Explanation :
speaks about itself
Correct Answered :
Wrong Answered :
1. Which of the phrases given below should replace the phrase printed in bold type in the sentence "I need not offer any explanation regarding this incident my behavior is speaking itself ." would make it grammatically correct?
A
will speak to itself
B
speaks for itself
C
has been speaking
D
speaks about itself
speaks about itself
Correct Answered :
Wrong Answered :
2. The Antonym of the word EXODUS is
A
Influx
B
Home coming 30
C
Return
D
Restoration
Exodus means a mass departure of people. So, the opposite of the word will be influx. Influx means arrival or entry of people in large numbers.
Correct Answered :
Wrong Answered :
3. Out of four alternatives, choose the one which can be substituted for the given sentence.
A style in which a writer makes a display of his knowledge.
A
Pendantic
B
Verbose
C
Pompous
D
Ornate
Pendantic
Correct Answered :
Wrong Answered :
4. Select the pair which has the same relationship as PAIN : SEDATIVE
A
Comfort : Stimulant
B
Grief : Consolation
C
Trance : Narcotic
D
Ache : Extraction
Grief : Consolation
Correct Answered :
Wrong Answered :
5. A, B and C can complete a piece of work in 14, 6 and 12 days respectively. Working together, they will complete the work in.
A
19/9 days
B
27 days
C
28/9 days
D
25/8 days
28/9 days
Correct Answered :
Wrong Answered :
6. The ratio present age of father to that of son is 7 : 2. After 10 years their ages will be in the ratio of 9 : 4. The present age of the father is :
A
20 years
B
25 years
C
30 years
D
35 years
35 years
Correct Answered :
Wrong Answered :
7. A 1200 m long train crosses a tree in 120 sec, how much time will it take to pass a platform 700 m long?
A
50 sec
B
80 sec
C
190 sec
D
240 sec
190 sec
Correct Answered :
Wrong Answered :
8. If MIND becomes KGLB and ARGUE becomes YPESC, then what will DIAGRAM be in that code?
A
BGYEPYK
B
BGYPYEK
C
GLPEYKB
D
LKBGYPK
BGYEPYK
Correct Answered :
Wrong Answered :
9. If loga/b + logb/a=log(a+b), then
A
a + b = 1
B
a - b = 1
C
a = b
D
a2 + b2 = 1
a + b = 1
Correct Answered :
Wrong Answered :
10. If one root of the quadratic equation 2x² + kx - 6 = 0 is 2, then value of k is:
A
1
B
-1
C
2
D
-1
Given: One root of 2x2 + kx – 6 = 0 is 2
Then At x = 2, the equation will be satisfied.
2 (2)2 + k × 2 – 6 = 0
8 + 2 k – 6 = 0
2 k + 2 = 0
K = –1
So now the equation becomes 2x2 + 2x – 6 = 0
For this equation, Product of the roots = (–6/2)
Product of roots = – 3
Let a and b be the roots of the equation and it is given that a = 2
2 × b = –3
B = –3/2
Hence the value of k = –1 and other root is –3/2.
Correct Answered :
Wrong Answered :
11. if a, b, c are in AP then:
A
b = a + c
B
2b = a + c
C
b2 = a + c
D
2b2 = a + c
Correct Answered :
Wrong Answered :
12. If repetition of the digits is allowed, then the number of even natural numbers having three digits is :
A
250
B
350
C
450
D
550
If repetition of the digits is allowed, then the number of even natural numbers having three digits is 450.
