.Ring
B.Star
C.Bus
D.Token ring
Ans:C
13.Baudot code
uses--------bits per symbol.
A.3
B.5
C.6
D.8
Ans:B
14.Which of the
following problem is undecidable?
A.Membership problem for CFL
B.Membership problem for regulars
C.Fitness problem for FSAs
D.Ambiguity problem
of CFGs
Ans:D
15.Image compression
is:
A.Reducing the size of image to fit to screen
B.Making image look better
C.Reducing the
redundancy of image data
D.Reducing degradation over image
Ans:C
16.Basic steps for
filtering in the frequency domain:
A.Fourier transform
B.Filter function
C.Inverse Fourier transform
D.All of the above
Ans:D
17.What is the
difference between a simulator and an emulator in embedded system development?
A.Emulator runs in
target system,simulator runs in development system
B.Simulator runs in target system,emulator runs in
development system
C.Emulator is indented for assembly language
testing,simulator intended for high level language testing
D.Simulator is indented for assembly language
testing,emulator intended for high level language testing
Ans:A
18.Type checking is
normally done by:
A.Lexical analyzer
B.Code optimizer
C.Syntax analyzer
D.Linear analyzer
Ans:C
19.Producer consumer
problem can be solved using:
A.Monitors
B.Semaphores
C.Event counters
D.All the above
Ans:D
20.Time to Live field
in the IP header is used:
A.To find the shortest path
B.To find alternate path
C.To avoid infinite
loops
D.To reduce the size of packet
Ans:C
21.AGING is a
technique used in:
A.FCFS
B.Round Robin
C.Priority scheduling
D.Pre-emptive scheduling
Ans:C
22.The term used to
refer to a row in database is:
A.Field
B.Tuple
C.Attribute
D.Entry
Ans:B
23.In a
microprocessor the register that keeps the results of arithmetic or logic
operation is
A.Program counter
B.Flag register
C.Accumulator
D.Stack Register
Ans:C
24.Thrashing occurs
when a:
A.Computer’s virtual
memory subsystem is in a constant state of paging
B.Computer’s main memory got exhausted
C.Computer’s processes are in indefinite dead lock
D.None of the above
Ans:A
25.A system program
that sets up a program in main memory ready for execution is:
A.Assembler
B.Linker
C.Editor
D.Loader
Ans:B
26.For large
networks,---------topology is used.
A.Bus
B.Star
C.Ring
D.Mesh
Ans:B
27.ARPANET stands
for:
A.American Research Project Agency Network
B.Asian Research Project Agency Network
C.Ad-hoc Research Project Agency Network
D.Advanced Research
Project Agency Network
Ans:D
28.Every context sensitive language is:
A.Recursive enumerable language
B.Recursive language
C.Context free language
D.Context sensitive language
Ans:B
29.The permitted
values of each attributes of a relation is called its:
A.Set
B.Tuple
C.Schema
D.Domain
Ans:D
30.The addressing
mode in which you directly give the operand value is:
A.Relative
B.Direct
C.Definite
D.Immediate
Ans:D
31.What is the value
of j after the execution of the following code?
Int j=0
Int N=10;
While(j<N)
{
J=j+1;
}
A.0
B.9
C.10
D.11
Ans:C
32.The address
generated by CPU is
A.Physical address
B.Absolute address
C.Logical address
D.Memory address
Ans:C
33.IEEE 802.11
standard for wireless LAN uses---------multiple access technique.
A.CDMA
B.ALOHA
C.CSMA/CA
D.All of these
Ans:C
34.The worst-case
complexity of heap sort is:
A.n log n
B.n2
C.Log n
D.N
Ans:A
35.A protocol used
for secure sending of data over the internet is:
A.SMTP
B.FTP
C.HTTPS
D.TCP/IP
Ans:C
36.The
-------------method provides a one-time session key for two parties.
A.DIffie-Hellman
B.Public Key
C.RSA
D.DES
Ans:A
37.How many root
element an XML document can have?
A.Any number as required
B.One
C.Two
D.Only limited by available memory
Ans:B
38.Which of the
following is a goal of data mining?
A.To extract some
observed event or condition
B.To analyze data for expected relationships
C.To create new database
D.None of the above
Ans:A
39.Critical path of
the PERT chart is:
A.Path which takes
the longest time to complete the project
B.Path which takes the shortest time to complete the project
C.Path which takes the most appropriate time to complete the
project
D.None of the above
Ans:A
40.The language used
by end users and programmers to manipulate data in a database is:
A.HTML
B.DML
C.XML
D.GML
Ans:
B
41.Secret key
encryption is also known as:
A.Asymmetric encryption
B.Symmetric key cryptography
C.RSA
D.DSA
Ans:B
42.What is a
firewall?
