16. A hash table contains 10 buckets and uses linear probing to resolve collisions.
The key values are integers and the hash function used is key 0i�o 10.
if the values 43, 165, 62, 123, 142 are inserted in the table, in what location would
the key value 142 be inserted?
(A) 2
(B) 3
(C) 4
(D) 6
17. A student wishes to create symbolic links in a computer system running Unix.
Three text files named �file 1�, �file 2�, and �file 3� exist in her current working
directory and the student has read and write permissions for all three files. Assume
that file 1 contains information about her hobbies, file 2 contains information about
her friends and file 3 contains information about her courses. The student executes
the following sequence of commands from her current working directory?
>In � s file 1 file 2
In � s file 2 file 3
Which of the following types of information would be lost from her file system
I. Hobbies
II. Friends
III. Courses
(A) land II only
(B) II and III only
(C) II only
(D)I and III only
18. The shell command
find. �name passwd �print is executed in/etc directory of a computer system running Unix.
Which of the following shell commands will give the same information as the above command
when executed in the same directory?
(A) Is passwd
(B) cat passwd
(C) grep name passwd
(D) grep print passwd
19. A user level process in Unix traps the signal sent on a Ctrl-C input, and has a
signal handling routine that saves appropriate files before terminating the process.
When a Ctrl-C input is given to this process, what is the mode in which the signal
handling routine executes?
(A) kernel mode
(B) superuser mode
(C) privileged mode
(D) user mode
20. The Function Point (FP) calculated for a software project are often used to obtain
an estimate of Lines of Code (LOC) required for that project. Which of the following
statements if FALSE in this context.
(A) The relationship between FP and LOC depends on the programming language
used to implement the software.
(B) LOC requirement for an assembly language implementation will be more for
a given FP value, than LOC for implementation in COBOL.
(C) On an average, one LOC of C++ provides approximately 1.6 times the functionality
of a single LOC of FORTRAN.
(D) FP and LOC are not related to each other.
21. Consider the entities �hotel room�, and �person� with a many to many
relationship �lodging� as shown below:
Hotel Room Person
If we wish to store information about the rent payment to be made by person(s)
occupying different hotel rooms, then this information should appear as an attribute of
(A) Person
(B) Hotel Room
(C) Lodging
(D)None of these
22. A table has fields Fl, F2, F3, F4, F5 with the following functional dependencies
Fl - F3 F2 - F4 (F1.F2) - F5
In terms of Normalization, this table is in
(A) 1 NF
(B) 2 NF
(C) 3 NF
(D)None of these
23. A B-tree used as an index for a large database table has four levels including
the root node. If a new key is inserted in this index, then the maximum number of
nodes that could be newly created in the process are
(A) 5
(B) 4
(C) 3
(D) 2
24. Amongst the ACID properties of a transaction, the �Durability� property requires
that the changes made to the database by a successful transaction persist
(A) except in case of an Operating System crash
(B) except in case of Disk crash
(C) except in case of a power failure
(D) always, even if there is a failure of any kind
25. Consider the three commands:, PROMPT, HEAD and RCPT.
Which of the following options indicate a correct association of these commands with
protocols where these are used?
(A) HTTP, SMTP, FTP
(B) FTP, HTTP, SMTP
(C) HTTP, FTP, SMTP
(D) SMTP, HTTP, FTP
26. Trace-route reports a possible route that is taken by packets moving from some
host A to some other host B. which of the following options represents the technique
used by trace-route to identify these hosts?
(A) By progressively querying routers about the next router on the path to B using
ICMP packets, starting with the first router.
(B) By requiring each router to append the address to the ICMP packet as it is forwarded
to B. The list of all routers en-route to B is returned by B in an ICMP reply packet.
(C) By ensuring that an ICMP reply packet is returned to A by each router en- route to B,
in the ascending order of their hop distance from A
(D) By locally computing the shortest path from A to B
27. Which of the following statements is TRUE about CSMA/CD
(A) IEEE 802.11 wireless LAN runs CSMA/CD protocol
(B) Ethernet is not based on CSMA/CD protocol
(C) CSMA/CD is not suitable for a high propagation delay network like statellite network.
(D) There is no contention in a CSMA/CD network
28. Which of the following statements is FALSE regarding a bridge
(A) Bridge is a layer 2 device
(B) Bridge reduces collision domain
(C) Bridge is used to connect two or more LAN segments
(D) Bridge reduces broadcast domain
29. Count to infinity is a problem associated with
(A) link state routing protocol
(B) distance vector routing protocol
(C) DNS while resolving host name
(D) TCP for congestion control
30. A HTML form is to be designed to enable purchase of office stationery.
Required items are to be selected (checked). Credit card details are to be
entered and then the submit button is to be pressed. Which one of the following
options would be appropriate for sending the data to the server? Assume that
security is handled in a way that is transparent to the form design.
(A) only GET
(B) only POST
(C) either of GET or POST
(D) neither gET not POST
|