Correct Answered :
Wrong Answered :
13. Find the radius and center of a circle given by the equation 2x² + y² - 4x -6y - 12 = 0
A
Radius = 5, Center = (2, 3)
B
Radius = 5, Center = (3, 2)
C
Radius = 1, Center = (2, 3)
D
Radius = 1, Center = (3, 2)
Correct Answered :
Wrong Answered :
14. What is the degree of the differential equation
A
1
B
2
C
3
D
4
2
Correct Answered :
Wrong Answered :
15. The solution of the differential equation dy = (1 + y²)dx is
A
y = tanx + c
B
y = tan(x + c)
C
tan-1(y + c) = x
D
tan-1(y + c) = 2x
y = tan(x + c)
Correct Answered :
Wrong Answered :
16. When the sun`s altitude changes from 30° to 60° the length of the shadow of a tower decreases by 70m. What is the height of the tower?
A
35 m
B
140 m
C
60.6 m
D
20.2 m
When sun`s altitude changes from 30° to 60°, the length of the shadow of a tower decreases by 70 m.
∴ The height of the tower is 60.6 m.
Correct Answered :
Wrong Answered :
17. What will be the probability of getting odd numbers if a dice is thrown?
A
1/2
B
2
C
4/2
D
5/2
1/2
Correct Answered :
Wrong Answered :
18. A continuous variable has the distribution?
A
1/4
B
1/8
C
1/16
D
1/2
1/16
Correct Answered :
Wrong Answered :
19. Consider a Poisson distribution for the tossing of a biased coin. The mean for this distribution is µ. The standard deviation for this distribution is given by :
A
√μ
B
µ2
C
µ
D
1/µ
Correct Answered :
Wrong Answered :
20. If the distribution is negatively skewed, then the :
A
Mean is more than mode
B
Mean is less than mode
C
Median is at right to the mode
D
Mean is at right to Median
Correct Answered :
Wrong Answered :
21. Given y = 5e3x+ sinx, dydx is
A
5e³ˣ + cos x
B
15e³ˣ + cos x
C
15e³ˣ - cos x
D
5e³ˣ + sin x
y = 5e3x + sin(x)
First, to find the derivative, dydx of an exponential function, we use this general form:
aenx = a* dydx(nx)enx = a*nenx
dydx of sin(x) = cos(x)
Applying this to the question we have:
dydx = 5* dydx(3x)e3x + cos(x)
And,
dydx(3x) = 3
Therefore,
dydx = 15e3x + cos(x)
Correct Answered :
Wrong Answered :
22. Ratio of volume of a cone to the volume of a cylinder for same base radius and same height is ____.
A
3
B
1/3
C
2
D
1/2
1/3
Correct Answered :
Wrong Answered :
23. The basic architecture of a computer system was developed by
A
John Von Neumann
B
Charles Babbage
C
Blaise Pascal
D
Garden Moore
The von Neumann
architecture — also known as the von Neumann model or Princeton
architecture — is a computer architecture based on a 1945 description by
John von Neumann, and by others, in the First Draft of a Report on the EDVAC.
Correct Answered :
Wrong Answered :
24. Conversion of hexadecimal number (1D7F)16 to a decimal number is
A
755110
B
877110
C
555710
D
778110
= 1*163 + 13*162 + 7*161 + 15*160 = 4076 + 3328 + 112 + 15 = 7551
Correct Answered :
Wrong Answered :
25. How many bytes does 4 kilobytes represent?
A
1000
B
1024
C
4096
D
8196
Kilobytes (KB) | Bytes (B) decimal | Bytes (B) binary |
---|---|---|
4 KB | 4000 Bytes | 4096 Bytes |
5 KB | 5000 Bytes | 5120 Bytes |
6 KB | 6000 Bytes | 6144 Bytes |
7 KB | 7000 Bytes | 7168 Bytes |
Correct Answered :
Wrong Answered :
26. Which of the following address is generated by CPU?
A
Logical address
B
Physical address
C
Actual address
D
Simple address
Correct Answered :
Wrong Answered :
27. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register?
A
Absolute mode
B
Indirect mode
C
Immediate mode
D
Index mode
Base indexed mode : The effective address of the operand is generated by adding a constant value to the content of a register.
