Question Paper Code:
132/2015
Computer Operator -
KIRTADS
Date of Test: 14.07.2015
1.
For
Intel Core i3 processor, GMCH is integrated with:
(A) South Bridge (B) GPU
(C) North Bridge (D) FCH
Answer:
C
2.
In
order to perform a critical task in timeliness, a multimedia system may use
which of the following disk scheduling?
(A) SSTF (B) SATF
(C) Elevator (D) Real Time
Answer:
D
3.
An
omega switching network with n CPU and n memories requires how many switches?
(A) (n log2n)/2 (B) n/2(n log2n)
(C) log2n (D) log2n/2
4.
The
minimum pit length for a single layer DVD is:
(A) 500 (B) 400
(C) 600 (D) 250
Answer:
B
5.
A
pipelining system with n segments takes 50 sub operations in a sequence. The
time taken to complete a sub operation in each segment is 8 nsec. If the task
is completed in 424 nsec, what is the value of n?
(A) 2 (B) 8
(C) 4 (D) 16
Answer:
C
6.
In
multiprocessor system, a processor generated signal that serves to prevent
other processors from using the system bus as long as the signal is active can be
called as:
(A) Semaphore (B) Pipe
(C) Hardware Lock (D) Critical Session
Answer:
C
7.
At the
beginning of an instruction cycle, the content of the Instruction Register is 5
and that of Program Counter is 320. When the instruction is read, the address
part of the instruction is the number 7. Then the effective address in relative
address mode is:
(A) 328 (B) 327
(C) 325 (D) 342
Answer:
A
8.
The
return address from a subroutine call is arranged as:
(A) Round Robin (B) FIFO
(C) LIFO (D) Queue
Answer:
C
9.
The Bootstrap
Loader resides in:
(A) Hard Disk (B) Any bootable device
(C) RAM (D) ROM
Answer:
D
10.
The
IRQ commonly assigned to Hard Disk Controller is:
(A) 11 (B) 12
(C) 13 (D) 14
Answer:
D
11.
For
DDR2 type RAM with 8 internal blocks and clock speed 533 MHz, the maximum
average periodic refresh rate can be:
(A) 4.5 (B) 7.8
(C) 33.3 (D) 17.5
Answer:
B
12.
An
operating system written as a set of procedures in which, each can call any
other without any reservation is:
(A) Virtual System (B) Layered System
(C) Distributed System (D) Monolithic System
Answer:
D
13.
A
program in execution state is called as:
(A) Shell (B) Process
(C) Task (D) Thread
Answer:
B
14.
A
situation in which a multiprogramming system spends more time in page I/O:
(A) Starvation (B) Dead Lock
(C) Fragmentation (D) Thrashing
Answer:
D
15.
Calculate
the average access time for the sector of a disk with 512 bytes per sector and
10 ms of average seek time. The disk rotates at a speed of 7200 rpm and
transfers data at a rate 4 MB/Sec. The controller overhead is 1 ms. Assume that
there is no service time:
(A) 19.6 ms (B) 16.2 ms
(C) 15.3 ms (D) 10.3 ms
Answer:
C
16.
When a
process wants to print a file, it writes the file name in a directory called:
(A) Spooler (B) Buffer
(C) Daemon (D) Log
Answer:
A
17.
In a
demand paging system, M is the time to access memory, F is the average time to
service a page fault. P is the probability of page fault. Then the effective
access time is:
(A) P*M+(1-P)*F (B) M+(1-P)*F
(C) (1-P)*M+P*F (D) (M+F)*P
Answer:
C
18.
Externally
defined symbols are resolved by:
(A) Compiler (B) Linker
(C) Loader (D) Lexical Analyser
Answer:
B
19.
The
initial value of a semaphore that ensures only one of the many processes enter
the critical session is:
(A) 0 (B) 1
(C) -1 (D) 2
Answer:
B
20.
Debugging
a kernel code is a difficult task, because of:
(A) Kernel code cannot
be executed easily under a debugger
(B) Bugs in a kernel
code cannot be traced easily, because it is a set of procedures related to a
separate process and there will be a little evidence to track the errors
(C) Errors may be hard
to reproduce and may collapse the entire system
(D) All the above
reasons
Answer:
D
21.
Which
of the following HTML tag has an attribute called Frame?
(A) <INPUT> (B) <FORM>
(C) <FRAMESET> (D) <TABLE>
Answer:
D
22.
The
HTML DOM Event that is triggered automatically when a user enters a web page
is:
(A) OnLoad (B) OnFocus
(C) OnOpen (D) OnShow
Answer:
A
23.
