Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

​If the frame buffer has 10-bits per pixel and 8-bits are allocated for each of the R, G and B components then what would be the size of the color lookup table (LUT)(A) (2​10​ +2​11​ ) bytes(B) (2​10​ +28​ ) bytes(C) (2​10​ + 2​24​ ) bytes(D) (2​8​ + 2​9​ ) bytes

Answer»
2.

Suppose P, Q and R are co-operating processes satisfying Mutual Exclusion condition. Then if the process Q is executing in its critical section then(A) ‘P’ executes in critical section(B) ‘R’ executes in critical section(C) Neither ‘P’ nor ‘Q’ executes in their critical section(D) Both ‘P’ and ‘R’ executes in critical section

Answer»
3.

A Computer uses a memory unit with 256K word of 32 bits each. A binary instruction code is stored in one word of memory. The instruction has four parts: an indirect bit, an operation code and a register code part to specify one of 64 registers and an address part. How many bits are there in operation code, the register code part and the address part ?(A) 7, 7, 18(B) 18, 7, 7(C) 7, 6, 18(D) 6, 7, 18

Answer»
4.

Consider the following set of processes and the length of CPU burst time given in milliseconds:Assume that processes being scheduled with Round-Robin Scheduling Algorithm with Time Quantum 4ms. Then The waiting time for P4 is _________ ms.(A) 0(B) 4(C) 12(D) 6

Answer»
5.

Which homogeneous 2D matrix transforms the figure (a) on the left side to the figure (b) on the right ?(A) (B) (C) (D)

Answer»
6.

The number of substrings that can be formed from string given by “a d e f b g h n m p” is(A) 10(B) 45(C) 56(D) 55

Answer» None
7.

Which of the following statement/s is/are true ?(i) Firewall can screen traffic going into or out of an organization.(ii) Virtual private networks cam simulate an old leased network to provide certain desirable properties.Choose the correct answer from the code given below:(A) (i) only(B) Neither (i) nor (ii)(C) Both (i) and (ii)(D) (ii) only

Answer»
8.

Consider the following statements related to AND-OR Search algorithm.S​1​ : A solution is a subtree that has a goal node at every leaf.S​2​ : OR nodes are analogous to the branching in a deterministic environmentS​3 : AND nodes are analogous to the branching in a non-deterministic environment.Which one of the following is true referencing the above statements ? Choose the correct answer from the code given below:(A) S1- False, S2- True, S3- True(B) S1- True, S2- True, S3- True(C) S1- False, S2- True, S3- False(D) S1- True, S2- True, S3- False

Answer»
9.

Which of the following HTML5 codes will affect the horizontal as well as vertical alignment of the table content ?(A) < t d halign = " middle" valign = " center" > BASH < / td >(B) < t d style = " text − a lign : center; vertical − a lign : middle; " > BASH < / td >(C) < t d align = "middle" valign = " center" > B ASH < / td >(D) < t d style = " horizontal − a lign : c enter; vertical − a lign : m iddle; " > B ASH < / td >

Answer»
10.

Consider a system with 2 level cache. Access times of Level 1, Level 2 cache and main memory are 0.5 ns, 5 ns and 100 ns respectively. The hit rates of Level1 and Level2 caches are 0.7 and 0.8 respectively. What is the average access time of the system ignoring the search time within cache ?(A) 20.75 ns(B) 7.55 ns(C) 24.35 ns(D) 35.20 ns

Answer» None
11.

Consider the following language:L​1​ = { an+m bn am | n, m ≥ 0 }L​2 = { an+m bn+m an+m |n, m ≥ 0 } Which one of the following is correct ?(A) Only L​1​ is Context Free Language(B) Both L​1​ and L​2​ are not Context Free Language(C) Only L​1​ is Context Free Language(D) Both L​1​ and L​2​ are Context Free Language

Answer»
12.

Match the List 1 and List 2 and choose the correct answer from the code given below:(A) (a)-(i), (b)-(ii), (c)-(iii), (d)-(iv)(B) (a)-(ii), (b)-(i),(c)-(iii), (d)-(iv)(C) (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)(D) (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)

Answer»
13.

​Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a web page from a remote server, assuming that the host has been restarted.(A) HTTP GET request, DNS query, TCP SYN(B) DNS query, TCP SYN, HTTP GET request(C) TCP SYN, DNS query, HTTP GET request(D) DNS query, HTTP Get request, TCP SYN

Answer»
14.

An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B ?(A) 245.248.132.0/22 and 245.248.132.0/21(B) 245.248.136.0/21 and 245.248.128.0/22(C) 245.248.136.0/24 and 245.248.132.0/21(D) 245.248.128.0/21 and 245.248.128.0/22

Answer»
15.

​The third generation mobile phone are digital and based on(A) AMPS(B) Broadband CDMA(C) CDMA(D) D-AMPS

Answer»
16.

​Consider the vocabulary with only four propositions A,B,C and D. How many models are there for the following sentence ?(⌐ A ∨​ ⌐B ∨​ ⌐C ∨​ ⌐ ​D) (A) 8(B) 7(C) 15(D) 16

Answer»