Assistant Engineer IT (2014)
Question Paper
PART A
COMPUTER SCIENCE
AND INFORMATION AND TECHNOLOGY
1. Suppose instead of using 16 bits for the
network part of a class B IPv4 address, 20 bits have been used. How many class
B sub-networks will be there?
a) 6
b) 16
c) 4
d) 14
2. A capacitor is charged by constant current of
4 mA and results in a voltage increase of 12 V in a 13 seconds interval. Value
of capacitance is :
a) 36.9 mF
b) 4.33 mF
c) 39 mF
d) 3.69
mF
3. If a switch has 12 ports, each with a maximum
line speed of 1000 Mbps, how fast (minimum) does the switching fabric need to
be in order to prevent queuing/blocking for full duplex operation?
a) 12 Gbps
b) 24 Gbps
c) 1000 Mbps
d) 2000 Mbps
4. A method of ensuring electronic document integrity :
a. Firewall
b. SSL
c. Authentication
d. Digital Signature
5. Given that AB+A`C+BC=AB+A`C, then (A`+C)(B+C)(A+B) is equivalent
to :
a. (A`+B)(A+C)
b. (A+B)(A`+C)
c. (A+B`)(A`+C)
d. (A+B`)(A`+C`)
6. IPv6 address is ……………….bits long.
a. 128
b. 64
c. 32
d. 16
7. The signal x(t)=e-4tu(t) is a :
a. Power signal with P =1/4
b. Power signal with P=0
c. Energy signal with E=1/4
d. Energy signal with E=0
8. An analog signal is sampled at 36 kHz and quantized into 256
levels. The time duration of a bit of binary coded signal is :
a. 5.78 us
b. 3.47 us
c. 6.43 ms
d. 7.86 ms
9. Pick the odd one out :
a. Virus
b. Trojan Horse
c. WWW
d. Worm
10. Consider the
following function in C :
Test int (t1)
{
If (t1 == 0)
Return 0;
Else
Return t1 + = Test(t1-1);
}
When the above function is called with a
non-zero positive value, it always returns value of :
a. t1
b. t1-1
c. t1*(t1+1)/2
d. Zero
11. What will be the
output for the following ‘C’ code snippet
For (int i=3; i< 15; i+=3)
{
Printf(‘%d”,i);
++I;
}
a. 3 6 9 12
b. 3 6 9 12 15
c. 3 7 11 15
d. 3 7 11
12. Order the
following list by their asymptotic growth (fastest to slowest)
I. N
II. nn
III. log n
IV. n!
V. n log n
a) (iii),(i),(v),(iv),(ii)
b) (ii),(i), (v),(iv),(iii)
c) (iii),(i),(v),(ii),(iv)
d) (iii),(v),(i),(iv),(ii)
13. Which of the
following is correct sequence of stages of program development ?
a) Write-compile-link-test
b) Write-compile-document-run
c) Write-link-compile-run
d) Write-compile-link-document
14. In a digital
communication system employing Frequency Shift Keying(FSK), the 0 and 1 bit are
represented by sine waves of 10 kHz and 25 kHz respectively. These waveforms
will be orthogonal for a bit interval of :
a) 45 usec
b) 200 usec
c) 50 usec
d) 250 usec
15. Which of the
following is not an infinite loop ?
a) While (1) { }
b) For(;;) { }
c) x=0; do { ………………} while (x == 0);
d) #define TRUE 0
While(TRUE) { …… }
16. If seek time for
the disk=10ms, Latency time= 5ms, then calculate access time to access the data
from the disk. Assume time to transmit the information back to processor = 1 ms
a) 15 ms
b) 16 ms
c) 14 ms
d) 06 ms
17. If a table ‘clients’
has a column ‘name’ filled with names of the clients of a electricity board and
you want to find all clients that have an “S” somewhere in its name, you can do
that via this SQL command :
a) Select * from clients where name =’$S$’
b) Select * from clients where name =’%S%’
c) Select * from clients where name like ’$S$%’
d) Select * from clients where name like ’%S%’
18. With SQL, how
can you insert “HP Electricity” as the “Deptt_Name” in the “Departments” table
?
