1. What is the full form of NIC?
Network ID card
Network interface card
National interface card
New interface card
2. The ____ topology is designed such that all stations are linked by a single cable
known as a backbone cable.
1.
Ring
2. Tree
3. Mesh
4. Bus
3. What is the full form of CSMA?
1.
Carrier senses marginal access
2. Carrier system multiple access
3. Carrier sense multiple access
4. Carrier sense mostly access
4. Mesh topology can be created using which of the following formula?
1.
Number of cables = (n*(n-1))/2
2. Number of cables = (n*(n-1))*2
3. Number of cables = (n*(n+1))/2
4. Number of cables = (n*(n+1))*2
5. The transmission node is defined in which layer?
1.
Physical layer
2. Data link layer
3. Transport layer
4. Session layer
6. Which of the following is the example of Half duplex mode?
1.
Keyboard
2. Television
3. Mouse
4. Walkie talkie
7. Which of the following layer finds the optimum path to transport data from the source
to the destination depending on network circumstances, service priority, and other
considerations?
1.
Transport Layer
2. Session Layer
3. Data link Layer
4. Network Layer
8. Which of the following is the network layer protocol?
1.
IP Protocol
2. ARP
3. ICMP
4. All of the above
9. Multiplexing is done in a ____ manner.
1.
One-to-one
2. One-to-many
3. Many-to-many
4. Many-to-one
10. Class A IP address have ____ bits long Host ID.
1.
16
2. 8
3. 24
4. 32
11. In Dynamic Routing, which protocols are utilized to discover new routes?
1.
RIP
2. OSPF
3. Both
4. None
12. What is SNMP?
1.
Social Network Management Protocol.
2. Strict Network Management Protocol.
3. Simple Network Management Protocol.
4. Soft Network Management Protocol.
13. Which of the following is not a valid keyword in C++ language?
1.
while
2. for
3. switch
4. do-while
14. Stream is ___.
1.
Group of non-printable character
2. Sequence of bytes
3. Set of errors
4. The flow of invalid characters
15. The cin, cout are ___.
1.
Library functions
2. structures
3. Pointers
4. objects
16. The endl is a ___.
1.
Macro
2. object
3. Pointers
4. function
17. Which of the following are types of datatypes in C++?
1.
Basic Datatype
2. Derived Datatype
3. Enumeration data type
4. User Defined datatype
Options:
1.
1 and 2
2. 1, 2, and 4
3. 1, 2, and 3
4. All, 1, 2, 3, 4
18. If we use value "3.14"then what will be the data type of the given value?
1.
float
2. double
3. long double
4. none of the above
19. Which of the following is a feature of the database?
a) No-backup for the data stored
b) User interface provided
c) Lack of Authentication
d) Store data in multiple locations
20. Which of the following is not a function of the database?
a) Managing stored data
b) Manipulating data
c) Security for stored data
d) Analysing code
21. What does an RDBMS consist of?
a) Collection of Records
b) Collection of Keys
c) Collection of Tables
d) Collection of Fields
22. Which of the following set should be associated with weak entity set for weak entity
to
be meaningful?
a) Neighbour set
b) Strong entity set
c) Owner set
d) Identifying set
23. Which of the following command is correct to delete the values in the relation
teaches?
a) Delete from teaches;
b) Delete from teaches where Id =Null;
c) Remove table teaches;
d) Drop table teaches;
24. The traditional storage of data organized by the customer, stored in separate folders
in filing cabinets is an example of ______________ type of databasemanagement system.
a) Object-oriented database management system
b) Relational database management system
c) Network database management system
d) Hierarchical database management system
25. Which of the following is not the utility of DBMS?
a) Backup
b) Data Loading
c) Process Organization
d) File organization
26. Which of the following is correct according to the technology deployed by DBMS?
a) Pointers are used to maintain transactional integrity and consistency
b) Cursors are used to maintain transactional integrity and consistency
c) Locks are used to maintain transactional integrity and consistency
d) Triggers are used to maintain transactional integrity and consistency
27. ______ resembles Create view.
a) Create table . . . as
b) Create view as
c) Create table . . .like
d) With data
28. Which of the following is the best way to represent the attributes in a large db?
a) Dot representation
b) Concatenation
c) Relational-and
d) All of the mentioned
29. Which of the following establishes a top-to-bottom relationship among the items?
a) Relational schema
b) Network schema
c) Hierarchical schema
d) All of the mentioned
30. This Query can be replaced by which one of the following?
SELECT name, course_id
FROM instructor, teaches
WHERE instructor_ID= teaches_ID;
a) Select name,course_id from teaches,instructor where instructor_id=course_id;
b) Select name, course_id from instructor natural join teaches;
c) Select name, course_id from instructor;
d) Select course_id from instructor join teaches;
31.
Employee_id. Name Salary
1001 Annie 6000
1009 Ross 4500
1018 Zeith 7000
This is Employee table.
Which of the following employee_id will be displayed for the given query?
SELECT * FROM employee WHERE employee_id>1009;
a) 1009, 1001, 1018
b) 1009, 1018
c) 1001
d) 1018
32. Which of the following statements contains an error?
a) Select * from emp where empid = 10003;
b) Select empid from emp where empid = 10006;
c) Select empid from emp;
d) Select empid where empid = 1009 and lastname = GELLER;
33.
SELECT * FROM employee WHERE dept_name="Comp Sci";
In the SQL given above there is an error . Identify the error.
a) Dept_name
b) Employee
c) Comp Sci
d) From
34.
SELECT *
FROM instructor
ORDER BY salary ____, name ___;
To display the salary from greater to smaller and name in ascending order which of the
following options should be used?
a) Ascending, Descending
b) Asc, Desc
c) Desc, Asc
d) Descending, Ascending
35. In SQL the spaces at the end of the string are removed by _______ function.
a) Upper
b) String
c) Trim
d) Lower
36. _____ operator is used for appending two strings.
a) &
b) %
c) ||
d) _
37. The sizeof() is a?
1.
Unary Operator
2. Binary Operator
3. Ternary Operator
4. None of the above
38. Which of the following statement is correct about default arguments?
1.
Arguments that cannot be passed to the function
2. Arguments with a default value that is not mandatory to be passed into the
function
3. Arguments that always take the same data value
4. None of the above
39. Which of the following function can be called without any arguments?
1.
int print(int count, char ch='*')
2. int print(char ch='*')
3. int print(char ch='*',int count)
4. int print(char ch)
40. Which of the following is an exit control loop?
1.
While Loop
2. Do While loop
3. For loop
4. None of the above
41. Which of the following is the correct syntax of the "do-while"loop?
1.
do{ //Body of the loop }while(condition);
2. dowhile(condition){ //Body of the loop };
3. do while(condition){ //Body of the loop };
4. do{ //Body of the loop }while(condition)
42. Which of the following is a more effective way to call a function with arguments?
1.
Call by value
2. Call by reference
3. Call by address
4. None of the above
43. What is the lifetime of a static variable declared in a user-defined function?
1.
Within the function only
2. Within the main function only
3. Whole program
4. None of the above
44. Which of the following is invalid?
1.
string str, *ptr=0;
2. int a, float *f = &a;
3. int *ptr;
4. None of the above
45. What will be the output of the following program?
#include <iostream>
using namespace std;
int main()
{
int x = 50, y = 20;
int *p1 = &x, *p2 = &y;
p1 = p2;
cout <<*p1;
return 0;
}
Options:
1.
50
2. 20
3. Address
4. Error
46. On failure, the "new"operator returns?
1.
NULL
2. -1
3. bad_alloc exception
4. None of these
47 . Which of the following is a valid way to allocate dynamic memory for an integer
variable?
1.
int *ptr = new int(111);
2. int *ptr = NULL;ptr = new int; *ptr=111;
3. int *ptr;ptr = new int; *ptr=111;
4. All the above
48. Which of the following symbol is used to define member functions outside the class?
1.
Colon.
2. Semicolon.
3. Scope Resolution operator.
4. None of the above
49. Which of the following is an incorrect type of constructor in C++?
1.
Copy constructor
2. Move constructor
3. Default constructor
4. Parameterized constructor
50. When does a destructor gets called?
1.
