0% found this document useful (0 votes)
16 views

Final It Exam Answer Key

FINAL

Uploaded by

basantbansod25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Final It Exam Answer Key

FINAL

Uploaded by

basantbansod25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Information Technology – 2016

(Final Model Answer Key)


Q.No: 1 Which of the following algorithms is based on divide-and-conquer paradigm?
A Heapsort
B Dijkstra's algorithm
C Insertion sort
D Merge sort

Q.No: 2 Considering a sequence of n numbers; select the option that applies.

A Running time of quick sort algorithm in worst case is

B Searching in Binary search requires time in worst case when the array is
sorted

C Average case running time of insertion sort is .

D Best case running time of insertion sort is

Consider the following polynomial of degree d:

Q.No: 3

then we have

A f(n) =

B f(n) =

C f(n) =
D All are correct

Q.No: 4 Which of the following problems can be solved using greedy approach?
Finding the shortest path between a pair (s, d) of vertices in a weighted undirected
A
graph. Assuming that every weight is positive.
B Fractional knapsack problem
C A problem which exhibits optimal substructure property.
D All are correct

Q.No: 5 Which of the following data structures is used to implement recursion?


A Priority Queue
B Array
C Stack
D None of these are correct

Q.No: 6 The ___________ data structure is used in Breadth-first-search algorithm


A Queue
B Binary search tree
C Stack
D Graph

Q.No: 7 Which is not a correct statement for binary heap data structure with n nodes?
A It can be efficiently implemented using array data structure.
B It can be used to design a sorting algorithm.
C Both insertion and deletion operations can be performed in constant time.

D Its height is .

Q.No: 8 Select the incorrect statement


The two most common representation of graph are: adjacency lists and adjacency
A
matrices.
B Every tree is also a graph.
C A tree is a minimally connected graph.
Kruskal's minimum cost spanning tree algorithm some times gives incorrect result
D
when the weights are assigned to the edges are not distinct.

Q.No: 9 Select the odd one out:


A AVL trees
B Array
C Binary search trees
D Clique

The running time of an algorithm A is described by the recurrence T(n) = 7T(n/2)+ n2. A

Q.No: 10 competing algorithm has a running time of Determine the largest


integer value for a such that is asymptotically faster than A.
A 6
B 8
C 5
D None of these are correct

Rank the functions: n2, lg50(n), nlg(n) by order of growth; that is, find an arrangement g1,
Q.No: 11
g2, g3 of the functions satisfying g1= Ω(g2), g2 =Ω(g3).
A n2, lg50(n), ,nlg(n)
B lg50(n),n2, nlg(n)
C n2, nlg(n), lg50(n),
D lg50(n),nlg(n), n2

Q.No: 12 Which one is a constant time algorithm?


A Algorithm for accessing an element in a linked list.
B Algorithm push() for storing an element onto a stack
C Binary search algorithm
D Algorithm for deleting an element from an array

Q.No: 13 The time complexity of any comparison sorting algorithm will be


A (n)
B (n lg n)
C (lg n)

Q.No: 14 A binary search tree is generated by inserting in order the following integers:
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left subtree and right subtree of the root respectively is
A (7, 4)
B (4, 7)
C (6, 5)
D (8, 3)

For merging two sorted lists of sizes m and n into a sorted list of size m+ n, we require
Q.No: 15
comparisons of
A O(mn)
B O(log(m + n))
C O(log m)+ O(log n)
D O(m + n)

Q.No: 16 A binary tree T has n leaf nodes. The number of nodes of degree >1 in T is
A n-1
B n
C log2 n
D 2n

The solution of following recurrence relation is

Q.No: 17

A T(n) = ( log n)

B T(n) = (log n)

C T(n) = ( )

D T(n) = (n log n)

Consider the two functions f(n) = n, and g(n) = n1+Sin n, then select the correct answer for
the statements:
Q.No: 18
I.f(n) = (g(n))
II.g(n) = O(f(n))
A Both I and II are true.
B Both I and II are false.
C Only I is true
D Only II is true

Q.No: 19 The number of 1s in the binary representation of (3×4096+15×256+5×16+3)are


A 12
B 8
C 9
D 10

The correct matching for the following pair is

Q.No: 20

A a-IV, b-I, c-III, d-II


B a-II, b-I, c-IV, d-III
C a-II, b-I, c-III, d-IV
D a-I, b-III, c-II, d-IV

Q.No: 21 Which of the following statements is not correct?


