COMPUTER ENGINEERING- PAGE 1
1:-In a series RLC circuit having high Q factor, the current peaks at which frequency?
A:-Resonant frequency B:-Greater than the resonant frequency C:-Less than the resonant frequency D:-None of these
Ans: A
2:-Earthing of electrical equipment is necessary for the protection against
A:-Over loading B:-Voltage fluctuation C:-Danger of electric shock D:-High conductor temperature
Ans: C
3:-Two heaters rated at 2000 W, 250 V each are connected in series across a 250 V, 50 Hz ac mains. The total power drawn from the supply would be
A:-2000 W B:-500 W C:-250 W D:-1000 W
Ans: D
4:-A capacitor of 20 μF is charged to a potential difference of 1000 V, the energy stored in the capacitor is
A:-0.01 J B:-10 J C:-20 J D:-100 J
Ans: B
5:-A full wave rectifier is made of centre tapped transformer. The peak voltage difference measured between the extreme ends of the secondary coil is 200 V. The Peak Inverse Voltage appearing across the diode is
A:-200 V B:-100 V C:-150 V D:-400 V
Ans: A
6:-A LED is connected in a +14 V dc power supply module for indication. A series resistor is required to be connected to limit the current through the diode to 10 mA. Assume the voltage drop across the diode is equal to 2 V. Then the series resistance will be
A:-1 KΩ
B:-1.2 KΩ
C:-1.4 KΩ
D:-1.14 KΩ
Ans: B
7:-A program counter register in a micro controller is used to
A:-index stack memory B:-index FIFO for accessing a data
C:-point to the next instruction that execute in a code sequence D:-none of them
Ans: C
8:-In ___________, a physical contact is required to be established with the actuator of it, to make/break a connection.
A:-proximity switch B:-limit switch C:-relay switch D:-all the above
Ans: B
9:-(i) CDMA uses spread spectrum technology
(ii) GSM stands for Global System for Mobile communications
(iii) GSM uses TDMA
A:-(i) and (ii) are correct
B:-(i) and (iii) are correct
C:-(ii) and (iii) are correct
D:-(i), (ii) and (iii) are correct
Ans: D
10:-Data is being carried in a signal in which one data element is encoded as one signal element (r = 1). If the bit rate is 50 kbps, calculate the average value of baud rate assuming case factor c = 1/2.
A:-25 kbaud B:-50 kbaud C:-100 kbaud D:-none of these
Ans: A
11:-Why is a trailer often added to the end of a frame in the data link layer?
A:-Flow control B:-Error control C:-Addressing D:-Access control
Ans: B
12:-How many bytes are used in an Ethernet physical address?
A:-6 B:-4 C:-2 D:-8
Ans: A
13:-Elimination-Yield Non-Preemptive Multiple Access mechanism (EY-NPMA) is associated with which of the following technologies? A:-LAN B:-HIPERLAN C:-ATM D:-TOKEN RING
Ans: B
14:-Which modulation mechanism is used in bluetooth technology to transform bits to a signal?
A:-ASK B:-PSK C:-QPSK D:-GFSK
Ans: D
15.The 8’s complement of the number 240 is :
(A) 537 (B) 538 (C) 540 (D) 648
Ans: C
16. Which of the following is an example of divide and conquer algorithm?
(A) Merge, Sort (B) Dijkstra’s Algorithm (C) Banker’s Algorithm (D) Prim’s Algorithm
Ans: A
17. In which addressing mode, the effective address of the operand is calculated by adding a constant value to the content of register?
(A) Absolute Mode (B) Immediate Mode (C) Index Mode (D) Indirect Mode
Ans: C
18. The –––––––––– protocol is used for updating the main memory when a word is removed from the cache memory.
(A) Write-through (B) Cache hit (C) Write-back (D) Protected Write
Ans: C
19. The way a card game player arrange his cards as he picks them up one by one is an example of :
(A) bubble sort (B) insertion sort (C) selection sort (D) merge sort
Ans: B
20. Memory protection of a computer is normally done by :
(A) Operating System (B) Processor (C) Compiler (D) User
Ans: A
21. Which system software translates the instructions in mnemonic form into the machine language equivalent?
(A) Compiler (B) Linker (C) Macroprocessor (D) Assembler
Ans: D
22. The operation of reading instructions from the memory is called :
(A) Instruction Cycle (B) Memory Write Cycle (C) Memory Read Cycle (D) Fetch Cycle
Ans: D
23. The process of buffering data into the disk area for the later use by slower peripheral devices :
(A) Caching (B) Spooling (C) Swapping (D) Thrashing
Ans: B
24. The static RAM consumes –––––––––– power and –––––––––– the dynamic RAM.
(A) More, Faster (B) Less, Faster (C) More, Slower (D) Less, Slower
Ans: A
25. An interpreter will : (A) places programs into the memory for execution (B) translate assembly language program to machine language program (C) execute a source program without generating object program (D) link the object modules for execution
Ans: C
26. –––––––––– is the base of the numbers for which the operation 54/4 =13 is correct.
(A) 8 (B) 6 (C) 12 (D) 10
Ans: A
27. –––––––––– permits the programmer to develop a program with size larger than the size of the main memory. (A) Memory Interleaving (B) Cache Memory (C) Virtual Memory (D) Buffering
Ans: C
28. Portability of a software refers to the ability :
(A) to operate with different softwares in the system (B) to run on different hardware platforms
(C) to adapt the changes efficiently (D) to offer dynamic user interfaces
Ans: B
29. –––––––––– is a preemptive scheduling algorithm.
