Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted represent the operation of encrypting m with a key Kx and H(m) represent the message digest. Which one of the following indicates the CORRECT way of sending the message m along with the digital signature to A?(A) A(B) B(C) C(D) D

Answer»
2.

Consider the following two phase locking protocol. Suppose a transaction T accesses (for read or write operations), a certain set of objects {O1,…,Ok}. This is done in the following manner:Step 1. T acquires exclusive locks to O1, . . . , Ok in increasing order of their addresses.Step 2. The required operations are performed.Step 3. All locks are released.This protocol will(A) guarantee serializability and deadlock-freedom(B) guarantee neither serializability nor deadlock-freedom(C) guarantee serializability but not deadlock-freedom(D) guarantee deadlock-freedom but not serializability

Answer»
3.

The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first stage (with delay 800 picoseconds) is replaced with a functionally equivalent design involving two stages with respective delays 600 and 350 picoseconds. The throughput increase of the pipeline is _______ percent.[This Question was originally a Fill-in-the-Blanks question](A) 33 or 34(B) 30 or 31(C) 38 or 39(D) 100

Answer» None
4.

The size of the data count register of a DMA controller is 16 bits. The processor needs to transfer a file of 29,154 kilobytes from disk to main memory. The memory is byte addressable. The minimum number of times the DMA controller needs to get the control of the system bus from the processor to transfer the file from the disk to main memory is _________Note : This question was asked as Numerical Answer Type.(A) 3644(B) 3645(C) 456(D) 1823

Answer»
5.

Consider the following C program.#include<stdio.h>void mystery(int *ptra, int *ptrb){int *temp;temp = ptrb;ptrb = ptra;ptra = temp;}int main(){int a=2016, b=0, c=4, d=42;mystery(&a, &b);if (a < c)mystery(&c, &a);mystery(&a, &d);printf("%d\n", a);}The output of the program _____________Note : This question was asked as Numerical Answer Type.(A) 2016(B) 0(C) 4(D) 8

Answer»
6.

Consider the two cascaded 2-to-1 multiplexers as shown in the figure.The minimal sum of products form of the output X is(A) A(B) B(C) C(D) D

Answer»
7.

Consider a carry lookahead adder for adding two n-bit integers, built using gates of fan-in at most two. The time to perform addition using this adder is(A) Θ(1)(B) Θ(Log (n))(C) Θ(√ n)(D) Θ(n)

Answer» None
8.

Two eigenvalues of a 3 x 3 real matrix P are (2 + √ -1) and 3. The determinant of P is _____Note : This question was asked as Numerical Answer Type.(A) 0(B) 1(C) 15(D) -1

Answer»
9.

Which of the following is NOT a superkey in a relational schema with attributes V, W, X, Y, Z and primary key V Y ?(A) V X Y Z(B) V W X Z(C) V W X Y(D) V W X Y Z

Answer»
10.

A database of research articles in a journal uses the following schema.(VOLUME, NUMBER, STARTPGE, ENDPAGE, TITLE, YEAR, PRICE) The primary key is (VOLUME, NUMBER, STARTPAGE, ENDPAGE) and the following functional dependencies exist in the schema.(VOLUME, NUMBER, STARTPAGE, ENDPAGE) -> TITLE(VOLUME, NUMBER) -> YEAR(VOLUME, NUMBER, STARTPAGE, ENDPAGE) -> PRICE The database is redesigned to use the following schemas.(VOLUME, NUMBER, STARTPAGE, ENDPAGE, TITLE, PRICE)(VOLUME, NUMBER, YEAR) Which is the weakest normal form that the new database satisfies, but the old one does not?(A) 1NF(B) 2NF(C) 3NF(D) BCNF

Answer»
11.

Which one of the following protocols is NOT used to resolve one form of address to another one?(A) DNS(B) ARP(C) DHCP(D) RARP

Answer»
12.

An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes. The number of fragments that the IP datagram will be divided into for transmission is :Note : This question was asked as Numerical Answer Type.(A) 10(B) 50(C) 12(D) 13

Answer»
13.

What will be the output of the following C program?void count(int n){static int d = 1;printf("%d ", n);printf("%d ", d);d++;if(n > 1) count(n-1);printf("%d ", d);}int main(){count(3);}(A) 3 1 2 2 1 3 4 4 4(B) 3 1 2 1 1 1 2 2 2(C) 3 1 2 2 1 3 4(D) 3 1 2 1 1 1 2

Answer» None