Computer Science Quiz 4

What keyword in class specification helps to hide data:
(A) Public          (B) Private
(C) Static           (D) Void
Answer: B

What is the output of the following ‘C’ program?
main()
{printf(“%x”,-1>>4);}
(A) ffff                (B) 0fff
(C) 0000                        (D) fff0
Answer: A

Runtime polymorphism can be achieved by:
(A) Accessing virtual function through the pointer of the base class
(B) Accessing virtual function through the object
(C) The derived class
(D) None of these
Answer: A

2’s complement of -100 is:
(A) 00011100               (B) 10011101
(C) 10011100               (D) 11100100
Answer: C

Which of the following expression remove hazard form: xy+zx’ ?
(A) xy+zx’          (B) xy+zx’
(C) xy+zx’+yz    (D) xy+zx’+wz
Answer: C

How many 1’s are present in the binary representation of 15x256+5x16+3:
(A) 8       (B) 9
(C) 10     (D) 11
Answer: A

The equivalent post fix express for d/(e+f) + b*c is:
(A) defbc/++                  (B) def+/bc+*
(C) def+/bc*+                (D) None of these
Answer: C

 Which algorithm has same average, worst case and best case time?
(A) Binary search        (B) Maximum of n numbers
(C) Quick sort               (D) Fibonacci search
Answer: B

 Application of data structure in queue is:
(A) Level wise printing of tree
(B) Implementation of priority queues
(C) Function call implementation
(D) Depth first search in a graph
Answer: B

In case of Bus/Tree topology signal balancing issue is overcome by:
(A) Strong Transmitter                        (B) Polling
(C) Segmentation                    (D) Modulation
Answer: C

Which of the following techniques are used to control data flow?
1. Windowing   2. Routing     3. RPCs         4. Buffering
(A) 1, 4               (B) 2, 3, 4
(C) 1, 3, 4          (D) 1, 2, 3, 4
Answer: A

TDM is ................
(A) A primary/secondary type protocol
(B) A peer/peer protocol
(C) A Non-priority peer/peer protocol
(D) A priority type protocol
Answer: C

 What services does the Internet Layer provide?
1. Quality of service                2. Routing
3. Addressing                           4. Connection-oriented deliveryFraming bits
(A) 1, 2, 3                       (B) 2, 3, 4
(C) 1, 3, 4, 5                  (D) 2, 3, 4, 5
Answer: A

Which of the following protocols is used to prevent looping?
(A) OSPF                      (B) Spanning tree
(C) SRB                         (D) Fragment free switching
Answer: B

 The parsing technique that avoids back tracking is:
(A) Top-down parsing           
(B) Recursive-descent parsing
(C) Predictive                         
(D) Syntax tree
Answer: C

A Top-down Parse generates:
(A) Right-most derivation                 
(B) Right-most derivation in reverse
(C) Left-most derivation                    
(D) Left-most derivation in reverse
Answer: C

 In an absolute loading scheme, which loader function is accomplished by programmer?
(A) Allocation               (B) Linking
(C) Reallocation          (D) Both (A) and (B)
Answer: D

Symbol table can be used for:
(A) Checking type compatibility
(B) Suppressing duplication of error message
(C) Storage allocation
(D) All of these above
Answer: D
SHARE

About df

    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment