Tuesday 18 November 2014

Assistant Engineer IT (2014) Question Paper-I

Assistant Engineer IT (2014) Question Paper

PART A
 COMPUTER SCIENCE
AND INFORMATION AND TECHNOLOGY

1.    Suppose instead of using 16 bits for the network part of a class B IPv4 address, 20 bits have been used. How many class B sub-networks will be there?
a)     6
b)    16
c)     4
d)    14

2.    A capacitor is charged by constant current of 4 mA and results in a voltage increase of 12 V in a 13 seconds interval. Value of capacitance is :
a)    36.9 mF
b)    4.33 mF
c)    39 mF
d)    3.69 mF             

3.    If a switch has 12 ports, each with a maximum line speed of 1000 Mbps, how fast (minimum) does the switching fabric need to be in order to prevent queuing/blocking for full duplex operation?
a)    12 Gbps
b)    24 Gbps
c)    1000 Mbps
d)    2000 Mbps

4.    A method of ensuring electronic document integrity :
a.    Firewall
b.    SSL
c.    Authentication
d.    Digital Signature

5.    Given that AB+A`C+BC=AB+A`C, then (A`+C)(B+C)(A+B) is equivalent to :
a.    (A`+B)(A+C)
b.    (A+B)(A`+C)
c.    (A+B`)(A`+C)
d.    (A+B`)(A`+C`)

6.     IPv6 address is ……………….bits long.
a.    128
b.    64
c.    32
d.    16

7.    The signal x(t)=e-4tu(t) is a :
a.    Power signal with P =1/4
b.    Power signal with P=0
c.    Energy signal with E=1/4
d.    Energy signal with E=0

8.    An analog signal is sampled at 36 kHz and quantized into 256 levels. The time duration of a bit of binary coded signal is :
a.    5.78 us
b.    3.47 us
c.    6.43 ms
d.    7.86 ms

9.     Pick the odd one out :
a.    Virus
b.    Trojan Horse
c.    WWW
d.    Worm

10.   Consider the following function in C :
Test int (t1)
{
If (t1 == 0)
Return 0;
Else
Return t1 + = Test(t1-1);
}
When the above function is called with a non-zero positive value, it always returns value of :
a.    t1
b.    t1-1
c.    t1*(t1+1)/2
d.    Zero

11.   What will be the output for the following ‘C’ code snippet
For (int i=3; i< 15; i+=3)
{
Printf(‘%d”,i);
++I;
}
a.    3 6 9 12
b.    3 6 9 12 15
c.    3 7 11 15
d.    3 7 11

12.   Order the following list by their asymptotic growth (fastest to slowest)
                      I.        N
                                II.            nn
                   III.        log n
                  IV.        n!
                    V.        n log n
a)    (iii),(i),(v),(iv),(ii)
b)    (ii),(i), (v),(iv),(iii)
c)    (iii),(i),(v),(ii),(iv)
d)    (iii),(v),(i),(iv),(ii)

13.   Which of the following is correct sequence of stages of program development ?
a)    Write-compile-link-test
b)    Write-compile-document-run
c)    Write-link-compile-run
d)    Write-compile-link-document

14.   In a digital communication system employing Frequency Shift Keying(FSK), the 0 and 1 bit are represented by sine waves of 10 kHz and 25 kHz respectively. These waveforms will be orthogonal for a bit interval of :
a)    45 usec
b)    200 usec
c)    50 usec
d)    250 usec

15.   Which of the following is not an infinite loop ?
a)    While (1) {            }
b)    For(;;)   {                  }
c)    x=0; do { ………………} while (x == 0);
d)    #define TRUE 0
            While(TRUE) { …… }

16.   If seek time for the disk=10ms, Latency time= 5ms, then calculate access time to access the data from the disk. Assume time to transmit the information back to processor = 1 ms
a)    15 ms
b)    16 ms
c)    14 ms
d)    06 ms