System software is a computer software designed to provide services to other
A
software.
B System software is mainly involved with running the computer.
C Application software performs specific tasks for the computer user.
D Microsoft Word is an example of system software

Q.No: 22 The multiplication of binary number 1100 to itself is


A 10010000
B 11110011
C 10101010
D 11110000
Q.No: 23 The stored-program conceptis usually attributed to the
A Alan Turing
B John von Neumann
C John Mauchly
D John Eckert

Q.No: 24 Which of the following statements is not correct?


A DRAM is made with cells that store data as charge on capacitors
B SRAM is a digital device that uses the same logic elements used in the processor.
C One of the most widely used forms of DRAM is SDRAM
D Traditional DRAM is synchronous.

Q.No: 25 Which is not true about cache memory?


A The cache contains a copy of portions of main memory.
In three-level cache (i.e., L1, L2, and L3) organization, L2 cache is larger than the
B
L1 cache.
C The cache is usually visible to the programmer.
D The cache memory is intended to give memory speed.

Consider the following statements


(I) A bus is a communication pathway connecting two or more devices.
Q.No: 26 (II) Typically, a bus consists of single communication pathway.
(III) A bus that connects major computer components (processor, memory, I/O) is called a
system bus.
A I and II are correct
B I and III are correct
C All are correct
D Only III is correct

The most important floating-point representation is defined in IEEE Standard 754, adopted
Q.No: 27
in
A 1985
B 1990
C 1970
D 1991

Consider the following statements


Q.No: 28 (I) For the base-2 system we have two types of complements 2's and 1's.
(II) For the base-10 system we have two types of complements 10's and 9's.
A Both I and II are not correct
B Only II is correct
C Both I and II are correct
D Only I is correct

Q.No: 29 A thread
A Is a basic unit of CPU utilization
B Can be in ready, blocked, running, or terminated states
C Is used to implement virtual memory
Both (Is a basic unit of CPU utilization & Can be in ready, blocked, running, or
D
terminated states) are correct

Q.No: 30 A major problem with priority scheduling algorithm is


A Starvation
B To decide priority
C Thrashing
D Both (To decide priority & Thrashing) are correct

Observe the following statements and select the correct option:


(I) A time-shared operating system allows the many users to share the computer
simultaneously.
Q.No: 31
(II) Context-switch times are highly dependent on hardware support.
(III) Software may trigger an interrupt by executing a system call
(IV) The delay between job submission and job completion is called turnaround time.
A I and IV are correct
B I, II and IV are correct
C Only IV is correct
D All are correct
Q.No: 32 Each process is represented in the operating system by a PCB. Here PCB stands for
A Program Control Block
B Process Control Block
C Process Communication Block
D Printed Circuit Board

Q.No: 33 The mechanism that brings a page into memory when it is needed is called
A Segmentation
B Fragmentation
C Demand Paging
D Page Replacement

Q.No: 34 Select the odd one out


A Mutual exclusion
B Banker's algorithm
C Hold and wait
D Circular wait

Which of the following statements is/are correct


(I) A semaphore is a synchronization tool.
(II) One of the methods for dealing with deadlocks is: allow the system to enter deadlock
Q.No: 35 state and then recover.
(III) A situation where processes wait indefinitely within the semaphore is called deadlock.
(IV) A segment of code, in which the process may be changing common variables, updating
a table, writing a file, and so on is called control section.
A I and II
B II and III
C I and IV
D I, II and IV

Q.No: 36 Which directory system is used in most operating systems?


