101. Which of the following is used to define the members of a class externally in C++?
(A) :
(B) : :
(C) #
(D) More than one of the above
(E) None of the above
102. Which concept of C++ is used to reuse the written code?
(A) Polymorphism
(B) Inheritance
(C) Encapsulation
(D) More than one of the above
(E) None of the above
103. What will be the output of the following program fragment?
(A) 30,10
(B) 30,20
(C) 20,30
(D) More than one of the above
(E) None of the above
104. Choose the correct statement about inline function in C++.
(A) It speeds up the execution.
(B) It slows down the execution.
(C) It decreases the code size.
(D) More than one of the above
(E) None of the above
105. What will be the output of the following?
(A) FIRST 52 SECOND
(B) FIRST 20 SECOND
(C) SECOND 25 FIRST
(D) More than one of the above
(E) None of the above
106. cout in C++ stands for
(A) class output
(B) character output
(C) common output
(D) More than one of the above
(E) None of the above
107. Group of instructions that directs a computer is called
(A) memory
(B) storage
(C) program
(D) More than one of the above
(E) None of the above
108. A computer program consists of
(A) system flowchart
(B) program flowchart
(C) algorithms written in computer language
(D) More than one of the above
(E) None of the above
109. The topology with highest reliability is
(A) star
(B) ring
(C) mesh
(D) More than one of the above
(E) None of the above
110. End-to-end connectivity is provided from host-to-host in
(A) network layer
(B) transport layer
(C) session layer
(D) More than one of the above
(E) None of the above
111. The _____ measures the number of lost or garbled messages as a fraction of the total sent in the sampling period.
(A) residual error rate
(B) transfer failure probability
(C) connection release failure probability
(D) More than one of the above
(E) None of the above
112. A high-speed communication equipment typically would not be needed for
(A) e-mail
(B) transferring large volume of data
(C) supporting communication between nodes in a LAN
(D) More than one of the above (
- E) None of the above
113. A _____ topology uses a single connection to connect all devices together.
(A) bus
(B) star
(C) ring
(D) More than one of the above
(E) None of the above
114. A _____ is used to connect networking devices that are in a very close geographic area such as a floor of a building.
(A) WAN
(B) LAN
(C) MAN
(D) More than one of the above
(E) None of the above
115. In computer network, what is the size of IP address in IPv4?
(A) 8 bits
(B) 16 bits
(C) 32 bits
(D) More than one of the above
(E) None of the above
116. What is the size of MAC address in computer network?
(A) 32 bits
(B) 16 bits
(C) 48 bits
(D) More than one of the above
(E) None of the above
117. What is the name given to the act of gaining illegal entry to computer files through remote terminals or microcomputers?
(A) Hacking
(B) Decoding
(C) Beating the system
(D) More than one of the above
(E) None of the above
118. A computer virus is a software program which has the essential ability to
(A) damage data
(B) damage program
(C) clone itself
(D) More than one of the above
(E) None of the above
119. Copying computer program/ software without the permission of its authors is called
(A) larceny
(B) software piracy
(C) highway robbery
(D) More than one of the above
- E) None of the above
120. A hard disk becomes totally inaccessible when a computer virus corrupts
(A) partition table
(B) file allocation table
(C) root directory
(D) More than one of the above
(E) None of the above
121. An attribute of one table matching the primary key of another table is called as
(A) foreign key
(B) secondary key
(C) candidate key
(D) More than one of the above
(E) None of the above
- If every non-key attribute is fully dependent on the primary key, then the relation will be in
(A) First Normal Form (1NF)
(B) Second Normal Form (2NF)
(C) Third Normal Form (3NF)
(D) More than one of the above
(E) None of the above
123. In relational database, the data type of values in each column of a table is called
(A) attribute
(B) domain
(C) relation
(D) More than one of the above
(E) None of the above
- In relational database, the number of attributes of a relation is called the _____ of relation.
