You are on page 1of 5

SAIMEDHA ECET COACHING CENTRE

TIRUPATI * HYDERABAD * VIJAYAWADA Ph:2255792 Ph: 24611681 Ph: 5514010

Computer Engineering Topic: Pre ECET Max. Marks:100

101. Which of the following is an advantage of interrupt-device I/O over programmed I/O 1) faster competition of I/O 2) higher bandwidth availability 3) better CPU utilization 4) smaller memory management 102. Determine the no .of page faults using optimal page replacement policy for the given page reference sequence 2,3,2,1,5,2,4,5,3,2,5,2. Assume that there are 3 page frames 1)2 2)6 3)4 4)3 103. An Operating system can be thought of having the objective(s) 1)Facilitating convenience to use the system(Convenience) 2)Allowing the computer system resources to be used in an efficient manner(Efficiency) 3)To permit the effective development, testing, and introduction of new system functions without interfering with service(Ability to evolve) 4) All of above 104. The interval of time between submission of a process and its completion which includes actual execution time + time spent waiting for resources including the processor 1)response time 2)turn around time 3)deadline time 4)throughput 105. In which of the process scheduling policies starvation is possible. 1)FIFO 2)Round robin 3)Shortest remaining time next 4)Highest response ratio next 106. Round robin scheduling 1)is quite complex to implement 2) allows interactive tasks quick for access to processor 3)allows processor bound tasks more time in the processor 4)gives each task the same chance at the processor

107. Print quality in dot matrix printers can be enhanced by 1)increasing print wires 2)printing twice 3)increasing print wires and printing twice 4)none
108. Simplify the following F (w, x, y, z) = (0,2,4,5,6,7,8,10.13.15) 1) z x + w x + x z 2) z x + w x + x z 3) z x + w x + x z 4) z x + w x + x z 109. (101.110)2 + (E.F)16 + (376)8= 1) 112.B 2) 111. A 3) 111.B 4) none 110. How many NOR gates are required to construct half adder? 1) 6 2) 7 3) 8 4) none 111. In order to realize N 1 multiplexer, we require _____ number of 2 1 multiplexers 1) N 2) N 1 3) N + 1 4) log2N 112. PLA contains ________ 1) AND ROM, OR-ROM 2) AND, OR gates 3) NAND, AND gates 4) AND, NOR gates 113. D F/F is a J-K f/f where J and K are _______ 1) same 2) never same 3) J=0, K=1 4) J=1, K=0

114. The basic RS flipflop is 1)a monostable multivibrator 2)a bistable multivibrator 3)an astable multivibrator 4)a Schmitt trigger
115. How many 11s does the following expression is having in its binary equivalent 163 7 + 162 3 + 162 3 + 161 2 + 5 1) 9 2) 6 3) 8 4) none 116. Which of the following is/are a correct statement 1) every subordinate entity is a weak entity 2) every weak entity is a subordinate entity 3) relations produced from an E-R model will always be in BCNF 4) all of the above 117. The tables generated on compilation of data definition language are stored in 1) data abstraction 2) data file 3) mata data 4) data dictionary 118. [(Select eno from emp where dept, no=10) UNION (Select eno from emp where deptno=20)] is Query 1, [(Select eno from emp where deptno=10 or deptno=20)] is Query 2 i. Query 1 and Query 2 gives same number of rows ii) Query 1 and Query 2 gives same number of rows is there are no duplicate in eno iii) The o/p of Query 1 and Query 2 look alike row by row is eno is a primary key form the relation emp 1) i only 2) ii only 3) iii only 4) i and iii 119. Database backups are needed for 1) Process recovery 2) Media recovery 3) Instance recovery 4)None

- Material Sponsered by Sai Medha, Hyd -

120. What techniques are used to retrieve data from more than one table in a single SQL statement 1) joins 2) union 3) nested select 4) all of above 121. The data model for conceptual design of database is

1)E-R model 2)Relational model 3)Network model 4)Hierarchial model


122. If offline redolog files exists then redo log is in __________ mode

1)NOARCHIVELOG mode 2)ARCHIVELOG mode 3)OFFLINE mode 4)ONLINE mode


123. Complex switch mechanism is involved in ______ switches

1)Capacitive 2)Hall effect 3)Membrane 4)Mechanical


124. In double density format of recording

1)Clock pulses are eliminated when 1s are recorded in bits cells 2)there is only one flux change 3)both 1&2 4)None 125. Bridge,repeater,gateway,router respectively operate on _____ layers of OSI model 1)Datalink,Physical,transport to application,network 2)Physical,Datalink,network,transport to application 3)Datalink,Physical,network,transport to application 4)Physical,network,datalink,transport to application 126. The executable file for changing unix password is 1)/etc/passwd 2)/bin/passwd 3)/passwd 4)/usr/passwd
127. The complete binary trees of level 5 has how many nodes _______ 1) 20 2) 30 3) 63 4) 32

128. The command who |sort file1 > file2 1)results in error 2)sorts the contents of file1 and puts in file2 3)combines the o/p of who & contents of file1 & sorts the resultant 4)None 129. If one doesnt want anyone else to read or write to a file named datfile, except through a program in the file filex, then he/she may use 1)chmod u+s filex ; chmod go-rw datfilex 2)chmod 4711 filex ; chmod go-rw datfile 3)both 1&2 4) chmod u+s filex ; chmod go-rw filex
130. The following tree is _______ 1) complete and heap 2) full (and complete) 3) only full binary 4) heap

131. Which of the following fields in the structure stat, has information about the permission setting of a file 1)st_gid 2)st_mode 3)st_ino 4)st_uad 132. Which of the following tools can be used to keep track of evolving versions of a file 1)source code calling system 2) source code commanding system 3)source code control system 4) source code compile system 133. The call pipe(p); is valid if p has been declared as 1)int p 2)int p[2] 3)char *p 4)FILE *p
134. The >> is the ________ operator in C++ 1) extraction 2) shift right 3) shift left 4) both 1 and 2 135. ________ flag is used when you have a program that uses both iostream and C standard library 1) ios :: stdio 2) iostream.h 3) ios :: unitbuf 4) none 136. Which of the following is a copy construction 1) A (A &obj) 2) A (A obj) 3) A (A *obj) 4) both 1 and 3 137. # include <iostream.h> void main ( ) { char ch=65; cout << setw(10); cout.fill (*); cout << ++ch; } 1) B 2) A 3) D 4) syntax error 138. Which of the statements is/are correct 1) base class pointer can hold address of derived class object 2) derived class pointer can hold address of base class object 3) both are true 4) both are false

- Material Sponsered by Sai Medha, Hyd -

139. What is the o/p of the following program main() { int a[5]={12,23,34,12,12},*p=a; printf(%d,%d,sizeof(a),sizeof(p)); } 1)2,2 2)10,2 3)5,2 4)10,10 140. _______ will be executed as soon as the uses is logged in to the system 1) .exrc 2) .profile 3) .vi 4) none 141. A _______ is defined as a process that runs without the user request and also it is terminal independent 1) daemon process 2) system calls 3) interrupt 4) kernel 142. cout stands for 1)class output 2)character output 3)common output 4)console output 143. In object oriented programming ,the mechanism that allows different data types to share the same code, leading to the reduction in code size is 1)Reusability 2)polymorphism 3)objectivity 4)Inheritance 144. this pointer is not automatically sent to 1)Private member functions 2)Static member functions 3)constructors 4)Functions with default arguments 145. The functions which are permitted to read and write the private and protected fields within the object are called 1)Shared functions 2)Liberal functions 3)Friend functions 4)Unprotected functions 146. The execution of nested interrupts follows 1) FIFO 2) LIFO 3) either 1 or 2 4) LFU 147. If write back policy is used with cache to go around cache coherence, then which of the following statements is true 1) minimizes memory write operations but leaves main memory in an obsolete state 2) minimizes memory write operations but, inspite this main memory cache coherence is pressured at all times 3) maximizes memory write operations 4) pressures cache-coherence at all times 148. In programmed I/O, it is whose responsibility to check the status of I/O module periodically until it finds that the operation is complete 1) I/O program 2) processor 3) controller 4) all of the above 149. The level of the performance of the entire system is severely degraded in _____ approach 1) I/O programmed 2) interrupt driven I/o 3) DMA 4) any of the above 150. Consider that there is a two level memory hierarchy with the following specifications. The cost-size of the memories M1 and M2 respectively are 2 byte 1KB, $-20 KB. Then the average cost per byte for the combined two-level memory 1) 10 $ 2) 49152 $ 3) 2.28 $ 4) none 151. RAID is an acronym for 1)reliable array of inexpensive disks 2)redundant array of intelligent disks 3)redundant array of independent disks 4)reliable array of independent disks 152. The topology with highest reliability is 1) bus topology 2)star topology 3) ring topology 4) mesh topology 153. Error detection at the data link layer is achieved by 1) bit stuffing 2) hamming codes 3) cyclic redundancy code 4)equalization 154. Un modulated signal coming from a transmitter is known as 1) carrier signal 2)based band signal 3)primary signal 4) none of the above 155. Bit stuffing refers to 1)inserting a 0 in user data stream to differentiate it with a flag 2)inserting a 0 in flag stream to avoid ambiguity 3)appending a nibble to the flag sequence 4) appending a nibble to the user data stream 156. Endtoend connectivity is provided from host tohost in 1) transport layer 2) session layer 3) network layer 4) physical layer 157. Which of the statements is false 1)bit rate is the number of bits per second 2)baud rate is the number of signal units per second 3)baud rate bit rate 4) none 158. The Nyquist theorem specifies the minimum sampling rate to be 1)equal to the lowest frequency of a signal 2) equal to the highest frequency of a signal 3)twice the bandwidth of a signal 4)twice the highest frequency of a signal 159. Which of the following is a class B host address 1) 230.0.0.0 2)130.4.5.6 3)238.0.0.0 4)30.4.5.6 160. Which OSI layer corresponds to the IP layer? 1)physical 2) data link 3) net work 4)transport 161. Which IP address class has few hosts per network? 1)A 2)b 3)C 4)D 162. The maximum bit rate allowed by Rs 232C is 1)50 Kbps 2)30kbps 3)20kbps 4)40kbps

- Material Sponsered by Sai Medha, Hyd -

163. How many characters per sec (7 bits +1 pacify) can be transmitted over a 2400bps line if the transfer is synchronous, asynchronous respectively (assume 1 start & 1 stop bit) 1) 300, 290 2) 360, 240 3) 300, 240 4) 350, 250 164. Priority queues are useful in 1)sorting data 2)implementing data storage 3)job scheduling in time sharing systems 4)implementing threads in a multiuser environment 165. As one goes down the memory hierarchy which is false 1) decreasing cost/bit 2) increasing capacity 3) decrease in frequency of access of the memory by the CPU 4) decreasing access time 166. The presence of cache memory in a system is 1) transparent to the programmer 2) is visible to the operating system 3) is invisible to the operating system 4) 1 and 3 167. In which of the following RAMS data is stored as charge on capacitors 1) dynamic RAM 2) static RAM 3) AM 4) all of the above 168. A B=C, which of the following is correct 1) AC=B 2) BC=A 3) ABC=0 4) all of the above 169. 80286 is a ______ bit p 1) 32 2) 64 3) 16 4) 8 170. Which of the following 8085 instructions will not affect the carry flag 1) ADC 2) CNC 3) CMC 4) STC 171. Following a system reset 80386 is initialized in 1) protected mode 2) safe mode 3) protected virtual mode 4) real mode 172. In 8086 which of the following general purpose register is used to implement register relative addressing modes 1) AX 2) BX 3) CX 4) DX 173. The machine cycles required to execute CALL instruction (8085) are 1) 3 2) 4 3) 5 4) 6 174. The machine cycles requires for the one-byte implied unconditional branch instruction (in 8085) is 1) 32) 4 3)0 5 4) 6 175. Which of the following is a 16-bit controller 1) 8037 2) 8048 3) 8051 4) 8096 176. The data memory of 8051 is 1) 64 bytes 2) 64 KB 3) 128 bytes 4) 128 KB 177. The number of tokens in the following C statement is scanf(%d%d,&a,&b); 1) 10 2) 19 3) 15 4) 11 178. The total no. of data bytes that can be stored on diskette is reduced to certain extent in 1) Hard sectoring 2) soft sectoring 3) 1 ad 2 both 4) none 179. In order to read the contents of a file in reverse order if fp is a file pointer then which of the following optims is correct to use in a loop where fp is already pointing the last character in the file (not EOF character) 1) fseek (fp, -2L, 2) 2) fseek (fp, -1L,2) 3) fseek (fp, -2L,1) 4) fseek (fp, -2L,0) 180. Which of the following declares a pointer to a function that returns integer 1) int *p( ) 2) int (*p) (int) 3) int (*p) ( ) 4) * int p( ) 181. Which of the following says that p is a function that returns pointer to integer 1) int (*p) (int) 2) int (*p) ( ) 3) * int p( ) 4) int * p( ) 182. Which of the following declares an array of two integer pointers 1) int *p [2] 2) int (*p) [2] 3) int (*p[2]) 4) int [*p] 2 183. The reversing of a string can be easily performed using 1) graphs 2) stacks 3) queues 4) tress 184. _________ cycle(s) must be present in a tree 1) 1 2) 2 3) 3 4) 0 185. In a circular queue the no. of data items is (MAX is the size of the circular queue) 1) Rear front, if rear > front or MAX (front rear) other wise 2) Rear front 3) Rear front if rear > front 4) front Rear if rear < front 186. The in order traversal of some binary tree produced the sequence DBEAFC and the preorder traversal of the same tree produced the sequence DEBFCA. What will be total number of nodes in the right sub tree of the given tree 1) 1 2) 6 3) 5 4) none 187. Device driver is a 1) electric motor 2) device controller 3) device dependent s/w 4) I/O processor 188. The number which doesnt represent the possible no. of pins in the dot matrix printer head is 1) 14 2) 9 3) 12 4) 24 189. In a circular linked list organization insertion of a new node involves the modification of 1) no pointer 2) 2 pointers 3) only one pointer 4) unpredictable

- Material Sponsered by Sai Medha, Hyd -

190. Which of the following option(s) are correct regarding the eraser of --- EPROM, flash memory, EEPROM respectively 1) UV light-chip level, electrically-block level, electrically-block level 2) UV light-chip level, electrically-block level, electrically-byte level 3) UV light-chip level, UV light-block level, electrically-byte level 4) UV light-chip level, UV light-block level, electrical-block level 191. For 4 columns of chips, each column containing 256 K words arranged with 8 bits per word, how many lines are needed to address a word 1) 4 2) 18 3) 12 4) 20 The following matter pertains to the next 2(192 &193) questions.. Consider the data The cache can hold 64KB Data is transferred between main memory and cache in blocks of 4 bytes each. This means that the cache is organized as 16K=214 lines of 4 bytes each. The main memory consists of 16MB, with each byte directly addressable by a 24 bit address. 192. The no. of tag bits in the main memory address in direct mapping 1) 8 2) 14 3) 2 4) 10 193. The no. of tag bits in the main memory address in associative mapping 1) 22 2) 14 3) 8 4) 9 194. In providing cache consistency which technique is the simplest 1) write back 2) look aside 3) look through 4) write through 195. Booths algorithm is used for 1) addition 2) subtraction 3) multiplication 4) division 196. With 1s complement method, the range of numbers that can be represented using n bits is 1) a 1-followed by using n-1 zeros to a 0 followed by n-1 ones 2) a 0 followed by n-1 ones to a 1 followed by n-1 zeors 4) none 3) 2n1 to 2n1 197. The postfix expression for the infix expression A + B * (C+D)/F +D*E is 1) ABCD + F/+DE+ 2) A +*BCD/F*DE++ 3) A*B+CD/F*DE++ 4) AB+C+*F/D+E* 198. #define square (x) x * x main ( ) { int i, j=2; i=square (++j); printf(%d, %d, i, j); } What is the o/p for the above program 1) 16, 4 2) 12, 4 3) 4, 4 4) none 199. The value of X and i after the execution of the following is statement respectively is int i=0; X=i++?++i : i; 1) 1, 0 2)0 0, 1 3) 2, 1 4) 1, 0 200. What is the o/p of the following program void main ( ) { int i= 5, j=6, k=0, l; l=++i && j !!++k; printf(%d, %d, %d, i,j.k,l); } 1) 4, 5,1,1 2) 4,5,0,1 3) 5,6,0,1 4) none

- Material Sponsered by Sai Medha, Hyd -

You might also like