A.Boundary of a network
B.A routing software
C.Software to prevent
unauthorized access
D.A web browsing software
Ans:C
43.Which normal form
is based on multi-values dependency?
A.First
B.Second
C.Third
D.Fourth
Ans:D
44.Mov,ax,bx which addressing mode does
this instruction use?
A.Immediate
B.Indirect
C.Register
D.Direct
Ans:C
45.An RTP packet is encapsulated in:
A.A TCP segment
B.A UDP datagram
C.An IP datagram
D.A SMTP packet
Ans:B
46.To
prevent-------------,we can timestamp the packets
A.Error
B.Jitter
C.Loss
D.None of these
Ans:B
47.The complexity of
binary search algorithm is:
A.O(n)
B.O(log n)
C.O(n/2)
D.O(n log n)
Ans:B
48.If very node U and
G is adjacent to every other node V in G,a graph is said to be:
A.Isolated
B.Complete
C.Finite
D.Strongly connected
Ans:B
49.To extend the
connectivity of the processor bus we use:
A.PCI Bus
B.SCSI bus
C.Controllers
D.Multiple bus
Ans:A
50.IF 110011002
is divided by 1102 the quotient is:
A.11011
B.1111
C.100010
D.100001
Ans:C
51.Which data
structure allows deleting data elements from front and inserting at rear?
A.Stacks
B.Queues
C.Deques
D.Binary search tree
Ans:B
52.Which of the
following data structure is linear type?
A.Strings
B.Lists
C.Queues
D.All of above
Ans:D
53.Speed of a microprocessor
is determined by:
A.Address bus width
B.Data bus width
C.Clock
D.None of the above
Ans:C
54.How many gates
would be required to implement the following Boolean expression after
simplification?
XY+X(X+Z)+(X+Z)
A.1
B.2
C.3
D.4
Ans:B
55.With a 200 KHZ
clock frequency,16 bits can be serially entered into a shift register
in--------------time.
Ans:80 s
56.The
principle of locality of reference is applied in the use of:
A.Virtual memory
B.Random access memory
C.Cache
memory
D.Optical memory
Ans:C
57.Parser
is also known as:
A.Lexical analyzer
B.Code optimizer
C.Syntax
analyzer
D.Linear analyzer
Ans:C
58.The
operation in relational algebra for viewing a set of tuples is:
A.Select
B.Project
C.Union
D.Join
Ans:A
59.The
average case complexity of linear search algorithm is:
A.O(n)
B.O(log n)
C.O(n2)
D.O(n log n)
Ans:A
60.Data
Encryption standard is a:
A.Stream cipher
B.Block
cipher
C,Substitution cipher
D.None of these
Ans:B
61.Data
about data is:
A.Database
B.Mega data
C.Metadata
D.Schema
Ans:C
62.No.of
layers in OSI reference model:
A.Four
B.Five
C.Six
D.Seven
Ans:D
63.Routers
are components of -----------layer in OSI reference layer
A.Physical layer
B.Network
layer
C.Transport layer
D.Data link layer
Ans:B
64.mov
al,[bx]which addressing mode does this instruction use?
A.Register
indirect
B.Base index
C.Base index plus displacement
D.Register
Ans:A
65.The
number of attributes in a relation is called its:
A.Cardinality
B.Size
C.Schema
D.Degree
Ans:D
66.The
operator used to concentrate two strings in ORACLE is:
Ans:-
67.
A full-adder has a Cin=.What are the SUM and the Cout
When
A=1 and B=1?
A.SUM=0 Cout=0
B.SUM=0
Cout=1
C.SUM=1 Cout=0
D.SUM=1 Cout=1
Ans:B
68.For
which inputs the output of an exclusive NOR gate is 1?
A.A=0,B=1
B.A=1,B=1
C.A=0,B=0
D.None of these
Ans:C
69.The
depth of a complete binary tree is given by:
A.Dn=n log10 n
B.Dn=n log2n+1
C.Dn=log2n
D.Dn=log2n+1
Ans:C
70.Which
of the following data structure is not linear data structure?
A.Arrays
B.Linked lists
C.Both of the above
D.None
of the above
Ans:D
71.A
binary tree whose every node has either
zero or two children is called:
A.Complete
binary tree
B.Binary search tree
C.Extended binary tree
D.None of the above
Ans:A
72.The
WORST-CASE complexity of Bubble sort algorithm is:
A.O(n)
B.O(log n)
C.O(n2)
D.O(n log n)
Ans:C
73.Which
of the following is a web server?
A.Apache
B.IIS
C.Tomcat
D.All
the above
Ans:D
74.Grammar
recognized by a FSM is:
A.Only context free grammar
B.Only context sensitive grammar
C.Only
regular grammar
D.All of these
Ans:C
75.For
efficient searching compilers use ----------search tables.