Correct Answered :
Wrong Answered :
28. Which of the following Boolean rules is correct?
A
A + 0 = 0
B
A + 1 = 1
C
A + A = A.A
D
A + A.B = A + B
A + A.B = A + B
Correct Answered :
Wrong Answered :
29. The performance of cache memory is frequently measured in terms of a quantity called
A
Miss ratio
B
Latency ratio
C
Read ratio
D
Hit ratio
The performance of cache memory is frequently measured in terms of a quantity called Hit ratio.
Correct Answered :
Wrong Answered :
30. In C++, which of the following operator cannot be overloaded?
A
^
B
==
C
.
D
!
Correct Answered :
Wrong Answered :
31. Which of the following is true about virtual functions in C++?
A
Virtual functions are functions that can be overridden in derived class with the same signature.
B
Virtual functions enable run-time polymorphism in a inheritance hierarchy.
C
If a function is virtual in the base class, the most-derived class implementation of the function is called according to the actual type of the object referred to, regardless of the declared type of the pointer or reference. In non-virtual functions, the functions are called according to the type of reference or pointer.
D
All of these
All of these
Correct Answered :
Wrong Answered :
32. How many types of access specifiers are provided in OPP (C++)?
A
1
B
2
C
3
D
4
Correct Answered :
Wrong Answered :
33. What is the base data type of a pointer variable by which the memory would be allocated to it?
A
Int
B
Do datatype
C
Depends upon the type of the variable to which it is pointing
D
Unsigned int
Unsigned int
Correct Answered :
Wrong Answered :
34. Snapshot of the data in the database at a given instant of time is called.
A
Database Schema
B
Database Instance
C
Database Snapshot
D
All of the above
Database Instance
Correct Answered :
Wrong Answered :
35. Which of the following data constraints would be used to specify that the value of cells in a column must be one of specific set of possible values?
A
A domain constraint
B
A range constraint
C
An intra relation constraint
D
An inter relation constraint
A domain constraint
Correct Answered :
Wrong Answered :
36. In Context of database, Let T1 and T2 be two concurrent transactions. Consider the following sequence of operations on data X :
T1 : R(X) T1 : W(X) T2 : R(X) T2 : W(X)
This is called ______Problem
A
Dirty Read
B
Lost update
C
Incorrect summary
D
Unrepeatable Read
Dirty Read
Correct Answered :
Wrong Answered :
37. Which of the following occurs when one transaction reads a changed record that has not been committed to the database?
A
Non repeatable read
B
Phantom read
C
Dirty read
D
Consistent read
Dirty Read
Correct Answered :
Wrong Answered :
38. Identify the data structure which allows deletion at both ends of the list but insertion at only one end?
A
Stack
B
Priority Queue
C
Output restricted queue
D
Input restricted queue
Input restricted queue
Correct Answered :
Wrong Answered :
39. Which of the following is not a linear data structure?
A
Stack
B
Graph
C
List
D
None of these
Graph
Correct Answered :
Wrong Answered :
40. Merge sort uses which of the following technique to implement sorting?
A
Backtracking
B
Greedy Algorithm
C
Divide and Conquer
D
Dynamic Programming
Divide and Conquer
Correct Answered :
Wrong Answered :
41. A complete binary tree with the property that the value at each node is at least as large as the values at its children is called
A
Binary Search Tree
B
Binary Tree
C
Completely Balanced Tree
D
Heap
In a Max. Binary Heap, the key value at each node is as least as large
as the values at its children. Similarly in Min Binary Heap, the key at
root must be minimum among all keys present in Binary Heap.
Correct Answered :
Wrong Answered :
42. To access the services of the operating system, the interface is provided by the ____.
A
Library
B
System calls
C
Assembly instructions
D
API
To access services of the Operating System an interface is provided by the System Calls.
Correct Answered :
Wrong Answered :
43. In a multi threaded environment ____.
A
Each thread is allocated with new memory from main memory
B
Main thread terminates after the termination of child threads
C
Every process can have only one thread
D
None of the above
Main thread terminates after the termination of child threads
Correct Answered :
Wrong Answered :
44. Switching the CPU to another Process requires to save state of the old process and loading new process state is called as ____.
