Q1. What is the simplified expression for the Boolean function
F(A, B, C, D) = Σ(0, 1, 2, 4, 5, 6, 8, 9, 10, 12, 13, 14) using the K-map method?
A'B'C'D' + A'B'C'D + A'BC'D + AB'C'D + ABCD
Q2. In a PLA, what components are used to implement the combinational logic functions?
AND gates and OR gates
Q3. Which type of register is primarily used to temporarily hold data during arithmetic and logical operations in a microprocessor?
Accumulator register
Q4. Which logic family uses both depletion and enhancement mode MOSFETs for its operation?
CMOS
Q5. What is the primary difference between ROM and RAM?
ROM stores permanent data that cannot be changed, while RAM stores temporary data that can be read and written
Q6. Given a Boolean function F(A, B, C) = Σ(0, 1, 2, 3, 5), what is the SOP expression?
A'B'C' + A'B'C + A'BC' + AB'C
Q7. If the sum of two positive binary numbers is 11010 and there is a carry-out from the MSB, what should be done to obtain the correct result?
Add the carry to the least significant bit (LSB)
Q8.In binary multiplication using the simple method, what is the first step after aligning the digits and preparing for multiplication?
Multiply the least significant bit (LSB) by the multiplier
Q9. What is the relationship between the distance between parity bits and their error detection and correction capability in Hamming Code?
Closer parity bits provide lower error correction capability
Q10. To convert a Gray Code to its binary equivalent, which technique is commonly used?
Exclusive OR (XOR) operation
Q11. Which component of an ideal microcomputer is responsible for temporarily holding data and instructions during processing?
Memory
Q12. How is the width of the data bus typically measured in a microcomputer system?
In bits
Q13. Microcontrollers find application in various fields. What is a typical application of microcontrollers in the automotive industry?
Engine control in cars
Q14. Which data structure often results in a time-space tradeoff by using extra memory to speed up operations?
Hash tables
Q15. Which term refers to optimizing resources by sacrificing one aspect for improvement in another?
Tradeoff
Q16. Conditional asymptotic notation is useful when:
Algorithm behavior varies based on certain input characteristics
Q17. If an algorithm is bounded by "o(f(n)) if g(n)", what notation remains when the condition is removed?
o(f(n))
Q18. The recurrence equation T(n) = T(n/2) + 1 represents which paradigm?
Divide and Conquer
Q19. Divide and Conquer solves problems by:
Recursively solving subproblems
Q20. A threaded binary tree is one in which:
Each node has a thread connecting it to its predecessor or successor
Q21. Which traversal algorithm typically uses a stack?
DFS
Q22. In a directed graph, an edge from vertex A to B is denoted as:
(A, B)
Q23. Separate chaining stores collided elements in:
Linked lists
Q24. Which collision resolution technique places items in the next empty slot?
Linear probing
Q25.In the Tower of Hanoi problem with "n" disks, how many moves are required to solve the problem?
2n − 1
Q26. The process of removing recursion involves replacing recursive function calls with:
Loops
Q27. A formal protection model in OS provides:
A mathematical framework for analyzing resource allocation
Q28.In an operating system, a "buffer cache" is used to:
Store copies of frequently used files in memory
Q29. File manipulation operations include:
Reading, writing, and modifying file content
Q30. The I/O subsystem is responsible for:
Managing input/output operations between processes and devices
Q31. The primary goal of load control is:
Ensure that CPU time is evenly distributed among processes
Q32. The purpose of a page table is to:
Translate virtual addresses to physical addresses
Q33. In multiprogramming with fixed partitions, if a process requires more memory than is available in a partition, it may lead to:
Fragmentation
Q34. What is DBMS?
DBMS stores, modifies and retrieves data
Q35. Which of the following is correct according to the technology deployed by DBMS?
Locks
Q36. The term "NTFS" refers to which one of the following?
New Technology File System
Q37. Which of the following is a top-down approach in which the entity's higher level can be divided into two lower sub-entities?
Specialization
Q38. DFD stands for:
Data flow diagram
Q39. FAT stands for:
File Allocation Table
Q40. The term "Data" refers to:
Raw facts and figures
Q41. What is the primary function of routing in the network layer?
