0

Computer Aptitude

Description: This test covers topics from Paper 2 and 3 of UGC NET in Computer Science and Applications (Subject code 87)
Number of Questions: 15
Created by:
Tags: UGC NET Computer Science Programming in C and C++ Computer Networks Computer Graphics Operating Systems with Case Study of Unix Software Engineering
Attempted 0/15 Correct 0 Score 0

Bridges operate in which OSI layer?

  1. Data link layer

  2. Network layer

  3. Transport layer

  4. Session layer

  5. Presentation layer


Correct Option: A
Explanation:

LANs can be connected by devices called bridges, which operate in the Data Link Layer.

Which of these shows the total tonal distribution of the pixels of an image?

  1. Aspect ratio

  2. Entropy

  3. Histogram

  4. Scan line

  5. Resolution


Correct Option: C
Explanation:

The Histogram shows the total tonal distribution in the image. It's a barchart of the count of pixels of every tone of gray that occurs in the image. It helps us analyze, and more importantly, correct the contrast of the image.

Features like character code translation, i.e. from ASCII to EBCDIC is provided by which OSI layer?

  1. Data link layer

  2. Transport layer

  3. Session layer

  4. Presentation layer

  5. Application layer


Correct Option: D
Explanation:

The presentation layer formats the data to be presented to the application layer. It can be viewed as the translator for the network. This layer may translate data from a format used by the application layer into a common format at the sending station then translate the common format to a format known to the application layer at the receiving station.The presentation layer provides character code translation: for example, ASCII to EBCDIC.

Which of the following statements is false regarding abstract data types?

  1. Implementation of an abstract data type is hidden.

  2. Most OOP languages provide the feature of user-defined abstract data types.

  3. ADTs are a mathematical specification of a set of data.

  4. The ADT is represented by an interface.

  5. An abstract data type and data structure used in its implementation are the same.


Correct Option: E
Explanation:

There is a distinction, although sometimes subtle, between the abstract data type and the data structure used in its implementation. For example, a List ADT can be represented using an array-based implementation or a linked-list implementation. A List is an abstract data type with well-defined operations (add element, remove element, etc.) while a linked-list is a pointer-based data structure that can be used to create a representation of a List. The linked-list implementation is so commonly used to represent a List ADT that the terms are interchanged and understood in common use.

Which of the following protocols uses TCP for file transfer and establishes two separate connections for commands and data?

  1. TFTP

  2. FTP

  3. TELNET

  4. NFS

  5. NTFS


Correct Option: B
Explanation:

FTP uses one connection for commands and the other for sending and receiving data. FTP has a standard port number on which the FTP server listens for connections. A port is a logical connection point for communicating using the Internet Protocol (IP). The standard port number used by FTP servers is 21 and is used only for sending commands. Since port 21 is used exclusively for sending commands, this port is referred to as a command port. For example, to get a list of folders and files present on the FTP server, the FTP Client issues a LIST command. The FTP server then sends a list of all folders and files back to the FTP Client. The port that is used for transferring data is referred to as a data port.

Which of the following UNIX shells is different from the rest of the following?

  1. Bourne shell

  2. Korn shell

  3. C shell ( csh)

  4. Bourne Again shell ( bash)

  5. POSIX shell ( sh)


Correct Option: C
Explanation:

The C shell is a C-type shell. Here, the default prompt is the % character.

Which operator is used in UNIX for connecting the standard output of one command to the standard input of another?

  1. Echo

  2. Sort

  3. Grep

  4. Pipe

  5. WC


Correct Option: D
Explanation:

The standard output of one command may be connected to the standard input of another by writing the 'pipe' operator, indicated by |, as in, ls -l | wc.

Which of these testing methods is employed to verify that a fixed bug has not resulted in another functionality or business rule violation?

  1. Unit testing

  2. Beta testing

  3. Regression testing

  4. Integration testing

  5. Load testing


Correct Option: C
Explanation:

To verify that a fixed bug has not  resulted in another functionality or business rule violation Regression testing is used. The intent of Regression testing is to ensure that a change, such as a bug fix did not result in another fault being uncovered in the application.

Which of the following type of operating systems have very little user-interface capability and used mainly to control machinery, and scientific instruments?

  1. Real-time operating systems

  2. Single-user, single task

  3. Single-user, preemptive multi-tasking

  4. Multi-user

  5. Cooperative multitasking


Correct Option: A
Explanation:

Real-time operating systems are used to control machinery, scientific instruments and industrial systems. An RTOS typically has very little user-interface capability, and no end-user utilities, since the system will be a sealed box when delivered for use. A very important part of an RTOS is managing the resources of the computer so that a particular operation executes in precisely the same amount of time, every time it occurs.

Which of the following conditions does not occur in a deadlock state?

  1. Mutual exclusion

  2. Hold and wait

  3. Definite waiting

  4. No preemption

  5. Circular wait


Correct Option: C
Explanation:

Deadlock involves in-definite waiting as a deadlock is a situation when a process in the system has acquired some resources and waiting for more resources, which are acquired by some other process and in turn is waiting for the resources acquired by this process. Hence, none of them can proceed and OS can not do any work.

Which of the following is not a type of software maintenance activity?

  1. Error correction

  2. Adaptation

  3. Break even analysis

  4. Achieving perfection

  5. Detect and correct latent faults


Correct Option: C
Explanation:

Break even analysis is an analysis to determine the point at which revenue received equals the costs associated with receiving the revenue. This analysis is carried out during the feasibility study.

What is the time required for the scheduler to stop one process and start another process called?

  1. Response time

  2. Waiting time

  3. Turnaround time

  4. Throughput

  5. Dispatch latency


Correct Option: E
Explanation:

Dispatch latency is the amount of time required for the scheduler to stop one process and start another.

Which of these Data Link Protocols is character oriented?

  1. SDLC

  2. HDLC

  3. BSC

  4. LAPB

  5. PPP


Correct Option: C
Explanation:

Binary Synchronous Communication (BSC or Bisync) is an IBM character-oriented, half-duplex link protocol.

Which of these is a point-to-point protocol for transmitting large amounts of data at very high speed over relatively short distances?

  1. CSMA/CD

  2. HDSL

  3. MAC

  4. Aloha

  5. HIPPI


Correct Option: E
Explanation:

HIPPI (High-Performance Parallel Interface) is a standard point-to-point protocol for transmitting large amounts of data at up to billions of bits per second over relatively short distances, mainly on local area networks ( LAN s).

The Leaky Bucket Algorithm is generally used in which OSI layer?

  1. Data link layer

  2. Network layer

  3. Physical layer

  4. Session layer

  5. Presentation layer


Correct Option: B
Explanation:

The network layer controls the operation of the subnet deciding,  which physical path the data should take based on network conditions, priority of service, and other factors. Congestion control is a feature of this layer. Leaky Bucket is a congestion control algorithm often used in this layer.

- Hide questions