section b -a

Upload: prabhatjon

Post on 03-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 section B -A

    1/8

    DITISS Guess Paper Jun -Jul 2013 Page 1 of 1

    CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING

    Each question shall carry one mark. There will be a negativemarking i.e., quarter (0.25) mark will be deducted for everywrong answer.

    1. C programming language is related to which ofthe following generation?1. Fourth

    2. Third3. Second4. First

    2. Who introduce the concept of Stored Program?1. Charles Babbage2. Howard A3. Von Neumann4. John Atanasoff

    3. The primary advantage of key-to-tape data entrysystem is___________.1. A large percentage of editing can be

    performed at the time of data entry.2. Key verification is easily performed3. The tape is reusable4. Keying errors can be detected as they occur.

    4. While inserting a diskette into the diskette drive of aPC, the diskettes label side should face_________.1. East2. North3. South4. Up

    5. Firewire is usually used for__________.1. Connecting to the internet2. Downloading Digital Camera pictures3. Connecting to the printer4. Interfacing to a Digital Camcorder

    6. What is USB?1. A new Hard Disk standard2. A new CD-ROM specification3. A high-speed serial connection4. A high-speed video connection

    7. Where is your BIOS stored?1. DRAM2. SDRAM3. Flash4. Hard Disk

    8. Where does your PC store your programs whenthe power is off?1. DRAM2. Cache3. Hard Disk Drive4. Monitor

    9. What type of character recognition technologies

    used by the banking industry to process checks?1. CIRT2. OICR3. MICR4. SICR

    10. Print resolution is measured in__________1. PPM2. DPI3. Pixels4. Fonts

    11. Who created Pretty Good Privacy (PGP)?1. Paul Zimmerman2. Tim Berners-Lee

    3. Marc Andreessen4. Ken Thompson

    12. Who co-founded Hotmail in 1996 and then sold thecompany to Microsoft?1. Shawn Fanning2. Ada Byron Lovelace

    3. Sabeer Bhatia4. Ray Tomlinson

    13. What is the max length for primary name of acomputer file under DOS?1. 82. 123. 34. 16

    14. Which of the following could be a valid DOS filespecification?1. NOSFILE.POST2. NOSFILE.P.OST3. NOSFILE.DOC4. NOST.FILEDOC

    15. In which configuration, multiple computers areconnected to a host computer?1. Star Networks2. Rings Networks3. Bus Networks4. Hybrid Networks

    16. What would be the best way to move around a 3-Denvironment?1. Use a space mouse2. Use a tracker ball3. Use a keyboard4. Use touch screen

    17. _________is capable of changing signals from oneform to another?

    1. Converter2. Transducer3. Conductor4. All of the above

    18. When single medium is used to presentinformation is called as__________.1. Unimedium presentation2. Single medium Presentation3. Both 1& 24. None of the above

    19. In India first computer installed in _________.1. Indian institute of Technology,2. Indian Institute of Science,3. Indian Iron & Steel Co. Ltd.4. Indian Statistical Institute, Calcutta,

    20. Main component of the CPU is __________1. Control unit and registers2. Registers and main memory3. Control Unit and ALU4. ALU and BUS

    21. When a computer is first turned on or restarted, aspecial type of absolute loader called ________ isexecuted.1. Compile and Go loader2. Boot loader3. Bootstrap loader4. Relating loader

    GUESS PAPER FOR DITISS JUN JUL 2013

  • 7/28/2019 section B -A

    2/8

    ,

    Page 2 of 2

    22. Why the virtual memory is used?a. A process cannot be loaded and has to keep

    waiting for its execution to start until sufficientfree memory for loading the entire processbecome available.

    b. A process cannot be loaded in a systemwhose main memory size is less than the totalmemory required by the process.

    1. Only a2. Only b

    3. Both a and b4. None of the above

    23. Single-user operating system is __________.1. MS-DOS2. UNIX3. OS/24. All of the above

    24. The operating system creates _________from thephysical computer.1. Virtual space2. Virtual computers3. Virtual device4. None of the above

    25. Which of the following OS does not implement

    multi tasking truly _________.1. Windows 982. Windows NT3. Windows XP4. MS DOS

    26. Which of the following OS would you prefer toimplement a Client-Server architecture?1. MS DOS2. Windows 953. Windows 984. Windows 2000

    27. In First-Come, First-Served scheduling policy, I/Obound processes may have to wait long in theready queue waiting for a CPU bound job to finish.

    This is known as __________.1. Aging2. Priority inversion3. Priority inheritance4. Convoy effect

    28. The minimum number of page frames that must beallocated to a running process in a virtual memoryenvironment is determined by1. the instruction set architecture2. page size3. physical memory size4. number of processes in memory

    29. Which of the following is used to describeinterconnected computer configurations with two or

    more CPUs.1. Multitasking2. Time Sharing3. Multiprogramming4. Multiprocessing

    30. A________ is an application or a process thatresponds to a client request.1. client2. thread3. server4. All of the above

    31. ________ is a protocol that enables applications toexchange data in a variety of formats.1. Dynamic data exchange2. Component object model3. Data copy4. None of the above

    32. _________ is an efficient way for two or moreprocesses on the same computer to share data.1. File exchange2. File sharing

    3. File mapping4. None of the above

    33. Dirty bit is used to show the _________.1. Page with corrupted data2. The wrong page in the memory3. Page that is less frequently accessed4. Page that is modified after being loaded into

    cache memory34. The first-fit, best-fit and the worst-fit algorithm can

    be used for _________.1. Contiguous allocation of memory2. Linked allocation of memory3. Indexed allocation of memory4. All of the above

    35. In Round Robin CPU scheduling, as the timequantum is increased, the average turn aroundtime _________.1. Increases2. Decreases3. Remain constant4. Varies irregularly

    36. Page size is always1. In powers of 22. One3. In powers of 34. None of the above

    37. Which of the following memory allocation schemesuffers from External fragmentation?

    1. Segmentation2. Swapping3. Pure demand paging4. Paging

    38. _________ page replacement algorithm suffersfrom Belady's anomaly.1. LRU2. MRU3. FIFO4. LIFO

    39. Which of the following could be considered anadvantage of Virtual Memory Management?1. Thrashing may occur when a program

    requires two or more pages.

    2. Only a part of each page needs to be loadedinto memory.3. Job size is no longer restricted to the size of

    main memory4. All of the above

    40. Memory mapped I/O involves1. transferring information between memory locations2. transferring information between the CPU

    and I/O devices in the same way as betweenthe CPU and memory.

    3. transferring information between registersand memory

    4. transferring information between I/O devicesand memory

    DITISS Guess Paper Jun -Jul 2013

  • 7/28/2019 section B -A

    3/8

    Page 3 of 3

    41. In demand paging, while initiating execution ofprocess _________ space is allocated on pagingdevice for its logical address, its code & data.1. Logical2. Swap3. Virtual4. Physical

    42. File length _________.1. Should always be fixed2. Should always be variable

    3. Depends upon the size of the file.4. Should be chosen to match the data

    character43. What is internal backup?

    1. Uses more tapes2. Should be done each month3. Saves only files that have recently changed4. Saves all files

    44. When should backup be done?1. Daily for most installations2. Weekly for most installations3. As several images copies, followed by an

    incremental4. As several incremental, followed by an

    image copy45. I/O devices can be classified according to the

    following criteria1. Nature of access2. Purpose3. Data Transfer Mode4. All of the above

    46. To perform an output operation, data to be writtenonto the I/O device is first transferred from thememory to the DMA buffer.1. True2. False3. Cant say4. None of the above

    47. Tapes and disks are _________ devices1. Block Mode2. Character Mode3. Both4. None of the above

    48. Which of the following statement is false regardingdeadlock?1. Deadlock affects OS performance.2. A deadlock involving OS performance can

    not have more severe consequences.3. OS handles only deadlocks caused by

    sharing of resources.4. Operating system uses resource allocation

    policies.

    49. A set of processes is deadlocked if each ofthem_________.1. does not waits for an event2. waits for an event can be caused only by

    processes in the set.3. Both 1 & 24. None of the above

    50. Is the following statement is true?Various kinds of deadlocks can arise in an OS.1. Yes2. No3. Cant say4. None of the above

    51. What is SMTP?1. Simple Mailer transport protocol2. Simple Mail Transport protocol3. Single Mail transport protocol4. None of the above

    52. An organization that share devices, saves_______.1. Money2. Time3. Space4. All of the above

    53. Which of the following is not a guided medium?1. Coaxial cable2. Fiber-optic cable3. Atmosphere4. None of the above

    54. What is the major factor that makes coaxial cableless susceptible to noise?1. Inner conductor2. Diameter of cable3. Outer conductor4. Insulating material

    55. A _________ operates at the upper levels of the OSImodel and translates information between two completelydifferent network architectures or data formats.

    1. Router2. Switch3. Gateway4. None of the above

    56. Which of the following device is responsible for theconnection of Local Area Networks with Wide AreaNetworks?1. Hub2. Bridge3. Data switch4. Gateway

    57. Which of these is not part of the TCP/IP model?1. Network access2. Internet

    3. Presentation4. Application

    58. Which of the following is not true for switchingtechnology?1. Packet Switching2. Link Switching3. Packets are switched in the form of

    datagram4. Circuit Switching techniques

    59. Which of the following statement is a truedescription of fiber Optic Cable?1. Fiber optic cables transfer data in a mesh2. Fiber optic cables transfer data in light form3. Fiber optic cables are similar to coaxial

    cables4. None of the above60. Which of the following topologies is used for Ethernet?

    1. Star2. Bus3. Ring4. All of the above

    61. Which of the following is not always necessary foraccessing the Web?1. A Web browser2. A connection to an Internet Access Provider3. A computer4. A modem

    DITISS Guess Paper Jun -Jul 2013

  • 7/28/2019 section B -A

    4/8

    Page 4 of 4

    62. A word that looks underlined on a web page isusually __________.1. important word2. the web address3. a "link" to another web page4. a mistake

    63. How many stations can a fiber optic networksupport?1. 250002. 10000

    3. 50004. 1000

    64. Which layer translates between physical andlogical addresses?1. the MAC sublayer of the data link layer2. transport3. physical4. network

    65. Which of the following layer is responsible fortransmitting raw bit streams between two nodes?1. Transport Layer2. Presentation Layer3. Physical Layer4. Data Link Layer

    66. ISO OSI model is used in __________.1. Stand alone PC2. Network environment3. Any where4. None of the above

    67. Which of the following switching methods acceptonly the first 6 bytes of a frame?1. store and forward2. cut-through3. tag4. fast flag

    68. Which of the following ISO level is more closelyrelated to the physical communications facilities?1. Application

    2. Session3. Network4. Data link

    69. Which of the following are benefits of using alayered network model?1. it facilitates troubleshooting2. it breaks the complex process of networking

    into more manageable chunks3. it allows layers developed by different

    vendors to interoperate4. All of the above

    70. Which of the following are considered to be theupper layer protocols?1. presentation and session

    2. application and presentation3. application, presentation, and session4. application, presentation, session, and transport

    71. The purpose of the ________ layer is to transporta raw bit stream from one machine to another.1. Physical Layer2. Transport Layer3. Network4. Data Link Layer

    72. The physical layer is concerned with the movementof _______ over the physical medium.1. Programs2. Dialogs3. Protocols

    4. Bits73. Fiber optics is an example of ________ layer.

    1. Physical Layer2. Data Link Layer3. Network layer4. Application Layer

    74. FDM in Networking stands for __________.1. Frequency Division Multiplexing2. Frequency Distribution Multiplexing3. Frequency Division Methods

    4. Frequency Distribution Methods75. NIC stands for __________.

    1. Network Internet Cable2. Network Internet Card3. Network Internal Card4. None of the above

    76. When a process wants to establish a TCPconnection with a remote process, it attaches itselfto an unused TCP port on its own machine. This iscalled a _________ port.1. Source2. Destination3. External4. Internal

    77. Which one of the following is a connectionless protocol?1. UDP2. Ethernet3. IPX4. All of the above

    78. Which of the following application uses the UDPprotocol?1. DNS2. TFTP3. RIP4. All of the above

    79. The HTTP request line contains a _________method to request a document from the server.1. Get

    2. Post3. Copy4. Do

    80. Which of the following protocols is unacknowledged?1. TCP2. UDP3. SPX4. All of the above

    81. The inclusion of the checksum in the TCP segmentis _________.1. Optional2. Mandatory3. at the discretion of the application program4. None of the above

    82. The value of window size is determined by _________.1. the sender2. the receiver3. both the sender and receiver4. None of the above

    83. E-mail use ________ communication protocol.1. SMTP2. HTTP3. ICMP4. TCP/IP

    84. What is the default port number for SMTP?1. 212. 223. 28

    DITISS Guess Paper Jun -Jul 2013

  • 7/28/2019 section B -A

    5/8

    ,

    Page 5 of 5

    4. 2585. Current wireless MACs are based on _________.

    1. CSMA/CD2. CSMA/CA3. Hybrid technique depending on traffic4. Hybrid technique with fixed time partitions

    86. Routers function in the _______ layers1. physical and data link2. physical, data link, and network3. data link and network

    4. None of the above87. Which device act as a traffic cop?

    1. Router2. Hub3. Switch4. Modem

    88. Any electronic device on a network is called _______.1. Node2. Hub3. Router4. Cable

    89. ________ algorithm change their routing decisionsto reflect changes in the topology.1. Routing

    2. Session3. Adaptive4. Nonadaptive

    90. Clients are the computers used by ________ usersfor everyday work.1. Individual2. Group of3. System administrator4. None of the above

    91. What does USB stand for in USB Port?1. United System Booting2. Universal System Bus3. Universal Serial Bus4. Universal System Booting

    92. What data communications hardware convertsdata from one standard to another?1. Hub2. Router3. Repeater4. Gateway

    93. Which of the following is standard for transmitting a data?1. Topology2. Protocol3. Packet4. Token ring

    94. Which of the following OSI layers is concerned with thetransmission of unstructured bit stream over a physical link?1. 7

    2. 13. 64. 2

    95. What type of network architecture would be theeasiest to setup and maintain?1. Local area network2. Wide area network3. Peer-to-peer network4. Metropolitan network

    96. What network is used at a military base?1. Local area network2. Wide area network3. Campus area network4. Office area network

    97. What is the most widely used protocol for localarea networks?1. HTML2. TCP/IP3. Ethernet4. Token ring

    98. At which layer does Flow control take place?1. Physical2. data link

    3. Network4. transport

    99. At which layer error detection and recovery takeplace?1. transport2. presentation3. network4. application

    100. Which of the following statement is true about anIP address?1. IP address is based on your computer

    network card2. IP address is issued by a computer vendor3. IP address is a Transport Protocol

    4. IP address is not used on the internet101. Which of the following words have correct spelling?

    1. Vocabilary2. Vocabullary3. Vocabulary4. Voccabulary

    102. Which of the following is odd one?1. Cow2. Bull3. Cock4. Horse

    103. Which of the following is synonymous to the wordDisparity?1. Uniform

    2. Equal3. Par4. Gap

    104. Which of the following is synonymous to the wordDeprivation?1. Scarcity2. Control3. Tenure4. Custody

    105. Which of the following is synonymous to the wordGleam?1. Atrocious2. Nasty3. Shimmer

    4. Hide106. Which of the following is synonymous to the wordCompulsion?1. Obligation2. Claim3. Tribute4. Recognize

    107. Which of the following is synonymous to the wordIgnoble?1. Remarkable2. Splendid3. Dastardly4. Amazing

    DITISS Guess Paper Jun -Jul 2013

  • 7/28/2019 section B -A

    6/8

    Page 6 of 6

    108. Adults differ a lot in their sleeping ________.1. Manners2. Time3. Habits4. Techniques

    109. There should be ________of fresh air in the room.1. Plenty2. Much3. more

    4. Lots110. If houses are made of wood, then they easily catch

    ________ fire.1. to2. on3. the4. with

    111. The task calls ________ much effort.1. at2. specific3. for4. much

    112. What is the antonym of the word cyclic?1. Repeated

    2. Recurring3. Rare4. Continual

    113. What is the antonym of the word Propel?1. Push2. Drive3. Force4. Linger

    114. Full : empty ::?1. Chaos: water2. Chaos: scattered3. Chaos:frenzy4. Chaos: order

    115. Genuine: honest:: ?

    1. Fraudulent :sensitive2. Fraudulent :deceitful3. Fraudulent :selfish4. Fraudulent :truthful

    116. The bus stops ________ the bus stop.1. At2. On3. into4. to

    117. The clock ________ the wall is very old.1. To2. By3. On4. Over

    118. 2,4,6,8,10, ________?1. 132. 143. 124. 16

    119. If PRIYA can coded as 15 then how canTENDULKAR coded?1. 1082. 1073. 1064. 105

    120. If DELETE is coded as 6 then how is INSERTEDcoded?1. 122. 133. 184. 14

    121. C is the sister of F, B is the brother of E's husband,D is the father of A and grandfather of F. There are2 fathers, one mother and 3 brothers in the family.

    Who is the mother?1. A2. B3. C4. E

    122. 2(48)4, 3(74)7, 4(82)1, 3(___)2. What is themissing number?1. 642. 623. 664. 68

    123. Which is the odd number, (33, 58), (66, 91), (42,62), (55,80)?1. (33, 58)

    2. (66, 91)3. (42, 62)4. (55,80)

    124. Sourav from his house walks towards north andcovers 15.5 km and then turns left and travels 7km. He then turns left again and after traveling31km, again turns left and stops after travelingturns left and stops after traveling 7 km. How far ishe from his house?1. 8.5 km2. 46.5 km3. 15.5 km4. 60.5 km

    125. Tarun walks towards east a distance of 120 m to

    sell his product. Later he walks straight 70 m rightto sell his product. What would be approximatelythe shortest distance between the two places?1. 1902. 138.93. 504. None of these

    126. Sachin is 7th

    from the left and Geeta is 5th

    from theright. When they interchange their positions Geetabecomes 19

    thfrom the right. What is Sachins

    position from the left?1. 21

    st

    2. 19th

    3. 23th

    4. 20

    th

    127. Flight to Mumbai leaves every 5 hrs. At theinformation counter a man learnt that the flight tookoff 25 min before. If the present time is 10:45 a.m.,what is the time for the next flight?1. 2:20 a.m.2. 4:10 a.m.3. 3:30 p.m.4. 3:20 p.m.

    128. If Y% of 12 is 3 then what is H% of 50?1. 82. 43. 64. 2

    DITISS Guess Paper Jun -Jul 2013

  • 7/28/2019 section B -A

    7/8

    Page 7 of 7

    129. If means addition, - means division, meanssubtraction, and + means multiplication, whatwould be the value of the following?

    a) 18 5 10 +4 5

    b) 18 +5 10 4 51. 15,802. 815.8, 80.83. 15, 80.84. 15.5, 80.5

    130. There are five friends A, B, K, D and E. K is tallerthan B. B and D are of same height. A is taller thanE and there is only one shorter than A in the group.Who is the taller in the group?1. A2. B3. K4. D

    131. Swimming downstream in a river, you can swim 2miles in 40 minutes, & in upstream 2 miles in 60minutes. How long would it take you to swim a milein still water?1. 25 Minutes2. 23 Minutes3. 24 Minutes

    4. None of the above132. If alternate letters are deleted from the following

    series then which letter will divide the new series intwo equal parts?ACEGIKMOQSUWY1. N2. M3. K4. O

    133. If the following words are arranged according tothe dictionary order then which will be the secondword in that order?1. youthful2. yokel

    3. young4. youngster

    134. How many times in a day the hands of a clock arestraight?1. 222. 303. 444. None of the above

    135. A sum of money doubles itself at compoundinterest in 15 years. In how many years will itbecome eight times?1. 45 years2. 40 years3. 42 years

    4. None of the above136. Which is the greatest of the four least common

    multiples of 3,5,7?1. 12. 4203. 3154. 105

    137. What will be the smallest one digit number to bereplaced by * in the number 6*106 so that thenumber is exactly divisible by 11?1. 42. 33. 24. 1

    138. X began a business with Rs. 85,000. He wasjoined afterwards by Y with Rs. 42,500. What willbe the profit ratio at the end of the year, if Y joinsafter 4 months?1. 1:22. 3:13. 2:14. 4:3

    139. A student multiplied a number by 3/5 instead of5/3. What is the percentage error in the

    calculation?1. 34%2. 44%3. 54%4. 64%

    140. How many words can be formed of the letters ofthe word 'BANANA' be arranged so that theconsonants occupy the even places?1. 362. 103. 34. 5

    141. How many ways can 6 men be arranged in acircle?

    1. 7202. 2403. 1204. None of the above

    142. One pipe can fill a tank three times as fast asanother pipe. Together the two pipes can fill thetank in 12 minutes, then in how many minutes theslower pipe alone will be able to fill the tank?1. 48 minutes2. 81 minutes3. 108 minutes4. 192 minutes

    143. Three taps P, Q and R can fill a tank in 12, 15 and20 hours respectively. If P is open all the time and

    Q and R are open for one hour each alternately, bywhat time the tank will be full?1. 6 hours2. 7 hours 30 min3. 6 hours 30 min4. 7 hours

    144. A bag contains 6 black and 8 white balls. One ballis drawn at random. What is the probability that theball drawn is white?1. 3/42. 4/73. 1/84. 3/7

    145. There are 6 red shoes & 4 green shoes . If two of

    red shoes are drawn what is the probability ofgetting red shoes?1. 1/32. 2/33. 3/54. 2/5

    146. A shopkeeper expects a gain of 20 % on his costprice. If in a week, his sale was of Rs. 360, whatwas his profit?1. 802. 723. 704. 60

    DITISS Guess Paper Jun -Jul 2013

  • 7/28/2019 section B -A

    8/8

    ,

    Page 8 of 8

    147. A man buys a cycle for Rs. 1200 and sells it at aloss of 10%. What is the selling price of the cycle?1. Rs. 10802. Rs. 11603. Rs. 12024. Rs. 1190

    148. If 40% of a number is equal to two-third of anothernumber, what is the ratio of first number to thesecond number?1. 2:5

    2. 3:73. 5:34. 7:3

    149. A sum of money at simple interest amounts to Rs.815 in 3 years and to Rs. 854 in 4 years. What isthe sum?1. Rs. 6982. Rs. 6903. Rs. 6504. Rs. 700

    150. A train can travel 50% faster than a car. Both startfrom point A at the same time and reach point B 75kms away from A at the same time. On the way,however, the train lost about 12.5 minutes while

    stopping at the stations. What is the speed of thecar?1. 90 km/hr2. 120 km/hr3. 140 km/hr4. 150 km/hr

    DITISS Guess Paper Jun -Jul 2013