0% found this document useful (0 votes)
92 views9 pages

Cse Test 3

1) public class Add 2) { 3) public static void main(String[] args) 4) { 5) int a,b; 6) a =10; 7) b=20; 8) System.out.println("The Sum:"+(a+b)); 9) } 10) }

Uploaded by

Er Chandan Soni
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
92 views9 pages

Cse Test 3

1) public class Add 2) { 3) public static void main(String[] args) 4) { 5) int a,b; 6) a =10; 7) b=20; 8) System.out.println("The Sum:"+(a+b)); 9) } 10) }

Uploaded by

Er Chandan Soni
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 9

STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.

com
BRANCH: COMPUTER SCIENCE 8. In _______ information is recorded
TIME: 1 hour magnetically on platters.
MARKS: 100 a) magnetic disks
O/S:- b) electrical disks
c) assemblies
1. I/O hardware contains ____________ d) cylinders
a) Bus 9. The heads of the magnetic disk are
b) Controller attached to a _____ that moves all the
c) I/O port and its registers heads as a unit.
d) All of the mentioned a) spindle
2. The data-in register of I/O port is b) disk arm
____________ c) track
a) Read by host to get input d) none of the mentioned
b) Read by controller to get input 10. . The time taken to move the disk arm
c) Written by host to send output to the desired cylinder is called the
d) Written by host to start a command ____________
3. When hardware is accessed by reading a) positioning time
and writing to the specific memory b) random access time
locations, then it is called ____________ c) seek time
a) port-mapped I/O d) rotational latency
b) controller-mapped I/O 11. When the head damages the magnetic
c) bus-mapped I/O surface, it is known as _________
d) none of the mentioned a) disk crash
4. Device drivers are implemented to b) head crash
interface ____________ c) magnetic damage
a) character devices d) all of the mentioned
b) block devices 12. What is the host controller?
c) network devices a) controller built at the end of each
d) all of the mentioned disk
5. The device-status table contains b) controller at the computer end of the
____________ bus
a) each I/O device type c) all of the mentioned
b) each I/O device address d) none of the mentioned
c) each I/O device state 13. What is the disk bandwidth?
d) all of the mentioned a) the total number of bytes transferred
6. Which one of the following connects b) total time between the first request
high-speed high-bandwidth device to for service and the completion on the
memory subsystem and CPU. last transfer
a) Expansion bus c) the total number of bytes transferred
b) PCI bus divided by the total time between the
c) SCSI bus first request for service and the
d) None of the mentioned completion on the last transfer
7. A process is moved to wait queue when d) none of the mentioned
I/O request is made with ____________ 14. . Whenever a process needs I/O to or
a) non-blocking I/O from a disk it issues a ______________
b) blocking I/O a) system call to the CPU
c) asynchronous I/O b) system call to the operating system
d) synchronous I/O

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
c) a special procedure allocated
d) all of the mentioned d) None of the mentioned
22. In Distributed arbitration, the device
C.O.A:- requesting the BUS ______
15. To resolve the clash over the access of a) Asserts the Start arbitration signal
the system BUS we use ______ b) Sends an interrupt signal
a) Multiple BUS c) Sends an acknowledge signal
b) BUS arbitrator d) None of the mentioned
c) Priority access 23. If two devices A and B contesting for
d) None of the mentioned the BUS have ID’s 5 and 6 respectively,
16. The device which is allowed to initiate which device gets the BUS based on the
data transfers on the BUS at any time is Distributed arbitration.
called _____ a) Device A
a) BUS master b) Device B
b) Processor c) Insufficient information
c) BUS arbitrator d) None of the mentioned
d) Controller 24. The primary function of the BUS is
17. ______ BUS arbitration approach uses __________
the involvement of the processor. a) To connect the various devices to the
a) Centralised arbitration cpu
b) Distributed arbitration b) To provide a path for communication
c) Random arbitration between the processor and other
d) All of the mentioned devices
18. The Centralised BUS arbitration is c) To facilitate data transfer between
similar to ______ interrupt circuit. various devices
a) Priority d) All of the mentioned
b) Parallel 25. The device which starts data transfer is
c) Single called __________
d) Daisy chain a) Master
19. When the processor receives the b) Transactor
request from a device, it responds by c) Distributor
sending _____ d) Initiator
a) Acknowledge signal 26. The device which interacts with the
b) BUS grant signal initiator is __________
c) Response signal a) Slave
d) None of the mentioned b) Master
20. Once the BUS is granted to a device c) Responder
___________ d) Friend
a) It activates the BUS busy line 27. The delays caused in the switching of
b) Performs the required operation the timing signals is due to __________
c) Raises an interrupt a) Memory access time
d) All of the mentioned b) WMFC
21. The BUS busy line is used __________ c) Propagation delay
a) To indicate the processor is busy d) Processor delay
b) To indicate that the BUS master is 28. Which is fed into the BUS first by the
busy initiator?
c) To indicate the BUS is already a) Data
b) Address