CORBA
programmers can develop distributed applications in C++/Java using:
(A) Orbix (B) OpalOrb
(C) GIOP (D) EJB
Answer:
A
24.
XML
captures Hypertext information using:
(A) <A> (B) XLL
(C) XLS (D) DTD
Answer:
B
25.
In
DHCP, the UDP port number for sending data to the server is:
(A) 60 (B) 62
(C) 65 (D) 67
Answer:
D
26.
Which
of the following statement is false?
(A) It is not possible
to convert an HTML document into an XML document
(B) Both XML and HTML
are subset of SGML
(C) A well formatted XML
document need not require DTD
(D) CSS works better
with XML than with HTML
Answer:
A
27.
In a
style sheet, the style rule from another CSS file can be loaded using:
(A) @include (B) @import
(C) @attach (D) @load
Answer:
B
28.
The
easiest method for a Web Server program to store the client information in a
web browser for future use is:
(A) Applet (B) Cookie
(C) Template (D) Log file
Answer:
B
29.
A form
of address spoofing resulting in denial of service attack:
(A) Session Hijacking (B) Island Hopping
(C) Sniffing (D) War Dialing
Answer:
A
30.
Which
of the following is a JavaScript debugging method?
(A) window.alert (B) console.log
(C) document.write (D) document.getElementById
Answer:
B
31.
Which
of the following statement is false?
(A) Samba can play a
number of server roles such as a File Server, Print Server, Primary Domain
Controller etc.
(B) Samba allows to
share files with windows host.
(C) SWAT requires no web
server running
(D) SWAT interface
cannot be directly accessed from web browser
Answer:
D
32.
Simplest
way to pass data between two Linux programs running in a system is:
(A) Socket (B) Pipe
(C) Semaphore (D) RPC
Answer:
B
33.
The
Linux command that can be used to search for a pattern matching string in a
file:
(A) find (B) which
(C) grep (D) search
Answer:
C
34.
In
Redhat Linux, the powerful and secure method for network configuration is:
(A) NetBios (B) Netstart
(C) IPSec (D) Apache
Answer:
B
35.
The
file system that is the best choice for new installations of Linux is:
(A) NTFS (B) EX2
(C) EX4 (D) JFS
Answer:
C
36.
In a
Linux kernel, two mapping registers are simultaneously used as compatibly
mapped buffers for CPU and Peripherals. Then the DMA Mapping is:
(A) Consistent Mapping (B) Buffer Mapping
(C) Streaming Mapping (D) Scatter Mapping
Answer:
A
37.
A
format that can only archive a group related files into a single file and
cannot perform any compression by itself:
(A) rar (B) bz2
(C) tar (D) gz
Answer:
C
38.
GNOME
Display Manager can be configured by editing:
(A) gdm.conf (B) GNOME.conf
(C) Xserver.conf (D) XDM.conf
Answer:
A
39.
The
powerful online help system of Linux is:
(A) who (B) man
(C) more (D) how
Answer:
B
40.
A
Linux tool that can be used to create hard disk partitions only at the time of
Linux installation:
(A) fdisk (B) cfdisk
(C) Disk Mount (D) DRUID
Answer:
D
41.
The
average time required to perform a successful sequential search for an element
in a array with n elements:
(A) n/2 (B) (n+1)/2
(C) (n-1)/2 (D) 2n
Answer:
B
42.
Each
node in a tree has a value greater than all values in the left subtree and has
a value less than all values in the right subtree. Then the tree is:
(A) Binary search tree (B) Complete tree
(C) Balanced tree (D) Threaded tree
Answer:
A
43.
The
sort method that switches the adjacent elements, if needed after comparison is:
(A) Heap sort (B) Quick sort
(C) Insertion sort (D) Bubble sort
Answer:
D
44.
Minimum
number of queues needed to implement the priority queue is:
(A) 1 (B) 2
(C) 3 (D) 4
Answer:
B
45.
After
a sequence of steps in an algorithm, a linked list reaches the following step, START=NULL
Then the situation is,
(A) overflow (B) underflow
(C) initialisation (D) saturation
Answer:
B
46.
The
result of following expression in polish notation is
4 3 2 + * 8 4 /-
(A) 13 (B) 12
(C) 18 (D) 34
Answer:
C
47.
The
data structure that can implement a recursive procedure is:
(A) Tree (B) Linked List
(C) Queue (D) Stack
Answer:
D
48.
For a
sorted linked list of length n, the worst case time required to search a given
element is:
(A) O(n) (B) O(2n)
(C) O(log2 n) (D) O(log2 2n)
Answer:
A
49.
The
characteristic of the elements that is maximum utilized in binary search is:
(A) Length of the list (B) Number of elements in the list
(C) Order of the list (D) Highest value in the list
Answer:
C
50.