Finding the best path for data
Q42. What is a socket in the context of process-to-process communication?
A software interface for network communication
Q43. Data transmission using multiple pathways simultaneously is known as:
Parallel Transmission
Q44. Which of the following is NOT a network topology?
Disk
Q45. Contention-based MAC protocols are used in:
Ethernet networks
Q46. Routing involves:
Determining the best path for data packets
Q47. What is the purpose of ARP (Address Resolution Protocol)?
To map MAC addresses to IP addresses
Q48. Which SDLC model incorporates risk analysis?
Spiral model
Q49. The main goal of software quality assurance is:
Establish and enforce standards and processes to improve software quality
Q50. Reverse engineering is used for:
Understanding and documenting existing software
Q51. Which testing approach involves testing individual components or units of code?
Unit Testing
Q52. What is the main goal of System Testing?
Testing software functionality from the user's perspective
Q53. Which metric is used for estimating the size of a software project?
Function Points (FP)
Q54. What is the purpose of staffing level estimation in software project management?
To identify potential risks in the project
Q55. Which keyword is used to create an instance of a class?
new
Q56. What is an abstract class in OOP?
A class that cannot be instantiated
Q57. What is the purpose of the "super" keyword?
It refers to the superclass in inheritance
Q58. Which best defines a class?
A blueprint for creating objects
Q59. Which principle ensures only essential information is visible?
Information hiding
Q60. What is the main purpose of inheritance?
To establish a parent-child relationship between classes
Q61. What are abstract methods?
Methods without a body, defined in an abstract class
Q62. Which protocol is used for sending emails?
SMTP
Q63. What does CSS stand for?
Cascading Style Sheets
Q64. Which library simplifies JavaScript DOM manipulation?
jQuery
Q65. What does AJAX stand for?
Asynchronous JavaScript and XML
Q66. How does the DOM tree reflect HTML structure?
In a parent-child relationship
Q67. Which attribute uniquely identifies an XML element?
id
Q68. Which strings are accepted by Kleene Star with even number of 0s and 1s?
ε, 0011, 11001100
Q69. A language for which DFA exists is a:
Regular Language
Q70. What is the identity element for string concatenation?
ε
Q71. DFA accepting binary numbers divisible by 3 has remainders:
0,1,2
Q72. Minimum number of states to accept strings ending with 101:
2
Q73. Maximum DFA states from NFA with 5 non-initial states:
64
Q74. CFG is not closed under:
Repeated concatenation
Q75. Which is NOT true about IoT?
IoT is fully safe
Q76. Which statement about IoT sensors is incorrect?
Microphone is a digital sensor
Q77. BLE stands for:
Bluetooth low energy
Q78. WSN stands for:
Wireless Sensor Protocol
Q79. A complex SCADA system has how many levels?
4
Q80. MISO pin in RFID stands for:
Master In Slave Out
Q81. Who is known as the father of AI?
John McCarthy
Q82. Programming language commonly used for AI is:
Perl
Q83. Algorithm used in Game Tree for win/lose decisions:
Min/Max algorithm
Q84. Uniform-cost search expands node with:
Lowest path cost
Q85. Removing detail from a representation is called:
Abstraction
Q86. First order predicate logic contains:
Predicate and a subject
Q87. Which improves performance of an AI agent?
Learning
Q88. Which is part of four main e-commerce types?
All of the above
Q89. Process where sellers compete by lowering bids:
Reverse Auction
Q90. Easy market entry implies threat of new entrants is:
High
Q91. Creating products tailored to individuals is called:
Customization
Q92. E-marketplace for same industry buyers & sellers:
Vertical
Q93. Secure Sockets Layer does:
All of the above
Q94. Delay during playback of a stream is called:
Jitter
Q95. In teardown state of RTSP:
Server breaks down the connection
Q96. In real-time audio/video, jitter is introduced between:
Packets
Q97. Voice sampling rate in audio compression:
8 bits per sample
Q98. Audio compression can be used for:
Speech or music
Q99. Each ___ represents a particular colour.
Pixel value
Q100. __________ is a form of pictorial presentation.
Animations