1 Crore+ students have signed up on EduRev. Have you? Download the App |
JVM (Java Virtual Machine) is an abstract machine. It is a specification that provides runtime environment in which java bytecode can be executed. JVM does not create the object of main class. Java is platform independent but JVM is platform dependent. JVM is the one that actually calls the main method present in a java code.
Which of the following is not a primary component of a Linux system?
Linux Operating System has primarily three components:
1. Kernel
2. System libraries
3. System utilities
Kernel: The kernel is responsible for maintaining all the important abstractions of the operating system, including such things as virtual memory and processes.
System libraries: The system libraries define a standard set of functions through which applications can interact with the kernel. These functions implement much of the operating-system functionality that does not need the full privileges of kernel code.
System utilities: The system utilities are programs that perform individual, specialized management tasks.
Which of the following is not a valid category of “System bus” in a computer system?
A bus that connects major computer components (processor, memory, I/O) is called a system bus.
Any bus the lines can be classified into three functional groups: data, address, and control lines.
The data lines provide a path for moving data among system modules. These lines, collectively, are called the data bus.
The address lines are used to designate the source or destination of the data on the data bus.
The control lines are used to control the access to and the use of the data and address lines. Because the data and address lines are shared by all components, there must be a means of controlling their use.
Which of the following categories of viruses normally infect executable code, such as as.com and .exe files?
File infector virus is also known as a parasitic virus that usually infects memory and executable files.
A boot sector virus is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks.
A macro virus is a computer virus written in the same macro language used for software programs, including Microsoft Excel or word processors such as Microsoft Word.
A cursor is used to iterate through a result set that was returned by a SELECT statement. Cursors can be used in stored procedures, stored functions, and triggers.
A ________ is the term used when a search engine return a Web page that matches the search.
Criteria.
A hit is the term used when a search engine return a Web page that matches the search criteria. Blog is the place where any article is written and published over internet. Link opens up new website.
In January 2019, Krishna Sobti passed away. She was a famous ________.
Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations. The process is managed by a chip known as a DMA controller (DMAC).
Which of the following is not an application layer protocol?
In the Internet protocol stack, when data is sent from device A to device B, the 5th layer to receive data at B is Application layer. The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services. Example: HTTP, TELNET, FTP, IMAP etc.
Which of following datatype can be returned by a function?
A function provides a convenient way to encapsulate some computation. C makes the use of functions easy, convenient and efficient.
Functions receive either a fixed or variable amount of arguments. Functions can only return one value or return no value. A function returns all mentioned data-types,
man stands for manual.
The man pages are a user manual that is by default built into most Linux distributions.
man command in Linux is used to display the user manual of any command.
Which electronic components were used in Fifth Generation Computers?
Fifth Generation (Present and Future):
Notes:
________ command is used to circulate between two different file directories.
The cd command, also known as chdir (change directory), is a command-line OS shell command used to change the current working directory in operating systems.
if the user wanted to change from the home directory to the xyz directory, the input will be:
cd/xyz/
Octal number system has 8 digits from 0…. 7
Hence 8 cannot be a symbol in the octal number system
Hence option d 678 is incorrect
A queue is an ordered list in which insertions are done at one end (rear) and deletions are done at another end (front). The first element to be inserted is the first one to be deleted. Hence, it is called First in First out (FIFO) or Last in Last out (LILO) list.
Condition for size of queue: rear = maximum_size – 1
<tr> tag is used to add rows in tables
The <tr> tag defines a row in an HTML table
A <tr> element contains one or more <th> or <td> elements
The <th> tag defines a header cell in an HTML table
The <td> tag defines a standard cell in an HTML table
A method must be declared within a class. It is defined with the name of the method, followed by parentheses ().
JAVA (static) method can be accessed without creating an object of the class or it can be accessed by creating objects using the corresponding class.
A constructor in Java is a special method that is used to initialize objects. Java constructor is invoked at the time of object creation. It constructs the values for the object that is why it is known as constructor.
Which of the following decisive battles had established the dominion of the British in India?
The Battle of Buxarwas fought on 22-23 October 1764 between the forces under the command of the British East India Company led by Hector Munro and the combined armies of Mir Qasim, Nawab of Bengal till 1763; the Nawab of Awadh; and the Mughal Emperor Shah Alam.
Which of the following examines the specification to ensure that all system requirements are error free?
Requirements validation examines the specification to ensure that all system requirements have been stated unambiguously; that inconsistencies, omissions, and errors have been detected and corrected; and that the work products conform to the standards established for the process, the project, and the product.
Binary search algorithm cannot be applied to which of following?
Binary search is also known as half-interval search. It works efficiently with a sorted list. Binary search compares the target value to the middle element of the list. If they are not equal narrow the interval to the lower half (i.e. elements appear before middle element). Otherwise, narrow it to the upper half (i.e. element appear after middle element). Repeatedly check until the target value is found.
Pre-requisite for binary search is to have a sorted array.
The home page is the first page that we see when a website is opened on the web browser. It is also called the start page or the main page, though home page is a more commonly used name. It is generally made attractive and contains various hyperlinks to different pages within the web site to attract visitors to its site. Some web sites require users to login to the web site to access the home page.
A set of programs which enables computer hardware and software to work together is called
System software is a type of computer program that is designed to run a computer's hardware and application programs. If we think of the computer system as a layered model, the system software is the interface between the hardware and user applications.
Which of the following operator can be used to decrease the value of variable “x” by “1”?
x=-x-1 will give negative result.
x=-+x is invalid use of operator.
x = -x- - will provide negative output.
x+=-1 is equivalent to x = x+(-1), hence x = x -1.
Which force is required to maintain a body in Uniform circular Motion?
Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.
Java constructor is invoked at the time of object creation. It constructs the values for the object that is why it is known as constructor.
JAVA is intended to let application developers "write once, run anywhere" (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation.
What is the correct HTML code for inserting an image?
The <img> tag defines an image in an HTML page.
The <img> tag has two required attributes: src and alt.
src specifies the URL of an image and alt specifies an alternate text for an image.
Which of the following is the main constituent of Biogas after Methane?
Which of the following chemical compounds is used for causing acid rain?
In which of the following during the emission of radioactive rays, no changes occur in the mass or charge?
Logical operators are used to combine and evaluate boolean expressions.
&& called Logical AND operator. If both the operands are non-zero, then the condition becomes true.
|| called Logical OR Operator. If any of the two operands is non-zero, then the condition becomes true.
In digital data transmission if each sample is quantized into q levels, then bits required to represent each sample value is given by:
log2 q bits are required to represent each sample value
Consider an example
If the number of levels is 4
These levels in binary can be represented by
00, 01, 10, 11
log2 4 = 2
Hence using 2 bits we can represent all 4 levels
Similarly
If the number of levels is 8, then these levels can be represented by
000, 001, 010, 011, 100, 101, 110, 111
log2 8 = 3
Thus using 3 bits we can represent all 8 levels
A search engine like Google, Bing or yahoo etc. is used by putting in some keywords which are used as a guide. The search engine picks up the keyword and using different ranking algorithms, throw back pages which contain data related to those keywords.
Which of the following is not an object-oriented principle?
Inheritance: forming a new class from an existing class. It helps to reuse code.
Abstraction: Provide only essential information to the outside world and hide background details.
Overloading: specify more than one definition for a function name or an operator in the same scope.
Polymorphism: A call to a member function will invoke a different function depending on the type of object that invokes the function.
Which of the following multiplexing techniques is used for digital data transmission?
In a software project, COCOMO (Constructive Cost Model) is used to estimate
The Constructive Cost Model (COCOMO) is a procedural software cost estimation model developed by Barry W. Boehm.
The basic COCOMO model gives an approximate estimate of the project parameters. The basic COCOMO estimation model is given by the following expressions:
Effort = a1 х (KLOC) a2 PM
Tdev = b1 x (Effort)b2 Months
Where
Devices that accept data from the outside computer and transfer into CPU are called input devices. An input device is a peripheral used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, digital cameras and joysticks.
In Microsoft Excel, down arrow key stroke leads to _________ cell movement on spreadsheet.
In Microsoft Excel, down arrow key leads to One Cell down movement.
What does TCP stand for with respect to computer networks?
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP
Which of the following symbols is used in UNIX to run a job in the background?
In UNIX & processes command in the background. If a command is terminated by the control operator &, the shell executes the command in the background in a subshell. The shell does not wait for the command to finish, and the return status is 0.
The only Viceroy to be assassinated in India was ________.
Which among the following is/are output devices?
I. Scanner
II. Speaker
III. Plotter
An input device is any hardware device that sends data to a computer, allowing you to interact with and control it.
An output device is any hardware that sends data from a computer to another device mostly in form of audio or video.
Which of the following has the least worst time complexity?
Worst time complexity is as follows:
Bubble Sort - O(N2)
Merge Sort - O(N log N)
Insertion Sort - O(N2)
Selection Sort - O(N2)
Which of the following living beings is most likely to produce greenhouse gases?
Green plants are most likely to produce greenhouse gases.
Which of the following is a critical element of software quality assurance and represents the ultimate review of specification, design, and code generation?
Software testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test.
Once source code has been generated, software must be tested to uncover as many errors as possible before delivery to the customer.
Reviews and other SQA activities can and do uncover errors, but they are not sufficient. Hence, there is a need to execute the program before it gets to the customer with the specific intent of finding and removing all errors.
Which of the following executes as a single statement?
SQL is a single query that is used to perform DML and DDL operations. It executes as a single statement.
PL/SQL is a block of codes that used to write the entire program blocks.
The 9’s complement is obtained by subtracting each number from 9
999999
- 012398
987602
Which of the following is, "A device used to connect two separate Ethernet networks into one extended Ethernet."?
An Ethernet network bridge is a device which connects two different local area networks together into one extended Ethernet. For this both networks must connect using the same Ethernet protocol.
<a> tag si used to add links to webpage.
The <a> tag defines a hyperlink, which is used to link from one page to another.
Attribute ‘href’ indicates the link's destination.
"Forests" is listed in the _________ list given in the Seventh Schedule in the Constitution of India.
Through the 42nd Amendment Act of 1976 five subjects were transferred from State to Concurrent List.
They are:
1. Education
2. Forests
3. Weights & Measures
4. Protection of Wild Animals and Birds
5. Administration of Justice
An illness that begins when large amounts of nitrates in water are ingested by an infant and converted to nitrite by the digestive system. The nitrite then reacts with oxy-haemoglobin (the oxygen-carrying blood protein) to form metheglobin, which cannot carry oxygen. If a large enough amount of metheglobin is formed in the blood, body tissues may be deprived of oxygen, causing the infant to develop a blue coloration of their mucous membranes and possibly digestive and respiratory problems. This condition is also known as methemoglobinemia.
Why is the Caps Lock key referred to as a toggle key?
A toggle key toggles the input from other keys on the keyboard between different input modes.
Which of the following is used to retrieve the information through URL (e.g. http://XYZ.com) on the world wide web?
Capability Maturity Model (CMM) specifies an increasing series of levels of a software development organization. The higher the level, the better the software development process, hence reaching each level is an expensive and time-consuming process. Unlike other models, it is not a life cycle model.
Which one of the following polymeric materials is used for making bulletproof jackets?
How many times the following loop is executed?
for(int i = 0; i < 7; i++) {
printf(“Hello World”);
}
A loop is used for executing a block of statements repeatedly until a given condition returns false.
Syntax of for loop:
for (initialization; condition test; increment or decrement)
{
//Statements to be executed repeatedly
}
Loop is executed from i = 0 to 6. i.e. 7 times
A computer Virus is a malicious software that, when executed replicates itself by modifying other computer programs.
The full of VIRUS is Vital Information Recourse Under Siege, because they replicate and multiply and use up computer memory processing power with fake repetitive commands. It causes the system to become slow and keeps hanging.
Consider the following:
1. Carbon dioxide
2. Oxides of Nitrogen
3. Oxides of Sulphur
Q. Which of the above is/are the emission/emission from coal combustion at thermal power plants?
Fly ash, also known as "pulverised fuel ash" is a coal combustion product composed of fine particles that are driven out of the boiler with the flue gases in thermal power plant.
The vi editor is also called as visual editor. It is a screen-oriented text editor originally created for the Unix operating system. Using vi editor, one can edit an existing file or create a new file.
There are two ways to best improve the accuracy of A/D conversion:
PL/SQL blocks have a pre-defined structure in which the code is to be grouped. Below are different sections of PL/SQL blocks.
Out of which only execution section is mandatory.
The Gross Domestic Product of a country is defined as which among the following?
When you start MS Access, how many categories under “Available Templates” can be found?
Who among the following has won Australian Open Men’s Singles 2019 title at Melbourn?
Which restraining factor should be considered by a system engineer while constructing a system model?
System engineering is a modelling process. It defines the processes that serve the needs of the view under consideration. It represents the behaviour of the processes and the assumptions on which the behaviour is based. It explicitly defines both exogenous and endogenous input to the model.
A system engineer considers the following factors when developing alternative solutions: assumptions, simplifications, limitations, constraints, and customer preferences.
Which of the following application layer protocol provides electronic mail internet service?
SMTP: simple mail transfer protocol is used for sending e-mail services between the servers.
HTTP: Hypertext transfer protocol for distributed, collaborative, hypermedia information systems.
FTP: It is an application layer protocol for file transfer
SIP: The Session Initiation Protocol (SIP) is a communications protocol for signalling and controlling multimedia communication sessions.
PL/SQL block contains the SQL instruction that used to interact with the database server.
All the PL/SQL units are treated as PL/SQL blocks.
Following are the different type of PL/SQL units:
The output will be LOW for any case when one or more inputs are zero in a/an _______
The truth table of AND gate is shown:
Whenever one or more inputs are low, the output is low.
Which of the following functionality correctly determines the responsibility of physical layer
Line coding:
a line code is a code chosen for use within a communications system for transmitting a digital signal down a line. Line coding is often used for digital data transport.
Channel coding:
This typically involves the removal of redundancy and the correction (or detection) of errors in the transmitted data.
Modulation:
In electronics and telecommunications, modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted.
Which of the following keywords are used to manage execution of create trigger statement?
The BEFORE or AFTER option in the CREATE TRIGGER statement specifies exactly when to fire the trigger body in relation to the triggering statement that is being run.
In a CREATE TRIGGER statement, the BEFORE or AFTER option is specified just before the triggering statement.
Which of the following folk/tribal dances is associated with Karnataka?
Yakshagana is a popular folk-theatre form of Karnataka with a long history of nearly four hundred years. It is a unique harmony of musical tradition, eye-catching costumes, and authentic styles of dance, improvised gestures and acting with its extemporaneous dialogue appealing to a wide range of the community. It is a vibrant and vigorous living form of theatre art.
In a pointer to structure, which operator is used to access data members of a structure?
Pointers to structures are so frequently used that an alternative notation is provided as a shorthand. If p is a pointer to a structure, then
p -> member-of-structure refers to the particular member.
The operator -> is a minus sign immediately followed by >.
For a pointer to structure node, data members x can be accessed as a node -> x.
Which one of the following is not a real time operating system?
A real-time operating system (RTOS) is any operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays.
Palm OS (also known as Garnet OS) is a mobile operating system initially developed by Palm, Inc., for personal digital assistants (PDAs) in 1996. Palm OS was designed for ease of use with a touchscreen-based graphical user interface. It is provided with a suite of basic applications for personal information management.
Y = (A + B)’.A
Y = A’.B’.A
Y = 0 (because A.A’ = 0)
Which of the following is NOT desired in a good Software Requirement Specifications (SRS) document?
A software requirements specification (SRS) is a description of a software system to be developed. The software requirements specification lays out functional and non-functional requirements, and it may include a set of use cases that describe user interactions that the software must provide.
Nowadays computers all over the world can talk to each other. What is one of the special accessories essential for this purpose?
A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. A Modem performs modulation and demodulation of the signals. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analogue waves.
Kawal Tiger Reserve is located at Jannaram mandal of Mancherial District in Telangana state of India.
The ifconfig command can be used from the command line either to assign an address to a network interface or to configure or display the current network interface configuration information.
The ifconfig command must be used at system startup to define the network address of each interface present on a machine.
A Compiler is a computer program that translates code written in a high-level language to a lower level language, object/machine code. The most common reason for translating source code is to create an executable program.
An assembler translates assembly language into machine code.
A compiler is a computer program (or a set of programs) that convert the source code (written in the high-level language) into machine language.
An interpreter is a computer program that directly executes, i.e. performs, instructions written in a programming or scripting language, without previously compiling them into a machine language program.
Application software (an application) is a set of computer programs designed to permit the user to perform a group of coordinated functions, tasks, or activities.
The programs that are part of the system software include assemblers, compilers, file management tools, system utilities, and debuggers.
Data is a ______ material and information is _______ data.
DATA is a raw material. Collecting data costs money and hence one must collect necessary and sufficient data. Data is generally used by machines and is useless unless it is processed to create INFORMATION.
What is the syntax to create a new file in vi editor?
The vi editor is a screen-oriented text editor originally created for the Unix operating system. Using vi editor, one can edit an existing file or create a new file.
Syntax to create a new file: vi filename
Which of the following is not used to delete data from database table?
The SQL DROP command is used to remove an object from the database. The DELETE Statement is used to delete rows from a table.
The truncate command removes all rows from a table or specified partitions of a table, without logging the individual row deletions. TRUNCATE TABLE is similar to the DELETE statement.
There is no clause as REMOVE in SQL.
How do you combine the following two statements?
char *p;
p = (char*) malloc (100);
A pointer is a group of cells (often two or four) that can hold an address. The unary operator &. gives the address of an object.
The unary operator * is the indirection or dereferencing operator; when applied to a pointer, it accesses the object the pointer points to.
Char pointers are defined as follows:
char *ptr = (char*)malloc(size)
The size of a trigger cannot be more than 32K.
DDL statements are not allowed in the body of a trigger. Also, no transaction control statements are allowed in a trigger. ROLLBACK, COMMIT, and SAVEPOINT cannot be used.
A device that works in conjunction with a computer but not as part of it is called
The device that works in conjunction with a computer but not as part of it is called peripheral device e.g printer. A printer is not part of the computer, it only does the jobs as per instructed by the computer. Hence (b) is the correct option.
Which country has become the 124th member of the International Criminal Court (ICC)?
HTML is a markup language for describing web documents (web pages). HTML stands for Hyper Text Markup Language. A markup language is a set of markup tags.
The <DL> tag defines a description list.
When the USB is connected to a system, its root hub is connected to the _________.
USB root hub is the software driver that connects multiple USB peripherals to the computer. Root hub is connected to the processor through Bus.
The simplified Boolean expression Y = A’(A + B’) can be implemented using a single _____ gate.
Y = A’ (A + B’)
Y = A’A + A’B’
Y = A’B’
Using Boolean law
Y = (A + B)’ = A’B’
That is the output of the NOR gate
A linked list consists of a number of nodes in which each node has a next pointer to the following element. The link of the last node in the list is NULL, which indicates the end of the list.
Array occupies continues memory locations. In linked lists, it's not necessary that the nodes created are in a continues memory location so that the possibility of the cache miss is higher.
Which of the following is not an example of a biomass energy source?
Energy resources can be classified into two categories:
Renewable energy resources are natural resources which can be regenerated continuously and are inexhaustible. They can be used again and again in an endless manner. Examples are Wood, Solar energy, wind energy, hydropower, tidal energy, geothermal energy, Biomass Energy etc.
Non-Renewable energy resources are natural resources which cannot be regenerated once they are exhausted. They cannot be used again. Examples are Oil, Coal, petroleum, natural gas, nuclear fuels etc.
A stack is an ordered list in which insertion and deletion are done at one end, called a top. The last element inserted is the first one to be deleted. Hence, it is called the Last in First out (LIFO) or First in Last out (FILO) list.
The intensity of light is ________ due to constructive interference.
In digital data transmission if the source generates low pass analogue signals with the maximum frequency fm then the correct relation for minimum sampling frequency fs to convert analogue signal to digital signal is:
The sampling frequency for low pass signals is given by Nyquist Criteria
According to which
The signal can be recovered from its samples if the sampling frequency is twice the maximum frequency
Hence
fs ≥ 2 fm
The minimum sampling frequency is given by the equality
fs = 2 fm
Which of the following is FALSE in case of Datagram packet switching?
a, b. True. In Datagram packet switching, each network has its own independent path.
c. True. The overhead bits are used to specify the final destination
d. False. The bandwidth of transmission is dynamic and depends on the congestion.
Which of the following statement is correct about the value of acceleration due to gravity at the poles?
Which is/are abiotic component?
I. Sunlight
II. Plants
III. Water
IV. Animals
V. Soil
VI. Insects
The natural environment components can be classified into two
Abiotic components
These components are not living but can support other living organisms. Some kinds of such organisms are given below:
Biotic components
The area in which life is possible is called as a biosphere. All living organism in the biosphere depends upon one another and these organisms exist in the biosphere forming the following community.
So for the given conditions:
Size of each character is 1 byte. Hence, the character array of size 20 is 20 bytes.
Execution section in PL/SQL block always starts with keyword _______.
Execution part is the main and mandatory part which actually executes the code that is written inside it.
This section starts with the keyword 'BEGIN'.
It should be followed either by 'END' or Exception-Handling section if present.
To convert Hexadecimal into Binary
Write each symbol of hexadecimal in 4-bit binary form
B = 1110 = 1011
2 = 210 = 0010
B2 = 10110010
Which of the following statements about circuit switched network is true?
In circuit switched network if the resources are reserved, are kept reserved till the user disconnects which wastes the resources because the user cannot use the resources fully al the time.
T-SQL basically stands for " Transact-SQL." This is the extension of Structured Query Language (SQL) that is used in Microsoft.
Which of the following PL/SQL component stores data?
PL/SQL block has the actual PL/SQL code.
PL/SQL engine is the component where the actual processing of the codes takes place.
Database server is the most important component of Pl/SQL unit which stores the data.
Which layer of the atmosphere has the maximum concentration of Ozone gas?
An increase in which of the following gases leads to global warming?
Who among the following authored the book 'The Golden Threshold'?
Which mirror is used by doctors to examine the eyes, ears, nose, and throat?
Which of the following command prints the last 10 lines of a file by default?
The tail command is a command-line utility for outputting the last part of files given to it via standard input. It writes results to standard output. By default, tail returns the last ten lines of each file that it is given.
The Output of the assembler in machine codes is generally referred as
Input to an assembler is the source program and assembler converts it into object program.
Generally, TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because
UDP is much faster. TCP is slow as it requires 3-way handshake. The load on DNS servers is also an important factor. DNS servers (since they use UDP) don’t have to keep connections.
DNS requests are generally very small and fit well within UDP segments.
UDP is not reliable, but reliability can be added on the application layer. An application can use UDP and can be reliable by using a timeout and resend at the application layer.
What is the tagline for ‘Pradhan Mantri Krishi Sinchayee Yojana’?
LAN Topology contains Bus, star, and rings.
A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.
In networking a bus is the central cable i.e. the main wire that connects all devices on a local area network (LAN).
A ring topology is a topology for a Local Area Network (LAN) in which every device has exactly two neighbors for communication purposes.
Sharing business information, maintaining business relationships and conducting business transactions using computers connected to a telecommunication network is called E-Commerce
It can be classified as:
BUSINESS TO BUSINESS (B2B)
BUSINESS TO CUSTOMER (B2C)
CUSTOMER TO CUSTOMER (C2C)
The simplified Boolean expression for Z = (X + X) (X + Y’) is:
The given Boolean function can be simplified as :
Z = (X + X) (X + Y’)
Z = X ( X + Y’)
Z = X + XY’
Z = X ( 1 + Y’)
Z = X
Twisting of cables in twisted pair cable is done to:
Ramon Magsaysay Award is named after the former President of ________.
CRC is used in digital networks and storage devices to detect accidental changes to raw data.
Error detection at the data link layer is achieved by cyclic redundancy codes which means adding extra bits for detection errors at the destination.
Which of the following data structure stores items in ‘key-value’ pairs?
Java HashMap is a hash table-based implementation of Java’s Map interface.
It is a collection of key-value pairs. It maps keys to values.
A HashMap cannot contain duplicate keys.
Java HashMap allows null values and the null key.
What is the process of digital communication where a threshold value is set at the receiver to reduce noise?
In digital data transmission, the transmitted bit undergoes attenuation with the distance.
Also, the effect of noise may alter the voltage levels of the transmitted bit
Thus, a threshold voltage is set at the receiver to decide whether the received bit is 0 or 1
Example:
Suppose the voltage level of transmitted bit for logic 1 is 5V
And for logic 0 is 0 V
Now threshold Voltage is set at 2.5 V
If the received voltage level is greater than 2.5 V bit is decoded as 1 else 0
Which key is used to move from one column to another without using the mouse in Excel?
Tab key is used to move from one column to the next.
A web browser is a software application used to locate, retrieve and display content of Web pages, images, video and other files. The browser contacts the Web server and requests information and Web server sends the information back to the Web browser which displays the results on the computer.
e.g. Internet Explorer, Firefox, Google Chrome, Opera, Netscape, Safari
Hypertext Markup Language is the standard markup language for creating web pages and web applications.
The uncompress command will restore files to their original state after they have been compressed using the compress command.
If no files are specified, the standard input will be uncompressed to the standard output.
Various guided media and unguided media are shown:
In networks, a small message used to pass between one station to another is known as ________
Token ring local area network (LAN) technology is a communications protocol for local area networks. It uses a special three-byte frame called a "token" that travels around a logical "ring" of workstations or servers.
All are the above are properties of JAVA.
Polymorphism: A call to a member function will invoke a different function depending on the type of object that invokes the function.
Inheritance is forming a new class from an existing class. It helps to reuse code.
Java’s multithreading system is built upon the Thread class, its methods, and its companion interface, Runnable.
_______ uses garbage collection to automatically handle allocating memory.
Garbage collection is the method Java uses to automatically handle allocating memory.
Java uses two types of garbage collection tools.
One is compaction, which is merely another word for defragmenting memory.
Marking and sweeping is the other technology Java uses as part of its garbage collection tools. Marking and sweeping is a recursive process that marks objects in use; if at the end of this marking an object is not marked, it is swept or destroyed.
The <h1> to <h6> tags are used to define HTML headings.
<h1> defines the most important heading. <h6> defines the least important heading.
h1 is a largest heading
h6 is a smallest heading
What is the total number of comparison in a bubble sort for ‘n’ elements?
Bubble sort algorithm requires a pair of nested loops. The outer loop must iterate once for each element for the given elements i.e. n times while the inner loop iterates n times for first iteration, n-1 times for the second iteration, n-2 times for the third iteration and this process continues.
Total number of comparison = (n – 1) + (n - 2) + (n - 3) + … = n(n - 1)/2
Chlorofluorocarbons which damage the ozone layer of the atmosphere are not used in which of the following?
Which Pass connects the Kashmir valley with the Deosai Plains of Ladakh?
SQL is only categorized in three languages: DDL, DML, and Data Control Language
The set of relations in a database must be specified to the system by means of a data-definition language (DDL).
DML (Data Manipulation Language) – is used for manipulating the database. Manipulation means insert, modify, delete or query the data in the database. It enables users to access or manipulate the data as organised by the appropriate data model.
DCL (Data Control Language) which includes commands that are mostly concerned with rights, permissions and other controls of the database system.
The following equation is a representation of which law?
A modem (modulator-demodulator) is a network hardware device that modulates one or more carrier wave signals to encode digital information for transmission and demodulates signals to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data.
What are the duties of system administrator?
I. Monitor system performance
II. setup and maintaining an account
III. Monitor network communication
The person who is responsible for setting up and maintaining the system or server is called as the system administrator.
Responsibilities:
Which of the following is used in the form of an electrolyte of the dry cell (battery)?
Which of the following is not a primitive data type in C?
The data type of a variable is an attribute that tells what kind of data that variable can have.
Data types can be divided into two major categories:
1. Primitive data type (predefined)
2. Non - primitive data type (user defined)
Primitive data type:
It is predefined types of data, which are supported by the programming language. For example, int, char, double, string etc. are all primitive data types.
Non - primitive data type:
They are not defined by the programming language but are instead created by the programmer.
For example, objects, interfaces etc.
Which quantum number is associated with the angular momentum of the electron?
Which of the following type of information is less structured?
Types of information:
STRATEGIC: Needed for long-range planning and directions. This is less structured.
TACTICAL: Needed to take short-range decisions to improve profitability and performance.
OPERATIONAL: Needed for day to day operations of the organization. Eg: Daily Sales, Billing.
STATUTORY: Needed by law to sent to government authorities. Eg: Sales tax return
______ can be used to connect two or more service providers.
NAP is a public network exchange facility where Internet Service Providers (ISPs) can connect with one another in peering arrangements. The NAPs are a key component of the Internet backbone because the connections within them determine how traffic is routed.
The rotational effect of an applied force can be measured by ________.
CTRL + D closes the command line shell. This sends an EOF (End of file) marker to shell, and shell exits when it receives this marker. This is similar to running the exit command.