17.  If a table ‘clients’ has a column ‘name’ filled with names of the clients of a electricity board and you want to find all clients that have an “S” somewhere in its name, you can do that via this SQL command :
a)    Select * from clients where name =’$S$’
b)    Select * from clients where name =’%S%’
c)    Select * from clients where name like ’$S$%’
d)    Select * from clients where name like ’%S%’

18.   With SQL, how can you insert “HP Electricity” as the “Deptt_Name” in the “Departments” table ?
a)    INSERT INTO Departments(Deptt_Name) VALUES(‘HP Electricity’)
b)    INSERT (‘HP Electricity’) INTO Departments(Deptt_Name)
c)    INSERT INTO Departments (Deptt_Name)(‘HP Electricity’)
d)    INSERT INTO Departments (‘HP Electricity’) INTO Deptt_Name

19.   Consider the tables T1(Staff_ID, Staff_NAME) and T2(Item_ID, Item_NAME,Staff_ID). Query to find out those staff members who have ordered “Poles”.
a)    Select Staff_NAME form T1,T2 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’
b)    Select Staff_NAME form T2 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’
c)    Select Staff_NAME form T1,T2 where Item_NAME=’Poles’
d)    Select Staff_NAME form T1 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’

20.   Which of the following operating systems is available in free/open source domain ?
a)    Mac OS
b)    SUN Solaris
c)    Windows XP
d)    Linux

21.  Most important difference in the performance between main memory and secondary memory as :
a)    Power consumption
b)    Most secondary storage devices are to big to fit into the CPU
c)    Most Secondary storage is mostly bi-state, but main memory is mostly tri-state.
d)    Speed of access; secondary storage is much slower.

22.  Basic purpose of Microprocessor is to :
a)    Store information
b)    Print Data
c)    Compute data
d)    Send an e-mail

23.  Which of the following binary expressions is not correct ?
a)    (x + y)`= x`.y`
b)    (x`+y`)`=x.y
c)    (x`.y`)` = x+y
d)    (x`+y`)` = x`.y`

24.   Which of the following is not condition having a deadlock resource previous granted can be forcibly taken away from a process ?
a)    Resources need to be used in mutually exclusion fashion
b)    Process can request new resources, as they continue to hold on to old ones.
c)    Here is a cycle in the resource allocation graph
d)    None of the above.

25.  CPU Scheduling refers to :
a)    Allowing multiple processes to use a processor
b)    Management of processes in main memory
c)    Swapping processes form secondary to main memory
d)    Switch off the power of processor.

Direction (Q. Nos. 26 and 27 ): Concern the following database :
Seller(SellerId, Name, Address, City, State, Zip)
Item(SellerId, ModelNumber, Description, Weight, Price)
SellerId foreign key to ‘Item’ table
26.   In the database immediately above, the relationship between ‘Seller’ and ‘Item’ is best described as ……………………
Many-to-many
a)    One-to-many , with ‘Seller’ as the “many”
b)    One-to-many, with ‘Seller’ as the “many”
c)    One-to-many, with ‘Seller’ as the “many”
d)    Not allowed. If the primary key and a foreign key overlap, they must be identical.

27.  In the database immediately above, the table ‘Item’……………..
a)    Has two primary keys, SellerID and Modelnumber
b)    Has an improperly constructed primary key. If the primary key and a foreign key overlap, they must be identical
c)    Has two candidate keys
d)    Has as single composite primary key consisting of the fields SellerID and ModelNumber- a table has only one primary key, but it can be a composite of multiple fields.