(A) domain
(B) degree
(C) cardinality
(D) More than one of the above
(E) None of the above
125. Which of the following SQL commands is used to change the attribute values of one or more rows in a table?
(A) Update
(B) Insert
(C) Alter
(D) More than one of the above
(E) None of the above
126. To retrieve information from a database, which of the following SQL commands is used?
(A) Display
(B) Show
(C) Select
(D) More than one of the above
(E) None of the above
127. Which of the following SQL commands is used to modify the structure of a table?
(A) Alter
(B) Modify
(C) Update
(D) More than one of the above
(E) None of the above
128. Which of the following SQL keywords is used to display data from a table based on certain pattern?
(A) IN
(B) LIKE
(C) BETWEEN
(D) More than one of the above
(E) None of the above
129. Degree and cardinality of a relation in relational database are 4 and 3 respectively. If 3 attributes and 4 tuples are added to the relation, what will be its new cardinality and degree?
(A) 7, 6
(B) 7, 7
(C) 8, 6
(D) More than one of the above
(E) None of the above
130. Which SQL command is used to remove a table from a database?
(A) DELETE
(B) DROP
(C) ERASE
(D) More than one of the above
(E) None of the above
131. The register that contains the address of the next instruction to be executed is called
(A) program counter
(B) instruction register
(C) accumulator
(D) More than one of the above
(E) None of the above
132. The register that contains the instruction that is being executed is called
(A) accumulator
(B) program counter
(C) instruction register
(D) More than one of the above
(E) None of the above
133. The register which holds the address of location of memory to and from which data are to be transferred is known as
(A) index register
(B) memory address register
(C) memory buffer register
(D) More than one of the above
(E) None of the above
134. A storage device used to compensate the difference in flow of data is known as
(A) main memory
(B) auxiliary memory
(C) buffer
(D) More than one of the above
(E) None of the above
135. Memory in which any location can be reached in a fixed amount of time after specifying its address is called
(A) Sequential Access Memory
(B) Random Access Memory
(C) Secondary Memory
(D) More than one of the above
(E) None of the above
136. If then the values of X and Y are
(A) 4, 3
(B) 3, 3
(C) 4, 4
(D) More than one of the above
(E) None of the above
- The range of the numbers that can be represented in 8-bit using 2’s complement representation is
(A) –128 to +128
(B) –127 to +127
(C) –128 to +127
(D) More than one of the above
(E) None of the above
138. If, then the values of X and Y are
(A) 5, 1
(B) 5, 7
(C) 3, 1
(D) More than one of the above
(E) None of the above
139. Which of the following 4-bit numbers equals its 2’s complement?
(A) 1010
(B) 0101
(C) 1000
(D) More than one of the above
(E) None of the above
140. The number of 1’s in the binary representation of the value of the decimal expression of
is
(A) 15
(B) 9
(C) 12
(D) More than one of the above
(E) None of the above
141. The Boolean expression x+ x’ y equals
(A) x+ y
(B) x+ xy
(C) y+ yx
(D) More than one of the above
(E) None of the above
142. The Boolean expression AB+ AB’+ A’C+AC is independent of Boolean variable
(A) A
(B) B
(C) C
(D) More than one of the above
(E) None of the above
143. The Boolean expression A+ BC equals
(A) (A’+B)(A’+C)
(B) (A+B ) (A’+C)
(C) (A+B ) (A+C)
(D) More than one of the above
(E) None of the above
144. The Boolean expression will be equal to
(A) x
(B) y
(C) x+y
(D) More than one of the above
(E) None of the above
145. The Boolean expression is equal to
(A) x
(B) y
(C) xy
(D) More than one of the above
(E) None of the above
146. If x is a Boolean variable, then (((x’)‘)’)’ will be
(A) x’
(B) x
(C) x+x’
(D) More than one of the above
(E) None of the above
147. In two-valued Boolean algebra, the maximum number of Boolean functions for two variables will be
(A) 8
(B) 12
(C) 16
(D) More than one of the above
(E) None of the above
148. Simplified Boolean function of Boolean function F =A’C+A’B+ AB’C+BC is
(A) F =C+A’B
(B) F =A’B+B’C
(C) F =BC+A’B
(D) More than one of the above
(E) None of the above
149. Which of the following logic gates is called universal gate?
(A) AND
(B) OR
(C) NAND
(D) More than one of the above
(E) None of the above
150. The minimum number of NAND gates required to implement Boolean function f =x’y+xy’ is
(A) 3
(B) 4
(C) 6
(D) More than one of the above
(E) None of the above