0

Computer Science (Mixed)

Attempted 0/15 Correct 0 Score 0

Which of the following is a command to reset the JK flip-flop?

  1. J = K = 0

  2. J = K = 1

  3. J = 0, K = 1

  4. J = 1, K = 0

  5. K = ~J


Correct Option: C
Explanation:

J = 0, K = 1 is a command to reset the flip-flop.

Which of the following OSI layers provides a reliable link between two directly connected nodes?

  1. Physical Layer

  2. Data Link Layer

  3. Network Layer

  4. Transport Layer

  5. Session Layer


Correct Option: B
Explanation:

The data link layer provides a reliable link between two directly connected nodes, by detecting and possibly correcting errors that may occur in the physical layer.

Which of the following statements is false regarding ER Model?

  1. It is an abstract way of describing a database.

  2. It uses a three schema approach to software engineering.

  3. Conceptual data model is the lowest level ER model.

  4. An entity is an abstraction from the complexities of a domain.

  5. Entities and relationships can both have attributes.


Correct Option: C
Explanation:

This is the highest level ER model in that it contains the least granular detail but establishes the overall scope of what is to be included within the model set. The conceptual ER model normally defines master reference data entities that are commonly used by the organization.

Which of the following is a standard protocol suite for packet switched wide area network (WAN) communication?

  1. ATM

  2. SONET

  3. X.25

  4. ISDN

  5. DSL


Correct Option: C
Explanation:

X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication.

Which of the following is a concept for a communications network that connects voice and data endpoints within a cloud environment over IP?

  1. IAN

  2. LAN

  3. SAN

  4. PSTN

  5. CAN


Correct Option: A
Explanation:

An Internet area network (IAN) is a concept for a communications network that connects voice and data endpoints within a cloud environment over IP, replacing an existing Local Area Network (LAN), Wide Area Network (WAN) and/or Public switched telephone network (PSTN).

Which of the following protocols facilitates carrying non-IP protocols over an IP network?

  1. Stream Control Transmission Protocol

  2. Reliable User Datagram Protocol

  3. Tunneling Protocol

  4. Automatic Repeat Request Schemes

  5. Traffic Contract


Correct Option: C
Explanation:

Tunneling protocols operate at the transport layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end encryption with IPsec.

The simplest half-adder design incorporates which of the following gates for the sum operation?

  1. AND

  2. OR

  3. XOR

  4. NOR

  5. NAND


Correct Option: C
Explanation:

The simplest half-adder design, pictured on the right, incorporates an XOR gate for S and an AND gate for C. With the addition of an OR gate to combine their carry outputs, two half adders can be combined to make a full adder.

The relational model for database management is based on which of the following logics?

  1. Second-order logic

  2. Higher-order logic

  3. Categorical logic

  4. First-order predicate logic

  5. Combinational logic


Correct Option: D
Explanation:

The relational model for database management is a database model based on first-order predicate logic.

Which of the following statements is false regarding semaphore?

  1. A semaphore is an abstract data type.

  2. Semaphores do not guarantee prevention of race conditions.

  3. Operation V increments the counting semaphore S.

  4. Semaphore has a concept of an owner.

  5. S denotes the number of units of the resource that are currently available.


Correct Option: D
Explanation:

Mutexes have a concept of an owner, which is the process that locked the mutex. Only the process that locked the mutex can unlock it. In contrast, a semaphore has no concept of an owner. Any process can unlock a semaphore.

Which of the following CMM levels is also called as 'Repeatable'?

  1. Level 1

  2. Level 2

  3. Level 3

  4. Level 4

  5. Level 5


Correct Option: B
Explanation:

Level 2 is also called Repeatable Level.It is characteristic of processes at this level that some processes are repeatable, possibly with consistent results. Process discipline is unlikely to be rigorous, but where it exists it may help to ensure that existing processes are maintained during times of stress.

Which of the following characteristics is not directly a feature of Encapsulation?

  1. Protecting integrity

  2. Hierarchy

  3. Restricted access

  4. Bundling of data and methods

  5. Information hiding


Correct Option: B
Explanation:

In classical inheritance where objects are defined by classes, classes can inherit attributes and behavior from pre-existing classes called base classes, superclasses, or parent classes. The resulting classes are known as derived classes, subclasses, or child classes. The relationships of classes through inheritance gives rise to a hierarchy.

Which of the following defines the packaging of computing resources as a metered service?

  1. Distributed computing

  2. Computer cluster

  3. Utility computing

  4. Edge computing

  5. Parallel computing


Correct Option: C
Explanation:

Utility computing is the packaging of computing resources, such as computation, storage and services, as a metered service. This model has the advantage of a low or no initial cost to acquire computer resources; instead, computational resources are essentially rented.

Which of the following UNIX commands counts the number of lines, words, and characters in a file?

  1. wc filename

  2. emacs filename

  3. gzip filename

  4. gzcat filename

  5. rm filename


Correct Option: A
Explanation:

This command tells how many lines, words, and characters there are in a file.

Which of the following is a self-adjusting binary search tree with the additional property that recently accessed elements are quick to access again?

  1. Red–black tree

  2. AVL tree

  3. Splay tree

  4. T-tree

  5. B-Tree


Correct Option: C
Explanation:

A splay tree is a self-adjusting binary search tree with the additional property that recently accessed elements are quick to access again. It performs basic operations such as insertion, look-up and removal in O(log n) amortized time. For many sequences of non-random operations, splay trees perform better than other search trees, even when the specific pattern of the sequence is unknown.

Which of the following was a search engine system for the Gopher protocol?

  1. Archie

  2. Veronica

  3. WAIS

  4. Cookie

  5. HTTP


Correct Option: B
Explanation:

Veronica was a search engine system for the Gopher protocol.During its existence, Veronica was a constantly updated database of the names of almost every menu item on thousands of Gopher servers. The Veronica database could be searched from most major Gopher menus. Although the original Veronica database is no longer accessible, various local Veronica installations and at least one complete rewrite (Veronica-2) still exist.

- Hide questions