Filled Under:

[Sarkari-Naukri] Harish Sati, 3i Infotech technical question part 2 solved

3i INFOTECH TECHNICAL QUESTIONS (Part -2)

51. What is the efficiency of merge sort
Ans :
O(n log n)

52. In which layer are routers used
Ans : In network layer 

53. Which of the following sorting algorithem has average sorting behavior --Bubble sort, merge sort, heap sort, exchange sort -

Ans : Heap sort

54. In binary search tree which traversal is used for getting ascending order values--Inorder ,post order,preorder 

Ans : Inorder

55. What are device drivers used for 

Ans : To provide software for enabling the hardware

56. What are device drivers used for 

Ans : To provide software for enabling the hardware

57. What is make command in unix 

Ans : Used forcreation of more than one file

58. In unix .profile contains 

Ans : Start up program

59. In unix 'ls 'stores contents in

Ans : inode block

60. Which of the following involves context switch,
(a) system call (b) priviliged instruction (c) floating poitnt exception
(d) all the above (e) none of the above 
Ans: (a)

61. In OST, terminal emulation is done in
(a) sessions layer (b) application layer (c) presentation layer  (d) transport layer 
Ans: (b)

62. For 1 MB memory, the number of address lines required,
(a)11 (b)16 (c)22 (d) 24 

Ans : (b)

63. Semaphore is used for
(a) synchronization (b) dead-lock avoidance (c) box (d) none 

Ans : (a)

64. Which holds true for the following statement class c: public A, public B
a) 2 member in class A, B should not have same name
b) 2 member in class A, C should not have same name
c) both d) none 

Ans : (a)

65. Preproconia.. does not do which one of the following
(a) macro (b) conditional compliclation (c) in type checking (d) including load file

Ans : (c)

66. Piggy backing is a technique for
a) Flow control b) Sequence c) Acknowledgement d) retransmition 

Ans : (c)

67. Which is not a memory management scheme?
a) buddy system b) swapping c) monitors d) paging Ans : c

68. There was a circuit given using three nand gates with two inputs and one output. Find the output.
a) OR b) AND c) XOR d) NOT
Ans : (a)

69. Iintegrated check value(ICV) are used as:
Ans : The client computes the ICV and then compares it with the senders value.

70. When applets are downloaded from web sites , a byte verifier performs _________?

Ans : Status check

71. An IP/IPX packet received by a computer using... having IP/IPX both how the packet Is handled.
Ans : Read the, field in the packet header with to  send IP or IPX protocol.

72. The UNIX shell ....
a) does not come with the rest of the system
b) forms the interface between the user and the kernal
c) does not give any scope for programming
d) deos not allow calling one program from with in another
e) all of the above
Ans : (b)

73. In UNIX a files i-node ......?
Ans : Is a data structure that defines all specifications of a file like the file size, number of lines to a file, permissions etc.

74. The very first process created by the kernal that runs till the kernal process is halts is
a) init b) getty c) both (a) and (b) d) none of these
Ans : (a)

75. In the process table entry for the kernel process, the process id value is
(a) 0 (b) 1 (c) 2 (d) 255 (e) it does not have a process table entry 

Ans : (a)

76. Which of the following API is used to hide a window
a) ShowWindow b) EnableWindow c) MoveWindowd) SetWindowPlacement
e) None of the above
Ans : (a)

77. Which function is the entry point for a DLL in MS Windows 3.1
a) Main b) Winmain c) Dllmain d) Libmain e) None
Ans : (b)

78. The standard source for standard input, standard output and standard error is a) the terminal b) /dev/null
c) /usr/you/input, /usr/you/output/, /usr/you/error respectively
d) None
Ans : (a)

79. The redirection operators > and >>
a) do the same function b) differ : > overwrites, while >> appends
c) differ : > is used for input while >> is used for output
d) differ : > write to any file while >> write only to standard output
e) None of these
Ans : (b)

80. The command grep first second third /usr/you/myfile
a) prints lines containing the words first, second or third from the file /usr/you/myfile
b) searches for lines containing the pattern first in the files second, third, and /usr/you/myfile and prints them
c) searches the files /usr/you/myfiel and third for lines containing the words first or second and prints them
d) replaces the word first with the word second in the files third and /usr/you/myfile
e) None of the above

Ans : (b)

81. You are creating a Index on EMPNO column in the EMPLOYEE table. Which statement will you use?
a) CREATE INdEX emp_empno_idx ON employee, empno;
b) CREATE INdEX emp_empno_idx FOR employee, empno;
c) CREATE INdEX emp_empno_idx ON employee(empno); 
d) CREATE emp_empno_idx INdEX ON employee(empno);
Ans : c

82. Which program construct must return a value?
a) Package b) Function c) Anonymous block d) Stored Procedure
e) Application Procedure
Ans : b

83. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY
constraint and all depending constraints fromthe EMPLOYEE table?
a) ALTER TABLE employee dROP PRIMARY KEY CASCAdE; 
b) ALTER TABLE employee dELETE PRIMARY KEY CASCAdE;
c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pk CASCAdE;
d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pk CASCAdE;
e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pk CASCAdE;

Ans : a

84. Which three commands cause a transaction to end? (Chosse three)
a) ALTER b) GRANT c) DELETE d) INSERT e) UPdATE
f) ROLLBACK
Ans : a ,b ,f

85. Under which circumstance should you create an index on a table?
a) The table is small.
b) The table is updated frequently.
c) A columns values are static and contain a narrow range of values
d) Two columns are consistently used in the WHERE clause join condition 
of SELECT statements.

Ans : d

86. What was the first name given to Java Programming Language. 
a) Oak - Java b) Small Talk c) Oak d) None
Ans : a

87. A certain radioactive element A, has a half life = t seconds. In (t/2) seconds the fraction of the initial quantity of the element so  far decayed is nearly
(a) 29% (b) 15% (c) 10% (d) 45%
Ans : (a)

88. Which of the following plots would be a straight line ?
(a) Logarithm of decay rate against logarithm of time
(b) Logarithm of decay rate against logarithm of number of decaying nuclei
(c) Decay rate against time
(d) Number of decaying nuclei against time
Ans : (b)

89. A radioactive element x has an atomic number of 100.
It decays directly into an element y which decays directly into element z.
In both processes a charged particle is emitted.
Which of the following statements would be true?
(a) y has an atomic number of 102 (b) y has an atomic number of 101
(c) z has an atomic number of 100 (d) z has an atomic number of 101

Ans : (b)

90. If the sum of the roots of the equation ax2 + bx + c=0 is equal to the sum of the squares of their reciprocals then a/c, b/a, c/b are in 
(a) AP (b) GP (c) HP (d) None of these
Ans : (c)

91. A man speaks the truth 3 out of 4 times. He throws a die and reports it to be a 6. What is the probability of it being a 6?
(a) 3/8 (b) 5/8 (c) ¾ (d) None of the above
Ans : (a)

92. If cos2A + cos2B + cos2C = 1 then ABC is a
(a) Right angle triangle (b) Equilateral triangle (c) All the angles are acute
(d) None of these
Ans : (a)

93. Image of point (3,8) in the line x + 3y = 7 is
(a) (-1,-4) (b) (-1,4) (c) (2,-4) (d) (-2,-4)
Ans : (a)

94. The mass number of a nucleus is 
(a) Always less than its atomic number (b) Always more than its atomic number
(c) Sometimes more than and sometimes equal to its atomic number
(d) None of the above
Ans : (c)

95. The maximum KE of the photoelectron emitted from a surface is dependent 
on (a) The intensity of incident radiation (b) The potential of the collector
electrode (c) The frequency of incident radiation
(d) The angle of incidence of radiation of the surface
Ans : (c

96. Which of the following is not an essential condition for interference
(a) The two interfering waves must be propagated in almost the same direction or 
the two interfering waves must intersect at a very small angle
(b) The waves must have the same time period and wavelength
(c) Amplitude of the two waves should be the same
(d) The interfering beams of light must originate from the same source 

Ans : (c)

97. When X-Ray photons collide with electrons 
(a) They slow down (b) Their mass increases (c) Their wave length  increases (d) Their energy decreases
Ans : (c)

98. An electron emits energy 
(a) Because its in orbit (b) When it jumps from one energy level to another
(c) Electrons are attracted towards the nucleus
(d) The electrostatic force is insufficient to hold the electrons in orbits

Ans : (b)

99. An electron emits energy 
(a) Because its in orbit (b) When it jumps from one energy level to another
(c) Electrons are attracted towards the nucleus
(d) The electrostatic force is insufficient to hold the electrons in orbits

Ans : (b)

100. How many bonds are present in CO2 molecule?
(a) 1 (b) 2 (c) 0 (d) 4
Ans : (d)



--
with warm regards

Harish Sati
Indira Gandhi National Open University (IGNOU)
Maidan Garhi, New Delhi-110068

(M) + 91 - 9990646343 | (E-mail) Harish.sati@gmail.com


--~--~---------~--~----~------------~-------~--~----~
You have subscribed to the Groups "Sarkari-naukri" of http://sarkari-naukri.blogspot.com at Google.com.
Send email to Sarkari-naukri@googlegroups.com for posting.
Send email to
Sarkari-naukri-unsubscribe@googlegroups.com to unsubscribe.
Visit this group at
http://groups.google.com/group/Sarkari-naukri?hl=en
-~----------~----~----~----~------~----~------~--~---

Sonia Choudhary

Author & Editor

Has laoreet percipitur ad. Vide interesset in mei, no his legimus verterem. Et nostrum imperdiet appellantur usu, mnesarchum referrentur id vim.

0 comments:

 

We are featured contributor on entrepreneurship for many trusted business sites:

  • Copyright © Currentgk™ is a registered trademark.
    Designed by Templateism. Hosted on Blogger Platform.