When an object gets created
2. When an object gets destroyed
3. After calling constructor
4. None of the above
51. Which data structure is used to perform level-order traversal on a binary tree?
(a) Stack
(b) Linked List
(c) Queue
(d) Hash Table
52. Which data structure is used to check a palindrome?
(a) Linked List
(b) Stack
(c) Queue
(d) Tree
53. Which of the following is the application of data structures?
(a) Image processing
(b) Decision making
(c) Blockchain
(d) All of the above
54. Which matrix among the following has lots of zero elements?
(a) Identity matrix
(b) Zero matrix
(c) Unit matrix
(d) Sparse matrix
55. What condition should be checked before the deletion operation from the Queue?
(a) Front value
(b) Rear value
(c) Underflow
(d) Overflow
56. Which among the following sorting algorithm is the most optimal one to sort a random linked list?
(a) Merge sort
(b) Insertion sort
(c) Quick sort
(d) Heap sort
57. How many edges are present in the complete graph of n vertices?
(a) n(n-1)/2
(b) n(n+1)/2
(c) n
(d) n/2
58. What is the time complexity of performing the enqueue operation in the Queue?
(a) O(1)
(b) O(log(n))
(c) O(n)
(d) O(n*n)
59. What is the maximum depth of a trie with n strings of length m?
(a) n
(b) log2 n
(c) m
(d) log2 m
60. What is the condition of the overflow of a linear queue implemented using an array?
(a) Rear = front + 1
(b) Rear = front
(c) Rear = MAX_SIZE
(d) Rear = MAX_SIZE - 1
61. Which of the following is the postfix of the expression A+B/C*(D-A)?
(a) ABC/DA-*+
(b) +A/B*C-DA
(c) ABCDA/-*+
(d) +*-/ABCDA
62. What output does the following code give?
#include<iostream>
using namespace std;
int main()
{
int arr[5]={1,2,3,4,5};
printf("%d", arr[5]);
return 0;
}
(a) Garbage Value
(b) 5
(c) 1
(d) Error
63) ______ are used to overcome the difference in data transfer speeds of various devices.
a) Speed enhancing circuitory b) Bridge circuits c) Multiple Buses d) Buffer registers
64) The bus used to connect the monitor to the CPU is ______
a) PCI bus b) SCSI bus c) Memory bus d) Rambus
65) In multiple Bus organization, the registers are collectively placed and referred as ______
a) Set registers b) Register file c) Register Block d) Map registers
66) The main advantage of multiple bus organization over a single bus is _____
a) Reduction in the number of cycles for execution b) Increase in size of the registers
c) Better Connectivity d) None of the mentioned
67) Write through technique is used in which memory for updating the data
a) Virtual Memory b) Auxiliary memory c) Main memory d) Cache memory
68) The main memory in a personal computer is made of
a) Static RAM b) Both c and d c) Cache memory d) Dynamic RAM
69) The operation executed on data stored in registers is called
a) Micro operation b) Bit operation c) macro operation d) Byte operation
70) The time interval between adjacent bits is called the
a) Word time b) Turnaround time c) Bit time d) slice time
71) The method of accessing the I/O devices by repeatedly checking the status flags is ___________
a) Program-controlled I/ b) Memory-mapped I/O c) I/O mapped d) None of the mentioned
72) The method of synchronizing the processor with the I/O device in which the device sends a signal
when it is ready is?
a) Exceptions b) Signal handling c) Interrupts d) DMA
73) The method which offers higher speeds of I/O transfers is ___________
a) interrupts b) Memory mapping c) Program-controlled I/O d) DMA
74) Which of the following operations is/are performed by the ALU?
a) Data manipulation b) Exponential c) Square root d) All of the above
75) Which of the following format is used to store data?
a) Decimal b) Octal c) BCD d) Hexadecimal
76) Which of the following memory of the computer is used to speed up the computer processing?
a) Cache memory b) RAM c) ROM d) none of the above
77) Computer address bus is -
a) Multidirectional b) Bidirectional c) Unidirectional d).None of the above
78) Which of the following circuit is used to store one bit of data?
a) Flip Flop b) Decoder c) Encoder d) Register
79) Which of the following is a way in which the components of a computer are connected to each other?
a) Computer parts b) Computer architecture c) Computer hardware d) None of the above
80) Which of the following computer memory is fastest?
a) Register b) Hard disk c) RAM d) None of the above