InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In _______, the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other.(A) Loop unrolling(B) Strength reduction(C) Loop concatenation(D) Loop jamming |
| Answer» | |
| 2. |
The content of the accumulator after the execution of the following 8085 assembly language program, is:MVI A, 42HMVI B, 05HUGC: ADD BDCR BJNZ UGCADI 25HHLT(A) 82H(B) 78H(C) 76H(D) 47H |
| Answer» | |
| 3. |
There are three cards in a box. Both sides of one card are black, both sides of one card are red, and the third card has one black side and one red side. We pick a card at random and observe only one side.What is the probability that the opposite side is the same colour as the one side we observed?(A) 3/4(B) 2/3(C) 1/2(D) 1/3 |
| Answer» | |
| 4. |
Given i = 0, j = 1, k = –1x = 0.5, y = 0.0What is the output of the following expression in C language ?x * y < i + j || k(A) -1(B) 0(C) 1(D) 2 |
| Answer» None | |
| 5. |
The number of different spanning trees in complete graph, K4 and bipartite graph, K2,2 have ______ and _______ respectively.(A) 14, 14(B) 16, 14(C) 16, 4(D) 14, 4 |
| Answer» | |
| 6. |
In a positive-edge-triggered JK flip-flop, if J and K both are high then the output will be _____ on the rising edge of the clock.(A) No change(B) Set(C) Reset(D) Toggle |
| Answer» | |
| 7. |
Suppose that R1 and R2 are reflexive relations on a set A. Which of the following statements is correct ?(A) R1 ∩ R2 is reflexive and R1 ∪ R2 is irreflexive.(B) R1 ∩ R2 is irreflexive and R1 ∪ R2 is reflexive.(C) Both R1 ∩ R2 and R1 ∪ R2 are reflexive.(D) Both R1 ∩ R2 and R1 ∪ R2 are irreflexive. |
| Answer» | |
| 8. |
The IEEE-754 double-precision format to represent floating point numbers, has a length of _____ bits.(A) 16(B) 32(C) 48(D) 64 |
| Answer» | |
| 9. |
Simplified Boolean equation for the following truth table is:(A) F = yz` + y`z(B) F = xy` + x`y(C) F = x`z + xz`(D) F = x`z + xz` + xyz |
| Answer» | |
| 10. |
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph. How many cliques are there in the graph shown below?(A) 2(B) 4(C) 5(D) 6 |
| Answer» | |
| 11. |
Which of the following logic expressions is incorrect?(A) 1 ⊕ 0 = 1(B) 1 ⊕ 1 ⊕ 1 = 1(C) 1 ⊕ 1 ⊕ 0 = 1(D) 1 ⊕ 1 = 0 |
| Answer» | |
| 12. |
The simplified form of a Boolean equation (AB` + AB`C + AC) (A`C` + B`) is :(A) AB`(B) AB`C(C) A`B(D) ABC |
| Answer» | |
| 13. |
Which one of the following is correct, when a class grants friend status to another class?(A) The member functions of the class generating friendship can access the members of the friend class.(B) All member functions of the class granted friendship have unrestricted access to themembers of the class granting the friendship.(C) Class friendship is reciprocal to each other.(D) There is no such concept. |
| Answer» | |
| 14. |
In TCP/IP Reference model, the job of _______ layer is to permit hosts to inject packets into any network and travel them independently to the destination.(1)Physical(2)Transport(3)Application(4)Host-to-network(A) (1)(B) (2) and (3)(C) (3) and (4)(D) (1), (2), (3) and (4) |
| Answer» | |
| 15. |
Which of the following is not an inherent application of stack?(A) Implementation of recursion(B) Evaluation of a postfix expression(C) Job scheduling(D) Reverse a string |
| Answer» | |
| 16. |
If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:(A) N(B) (N – 1)(C) N (N – 1) / 2(D) N (N + 1) / 2 |
| Answer» | |
| 17. |
In a fully-connected mesh network with 10 computers, total ______ number of cables are required and ______ number of ports are required for each device.(A) 40,9(B) 45,10(C) 45,9(D) 50,10 |
| Answer» | |
| 18. |
In how many ways can the stringA ∩ B – A ∩ B – Abe fully parenthesized to yield an infix expressionp?(A) 15(B) 14(C) 13(D) 12 |
| Answer» | |
| 19. |
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?(A) 100 Kbps(B) 200 Kbps(C) 400 Kbps(D) 1000 Kbps |
| Answer» | |
| 20. |
Consider the following operations performed on a stack of size 5 :Push (a); Pop() ; Push(b); Push(c); Pop();Push(d); Pop();Pop(); Push (e)Which of the following statements is correct?(A) Underflow occurs(B) Stack operations are performed smoothly(C) Overflow occurs(D) None of the above |
| Answer» | |
| 21. |
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ________ the critical angle.(A) equal to(B) less than(C) greater than(D) less than or equal to |
| Answer» | |
| 22. |
In UNIX, _________ creates three subdirectories : ‘PIS’ and two subdirectories ‘progs’ and ‘data’ from just created subdirectory ‘PIS’.(A) mkdir PIS/progs PIS/data PIS(B) mkdir PIS progs data(C) mkdir PIS PIS/progs PIS/data(D) mkdir PIS/progs data |
| Answer» | |
| 23. |
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler reevaluates the process priority for every ‘T’ time units and decides next process to be scheduled. If the process have no I/O operations and all arrive at time zero, then the scheduler implements _________ criteria.(A) Priority scheduling(B) Round Robin Scheduling(C) Shortest Job First(D) FCFS |
| Answer» | |
| 24. |
The ________ model is preferred for software development when the requirements are not clear.(A) Rapid Application Development(B) Rational Unified Process(C) Evolutionary Model(D) Waterfall Model |
| Answer» | |
| 25. |
If S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is :(A) 1 + (s3 / s1)(B) 1 – (s3 / s1)(C) 1 + (s1 / s3)(D) 1 – (s1 / s3) |
| Answer» | |
| 26. |
Which of the following is not included in waterfall model?(A) Requirement analysis(B) Risk analysis(C) Design(D) Coding |
| Answer» | |
| 27. |
The cyclomatic complexity of a flow graph V(G), in terms of predicate nodes is:(1) P + 1(2) P – 1(3) P – 2(4) P + 2Where P is number of predicate nodes in flow graph V(G).(A) (1)(B) (2)(C) (3)(D) (4) |
| Answer» | |
| 28. |
The extent to which a software tolerates the unexpected problems, is termed as:(A) Accuracy(B) Reliability(C) Correctness(D) Robustness |
| Answer» | |
| 29. |
Consider the following two statements :(A) Business intelligence and Data warehousing is used for forecasting and Data mining.(B) Business intelligence and Data warehousing is used for analysis of large volumes of sales data.Which one of the following options is correct ?(A) (A) is true, (B) is false.(B) Both (A) and (B) are true.(C) (A) is false, (B) is true.(D) Both (A) and (B) are false. |
| Answer» | |
| 30. |
Pipelining improves performance by:(A) decreasing instruction latency(B) eliminating data hazards(C) exploiting instruction level parallelism(D) decreasing the cache miss rate |
| Answer» | |
| 31. |
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are:98, 37, 14, 124, 65, 67(A) 320(B) 322(C) 321(D) 319 |
| Answer» | |
| 32. |
An attacker sits between customer and Banker, and captures the information from thecustomer and retransmits to the banker by altering the information. This attack is called as ______.(A) Masquerade Attack(B) Replay Attack(C) Passive Attack(D) Denial of Service Attack |
| Answer» | |
| 33. |
Which of the following is FALSE?(A) The grammar S → a Sb |bSa|SS|∈, where S is the only non-terminal symbol and ∈ is the null string, is ambiguous.(B) SLR is powerful than LALR.(C) An LL(1) parser is a top-down parser.(D) YACC tool is an LALR(1) parser generator. |
| Answer» | |
| 34. |
Consider the reference string0 1 2 3 0 1 4 0 1 2 3 4If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are _______ and ______ respectively.(A) 10, 9(B) 9, 9(C) 10, 10(D) 9,10 |
| Answer» | |
| 35. |
Suppose there are four processes in execution with 12 instances of a Resource R in a system.The maximum need of each process and current allocation are given below:With reference to current allocation, is system safe ? If so, what is the safe sequence ?(A) No(B) Yes, P1P2P3P4(C) Yes, P4P3P1P2(D) Yes, P2P1P3P4 |
| Answer» | |