Computer Operator Solved Paper - KIRTADS - 132/2015

Question Paper Code: 132/2015
Computer Operator - KIRTADS
Date of Test: 14.07.2015
1.         For Intel Core i3 processor, GMCH is integrated with:
(A) South Bridge        (B) GPU
(C) North Bridge         (D) FCH
Answer: C
2.         In order to perform a critical task in timeliness, a multimedia system may use which of the following disk scheduling?
(A) SSTF                   (B) SATF
(C) Elevator               (D) Real Time
Answer: D
3.         An omega switching network with n CPU and n memories requires how many switches?
(A) (n log2n)/2            (B) n/2(n log2n)
(C) log2n                    (D) log2n/2
Answer: A
4.         The minimum pit length for a single layer DVD is:
(A) 500            (B) 400
(C) 600            (D) 250
Answer: B
5.         A pipelining system with n segments takes 50 sub operations in a sequence. The time taken to complete a sub operation in each segment is 8 nsec. If the task is completed in 424 nsec, what is the value of n?
(A) 2                (B) 8
(C) 4                (D) 16
Answer: C
6.         In multiprocessor system, a processor generated signal that serves to prevent other processors from using the system bus as long as the signal is active can be called as:
(A) Semaphore          (B) Pipe
(C) Hardware Lock     (D) Critical Session
Answer: C
7.         At the beginning of an instruction cycle, the content of the Instruction Register is 5 and that of Program Counter is 320. When the instruction is read, the address part of the instruction is the number 7. Then the effective address in relative address mode is:
(A) 328            (B) 327
(C) 325            (D) 342
Answer: A
8.         The return address from a subroutine call is arranged as:
(A) Round Robin        (B) FIFO
(C) LIFO                              (D) Queue
Answer: C
9.         The Bootstrap Loader resides in:
(A) Hard Disk             (B) Any bootable device
(C) RAM                              (D) ROM
Answer: D
10.     The IRQ commonly assigned to Hard Disk Controller is:
(A) 11              (B) 12
(C) 13              (D) 14
Answer: D
11.     For DDR2 type RAM with 8 internal blocks and clock speed 533 MHz, the maximum average periodic refresh rate can be:
(A) 4.5             (B) 7.8
(C) 33.3           (D) 17.5
Answer: B
12.     An operating system written as a set of procedures in which, each can call any other without any reservation is:
(A) Virtual System                (B) Layered System
(C) Distributed System         (D) Monolithic System
Answer: D
13.     A program in execution state is called as:
(A) Shell          (B) Process
(C) Task          (D) Thread
Answer: B
14.     A situation in which a multiprogramming system spends more time in page I/O:
(A) Starvation             (B) Dead Lock
(C) Fragmentation      (D) Thrashing
Answer: D
15.     Calculate the average access time for the sector of a disk with 512 bytes per sector and 10 ms of average seek time. The disk rotates at a speed of 7200 rpm and transfers data at a rate 4 MB/Sec. The controller overhead is 1 ms. Assume that there is no service time:
(A) 19.6 ms      (B) 16.2 ms
(C) 15.3 ms     (D) 10.3 ms
Answer: C
16.     When a process wants to print a file, it writes the file name in a directory called:
(A) Spooler                (B) Buffer
(C) Daemon               (D) Log
Answer: A
17.     In a demand paging system, M is the time to access memory, F is the average time to service a page fault. P is the probability of page fault. Then the effective access time is:
(A) P*M+(1-P)*F        (B) M+(1-P)*F
(C) (1-P)*M+P*F        (D) (M+F)*P
Answer: C
18.     Externally defined symbols are resolved by:
(A) Compiler              (B) Linker
(C) Loader                 (D) Lexical Analyser
Answer: B
19.     The initial value of a semaphore that ensures only one of the many processes enter the critical session is:
(A) 0                (B) 1
(C) -1              (D) 2
Answer: B
20.     Debugging a kernel code is a difficult task, because of:
(A) Kernel code cannot be executed easily under a debugger
(B) Bugs in a kernel code cannot be traced easily, because it is a set of procedures related to a separate process and there will be a little evidence to track the errors
(C) Errors may be hard to reproduce and may collapse the entire system
(D) All the above reasons
Answer: D
21.     Which of the following HTML tag has an attribute called Frame?
(A) <INPUT>              (B) <FORM>
(C) <FRAMESET>      (D) <TABLE>
Answer: D
22.     The HTML DOM Event that is triggered automatically when a user enters a web page is:
(A) OnLoad                (B) OnFocus
(C) OnOpen               (D) OnShow
Answer: A
23.     CORBA programmers can develop distributed applications in C++/Java using:
(A) Orbix          (B) OpalOrb
(C) GIOP         (D) EJB
Answer: A
24.     XML captures Hypertext information using:
(A) <A>           (B) XLL
(C) XLS           (D) DTD
Answer: B
25.     In DHCP, the UDP port number for sending data to the server is:
(A) 60              (B) 62
(C) 65              (D) 67
Answer: D
26.     Which of the following statement is false?
(A) It is not possible to convert an HTML document into an XML document
(B) Both XML and HTML are subset of SGML
(C) A well formatted XML document need not require DTD
(D) CSS works better with XML than with HTML
Answer: A
27.     In a style sheet, the style rule from another CSS file can be loaded using:
(A) @include              (B) @import
(C) @attach               (D) @load
Answer: B
28.     The easiest method for a Web Server program to store the client information in a web browser for future use is:
(A) Applet                  (B) Cookie
(C) Template              (D) Log file
Answer: B
29.     A form of address spoofing resulting in denial of service attack:
(A) Session Hijacking            (B) Island Hopping
(C) Sniffing                          (D) War Dialing
Answer: A
30.     Which of the following is a JavaScript debugging method?
(A) window.alert         (B) console.log
(C) document.write     (D) document.getElementById
Answer: B
31.     Which of the following statement is false?
(A) Samba can play a number of server roles such as a File Server, Print Server, Primary Domain Controller etc.
(B) Samba allows to share files with windows host.
(C) SWAT requires no web server running
(D) SWAT interface cannot be directly accessed from web browser
Answer: D
32.     Simplest way to pass data between two Linux programs running in a system is:
(A) Socket                 (B) Pipe
(C) Semaphore          (D) RPC
Answer: B
33.     The Linux command that can be used to search for a pattern matching string in a file:
(A) find            (B) which
(C) grep           (D) search
Answer: C
34.     In Redhat Linux, the powerful and secure method for network configuration is:
(A) NetBios      (B) Netstart
(C) IPSec         (D) Apache
Answer: B
35.     The file system that is the best choice for new installations of Linux is:
(A) NTFS         (B) EX2
(C) EX4           (D) JFS
Answer: C
36.     In a Linux kernel, two mapping registers are simultaneously used as compatibly mapped buffers for CPU and Peripherals. Then the DMA Mapping is:
(A) Consistent Mapping        (B) Buffer Mapping
(C) Streaming Mapping         (D) Scatter Mapping
Answer: A
37.     A format that can only archive a group related files into a single file and cannot perform any compression by itself:
(A) rar             (B) bz2
(C) tar             (D) gz
Answer: C
38.     GNOME Display Manager can be configured by editing:
(A) gdm.conf              (B) GNOME.conf
(C) Xserver.conf         (D) XDM.conf
Answer: A
39.     The powerful online help system of Linux is:
(A) who            (B) man
(C) more          (D) how
Answer: B
40.     A Linux tool that can be used to create hard disk partitions only at the time of Linux installation:
(A) fdisk                     (B) cfdisk
(C) Disk Mount           (D) DRUID
Answer: D
41.     The average time required to perform a successful sequential search for an element in a array with n elements:
(A) n/2             (B) (n+1)/2
(C) (n-1)/2       (D) 2n
Answer: B
42.     Each node in a tree has a value greater than all values in the left subtree and has a value less than all values in the right subtree. Then the tree is:
(A) Binary search tree          (B) Complete tree
(C) Balanced tree                 (D) Threaded tree
Answer: A
43.     The sort method that switches the adjacent elements, if needed after comparison is:
(A) Heap sort             (B) Quick sort
(C) Insertion sort        (D) Bubble sort
Answer: D
44.     Minimum number of queues needed to implement the priority queue is:
(A) 1      (B) 2
(C) 3      (D) 4
Answer: B
45.     After a sequence of steps in an algorithm, a linked list reaches the following step, START=NULL
Then the situation is,
(A) overflow               (B) underflow
(C) initialisation           (D) saturation
Answer: B
46.     The result of following expression in polish notation is
4 3 2 + * 8 4 /-
(A) 13              (B) 12
(C) 18              (D) 34
Answer: C
47.     The data structure that can implement a recursive procedure is:
(A) Tree           (B) Linked List
(C) Queue       (D) Stack
Answer: D
48.     For a sorted linked list of length n, the worst case time required to search a given element is:
(A) O(n)           (B) O(2n)
(C) O(log2 n)    (D) O(log2 2n)
Answer: A
49.     The characteristic of the elements that is maximum utilized in binary search is:
(A) Length of the list   (B) Number of elements in the list
(C) Order of the list    (D) Highest value in the list
Answer: C
50.     For a binary tree with nine nodes, the result of inorder traversal is: D B A G E C H F I. And that of postorder traversal is: D B G E H I F C A. Then the result of preorder traversal is:
(A) A B D C E G F H I
(B) A B D E C F G H I
(C) A D B C E F G H I
(D) A D B E F C G H I
Answer: A
51.     The communication device that uses spanning tree algorithm to avoid loops:
(A) Router        (B) Gateway
(C) Bridge        (D) Switch
Answer: C
52.     Delaying an outgoing control frame in order to hook onto the next outgoing data frame is called:
(A) Packet Sniffing               (B) Compounding
(C) Optimal Routing              (D) Piggy Backing
Answer: D
53.     Dijkstra’s algorithm facilitates:
(A) Multipathing                    (B) Shortest Path Routing
(C) Isolated Routing             (D) Centralised Routing
Answer: B
54.     The OSI Layer in which the auto negation resides is:
(A) Physical               (B) Network
(C) Transport             (D) Data Link
Answer: A
55.     The transmission media that uses BNC connector is:
(A) Coaxial Cable       (B) UTP
(C) STP                     (D) Optical Fiber
Answer: A
56.     The mode of communication used in a serial communication channel is:
(A) Simplex                (B) Half duplex
(C) Full duplex            (D) Both (B) and (C)
Answer: C
57.     The communication standard for a wireless network is specified by
(A) 802.11       (B) 802.21
(C) 802.8         (D) 802.12
Answer: A
58.     The FDDI network is an example of:
(A) Bus            (B) Star
(C) Ring           (D) Mesh
Answer: B
59.     A standard protocol for packet switching is:
(A) POTS         (B) SMTP
(C) PSTN         (D) X.25
Answer: D
60.     The number of bits in a MAC Address is:
(A) 32              (B) 48
(C) 64              (D) 128
Answer: B
61.     Which of the following is not a relational operator?
(A) Difference            (B) Addition
(C) Division                (D) Selection
Answer: B
62.     In DBMS, the front end application performs:
(A) Storage function             (B) Access control
(C) Processing function        (D) All of the above
Answer: C
63.     In a table, the relationship among a set of values are represented by:
(A) Tuple         (B) Attribute
(C) Entity         (D) Key
Answer: A
64.     The Schema that provides a standard way of organizing information into accessible parts:
(A) Logical                 (B) Physical
(C) External               (D) Storage level
Answer: A
65.     The physical location of a database record is determined by a key transformation in:
(A) Index         (B) Random
(C) Hash          (D) Pointer
Answer: C
66.     Which of the following is not a set operator in SQL?
(C) MINUS       (D) LIKE
Answer: D
67.     Which one of the following is a procedural language?
(A) Domain relational calculus         (B) System-R
(C) Query language                        (D) Relational language
Answer: D
68.     A buffer that has been changed in database buffer memory, but not yet written to disk is:
(A) Swap space          (B) Latch
(C) Redo Log             (D) Dirty Block
Answer: D
69.     The timestamp ordering that makes no distinction between the Read and Write access so that only a single value is required for each granule is:
(A) Partial timestamp ordering
(B) Total timestamp ordering
(C) Multi version timestamp ordering
(D) Optimal timestamp ordering
Answer: B
70.     The constraint specifying that account number must be in between 50000 and 80000 is a:
(A) Integrity constraint                    (B) Referential constraint
(C) Default constraint           (D) Key constraint
Answer: A
71.     In a Java program, the length in pixel of a string can be obtained using the method:
(A) Stringwidth           (B) Strlength
(C) Length                 (D) Strwidth
Answer: A
72.     Select the correct statement from the following :
(A) Char p=(char*)malloc(100);
(B) char *p=(char*)malloc(100)l
(C) Char p=(malloc(100));
(D) char *p=(char*)malloc(100);
Answer: D
73.     The statement that is least preferred in C programs in general is:
(A) Recursion             (B) Nesting of different type of loops
(C) Double pointer      (D) Unconditional Jump to a label
Answer: D
74.     What will be the output of following C++ program?
Void main()
char *cp= “computer”;
(A) puter                    (B) mputer
(C) nputer        (D) quter
Answer: C
75.     What will be the output of following C++ program?
void main()
int x=10,y=5,z;
(A) 15              (B) 16
(C) 17              (D) 18
Answer: C
76.     In order to get the MIME type of a file, a Servelt may use the methods defined in the interface:
(A) servlet Info           (B) servlet container
(C) Servlet Config       (D) servlet context
Answer: D
77.     Java method that can be used to pause the current thread execution until and unless another thread completes its execution:
(A) sleep          (B) yield
(C) join            (D) suspend
Answer: C
78.     Which Java Interface can be used to store objects using a key-value pair, avoiding duplicate values?
(A) Java.util.Collection          (B) Java.util.Set
(C) Java.util.List                   (D) Java.util.Map
Answer: D
79.     Which of the following statement is false for C++ programs?
(A) Throw cannot be executed from a function called from a try block
(B) Unhandled throw results in an abnormal program termination
(C) Throw is a keyword for newer versions of C++ compiler
(D) Catch block may be selected by matching data type with the value given in throw
Answer: A
80.     Which of the following data type can be used along with switch statement for comparison, in C++?
(A) (int*)          (B) double
(C) enum         (D) struct
Answer: C
81.     67th can Golden plan for best film given for:
(A) Goodbye to language      (B) The Wonders
(C) Mister Turn                    (D) Winter Sleep
Answer: D
82.     The ‘Ring Spot Virus’ is the most destructive disease of:
(A) Papaya      (B) Banana
(C) Mango       (D) Coffee
Answer: A
83.     The ratio of width of our National Flag to its length is:
(A) 3:5             (B) 2:4
(C) 2:3             (D) 3:4
Answer: C
84.     Prime Minister Narendra Modi sworn in as the:
(A) 16th Prime Minister          (B) 15th Prime Minister
(C) 14th Prime Minister          (D) 13th Prime Minister
Answer: B
85.     The fourth Chief Minister of Kerala:
(A) EMS          (B) Pattom Thanupillai
(C) R. Sankar   (D) A.K. Antony
Answer: A
86.     Who is known as ‘Indian Bismark’?
(A) Kamaraj                         (B) Nehru
(C) Sardar Vallabhai Patel     (D) Rajaji
Answer: C
87.     Kerala Varma Pazhassi Raja was short to death in:
(A) 1805, June 11                (B) 1805, July 7
(C) 1805, October 30           (D) 1805, November 30
Answer: D
88.     Which of the following is a biography of the lady Mountbatten?
(A) Edwine Mountbatten
(B) Edwine Mountbatten - A life of her own
(C) Edwine Mountbatten - Her relationship with Nehru
(D) Mountbatten
Answer: B
89.     Durant Cup is associated with:
(A) Volley ball             (B) Foot ball
(C) Cricket                 (D) Hockey
Answer: B
90.     National Maritime day follows on:
(A) April 5                  (B) June 5
(C) October 5             (D) September 5
Answer: A
91.     The temple entry proclamation of Sree Chithira Thirunal was in the year:
(A) 1933          (B) 1934
(C) 1935                    (D) 1936
Answer: D
92.     The ozone layer restricts:
(A) Visible light                     (B) Infrared radiation
(C) Ultraviolet radiation         (D) X-rays and Gamma rays
Answer: C
93.     Each year World Red Cross and Red Crescent day is:
(A) May 8                  (B) May 28
(C) January 10           (D) March 20
Answer: A
94.     The proposed Ken-Betwa river linking project is in which state?
(A) Maharashtra         (B) Odisha
(C) Gujarat                (D) Madhya Pradesh
Answer: D
95.     The uprising of 1857 was described as the first war of Indian Independence by:
(A) B.G. Tilak             (B) V.D. Savarkar
(C) S.N. Sen              (D) R.C. Majumdar
Answer: B
96.     The title of ‘Viceroy’ was added to the office of the Governor General of India for the first time in:
(A) 1848          (B) 1856
(C) 1858                    (D) 1862
Answer: C
97.     Who among the following belong to Moderates?
(A) B.G. Tilak             (B) W.C. Banerjee
(C) Lala Lajpat Rai     (D) Bipin Chandra Pal
Answer: B
98.     Cripps Mission arrived in India in the year:
(A) 1947          (B) 1946
(C) 1942                    (D) 1940
Answer: C
99.     The Indian who attended all the Three Round Table Conference was:
(A) Dr. B.R. Ambedkar         (B) Mahatma Gandhi
(C) Muhammad Ali Jinnah     (D) Annie Besant
Answer: A
100. Who is the father of English poetry?
(A) Milton                   (B) Wordsworth
(C) Charles Dickens   (D) Chaucer
Answer: D

Post a comment