Tagore Institute of Engineering and Technology
Tagore Institute of Engineering and Technology
1. To avoid the race condition, the number of processes that may be simultaneously inside their
critical section is
A
8
.
B.1
C.16
D
0
.
E. None of the above
2. Thrashing
A
is a natural consequence of virtual memory systems
.
B.can always be avoided by swapping
C.always occurs on large computers
D
can be caused by poor paging algorithms
.
E. None of the above
3. How many digits of the DNIC (Data Network Identification Code) identify the country?
A
first three
.
B.first four
C.first five
D
first six
.
E. None of the above
4. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A
255.240.0.0 B.255.248.0.0
.
C.255.252.0.0 D.255.254.0.0
E. 255.255.255.255
5. How many hosts are attached to each of the local area networks at your site?
A
128
.
B.254
C.256
D 64
.
E. None of the above
6. Programming a robot by physically moving it through the trajectory you want it to follow is
called:
A
contact sensing control
.
B.continuous-path control
C.robot vision control
D
pick-and-place control
.
E. None of the above
11. A Ring, refers to a record chain, the last of which refers to the first record, in the chain, is
called a/an
A
addressing
.
B.location
C.pointer
D
loop
.
E. None of the above
14. Which of the following are valid characters for a numeric literal constant?
A
a comma
.
B.a dollar sign ($)
C.a percent sign (%)
D
a space
.
E. None of the above
15. In a file contains the line "I am a boy\r\n" then on reading this line into the array str using
fgets(). What will str contain?
A
"I am a boy\r\n\0" B."I am a boy\r\0"
.
C."I am a boy\n\0" D."I am a boy"
16. What will the SWAP macro in the following program be expanded to on preprocessing? will
the code compile?
#include<stdio.h>
#define SWAP(a, b, c)(c t; t=a, a=b, b=t)
int main()
{
int x=10, y=20;
SWAP(x, y, int);
printf("%d %d\n", x, y);
return 0;
}
A
It compiles
.
B.Compiles with an warning
C.Not compile
D
Compiles and print nothing
.
18. Which of the following is the correct order if calling functions in the below code?
a = f1(23, 14) * f2(12/4) + f3();
A
f1, f2, f3
.
B.f3, f2, f1
C.Order may vary from compiler to compiler
D
None of above
.
20. How will you free the memory allocated by the following program?
#include<stdio.h>
#include<stdlib.h>
#define MAXROW 3
#define MAXCOL 4
int main()
{
int **p, i, j;
p = (int **) malloc(MAXROW * sizeof(int*));
return 0;
}
A
memfree(int p); B.dealloc(p);
.
C.malloc(p, 0); D.free(p);
21. Which bitwise operator is suitable for checking whether a particular bit is on or off?
A
&& operator B.& operator
.
D
C.|| operator ! operator
.
24. Which of the following is the root of the .NET type hierarchy?
A
System.Object
.
B.System.Type
C.System.Base
D
System.Parent
.
E. System.Root
25. Which of the following will be the correct output for the C#.NET code snippet given below?
String s1 = "ALL MEN ARE CREATED EQUAL";
String s2;
s2 = s1.Substring(12, 3);
Console.WriteLine(s2);
A
ARE B.CRE
.
C.CR D.REA
E. CREATED
29. In OSI network architecture, the dialogue control and token management are responsible
of_________________________________________________
32. Each of data files has a _________________that describe the way the data is stored in the
file.
36. What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix
forms___________________________________________________________________
38. The gap between what applications expects and what the underlying technology can provide
is called______________________
42. __________________________ is a type of absolute loader which loads the first program to
be run by the computer.
44. A register in the microprocessor that keeps track of the answer or results of any arithmetic or
logic operation is the ____________________
45. ______________________is a document produced at the time of requirement gathering
process.
47. A ___________________ is any device that prevents a specific type of information from
moving between the untrusted network outside and the trusted network inside
48. _________________are decoy systems designed to lure potential attackers away from
critical systems and encourage attacks against the themselves.