Your SlideShare is downloading. ×
Section b  a
Section b  a
Section b  a
Section b  a
Section b  a
Section b  a
Section b  a
Section b  a
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Section b a

4,226

Published on

NETWORKING guess paper for CCAT examination of C-DAC for Jun Jul 2013 …

NETWORKING guess paper for CCAT examination of C-DAC for Jun Jul 2013
For more details please visit http://cdacguru.wordpress.com or http://facebook.com/cdacguru

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,226
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. DITISS Guess Paper Jun -Jul 2013 Page 1 of 1 CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING Each question shall carry one mark. There will be a negative marking i.e., quarter (0.25) mark will be deducted for every wrong answer. 1. C – programming language is related to which of the following generation? 1. Fourth 2. Third 3. Second 4. First 2. Who introduce the concept of Stored Program? 1. Charles Babbage 2. Howard A 3. Von Neumann 4. John Atanasoff 3. The primary advantage of key-to-tape data entry system is___________. 1. A large percentage of editing can be performed at the time of data entry. 2. Key verification is easily performed 3. The tape is reusable 4. Keying errors can be detected as they occur. 4. While inserting a diskette into the diskette drive of a PC, the diskette’s label side should face_________. 1. East 2. North 3. South 4. Up 5. Firewire is usually used for__________. 1. Connecting to the internet 2. Downloading Digital Camera pictures 3. Connecting to the printer 4. Interfacing to a Digital Camcorder 6. What is USB? 1. A new Hard Disk standard 2. A new CD-ROM specification 3. A high-speed serial connection 4. A high-speed video connection 7. Where is your BIOS stored? 1. DRAM 2. SDRAM 3. Flash 4. Hard Disk 8. Where does your PC store your programs when the power is off? 1. DRAM 2. Cache 3. Hard Disk Drive 4. Monitor 9. What type of character recognition technologies used by the banking industry to process checks? 1. CIRT 2. OICR 3. MICR 4. SICR 10. Print resolution is measured in__________ 1. PPM 2. DPI 3. Pixels 4. Fonts 11. Who created Pretty Good Privacy (PGP)? 1. Paul Zimmerman 2. Tim Berners-Lee 3. Marc Andreessen 4. Ken Thompson 12. Who co-founded Hotmail in 1996 and then sold the company to Microsoft? 1. Shawn Fanning 2. Ada Byron Lovelace 3. Sabeer Bhatia 4. Ray Tomlinson 13. What is the max length for primary name of a computer file under DOS? 1. 8 2. 12 3. 3 4. 16 14. Which of the following could be a valid DOS file specification? 1. NOSFILE.POST 2. NOSFILE.P.OST 3. NOSFILE.DOC 4. NOST.FILEDOC 15. In which configuration, multiple computers are connected to a host computer? 1. Star Networks 2. Rings Networks 3. Bus Networks 4. Hybrid Networks 16. What would be the best way to move around a 3-D environment? 1. Use a space mouse 2. Use a tracker ball 3. Use a keyboard 4. Use touch screen 17. _________is capable of changing signals from one form to another? 1. Converter 2. Transducer 3. Conductor 4. All of the above 18. When single medium is used to present information is called as__________. 1. Unimedium presentation 2. Single medium Presentation 3. Both 1& 2 4. None of the above 19. In India first computer installed in _________. 1. Indian institute of Technology, 2. Indian Institute of Science, 3. Indian Iron & Steel Co. Ltd. 4. Indian Statistical Institute, Calcutta, 20. Main component of the CPU is __________ 1. Control unit and registers 2. Registers and main memory 3. Control Unit and ALU 4. ALU and BUS 21. When a computer is first turned on or restarted, a special type of absolute loader called ________ is executed. 1. Compile and Go loader 2. Boot loader 3. Bootstrap loader 4. Relating loader GUESSPAPERFORDITISSJUNJUL2013
  • 2. , Page 2 of 2 22. Why the virtual memory is used? a. A process cannot be loaded and has to keep waiting for its execution to start until sufficient free memory for loading the entire process become available. b. A process cannot be loaded in a system whose main memory size is less than the total memory required by the process. 1. Only a 2. Only b 3. Both a and b 4. None of the above 23. Single-user operating system is __________. 1. MS-DOS 2. UNIX 3. OS/2 4. All of the above 24. The operating system creates _________from the physical computer. 1. Virtual space 2. Virtual computers 3. Virtual device 4. None of the above 25. Which of the following OS does not implement multi tasking truly _________. 