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
c) Commands or controls b) DML
d) Address, Commands or controls c) Relational
d) DDL
DATA BASE MANAGEMENT SYSTEM:-
35. Updates that violate __________ are
29. Which one of the following provides the disallowed.
ability to query information from the a) Integrity constraints
database and to insert tuples into, b) Transaction control
delete tuples from, and modify tuples in c) Authorization
the database? d) DDL constraints
a) DML(Data Manipulation Langauge)
b) DDL(Data Definition Langauge) 36. SELECT * FROM employee WHERE dept
c) Query _name="Comp Sci";
d) Relational Schema In the SQL given above there is an error
. Identify the error.
30. SELECT * FROM employee a) Dept_name
What type of statement is this? b) Employee
a) DML c) “Comp Sci”
b) DDL d) From
c) View
37. ’_ _ _ ’ matches any string of ______ three
d) Integrity constraint
characters. ’_ _ _ %’ matches any string
31. The basic data type char(n) is a _____ of at ______ three characters.
length character string and varchar(n) a) Atleast, Exactly
is _____ length character. b) Exactly, Atleast
a) Fixed, equal c) Atleast, All
b) Equal, variable d) All, Exactly
c) Fixed, variable
38. Which of the following bitwise
d) Variable, equal
operations will you use to set a
32. An attribute A of datatype varchar(20) particular bit to 1?
has the value “Avi”. The attribute B of a) OR
datatype char(20) has value ”Reed”. b) AND
Here attribute A has ____ spaces and c) XOR
attribute B has ____ spaces. d) NOR
a) 3, 20
39. What data structure is used when
b) 20, 4
converting an infix notation to prefix
c) 20, 20
notation?
d) 3, 4
a) Stack
33. To remove a relation from an SQL b) Queue
database, we use the ______ command. c) B-Trees
a) Delete d) Linked-list
b) Purge
40. What would be the Prefix notation for
c) Remove
the given equation?
d) Drop table
A+(B*C)
34. INSERT INTO instructor VALUES (1021
1, ’Smith’, ’Biology’, 66000); a) +A*CB
What type of statement is this? b) *B+AC
a) Query

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
c) +A*BC from one of the following sources.
d) *A+CB a) A many-to-many relationship set
b) A multivalued attribute of an entity
41. Out of the following operators (^, *, +,
set
&, $), the one having highest priority is
c) A one-to-many relationship set
_________
d) Both A many-to-many relationship
a) +
set and A multivalued attribute of an
b) $
entity set
c) ^
48. Which of the following is valid reverse
d) &
polish expression?
42. What would be the Prefix notation for a) a op b
the given equation? b) op a b
c) a b op
A^B^C^D
d) both op a b and a b op
a) ^^^ABCD
C LANGUAGE:-
b) ^A^B^CD
c) ABCD^^^ 49. What will be the output of the following
d) AB^C^D C code?
43. What would be the Prefix notation for 1. #include <stdio.h>
the given equation? 2. void main()
3. {
(a+(b/c)*(d^e)-f)
4. float x = 0.1;
a) -+a*/^bcdef 5. if (x == 0.1)
b) -+a*/bc^def 6. printf("Sanfoundry");
c) -+a*b/c^def 7. else
d) -a+*/bc^def 8. printf("Advanced C Classes");
9. }
44. What would be the Prefix notation for
the given equation? a) Advanced C Classes
b) Sanfoundry
a|b&c c) Run time error
a) a|&bc d) Compile time error
b) &|abc 50. What will be the output of the following
c) |abc& C code? (Initial values: x= 7, y = 8)
d) ab&|c
1. #include <stdio.h>
45. What is the other name for a postfix 2. void main()
expression? 3. {
a) Normal polish Notation 4. float x;
b) Reverse polish Notation 5. int y;
c) Warsaw notation 6. printf("enter two numbers \n", x);
d) Infix notation 7. scanf("%f %f", &x, &y);
46. Reverse Polish Notation is the reverse 8. printf("%f, %d", x, y);
of a Polish Notation 9. }
a) True a) 7.000000, 7
b) False b) Run time error
47. If a multivalued dependency holds and c) 7.000000, junk
is not implied by the corresponding d) Varies
functional dependency, it usually arises

