Go To Top Reset
<<= Back
Next =>>
You Are On Multi Choice Question Bank SET 3379
168951. For largenetworks,_________topology is used.
(A): Bus (B): Star (C): Ring (D): Mesh
168952. ARPANET stands for :
(A): American Research Project Agency Network (B): Asian Research Project Agency Network (C): Ad-hoc Research Project Agency Network (D): Advanced Research Project Agency Network
168953. Every context sensitive language is :
(A): Recursive enumerable language (B): Recursive language (C): Context free language (D): Context sensitive language
168954. The permitted values of each attributes of a relation is called its :
(A): Set .‘ (B): Tuple (C): Schema (D): Domain
168955. The addressing mode in which you directly give the operand value is :
(A): Relative (B): Direct (C): Definite (D): Immediate
168956. What is the value of j after the execution of the following code? intj=0; int iV=10;while(j
(A): 0 (B): 9 (C): 10 (D): 11
168957. The address generated by CPU is :
(A): Physical address (B): Absolute address (C): Logical address (D): Memory address
168958. IEEE 802.11 standard for wireless LAN uses —____________________multiple access
(A): CDMA (B): ALOHA (C): CSMA/CA (D): All of these
168959. The worst-case complexity of heap sort is :
(A): n log n (B): n2 (C): Log n (D): N
168960. A protocol used for secure sending of data overthe Internet is :
(A): SMTP (B): FTP (C): HTTPS (D): TCP/IP
168961. The--------------method provides a one-time session key for two parties.
(A): Diffie- Hellman (B): Public key (C): RSA (D): DES
168962. How many root element an XMLdocument can have?
(A): Any number as required (B): One (C): Two (D): Only limited by available memory
168963. Critical path of the PERT chart is :
(A): Path which takes the longest time to complete the project (B): Path which takes the shortest time to complete the project (C): Path which takes the most appropriate time to complete the project (D): None of the above
168964. The language used by end users and programmers to manipulate data in a database is :
(A): HTML (B): DML (C): XML (D): GML
168965. Secret key encryption is also known as :
(A): Asymmetric encryption (B): Symmetric key cryptography (C): RSA (D): DSA
168966. Which normal form is based on multi-valued dependency?
(A): First (B): Second (C): Third (D): Fourth
168967. mov ax, bx which addressing mode does this instruction use?
(A): Immediate (B): Indirect , (C): Register (D): Direct
168968. An RTP packet is encapsulated in :
(A): a TCP segment (B): a UDP datagram (C): an IP datagram (D): a SMTP packet
168969. To prevent______________ we can timestamp the packets.
(A): Error (B): Jitter (C): Loss (D): None of these
168970. The complexity of Binary search algorithm is :
(A): O(n) (B): o(log n) (C): o(n/2) (D): 0(n log n)
168971. If every node u in G is adjacent to every other node v in G, a graph is said to be :
(A): Isolated (B): Complete (C): Finite (D): Strongly connected
168972. To extend the connectivity of the processor bus we use :
(A): PCI bus (B): SCSI bus (C): Controllers (D): Multiple bus
168973. If 110011OO2 is divided by 1102 the quotient is :
(A): 11011 (B): 1111 (C): 100010 (D): 100001
168974. Speed of a microprocessor is determined by :
(A): Address bus width (B): Data bus width (C): Clock (D): None of the above
168975. How many gates would be required to implement the following Boolean expression aftersimplification?XY + X(X + Z) + Y(X + Z)
(A): 1 (B): 2 (C): 3 (D): 4
168976. With a 200 kHz clock frequency, 16 bits canbe serially entered into a shift register in_________________time.,
(A): 4 ps (B): 80 ps (C): 80 ms (D): 8 ms
168977. Parser is also known as :
(A): Lexical analyzer (B): Code optimizer (C): Syntax analyzer (D): Linear analyzer
168978. The operation in relational algebra for viewing a set of tuples is :
(A): Select (B): Project (C): Union (D): Join
168979. The average case complexity of linear search algorithm is :
(A): O(n) (B): 0(log n) (C): 0(n2) (D): 0(n log n)
168980. Data Encryption standard is a :
(A): Stream cipher (B): Block cipher (C): Substitution cipher (D): None of these
168981. Data about data is :•
(A): Database (B): Mega-data (C): Metadata (D): Schema
168982. No. of layers in OSI reference model:
(A): Four (B): Five (C): Six (D): Seven
168983. Routers are components of _____________layer in OSI reference layer.
(A): Physical layer (B): Network layer (C): Transport layer (D): Data link layer
168984. mov al, [bx] which addressing mode docs this instruction use?
(A): Register indirect (B): Base index (C): Base index plus displacement (D): Register
168985. The number of attributes in a relation is called its :
(A): Cardinality (B): Size (C): Schema (D): Degree
168986. The operator used to concatenate two strings in ORACLE is :
(A): || (B): S (C): # (D): %
168987. A full-adder has a c, = 0. What are the SUM and the CW1 when A = 1 and B = 1'
(A): SUM = 0CM=0 (B): SUM =()CM=1 (C): SUM = 1C„,= 0 (D): SUM =IC„=l
168988. For which inputs the output of an exclusive-NOR gate is 1?
(A): A = 0. B = 1 (B): A = 1. B = 1 (C): A = 0, B = 0 (D): None of these
168989. The depth of a complete binary tree is given by :
(A): Dn = n iogl0n (B): Dn - n log2n + 1 (C): Dn = log2n (D): Dn=log2n + l-
168990. A binary tree whose every node has either zero or two children is called :
(A): Complete binary tree (B): Binary search tree (C): Extended binary tree (D): None of the above
168991. The WORST-CASE complexity of Bubble sort algorithm is :
(A): O(n) (B): 0(log n) (C): 0(n2) (D): 0(n log n)
168992. Grammar recognized by a FSM is :
(A): Only context free grammar (B): Only context sensitive grammar (C): Only regular grammar (D): All of these
168993. For efficient searching compilers use —
(A): Linear search tables (B): Binary search tables (C): Hash tables (D): Binary search trees
<<= Back
Next =>>
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
Powered By:Omega Web Solutions © 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions