AFCAT Exam  >  AFCAT Tests  >  Full Test 2 - EKT CSE - AFCAT MCQ

Full Test 2 - EKT CSE - AFCAT MCQ


Test Description

30 Questions MCQ Test - Full Test 2 - EKT CSE

Full Test 2 - EKT CSE for AFCAT 2024 is part of AFCAT preparation. The Full Test 2 - EKT CSE questions and answers have been prepared according to the AFCAT exam syllabus.The Full Test 2 - EKT CSE MCQs are made for AFCAT 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Full Test 2 - EKT CSE below.
Solutions of Full Test 2 - EKT CSE questions in English are available as part of our course for AFCAT & Full Test 2 - EKT CSE solutions in Hindi for AFCAT course. Download more important topics, notes, lectures and mock test series for AFCAT Exam by signing up for free. Attempt Full Test 2 - EKT CSE | 50 questions in 45 minutes | Mock test for AFCAT preparation | Free important questions MCQ to study for AFCAT Exam | Download free PDF with solutions
Full Test 2 - EKT CSE - Question 1

Two trains 120 m and 80 m in length are running in opposite directions with velocities 42 kmph and 30 kmph. In what time they will cross each other?

Detailed Solution for Full Test 2 - EKT CSE - Question 1

Relative velocity of one train w.r. to other

= 42 – (-30) (as both are in opposite direction)

= 72 kmph = 20 m/sec

Total distance to be covered by each train to cross other train = 120 + 80 = 200 m

Time taken by each train to cross other train = 200/20 = 10 sec

Full Test 2 - EKT CSE - Question 2

What should be the velocity of a sound source moving towards a stationary observer so that apparent frequency is double the actual frequency (Velocity of sound is v)

Detailed Solution for Full Test 2 - EKT CSE - Question 2

By using

1 Crore+ students have signed up on EduRev. Have you? Download the App
Full Test 2 - EKT CSE - Question 3

The Doppler's effect is applicable for

Detailed Solution for Full Test 2 - EKT CSE - Question 3

Doppler’s effect is applicable to both light and sound waves. According to Doppler’s effect, whenever there is a relative motion between a source of sound and listener, the apparent frequency of sound heard by the listener is different from the actual frequency of sound emitted by the source.

Apparent frequency,

Full Test 2 - EKT CSE - Question 4

A man can see clearly upto a distance of 2 m and not more than that. What will be the power of lens he should use for clear vision?

Detailed Solution for Full Test 2 - EKT CSE - Question 4

As the man can see upto 2 m, so has short sight. So he has to use concave lens to see far and focal length of that lens will be such that the image of any object will set at distance of 2 m from eye.

u = ∝,v = 2m = 200cm,f = ?
From equation of lens, 
⇒ f = 200 cm
So the power of lens, 

Full Test 2 - EKT CSE - Question 5

Wavelength and frequency are related as: (c = speed of light)

Detailed Solution for Full Test 2 - EKT CSE - Question 5

It is usually written as wavelength = c / frequency.

Full Test 2 - EKT CSE - Question 6

In Wheatstone's bridge P = 9 ohm, Q = 11 ohm, R = 4 ohm and S = 6 ohm. How much resistance must be put in parallel to the resistance S to balance the bridge

Detailed Solution for Full Test 2 - EKT CSE - Question 6


For balancing the bridge:

Full Test 2 - EKT CSE - Question 7

In an iso-thermal process, the internal energy of gas molecules ________.

Detailed Solution for Full Test 2 - EKT CSE - Question 7

Isothermal process {u = f(T) only}

As temperature is constant in isothermal process so the internal energy also remains constant.

That’s why in an isothermal process the heat transfer is equal to the work transfer.

Full Test 2 - EKT CSE - Question 8

Faraday’s law says that

Detailed Solution for Full Test 2 - EKT CSE - Question 8

It states that the magnitude of emf induced in the coil is equal to the rate of change of flux that linkages with the coil. The flux linkage of the coil is the product of number of turns in the coil and flux associated with the coil.
Magnetic flux: ϕB=BAcosθwhere θ is angle between B and the normal to the plane.
Induced EMF: 

Full Test 2 - EKT CSE - Question 9

A page fault

Detailed Solution for Full Test 2 - EKT CSE - Question 9

A page fault is a type of interrupt, called trap, raised by computer hardware when a running program accesses a memory page that is mapped into the virtual address space, but not actually loaded into main memory. The hardware that detects a page fault is the processor's memory management unit (MMU), while the exception handling software that handles page faults is generally a part of the operating system kernel. When handling a page fault, the operating system generally tries to make the required page accessible at the location in physical memory, or terminates the program in case of an illegal memory access.

Full Test 2 - EKT CSE - Question 10

In networking, UTP stands for

Detailed Solution for Full Test 2 - EKT CSE - Question 10

Unshielded twisted pair is a type of cable that consists of two unshielded wires twisted around each other. Due to its low cost, UTP cabling is used extensively for local-area networks (LANs) and telephone connections.

Full Test 2 - EKT CSE - Question 11

Which of the following has same representation for +0 and -0 ?

Detailed Solution for Full Test 2 - EKT CSE - Question 11

Signed Magnitude: +0 = 0000 and -0 = 1000

One’s Complement: +0 = 0000 and -0 = 1111

Two’s Complement: +0 = 0000 and -0 = 0000

Full Test 2 - EKT CSE - Question 12

What is the 2’s and 1’s complement of -7 respectively?

Detailed Solution for Full Test 2 - EKT CSE - Question 12

Step 1: write 7 in binary i.e 0111

For 1’s complement:

Reverse all the bits i.e 0 to 1 and 1 to 0.

For 2’s complement:

Starting from unit’s digit, whenever the 1st ‘1’ is encountered write it as it is and then take reverse of the remaining bits. So, 0111 = 1001

Full Test 2 - EKT CSE - Question 13

Which of the following is true about Switch?​

Detailed Solution for Full Test 2 - EKT CSE - Question 13

Switches are network devices that operate on layer-2 of OSI model of communication. Switches are also known as intelligent hubs. Switches operate on hardware addresses to transfer data across devices connected to them. The reason switches are known as intelligent hubs is because they build address table in hardware to keep track of different hardware addresses and the port to which each hardware address is associated.

Full Test 2 - EKT CSE - Question 14

What is the output of the following code fragment ?

#include

int main()

{

 char ch;

 printf(“%d”, sizeof(ch));

 return 0;

}

Detailed Solution for Full Test 2 - EKT CSE - Question 14

sizeof is an operator which yields the memory occupied (in bytes) by its argument.

In c, a char is always 1 byte long, an int is always 4 bytes long and a float is always 4 bytes long.

Since variable ch is char, therefore output is 1.

Full Test 2 - EKT CSE - Question 15

ER model is used in ______ phase.

Detailed Solution for Full Test 2 - EKT CSE - Question 15

Database design involves 4 phases - Requirement collection & analysis phase, conceptual schema (or conceptual database), logical design phase & physical design phase.

ER models are used in conceptual Database design phase. It includes detailed description of the entity types, relationship & constraints.

Full Test 2 - EKT CSE - Question 16

A list of a finite number of homogeneous data elements is known as?

Detailed Solution for Full Test 2 - EKT CSE - Question 16

A array is an ordered list of a finite number of homogenous data elements stored in a continuous memory location. It is called ordered because the elements of the array are arranged so that there is a first, second, third and so on.

Homogenous because it contains single type of data.

Full Test 2 - EKT CSE - Question 17

Which layer of international standard organization’s OSI model is responsible for creating and recognizing frame boundaries?

Detailed Solution for Full Test 2 - EKT CSE - Question 17

Data link layer is responsible for creating and recognizing fame boundaries. This is called as frame delimiting. This is accomplished by attaching special bit patterns at the beginning and end of the frame.

Full Test 2 - EKT CSE - Question 18

The Class C has ________ leading bits.

Detailed Solution for Full Test 2 - EKT CSE - Question 18

leading bits to identify each class are:

Class A - 0

Class B – 01

Class C - 011      

Class D - 0111

Full Test 2 - EKT CSE - Question 19

1⊕1 would give:

Detailed Solution for Full Test 2 - EKT CSE - Question 19

⊕ represents exclusive or in which output is high when either of inputs is high but not both inputs are high.

Truth table of A⊕B

So, 1⊕1 = 0

(A = 1; B = 1)

Full Test 2 - EKT CSE - Question 20

A nibble is

Detailed Solution for Full Test 2 - EKT CSE - Question 20

In computing, a nibble is a four - bit aggregation or half an octet. It is also known as half - byte. In a networking or telecommunication context, the nibble is often called a semi - octet,[6] quadbit.

Full Test 2 - EKT CSE - Question 21

Electronic mail, Electronic messaging and Browsing the World Wide Web are functionality of which of the following layers?