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
51. When double is converted to float, then 3. {
the value is? 4. int i = 0;
a) Truncated 5. int j = i++ + i;
b) Rounded 6. printf("%d\n", j);
c) Depends on the compiler 7. }
d) Depends on the standard a) 0
b) 1
52. What will be the output of the following
c) 2
C code?
d) Compile time error
1. #include <stdio.h>
56. What will be the output of the following
2. int main()
C code?
3. {
4. int i = 23; 1. #include <stdio.h>
5. char c = -23; 2. int main()
6. if (i < c) 3. {
7. printf("Yes\n"); 4. int i = 2;
8. else 5. int i = i++ + i;
9. printf("No\n"); 6. printf("%d\n", i);
10. } 7. }
a) Yes a) = operator is not a sequence point
b) No b) ++ operator may return value with or
c) Depends on the compiler without side effects
d) Depends on the standard c) it can be evaluated as (i++)+i or
i+(++i)
53. What will be the output of the following
d) = operator is a sequence point
C code?
57. What will be the output of the following
1. #include <stdio.h>
C code?
2. int main()
3. { 1. #include <stdio.h>
4. int a = 1, b = 1, c; 2. int main()
5. c = a++ + b; 3. {
6. printf("%d, %d", a, b); 4. int c = 2 ^ 3;
7. } 5. printf("%d\n", c);
a) a = 1, b = 1 6. }
b) a = 2, b = 1 a) 1
c) a = 1, b = 2 b) 8
d) a = 2, b = 2 c) 9
d) 0
54. For which of the following, “PI++;” code
will fail? 58. What will be the output of the following
a) #define PI 3.14 C code?
b) char *PI = “A”;
1. #include <stdio.h>
c) float PI = 3.14;
2. int main()
d) none of the Mentioned
3. {
55. What will be the output of the following 4. unsigned int a = 10;
C code? 5. a = ~a;
6. printf("%d\n", a);
1. #include <stdio.h>
7. }
2. int main()

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
a) -9 62. What will be the output of the following
b) -10 C code?
c) -11
1. #include <stdio.h>
d) 10
2. void main()
59. What will be the output of the following 3. {
C code? 4. int k = 8;
5. int x = 0 == 1 && k++;
1. #include <stdio.h>
6. printf("%d%d\n", x, k);
2. int main()
7. }
3. {
a) 0 9
4. int a = 2;
b) 0 8
5. if (a >> 1)
c) 1 8
6. printf("%d\n", a);
d) 1 9
7. }
a) 0 63. What will be the output of the following
b) 1 C code snippet?
c) 2
1. #include <stdio.h>
d) No Output
2. void main()
60. Comment on the output of the following 3. {
C code. 4. 1 < 2 ? return 1: return 2;
5. }
1. #include <stdio.h>
a) returns 1
2. int main()
b) returns 2
3. {
c) Varies
4. int i, n, a = 4;
d) Compile time error
5. scanf("%d", &n);
6. for (i = 0; i < n; i++) DE:-
7. a = a * 2;
64. A Karnaugh map (K-map) is an abstract
8. }
form of ____________ diagram organized
a) Logical Shift left
as a matrix of squares.
b) No output
a) Venn Diagram
c) Arithmetic Shift right
b) Cycle Diagram
d) Bitwise exclusive OR
c) Block diagram
61. What will be the output of the following d) Triangular Diagram
C code?
65. There are ______ cells in a 4-variable K-
1. #include <stdio.h> map.
2. void main() a) 12
3. { b) 16
4. int x = 4, y, z; c) 18
5. y = --x; d) 8
6. z = x--;
66. The K-map based Boolean reduction is
7. printf("%d%d%d", x, y, z);
based on the following Unifying
8. }
Theorem: A + A’ = 1.
a) 3 2 3
a) Impact
b) 2 2 3
b) Non Impact
c) 3 2 2
c) Force
d) 2 3 3
d) Complementarity