1. Windows 98 2. Windows NT 3. Windows XP 4. MS DOS 26. Which of the following OS would you prefer to implement a Client-Server architecture? 1. MS DOS 2. Windows 95 3. Windows 98 4. Windows 2000 27. In First-Come, First-Served scheduling policy, I/O bound processes may have to wait long in the ready queue waiting for a CPU bound job to finish. This is known as __________. 1. Aging 2. Priority inversion 3. Priority inheritance 4. Convoy effect 28. The minimum number of page frames that must be allocated to a running process in a virtual memory environment is determined by 1. the instruction set architecture 2. page size 3. physical memory size 4. number of processes in memory 29. Which of the following is used to describe interconnected computer configurations with two or more CPUs. 1. Multitasking 2. Time Sharing 3. Multiprogramming 4. Multiprocessing 30. A ________ is an application or a process that responds to a client request. 1. client 2. thread 3. server 4. All of the above 31. ________ is a protocol that enables applications to exchange data in a variety of formats. 1. Dynamic data exchange 2. Component object model 3. Data copy 4. None of the above 32. _________ is an efficient way for two or more processes on the same computer to share data. 1. File exchange 2. File sharing 3. File mapping 4. None of the above 33. Dirty bit is used to show the _________. 1. Page with corrupted data 2. The wrong page in the memory 3. Page that is less frequently accessed 4. Page that is modified after being loaded into cache memory 34. The first-fit, best-fit and the worst-fit algorithm can be used for _________. 1. Contiguous allocation of memory 2. Linked allocation of memory 3. Indexed allocation of memory 4. All of the above 35. In Round Robin CPU scheduling, as the time quantum is increased, the average turn around time _________. 1. Increases 2. Decreases 3. Remain constant 4. Varies irregularly 36. Page size is always 1. In powers of 2 2. One 3. In powers of 3 4. None of the above 37. Which of the following memory allocation scheme suffers from External fragmentation? 1. Segmentation 2. Swapping 3. Pure demand paging 4. Paging 38. _________ page replacement algorithm suffers from Belady's anomaly. 1. LRU 2. MRU 3. FIFO 4. LIFO 39. Which of the following could be considered an advantage of Virtual Memory Management? 1. Thrashing may occur when a program requires two or more pages. 2. Only a part of each page needs to be loaded into memory. 3. Job size is no longer restricted to the size of main memory 4. All of the above 40. Memory mapped I/O involves 1. transferring information between memory locations 2. transferring information between the CPU and I/O devices in the same way as between the CPU and memory. 3. transferring information between registers and memory 4. transferring information between I/O devices and memory DITISS Guess Paper Jun -Jul 2013
  • 3. Page 3 of 3 41. In demand paging, while initiating execution of process _________ space is allocated on paging device for its logical address, its code & data. 1. Logical 2. Swap 3. Virtual 4. Physical 42. File length _________. 1. Should always be fixed 2. Should always be variable 3. Depends upon the size of the file. 4. Should be chosen to match the data character 43. What is internal backup? 1. Uses more tapes 2. Should be done each month 3. Saves only files that have recently changed 4. Saves all files 44. When should backup be done? 1. Daily for most installations 2. Weekly for most installations 3. As several images copies, followed by an incremental 4. As several incremental, followed by an image copy 45. I/O devices can be classified according to the following criteria 1. Nature of access 2. Purpose 3. Data Transfer Mode 4. All of the above 46. To perform an output operation, data to be written onto the I/O device is first transferred from the memory to the DMA buffer. 1. True 2. False 3. Can’t say 4. None of the above 47. Tapes and disks are _________ devices 1. Block Mode 2. Character Mode 3. Both 4. None of the above 48. Which of the following statement is false regarding deadlock? 1. Deadlock affects OS performance. 2. A deadlock involving OS performance can not have more severe consequences. 3. OS handles only deadlocks caused by sharing of resources. 4. Operating system uses resource allocation policies. 49. A set of processes is deadlocked if each of them_________. 1. does not waits for an event 2. waits for an event can be caused only by processes in the set. 3. Both 1 & 2 4. None of the above 50. Is the following statement is true? Various kinds of deadlocks can arise in an OS. 1. Yes 2. No 3. Can’t say 4. None of the above 51. What is SMTP? 1. Simple Mailer transport protocol 2. Simple Mail Transport protocol 3. Single Mail transport protocol 4. None of the above 52. An organization that share devices, saves_______. 1. Money 2. Time 3. Space 4. All of the above 53. Which of the following is not a guided medium? 1. Coaxial cable 2. Fiber-optic cable 3. Atmosphere 4. None of the above 54. What is the major factor that makes coaxial cable less susceptible to noise? 1. Inner conductor 2. Diameter of cable 3. Outer conductor 4. Insulating material 55. A _________ operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats. 1. Router 2. Switch 3. Gateway 4. None of the above 56. Which of the following device is responsible for the connection of Local Area Networks with Wide Area Networks? 1. Hub 2. Bridge 3. Data switch 4. Gateway 57. Which of these is not part of the TCP/IP model? 1. Network access 2. Internet 3. Presentation 4. Application 58. Which of the following is not true for switching technology? 1. Packet Switching 2. Link Switching 3. Packets are switched in the form of datagram 4. Circuit Switching techniques 59. Which of the following statement is a true description of fiber Optic Cable? 1. Fiber optic cables transfer data in a mesh 2. Fiber optic cables transfer data in light form 3. Fiber optic cables are similar to coaxial cables 4. None of the above 60. Which of the following topologies is used for Ethernet? 1. Star 2. Bus 3. Ring 4. All of the above 61. Which of the following is not always necessary for accessing the Web? 1. A Web browser 2. A connection to an Internet Access Provider 3. A computer 4. A modem DITISS Guess Paper Jun -Jul 2013
  • 4. Page 4 of 4 62. A word that looks underlined on a web page is usually __________. 1. important word 2. the web address 3. a "link" to another web page 4. a mistake 63. How many stations can a fiber optic network support? 1. 25000 2. 10000 3. 5000 4. 1000 64. Which layer translates between physical and logical addresses? 1. the MAC sublayer of the data link layer 2. transport 3. physical 4. network 65. Which of the following layer is responsible for transmitting raw bit streams between two nodes? 1. Transport Layer 2. Presentation Layer 3. Physical Layer 4. Data Link Layer 66. ISO OSI model is used in __________. 1. Stand alone PC 2. Network environment 3. Any where 4. None of the above 67. Which of the following switching methods accept only the first 6 bytes of a frame? 1. store and forward 2. cut-through 3. tag 4. fast flag 68. Which of the following ISO level is more closely related to the physical communications facilities? 1. Application 2. Session 3. Network 4. Data link 69. Which of the following are benefits of using a layered network model? 1. it facilitates troubleshooting 2. it breaks the complex process of networking into more manageable chunks 3. it allows layers developed by different vendors to interoperate 4. All of the above 70. Which of the following are considered to be the upper layer protocols? 1. presentation and session 2. application and presentation 3. application, presentation, and session 4. application, presentation, session, and transport 71. The purpose of the ________ layer is to transport a raw bit stream from one machine to another. 1. Physical Layer 2. Transport Layer 3. Network 4. Data Link Layer 72. The physical layer is concerned with the movement of _______ over the physical medium. 1. Programs 2. Dialogs 3. Protocols 4. Bits 73. Fiber optics is an example of ________ layer. 1. Physical Layer 2. Data Link Layer 3. Network layer 4. Application Layer 74. FDM in Networking stands for __________. 1. Frequency Division Multiplexing 2. Frequency Distribution Multiplexing 3. Frequency Division Methods 4. Frequency Distribution Methods 75. NIC stands for __________. 1. Network Internet Cable 2. Network Internet Card 3. Network Internal Card 4. None of the above 76. When a process wants to establish a TCP connection with a remote process, it attaches itself to an unused TCP port on its own machine. This is called a _________ port. 1. Source 2. Destination 3. External 4. Internal 77. Which one of the following is a connectionless protocol? 1. UDP 2. Ethernet 3. IPX 4. All of the above 78. Which of the following application uses the UDP protocol? 1. DNS 2. TFTP 3. RIP 4. All of the above 79. The HTTP request line contains a _________ method to request a document from the server. 1. Get 2. Post 3. Copy 4. Do 80. Which of the following protocols is unacknowledged? 1. TCP 2. UDP 3. SPX 4. All of the above 81. The inclusion of the checksum in the TCP segment is _________. 1. Optional 2. Mandatory 3. at the discretion of the application program 4. None of the above 82. The value of window size is determined by _________. 1. the sender 2. the receiver 3. both the sender and receiver 4. None of the above 83. E-mail use ________ communication protocol. 1. SMTP 2. HTTP 3. ICMP 4. TCP/IP 84. What is the default port number for SMTP? 1. 21 2. 22 3. 28 DITISS Guess Paper Jun -Jul 2013
  • 5. , Page 5 of 5 4. 25 85. Current wireless MACs are based on _________. 1. CSMA/CD 2. CSMA/CA 3. Hybrid technique depending on traffic 4. Hybrid technique with fixed time partitions 86. Routers function in the _______ layers 1. physical and data link 2. physical, data link, and network 3. data link and network 4. None of the above 87. Which device act as a traffic cop? 1. Router 2. Hub 3. Switch 4. Modem 88. Any electronic device on a network is called _______. 1. Node 2. Hub 3. Router 4. Cable 89. ________ algorithm change their routing decisions to reflect changes in the topology. 1. Routing 2. Session 3. Adaptive 4. Nonadaptive 90. Clients are the computers used by ________ users for everyday work. 1. Individual 2. Group of 3. System administrator 4. None of the above 91. What does USB stand for in USB Port? 1. United System Booting 2. Universal System Bus 3. Universal Serial Bus 4. Universal System Booting 92. What data communications hardware converts data from one standard to another? 1. Hub 2. Router 3. Repeater 4. Gateway 93. Which of the following is standard for transmitting a data? 1. Topology 2. Protocol 3. Packet 4. Token ring 94. Which of the following OSI layers is concerned with the transmission of unstructured bit stream over a physical link? 1. 7 2. 1 3. 6 4. 2 95. What type of network architecture would be the easiest to setup and maintain? 1. Local area network 2. Wide area network 3. Peer-to-peer network 4. Metropolitan network 96. What network is used at a military base? 1. Local area network 2. Wide area network 3. Campus area network 4. Office area network 97. What is the most widely used protocol for local area networks? 1. HTML 2. TCP/IP 3. Ethernet 4. Token ring 98. At which layer does Flow control take place? 1. Physical 2. data link 3. Network 4. transport 99. At which layer error detection and recovery take place? 1. transport 2. presentation 3. network 4. application 100. Which of the following statement is true about an IP address? 1. IP address is based on your computer network card 2. IP address is issued by a computer vendor 3. IP address is a Transport Protocol 4. IP address is not used on the internet 101. Which of the following words have correct spelling? 1. Vocabilary 2. Vocabullary 3. Vocabulary 4. Voccabulary 102. Which of the following is odd one? 1. Cow 2. Bull 3. Cock 4. Horse 103. Which of the following is synonymous to the word ’Disparity’? 1. Uniform 2. Equal 3. Par 4. Gap 104. Which of the following is synonymous to the word ’Deprivation’? 1. Scarcity 2. Control 3. Tenure 4. Custody 105. Which of the following is synonymous to the word ’Gleam’? 1. Atrocious 2. Nasty 3. Shimmer 4. Hide 106. Which of the following is synonymous to the word ’Compulsion’? 1. Obligation 2. Claim 3. Tribute 4. Recognize 107. Which of the following is synonymous to the word ’Ignoble’? 1. Remarkable 2. Splendid 3. Dastardly 4. Amazing DITISS Guess Paper Jun -Jul 2013
  • 6. Page 6 of 6 108. Adults differ a lot in their sleeping ________. 1. Manners 2. Time 3. Habits 4. Techniques 109. There should be ________of fresh air in the room. 1. Plenty 2. Much 3. more 4. Lots 110. If houses are made of wood, then they easily catch ________ fire. 1. to 2. on 3. the 4. with 111. The task calls ________ much effort. 1. at 2. specific 3. for 4. much 112. What is the antonym of the word ‘cyclic’? 1. Repeated 2. Recurring 3. Rare 4. Continual 113. What is the antonym of the word ‘Propel’? 1. Push 2. Drive 3. Force 4. Linger 114. Full : empty ::? 1. Chaos: water 2. Chaos: scattered 3. Chaos:frenzy 4. Chaos: order 115. Genuine: honest:: ? 1. Fraudulent :sensitive 2. Fraudulent :deceitful 3. Fraudulent :selfish 4. Fraudulent :truthful 116. The bus stops ________ the bus stop. 1. At 2. On 3. into 4. to 117. The clock ________ the wall is very old. 1. To 2. By 3. On 4. Over 118. 2,4,6,8,10, ________? 1. 13 2. 14 3. 12 4. 16 119. If PRIYA can coded as 15 then how can TENDULKAR coded? 1. 108 2. 107 3. 106 4. 105 120. If DELETE is coded as 6 then how is INSERTED coded? 1. 12 2. 13 3. 18 4. 