Q1.The next largest integer corresponding to the positive integer
whose representation in hexadecimal format is FF, represented in.octal
form is
A. 1000
B.100
C.400
D.200
Answer : C
Explanation : ans : C
FF binary representation :1111 1111
Decimal value. :255
Next largest integer : 256
Correponding Octal : 400
Q2. Q.Dijkstra's Bankers algorithm is used for
A. Deadlock Prevention
B. Deadlock Detection
C. Deadlock Recovery
D. Deadlock Avoidance
Answer: D
Q3. Session multiplexing is the function of _____ layer.
A) Presentation layer
B) Session layer
C) Transport layer
D) Physical layer
Answer: Transport Layer
Q4. .MOV extension refers usually to what kind of file?
A.Image file
B.Animation/movie file
C.Audio file
D.MS Office document
Answer: B
A MOV file is a common multimedia container file format developed by Apple and compatible with both Macintosh and Windows platforms.
Q5. Which method/s of representation of numbers occupies large amount of memory than others ?
a) Sign-magnitude
b) 1’s compliment
c) 2’s compliment
d) Both a and b
Answer: a
sign magnitude takes more memory as one bit
used up to store the sign.
Q6.Consider a system having m resources of the same type.these resources are shared by processes A B and C with peak time demands 3 4 6 response.the minimum value of m that ensures deadlock never occurs is
Options
A.11 B.12 C.13 D.14
Answer: 11
Q7.SJF is ...... type scheduling algorithm
a. Pre emptive
b. non - Pre emptive
c. both
d . None
Answer: C
Q8. Data compression is done in which layer?
A) Presentation layer
B) Application layer
C) Data link layer
D) Physical layer
Answer:A
Q9.to simplify a logical expression with 4 inputs we require a k-map with how many cells ?
A. 4
B. 8
C. 12
D. 16
Answer: D
K-map is used for boolean functions...For simplifying boolean functions first we must represent the terms of the boolean function in k-map depending upon whether the boolean function is in SOP form or POS form.
Q10.To detect 2 errors what is the minimum hamming distance
A. 3
B. 8
C. 12
D. 16
Answer: A
Q11. The science and art of breaking ciphers
A. Cryptography
B. Steganography
C. Cryptanalysis
D. Steganalysis
Answer: C
decrypting cipher with known key is cryptography and breaking the cipher without knowledge of key is cryptanalysis..
GK QUESTIONS
Q3. Which state has become the first Indian State to approve e-vehicle policy?
[A] Kerala
[B] Andhra Pradesh
[C] Karnataka
[D] Odisha
Answer: C
The Karnataka government has recently approved ‘Electric Vehicle and Energy Storage Policy 2017’ to help the state become a hub for production of alternative fuel vehicles, reduce dependency on fossil fuels, bring down pollution levels and push the ‘Make In Karnataka’ initiative. The new policy aims to attract investments worth Rs 31,000 crore and create around 55,000 employment opportunities. With this, Karnataka has become the first Indian State to approve e-vehicle policy.
More Questions and Discussion...
A. 1000
B.100
C.400
D.200
Answer : C
Explanation : ans : C
FF binary representation :1111 1111
Decimal value. :255
Next largest integer : 256
Correponding Octal : 400
Q2. Q.Dijkstra's Bankers algorithm is used for
A. Deadlock Prevention
B. Deadlock Detection
C. Deadlock Recovery
D. Deadlock Avoidance
Answer: D
Q3. Session multiplexing is the function of _____ layer.
A) Presentation layer
B) Session layer
C) Transport layer
D) Physical layer
Answer: Transport Layer
Q4. .MOV extension refers usually to what kind of file?
A.Image file
B.Animation/movie file
C.Audio file
D.MS Office document
Answer: B
A MOV file is a common multimedia container file format developed by Apple and compatible with both Macintosh and Windows platforms.
Q5. Which method/s of representation of numbers occupies large amount of memory than others ?
a) Sign-magnitude
b) 1’s compliment
c) 2’s compliment
d) Both a and b
Answer: a
sign magnitude takes more memory as one bit
used up to store the sign.
Q6.Consider a system having m resources of the same type.these resources are shared by processes A B and C with peak time demands 3 4 6 response.the minimum value of m that ensures deadlock never occurs is
Options
A.11 B.12 C.13 D.14
Answer: 11
Q7.SJF is ...... type scheduling algorithm
a. Pre emptive
b. non - Pre emptive
c. both
d . None
Answer: C
Q8. Data compression is done in which layer?
A) Presentation layer
B) Application layer
C) Data link layer
D) Physical layer
Answer:A
Q9.to simplify a logical expression with 4 inputs we require a k-map with how many cells ?
A. 4
B. 8
C. 12
D. 16
Answer: D
K-map is used for boolean functions...For simplifying boolean functions first we must represent the terms of the boolean function in k-map depending upon whether the boolean function is in SOP form or POS form.
Q10.To detect 2 errors what is the minimum hamming distance
A. 3
B. 8
C. 12
D. 16
Answer: A
Q11. The science and art of breaking ciphers
A. Cryptography
B. Steganography
C. Cryptanalysis
D. Steganalysis
Answer: C
decrypting cipher with known key is cryptography and breaking the cipher without knowledge of key is cryptanalysis..
GK QUESTIONS
Q3. Which state has become the first Indian State to approve e-vehicle policy?
[A] Kerala
[B] Andhra Pradesh
[C] Karnataka
[D] Odisha
Answer: C
The Karnataka government has recently approved ‘Electric Vehicle and Energy Storage Policy 2017’ to help the state become a hub for production of alternative fuel vehicles, reduce dependency on fossil fuels, bring down pollution levels and push the ‘Make In Karnataka’ initiative. The new policy aims to attract investments worth Rs 31,000 crore and create around 55,000 employment opportunities. With this, Karnataka has become the first Indian State to approve e-vehicle policy.
More Questions and Discussion...
No comments:
Post a Comment