(A) FCFS (B) SJF (C) Priority (D) Round Robin
Ans: D
A:-Resonant frequency B:-Greater than the resonant frequency C:-Less than the resonant frequency D:-None of these
Ans: A
2:-Earthing of electrical equipment is necessary for the protection against
A:-Over loading B:-Voltage fluctuation C:-Danger of electric shock D:-High conductor temperature
Ans: C
3:-Two heaters rated at 2000 W, 250 V each are connected in series across a 250 V, 50 Hz ac mains. The total power drawn from the supply would be
A:-2000 W B:-500 W C:-250 W D:-1000 W
Ans: D
4:-A capacitor of 20 μF is charged to a potential difference of 1000 V, the energy stored in the capacitor is
A:-0.01 J B:-10 J C:-20 J D:-100 J
Ans: B
5:-A full wave rectifier is made of centre tapped transformer. The peak voltage difference measured between the extreme ends of the secondary coil is 200 V. The Peak Inverse Voltage appearing across the diode is
A:-200 V B:-100 V C:-150 V D:-400 V
Ans: A
6:-A LED is connected in a +14 V dc power supply module for indication. A series resistor is required to be connected to limit the current through the diode to 10 mA. Assume the voltage drop across the diode is equal to 2 V. Then the series resistance will be
A:-1 KΩ
B:-1.2 KΩ
C:-1.4 KΩ
D:-1.14 KΩ
Ans: B
7:-A program counter register in a micro controller is used to
A:-index stack memory B:-index FIFO for accessing a data
C:-point to the next instruction that execute in a code sequence D:-none of them
Ans: C
8:-In ___________, a physical contact is required to be established with the actuator of it, to make/break a connection.
A:-proximity switch B:-limit switch C:-relay switch D:-all the above
Ans: B
9:-(i) CDMA uses spread spectrum technology
(ii) GSM stands for Global System for Mobile communications
(iii) GSM uses TDMA
A:-(i) and (ii) are correct
B:-(i) and (iii) are correct
C:-(ii) and (iii) are correct
D:-(i), (ii) and (iii) are correct
Ans: D
10:-Data is being carried in a signal in which one data element is encoded as one signal element (r = 1). If the bit rate is 50 kbps, calculate the average value of baud rate assuming case factor c = 1/2.
A:-25 kbaud B:-50 kbaud C:-100 kbaud D:-none of these
Ans: A
11:-Why is a trailer often added to the end of a frame in the data link layer?
A:-Flow control B:-Error control C:-Addressing D:-Access control
Ans: B
12:-How many bytes are used in an Ethernet physical address?
A:-6 B:-4 C:-2 D:-8
Ans: A
13:-Elimination-Yield Non-Preemptive Multiple Access mechanism (EY-NPMA) is associated with which of the following technologies? A:-LAN B:-HIPERLAN C:-ATM D:-TOKEN RING
Ans: B
14:-Which modulation mechanism is used in bluetooth technology to transform bits to a signal?
A:-ASK B:-PSK C:-QPSK D:-GFSK
Ans: D
15.The 8’s complement of the number 240 is :
(A) 537 (B) 538 (C) 540 (D) 648
Ans: C
16. Which of the following is an example of divide and conquer algorithm?
(A) Merge, Sort (B) Dijkstra’s Algorithm (C) Banker’s Algorithm (D) Prim’s Algorithm
Ans: A
17. In which addressing mode, the effective address of the operand is calculated by adding a constant value to the content of register?
(A) Absolute Mode (B) Immediate Mode (C) Index Mode (D) Indirect Mode
Ans: C
18. The –––––––––– protocol is used for updating the main memory when a word is removed from the cache memory.
(A) Write-through (B) Cache hit (C) Write-back (D) Protected Write
Ans: C
19. The way a card game player arrange his cards as he picks them up one by one is an example of :
(A) bubble sort (B) insertion sort (C) selection sort (D) merge sort
Ans: B
20. Memory protection of a computer is normally done by :
(A) Operating System (B) Processor (C) Compiler (D) User
Ans: A
21. Which system software translates the instructions in mnemonic form into the machine language equivalent?
(A) Compiler (B) Linker (C) Macroprocessor (D) Assembler
Ans: D
22. The operation of reading instructions from the memory is called :
(A) Instruction Cycle (B) Memory Write Cycle (C) Memory Read Cycle (D) Fetch Cycle
Ans: D
23. The process of buffering data into the disk area for the later use by slower peripheral devices :
(A) Caching (B) Spooling (C) Swapping (D) Thrashing
Ans: B
24. The static RAM consumes –––––––––– power and –––––––––– the dynamic RAM.
(A) More, Faster (B) Less, Faster (C) More, Slower (D) Less, Slower
Ans: A
25. An interpreter will : (A) places programs into the memory for execution (B) translate assembly language program to machine language program (C) execute a source program without generating object program (D) link the object modules for execution
Ans: C
26. –––––––––– is the base of the numbers for which the operation 54/4 =13 is correct.
(A) 8 (B) 6 (C) 12 (D) 10
Ans: A
27. –––––––––– permits the programmer to develop a program with size larger than the size of the main memory. (A) Memory Interleaving (B) Cache Memory (C) Virtual Memory (D) Buffering
Ans: C
28. Portability of a software refers to the ability :
(A) to operate with different softwares in the system (B) to run on different hardware platforms
(C) to adapt the changes efficiently (D) to offer dynamic user interfaces
Ans: B
29. –––––––––– is a preemptive scheduling algorithm.
(A) FCFS (B) SJF (C) Priority (D) Round Robin
Ans: D
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15