28.   Cache access time is 100 nano-sec., main memory access time is 800 nano-sec if the hit ratio is 95%, what is effective access time?
a)    135 nano-sec
b)    855 nano-sec
c)    45 nan-sec
d)    765 nano-sec

29.   When the following sequence is inserted in the binary search tree, number of nodes in left and right sub-trees :
52 86 64 20 3 25 14 9 85
a)    Left Nodes = 3 and Right nodes = 6
b)    Left Nodes = 6 and Right nodes = 3
c)    Left Nodes = 3 and Right nodes = 5
d)    Left Nodes = 5 and Right nodes = 3

30.   The order of algorithm to merge the two sorted lists of lengths m and n is :
a)    O(m)
b)    O(n)
c)    O(m+n)
d)    O(log(m) + log(n))

31.  In 2085 microprocessor, after execution of the following instructions :
Load a
Mul a
Store t1
Load b
Mul b
Store t2
Mul t2
Add t1
What will be the content in accumulator ?
a)    a*a+b*b*b*b
b)    a+b
c)    2*a*b
d)    a+b*b

32.  A graphic representation of information flow of some system is called :
a)       Hippo Diagram
b)       Flow Chart
c)       Data Flow Diagram
d)       None of these

33.   What can be the complexity of an algorithm if the time equation is 3*log(n) + log(log n) ?
a)    Log(n)
b)    Log(Log(n))
c)    3*Log(n)
d)     n3

34.   Which of the following scheduling algorithms is based on time-sharing ?
a)    Shortest-Job-First Scheduling
b)    First-Come-First-Served Scheduling
c)    Priority Scheduling
d)    Round-Robin Scheduling

35.  System software :
a)    Provides computer with instructions necessary to operate the system
b)    Is necessary to start your computer
c)    Permits you to use application software
d)    All of the above.

36.  The register which contains the memory address of the current instruction being executed is known as :
a)    Memory address register
b)    Program counter
c)    Index register
d)    Instruction register

37.   What will be the output of the following :
#include<stdio.h>
Main()
{
Int i=8,j,k;
++i=++j=++k=8;
Printf(“\n %d \t %d \t %d”, I,j,k);
}
a)    10 9 8
b)    8 9 10
c)    8 8 8
d)    11 11 11

38.   In 8085 microprocessor which of the following modifies the contents of program counter ?
a)    ADD Instruction
b)    JMP and CALL instructions
c)    CMA Instruction
d)    MOV Instruction

39.   The range of number which can be stored in a sixteen bit register(with left bit for sign) :
a)    0 to 65535
b)    -128 to +127
c)    -32768 to + 32767
d)    0 to 255

40.   In some systems, when there is no more free memory, the system automatically determines what is in use and reorganizes memory so that the available memory is in one big contiguous block. This process is known as :
a)    Garbage Collection
b)    Formatting
c)    Linking
d)    Memory Leak

41.   What is the correct HTML for referring to an external style sheet ?
a)    <link rel=”stylesheet” type=”text/css” href=”mystyle.css”>
b)    <style src=”mystyle.css”>
c)    <external>mystyle.css</external>
d)    <stylesheet>mystyle.css<stylesheet>

42.   Let P(E) denotes the probability of the event E. Given P(A)=1, P(B)=1/2, the values of P(A/B) and P(B/A) respectively are :
a)    1/4,1/2
b)    1/2,1
c)    1,1/2
d)    1/2, ¼

43.  Consider the experiment of tossing 2 dice. Let A be the vent that the numbers appearing on top are equal, and B be the even that both numbers are even. How many outcomes will the event A () B consists of?
a)    1
b)    3
c)    4
d)    6

44.  The cyclomatic complexity  metric provides the software designer with information regarding the number of :
a)    Independent logic paths in the program
b)    Cycles in the program
c)    Errors in the program
d)    Statements in the program 

45.   The Nyquist sampling interval, for the signal sin c(700t) + sin c(500t) is :
a)    1/350 sec
b)    π/350 sec
c)    1/700 sec
d)    π/175 sec

46.  A voice channel takes 40 kHz including a guard band that provides protection against small drifts in transmission frequency. If we divide listening area into hexagonal cells, so that no two adjacent cells use the same frequency bands, how many concurrent calls, approximately, can the 28 MHz spectrum support in a city with 300 cells?
a)    4000
b)    21000
c)    30000
d)    550000

47.   Suppose a Web server application generates messages consisting of 200 bytes of data to be sent. Message gets encapsulated in a TCP segment and then an IPv4 datagram. There are no options added in the TCP or IP headers. What is percentage of IP datagram size consisting of application data?
a)    83.33%
b)    60.66%
c)    75.66%
d)    50.33%

