1402016 Related Question Answers

51. To implement a 2 input EXCLUSIVE required is (use NAND gates only):





52. The number (A72E)18 is equivalent to:





53. Which of the following DMA transfer modes and interrupt handling mechanisms will enable the highest I/O bandwidth?





54. Which of the following statements is FALSE about relative addressing mode?





55. The TRAP interrupt mechanism of the 8085 microprocessor :





56. Which of the following objects can be used Pages) Without explicitly declaring them?





57. The address bus of 8086 CPU is :





58. The register which keeps track of the execution of a program and which contains the memory address of the instruction currently being executed is called :





59. registerInstruction registerThe register used as a working area in CPU is :





60. In the absolute addressing mode :





61. In a software project, COCOMO (Constructive Cost Model) is used to estimate





62. A relation EMPLOYEE is defined with attributes empcode (unique), name, street, city, state and pin code. For any pin code, there is only one city and state. Also, for any given street, city and state, there is just one pin code. In normalization terms, EMPLOYEE is a relation in :





63. A software configuration management tool helps in :





64. A relational database contains two tables employee and department in which employee table has columns emp-no, name and dept-id and department table has columns dept-id and dept-name. The following insert statement were executed successfully to populate the empty tables:Insert into department values (1, ‘computer science’)Insert into department values (2, ‘information technology')Insert into employee values (1, ‘Navin, 1)Insert into employee values (2, ’Mukeeh', 2)Insert into employee values (3, 'Suresh', X)





65. A table has fields Fl, F2, F3, F4, F5 with the following functional dependencies Fl -► F3, F2 F4, (Fl, F2) ->F5 in terms of normalization, this table is in:





66. A B-tree used as an index for a large database table has four levels including the root node. If a new key is inserted in this index ,then the maximum number of nodes that could be newly created in the process are :





67. Amongst the ACID properties of a transaction, the 'durability' property requires that the changes made to the database by a successful transaction persist:





68. Consider a relation R with five attributes V,W,X,Y and Z. the following functional dependencies hold : VY→W,WX→Z and ZY→V. which of the following is a candidate key for R ?





69. Which of the following is a realization of polymorphism?





70. A major advantage of inheritance is:





71. The technique used to summarize the financial, statistical, mathematical, scientific and economic data is:





72. .Graphics and image processing technique used to produce a transformation of one object into another is called:





73. In a binary tree, for every node the difference between the number of nodes in the left and right subtrees is atmost 2. If the height of the tree is h > 0, then the minimum number of nodes in the tree is :





74. A binary search tree contains the numbers 1, 2, 3, 4, 5, 6, 7, 8. When the tree is traversed in pre-order and the values in each node printed out, the sequence of values obtained is 5, 3, 1, 2, 4, 6,8, 7. If the tree is traversed in post-order, the sequence obtained would be :





75. Let G be a weighted undirected graph and e be an edge with maximum weight in G. suppose there is a minimum weight spanning tree in G containing the edge e. which of the following statements is always true?





Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions