Go To Top Reset
<<= Back
Next =>>
You Are On Multi Choice Question Bank SET 3378
168901. Kerala sastra puraskar of 2014 was awarded to :
(A): G. Madhavan Nair (B): K. P. Gopinadhan (C): K. Radhakrishnan (D): J.C. Bose
168902. Who was the freedom fighter other than Gandhiji, who died in 1948?
(A): Tagore (B): Sarojini Naidu (C): M.A. Finnah (D): Sardar Patel
168903. Red panda is the state animal of which Indian State :
(A): Sikkim (B): Meghalaya (C): Arunachal Pradesh (D): Tripura
168904. The author of ‘My Music, My Life’:
(A): Yesudas (B): Pandit Ravi Sankar (C): Subha lakshmi (D): K.S. Chitra
168905. The major type of soil found in Deccan plateau :
(A): Alluvial soil (B): Black soil (C): Red soil (D): Laterite soil
168906. The drama ‘Balakalesam’ written by :
(A): Ayyankali (B): V.T. Bhattathiripad (C): Pandit Karuppan (D): Narayanaguru
168907. Chathrapathi Shivaj International Airport is located in :
(A): Pune (B): Mumbai (C): Chennai (D): Madurai
168908. The Indian Struggle’ is the Autobiography of:
(A): Lala Lajpath Rai (B): Bhaghat Singh (C): Subhas Chandra Bose (D): Nehru
168909. The Prime Minister of India who presided continuously three times as a Chairman of the planning commission of India :
(A): Jawaharlal Nehru (B): Rajiv Gandhi (C): Indira Gandhi (D): Lai Bahadur Sastri
168910. The sudden withdrawal of Non-cooperation movement led to the formation of
(A): Ghadar party (B): Swarajist party (C): Hindu Maha Sabha (D): Muslim League
168911. In which of these cities did Jallian Wallabagh Massacre, one of the most tragic event in the history of our freedom struggle took place?
(A): Lucknow (B): Kanpur (C): Amritsar (D): Lahore
168912. Type of value stored'in a variable can be identified using____________of the variable.
(A): Variable Name (B): Data Type (C): Variable Size (D): None of these
168913. Two main measures for the efficiency of an algorithm are :
(A): Processor and memory (B): Complexity and capacity. (C): Time and space (D): Data and space
168914. If two sets A and B have no common elements then such sets are known as :
(A): Union (B): Distinct (C): Disjoin (D): Complement
168915. _________are used to over come the difference in data transfer speeds of various devices.
(A): Speed enhancing circuitry’ (B): Bridge circuits (C): Multiple buses (D): Buffer registers
168916. If 110011012 is divided by 11O2 the remainder isl
(A): 101 (B): 11 (C): 0 (D): 1
168917. The program that brings the object code into memory for execution is :
(A): Loader (B): Fetcher (C): Extractor (D): Linker
168918. The order in which the return addresses are generated and used is :
(A): LIFO (B): FIFO (C): Random (D): Highest priority
168919. The classification of BUSes into synchronous and asynchronous is based on :
(A): the devices connected to them (B): the type of data transfer (C): the timing of data transfers (D): none of the above
168920. In a digital representation of voltages using an8-bit binary code,how many values can be defined?binary code, how many values can be defined?
(A): 128 (B): 256 (C): 64 (D): 16
168921. The memory used to hold the address of data stored inthe cache is:
(A): Associative memory (B): Primary memory (C): Secondary memory (D): Register
168922. — is a black box testing method.
(A): Basic path testing (B): Code path analysis (C): Boundary value analysis (D): Recovery testing
168923. The strategy of temporarily suspending the running process is called :
(A): First come first serve (B): Shortest job first (C): Preemptive scheduling (D): Non-preemptive scheduling
168924. Resolution of externally defined symbol is done by :
(A): Linker (B): Loader (C): Compiler (D): Assembler
168925. In_________________topology, whole network goes down, if a computer’s network cable is broken.
(A): Ring (B): Star (C): Bus (D): Token ring
168926. Baudot code uses ------bits per symbol.
(A): 3 (B): 5 (C): 6 (D): 8
168927. Which of the following problem js undecidable?
(A): Membership problem for CFL (B): Fitness problem for FSAs (C): Membership problem for regular sets (D): Ambiguity problem of CFGs
168928. Image compression is :
(A): reducing the size of image to fit to screen (B): making image look better (C): reducing the redundancy of image data (D): reducing degradation over imagek
168929. Basic steps for filtering in the frequency domain :
(A): Fourier transform' (B): Filter function (C): Inverse Fourier transform (D): All of the above
168930. Type checking is normally done by :
(A): Lexical analyzer (B): Code optimizer (C): Syntax analyzer (D): Linear analyzer
168931. Producer consumer problem can be solved using :
(A): monitors (B): semaphores (C): event counters (D): all the above
168932. Time To Live field in the ip header is used :
(A): to find the shortest path (B): to find alternate path (C): to aviod infinite loopsto avoid infinite loops (D): to reduce the size of packetto reduce the size of packet
168933. AGING is a technique used in :
(A): FCFS (B): Round Robin (C): Priority scheduling (D): Pre-emptive scheduling
168934. The term used to refer to a row in database is :
(A): Field (B): Tuple (C): Attribute (D): Entry
168935. In a microprocessor the register that keeps the results of arithmetic or logic operation
(A): Program counter (B): Flag register (C): AccumulatorAccumulator (D): Stack register
168936. Thrashing occurs when a :
(A): Computer's virtual memory subsystem is in a constant state of paging Computer’s virtual memory subsystem is in a constant state of paging (B): Computer’s main memory got exhausted (C): Computer's processes are in indefinite dead lock (D): None of the above
168937. A systemprogram that sets up a program in main memory ready for execution is :
(A): Assembler (B): Linker (C): EditorEditor (D): Loader
<<= Back
Next =>>
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
Powered By:Omega Web Solutions © 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions