techwringer prelims set 1

Upload: bhaskar-pathak

Post on 03-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 TechWringer Prelims Set 1

    1/4

    NIRAL 2012

    DEPARTMENT OF IST, DIVISION OF M.C.A

    ANNA UNIVERSITY, CHENNAI

    TECHWRINGER

    Duration: 20 MINS.Marks : 70

    Niral ID:

    Name:

    College Name:

    Rules:

    1. Q.1 25 are normal questions and carry 2 marks each. For each wrong answer 1

    mark will be deducted.

    2. Q.26 30 are star questions and carry 4 marks each. No negative markings if these

    questions are wrongly answered.

    3. Shade the most appropriate option(s) clearly in the answer sheet provided.

    4. If extra options are shaded, the answer will be considered to be wrong.

    5. For questions with no options, write down the question number followed by the

    right answer on the reverse of the answer sheet.

    1. What is the maximum file size in NTFS file system?

    (a) 4 TB (b) 8 TB (c) 16 TB (d) 32 TB

    2. For a database relation R(a,b,c,d) where the domains of a, b, c and d include only atomic

    values, only the following functional dependencies and those that can be inferred from them

    hole

    A -> c

    B -> d

    The relation is in

    (a) first normal form but not in second normal form

    (b) second normal form but not in second normal form

    (c) third normal form (d)none of the above

    3. By what mechanism does the global.asa file permit you to run code when your application

    and session start or finish in ASP?

    (a) Global parameters (b) Scope settings (c) Cookies (d) Events

    4. Which of the following gates is known as coincidence detecter?

    (a) AND gate (b) OR gate (c) NOT gate (d) NAND gate

  • 7/29/2019 TechWringer Prelims Set 1

    2/4

    5. System programs such as compiler are designed so that they are

    (a) Re-enterable (b) non-reusable (c) serially usable (d) recursive

    6. A data dictionary is a special file that contains

    (a) The names of all fields in all files (b) the data types of all fields in all files

    (c) The width of all fields in all files (d) all of these

    7. Which of the following is NOT true of deadlock prevention and deadlock avoidance

    schemes?

    (a) In deadlock prevention, the request for resources is always granted if the resulting state is

    safe

    (b) In deadlock avoidance, the request for resources is always granted if the resulting sate is

    safe

    (c) Deadlock avoidance is less restrictive than deadlock prevention(d) Deadlock avoidance requires knowledge of resource requirements a priority

    8. Given the functional dependencies X -> W; X -> Y; Y -> Z and Z -> PQ

    Which of the following does not hold good?

    (a) X-> Z (b)W -> Z (c) X -> WY (d)None of the above

    9. The amount of uncertainty in a system of symbol is called

    (a) Bandwidth (b) Entropy (c) Loss (d) Quantum

    10. What is the name of network architecture that was developed by IBM(a) SNA (b) DECNET (c) XNS (d) Novell

    11. Let R=(A,B,C,D,E,F) be a relation scheme with the following dependencies :

    C->F, E->A, EC->D, A->B

    Which of the following is a key for R?

    (a) CD (b) EC (c) AE (d) AC

    12.Which one is not part of the web services?

    (a) XML (b) HTTP (c) DHCP (d) SOAP

    13. How many digits of the DNIC (Data Network Identification Network) identify the

    country?

    (a) First two (b) first three (c) first four (d) first five

    14. In a broad sense, railway track is an example of

  • 7/29/2019 TechWringer Prelims Set 1

    3/4

    (a) simplex (b)half-duplex (c)full-duplex (d)all of the above

    15. The metadata is created by the

    (a) DML compiler (b) DML pre-processor

    (c) DDL interpreter (d) Query interpreter

    16.What function in VBScript can be used to determine whether an object exits?

    (a) IsObject(objectname) (b) Object(nameofobject)

    (c) IsNull(objectlocation) (d) None of the above

    17.Error detection at the data link level is achieved by?

    (a) bit stuffing (b)cyclic redundancy codes

    (c).Hamming codes (d)equalization

    18.The five items: A, B, C, D and E are pushed in a stack, one after the other starting from A.The stack is popped four times and each element is inserted in a queue. Then two elements

    are deleted from the queue and pushed back on the stack. Now one item is popped from the

    stack. The popped item is

    (a) B (b) C (c) D (d) E

    19. In a binary max heap containing n numbers, the smallest element can be found

    in time

    (a) O (n) (b) O (logn) (c) O (loglogn) (d) O (1)

    20. What is the file extension for a Web service?(a).asm (b).wss (c).axs (d).dws

    21.What is the expansion of WCF?

    (a)Web Configuration File (b)Windows Communication Foundation

    (c)Web Control Features (d)None of the above

    22. What is the output of

    printf(hello world+printf(world));

    23. A process executes the following code

    for(i=0; i

  • 7/29/2019 TechWringer Prelims Set 1

    4/4

    (c) Database dependencies (d) none

    25. How many 3-to-8 line decoders with an enable input are needed to construct a 6-to-64 line

    decoder without using any other logic gates ?

    (a) 7 (b) 8 (c) 9 (d) 10

    26.*In a paged memory, the page hit ratio is 0.35. The time required to access a page in

    secondary memory is equal to 100 ns. The time required to access a page in primary memory

    is 10 ns. The average time required to access a page is

    (a) 3.0 ns (b) 68.0 ns (c) 68.5 ns (d)78.5 ns

    27. The decimal equivalent of the hexadecimal number E5 is ________

    28.*In a token ring network the transmission speed is 107 bps and the propagation speed is 200

    meters/s . The 1 bit delay in this network is equivalent to how many meters of cable?(a) 500 (b) 200 (c) 20 (d) 50

    29.*Consider the schema R=(S, T, U , V) and the dependencies S->T, T-> U, U-> V and V-> S .

    Let R= (R1 and R2) be a decomposition such that R1R2= . The decomposition is

    (a) not in 2NF (b) in 2NF but not in 3NF

    (c) in 3NF but not in 2NF (d) in both 2NF and 3NF

    30.*Consider the following c function:

    int f(int n){

    static int r=0;if(n3) {

    r=n;

    return f(n-2) +2;

    }

    return f(n-1) + r;

    }

    What is the value of f(5)

    (a) 5 (b) 7 (c) 9 (d) 18