A Single level directory structure
B Two level directory structure
C Tree directory structure
D Acyclic directory structure

____________ provides a mechanism to allow processes to communicate and to


Q.No: 37
synchronize their actions.
A PCB
B LWP
C LRU
D IPC

Q.No: 38 Dirty bit for a page in a page table


A Helps avoid unnecessary writes on a paging device
B Helps maintain LRU information
C Allows only read on a page
D None of these are correct

A feasibility study is a short, focused study that aims to answer a number of questions
Q.No: 39
including
Can the system be implemented using current technology and within given cost
A
and schedule constraints?
B Does the system contribute to the overall objectives of the organization?
C Can the system be integrated with other systems which are already in place?
D All are correct

Which of the following statements is correct?


(I) Requirements validation is concerned with showing that the requirements actually define
Q.No: 40 the system that the customer wants.
(II) In consistency checks, it is ensured that the requirements in the document should not
conflict.
A Only I
B Both I and II
C Only II
D Both I and II are not correct
Observe the following statements, and select the correct option that applies.
(I) Data-flow diagrams are a way of representing function oriented systems.
(II) Data-flow diagrams are also called flow-charts.
Q.No: 41
(III) In data-flow diagrams each round-edged rectangle represents a function that
implements some data transformation.
(IV) In data-flow diagrams Files or Data stores are represented as round-edged rectangles.
A I, II and IV are correct
B II and III are correct
C I and III are correct
D II and IV are correct

Pick-up the option that is not correct in connection with the software system requirements
Q.No: 42
classification
A Functional requirements
B Domain requirements
C Non-functional requirements
D None of these

Q.No: 43 The correct sequence of phases in software development process is


Requirements definition, System and software design, Implementation and unit
A
testing, Integration and system testing, Operation and maintenance
Requirements definition, System and software design, Integration and system
B
testing, Implementation and unit testing, Operation and maintenance
Requirements definition, Implementation and unit testing, System and software
C
design, Integration and system testing, Operation and maintenance
System and software design, Requirements definition, Implementation and unit
D
testing, Integration and system testing, Operation and maintenance

Considering the statements below select the correct option that applies
(I) Software project management is an essential part of software engineering.
Q.No: 44 (II) Good management cannot guarantee project success.
(III) Bad management usually results in project failure.
(IV) Software managers are responsible for planning and scheduling project development.
A I and III are correct
B I, III and IV are correct
C III and IV are correct
D All are correct
Which of the following statements is/are not correct?
(I) Quality plan describes developing the skills and experience of the project team
Q.No: 45 members.
(II) Maintenance plan describes the approach, resources and schedule for system
validation.
A II
B I and II
C I
D No sufficient information given to decide

Match the pairs

Q.No: 46

A I-c, II-b, III-a


B I-b, II-a, III-c
C I-a, II-b, III-c
D I-a, II-c, III-b

Q.No: 47 An IPv6 address consists of ________ bytes


A 4
B 8
C 16
D None of these are correct

Read the following statements and select the option that applies
(I) An IP address does not actually refer to a host
Q.No: 48 (II) An IP address refers to a network interface
(III) If a host is on two networks, then also it must have only one IP address
(IV) Routers have multiple interfaces and thus multiple IP addresses
A I, II and IV are correct
B II, III and IV are correct
C I, II and III are correct
D All are correct
Q.No: 49 In slotted ALOHA, the vulnerable time is ______ the frame transmission time.
A three times
B two times
C the same as
D None of these are correct

Q.No: 50 IEEE 802.3 is popularly called


A WiFi
B HTTP
C OSI model
D Ethernet

In Ethernet addressing, if the least significant bit of the first byte in a destination address is
Q.No: 51
0, the address is
A Multicast
B Unicast
C Broadcast
D None of these are correct

Q.No: 52 The entire host name has a maximum of


A 255 characters
B 127 characters
C 63 characters
D 31 characters

Select a correct answer while considering the following statements


(I) Socket interface is an API designed for communication.
(II) Socket interface started at UC Berkeley as a part of UNIX environment.
Q.No: 53
(III) As far as the application layer is concerned, communication between a client process
and server process is communication between two sockets, created at two ends.
(IV) Socket address is same as IP address.
A I, II and IV are correct
B I and III are correct
C All are correct
D I, II and III are correct

Q.No: 54 URL stands for


A Unique Resource Locator
B Uniform Resource Locator
C User Request Loader
D None of these are correct

Q.No: 55 If the HTTP protocol is used for accessing the web page, the well-known port number is
A 125
B 25
C 80
D 81

Q.No: 56 Which of the followings is not a FTP command?


A RNTO
B ABOR
C RETR
D None of these are correct

Q.No: 57 The access method in Bluetooth is


A TDD-TDMA
B FDMA
C CDMA
D None of these are correct

Q.No: 58 Wi-Fi is an abbreviation for


A Wireless Field
B Wireless Frequency
C Wireless Fidelity
D None of these are correct

Consider the following statements and select the correct option that applies
(I) DNS stands for Domain Name Server.
Q.No: 59
(II) To identify an entity, TCP/IP protocols use the IP address
(III) TCP/IP uses a DNS client and a DNS server to map a name to an address.
A All are correct
B II and III are correct
C I and II are correct
D Only III is correct

International Standards Organization Open Systems Interconnection Reference Model has


Q.No: 60
______ layers.
A 5
B 6
C 7
D 4

Q.No: 61 Which of the following codes is not an error-correcting code?


A Hamming
B Reed-Solomon
C Binary convolutional
D Checksums

Q.No: 62 Which layer is concerned with the syntax and semantics of the information transmitted?
A Presentation Layer
B Session Layer
C Transport Layer
D Network Layer

Consider the following statements, and select the correct option.


Q.No: 63 (I) SMTP was originally specified as RFC 821
(II) SMTP is short for Simple Message Transfer Protocol
(III) The message transfer agents are typically system processes
(IV) SMTP is short for Short Message Transfer Protocol
(V) SMTP is short for Simple Mail Transfer Protocol.
A I, III and IV are correct
B II and III are correct
C I, III and V are correct
D Only V is correct

Q.No: 64 Which one of the following is not a client server application?


A Internet chat
B Web browsing
C E-mail
D Ping

Consider the following statements


(I) A database is a file that is organized for storing data.
Q.No: 65
(II) There are many different database systems which are used for a wide variety
ofpurposes including: Oracle, MySQL, and Microsoft SQL Server.
A I and II are true
B II is true
C I is true
D I and II are false

In technical descriptions of relational databases the concepts of table, row, and columnare
Q.No: 66
more formally referred to as
A relation, attribute, and tuple, respectively
B tuple, relation, and attribute, respectively
C relation, tuple, and attribute, respectively
D None of these are coorect

Consider the following statements, and select the correct option that applies
(I) The duplication of string data violates one of the best practices for database
normalization which basically states that we should never put the same string data in the
Q.No: 67
database more than once.
(II) If we need the data more than once, we create a numeric key for the data and
reference the actual data using this key.
(III) In practical terms, a string takes up a lot more space than an integer on the disk and
in the memory of our computer, and takes more processor time to compare and sort.
A III is true
B I and II are true
C I and III are true
D All are true

Q.No: 68 The 4NF and BCNF differ in the usage of


A Multi-valued dependencies
B Functional dependencies
C Both (Multi-valued dependencies & Functional dependencies)
D Neither (Multi-valued dependencies nor Functional dependencies)

Q.No: 69 An entity that exists independently of other entity types is called


A Identifying owner
B Strong entity type
C Weak entity type
D None of these are correct

Match the pairs


(I) An attribute that uniquely identifies each
(a) Entity integrity
row in a relation
(II) A primary key that consists of more
(b) Foreign key
Q.No: 70 than one attribute
(III) An attribute in a relation of a database
that serves as the primary key of another (c) Composite key
relation in the same database
(IV) No primary key attribute can be null (d) Primary key

A I-d, II-c, III-b, IV-a


B I-d, II-b, III-c, IV-a
C I-b, II-c, III-a, IV-d
D I-a, II-c, III-d, IV-b

Q.No: 71 Consider the following statements


(I) The attributes of a relation that are declared to be a Primary key can be null.
(II) The attributes of a relation that are declared to be a Primary key must be nonnull.
(III) The attributes of a relation that are declared to be a Primary key are required to be
unique.
(IV) To remove a relation from an SQL database, we use delete table command.
A I and III are true
B II, III and IV are true
C II and III are true
D III and IV are true

Q.No: 72 Which of the following statements is correct?