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
67. The prime implicant which has at least b) 1 half adders, 15 full adders
one element that is not present in any c) 16 half adders, 0 full adders
other implicant is known as ___________ d) 4 half adders, 12 full adders
a) Essential Prime Implicant
C++:-
b) Implicant
c) Complement 74. Which of the following is not a
d) Prime Complement fundamental type is not present in C
but present in C++?
68. Each group of adjacent Minterms
a) int
(group size in powers of twos)
b) float
corresponds to a possible product term
c) bool
of the given ___________
d) void
a) Function
b) Value 75. What is the size of a boolean variable in
c) Set C++?
d) Word a) 1 bit
b) 1 byte
69. Using the transformation method you
c) 4 bytes
can realize any POS realization of OR-
d) 2 bytes
AND with only.
a) XOR 76. Which of the following is C++
b) NAND equivalent for printf()?
c) AND a) cin
d) NOR b) cout
c) print
70. These logic gates are widely used in
d) input
_______________ design and therefore are
available in IC form. 77. Which of the following is an exit-
a) Sampling controlled loop?
b) Digital a) for
c) Analog b) while
d) Systems c) do-while
d) all of the mentioned
71. Entries known as _______________
mapping. 78. What is dynamic binding?
a) Diagonal a) The process of linking the actual
b) Straight code with a procedural call during run-
c) K time
d) Boolean b) The process of linking the actual
code with a procedural call during
72. The output of an EX-NOR gate is 1.
compile-time
Which input combination is correct?
c) The process of linking the actual code
a) A = 1, B = 0
with a procedural call at any-time
b) A = 0, B = 1
d) All of the mentioned
c) A = 0, B = 0
IWT:-
d) A = 0, B’ = 1
79. A Rendering engine is not responsible
73. The number of full and half adders are
for ________
required to add 16-bit number is
a) parsing the markup content (HTML)
__________
b) parsing style information (CSS, XSL,
a) 8 half adders, 8 full adders

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
and so on) 87. Blue Griffon is based on ________
c) generating a visual presentation of rendering engine.
the formatted content including media a) WebKit
files referenced b) Gecko
d) parsing style information (CSS only) c) Presto
d) Mecko
80. Firefox uses _________ rendering engine.
a) WebKit 88. Choose the inappropriate option with
b) Gecko respect to Blue Griffon 1.5.2. Blue
c) Trident Griffon _________
d) Presto a) includes tools for developing HTML5
pages
81. What is the use of “defer” attribute?
b) abstracts out many css3 effects
a) It defers rendering of html page
c) supports direct embedding of audio
b) It defers script execution until the
and video files
page has been rendered
d) supports swapping of videos of any
c) It defers rendering of css attributes
length
d) It is only for internal scripts
82. Which of the following is used to read a DCN:-
HTML page and render it? 89. The physical layer is concerned with
a) Web browser ___________
b) Web server a) bit-by-bit delivery
c) Web matrix p) process to process delivery
d) Web network c) application to application delivery
83. Who created the first web browser d) port to port delivery
a) Tim Berners Lee 90. Which transmission media provides the
b) Jacobs, Lan highest transmission speed in a
c) Marc Andeersen network?
d) Mozilla foundation a) coaxial cable
b) twisted pair cable
84. The open source software version of c) optical fiber
netscape is _________ d) electrical cable
a) Chrome 91. Bits can be sent over guided and
b) Mozilla unguided media as analog signal by
c) Internet Explorer ___________
d) Erwise a) digital modulation
85. Which of the following is not an IDE? b) amplitude modulation
a) BlueGriffon 1.5.2 c) frequency modulation
b) Aptana studio 3 d) phase modulation
c) TextEdit(Mac) 92. The physical layer provides __________
d) Dreamweaver a) mechanical specifications of
electrical connectors and cables
86. We can define ________ number of sites
b) electrical specification of
with one copy of dreamweaver
transmission line signal level
installed on our computer.
c) specification for IR over optical fiber
a) 990
d) all of the mentioned
b) 10
93. The physical layer is responsible for
c) only 1
__________
d) unlimited
a) line coding
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
b) channel coding b) cyclic redundancy check
c) modulation c) fletcher’s checksum
d) all of the mentioned d) parity check
94. The physical layer translates logical
communication requests from the ______
into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
95. Wireless transmission of signals can be
done via ___________
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
96. The data link layer takes the packets
from _________ and encapsulates them
into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
97. Header of a frame generally contains
______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
98. When 2 or more bits in a data unit has
been changed during the transmission,
the error is called ____________
a) random error
b) burst error
c) inverted error
d) double error
99. Which of the following is a data link
protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
100. The technique of temporarily
delaying outgoing acknowledgements
so that they can be hooked onto the
next outgoing data frame is called
____________
a) piggybacking

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527

You might also like