2015-07-28

COMPUTER OPERATOR-KIRTADS

EXAM DATE:14-07-2015



1.For Intel Core i3 processor,GMCH is integrated with:

A.South Bridge

B.GPU

C.North Bridge

D.FCH

Ans:C

2.In order to perform a critical task in timeliness,a multimedia system may use which of the following disk scheduling?

A.SSTF

B.SATF

C.Elevator

D.Real Time

Ans:D

3.An omega switching network with n CPU and n memories requires how many switches?

A.(n log2n)/2

B.n/2(n log2n)

C.log2n

D.log2n/2

Ans:A

4.The minimum pit length for a single layer DVD is:

A.500

B.400

C.600

D.250

Ans:B

5.A pipelining system with n segments takes sub operations in a sequence.The time taken to complete a sub operation in each segment is 8 nsec.If the task is completed in 424 nsec,what is the value of n?

A.2

B.8

C.4

D.16

Ans:C

6.In multiprocessor system,a processor generated signal that serves to prevent other processors from using the system bus as long as the signal is active can be called as:

A.Semaphore

B.Pipe

C.Hardware Lock

D.Critical Session

Ans:C

7.At the beginning of an instruction cycle,the content of the Instruction Register is 5 and that of Program Counter is 320.When the instruction is read,the address part of the instruction is the number 7.Then the effective address in relative address mode is:

A.328

B.327

C.325

D.342

Ans:A
8.The return address from a subroutine call is arranged as:

A.Round Robin

B.FIFO

C.LIFO

D.Queue

Ans:C

9.The Bootstrap Leader resides in:

A.Hard Disk

B.Any bootable device

C.RAM

D.ROM

Ans:D

10.The IRQ commonly assigned to Hard Disk Controller is:
A.11

B.12

C.13

D.14

Ans:D

11.For DDR2 type RAM with 8 internal blocks and clock speed 533 MHz,the maximum average periodic refresh rate can be:

A.4.5

B.7.8

C.33.3

D.17.5

Ans:B

12.An operating system written as a set of procedures in which,each can call any other without any reservation is:

A.Virtual System

B.Layered System

C.Distributed System

D.Monolithic System
Ans:D

13.A program in execution state is called as:

A.Shell

B.Process

C.Task

D.Thread

Ans:B

14.A situation in which a multiprogramming system spends more time in page I/O:

A.Shell

B.Process

C.Task

D.Thread

Ans:B

15.Calculate the average access time for the sector of a disk with 512 bytes per sector and 10 ms of average seek time.The disk rotates at a speed of 7200 rpm and transfers data at a rate 4 MB/Sec.The controller overhead is 1 ms.Assume that there is no service time:

A.19.6 ms

B.16.2 ms

C.15.3 ms

D.10.3 ms

Ans:C

16.When a process wants to print a file,it writes the file name in a directory called:

A.Spooler

B.Buffer

C.Daemon

D.Log

Ans:A

17.In a demand paging system,M is the time to access memory,F is ,the average time to service  a page fault.P is the  probability of page fault.Then the effective access time is:

A.P*M+(1-P)*F

B.M+(1-P)*F

C.(1-P)*M+P*F

D.(M+F)*P

Ans:C

18.Externally defined symbols are resolved by:

A.Compiler

B.Linker

C.Loader

D.Lexical Analyser

Ans:B

19.The initial value of a semaphore that ensures only one of the many processes enter the critical session is:

A.0

B.1

C.-1

D.2

Ans:B

20.Debugging a kernel code is a difficult task,because of:

A.Kernel code cannot be  executed easily under a debugger

B.Bugs in a kernel code cannot be traced easily,because it is a set of procedures related to a separate process and there will be a little evidence to track the errors

C.Errors may be hard to reproduce and may collapse the entire system

D.All the above reasons

Ans:D

21.Which of the following HTML tag has an attribute called Frame?

A.<INPUT>

B.<FORM>

C.<FRAMESET>

D.<TABLE>

Ans:D

22.The HTML DOM Event that is triggered automatically when a user enters a web page is:

A.OnLoad

B.OnFocus

C.OnOpen

D.OnShow

Ans:A

23.CORBA programmers can develop distributed application in C++/Java using:

A.Orbix

B.OpalOrb

C.GIOP

D.EJB

Ans:A

24.XML captures Hypertext information using:

A.<A>

B.XLL

C.XLS

D.DTD

Ans:B

25.In DHCP,the UDP port number for sending data to the server is:

A.60

B.62

C.65

D.67

Ans:D

26.Which of the following statement is false?

A.It is not possible to convert an HTML document into an XML document

B.Both XML and HTML are subset of SGML

C.A well formatted XML document need not require DTD

D.CSS works better with XML than with HTML

Ans:A

27.In a style sheet,the style rule from another CSS file can be loaded using:

A. @include

B.@import

C.@attach

D.@load

Ans:B

28.The easiest method for a Web Server program to store the client information in a web browser for future use is:

A.Applet

B.Cookie

C.Template

D.Log file

Ans:B

29.A form of address spoofing resulting in denial of service attack:

A.Session Hijacking

B.Island Hopping

C.Sniffing

D.War Dialing

Ans:A

30.Which of the following is a Javascript debugging method?

A.Window.alert

B.Console.log

C.Document.write

D.Document.getElementById

Ans:B

31.Which of the following statement is false?

A.Samba can play a number of server roles such as a File Server,Print Server,Primary Domain Controller etc.

B.Samba allows to share files with windows host.

C.SWAT requires no web server running

D.SWAT interface cannot be directly accessed from web browser

Ans:D

32.Simplest way to pass data between two Linux programs running in a system is:

A.Socket

B.Pipe

C.Semaphore

D.RPC

Ans:B

33.The Linux command that can be used to search for a pattern matching string in a file:

A.Find

B.Which

C.Grep

D.Search

Ans:C

34.In Redhat Linux,the powerful and secure method for network configuration is:

A.NetBios

B.Netstart

C.IPSec

D.Apache

Ans:B

35.The file system that is the best choice for new installations of Linux is:

A.NTFS

B.EX2

C.EX4

D.JFS

Ans:C

36.In a Linux kernel,two mapping registers are simulataneously used as compatibly mapped buffers for CPU and Peripherals.Then the DMA Mapping is:

A.Consistent Mapping

B.Buffer Mapping

C.Streaming Mapping

D.Scatter Mapping

Ans:A

37.A format that can only archive a group related files into a single file and cannot perform any compression by itself:

A.rar

B.bz2

C.tar

D.gz

Ans:C

38.GNOME Display Manager can be configured by editing:

A.gdm.conf

B.GNOME.conf

C.Xserver.conf

D.XDM.conf

Ans:A

39.The powerful online help system of Linux is:

A.who

B.man

C.more

D.how

Ans:B

40.A Linux tool that can be used to create hard disk partitions only at the time of Linux installation:

A.fdisk

B.cfdisk

C.Disk Mount

D.DRUID
Ans:D

41.The average time required to perform a successful sequential search for an element in a array with n elements:

A.n/2.

B.(n+1)/2

C.(/i-1)/2

D.2n

Ans:B

42.Each node in a tree has a value greater than all values in the left subtree and has a value less than all values in the right subtree.Then the tree is:

A.Binary search tree

B.Complete tree

C.Balanced tree

D.Threaded tree

Ans:A

43.The sort method that switches the adjacent elements,if needed after comparison is:

A.Heap sort

B.Quick sort

C.Insertion sort

D.Bubble sort

Ans:D

44.Minimum number of queues needed to implement the priority queue is:

A.1

B.2

C.3

D.4

Ans:B

45.After a sequence of steps in an algorithm,a linked list reaches the following step,START=NULL then the situation is
A.Overflow

B.Underflow

C.Initialisation

D.Saturation

Ans:B

46.The result of following expression in polish notation is 4 3 2 + * 8 4 /-

A.13

B.12

C.18

D.34

Ans:C

47.The data structure that can implement a recursive procedure is:

A.Tree

B.Linked List

C.Queue

D.Stack

Ans:D

48.For a sorted linked list of length  n,the worst case time required to search a given element is:

A.O(n)

B.O(2n)

C.O(log2 n)

D.O(log2 2n)

Ans:A

49.The characteristic of the elements that is maximum utilized in binary search is:

A.Length of the list

B.Number of elements in the list

C.Order of the list

D.Highest value in the list

Ans:C

50.For a binary tree with nine nodes,the result of inorder traversal is:D B A G E C H F I.And that of postorder traversal is:D B G E H I F C A.Then the result of preorder traversal is:

A.A B D C E G F H I

B.A B D E  C F G H I

C.A D B C E F G H I

D.A D B E F C G H I

Ans:A
51.The communication device that uses spanning tree algorithm to avoid loops

A.Router

B.Gateway

C.Bridge

D.Switch

Ans:C

52.Delaying an outgoing control frame in order to hook onto the next outgoing data frame is called:

A.Packet Sniffing

B.Compounding

C.Optimal Routing

D.Piggy Backing

Ans:D

53.Dijkstra’s algorithm facilitates:

A.Multipathing

B.Shortest Path Routing

C.Isolated Routing

D.Centralised Routing

Ans:B

54.The OSI Layer in which the auto negation resides is:

A.Physical

B.Network

C.Transport

D.Data Link

Ans:A

55.The transmission media that uses BNC connector is:

A.Coaxial Cable

B.UTP

C.STP

D.Optical Fiber

Ans:A

56.The mode of communication used in a serial communication channel is:

A.Simplex

B.Half duplex

C.Full duplex

D.Both (b) and (c)

Ans:C

57.The communication standard for a wireless network is specified by

A.802.11

B.802.21

C.802.8

D.802.12

Ans:A

58.The FDDI network is an example of:

A.Bus

B.Star

C.Ring

D.Mesh

Ans:B

59.A standard protocol for packet switching is:

A.POTS

B.SMTP

C.PSTN

D.X.25

Ans:D

60.The number of bits in a MAC Address is:

A.32

B.48

C.64

D.128

Ans:B

61.Which of the following is not a relational operator?

A.Difference

B.Addition

C.Division

D.Selection

Ans:B

62.In DBMS ,the front end application performs:

A.Storage function

B.Access control

C.Processing function

D.All of the above

Ans:C

63.In a table,the relationship among a set of values are represented by:

A.Tuple

B.Attribute

C.Entity

D.Key

Ans:A

64.The Schema that provides a standard way of organizing information into accessible parts:

A.Logical

B.Physical

C.External

D.Storage level

Ans:A

65.The physical location of a database record is determined by a key transformation in:

A.Index

B.Random

C.Hash

D.Pointer

Ans:C

66.Which of the following is not a set operator in SQL?

A.UNION

B.UNION ALL

C.MINUS
D.LIKE
Ans:D

67.Which one of the following is a procedural language?

A.Domain relational calculus

B.System R

C.Query language

D.Relational language

Ans:D

68.A buffer that has been changed in database buffer memory,but not yet written to disk is:

A.Swap space

B.Latch

C.Redo Log

D.Dirty Block

Ans:D

69.The timestamp ordering that makes no distinction between the Read and Write access so that only a single value is required for each granule is:

A.Partial timestamp ordering

B.Total timestamp ordering

C.Multi version timestamp ordering

D.Optimal timestamp ordering

Ans:B

70.The constraint specifying that account number must be in between 50000 and 80000 is a:

A.Integrity constraint

B.Referential constraint

C.Default constraint

D.Key constraint

Ans:A

71.In a Java program,the length in pixel of a string can be obtained using the method:

A.Stringwidth

B.Strlength

C.Length

D.Strwidth

Ans:A

72.Select the correct statement from the following :

A.Char p=(char*)malloc(100);

B.char *p=(char*)malloc(100)l

C.Char p=(malloc(100));

D.char *p=(char*)malloc(100);

Ans:D

73.The statement that is least preferred in C programs in general is:

A.Recursion

B.Nesting of different type of loops

C.Double pointer

D.Unconditional Jump to a label

Ans:D

74.What will be the output of following C++ program?

#include<iostream.h>

Void main()

{

Char *cp=”computer”;

Cp+=2

(*cp)++;

Cout<<cp;

}

A.Puter

B.mputer

C.nputer

D.quter

Ans:C

75.What will be the output of following C++ program?

#include<iostream.h>

Void main()

(

Int x=10,y=5,z;

Z=++x+(++y)++;

Cout<<z;

}

A.15

B.16

C.17

D.18

Ans:C

76.In order to get the MIME type of a file,a Servelt may use the methods defined in the interface:

A.Servlet Info

B.Servlet container

C.Servlet Config

D.Servlet context

Ans:D

77.Java method that can be used to pause the current thread execution until and unless another thread completes its execution:

A.Sleep

B.Yield

C.Join

D.Suspend

Ans:C

78.Which Java Interface can be used to store objects using a key-value pair,avoiding duplicate values?

A.Java.util.Collection

B.Java.util.Set

C.Java.util.List

D.Java.util.Map

Ans:D

79.Which of the following statement is false for C++ programs?

A.Throw cannot be executed from a function called from a try block

B.Unhandled throw results in an abnormal program termination

C.Throw is a keyword for newer versions of C++ compiler

D.Catch block may be selected by matching data type with the  value given in throw

Ans:A

80.Which of the following data type can be used along with switch statement for comparison in C++?

A.(int*)

B.double

C.enum

D.struct

Ans:C

81.67thcan Golden plan for best film given for:

A.Goodbye to language

B.The wonders

C.Mister Turn

D.Winter Sleep
Ans:D

82.The ‘Ring Spot Virus’ is the most destructive disease of:

A.Papaya

B.Banana

C.Mango

D.Coffee

Ans:A

83.The ratio of width of our National Flag to its length is:

A.3:5

B.2:4

C.2:3

D.3:4

Ans:C

84.Prime Minister Narendra Modi sworn is as the:

A.16th Prime Minister

B.15thPrime Minister

C.14th Prime Minister

D.13th Prime Minister

Ans:B

85.The fourth Chief Minister of Kerala:

A.EMS

B.Pattom Thanupillai

C.R.Sankar
<div class=

Show more