1.
Which of this is not a constituent of residential telephone line?
1 out of 50
2.
How many layers are present in the Internet protocol stack (TCP/IP model)?
2 out of 50
3.
Which of the following flag is used to mask INTR interrupt?
3 out of 50
4.
Which command is used to compress files?
4 out of 50
5.
Which of the following is correct regarding an optimizer Compiler?
5 out of 50
6.
Transient operating system code is a code that ____________
6 out of 50
7.
Which of the following machine requires input from the humans but can interpret the outputs themselves?
7 out of 50
8.
Which of the following is used in graphics workstations as input devices to accept voice commands?
8 out of 50
9.
DSL telcos provide which of the following services?
9 out of 50
10.
The number of layers in ISO OSI reference model is __________
10 out of 50
11.
Which of the following is a special-purpose register of microprocessor?
11 out of 50
12.
Which command is used for displaying the beginning of a file in Unix?
12 out of 50
13.
Which of the following error can Compiler diagnose?
13 out of 50
14.
The portion of the process scheduler in an operating system that dispatches processes is concerned with ____________
14 out of 50
15.
_________ number of informed search method are there in Artificial Intelligence.
15 out of 50
16.
What is the use of voice system input?
16 out of 50
17.
The function of DSLAM is to __________
17 out of 50
18.
Which of the following layers is an addition to OSI model when compared with TCP IP model?
18 out of 50
19.
Which of the following circuit is used as a special signal to demultiplex the address bus and data bus?
19 out of 50
21.
In which of the following phase of the compiler is Lexical Analyser?
21 out of 50
22.
The FCFS algorithm is particularly troublesome for ____________
22 out of 50
23.
The total number of proposition symbols in AI are ________
23 out of 50
24.
Which of the following is defined as the process of elimination of parts of a scene outside a window or a viewport?
24 out of 50
27.
Transport layer is implemented in ______________
27 out of 50
28.
How many flip-flops are there in a flag register of 8085 microprocessor?
28 out of 50
29.
Which command is used to delete all files in a directory?
29 out of 50
30.
Which of the following does an address code involve?
30 out of 50
31.
For an effective operating system, when to check for deadlock?
31 out of 50
32.
The total number of logical symbols in AI are ____________
32 out of 50
33.
Which of the following is known as the window opened on the raster graphics screen in which the image will be displayed?
33 out of 50
34.
Which of the following statements is not applicable for cable internet access?
34 out of 50
35.
The functionalities of the presentation layer include ____________
35 out of 50
36.
Which of the following flag condition is used for BCD arithmetic operations in microprocessor?
36 out of 50
37.
echo command is used for _________
37 out of 50
38.
An object module for a group of programs that were compiled separately is handed to a linker. Which of the following about an object module isn’t true?
38 out of 50
39.
A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait condition can never exist.
39 out of 50
40.
Among the optical-distribution architectures that are essentially switched ethernet is __________
40 out of 50
41.
Delimiting and synchronization of data exchange is provided by __________
41 out of 50
42.
Which of the following are the approaches to Artificial Intelligence?
42 out of 50
43.
Among the following process, which process is known as the elimination of parts of a scene outside a window or a viewport?
43 out of 50
44.
Star Band provides __________
44 out of 50
45.
In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________
45 out of 50
46.
Whenever a non-maskable interrupt occurs in 8085 microprocessor, which of the following data line contains the data?
46 out of 50
47.
What is the function of cp command in Unix?
47 out of 50
48.
Characters are grouped into tokens in which of the following phase of the compiler design?
48 out of 50
49.
Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into operating system buffers.
49 out of 50
50.
Face Recognition system is based on which type of approach?
50 out of 50