48.   How many address lines are needed to address each memory location into 2048x4 memory chip?
a)    10
b)    11
c)    12
d)    4

49.   A single array A[1..MAXSIZE] is used to implement two stacks. The two stacks grow form opposite ends of the array. Variables top1 and top2 (top1 < top2) point to the locations of the topmost element in each of the stacks. If the space is to be used efficiently, the conditions for “Stack full” is :
a)    (top1 = MAXSIZE/2) and (top2=MAXSIZE/2+1)      
b)    top1 + top2 = MAXSIZE
c)    (top1 = MAXSIZE/2) or (top2=MAXSIZE)
d)    Top1 = top2-1

50.  The velocity of sound is the least in which of the following medium?
a)    Air
b)    Water
c)    Wood
d)    Vacuum

51.   An AM signal is detected using an envelope detector. The carrier frequency and modulating signal frequency are 1 MHz and 2 kHz respectively. An appropriate value for the time constant of the envelope detector is :
a)    500 usec
b)    20 usec
c)    0.2 usec
d)    1 usec

52.   Nyquist theorem specifies :
a)    Properties of an arbitrary, unfiltered signal
b)    Relation between achievable data rate and channel noise
c)    That data rate depends linearly on number of discrete signal levels use to encode information
d)    That maximum data rate is function of medium-bandwidth and number of discrete signal levels used to encode information.
53.  If We use x4+x2+1 polynomial standard, what would be the cyclic redundancy check if the original data component was 11011 ?
a)    1010
b)    1101
c)    1001
d)    0101

54.  Select the most appropriate data structure to implement the storage of the addresses of recently visited websites in a web Browser for the operation of “Back” button :
a)    Queue
b)    Link List
c)    Array
d)    Stack

55.  Find the number of comparisons using binary search method required to search 1000 in array A = {19,25,30,35,37,45,52,69,900}
a)    4
b)    9
c)    0
d)    Binary search cannot be performed on this data

56.  The noise at the input to an ideal frequency detector is white. The detector is operating above threshold. The power spectral density of the noise at the output is :
a)    Raised-cosine
b)    Flat
c)    Parabolic
d)    Gaussain

57.   How many memory chips of (128x8) are needed to provide a memory capacity of 2048x16?
a)    128
b)    64
c)    32
d)    16

58.  Suppose one IPv6 router wants to send a datagram to another IPv6 router, but the two are connected together via an intervening IPv4 router. If the two routers use tunneling, then :
a)    Sending IPv6 router creates an IPv4 datagram and puts it in data field of an IPv6 datagram
b)    Sending IPv6 router creates one or more IPv6 fragments, none of which is larger than the maximum size of an IPv4 datagram.
c)    Sending IPv6 router creates an IPv6 datagram and puts it in data field of IPv4 datagram.
d)    Sending IPv6 router creates IPv6 datagram and intervening IPv4 router rejects this datagram.
59.  Ten signals, each of 4000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for multiplexed channel ? Guard bands are 400 Hz wide.
a)    44 kHz
b)    4.4 kHz
c)    4.36 kHz
d)    43.6  kHz

60.  Assume that one-slot frame in Bluetooth lasts for 600 microseconds(ms). Hopping and control mechanisms need 250 ms. Ho many bits of data a three slot frame can carry ? Assume bandwidth of 1 MHz and 1 bit per Hz.
a)    1050
b)    1550
c)    1650
d)    2150

61.   If log2 16 = n, then the value of n is :
a)    6
b)    4
c)    2
d)    8

62.  Three of the following numbers are the same. Which one is different ?
a)    12210.14
b)    644.18
c)    420.2510
d)    1A4.416

63.  Let A=656, B=473 and c= 1351, then in which of the following number systems is the equation A+B=C satisfied?
a)    Octal
b)    Decimal
c)    Hexadecimal
d)    Binary

