What keyword in class specification helps to hide data:
(A) Public (B) Private
(C) Static (D) Void
Answer: B
What is the output of the following ‘C’ program?
main()
{printf(“%x”,-1>>4);}
(A) ffff (B) 0fff
(C) 0000 (D) fff0
Answer: A
Runtime polymorphism can be achieved by:
(A) Accessing virtual function through the pointer of the base class
(B) Accessing virtual function through the object
(C) The derived class
(D) None of these
Answer: A
2’s complement of -100 is:
(A) 00011100 (B) 10011101
(C) 10011100 (D) 11100100
Answer: C
Which of the following expression remove hazard form: xy+zx’ ?
(A) xy+zx’ (B) xy+zx’
(C) xy+zx’+yz (D) xy+zx’+wz
Answer: C
How many 1’s are present in the binary representation of 15x256+5x16+3:
(A) 8 (B) 9
(C) 10 (D) 11
Answer: A
The equivalent post fix express for d/(e+f) + b*c is:
(A) defbc/++ (B) def+/bc+*
(C) def+/bc*+ (D) None of these
Answer: C
Which algorithm has same average, worst case and best case time?
(A) Binary search (B) Maximum of n numbers
(C) Quick sort (D) Fibonacci search
Answer: B
Application of data structure in queue is:
(A) Level wise printing of tree
(B) Implementation of priority queues
(C) Function call implementation
(D) Depth first search in a graph
Answer: B
In case of Bus/Tree topology signal balancing issue is overcome by:
(A) Strong Transmitter (B) Polling
(C) Segmentation (D) Modulation
Answer: C
Which of the following techniques are used to control data flow?
1. Windowing 2. Routing 3. RPCs 4. Buffering
(A) 1, 4 (B) 2, 3, 4
(C) 1, 3, 4 (D) 1, 2, 3, 4
Answer: A
TDM is ................
(A) A primary/secondary type protocol
(B) A peer/peer protocol
(C) A Non-priority peer/peer protocol
(D) A priority type protocol
Answer: C
What services does the Internet Layer provide?
1. Quality of service 2. Routing
3. Addressing 4. Connection-oriented deliveryFraming bits
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5
Answer: A
Which of the following protocols is used to prevent looping?
(A) OSPF (B) Spanning tree
(C) SRB (D) Fragment free switching
Answer: B
The parsing technique that avoids back tracking is:
(A) Top-down parsing
(B) Recursive-descent parsing
(C) Predictive
(D) Syntax tree
Answer: C
A Top-down Parse generates:
(A) Right-most derivation
(B) Right-most derivation in reverse
(C) Left-most derivation
(D) Left-most derivation in reverse
Answer: C
In an absolute loading scheme, which loader function is accomplished by programmer?
(A) Allocation (B) Linking
(C) Reallocation (D) Both (A) and (B)
Answer: D
Symbol table can be used for:
(A) Checking type compatibility
(B) Suppressing duplication of error message
(C) Storage allocation
(D) All of these above
Answer: D
(A) Public (B) Private
(C) Static (D) Void
Answer: B
What is the output of the following ‘C’ program?
main()
{printf(“%x”,-1>>4);}
(A) ffff (B) 0fff
(C) 0000 (D) fff0
Answer: A
Runtime polymorphism can be achieved by:
(A) Accessing virtual function through the pointer of the base class
(B) Accessing virtual function through the object
(C) The derived class
(D) None of these
Answer: A
2’s complement of -100 is:
(A) 00011100 (B) 10011101
(C) 10011100 (D) 11100100
Answer: C
Which of the following expression remove hazard form: xy+zx’ ?
(A) xy+zx’ (B) xy+zx’
(C) xy+zx’+yz (D) xy+zx’+wz
Answer: C
How many 1’s are present in the binary representation of 15x256+5x16+3:
(A) 8 (B) 9
(C) 10 (D) 11
Answer: A
The equivalent post fix express for d/(e+f) + b*c is:
(A) defbc/++ (B) def+/bc+*
(C) def+/bc*+ (D) None of these
Answer: C
Which algorithm has same average, worst case and best case time?
(A) Binary search (B) Maximum of n numbers
(C) Quick sort (D) Fibonacci search
Answer: B
Application of data structure in queue is:
(A) Level wise printing of tree
(B) Implementation of priority queues
(C) Function call implementation
(D) Depth first search in a graph
Answer: B
In case of Bus/Tree topology signal balancing issue is overcome by:
(A) Strong Transmitter (B) Polling
(C) Segmentation (D) Modulation
Answer: C
Which of the following techniques are used to control data flow?
1. Windowing 2. Routing 3. RPCs 4. Buffering
(A) 1, 4 (B) 2, 3, 4
(C) 1, 3, 4 (D) 1, 2, 3, 4
Answer: A
TDM is ................
(A) A primary/secondary type protocol
(B) A peer/peer protocol
(C) A Non-priority peer/peer protocol
(D) A priority type protocol
Answer: C
What services does the Internet Layer provide?
1. Quality of service 2. Routing
3. Addressing 4. Connection-oriented deliveryFraming bits
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5
Answer: A
Which of the following protocols is used to prevent looping?
(A) OSPF (B) Spanning tree
(C) SRB (D) Fragment free switching
Answer: B
The parsing technique that avoids back tracking is:
(A) Top-down parsing
(B) Recursive-descent parsing
(C) Predictive
(D) Syntax tree
Answer: C
A Top-down Parse generates:
(A) Right-most derivation
(B) Right-most derivation in reverse
(C) Left-most derivation
(D) Left-most derivation in reverse
Answer: C
In an absolute loading scheme, which loader function is accomplished by programmer?
(A) Allocation (B) Linking
(C) Reallocation (D) Both (A) and (B)
Answer: D
Symbol table can be used for:
(A) Checking type compatibility
(B) Suppressing duplication of error message
(C) Storage allocation
(D) All of these above
Answer: D
0 comments:
Post a Comment