a) INSERT INTO Departments(Deptt_Name) VALUES(‘HP Electricity’)
b) INSERT (‘HP Electricity’) INTO Departments(Deptt_Name)
c) INSERT INTO Departments (Deptt_Name)(‘HP Electricity’)
d) INSERT INTO Departments (‘HP Electricity’) INTO Deptt_Name
19. Consider the
tables T1(Staff_ID, Staff_NAME) and T2(Item_ID, Item_NAME,Staff_ID). Query to
find out those staff members who have ordered “Poles”.
a) Select Staff_NAME form T1,T2 where T1.Staff_ID = T2.Staff_ID and
Item_NAME=’Poles’
b) Select Staff_NAME form T2 where T1.Staff_ID = T2.Staff_ID and
Item_NAME=’Poles’
c) Select Staff_NAME form T1,T2 where Item_NAME=’Poles’
d) Select Staff_NAME form T1 where T1.Staff_ID = T2.Staff_ID and
Item_NAME=’Poles’
20. Which of the
following operating systems is available in free/open source domain ?
a) Mac OS
b) SUN Solaris
c) Windows XP
d) Linux
21. Most important
difference in the performance between main memory and secondary memory as :
a) Power consumption
b) Most secondary storage devices are to big to fit into the CPU
c) Most Secondary storage is mostly bi-state, but main memory is
mostly tri-state.
d) Speed of access; secondary storage is much slower.
22. Basic purpose of
Microprocessor is to :
a) Store information
b) Print Data
c) Compute data
d) Send an e-mail
23. Which of the following
binary expressions is not correct ?
a) (x + y)`= x`.y`
b) (x`+y`)`=x.y
c) (x`.y`)` = x+y
d) (x`+y`)` = x`.y`
24. Which of the
following is not condition having a deadlock resource previous granted can be
forcibly taken away from a process ?
a) Resources need to be used in mutually exclusion fashion
b) Process can request new resources, as they continue to hold on
to old ones.
c) Here is a cycle in the resource allocation graph
d) None of the above.
25. CPU Scheduling refers
to :
a) Allowing multiple processes to use a processor
b) Management of processes in main memory
c) Swapping processes form secondary to main memory
d) Switch off the power of processor.
Direction (Q. Nos. 26 and 27 ): Concern the
following database :
Seller(SellerId, Name, Address, City,
State, Zip)
Item(SellerId, ModelNumber, Description, Weight, Price)
SellerId foreign key to ‘Item’ table
26. In the database
immediately above, the relationship between ‘Seller’ and ‘Item’ is best
described as ……………………
Many-to-many
a) One-to-many , with ‘Seller’ as the “many”
b) One-to-many, with ‘Seller’ as the “many”
c) One-to-many, with ‘Seller’ as the “many”
d) Not allowed. If the primary key and a foreign key overlap, they
must be identical.
27. In the database
immediately above, the table ‘Item’……………..
a) Has two primary keys, SellerID and Modelnumber
b) Has an improperly constructed primary key. If the primary key
and a foreign key overlap, they must be identical
c) Has two candidate keys
d) Has as single composite primary key consisting of the fields
SellerID and ModelNumber- a table has only one primary key, but it can be a
composite of multiple fields.