A.Linear search tables
B.Binary search tables
C.Hash
tables
D.Binary search trees
Ans:C
76.Type
of value stored in a variable can be identified using -------------of the
variable.
A.Variable Name
B.Data
Type
C.Variable Size
D.None of these
Ans:B
77.Two
main measures for the efficiency of an algorithm are:
A.Processor and memory
B.Complexity and capacity
C.Time
and space
D.Data and space
Ans:C
78.If
two sets A and B have no common elements then such sets are known as:
A.Union
B.Distinct
C.Disjoin
D.Complement
Ans:C
79.-------------are
used to overcome the difference in data transfer speeds of various devices.
A.Speed enhancing circuitry
B.Bridge circuits
C.Multiple buses
D.Buffer
registers
Ans:D
80.Cache
memory works on the principle of:
A.Locality of data
B.Locality of memory
C.Locality
of reference
D.Locality of reference and memory
Ans:C
81.In
which year India honoured Dr.Nelson R.Mandela by awarding Bharat Ratna?
A.1992
B.1994
C.1990
D.1987
Ans:C
82.The
Nobel Prize winner for Peace in 2013:
A.IAEA
B.OPCW
C.UNRWA
D.UNCTAD
Ans:B
83.Common
Wealth Heads of Government Meeting 2013(CHOGM)was held in:
A.New Delhi
B.Dacca
C.Islamabad
D.Colombo
Ans:D
84.Through
which rocket was Mangalyan orbiter injected into earth’s orbit?
A.PSLV 16
B.PSLV
C25
C.PLV C5
D.PSLV C9
Ans:B
85.Name
the cyclonic storm that hits the coasts of Odisha recently:
A.Haliyan
B.Helen
C.Thane
D.Phailin
Ans:D
86.With
which country India took part in joint military exercise”INDRA 2013”?
A.Russia
B.Japan
C.America
D.China
Ans:A
87.Which
of the following is not the tributaries of Bharatha Puzha?
A.Gayathri Puzha
B.Kannadi Puzha
C.Chali
Puzha
D.Kalpathi Puzha
Ans:C
88.Which
is the predominant soil in Kerala mostly reddish brown to yellowish red in
colour?
A.Black soil
B.Alluvial soil
C.Lateritic
soil
D.Saline soil
Ans:C
89.The
famous Pilgrim Centre Vaikom is situated on the banks of:
A.Vembanad
Lake
B.Kayamkulam Lake
C.Ashtamudi Lake
D.Sasthamcotta Lake
Ans:A
90.Trikalkudi
rock-cut cave temple,Kaviyoor situated in which district of Kerala?
A.Kottayam
B.Pathanamthitta
C.Idukki
D.None
Ans:B
91.Through
which poem Mahakavi Kumaranasan raise his voice against caste barriers?
A.Veenapoovu
B.Nalini
C.Lila
D.Duravastha
Ans:D
92.Blessed
Kuriakose Elias Chavara was born in which district?
A.Alappuzha
B.Kollam
C.Ernakulam
D.Kottayam
Ans:A
93.Which
of the following is not associated with Vakkom Abdul Khadar Moulavi?
A.Al-Islam
B.Swadeshabhimani
C.Chirayankiz Muslim Samaj
D.Loyal
Muhammadans of India
Ans:D
94.Who
started the Dalit Liberation Movement Prathyaksha Raksha Daiva Sabha(PRDS)?
A.Ayya Vaikunda
B.K.Kelappan
C.Kumara
Gurudevan
D.Ayyankali
Ans:C
95.Which
of the following is not related to K.P.Karuppan?
A.Kalyanadayini Sabha
B.Ananda
Maha Sabha
C.Jnanodayam Sabha
D.Sanmarga Pradeepa Sabha
Ans:B
96.The
Island Sivasamudram situated in which river?
A.Krishna
B.Godaveri
C.Kaveri
D.Damodar
Ans:C
97.Which
of the following is not associated with the Lahore Session of the Congress
December 1929?
A.Council
entry
B.Poorna Swaraj
C.Tricolour Flag hoisted
D.First independence Day January 26,1930
Ans:A
98.Final
approval of Indian Five year Plan is given by:
A.Planning Commission
B.National
Development Council
C.Reserve Bank
D.President
Ans:B
99.Which
of the following was not the centres of the Revolt of 1857?
A.Delhi
B.Kanpur
C.Lucknow
D.Madras
Ans:D
100.The
state in India where active diamond mining is done:
A.Madhya
Pradesh
B.Maharashtra
C.Uttar Pradesh
D.Gujarat
Ans:A
Great effort springs naturally from great attitude.-Pat Riley.
ReplyDeleteKERALA PSC ,UPSC Civil service online practices available .Don’t forget our Youtube Channel Subscribe.