1 out of 50
Which of this is not a constituent of residential telephone line?
2 out of 50
How many layers are present in the Internet protocol stack (TCP/IP model)?
3 out of 50
Which of the following flag is used to mask INTR interrupt?
4 out of 50
Which command is used to compress files?
5 out of 50
Which of the following is correct regarding an optimizer Compiler?
6 out of 50
Transient operating system code is a code that ____________
7 out of 50
Which of the following machine requires input from the humans but can interpret the outputs themselves?
8 out of 50
Which of the following is used in graphics workstations as input devices to accept voice commands?
9 out of 50
DSL telcos provide which of the following services?
10 out of 50
The number of layers in ISO OSI reference model is __________
11 out of 50
Which of the following is a special-purpose register of microprocessor?
12 out of 50
Which command is used for displaying the beginning of a file in Unix?
13 out of 50
Which of the following error can Compiler diagnose?
14 out of 50
The portion of the process scheduler in an operating system that dispatches processes is concerned with ____________
15 out of 50
_________ number of informed search method are there in Artificial Intelligence.
16 out of 50
What is the use of voice system input?
17 out of 50
The function of DSLAM is to __________
18 out of 50
Which of the following layers is an addition to OSI model when compared with TCP IP model?
19 out of 50
Which of the following circuit is used as a special signal to demultiplex the address bus and data bus?
21 out of 50
In which of the following phase of the compiler is Lexical Analyser?
22 out of 50
The FCFS algorithm is particularly troublesome for ____________
23 out of 50
The total number of proposition symbols in AI are ________
24 out of 50
Which of the following is defined as the process of elimination of parts of a scene outside a window or a viewport?
27 out of 50
Transport layer is implemented in ______________
28 out of 50
How many flip-flops are there in a flag register of 8085 microprocessor?
29 out of 50
Which command is used to delete all files in a directory?
30 out of 50
Which of the following does an address code involve?
31 out of 50
For an effective operating system, when to check for deadlock?
32 out of 50
The total number of logical symbols in AI are ____________
33 out of 50
Which of the following is known as the window opened on the raster graphics screen in which the image will be displayed?
34 out of 50
Which of the following statements is not applicable for cable internet access?
35 out of 50
The functionalities of the presentation layer include ____________
36 out of 50
Which of the following flag condition is used for BCD arithmetic operations in microprocessor?
37 out of 50
echo command is used for _________
38 out of 50
An object module for a group of programs that were compiled separately is handed to a linker. Which of the following about an object module isn’t true?
39 out of 50
A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait condition can never exist.
40 out of 50
Among the optical-distribution architectures that are essentially switched ethernet is __________
41 out of 50
Delimiting and synchronization of data exchange is provided by __________
42 out of 50
Which of the following are the approaches to Artificial Intelligence?
43 out of 50
Among the following process, which process is known as the elimination of parts of a scene outside a window or a viewport?
44 out of 50
Star Band provides __________
45 out of 50
In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________
46 out of 50
Whenever a non-maskable interrupt occurs in 8085 microprocessor, which of the following data line contains the data?
47 out of 50
What is the function of cp command in Unix?
48 out of 50
Characters are grouped into tokens in which of the following phase of the compiler design?
49 out of 50
Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into operating system buffers.
50 out of 50
Face Recognition system is based on which type of approach?