For a
binary tree with nine nodes, the result of inorder traversal is: D B A G E C H
F I. And that of postorder traversal is: D B G E H I F C A. Then the result of
preorder traversal is:
(A) A B D C E G F H I
(B) A B D E C F G H I
(C) A D B C E F G H I
(D) A D B E F C G H I
Answer:
A
51.
The
communication device that uses spanning tree algorithm to avoid loops:
(A) Router (B) Gateway
(C) Bridge (D) Switch
Answer:
C
52.
Delaying
an outgoing control frame in order to hook onto the next outgoing data frame is
called:
(A) Packet Sniffing (B) Compounding
(C) Optimal Routing (D) Piggy Backing
Answer:
D
53.
Dijkstra’s
algorithm facilitates:
(A) Multipathing (B) Shortest Path Routing
(C) Isolated Routing (D) Centralised Routing
Answer:
B
54.
The
OSI Layer in which the auto negation resides is:
(A) Physical (B) Network
(C) Transport (D) Data Link
Answer:
A
55.
The
transmission media that uses BNC connector is:
(A) Coaxial Cable (B) UTP
(C) STP (D) Optical Fiber
Answer:
A
56.
The
mode of communication used in a serial communication channel is:
(A) Simplex (B) Half duplex
(C) Full duplex (D) Both (B) and (C)
Answer:
C
57.
The
communication standard for a wireless network is specified by
(A) 802.11 (B) 802.21
(C) 802.8 (D) 802.12
Answer:
A
58.
The
FDDI network is an example of:
(A) Bus (B) Star
(C) Ring (D) Mesh
Answer:
B
59.
A
standard protocol for packet switching is:
(A) POTS (B) SMTP
(C) PSTN (D) X.25
Answer:
D
60.
The
number of bits in a MAC Address is:
(A) 32 (B) 48
(C) 64 (D) 128
Answer:
B
61.
Which
of the following is not a relational operator?
(A) Difference (B) Addition
(C) Division (D) Selection
Answer:
B
62.
In
DBMS, the front end application performs:
(A) Storage function (B) Access control
(C) Processing function (D) All of the above
Answer:
C
63.
In a
table, the relationship among a set of values are represented by:
(A) Tuple (B) Attribute
(C) Entity (D) Key
Answer:
A
64.
The
Schema that provides a standard way of organizing information into accessible
parts:
(A) Logical (B) Physical
(C) External (D) Storage level
Answer:
A
65.
The
physical location of a database record is determined by a key transformation
in:
(A) Index (B) Random
(C) Hash (D) Pointer
Answer:
C
66.
Which
of the following is not a set operator in SQL?
(A) UNION (B) UNION ALL
(C) MINUS (D) LIKE
Answer:
D
67.
Which
one of the following is a procedural language?
(A) Domain relational
calculus (B) System-R
(C) Query language (D) Relational language
Answer:
D
68.
A
buffer that has been changed in database buffer memory, but not yet written to
disk is:
(A) Swap space (B) Latch
(C) Redo Log (D) Dirty Block
Answer:
D
69.
The
timestamp ordering that makes no distinction between the Read and Write access
so that only a single value is required for each granule is:
(A) Partial timestamp
ordering
(B) Total timestamp
ordering
(C) Multi version
timestamp ordering
(D) Optimal timestamp
ordering
Answer:
B
70.
The
constraint specifying that account number must be in between 50000 and 80000 is
a:
(A) Integrity constraint (B) Referential constraint
(C) Default constraint (D) Key constraint
Answer:
A
71.
In a
Java program, the length in pixel of a string can be obtained using the method:
(A) Stringwidth (B) Strlength
(C) Length (D) Strwidth
Answer:
A
72.
Select
the correct statement from the following :
(A) Char
p=(char*)malloc(100);
(B) char
*p=(char*)malloc(100)l
(C) Char
p=(malloc(100));
(D) char
*p=(char*)malloc(100);
Answer:
D
73.
The
statement that is least preferred in C programs in general is:
(A) Recursion (B) Nesting of different type of
loops
(C) Double pointer (D) Unconditional Jump to a label
Answer:
D
74.
What
will be the output of following C++ program?
#include<iostream.h>
Void main()
{
char
*cp= “computer”;
cp+=2
(*cp)++;
cout<<cp;
}
(A) puter (B) mputer
(C) nputer (D) quter
Answer:
C
75.
What
will be the output of following C++ program?
#include<iostream.h>
void main()
(
int
x=10,y=5,z;
z=++x+(++y)++;
cout<<z;
}
(A) 15 (B) 16
(C) 17 (D) 18
Answer:
C
76.