64.  Function points provide an objective measure of the application system…………… that can be used to compare different kinds of application systems.
a)    Size
b)    Complexity
c)    Performance
d)    Operation ease

65.  Using the Hard Disk as an extension of RAM is a feature of :
a)    Virtual memory
b)    Cache
c)    Direct Memory Access(DMA)
d)    Virtual Reality

66.  What is the type of modulation adopted for the chrominance signal in TV ?
a)    Amplitude modulation
b)    Frequency modulation
c)    Phase modulation
d)    Quadrature amplitude modulation

67.   Which of the following optical transducers is an active transducer?
a)    Photoemissive cell
b)    Photodiode
c)    Phototransistor
d)    Photovoltaic cell

68.  Communication between a computer and a keyboard involves……….. transmission.
a)    Simplex
b)    Half-duplex
c)    Full-duplex
d)    Automatic

69.  You want to use multiple operating system like Linux, windows etc. concurrently on single machine. The best way to achieve this is :
a)    Make machine multiple bootable like using GRUB
b)    Use virtualization software like VMWare
c)    It is not possible
d)    None of the above.

70.  Today’s desktop computers have typically ‘X’ amount of main memory, ‘Y’ speed of processor and ‘Z’ amount of hard-disk memory. Approximately X,Y,Z can be respectively 4 GB, 3 kHz, 1000 GB
4 MB, 3 MHz, 1000 MB
4 GB, 3 GHz, 1000 KB
4 GB, 3.3 GHz, 1000 GB

71.  In order to enhance performance of the computer , Disk defragmenter j:
a)    Consolidates parts of files lying at different locations on computer’s hard disk
b)    Deletes temporary files related to Internet
c)    Deletes temporary files related to backup
d)    All of the above.

72.  In UNIX operating system, command used for backups and achieves is :
a)    Tar
b)    Backup
c)    Achieve
d)    None of these

73.   Match the following :
(a)  HTML      (i) Protocol for sending electronic mail on the internet
(b)  HTTP      (ii) Company that charges a fee to enable organizations to connect to internet
(c)  ISP          (iii) Set of tags and related rules that are used to create web pages
(d)  SMTP      (iv) Internet standard that supports exchange of information on Web.

a)    (a)-(iv),(b)-(i),(c)-(ii),(d)-(iii)
b)    (a)-(iv),(b)-(i),(c)-(iii),(d)-(ii)
c)    (a)-(iii),(b)-(ii),(c)-(iv),(d)-(i)
d)    (a)-(iii),(b)-(iv),(c)-(ii),(d)-(i)

74.   Optical fiber is one of the most attractive physical layer media to use for high speed networks because :
a)    It offers immense transmission bandwidth
b)    It has extremely low error rates
c)    It can cover relatively large geographic distances before requiring repeaters
d)    All of the above.

75.   How can you make an e-mail link in HTML ?
a)    <mail>xxx@yyy</mail>
b)    <mail href =”xxx@yyy”>
c)    <a href=”xxx@yyy”>
d)    <a href=”mailto:xxx@yyy”>

76.  A program is written to turn on/off a switch. The switch is switched off once the temperature falls below 18 and them it is turned on when the temperature is more than 21. To test this program, identify the equivalence values which belong to the same class
a)    12,16,22
b)    24,27,17
c)    22,23,24
d)    14,15,19

77.  All of the following are types of communication and collaboration done in real time, except :
a)    Blogging
b)    Webinars
c)    Instant messaging
d)    VoIP

78.  An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called as :
Virus
Worm
Denial-of-service attack
Trojan horse

79.  Which of the following would best fit the following description-software is coped and given to a friend without the permission of the copyright owner?
a)    Freeware
b)    Piracy
c)    Shareware
d)    Public domain

80.  You wish to install a hardware device that is not plug and play. Which of the following is commonly the first instruction given in help manual to install this device?
a)    Install the driver
b)    Install the device
c)    Turn the power off

d)    Disconnect the monitor

No comments: