PMSCS in CSE JU Questions & Slove

Download as pdf or txt
Download as pdf or txt
You are on page 1of 80

PMSCS Admisssion Question Bank with Solution

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


JAHANGIRNAGAR UNIVERSITY, SAVAR, DHAKA

Published By স্বপ্নতরী

1st Editon: July 2017

Price: 210 Tk Only


বই সম্পর্কে যের্কোন তর্যের জনে যেোগোর্েোগ করুনঃ
Fb Official Page: Fb.com/questionbankNsolutionJU
Email:[email protected]
উ ৎসগ ে

স্বপ্নতরীর সকল সদসে বৃন্দ যক


Table Of Contents

Topic Name(Question Soution) Page No.


Part-1

PMSCS Admission Test Summer-2017 1-3


PMSCS Admission Test Spring-2017 3-4
PMSCS Admission Test Fall-2016 4-8
PMSCS Admission Test Fall-2015 9-13
PMSCS Admission Test Spring-2015 14-17
PMSCS Admission Test Summer-2014 18-25
PMSCS Admission Test Spring-2014 26-29
PMSCS Admission Test Fall-2013 30-33

Topic Name(Suggestions) Page No.

PMSCS SUGGESTION(Part-02) 34-80


PART-01

QUESTIONS AND SOULUTION


1

Department of Computer Science and Engineering


Jahangirnagar University
PMSCS Program
Admission Test Summer-2017

JU PMSCS 21.4.2017 3PM

MCQ-30(30*1) And written-20 (10*2)


Total 50 Mark Time 1Hr.

Written part:
Q-1.What is Unicode?
Ans: Unicode is an entirely new idea in setting up binary codes for text or script characters. Officially called
the Unicode Worldwide Character Standard, it is a system for "the interchange, processing, and display of
the written texts of the diverse languages of the modern world." It also supports many classical and historical
texts in a number of languages.
Currently, the Unicode standard contains 34,168 distinct coded characters derived from 24 supported
language scripts. These characters cover the principal written languages of the world.

Q-2.What’s wirless sensor network?


A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous
devices using sensors to monitor physical or environmental conditions. A WSN system incorporates a
gateway that provides wireless connectivity back to the wired world and distributed nodes
Q-3.IOT?
The Internet of things (IoT) is the inter-networking of physical devices, vehicles (also referred to as
"connected devices" and "smart devices"), buildings, and other items embedded with electronics, software,
sensors, actuators, and network connectivity which enable these objects to collect and exchange data.

Q-4.Data abstraction level?


Physical level: This is the lowest level of data abstraction. It describes how data is actually stored in
database. You can get the complex data structure details at this level. Logical level: This is the middle level
of 3-level data abstraction architecture.
Q-5.Summer season in BD describe 2 sentence?
Summer:
The first season in Bengali calendar is the summer. Baishakh and Jaistha consists summer.
Q-6.Standard deviation 1….10?

Let’s compute the standard deviation for the set of numbers from 1 to 10. That is, consider the following set
of values: {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}.

This set has a mean of 5.5, which we can determine either with the formula for arithmetic mean or the
balance concept, discussed above.

The deviations from the mean of each number and those deviations squared are:

Deviations and Squared Deviations


Value Deviation Squared Deviation
1 -4.5 20.25
2 -3.5 12.25
3 -2.5 6.25
4 -1.5 2.25
5 -0.5 0.25
6 0.5 0.25
7 1.5 2.25
8 2.5 6.25
9 3.5 12.25
10 4.5 20.25
Sum of Squares 82.50

After the squaring operation, we arrive at a figure for the sum of the squared deviations, which we can divide
by N to get the variance. Since N is 10, the variance is
In other words, 8.25 is the average of the squared deviations.

Finally, to get the standard deviation, we take the square root of the variance.

so the standard deviation is roughly 2.87. On the GMAT, we would not be expected to make that last
calculation on our noteboards; we might be asked to estimate it by noting that that the square root of 8.25 is
a little less than the square root of 9, which is 3.

Q-7.C programm swap .


Q-8.One math

Department of Computer Science and Engineering


Jahangirnagar University
PMSCS Program
Admission Test Spring-2017
Written Part:
1.prove the equation using truth table A+A'B=A+B
L.H.S=A+A’B
=A+AB+A’B
=A+B(A+A’)
=A+B=R.H.S

A B A+B A’B A+A’B


0 0 0 0 0
0 1 1 1 1
1 0 1 0 1
1 1 1 0 1
2.convert (1372)8 to hexadecimal
The given number is 13728

001 011 111 010 000


001 0= 2
11 11=F
1010=A

=2FA

3. what is the property of ACID?


Atomicity Consistency Isolation and Durability
4.What is MANNET
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices
connected wirelessly. Each device in a MANET is free to move independently in any direction, and will therefore
change its links to other devices frequently.
5.Write down the name of TCP/IP layer

1. Application Layer

2. Transport Layer

3. Internet Layer

4. Network Access Layer


6.Write down series of sin(x)

sin(x)=x−x3/3!+x5/5!−x7/7!.
7.what do u expect after complete PMSCS program.
TRY yrself
8.1213=6
1415=10
7314=32
6513=24
9.write difference between database scema and instanace
Department of Computer Science and Engineering
Jahangirnagar University
PMSCS Program
Admission Test Fall-2016

1. A card is drawn form a pack of 52 cards .The probability of getting a queen of club or a king of heart is:
a. 1/26 b. 1/52 c. 2/13 d. 1/13
2. Flash memory was developed taking the concept of :
a. EPROM b. EEPROM c. DRAM d. SRAM
3. DRAM refers to
a. Dynamic Random Access Memory b. Direct Random Access Memory
c. None d. Duel Random Access Memory
4. What type of device a Mouse is :
a. Output device b. Input device c. Posting device d. None
5. In C if a function does not explicity specify a return type.it is assumed to return an …….. by default.
a. char b. float c. Void d. integer
6. Datagram is related with ……………… service and virtual circuit is related to………………..service.
a. both are connectionless b. Connectionless and connection oriented.
c. connection oreiented and connectionless d. None
7. In C programming what will be a value of x?
Printf(“x=%d/n”,(number<0)?-1;(number===0?)0;1);
a. 1 b. -1 c. 0 d. None
8. Concurrent access to share data may result in data:
a. recovery b. inconsistency c. repositiory d. consistency
9. A constructor is called whwnever:
a. an object is used b. an object is declared c. a class is declared d. a class is used

10. The term MIPS refer to……….


a. millions input processor ses b. mega byte of instructions per second
c. multiple instruction per second d. millions of instructions per second
11. If the probability of sending successful data packetis 80% ,what will be the probability of succesfull delivery if a
packet is sent twice?
a. 64% b. 96% c. 100% d. 80%
12. Determine the derivative :d/de xex
a. exe2 b. ex c. x+ ex d. xex
13. An RGB image has 16 pixels. The storage requirement for the image will be
a. 16*24 bits b. 16*1 bits c. 16*8 bits d. None
14. if x=loge64 exits .what will be the value of base, y when the value of x is 6.
a. 2 b. 8 c. 10 d. c
15. The product of two numbers is 120 and the sum of their squares is 289. The sums of the number is:
a. 27 b. 150 c. 23 d. 20
16. The automatic execution of some SQL statements can be started automatically due to any change to a database
relation can be caused by
a. View b. None c. Assertion d. Trigger

17. Computers ability to use disk storage as memory is called


a. Cashe memory b. Associative memory c. Virtual memory d. CMOS memory
18. A girl introduced a boy as the son of the daughter the father of her uncle.the boy is girls….
a. Brother b. Uncle c. Son d. Nephew

19. 1 nibble = ……….. bits.


a. 2 b. 1 c. 4 d. 6
20. Logical design of database is called..
a. Database schema b. All of them c. Database Instance d. Database snapshot
21. The main purpose of a primary key in a database table is
a. updating b. deleting c. modifying d. searching
22. An information desk is intended …… operate …… 60 hours per week.
a. for,for b. to,for c. none d. with,for
23. Which of the following a valid declaration of an object of class Box in Java?
a. Box obj=new Box(); b. Box obj =new Box();
c. obj=new Box(); d. new=Box obj();
24. The time factor when determining the efficiency of algorithm is measured by
a. counting the kilobytes of algorithm b. counting microseconds
c. counting the number of key operations d. counting the number of statements
25. What will be the equation of the line that passe through the point (1, 2) and is parallel to 2x+3y=4?
a. 2x+3y=8 b. 3x+2y=4 c. 3x+2y=4 d. 2x+3y=0
26. Which provides the fastest access to large video files?
a. SCSI hard drives b. IDE hard drives c. EIDE hard drives d. Optical drives
27. Communication between a computer and a keyboard involves………….. transmission.
a. half duplex b. full duplex c. simplex d. automatic
28. Creating a new class using one or more existing classes is known as……..
a. inheritance b. overloading c. Encapsulation d. Polymorphism
29. Frames from one LAN can be transmitted to another LAN via the device.
a. modem b. repeater c. bridge d. router
30. Which number should be come next in this series: 10, 17, 26, 37, 7
a. 56 b. 46 c. 50 d. 52

Mcq part answer sheet:


1.a 11. 21.d
2.b 12.c 22.b
3.a 13. 23.b
4.b 14. 24.c
5.d 15.c 25.a
6.b 16.d 26.a
7. 17.b 27.c
8.b 18.a 28.a
9.b 19.c 29.c
10.d 20.a 30.c
Written part answer:
31. The Difference Between Passive & Active Attacks on a Computer?

Passive Attacks

A passive attack involves someone listening in on telecommunications exchanges or passively recording computer
activity. An example of the former is an attacker sniffing network traffic using a protocol analyzer or some other
packet capturing software. The attacker finds a way to plug into the network and begins capturing traffic for later
analysis. Other attackers rely on keyloggers, usually as a Trojan horse in a "free download," to record keystrokes such
as user IDs and passwords. The goal, regardless of the method, is just to listen and record the data passing through.
The passive attack itself is not harmful, per se, but the information gathered during the session could be extremely
damaging.
Active Attack

Active attacks on computers involve using information gathered during a passive attack, such as user IDs and
passwords, or an outright attack using technological “blunt instruments.” Such instruments include password crackers,
denial-of-service attacks, email phishing attacks, worms and other malware attacks. In an active attack, the attacker
is out to bring a website down, steal information or even destroy computing equipment. As network administrators
install defenses against existing attack tools, hackers develop more sophisticated tools and the game of technology
leapfrog continues.

32. A class contain 10 student with 6 men 4 women.

Find the number of way to select a 4 member comitee with 2 men and 2 women.

Ans: 2 men can be chosen from the 6 men in c(6,2) ways.and the 2 women can be chosen from the 4 women c(4,2)
ways.Thus by the product rule:

N=(6/2)(4/2)

=(6.5/2.1).(4.3/2.1)

=15(6)

=90

33.find the area of a circle

34.express the following data in normalized form -5,5,15,-1,20

35.Definition - What does Referential Integrity (RI) mean?

Referential integrity is a relational database concept, which states that table relationships must always be consistent.
In other words, any foreign key field must agree with the primary key that is referenced by the foreign key. Thus, any
primary key field changes must be applied to all foreign keys, or not at all. The same restriction also applies to foreign
keys in that any updates (but not necessarily deletions) must be propagated to the primary parent key.

36.let a and b the positive integers and suppose Q is defined recursively as flows Q(a,b)=0 if (a<b),Q(a,b)=Q(a-b,b)+1
if b<=a

Find Q(12,5)

37.find the number n of distinct permutations that can be formed all the letter of this word.UNUSUAL

N=7!/3!

=840 There are 7 letter of which 3 are U and no other letter is repeated.

38.Difference between Call by Value and Call by Reference?

Difference between call by value and call by reference


call by value call by reference
In call by value, a copy of actual arguments is passed to In call by reference, the location (address) of actual
formal arguments of the called function and any change arguments is passed to formal arguments of the called
made to the formal arguments in the called function have function. This means by accessing the addresses of actual
no effect on the values of actual arguments in the calling arguments we can alter them within from the called
function. function.
In call by reference, alteration to actual arguments is
In call by value, actual arguments will remain safe, they possible within from called function; therefore the code
cannot be modified accidentally. must handle arguments carefully else you get unexpected
results.
39. write eqivalent code of the following Statement in while loop statement?
a=1;

while (a&lt;=100) {

printf (&quot;%d\n&quot;, a * a);

a++;

40. write a general experssion for the following series 151,152,153,161,162,163,171…..

Ans: 172,173

Department of Computer Science and Engineering


Jahangirnagar University
PMSCS Program
Admission Test Fall-2015

1. Which of the following is not a valid variable name?


a. int 31
b. float _rate
c. double num ber
d. int variable_count
2. Which is the best way of protecting data from loss?
a. Make regular backup of the data
b. Delete all files
c. Lock your computer
d. Change your password
3. A= {2, 3, 4}, what is the cardinality of set A?
a. 24
b. 3
c. 2
d. 9
4. Which of the following TCP/IP protocol is used for transferring email from one machine to another?
a. FTP
b. SNMP
c. SMTP
d. RTP
5. Which one makes data access from database faster?
a. Traversing
b. Searching
c. Indexing
d. Partitioning
6.
7. The datalink layer takes the packet from----------------------- and encapsulates them into frame transmission.
a. Network layer
b. Physical layer
c. Transport layer
d. Application layer
8. A constructor is classed whenever
a. An object is declared
b. An object is used
c. A class is declared
d. A class is used
9. Memory sizes are now computed in Mega, Giga, Tera, ----------------?
Ans: Pita
10. Develop an integrative sentence from the following word “Like subjects what do you”
Ans: What subjects do you like?

11. If xy = 2 and xy2 = 8, what is the value of x?


a. ¾
b. ½
c. 1
d. 4
12. Which distribution following the matrix?
1 2 1

2 4 2
1 2 1
a. Laplacian
b. Isotropic
c. Position
13. This is an IP address 168.212.226.204 which class this address belong to?
a. Class A
b. Class B
c. Class C
d. Class D
14. Creating a new class using one or more existing classes is known as-----------------?
a. Polymorphism
b. Encapsulation
c. Overloading
d. Inheritance
15. A switch is most often used to connect
a. Individual Computer
b. Different LANs
c. Cable segments of a LAN
16. If n and k are positive integers and 8n=2k , What is the value of n/k?
a. ¼
b. ½
c. 1/3
d. 4
17. The scream of a hierarchical database represented using a ------------ diagram.
Ans: tree-structure
18. A trigger is ……………….
a. A special type of table
b. A special type of store procedure, executed when certain events occurs
c. A special type of view
19. Synonym of PROBITY
a. Probability
b. Honesty
c. Peaceful
d. Carelessness

20. Determine the maximum value the slope of the curve y = sin(x)

y = sin(x)
21. The decimal number -34 is expressed in 2’s complement form as:
a. 10000110
b. 11011001
c. 11011110
d. 11011100
22. What will be the next two numbers of the series?
2 5 6 11 9 17 12 23 , --, --
Ans : 15, 29
23. What is big O?
Ans: Big O notation is used in Computer Science to describe the performance or complexity of an
algorithm. Big O specifically describes the worst-case scenario, and can be used to describe the execution
time required or the space used (e.g. in memory or on disk) by an algorithm.
24. If a sweater sells for $48 after a 25% markdown, what was its original price?
Ans:
(100-25) = 75% = 75/100 = 0.75
0.75*x = 48
So, x = $64 dollars was the original price of the sweater.
25. Which of the following memory needs refreshing?
a. SRAM
b. DRAM
c. ROM
d. All of the avobe
26. The amount of time a program takes from when a request was submitted untill the first result is processed.
a. Waiting time
b. Response time
c. Turnaround time
d. Throughround time
27. What is the following is the subset of {b c d}?
a. { }
b. {n}
c. {1, 2, 3}
d. {a, b, c}
28. Digital modulation on bit string is sender--------------- layer of OSI
Ans: Physical

29. What percent of 50 is 0.15?


a. 0.3
b. 1.5
c. 0.075
d. None of the avobe
30. The QL WHERE clause:
a. Limits the column data that are returned.
b. Limits the row data are returned.
c. Both A and B are correct.
d. Neither A nor B are correct

Written Part
31. Distinguish between database schema and instance.

Database schema: The term "schema" refers to the organization of data as a blueprint of how the database is
constructed (divided into database tables in the case of relational databases). The formal definition of
a database schema is a set of formulas (sentences) called integrity constraints imposed on a database.

Database Instance: Introduction to the Oracle Database Instance. A database instance is a set of memory
structures that manage database files. A database is a set of physical files on disk created by the CREATE
DATABASE statement. The instance manages its associated data and serves the users of the database.
32. What is the main problem with MAC address based communication over the Internet instead of IP address?

Ans: There are [Media Access Control] MAC addresses available. The only organizational structure of them
is by manufacturer grouping, which is completely useless for routing purposes. Thus, you’d have to be able
to carry around all of the MAC addresses currently on the Internet at any one time. And maintain it.

Broadcast mechanisms are useless at that scale, so now your routing protocols have to carry trillions of
addresses, all of which are under continual flux.

IP addresses are assigned topologically (or should be, if politics didn’t get in the way… grrr…). By assigning
a host an address based on its topological attachment, we can only carry around an abstraction of the topology
in routing protocols.

33. What is SQL? Classify SQL statement in three categories.


SQL: SQL stands for Structured Query Language. SQL is used to communicate with a database.
According to ANSI (American National Standards Institute), it is the standard language for relational database
management systems.

Classify SQL statement in three categories:

Data Definition Language (DDL) statements are used to define the database structure or schema. Some
examples:

o CREATE - to create objects in the database


o ALTER - alters the structure of the database
o DROP - delete objects from the database

Data Manipulation Language (DML) statements are used for managing data within schema objects. Some
examples:

o SELECT - retrieve data from the a database


o INSERT - insert data into a table
o UPDATE - updates existing data within a table
o DELETE - deletes all records from a table, the space for the records remain

Data Control Language (DCL) statements. Some examples:

o GRANT - gives user's access privileges to database


o REVOKE - withdraw access privileges given with the GRANT command

34. What is the minimum number of students in a class to be sure that three of them are born in the same month?

Ans: The solution uses a concept known as the Pigeonhole principle. The idea is that if you n items
and m possible containers. If n > m, then at least one container must have two items in it.

So for your question... there are twelve months, so in order to guarantee you have three students in a "month"
container. You need something greater than twelve - the minimum of that would be thirteen.
35. What is WiMAX? Write down the name of OSI model.

WiMAX: WiMAX is a wireless technology put forth by the WiMAX Forum that is one of the technologies
that is being used for 4G networks. It can be used in both point to point and the typical WAN type
configurations that are also used by 2G and 3G mobile network carriers. Its formal name is IEEE standard
802.16
Name of OSI model:
1. Physical Layer
2. Datalink Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
36. Define the Bandwidth and Latency.

Bandwidth: Bandwidth is also defined as the amount of data that can be transmitted in a fixed amount of
time. For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second. For
analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).

Latency: Network latency is an expression of how much time it takes for a packet of data to get from one
designated point to another. In some environments (for example, AT&T), latency is measured by sending a
packet that is returned to the sender; the round-trip time is considered the latency.
37. Describe your expectation about PMSCS program of the CSE department in five sentence.

Ans: Try yourself

38. What is the output if you will compile and execute the following C code?

a. void main(){
int i=4,x;
x=++i + ++i + ++i;
printf("%d",x);
}

Output: 21
b. void main()
{
int a=10;
printf("%d %d %d",a,++a,a++);
}
Output: 12 12 10
39. What is the difference between WHILE and DO WHILE statements?
Ans: while won't execute even once if the condition returns a false; do-while will run at least once before the
condition switches. There are many differences between while loop and do-while loop. The difference is
that the do while loop executes at least once because it checks for the loop condition while exiting.
40. Suppose a=2, b=8. Find there arithmetic mean and geometric mean.
AM = (a+b)/2 = (2+8)/2 = 5

GM = √(ab) = √(2*8) = 4

Answers:
1.c 2.a 3.b 4.c 5.c 6 7.a 8.a 9.Pita 10. 11.b 12.c 13.b 14.d 15.a
16.c 17 18.b 19.b 20 21.c 22 23 24 25.a 26.b 27.a 28 29.c 30.b

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


Jahangirnagar University
EMCS Program
Admission Test Spring 2015
Signature of the
Invigilator
-------------------
-
Time : 1 Hour
Marks: 50

Applicant’s Name: ………………………………………………….. Roll:


…………………………

GROUP- A: Put a tick mark ( ) on the correct answer for multiple choice questions (MCQ)
and Fill in the
gaps where applicable. Each question carries 1 (one) point.
1. This is an IP address 168.212.226.204. On which class this
address belongs to?
(a) Class A (b) Class B (c) Class C (d) Class D
2. A={4,2,3}. What is the cardinality of set A?
(a) 24 (b) 3 (c) 2 (d) 9
3. Which one of the following is more near is meaning to the word
“outskirt”?
(a) Dress (b) Boundary (c) Sky (d) None of the above
4. Who preside the interface between a process and the OS?
(a) Kernel (b) System Calls (c) API (d) Processor
5. In TCP/IP network, the port address is
(a) 16-bit (b) 32-bit (c) 64-bit (d) 128-bit
6. A perfectionist is someone who feels _______ when he makes
even the most minuscule of errors.
(a) hostility (b) indifference (c) vexation (d) condemnation
7. What is the average of the five angles?
(a) 45
(b) 72
(c) 60
(d) 48
8. The perpendicular of the line 2x+3y=4 is
(a) 3x-2y=4 (b) 3x+2y=4 (c) 2x-3y=4 (d) 2x-3y=0
9. In case of fiber-optic cables, which transmission mode is used for
transmission data over long distance?
(a) Infrared (b) Radio (c) Single mode (d) Multimode
10. If you want your conditional to depend on two conditions both
being true, what is the proper notation to put between the two
Boolean statements?
(a) || (b) & (c) | (d) &&
11. The complexity of linear search algorithm is
(a) O(n) (b) O(logn) (c) O(n2) (d) O(nlogn)
12. Which of the following data structure is not linear data structure?
(a) Arrays (b) Linked lists
(b) Both of the above (d) None of the above
13. The function of LLC sub-layer of data link layer are:
(a) Framing and channel allocation
(b) Channel allocation and error control
(c) Error control and security
(d) Framing and error control
14. What is the type of the image?

013
184 246 12
12 75 90
I
(a) RGB (b) Gray Scale (c) Binary (d) NTSC
15. POST means
(a) Post Operating System Test (b) Power On Self Test
(c) Power On Self Timing (d) None
16. The intersection ( ) operation on two relations/tables returns
(a) All records of both tables
(b) Only common records
(c) Records from the left table/relation only
(d) None
17. IPV6 increases the size of the IP address from
(a) 64 to 132 bits (b) 32 to 128 bits
(c) 64 to 128 bits (d) None
18. We should keep pace _________ time and technology.
(a) in (b) out (c) with (d) none
19. The ___Cache___________ memory is placed between RAM and CPU.
20. Write the equation of a circle with radius r and center is at (0,0).
X2+y2=r2
21. Volatile is most nearly opposite in meaning to
(a) Flighty (b) Calm (c) Variegated (d) Rancid
22. What percent of 50 is 0.15?
(a) 0.3 (b) 1.5 (c) 0.03 (d) None of these
23. Which of the following memories needs refresh?
(a) SRAM (b) DRAM (c) ROM (d) All of above
Set: ADA
a0
3a0
3a0
3a0
2a0
Page 2 of 2
24. VLANs can __________.
(a) reduce network traffics
(b) provide an extra measure of security
(c) either (a) or (b)
(d) both (a) and (b)
25. The primary purpose of an operation system is:
(a) To make computers easier to use
(b) To make the most efficient use if the computer hardware
(c) To keep systems programmers employed
(d) To allow people to use the computer
26. Which of the following is not usually part of the responsibilities
of a database administrator?
(a) Approving structural changes to the database
(b) Designing data entry screens
(c) Ensuring that an adequate back-up regime is in place
(d) Issuing accounts to users
27. Which of the following is generally a benefit of normalization?
(a) Performance is improved
(b) Insertion anomalies are avoided
(c) Selection anomalies are avoided
(d) Number of tables is reduced
28. Frames from one LAN can be transmitted to another LAN via the
device –
(a) Router (b) Repeater (c) Modem (d) Bridge
29. Which of the following is not based on all the observation?
(a) Mode (b) Arithmetic Mean
(c) Geometric Mean (d) Harmonic Mean
30. Which of the numbers does not belong in the following series?
2-3-6-7-8-14-15-30
(a) 3 (b) 7 (c) 8 (d) 15

GROUP-B: Answer the following questions shortly.


Each question carries 2 (two) points.
31. What will be the output if you will compile and execute to the
following C code:
#include<stdio.h>
#define x 5+2
void main()
{
int i;
i=x*x*x;
printf(“%d”, i);
}
32. Write down the main phases of SDLC.

1. Planning

2. Systems Analysis and Requirements


3. Systems Design
4. Development
5. Integration and Testing
6. Implementation
7. Operations and Maintenance

33. What are the major components of a web search engine?

The three most important components of search engine optimization are:

1. Text component: Text and META-data


2. Link component: Links and navigation
3. Popularity component: Link Popularity and Click-Through Popularity

34. Write in brief 2-tier and 3-tier software system.


2-Tier Architecture. A web browser makes a request from a web server, which then processes the request and returns
the desired response, in this case, web pages. This approach improves scalability and divides the user interface from
the data layers. However, it does not divide application layers so they can be utilized separately. This makes them
difficult to update and not specialized. The entire application must be updated because layers aren’t separated.

3-Tier Architecture is most commonly used to build web applications. In this model, the browser acts like a client,
middleware or an application server contains the business logic, and database servers handle data functions. This
approach separates business logic from display and data.So the 3 layers commonly known as:Presentation
Layer(PL/UI),Business Logic Layer(BLL) & Data Access Layer(DAL).
35. Evaluate 0 2ln(e x )dx
36. How many users are possible from the subnet mask of
255.255.255.224 of class C IP.
30
37. Write down the SQL DDL definition to create a bank account
relation with a primary key declaration.
create table account
(account_number char(10),
branch_name char(15),
balance integer,
primary key (account_number),
foreign key (branch_name) references branch )
38. List the Four important layers of the OSI model in order.
Physical (Layer 1)
Data Link (Layer 2)
Network (Layer 3)
Transport (Layer 4)

39. Two sides of a triangular field are of the same length 13ft. Third
side is 10’ in length. Find the area of the field in square feet?
A=65 squre feet
40. If the letter in the word ‘TRIANGLE’ are rearranged at random,
find the probability that the first letter is an A.
Solution:
= 1 · 7 · 6 · 5 · 4 ·3 · 2 ·1 = 1
8 · 7 ·6 · 5 · 4 · 3 · 2 · 1 8

Department of Computer Science and Engineering


Jahangirnagar University
PMSCS Program
Admission Test Summer-2014
1. Multiple Choice Questions(MCQ) are evaluated by?

a. OCR

b. OMR

c. MICR

d. PLOTTER

2. Which part of the computer performs logical operations?

a. ROM

b. Control Unit

c. ALU

d. RAM

3. Which of the following methods is involved in data transmission between keyboards and CPU?

a. Simplex

b. Duplex
c. Half Duplex
d. None of them
4. Database is a---?
a. Collection of files
b. Collection of data
c. Collection of interrelated data
d. all of them

5. An entity is a/an--
a. Collection of items in an application
a. Inanimate object in an application
a. District real world item in an application
a. Data structure

6. A distribute database has which of the following advantage over a centralized database?
a. Software cost
b. Software complexity
c. Slow response
d. Modular growth
7. Which of the following describes E-commerce?
a. Buying products from each other
b. Buying services from each other
c. Selling services from each other
d. All of above

8. Rearrange the following letters to make a word and choose the category in which it fits MENMYSINGH.
a. City
b. fruit
c. Bird
d. vegetable
9. The speed of supercomputers genereally measured in….
Ans: GHZ

10. C Language is originally developed by?

a. Babbage b. Denis Ritche


c. Neumann d. Ada

11. Expand the term http..


Ans: Hypertext Transfer Protocol.

12. What wil be the next two numbers in the following series.
4,10,5,12,5,14, ……,……..(7,16)
13. If a<b then Q(a,b)=0 otherwise Q(a,b)=Q(a-b,b)+1 Find Q(12,5).
Ans:
14. HTML is simple and easy. Why is it not used more often in programming?
a. Its monelary expense outweighs its benefits.
b. It cannot handle the high volume and complexity of business transactions
c. Inherent deficiencless in the language cause
d. all of the above
15. XML makes it easier for.
a. Human to read web sites
b. Machine to read web sites
c. Both of the above
d. Neither of the above
16. Which One of the following are methods or means of safeguarding computer systems?
a. Physical traits of users b. Worms
c. password d. a and c
17. Which one is more faster on the basis of data access retrival time?
a. Flash memory b. Cache memory
c. blue ray device d. hard disk

18. What type of network topology is usually used?


a. Bus topology b. Star topology
c. ring topology d. hard disk

19. What output will you get from the following program?
Void main()
{
float t;

t=4/5+9%4;
print(%21,1)
}
a. 1.80 b. 1.00 c. 0.00 d. 3.05

20. Semantric error occurs due to--?


a. Incorrect syntax b. incorrect logic
c. wrong input d. none of them
21. Which of the following is used to answer a question about a database?
a. query b. table c. report d. form
22. The functions of a DNS server to convert ------ name to ---- --address?
a. Web address and DNS b. Email address and DNS
c. MAC address and IP d. DNS and IP
23. Active HUB is under -----layer but passive HUB is under -----layer OSI model?
a. Data link and network b. Physical and data link
c. physical and zero d. network and transport
24. Which one of the following is not a keyboard in C?
a. White b. name c. default d. sizeof

25. Metadata means?


a. Data that describes other data b. unused data
c. data used as metaphor d. frequently accessed data
26. A={2,3,4} What is the cardinally of set A?
a. 2 b. 3 c. 8 d. 24

27. Who introduced the stored program concept?


a. Dr.John Von Nermann b. Charles babbage
c. Blaise pascal d. Herman Hotlenth
28. Which of the following cables is widely used in LAN?
a. Twisted pair b. Co-axial
c. Fiber optic d. None
29. which of the following does the interface between a process and the operating system?
a. Procedure call b. system call
c. function optic d. None
30. Which of the following is not an application software?
a. Oracle b. BIOS c. Adobe d. Excel

GROUP B:
31.Short Note:Interpreter
In computer science, an interpreter is a computer program that directly executes, i.e. performs, instructions
written in a programming or scripting language, without previously compiling them into a machine language
program.
Compiler:
A compiler is a special program that processes statements written in a particular programming language and
turns them into machine language or "code" that a computer's processor uses. Typically, a programmer
writes language statements in a language such as Pascal or C one line at a time using an editor. The file that
is created contains what are called the source statements. The programmer then runs the appropriate
language compiler, specifying the name of the file that contains the source statements.
32.what are the function of operating system?
An operating system has three main functions: (1) manage the computer's resources, such as the central
processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide
services for applications software.
33.Write down the basic structure of SQL.
Basic structure of an SQL expression consists of select, from and where clauses.

 select clause lists attributes to be copied - corresponds to relational algebra project.


 from clause corresponds to Cartesian product - lists relations to be used.
 where clause corresponds to selection predicate in relational algebra.
34.Find the number m of the comitees of 5 with a given chairperson can be selected from 12 people

35.prove the equation A+A'B=A+B


L.H.S=A+A’B
=A+AB+A’B [A=A+AB]
=A+B(A+A’) [A=A+A’]
=A+B=R.H.S proved
36.rewrite the following C program Using do-while loop.

#include<stdio.h>
Main(){
Int count;
Count=0;
While(count<100){
Count++;
Printf(“hello world?\n”)
}
}

Ans:Using do-while:
#include<stdio.h>
Main(){
Int count=0;
Do{
Printf(“hello world?\n”)
Count++;
}
While(count<100)
}
37.what you will see if you run the following codes.
#include<stdio.h>
Main(){
Int first =15,second=10,sum;
Printf(“enter two integer:”);
Scanf(“%d %d,&first,&second”);
Printf(“The two number are : “%d %d\n”,first,second);
Sum=first+second;
Printf(“Their sum is: %d\n”,sum);
}
Output:25
38.Evaluate sinxcos2xdx
39.if y=ex logx find dy/dx at x=1
40.Draw a flowchart to find out the smallest number from three integers
1.d 6. 11. 16.b 21. Polish 26 31. 36.118&38 41. 46. A media
c notation, also . access control
known as address (MAC
prefix address) of a
notation, is a computer is a
symbolic unique
logic invented identifier
by Polish assigned to
mathematicia network
n Jan interfaces for
Lukasiewicz communication
in the 1920's. s at the data link
When using layer of a
Polish network
notation, the segment. MAC
instruction addresses are
(operation) used as a
precedes the network
data address for
(operands). In most IEEE 802
Polish network
notation, the technologies,
order (and including
only the Ethernet and
order) of Wi-Fi.
operations
and operands
determines
the result,
making
parentheses
unnecessary.
2.b 7.5 12. 17.c 22. 27 32.4 37.b 42. 47.b
c . 9
3.c 8.2 13. 18. 23. 28 33. 38. 43. 48.b
0 c .
4.a 9.c 14. 19. 24. 29 34.c 39. Light 44. 49. small
Founders: . Fidelity or Li-Fi electric
Mark is a Visible Light magnetic
Zuckerberg Communication
, Dustin s (VLC) system
Moskovitz, running wireless
communications
Andrew travelling at very
McCollum, high speeds. Li-
Eduardo Fi uses common
Saverin, household LED
Chris (light emitting
Hughes diodes)
lightbulbs to
enable data
transfer,
boasting speeds
of up to 224
gigabits per
second
5. 10.a 15. 20. 25. 30 35.a 40. 45. 50.b
megabits c . d
per
second,
or Mbps
Compute
r -
Memory
Units
Department of Computer Science and Engineering
Jahangirnagar University
PMSCS Program
Admission Test Fall-2013

1. Physical transmission medium lies in which layer of OSI reference model?

a. Physical

b. Network

c. session

d. None

2. Which technic is Preferable for huge data transfer between I/O and memory?

a. Memory Mapped I/O

b. Islolated I/O

c. Interrupt I/O

d. DMA

3. Arirthmatic and geometric mean of X and Y will be the same if

a. X=Y

b. X=√Y
c. Y=√X
d. X =Y/2
4. If the eccentricity of a circle eclipse and parabola are e1,e2,e3 then which one is true?
a. e1<e2< e3
b. e1> e2> e3
c. e2>e3>e1
d. e1>e3>e2

5. Determine the missing terms of the triangular matrix.


12 7 9 18 6
5 -2 -9 12
7 7 -21
0 ?28
?-28

6. Mr. karim earns X taka in 3 months and expends the same amount in 4 months .How much he saves in a year?
a. He has no savings
b. 3x taka
c. x taka
d. 4x taka
7. Fill in the blank:
Take ---off------ What I say.
a. off
b. up
c. on
d. Down

8. Differentiation of log (ex ) ……..


Ans: e^x
9. Elaboration of POST is……..

Ans: Power-On Self-Test

10. What will be mass of an object traveling with the speed of light?
Ans: To be massless is to travel at the speed of light; to travel slower than the speed of light is to have mass.
11. Expand the term http..
Ans: Hypertext Transfer Protocol.

12. An optical drive uses the ……. To read data.


a. Megnatize particle b. Electric particle
c. Reflected light d. Refracted light

13. If a<b then Q(a,b)=0 otherwise Q(a,b)=Q(a-b,b)+1 Find Q(12,5).


Ans:
14. Find the next two element of the following series: 0,1,2,3,5………
Ans: 8
15. Write the full form of WIMAX.
Ans: Worldwide Interoperability for Microwave Access.
16. In the fig shown, if CP=BP and x= 120° then y=?
a. 30° b. 45° c. 60° d. 90°
17. 3 x +3x +3x =?
a. 9x b. 3x +1
c. 93x d. 33x

18. If p and q are prime numbers, how many divisors does the product p3 q6 have?
a. 9 b. 28 c. 18 d. 12
19. What social networking website started out as a band promotion service?
a. facebook b. MySpace C. Linkedin d. Twitter
20. which of the following terms does not describe a type of flash drive ?
a. hard drive b. pen drive c. jump drive d. thumb drive
21. What type of RAM is must often used for syetem memory?
a. SRAM b. PRAM c. SDRAM d. VRAM
22. Where the mass of an object is zero?

Ans: An object with zero mass must move at the speed of light or it wouldn't exist at all.

23. Why a bullet is stopped after traversing a distance?

Ans: The Stopping Power of Hot Nuclear Matter


24. Who is titled as “IRON LADY” of Britain?
Ans: Margaret Thatcher

25. How the measurement of a monitor/TV is performed?


Ans: Measure a TV diagonally, from corner to corner, to get a measurement that manufacturers use. You might
think that a 32 inch (81 cm) TV is 32 inches wide, from bottom left to bottom right. Not so. A 32 inch TV is 32 inches
(81 cm) from bottom left to top right, or bottom right to top left.
26. Which one is a volatile memory?
a. RAM b. ROM c. Hard Disk d. CD
27. Which one of the following words in synonym of ‘’inhibit”
a. Protect b. Hinder c. Improvise d. Concur
28. If the side of a square is incrased by a 20% then area incrased by……
a. 40% b. 44% c. 80% d. None
29. If the perimeter of the outer circle is 2ΠR and inner circle is 2ΠR where R>r. Consider the center of two circles
is at the same point .What is the area of the intermediate region?
a. Π(R2 - r2) b. 2Πr(2R+r) c. 2Πr(R+r) d. Π(R2 + r2)

30. What is IT?


a. store, retrieve, represent and manipulate data b. store, retrieve and manipulate data
c. store, retrieve, transmit and manipulate data d. None
31. Which of the following is not an application software?
a. Oracle b. BIOS c. Adobe d. Excel
32. IPv4 address is represented in dotted decimal notion using…..
a. 132 bit b. 64 bit c. 32 bit d. None
33. Taking each of the digit 4,3,0,1 only once, how many numbers of four digit can be formed?
a. 18 b. 12 c. 48 d. 24
34. The average of a, b and c is 6; a-b=4 and ab=21. What is value of c?
a. 2 b. 7 c. 8 d. None

35. Hub falls in…physical layer and bridge falls in…Data link……layer.
36. MPEG is compressed form of……..file.
a. Audio b. Video c. Text file d. A and B
37. Fill up the “?” cell.

Ans: 41,66,109

38. Flops used to measure……….?


a. storage capacity b. processor speed c. data transfer rate d. bandwidth
39. The arithmetic mean of 3 ,6, 10, m and n is 9 then what is average of m+4 and n-2?
a. 9 b. 13 c. 14 d. 18
40. He is blind …………the system fault.
a. of b. to c. in d. from

MCQ Part Answer:


1.a 21.a 31.b
2.a 12.c *** 32.c
3.a *** *** 33.**
4.a 34.**
5.28,- **** 35.**
28
6.c 16.c 26.a 36.b
7.** 17.d 27.**
18.** 28.** 38.a
19.a 29.** 39.**
20.a 30.** 40.a

Written part answer:


41. Each pixel of grayscale image is represented by………bits and that of RGB case is …..bits.
Ans: 8,8
42. Samallest unit of information is …………
Ans: bit
43. Voice/video is a network is ……………............. traffic.
Ans: Real-time
44. Operating system provides interface between……. and…………..
Ans: programs and the computer hardware
45. GSM is …………genartion and UMTS-20000 is ………..genaration
Ans: second, second
46. Mugal emperor shahjahan is the son of…………….. and grandson of……………..
Ans: Emperor Jahangir, Akbar
47. The furthest plannet of solar system is……………………..
Ans: Sun
48. Einstein awarded the nobel prize for discovering…………………….
Ans: of the law of the photoelectric effect
49. LED converts…………..signal to ……………..signal.
Ans: turn, brake
50. The fundamental colors used in TV/monitor are ……………. , ……………. And …………………
Ans: Red,Green, Blue
PART-02
SUGGESTION FOR ADMISSION
What are the flags in 8086?
In 8086 Carry flag, Parity flag, Auxiliary carry flag, Zero flag, Overflow flag, Trace flag, Interrupt flag, Direction
flag, and Sign flag.
What is SIM and RIM instructions?
SIM is Set Interrupt Mask. Used to mask the hardware interrupts.
RIM is Read Interrupt Mask. Used to check whether the interrupt is Masked or not.
What is the difference between 8086 and 8088?
The BIU in 8088 is 8-bit data bus & 16- bit in 8086.Instruction queue is 4 byte long in 8088and 6 byte in 8086.
Give example for Non-Maskable interrupts?
Trap is known as Non-Maskable interrupts, which is used in emergency condition.
Give examples for Micro controller?
Z80, Intel MSC51 &96, Motorola are the best examples of Microcontroller.
What is clock frequency for 8085?
3 MHz is the maximum clock frequency for 8085.
Give an example of one address microprocessor?
8085 is a one address microprocessor.
Give examples for 8 / 16 / 32 bit Microprocessor?
8-bit Processor - 8085 / Z80 / 6800; 16-bit Processor - 8086 / 68000 / Z8000; 32-bit Processor - 80386 / 80486
What is meant by a bus?
A bus is a group of conducting lines that carriers data, address, & control signals.
What are the various registers in 8085?
Accumulator register, Temporary register, Instruction register, Stack Pointer, Program Counter are the various
registers in 8085
Why crystal is a preferred clock source?
Because of high stability, large Q (Quality Factor) & the frequency that doesn’t drift with aging. Crystal is used as a
clock source most of the times.
In 8085 which is called as High order / Low order Register?
Flag is called as Low order register & Accumulator is called as High order Register.
Name 5 different addressing modes?
Immediate, Direct, Register, Register indirect, Implied addressing modes
In what way interrupts are classified in 8085?
In 8085 the interrupts are classified as Hardware and Software interrupts.
What is the difference between primary & secondary storage device?
In primary storage device the storage capacity is limited. It has a volatile memory. In secondary storage device the
storage capacity is larger. It is a nonvolatile memory. Primary devices are: RAM / ROM. Secondary devices are:
Floppy disc / Hard disk.
Which Stack is used in 8085?
LIFO (Last In First Out) stack is used in 8085.In this type of Stack the last stored information can be retrieved first.
What is Program counter?
Program counter holds the address of either the first byte of the next instruction to be fetched for execution or the
address of the next byte of a multi byte instruction, which has not been completely fetched. In both the cases it gets
incremented automatically one by one as the instruction bytes get fetched. Also Program register keeps the address
of the next instruction.
What is the RST for the TRAP?
RST 4.5 is called as TRAP.
What are level-triggering interrupt?
RST 6.5 & RST 5.5 are level-triggering interrupts.
Which interrupt is not level-sensitive in 8085?
RST 7.5 is a raising edge-triggering interrupt.
What are Software interrupts?
RST0, RST1, RST2, RST3, RST4, RST5, RST6, RST7.
What are the various flags used in 8085?
Sign flag, Zero flag, Auxiliary flag, Parity flag, Carry flag.
In 8085 name the 16 bit registers?
Stack pointer and Program counter all have 16 bits.What is Stack Pointer?
Stack pointer is a special purpose 16-bit register in the Microprocessor, which holds the address of the top of the
stack.
What happens when HLT instruction is executed in processor?
The Micro Processor enters into Halt-State and the buses are tri-stated.
What does Quality factor mean?
The Quality factor is also defined, as Q. So it is a number, which reflects the lossness of a circuit. Higher the Q, the
lower are the losses.
How many interrupts are there in 8085?
There are 12 interrupts in 8085.
What is Tri-state logic?
Three Logic Levels are used and they are High, Low, High impedance state. The high and low are normal logic
levels & high impedance state is electrical open circuit conditions. Tri-state logic has a third line called enable line.
Which interrupt has the highest priority?
TRAP has the highest priority
What are Hardware interrupts?
TRAP, RST7.5, RST6.5, RST5.5, INTR
Can an RC circuit be used as clock source for 8085?
Yes, it can be used, if an accurate clock frequency is not required. Also, the component cost is low compared to LC
or Crystal

What is the difference between microprocessor and microcontroller?


The major difference is microprocessor doesn’t have inbuilt memory but micro-controller has inbuilt memory .In
Microprocessor more op-codes, few bit handling instructions. But in Microcontroller: fewer op-codes, more bit
handling Instructions. Micro-controller can be defined as a device that includes micro processor, memory, & input /
output signal lines on a single chip.

Give examples for 8 / 16 / 32 bit Microprocessor?


8-bit Processor - 8085 / Z80 / 6800;
16-bit Processor - 8086 / 68000 / Z8000;
32-bit Processor - 80386 / 80486.

Why 8085 processor is called an 8 bit processor?


Because 8085 processor has 8 bit ALU (Arithmetic Logic Review).

Expand HCMOS?
High-density n- type Complimentary Metal Oxide Silicon field effect transistor.

What does microprocessor speed depend on?


The processing speed depends on DATA BUS WIDTH.

What is the Maximum clock frequency in 8086?


5 Mhz is the Maximum clock frequency in 8086

Is the address bus unidirectional? Is the data bus is Bi-directional?


The address bus is unidirectional because the address information is always given by the Micro Processor to address
a memory location of an input / output devices.
The data bus is Bi-directional because the same bus is used for transfer of data between Micro Processor and
memory or input / output devices in both the direction.

What is the disadvantage of microprocessor?


It has limitations on the size of data. Most Microprocessor does not support floating-point operations.
What is the difference between primary & secondary storage device?
In primary storage device the storage capacity is limited. It has a volatile memory. In secondary storage device the
storage capacity is larger. It is a nonvolatile memory. Primary devices are: RAM / ROM.
Secondary devices are: Floppy disc / Hard disk.

Difference between SRAM and DRAM?


Static RAM: No refreshing, 6 to 8 MOS transistors are required to form one memory cell, Information stored as
voltage level in a flip flop.
Dynamic RAM: Refreshed periodically, 3 to 4 transistors are required to form one memory cell, Information is
stored as a charge in the gate to substrate capacitance.

What is an interrupt?
Interrupt is a signal send by external device to the processor so as to request the processor to perform a particular
work.

What are the different types of interrupts?


Maskable and Non-maskable interrupts.

What is cache memory?


Cache memory is a small high-speed memory. It is used for temporary storage of data & information between the
main memory and the CPU (center processing unit). The cache memory is only in RAM.

Expand DMA?
Direct Memory Access

Differentiate between RAM and ROM?


RAM: Random Access Memory. Read / Write memory, High Speed, Volatile Memory. ROM: Read only memory,
Low Speed, Non Volatile Memory

What is NV-RAM?
Nonvolatile Read Access Memory, also called Flash memory.

What is a flag?
Flag is a flip-flop used to store the information about the status of a processor and the status of the instruction
executed most recently

What are the flags in 8086?


In 8086 Carry flag, Parity flag, Auxiliary carry flag, Zero flag, Overflow flag, Trace flag, Interrupt flag, Direction
flag, and Sign flag.

What is meant by Maskable interrupt?


An interrupt that can be turned off by the programmer is known as Maskable interrupt.

What is Non-Maskable interrupt?


An interrupt which can be never be turned off (ie.disabled) is known as Non-Maskable interrupt.

Which interrupts are generally used for critical events?


Non-Maskable interrupts are used in critical events. Such as Power failure, Emergency, Shut off etc.

Give examples for Maskable interrupts?


RST 7.5, RST6.5, RST5.5 are Maskable interrupts

Give example for Non-Maskable interrupts?


Trap is known as Non-Maskable interrupts, which is used in emergency condition.

What are the various segment registers in 8086?


Code, Data, Stack, Extra Segment registers in 8086.

Which Stack is used in 8086?


FIFO (First In First Out) stack is used in 8086.In this type of Stack the first stored information is retrieved first.

What is SIM and RIM instructions?


SIM is Set Interrupt Mask. Used to mask the hardware interrupts.
RIM is Read Interrupt Mask. Used to check whether the interrupt is Masked or not.

What is Tri-state logic?


Three Logic Levels are used and they are High, Low, High impedance state. The high and low are normal logic
levels & high impedance state is electrical open circuit conditions. Tri-state logic has a third line called enable line.

Give an example of one address microprocessor?


8085 is a one address microprocessor.

In what way interrupts are classified in 8085?


In 8085 the interrupts are classified as Hardware and Software interrupts.

What are Hardware interrupts?


TRAP, RST7.5, RST6.5, RST5.5, INTR.

What are Software interrupts?


RST0, RST1, RST2, RST3, RST4, RST5, RST6, RST7.

Which interrupt has the highest priority?


TRAP has the highest priority.

Name 5 different addressing modes?


Immediate, Direct, Register, Register indirect, Implied addressing modes.

How many interrupts are there in 8085?


There are 12 interrupts in 8085.

What is the RST


for the TRAP?
RST 4.5 is called as TRAP.

In 8085 which is called as High order / Low order Register?


Flag is called as Low order register & Accumulator is called as High order Register.

1. What are the various registers in 8085?


- Accumulator register, Temporary register, Instruction register, Stack Pointer, Program Counter are the
various registers in 8085 .

2. In 8085 name the 16 bit registers?


- Stack pointer and Program counter all have 16 bits.

3. What are the various flags used in 8085?


- Sign flag, Zero flag, Auxillary flag, Parity flag, Carry flag.

4. What is Stack Pointer?


- Stack pointer is a special purpose 16-bit register in the Microprocessor, which holds the address of the top
of the stack.

5. What is Program counter?


- Program counter holds the address of either the first byte of the next instruction to be fetched for execution
or the address of the next byte of a multi byte instruction, which has not been completely fetched. In both the
cases it gets incremented automatically one by one as the instruction bytes get fetched. Also Program register
keeps the address of the next instruction.

6. Which Stack is used in 8085?


- LIFO (Last In First Out) stack is used in 8085.In this type of Stack the last stored information can be
retrieved first.

7. What happens when HLT instruction is executed in processor?


- The Micro Processor enters into Halt-State and the buses are tri-stated.

8. What is meant by a bus?


- A bus is a group of conducting lines that carriers data, address, & control signals.

9. What is Tri-state logic?


- Three Logic Levels are used and they are High, Low, High impedance state. The high and low are normal
logic levels & high impedance state is electrical open circuit conditions. Tri-state logic has a third line called
enable line.

10. Give an example of one address microprocessor?


- 8085 is a one address microprocessor.

11. In what way interrupts are classified in 8085?


- In 8085 the interrupts are classified as Hardware and Software interrupts.

12. What are Hardware interrupts?


- TRAP, RST7.5, RST6.5, RST5.5, INTR.

13. What are Software interrupts?


- RST0, RST1, RST2, RST3, RST4, RST5, RST6, RST7.

14. Which interrupt has the highest priority?


- TRAP has the highest priority.

15. Name 5 different addressing modes?


- Immediate, Direct, Register, Register indirect, Implied addressing modes.

1. If there are multiple recycle bin for a hard disk


a. you can set different size for each recycle bin
b. you can choose which recycle bin to use to store your deleted files
c. You can make any one of them default recycle bin
d. None of above
2. Identify false statement
a. You can find deleted files in recycle bin
b. You can restore any files in recycle bin if you ever need
c. You can increase free space of disk by sending files in recycle bin
d. You can right click and choose Empty Recycle Bin to clean it at once
3. If the displayed system time and date is wrong, you can reset it using
a. Write
b. Calendar
c. Write file
d. Control panel
4. You should save your computer from?
a. Viruses
b. Time bombs
c. Worms
d. All of the above
5. World Wide Web is being standard by
a. Worldwide corporation
b. W3C
c. World Wide Consortium
d. World Wide Web Standard
6. A co-processor
a. Is relatively easy to support in software
b. Causes all processor to function equally
c. Works with any application
d. Is quite common in modern computer
7. A Microsoft Windows is ..... a(n)
a. Operating system
b. Graphic program
c. Word Processing
d. Database program
8. Which of the following is program group?
a. Accessories
b. Paint
c. Word
d. All of above
9. Which is not application software?
a. Windows NT
b. Page Maker
c. WinWord XP
d. Photoshop
Visit http://mcqsets.com for more preparation materials
10. The ..... program compresses large files into a smaller file
a. WinZip
b. WinShrink
c. WinStyle
d. None of above
11. Which of the following is an example of a real time operating system?
a. Lynx
b. MS DOS
c. Windows XP
d. Process Control
12. Which of the following operating system does not implement the multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS
13. Which of the following windows version support 64 bit processor?
a. Windows 98
b. Windows 2000
c. Windows XP
d. Windows 95
14. Which of the following Operating System does not implement multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS
15. What program runs first after computer is booted and loading GUI?
a. Desktop Manager
b. File Manager
c. Windows Explorer
d. Authentication
16. Which of the following operating system do you choose to implement a client server network?
a. MS DOS
b. Windows
c. Windows 98
d. Windows 2000
17. Which of the following Operating systems is better for implementing a Client-Server network
a. MS DOS
b. Windows 95
c. Windows 98
d. Windows 2000
18. My Computer was introduced from
a. Windows 3.1
b. Windows 3.11
c. Windows 95
d. Windows 98
19. Which of the following Windows do not have Start button
a. Windows Vista
b. Windows 7
c. Windows 8
d. None of above
20. Which is the latest version of MS Windows?
a. Windows 2007
b. Windows 8.1
c. Windows 2008
d. Windows 7
21. Which operating system doesn't support networking between computers?
a. Windows 3.1
b. Windows 95
c. Windows 2000
d. Windows NT
22. Which Operating System doesn't support networking between computers?
a. Windows 3.1
b. Windows 95
c. Windows 2000
d. Windows NT
23. Which of the following does not support more than one program at a time?
a. DOS
b. Linux
c. Windows
d. Unix
24. Which of the following is not an operating system?
a. DOS
b. Linux
c. Windows
d. Oracle
25. Linux is a(n) ... operating system
a. Open source
b. Microsoft
c. Windows
d. Mac
MCQ Sets (mcqsets.com) offers collection of multiple choice questions, online quizzes, downloads and subjective
Q/As.
26. Which operating system can you give smallest file name?
a. Ps/2
b. Dos
c. Windows
d. Windows NT
27. Which one is not operating system?
a. P11
b. OS/2
c. Windows
d. Unix
28. Which of the following is not a multitasking operating system?
a. Windows
b. Linux
c. Win NT
d. DOS
29. You should choose Sleep option when
a. The computer is tired after working for the whole day
b. You are leaving for a very short time and want to resume you work shortly
c. When computer gets hanged frequently. Let it sleep for some time
d. You finish working and going to bed
30. The .... displays the name of every computer user on the computer
a. Wish list screen
b. Command screen
c. Welcome screen
d. None of the above
31. The category of software most appropriate for controlling the design and layout of complex document like
newsletters and brochure is:
a. Word processing
b. Computer aided design
c. Web page authoring
d. Desktop publishing
32. Which one is not a system tool?
a. Backup
b. Disk defragment
c. Virus scanning
d. All of the above
Like MCQ Sets in Facebook (http://facebook.com/mcqsets)
33. The memory which allocates space for DOS and application is called
a. Expanded memory
b. Cache memory
c. Virtual memory
d. Conventional memory
34. The operating system creates ... from the physical computer
a. Virtual space
b. Virtual computer
c. Virtual device
d. None
35. The operating system creates _____ from the physical computer
a. Virtual space
b. Virtual computers
c. Virtual device
d. None
36. Which menu bar selection would you access to open file?
a. Option
b. Help
c. View
d. None of above
37. Which mode loads minimal set of drivers when starting Windows?
a. Safe Mode
b. Normal Mode
c. VGA Mode
d. Network Support Mode
38. Which of the following are loaded in safe mode?
a. Keyboard driver
b. Mouse driver
c. VGA drive
d. All of above
39. A .... is a named location on a disk where files are stored
a. Folder
b. Pod
c. Version
d. None of the above
40. Which command is used to see the version of operating system?
a. Vol
b. Version
c. Ver
d. None of the above
41. Which type of command requires additional files to perform specific operations?
a. Internal commands
b. External commands
c. Valuable commands
d. Primary commands
42. Which of the following is system software?
a. Operating system
b. Compiler
c. Utilities
d. All of the above
43. A user-interface that is easy to use is considered to be
a. User-happy
b. User-simple
c. User-friendly
d. None of the above
44. A ....is a flash memory storage device that plugins into a USB port
a. USB snap drive
b. USB flash drive
c. USB memory maker drive
d. None of above
45. The ....is the drive containing the files to be copied
a. Source drive
b. Destination drive
c. USB drive
d. None of the above
46. The number of character contained in primary name (DOS)?
a. Up to 8 characters
b. 3 characters
c. Up to 10 characters
d. None of the above
47. Which one of the following is not a multitasking operating system?
a. DOS
b. Windows
c. Unix
d. Linux
48. The most recent version of MAC OS is based on the ... operating system
a. Windows
b. Linux
c. Unix
d. CMOS
49. The ... operating system was initially created in the early 1970s at AT and T's Bell Labs
a. Linux
b. DOS
c. Unix
d. GNU
50. Which command is used to undelete a bunch of files with extension .doc that you have just deleted?
a. Undelete
b. Undelete/all
c. Undelete *.doc
d. All of above
51. Which command is used to display the contents of the text file of DOS?
a. Copy con
b. Copy
c. Type
d. Dir
SI. MCQ Sets contains
a. Downloads
b. MCQ Collections
c. Online Quizzes
52. In Windows, start button is used to
a. Run applications
b. Device setting
c. Turn off the system
d. All of above
53. Which of the following is an essential file of a MS-DOS boot disk?
a. COMMAND.COM
b. START.COM
c. TREE.COM
d. VER.COM
54. Which one is true for unconditional disk formatting?
a. Destroys every byte of data on a disk by overwriting it with with blank spaces
b. Do not check/scan surface after format
c. Transfer system files after format
d. All of above
55. Once text has been cut to the clipboard, you can .....that text into another document
a. Paste
b. Copy
c. Transfer
d. None of the above
56. What is the function of radio button?
a. To select multiple option
b. To select single option
c. To select all option
d. All of above
57. The Banker's algorithm is used
a. to rectify deadlock
b. to detect deadlock
c. to prevent deadlock
d. to slove deadlock
58. The primary purpose of an operating system is:
a. To make the most efficient use of the computer hardware
b. To allow people to use the computer,
c. To keep systems programmers employed
d. To make computers easier to use
59. The primary purpose of an operating system is a ...
a. To make the most efficient use of computer hardware
b. To allow people to use the computer
c. To keep system programmer employed
d. To make computer easier to use
60. You can use print manage window
a. To check status of files in the print queue
b. To cancel the print job
c. To interrupt printing
d. All of the above

11 – d 12 – d 13 – a 14 – d 15 – d 16 – d 17 – d 18 – c 19 – c 20 – b
21 – a 22 – a 23 – a 24 – d 25 – a 26 – b 27 – a 28 – d 29 – b 30 – c
31 – a 32 – c 33 – d 34 – b 35 – b 36 – d 37 – a 38 – d 39 – a 40 – c
41 – b 42 – d 43 – c 44 – b 45 – a 46 – a 47 – a 48 – c 49 – c 50 - c
51 – c 52 – d 53 – a 54 – a 55 – a 56 – b 57 – c 58 – a 59 – a 60 – d

1. The entire hostname has a maximum of


a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
View Answer

Answer:a
Explanation:None.
2. A DNS client is called
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
3. Servers handle requests for other domains
a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
4. DNS database contains
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
advertisements

5. If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
7. Wildcard domain names start with label
a) @
b) *
c) &
d) #
View Answer

Answer:b
Explanation:None.
8. The right to use a domain name is delegated by domain name registers which are accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
View Answer

Answer:d
Explanation:None.
advertisements

9. The domain name system is maintained by


a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. Which one of the following is not true?
a) multiple hostnames may correspond to a single IP address
b) a single hostname may correspond to many IP addresses
c) a single hostname may correspond to a single IP address
d) none of the mentioned
View Answer

Answer:c
Explanation:None.

1. A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
2. Dynamic web page
a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
3. What is a web browser?
a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
4. Common gateway interface is used to
a) generate executable files from web content by web server
b) generate web pages
c) stream videos
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
advertisements

5. URL stands for


a) unique reference label
b) uniform reference label
c) uniform resource locator
d) unique resource locator
View Answer
Answer:c
Explanation:None.
6. A web cookie is a small piece of data
a) sent from a website and stored in user’s web browser while a user is browsing a website
b) sent from user and stored in the server while a user is browsing a website
c) sent from root server to all servers
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
7. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) none of the mentioned
View Answer

Answer:d
Explanation:None.
8. An alternative of javascript on windows platform is
a) VBScript
b) ASP.NET
c) JSP
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
Computer Networks Questions & Answers – HTTP & FTP

1. Multiple object can be sent over a TCP connection between client and server in
a) persistent HTTP
b) nonpersistent HTTP
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
3. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) broader gateway protocol
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
advertisements

5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23
View Answer

Answer:b
Explanation:None.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
View Answer

Answer:a
Explanation:None.
8. In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
advertisements
9. The file transfer protocol is built on
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. In file transfer protocol, data transfer can be done in
a) stream mode
b) block mode
c) compressed mode
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
Computer Networks Questions & Answers – Ethernet

1. Ethernet frame consists of


a) MAC address
b) IP address
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
2. What is stat frame delimeter (SFD) in ethernet frame?
a) 10101010
b) 10101011
c) 00000000
d) 11111111
View Answer

Answer:b
Explanation:None.
3. MAC address is of
1) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer

Answer:d
Explanation:None.
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements

5. Ethernet in metropolitan area network (MAN) can be used as


a) pure ethernet
b) ethernet over SDH
c) ethernet over MPLS
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
6. A point-to-point protocol over ethernet is a network protocol for
a) encapsulating PPP frames inside ethernet frames
b) encapsulating ehternet framse inside PPP frames
c) for security of ethernet frames
d) for security of PPP frames
View Answer

Answer:a
Explanation:None.
7. High speed ethernet works on
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
8. The maximum size of payload field in ethernet frame is
a) 1000 bytes
b) 1200 bytes
c) 1300 bytes
d) 1500 bytes
View Answer

Answer:d
Explanation:None.
advertisements

9. What is interframe gap?


a) idle time between frames
b) idle time between frame bits
c) idle time between packets
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
a) short frame
b) run frame
c) mini frame
d) man frame
View Answer

Answer:b
Explanation:None.
Computer Networks Questions & Answers – Wireless LAN

1. What is the access point (AP) in wireless LAN?


a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
2. In wireless ad-hoc network
a) access point is not required
b) access point is must
c) nodes are not required
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
4. In wireless distribution system
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
advertisements

5. A wireless network interface controller can work in


a) infrastructure mode
b) ad-hoc mode
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.
6. In wireless network an extended service set is a set of
a) connected basic service sets
b) all stations
c) all access points
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
7. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
8. Which one of the following event is not possible in wireless LAN.
a) collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
advertisements

9. What is Wired Equivalent Privacy (WEP) ?


a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
10. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access
View Answer

Answer:a
Explanation:None.
Computer Networks Questions & Answers – WiMAX

1. WiMAX stands for


a) wireless maximum communication
b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
2. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
3. WiMAX uses the
a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) all of the mentioned
View Answer

Answer:a
Explanation:None.
4. Which one of the following modulation scheme is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
advertisements

5. WiMAX MAC layer provides an interface between


a) higher transport layers and physical layer
b) application layer and network layer
c) data link layer and network layer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. For encryption, WiMAX supports
a) advanced encryption standard
b) triple data encryption standard
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
7. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
8. Devices that provide the connectivity to a WiMAX network are known as
a) subscriber stations
b) base stations
c) gateway
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
advertisements

9. WiMAX is mostly used for


a) local area network
b) metropolitan area network
c) personal area network
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
10. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
View Answer

Answer:b
Explanation:None.
Computer Networks Questions & Answers – Bluetooth

This section of our 1000+ Computer Networks MCQs focuses on Bluetooth.


1. An interconnected collection of piconet is called
a) scatternet
b) micronet
c) mininet
d) none of the mentioned
View Answer

Answer:a
Explanation:Piconet is the basic unit of bluetooth system having a master node and upto seven active slave nodes.
2. In a piconet, there can be up to _____ parked nodes in the net.
a) 63
b) 127
c) 255
d) 511
View Answer

Answer:c
Explanation:None.
3. Bluetooth is the wireless technology for
a) local area network
b) personal area network
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
4. Bluetooth uses
a) frequency hoping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
advertisements

5. Unauthorised access of information from a wireless device through a bluetooth connection is called
a) bluemaking
b) bluesnarfing
c) bluestring
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
6. What is A2DP (advanced audio distribution profile)?
a) a bluetooth profile for streaming audio
b) a bluetooth profile for streaming video
c) a bluetooth profile for security
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
7. In the piconet of bluetooth one master device
a) can not be slave
b) can be slave in another piconet
c) can be slave in the same piconet
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
8. Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
View Answer

Answer:a
Explanation:None.
advertisements
9. The bluetooth supports
a) point-to-point connections
b) point-to-multipoint connection
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. A scatternet can have maximum
a) 10 piconets
b) 20 piconets
c) 30 piconets
d) 40 piconets
View Answer

Answer:a
Explanation:None.
Computer Networks Questions & Answers – ATM & Frame Relay

Computer Networks Questions & Answers – Access Networks

This section of our 1000+ Computer Networks MCQs focuses on Internet.


1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
2. To join the internet, the computer has to be connected to a
a) internet architecture board
b) internet society
c) internet service provider
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
3. Internet access by transmitting digital data over the wires of a local telephone network is provided by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
View Answer

Answer:b
Explanation:None.
4. ISP exchanges internet traffic between their networks by
a) internet exchange point
b) subscriber end point
c) ISP end point
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
advertisements

5. Which one of the following protocol is not used in internet?


a) HTTP
b) DHCP
c) DNS
d) none of the mentioned
View Answer
Answer:d
Explanation:None.
6. IPv6 addressed have a size of
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
View Answer

Answer:c
Explanation:None.
7. Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
advertisements

9. Which protocol assigns IP address to the client connected in the internet?


a) DHCP
b) IP
c) RPC
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
View Answer

Answer:d
Explanation:None.

Explanation:None.
Computer Networks Questions & Answers – Cryptography

This section of our 1000+ Computer Networks MCQs focuses on Cryptography.


1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
2. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
View Answer

Answer:b
Explanation:None.
3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) RSA algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
4. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
advertisements

5. What is data encryption standard (DES)?


a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
View Answer

Answer:b
Explanation:None.
8. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
View Answer

Answer:a
Explanation:None
advertisements

9. ElGamal encryption system is


a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
Computer Networks Questions & Answers – Security In The Internet
This set of Computer Networks Questions & Answers focuses on “Network Attacks”.
1) The attackers a network of compromised devices known as
a) Internet
b) Botnet
c) Telnet
d) D-net
View Answer

Answer: b
Explanation: None.
2) Which of the following is a form of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer

Answer: d
Explanation: None.
3) The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the
target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer

Answer: c
Explanation: None.
advertisements

4)The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: b
Explanation: None.
5) Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned
View Answer

Answer: b
Explanation: They donot inject packets into the channel.
6) Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
View Answer

Answer: d
Explanation: None.
advertisements

7) Firewalls are often configured to block


a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
Computer Networks Questions & Answers – DHCP

This section of our 1000+ Computer Networks MCQs focuses on DHCP Protocol.
1. DHCP (dynamic host configuration protocol) provides _____ to the client.
a) IP address
b) MAC address
c) url
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
2. DHCP is used for
a) IPv6
b) IPv4
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
3. The DHCP server
a) maintains a database of available IP addresses
b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
4. IP assigned for a client by DHCP server is
a) for a limited period
b) for unlimited period
c) not time dependent
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
advertisements
5. DHCP uses UDP port ____ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Answer:b
Explanation:None.
6. The DHCP server can provide the _______ of the IP addresses.
a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
7. DHCP client and servers on the same subnet communicate via
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
View Answer

Answer:a
Explanation:None.
8. After obtaining the IP address, to prevent the IP conflict the client may use
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
advertisements

9. What is DHCP snooping?


a) techniques applied to ensure the security of an existing DHCP infrastructure
b) encryption of the DHCP server requests
c) algorithm for DHCP
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.
a) MAC address
b) IP address
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
Computer Networks Questions & Answers – SSH

This section of our 1000+ Computer Networks MCQs focuses on SSH Protocol.
1. Secure shell (SSH) network protocol is used for
a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
2. SSH can be used in only
a) unix-like operating systems
b) windows
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:c
Explanation:None.
3. SSH uses _______ to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) both (a) and (b)
d) none of the mentioned
View Answer

Answer:a
Explanation:None.
4. Which standard TCP port is assigned for contacting SSH servers?
a) port 21
b) port 22
c) port 23
d) port 24
View Answer

Answer:b
Explanation:None.
advertisements

5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
a) telnet
b) rlogin
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:SSH is more secured then telnet and rlogin.
6. Which one of the following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) rsync
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
7. SSH-2 does not contain
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer
View Answer

Answer:c
Explanation:None.
8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned
View Answer

Answer:d
Explanation:None.
advertisements

9. SCP protocol is evolved from _____ over SSH.


a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. Which one of the following authentication method is used by SSH?
a) public-key
b) host based
c) password
d) all of the mentioned
View Answer

Answer:d
Explanation:None.
Computer Networks Questions & Answers – SMTP

Computer Networks Questions & Answers – SMTP

This set of Computer Networks Questions & Answers focuses on “SMTP”.


1) When the mail server sends mail to other mail servers it becomes _____ ?
a) SMTP server
b) SMTP client
c) Peer
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
2) If you have to send multimedia data over SMTP it has to be encoded into
a) Binary
b) Signal
c) ASCII
d) None of the mentioned
View Answer

Answer: c
Explanation: None.
3) Expansion of SMTP is
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
View Answer

Answer: a
Explanation: None.
4) In SMTP, the command to write recievers mail adress is written with this command
a) SEND TO
b) RCPT TO
c) MAIL TO
d) None of the mentioned
View Answer

Answer: b
Explanation: None.
5) The underlying Transport layer protocol used by SMTP is
a) TCP
b) UDP
c) Either a or b
d) None of the mentioned
View Answer

Answer: a
Explanation: None.
advertisements

6) Choose the statement which is wrong incase of SMTP


a) It requires message to be in 7bit ASCII format
b) It is a pull protocol
c) It transfers files from one mail server to another mail server
d) None of the mentioned
View Answer
Answer: b
Explanation: The sending mail server pushes the mail to receiving mail server hence it is push protocol.
7) Internet mail places each object in
a) Separate messages for each object
b) One message
c) Varies with number of objects
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
8) Typically the TCP port used by SMTP is
a) 25
b) 35
c) 50
d) 15
View Answer

Answer: a
Explanation: None.
9) A session may include
a) Zero or more SMTP transactions
b) Exactly one SMTP transactions
c) Always more than one SMTP transactions
d) Number of SMTP transactions cant be determined
View Answer

Answer: a
Explanation: None.
10) Example of user agents for e-mail
a) Microsoft Outlook
b) Apple Mail
c)
d) All of the mentioned
View Answer

Answer: d
Explanation: None.
advertisements

11) When the sender and the receiver of an email are on different systems, we need only ______ .
a) One MTA
b) Two UAs
c) Two UAs and one pair of MTAs
d) Two UAs and two pairs of MTAs
View Answer
Answer: d
Explanation: None.
12) User agent does not support this
a) Composing messages
b) Reading messages
c) Replying messages
d) All of the mentioned
View Answer

Answer: d
Explanation: None.
Computer Networks Questions & Answers – RPC

Computer Networks Questions & Answers – IPv4


This set of Computer Networks Questions & Answers focuses on “IPv4”.
1. Which of the following is not applicable for IP?
a) Error reporting
b) Handle addressing conventions
c) Datagram format
d) Packet handling conventions
View Answer

Answer: a
Explanation: Error reporting is handled by ICMP.
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer

Answer: c
Explanation: TOS-type of service identifies the type of packets.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer

Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
advertisements

4. If the value in protocol field is 17, the transport layer protocol used is ____.
a) TCP
b) UDP
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: For TCP it is 6.
5. The data field can carry which of the following?
a) TCP segemnt
b) UDP segment
c) ICMP messages
d) None of the mentioned
View Answer

Answer: c
Explanation: Data field usually has tranaport layer segment, but it can also carry ICMP messages.
6. What should be the flag value to indicate the last fragment?
a) 0
b) 1
c) TTl value
d) None of the mentioned
View Answer
Answer: a
Explanation: flag=0 indicates that it is the last fragment.
7. Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
c) offer unreliable service
d) None of the mentioned
View Answer

Answer: b
Explanation: Ip offers unreliable service.
advertisements

8. Fragmentation has following demerits


a) complicates routers
b) open to DOS attack
c) overlapping of fragments.
d) All of the mentioned
View Answer
Answer: d
Explanation: Fragmentation makes the implementation complex and also can create DOS attack.
9. Which field helps to check rearrangement of the fragments?
a) offset
b) flag
c) TTL
d) identifer
View Answer

Answer: a
Explanation: offset field specifies where the fragment fits in the original datagram.
Computer Networks Questions & Answers – IPv6

This set of Computer Networks Questions & Answers focuses on “IPv6”.


1. The size of IP address in IPv6 is
a) 4bytes
b) 128bits
c) 8bytes
d) 100bits
View Answer

Answer: b
Explanation: An IPv6 address is 128 bits long.
2. The header length of an IPv6 datagram is _____.
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
View Answer

Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the
datagram.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer

Answer: c
Explanation: This field enables to have different types of IP datagram.
4. IPv6 doesnot use ______ type of address
a) Broadcast
b) Multicast
c) Anycast
d) None of the mentioned
View Answer

Answer: a
Explanation: Broadcast has been eliminated in IPv6.
advertisements

5. These are the features present in IPv4 but not in IPv6.


a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
View Answer
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.
6. The ____ field determines the lifetime of IPv6 datagram
a) Hop limit
b) TTL
c) Next header
d) None of the mentioned
View Answer

Answer: a
Explanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by the
router. When the value becomes zero the datagram is discarded.
7. Dual-stack approach refers to
a) Implementing Ipv4 with 2 stacks
b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
d) None of the mentioned
View Answer

Answer: c
Explanation: dual-stack is one of the approach used to support IPv6 in already existing systems.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
a) use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer

Answer: b
Explanation: The IPv4 routers can form a tuunel.
advertisements

9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.

1. The _____ states that a foreign key must either match a primary key value in another relation or it
must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these
2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these
3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in
the boot sector of a floppy disk or the master boot record of a hard disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these
4. Which error detection method uses one's complement arithmetic?
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these
5. A result of a computer virus can not lead to ___.
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these
6. The network interface card of LAN is related to following layer of OSI Model-
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these
7. Which of the following does not describe a data warehouse?
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of these
8. Which of the following is true ?
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of these
9. A range check _____
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of these
10. The total set of interlinked hypertext documents worldwide is-
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these
11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(a) carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these
12. Every computer connected to an intranet or extranet must have a distinct_____
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these
13. A table of bits in which each row represents the distinct values of a key?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these
14. The degree of detail that should be incorporated into a database depends on what?
(a) Data integrity
(b) The type of database
(c) The user's perspective
(d) The business practices and policies
(e) None of these
15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone
lines.
(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these
16. Before a package can be used in a java program it must be___.
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of these
17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the
will not be executed as an instruction___.
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these
18. Programming language built into user programs such as Word and Excel are known as____
(a) 4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these
19. Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these
20. This is a standard way for a Web server to pass a Web user's request to an application program and
to receive data back to forward to the user-
(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface
21. Three SQL, DDL, CREATE commands are__.
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these
22. Data are ________ in client/server computing.
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client's request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing
23. Which of the following will not eliminates the ambiguities of a null value?
(a) Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of these
24. The____directory is mandatory for every disk.
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of these
25. This is a group of servers that share work and may be able to back each other up if one server fails.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit

Answers -
1-a 14-b
2-c 15-a
3-e 16-c
4-b 17-b
5-b 18-c
6-e 19-a
7-d 20-e
8-a 21-d
9-c 22-c
10-c 23-d
11-b 24-a
12-c 25-b
13-a