In
order to get the MIME type of a file, a Servelt may use the methods defined in
the interface:
(A) servlet Info (B) servlet container
(C) Servlet Config (D) servlet context
Answer:
D
77.
Java
method that can be used to pause the current thread execution until and unless
another thread completes its execution:
(A) sleep (B) yield
(C) join (D) suspend
Answer:
C
78.
Which
Java Interface can be used to store objects using a key-value pair, avoiding
duplicate values?
(A) Java.util.Collection (B) Java.util.Set
(C) Java.util.List (D) Java.util.Map
Answer:
D
79.
Which
of the following statement is false for C++ programs?
(A) Throw cannot be
executed from a function called from a try block
(B) Unhandled throw
results in an abnormal program termination
(C) Throw is a keyword
for newer versions of C++ compiler
(D) Catch block may be
selected by matching data type with the value given in throw
Answer:
A
80.
Which
of the following data type can be used along with switch statement for
comparison, in C++?
(A) (int*) (B) double
(C) enum (D) struct
Answer:
C
81.
67th
can Golden plan for best film given for:
(A) Goodbye to language (B) The Wonders
(C) Mister Turn (D) Winter Sleep
Answer:
D
82.
The
‘Ring Spot Virus’ is the most destructive disease of:
(A) Papaya (B) Banana
(C) Mango (D) Coffee
Answer:
A
83.
The
ratio of width of our National Flag to its length is:
(A) 3:5 (B) 2:4
(C) 2:3 (D) 3:4
Answer:
C
84.
Prime
Minister Narendra Modi sworn in as the:
(A) 16th Prime
Minister (B) 15th Prime
Minister
(C) 14th Prime
Minister (D) 13th Prime
Minister
Answer:
B
85.
The
fourth Chief Minister of Kerala:
(A) EMS (B) Pattom Thanupillai
(C) R. Sankar (D) A.K. Antony
Answer:
A
86.
Who is
known as ‘Indian Bismark’?
(A) Kamaraj (B) Nehru
(C) Sardar Vallabhai
Patel (D) Rajaji
Answer:
C
87.
Kerala
Varma Pazhassi Raja was short to death in:
(A) 1805, June 11 (B) 1805, July 7
(C) 1805, October 30 (D) 1805, November 30
Answer:
D
88.
Which
of the following is a biography of the lady Mountbatten?
(A) Edwine Mountbatten
(B) Edwine Mountbatten -
A life of her own
(C) Edwine Mountbatten -
Her relationship with Nehru
(D) Mountbatten
Answer:
B
89.
Durant
Cup is associated with:
(A) Volley ball (B) Foot ball
(C) Cricket (D) Hockey
Answer:
B
90.
National
Maritime day follows on:
(A) April 5 (B) June 5
(C) October 5 (D) September 5
Answer:
A
91.
The
temple entry proclamation of Sree Chithira Thirunal was in the year:
(A) 1933 (B) 1934
(C) 1935 (D) 1936
Answer:
D
92.
The
ozone layer restricts:
(A) Visible light (B) Infrared radiation
(C) Ultraviolet
radiation (D) X-rays and Gamma
rays
Answer:
C
93.
Each
year World Red Cross and Red Crescent day is:
(A) May 8 (B) May 28
(C) January 10 (D) March 20
Answer:
A
94.
The
proposed Ken-Betwa river linking project is in which state?
(A) Maharashtra (B) Odisha
(C) Gujarat (D) Madhya Pradesh
Answer:
D
95.
The
uprising of 1857 was described as the first war of Indian Independence by:
(A) B.G. Tilak (B) V.D. Savarkar
(C) S.N. Sen (D) R.C. Majumdar
Answer:
B
96.
The
title of ‘Viceroy’ was added to the office of the Governor General of India for
the first time in:
(A) 1848 (B) 1856
(C) 1858 (D) 1862
Answer:
C
97.
Who
among the following belong to Moderates?
(A) B.G. Tilak (B) W.C. Banerjee
(C) Lala Lajpat Rai (D) Bipin Chandra Pal
Answer:
B
98.
Cripps
Mission arrived in India in the year:
(A) 1947 (B) 1946
(C) 1942 (D) 1940
Answer:
C
99.
The
Indian who attended all the Three Round Table Conference was:
(A) Dr. B.R. Ambedkar (B) Mahatma Gandhi
(C) Muhammad Ali Jinnah (D) Annie Besant
Answer:
A
100. Who is the father of English poetry?
(A) Milton (B) Wordsworth
(C) Charles Dickens (D) Chaucer
Answer:
D
0 Comments