A
Process Blocking
B
Context Switch
C
Time Sharing
D
None of above
Context Switch
Correct Answered :
Wrong Answered :
45. The operating system and the other processes are protected from being modified by an already running process because ____.
A
They are in different memory spaces.
B
They are in different logical addresses
C
They have a protection algorithm
D
Every address generated by the CPU is being checked against the relocation and limit registers.
Every address generated by the CPU is being checked against the relocation and limit registers.
Correct Answered :
Wrong Answered :
46. What is the worst case time complexity of a quick sort algorithm?
A
O(n)
B
O(nlogn)
C
O(n2)
D
O(logn)
O(n2)
Correct Answered :
Wrong Answered :
47. The following paradigm can be used to find the solution of the problem in the minimum time:
Given a set of non negative integers, and a value K, determine if there is a subset of the given set with sum equal to K?
A
Divide and Conquer
B
Dynamic Programming
C
Greedy Algorithm
D
Brand and Bound
“Subset sum
problem”: Given a set of non-negative integers, and a value sum,
determine if there is a subset of the given set with sum equal to given
sum(K). Dynamic Programming paradigm can be used to find the solution of the problem in minimum time.
Correct Answered :
Wrong Answered :
48. Which of the following is useful in traversing a given graph by breadth first search?
A
Set
B
List
C
Stack
D
Queue
BFS performs level-order traversal which can be fairly done using a queue.
Correct Answered :
Wrong Answered :
49. Best case time complexity of binary search algorithm is
A
O(N)
B
O(LOGN)
C
O(NLOGN)
D
O(N2)
The time complexity of the binary search algorithm is O(log n). The best-case time complexity would be O(1)
when the central index would directly match the desired value. Binary
search worst case differs from that. The worst-case scenario could be
the values at either extremity of the list or values not in the list.
Correct Answered :
Wrong Answered :
50. According to Chomsky classification, language of finite automata is :
A
Type 0
B
Type 1
C
Type 2
D
Type 3
Type 3 grammars are
generated by regular languages. These languages are exactly all those
languages that can be accepted by finite state automata. Type 3 is the
most restricted grammar.
Correct Answered :
Wrong Answered :
51. How many DFA`s exits with two states over input alphabet {0, 1}
A
16
B
26
C
32
D
64
Number of DFA’s = 2n * n(2*n).
Correct Answered :
Wrong Answered :
52. Which of the following statement is false?
A
Context free language is the subset of context sensitive language
B
Regular language is the subset of context sensitive language
C
Recursively enumerable language is the super set of regular language
D
Context sensitive language is a subset of context free language
Context sensitive language is a subset of context free language
Correct Answered :
Wrong Answered :
53. Which of the following can accept even palindrome over {a,b}
A
Push down Automata
B
Turing machine
C
NDFA
D
All of the mentioned
NDFA
Correct Answered :
Wrong Answered :
54. The required resources for communication between end systems are reserved for the duration of the session between end systems in _____ method.
A
Packet switching
B
Circuit switching
C
Line switching
D
Frequency switching
Correct Answered :
Wrong Answered :
55. The device bridge is used at ____ layer of OSI reference model.
A
Datalink
B
Network
C
Transport
D
Application
Bridge works at Data link layer.
Correct Answered :
Wrong Answered :
56. In ____, the chances of collision can be reduced if a station senses the medium before trying to use it.
A
MA
B
CSMA
C
FDMA
D
CDMA
CSMA
Correct Answered :
Wrong Answered :
57. Which of the following is not a function of network layer?
A
routing
B
inter networking
C
congestion control
D
error control
in the osi model, network layer is the third layer and it provides data
routing paths for network communications. error control is a function of
the data link layer and the transport layer.
Correct Answered :
Wrong Answered :