28. Cache access
time is 100 nano-sec., main memory access time is 800 nano-sec if the hit ratio
is 95%, what is effective access time?
a) 135 nano-sec
b) 855 nano-sec
c) 45 nan-sec
d) 765 nano-sec
29. When the
following sequence is inserted in the binary search tree, number of nodes in
left and right sub-trees :
52 86 64 20 3 25 14 9 85
a) Left Nodes = 3 and Right nodes = 6
b) Left Nodes = 6 and Right nodes = 3
c) Left Nodes = 3 and Right nodes = 5
d) Left Nodes = 5 and Right nodes = 3
30. The order of
algorithm to merge the two sorted lists of lengths m and n is :
a) O(m)
b) O(n)
c) O(m+n)
d) O(log(m) + log(n))
31. In 2085
microprocessor, after execution of the following instructions :
Load a
Mul a
Store t1
Load b
Mul b
Store t2
Mul t2
Add t1
What will be the content in accumulator ?
a) a*a+b*b*b*b
b) a+b
c) 2*a*b
d) a+b*b
32. A graphic
representation of information flow of some system is called :
a) Hippo Diagram
b) Flow Chart
c) Data Flow Diagram
d) None of these
33. What can be the
complexity of an algorithm if the time equation is 3*log(n) + log(log n) ?
a) Log(n)
b) Log(Log(n))
c) 3*Log(n)
d) n3
34. Which of the
following scheduling algorithms is based on time-sharing ?
a) Shortest-Job-First Scheduling
b) First-Come-First-Served Scheduling
c) Priority Scheduling
d) Round-Robin Scheduling
35. System software :
a) Provides computer with instructions necessary to operate the
system
b) Is necessary to start your computer
c) Permits you to use application software
d) All of the above.
36. The register which
contains the memory address of the current instruction being executed is known
as :
a) Memory address register
b) Program counter
c) Index register
d) Instruction register
37. What will be the
output of the following :
#include<stdio.h>
Main()
{
Int i=8,j,k;
++i=++j=++k=8;
Printf(“\n %d \t %d \t %d”, I,j,k);
}
a) 10 9 8
b) 8 9 10
c) 8 8 8
d) 11 11 11
38. In 8085
microprocessor which of the following modifies the contents of program counter
?
a) ADD Instruction
b) JMP and CALL instructions
c) CMA Instruction
d) MOV Instruction
39. The range of
number which can be stored in a sixteen bit register(with left bit for sign) :
a) 0 to 65535
b) -128 to +127
c) -32768 to + 32767
d) 0 to 255
40. In some systems,
when there is no more free memory, the system automatically determines what is
in use and reorganizes memory so that the available memory is in one big
contiguous block. This process is known as :
a) Garbage Collection
b) Formatting
c) Linking
d) Memory Leak
41. What is the
correct HTML for referring to an external style sheet ?
a) <link rel=”stylesheet” type=”text/css” href=”mystyle.css”>
b) <style src=”mystyle.css”>
c) <external>mystyle.css</external>
d) <stylesheet>mystyle.css<stylesheet>
42. Let P(E) denotes
the probability of the event E. Given P(A)=1, P(B)=1/2, the values of P(A/B)
and P(B/A) respectively are :
a) 1/4,1/2
b) 1/2,1
c) 1,1/2
d) 1/2, ¼
43. Consider the
experiment of tossing 2 dice. Let A be the vent that the numbers appearing on
top are equal, and B be the even that both numbers are even. How many outcomes
will the event A () B consists of?
a) 1
b) 3
c) 4
d) 6
44. The cyclomatic
complexity metric provides the
software designer with information regarding the number of :
a) Independent logic paths in the program
b) Cycles in the program
c) Errors in the program
d) Statements in the program
45. The Nyquist
sampling interval, for the signal sin c(700t) + sin c(500t) is :
a) 1/350 sec
b) π/350 sec
c) 1/700 sec
d) π/175 sec
46. A voice channel takes
40 kHz including a guard band that provides protection against small drifts in
transmission frequency. If we divide listening area into hexagonal cells, so
that no two adjacent cells use the same frequency bands, how many concurrent calls,
approximately, can the 28 MHz spectrum support in a city with 300 cells?
a) 4000
b) 21000
c) 30000
d) 550000
47. Suppose a Web
server application generates messages consisting of 200 bytes of data to be
sent. Message gets encapsulated in a TCP segment and then an IPv4 datagram.