Detailed Solution for Full Test 2 - EKT CSE - Question 21

Functionality of application layer are:

• Support for file transfers

• Ability to print on a network

• Electronic mail

• Electronic messaging

• Browsing the World Wide Web

Full Test 2 - EKT CSE - Question 22

Banker’s algorithm for resource allocation deals with 

Detailed Solution for Full Test 2 - EKT CSE - Question 22

The Banker’s algorithm is a resources allocation and deadlock avoids deadlock by denying or postponing the request if it determines that accepting the requests could put system in an unsafe states.

Full Test 2 - EKT CSE - Question 23

ASCII code for alphabetic character requires …… bits.

Detailed Solution for Full Test 2 - EKT CSE - Question 23

The ASCII table has 128 characters, with values from 0 through 127.

Thus, 7 bits are sufficient to represent a character in ASCII; however, most computers typically reserve 1 byte, (8 bits), for an ASCII character.

One byte allows a numeric range from 0 through 255 which leaves room for growth in the size of the character set, or for a sign bit.

Consequently, a character data type may optionally represent signed values;

However, for now, we will assume that character data types are unsigned, i.e. positive integer values, in the range 0-127.

Full Test 2 - EKT CSE - Question 24

What is the output of the following program ?

#include <stdio.h>

main()

{

   int a , b;

   a = 10;

   printf(“%d”,(a == 1) ? 20: 30 );

   printf(“%d”,(a == 10) ? 20: 30 );

}

Detailed Solution for Full Test 2 - EKT CSE - Question 24

Syntax

expression-1 ? expression-2 : expression-3

In the above symbol expression-1 is condition and expression-2 and expression-3 will be either value or variable or statement or any mathematical expression. If condition will be true expression-2 will be execute otherwise expression-3 will be executed.

Full Test 2 - EKT CSE - Question 25

HTTP port number

Detailed Solution for Full Test 2 - EKT CSE - Question 25

Well known ports are those from O through 1023. 80 is the well known port for http used in the world wide web.

Full Test 2 - EKT CSE - Question 26

IEEE 802.5 topology is called

Detailed Solution for Full Test 2 - EKT CSE - Question 26

In IEEE 802.5, the token passing scheme is used in place of CSMA/CD on a ring topology LAN.
Token Ring local area network (LAN) technology is a communications protocol for local area networks. It uses a special three-byte frame called a "token" that travels around a logical "ring" of workstations or servers. This token passing is a channel access method providing fair access for all stations, and eliminating the collisions of contention-based access methods.
Introduced by IBM in 1984, it was then standardized with protocol IEEE 802.5 and was fairly successful, particularly in corporate environments, but gradually eclipsed by the later versions of Ethernet.

Full Test 2 - EKT CSE - Question 27

If    then the value of xx is

Detailed Solution for Full Test 2 - EKT CSE - Question 27

Full Test 2 - EKT CSE - Question 28

For the function f(x) = x2e-x, where x ∈ [0,2]; the maximum value occurs when x is equal to

Detailed Solution for Full Test 2 - EKT CSE - Question 28

f(x) = x2e-x

fI(x) = x2(-e-x) + e-x × 2x

⇒ fI(x) = e-x(2x-x2)

Putting fI(x) = 0

⇒ e-x (2x – x2) = 0

x(2-x) = 0

⇒ x = 0 or x = 2

∴ x = 0 & x = 2 are the stationary points

fII(x) = e-x(2 - 2x) + (2x – x2) (-e-x)

= e-x (x2 – 4x + 2)

At x = 0, fII(0) = 2 > 0

∴ At x = 2, we have maximum value of f(x).

Full Test 2 - EKT CSE - Question 29

The solution to the ordinary differential equation 

Detailed Solution for Full Test 2 - EKT CSE - Question 29

Auxiliary equation is
m2+5m+6=0

Full Test 2 - EKT CSE - Question 30

 

If 4,3,24,3,2 are the Eigen values of AA. Then find the Eigen values of Adj(A)Adj(A) if detA=24

Detailed Solution for Full Test 2 - EKT CSE - Question 30

If λ123 are the Eigen values of A then Eigen values of Adj A are

View more questions
Information about Full Test 2 - EKT CSE Page
In this test you can find the Exam questions for Full Test 2 - EKT CSE solved & explained in the simplest way possible. Besides giving Questions and answers for Full Test 2 - EKT CSE, EduRev gives you an ample number of Online tests for practice

Top Courses for AFCAT

Download as PDF

Top Courses for AFCAT