A The SQL-92 standard does not include triggers.
B System does not execute triggers automatically.
C We define a view in SQL using the define view command.
D Python is one of the database languages

Q.No: 73 Which is not an ACID property?


A Durability
B Consistency
C Atomicity
D Integrity

Consider the following statements for selecting the correct option.


(I) Commit work: commits the current transaction and begins a new one.
Q.No: 74
(II) Rollback work: causes the current transaction must be undone.
(III) The Keyword "work" is optional in in both I and II statements.
A I and II are true
B I, II and III are true
C Only I is true
D Only II is true

Q.No: 75 Which of the following options is correct?


A DBA is a software
B Physical data models are used to describe data at the logical level.
C The term "schema" refers to the organization of data as a blueprint of how the
database is constructed.
D Database systems are not designed to manage large bodies of information.

Q.No: 76 The natural join R*R of a relation R with n tuples will result in how many tuples?
A n2 tuples
B n tuples

C tuples
D None of these are correct

Q.No: 77 Which of the following is not an aggregate function?


A count
B sum
C avg
D total

Consider the set of relation


EMP (Employee_no,Dept_no, Employee_name, salary)
DEPT (Dept_no, Dept_name, location)
Q.No: 78
An SQL query to find all employee names who work in the departments located at "Indore"
and whose salary is greater than Rs. 50,000 is
select Employee_name from EMP, DEPT where location = 'Indore' and
A
salary>50000 and EMP.Dept_no =DEPT.Dept_no
select Employee_name from EMP, DEPT where location = 'Indore' and
B
salary>50000 and EMP Dept_no = DEPT Dept_no
select Employee_name from EMP, DEPT where location = 'Indore' and
C
salary>50000 where EMP.Dept_no = DEPT.Dept_no
select Employee_name from EMP, DEPT where location = 'Indore' and
D
salary>50000

Consider the relation


EMP (Employee_no,Dept_no, Employee_name, salary)
Q.No: 79
What will be the output when the following SQL query is executed?
select * from EMP
A It will produce an error.
B It will display only first row from the EMP table.
C It will count the number of records in the EMP table.
D It will display all records from the EMP table.

Consider the relation


DEPT (Dept_no, Dept_name, location)
Q.No: 80
What will be the output when the following SQL query is executed?
select count (*) from DEPT
A It will return the amount of memory space currently used by the relation DEPT.
B It will display the number of columns in the relation DEPT.
C It will display the number of tuples in the relation DEPT.
D It will produce an error.

Q.No: 81 Which SQL command is used to modify attribute values of one or more selected tuples?
A DELETE
B UPDATE
C INSERT
D None of these are correct

Q.No: 82 ER Model stands for


A Entity-Related Model
B Entity-Relational Model
C Entity-Relation Model
D Entity-Relationship Model

Consider the following statements and select the option that applies.
(I) Objects are the basic run-time entities in an object oriented system.
(II) Objects take up space in the memory and have an associated address like a structure in
Q.No: 83 C.
(III) When program is executed, the objects do not interact by sending message to one
another.
(IV) Classes are known as Abstract Data Types.
A I, II and IV are true
B I and II are true
C I, II and III are true
D All are true
What is the output of the following C program when executed?

#include<stdio.h>

#include<conio.h>

void main()

Q.No: 84 int a=20,b=25,z;

clrscr();

z=(a-b)>=0?a:b;

printf(“%d”,z);

getch();

}
A 20
B 5
C 25
D It will produce an error.

Consider the following statements


(I) C and C++ are high level programming languages.
(II) C is a procedure-oriented programming language.
Q.No: 85
(III) A major advantage with the procedural approach is that it models real world problems
very well.
(IV) In object oriented programming emphasis is on data rather than procedure.
A II and IV are true
B I, II and IV are true
C I, II, and III are true
D All I, II, III and IV are true

What is the output of the following C code?

#include<stdio.h>
Q.No: 86
#include<conio.h>

void main()
{

float f=5.6;

clrscr();

printf(“The value of f is:%5.2f”,f);

getch();

}
A The value of f is: 5.60
B The value of f is: 5.6
C The value of f is:5.60
D It will give an error

Q.No: 87 An exception is caused by


A A hardware problem
B A problem in the operating system
C A syntax error
D A run-time error

What is the output of the following C program?

#include<stdio.h>

void main(){

int j=0, k=0;

int p, q;

for(p=0; p<2; p++){


Q.No: 88
j++;

for(q=0;q<2;q++)

k++;

printf("%d\t%d",j,k);

}
A 24
B 44
C 22
D 00

Consider the following C code

#include<stdio.h>

void main()

Q.No: 89 int n=5,i;

for(i=1;i<=n;i++);

printf("Hello\n");

How many times "Hello" is printed?


A 5
B 6
C 1
D Error

Q.No: 90 Which of the following keywords was added by ANSI C++?


A enum
B using
C extern
D virtual

What values for a and b, respectively the following program will print, if the "Call by
reference" parameter transmission technique is followed?

#include<stdio.h>

Q.No: 91 void swap(int *,int *);

void main()

{
int a = 10, b = 5;

swap(&a, &b);

printf("%d, %d", a, b);

void swap(int *a, int *b) {

int temp;

temp = *a;

*a = *b;

*b = temp;

}
A 5, 10
B 5, 5
C 10, 5
D 10, 10

Consider the following statements


(I) A constructor is a special member function whose task is to initialize the objects of its
class.
Q.No: 92
(II) The constructor is invoked whenever an object of its associated class is created.
(III) Constructors can be "virtual".
(IV) Constructors can have default arguments.
A I and II are true
B II and IV are true
C I, II and IV are true
D All are true

Q.No: 93 Reusability in C++ can be achieved by


A Polymorphism
B Dynamic Binding
C Polymorphism and Dynamic Binding
D Inheritance
What is the output of the following code segment?

main(){

Q.No: 94 int j;

for(j=0;j++ <=4;printf("%d\t",j));

}
A 0123
B 1234
C 12345
D 01234

Consider the following C++ statements


(I) intmul(int i , int j=5, int k=10);
Q.No: 95 (II) intmul(int i=5 , int j);
(III) intmul(int i=0 , int j, int k=10);
(IV) intmul(int i=2 , int j=5, int k=10);
A Only IV is legal
B II and IV are legal
C I and IV are legal
D All are legal

Q.No: 96 Which of the following statements is correct?


A In C language we can write a recursive function.
B In C++ we cannot write a recursive function.
C C language is a superset of C++.
D C++ programs are interpreted instead of compilation.

What will be the output of the following C program?

#include<stdio.h>

#include<alloc.h>
Q.No: 97
void main()

struct node
{

int data;

struct node *link;

};

struct node *p, *q;

p = malloc(sizeof(struct node));

q = malloc(sizeof(struct node));

printf("%d %d", sizeof(p),sizeof(q));

}
A 12 12
B 88
C 16 16
D None of these are correct
Question Deleted

Consider the following statements


(I) A private member of a class cannot be inherited either in public mode or in private
Q.No: 98 mode.
(II) A public member inherited in private mode becomes private in derived class.
(III) A class can contain objects of other classes.
A I and II are true
B II and III are false
C All are false
D All are true

Q.No: 99 Which of the following statements is correct?


A Scope resolution operator can be overloaded in C++.
B "friend" is not a keyword in C++.
C Inline expansion may not work if "inline" functions are recursive.
D Inline expansion works efficiently if functions contain static variable.
What will be the output of the following C program?

#include<stdio.h>

void main()

Q.No: 100 static int b[] = {10, 20, 30, 40, 50};

int i;

for(i = 0; i<= 4; i++)

printf("%d ",i[b]);

}
A 1010 2020 3030 4040 5050
B 10 20 30 40 50
C 12345
D Error

You might also like