There are no options added in the TCP or IP headers. What is percentage of IP
datagram size consisting of application data?
a) 83.33%
b) 60.66%
c) 75.66%
d) 50.33%
48. How many address
lines are needed to address each memory location into 2048x4 memory chip?
a) 10
b) 11
c) 12
d) 4
49. A single array
A[1..MAXSIZE] is used to implement two stacks. The two stacks grow form
opposite ends of the array. Variables top1 and top2 (top1 < top2) point to
the locations of the topmost element in each of the stacks. If the space is to
be used efficiently, the conditions for “Stack full” is :
a) (top1 = MAXSIZE/2) and
(top2=MAXSIZE/2+1)
b) top1 + top2 = MAXSIZE
c) (top1 = MAXSIZE/2) or (top2=MAXSIZE)
d) Top1 = top2-1
50. The velocity of sound
is the least in which of the following medium?
a) Air
b) Water
c) Wood
d) Vacuum
51. An AM signal is
detected using an envelope detector. The carrier frequency and modulating
signal frequency are 1 MHz and 2 kHz respectively. An appropriate value for the
time constant of the envelope detector is :
a) 500 usec
b) 20 usec
c) 0.2 usec
d) 1 usec
52. Nyquist theorem
specifies :
a) Properties of an arbitrary, unfiltered signal
b) Relation between achievable data rate and channel noise
c) That data rate depends linearly on number of discrete signal
levels use to encode information
d) That maximum data rate is function of medium-bandwidth and
number of discrete signal levels used to encode information.
53. If We use x4+x2+1
polynomial standard, what would be the cyclic redundancy check if the original
data component was 11011 ?
a) 1010
b) 1101
c) 1001
d) 0101
54. Select the most
appropriate data structure to implement the storage of the addresses of
recently visited websites in a web Browser for the operation of “Back” button :
a) Queue
b) Link List
c) Array
d) Stack
55. Find the number of
comparisons using binary search method required to search 1000 in array A =
{19,25,30,35,37,45,52,69,900}
a) 4
b) 9
c) 0
d) Binary search cannot be performed on this data
56. The noise at the input
to an ideal frequency detector is white. The detector is operating above
threshold. The power spectral density of the noise at the output is :
a) Raised-cosine
b) Flat
c) Parabolic
d) Gaussain
57. How many memory
chips of (128x8) are needed to provide a memory capacity of 2048x16?
a) 128
b) 64
c) 32
d) 16
58. Suppose one IPv6
router wants to send a datagram to another IPv6 router, but the two are
connected together via an intervening IPv4 router. If the two routers use
tunneling, then :
a) Sending IPv6 router creates an IPv4 datagram and puts it in data
field of an IPv6 datagram
b) Sending IPv6 router creates one or more IPv6 fragments, none of
which is larger than the maximum size of an IPv4 datagram.
c) Sending IPv6 router creates an IPv6 datagram and puts it in data
field of IPv4 datagram.
d) Sending IPv6 router creates IPv6 datagram and intervening IPv4
router rejects this datagram.
59. Ten signals, each of
4000 Hz, are multiplexed on to a single channel using FDM. How much minimum
bandwidth is required for multiplexed channel ? Guard bands are 400 Hz wide.
a) 44 kHz
b) 4.4 kHz
c) 4.36 kHz
d) 43.6 kHz
60. Assume that one-slot
frame in Bluetooth lasts for 600 microseconds(ms). Hopping and control
mechanisms need 250 ms. Ho many bits of data a three slot frame can carry ?
Assume bandwidth of 1 MHz and 1 bit per Hz.
a) 1050
b) 1550
c) 1650
d) 2150
61. If log2 16 = n, then the value of n is :
a) 6
b) 4
c) 2
d) 8
62. Three of the following
numbers are the same. Which one is different ?
a) 12210.14
b) 644.18
c) 420.2510
d) 1A4.416
63. Let A=656, B=473 and
c= 1351, then in which of the following number systems is the equation A+B=C
satisfied?
a) Octal
b) Decimal
c) Hexadecimal
d) Binary
64. Function points
provide an objective measure of the application system…………… that can be used to
compare different kinds of application systems.
a) Size
b) Complexity
c) Performance
d) Operation ease
65. Using the Hard Disk as
an extension of RAM is a feature of :
a) Virtual memory
b) Cache
c) Direct Memory Access(DMA)
d) Virtual Reality
66. What is the type of
modulation adopted for the chrominance signal in TV ?
a) Amplitude modulation
b) Frequency modulation
c) Phase modulation
d) Quadrature amplitude modulation
67. Which of the
following optical transducers is an active transducer?
a) Photoemissive cell
b) Photodiode
c) Phototransistor
d) Photovoltaic cell
68. Communication between
a computer and a keyboard involves……….. transmission.
a) Simplex
b) Half-duplex
c) Full-duplex
d) Automatic
69. You want to use
multiple operating system like Linux, windows etc. concurrently on single
machine. The best way to achieve this is :
a) Make machine multiple bootable like using GRUB
b) Use virtualization software like VMWare
c) It is not possible
d) None of the above.
70. Today’s desktop
computers have typically ‘X’ amount of main memory, ‘Y’ speed of processor and
‘Z’ amount of hard-disk memory. Approximately X,Y,Z can be respectively 4 GB, 3
kHz, 1000 GB
4 MB, 3 MHz, 1000 MB
4 GB, 3 GHz, 1000 KB
4 GB, 3.3 GHz, 1000 GB
71. In order to enhance
performance of the computer , Disk defragmenter j:
a) Consolidates parts of files lying at different locations on
computer’s hard disk
b) Deletes temporary files related to Internet
c) Deletes temporary files related to backup
d) All of the above.
72. In UNIX operating
system, command used for backups and achieves is :
a) Tar
b) Backup
c) Achieve
d) None of these
73. Match the
following :
(a) HTML (i) Protocol for sending
electronic mail on the internet
(b) HTTP (ii) Company that charges a
fee to enable organizations to connect to internet
(c) ISP (iii) Set of tags and related rules that
are used to create web pages
(d) SMTP (iv) Internet standard that supports
exchange of information on Web.
a) (a)-(iv),(b)-(i),(c)-(ii),(d)-(iii)
b) (a)-(iv),(b)-(i),(c)-(iii),(d)-(ii)
c) (a)-(iii),(b)-(ii),(c)-(iv),(d)-(i)
d) (a)-(iii),(b)-(iv),(c)-(ii),(d)-(i)
74. Optical fiber is
one of the most attractive physical layer media to use for high speed networks
because :
a) It offers immense transmission bandwidth
b) It has extremely low error rates
c) It can cover relatively large geographic distances before
requiring repeaters
d) All of the above.
75. How can you make
an e-mail link in HTML ?
a) <mail>xxx@yyy</mail>
b) <mail href =”xxx@yyy”>
c) <a href=”xxx@yyy”>
d) <a href=”mailto:xxx@yyy”>
76. A program is written
to turn on/off a switch. The switch is switched off once the temperature falls
below 18 and them it is turned on when the temperature is more than 21. To test
this program, identify the equivalence values which belong to the same class
a) 12,16,22
b) 24,27,17
c) 22,23,24
d) 14,15,19
77. All of the following
are types of communication and collaboration done in real time, except :
a) Blogging
b) Webinars
c) Instant messaging
d) VoIP
78. An attempt to slow down
or stop a computer system or network by flooding the system with requests for
information is called as :
Virus
Worm
Denial-of-service attack
Trojan horse
79. Which of the following
would best fit the following description-software is coped and given to a
friend without the permission of the copyright owner?
a) Freeware
b) Piracy
c) Shareware
d) Public domain
80. You wish to install a
hardware device that is not plug and play. Which of the following is commonly
the first instruction given in help manual to install this device?
a) Install the driver
b) Install the device
c) Turn the power off
d) Disconnect the monitor
No comments:
Post a Comment