14 121. C is the sister of F, B is the brother of E's husband, D is the father of A and grandfather of F. There are 2 fathers, one mother and 3 brothers in the family. Who is the mother? 1. A 2. B 3. C 4. E 122. 2(48)4, 3(74)7, 4(82)1, 3(___)2. What is the missing number? 1. 64 2. 62 3. 66 4. 68 123. Which is the odd number, (33, 58), (66, 91), (42, 62), (55,80)? 1. (33, 58) 2. (66, 91) 3. (42, 62) 4. (55,80) 124. Sourav from his house walks towards north and covers 15.5 km and then turns left and travels 7 km. He then turns left again and after traveling 31km, again turns left and stops after traveling turns left and stops after traveling 7 km. How far is he from his house? 1. 8.5 km 2. 46.5 km 3. 15.5 km 4. 60.5 km 125. Tarun walks towards east a distance of 120 m to sell his product. Later he walks straight 70 m right to sell his product. What would be approximately the shortest distance between the two places? 1. 190 2. 138.9 3. 50 4. None of these 126. Sachin is 7th from the left and Geeta is 5th from the right. When they interchange their positions Geeta becomes 19 th from the right. What is Sachin’s position from the left? 1. 21st 2. 19 th 3. 23 th 4. 20 th 127. Flight to Mumbai leaves every 5 hrs. At the information counter a man learnt that the flight took off 25 min before. If the present time is 10:45 a.m., what is the time for the next flight? 1. 2:20 a.m. 2. 4:10 a.m. 3. 3:30 p.m. 4. 3:20 p.m. 128. If “Y% of 12 is 3 ” then what is ” H% of 50”? 1. 8 2. 4 3. 6 4. 2 DITISS Guess Paper Jun -Jul 2013
  • 7. Page 7 of 7 129. If × means ‘addition’, - means ‘division’, ÷ means ‘subtraction’, and + means ‘multiplication’, what would be the value of the following? a) 18 × 5 ÷ 10 +4 –5 b) 18 +5 ÷ 10 × 4 – 5 1. 15,80 2. 815.8, 80.8 3. 15, 80.8 4. 15.5, 80.5 130. There are five friends A, B, K, D and E. K is taller than B. B and D are of same height. A is taller than E and there is only one shorter than A in the group. Who is the taller in the group? 1. A 2. B 3. K 4. D 131. Swimming downstream in a river, you can swim 2 miles in 40 minutes, & in upstream 2 miles in 60 minutes. How long would it take you to swim a mile in still water? 1. 25 Minutes 2. 23 Minutes 3. 24 Minutes 4. None of the above 132. If alternate letters are deleted from the following series then which letter will divide the new series in two equal parts? ACEGIKMOQSUWY 1. N 2. M 3. K 4. O 133. If the following words are arranged according to the dictionary order then which will be the second word in that order? 1. youthful 2. yokel 3. young 4. youngster 134. How many times in a day the hands of a clock are straight? 1. 22 2. 30 3. 44 4. None of the above 135. A sum of money doubles itself at compound interest in 15 years. In how many years will it become eight times? 1. 45 years 2. 40 years 3. 42 years 4. None of the above 136. Which is the greatest of the four least common multiples of 3,5,7? 1. 1 2. 420 3. 315 4. 105 137. What will be the smallest one digit number to be replaced by * in the number 6*106 so that the number is exactly divisible by 11? 1. 4 2. 3 3. 2 4. 1 138. X began a business with Rs. 85,000. He was joined afterwards by Y with Rs. 42,500. What will be the profit ratio at the end of the year, if Y joins after 4 months? 1. 1:2 2. 3:1 3. 2:1 4. 4:3 139. A student multiplied a number by 3/5 instead of 5/3. What is the percentage error in the calculation? 1. 34% 2. 44% 3. 54% 4. 64% 140. How many words can be formed of the letters of the word 'BANANA' be arranged so that the consonants occupy the even places? 1. 36 2. 10 3. 3 4. 5 141. How many ways can 6 men be arranged in a circle? 1. 720 2. 240 3. 120 4. None of the above 142. One pipe can fill a tank three times as fast as another pipe. Together the two pipes can fill the tank in 12 minutes, then in how many minutes the slower pipe alone will be able to fill the tank? 1. 48 minutes 2. 81 minutes 3. 108 minutes 4. 192 minutes 143. Three taps P, Q and R can fill a tank in 12, 15 and 20 hours respectively. If P is open all the time and Q and R are open for one hour each alternately, by what time the tank will be full? 1. 6 hours 2. 7 hours 30 min 3. 6 hours 30 min 4. 7 hours 144. A bag contains 6 black and 8 white balls. One ball is drawn at random. What is the probability that the ball drawn is white? 1. 3/4 2. 4/7 3. 1/8 4. 3/7 145. There are 6 red shoes & 4 green shoes . If two of red shoes are drawn what is the probability of getting red shoes? 1. 1/3 2. 2/3 3. 3/5 4. 2/5 146. A shopkeeper expects a gain of 20 % on his cost price. If in a week, his sale was of Rs. 360, what was his profit? 1. 80 2. 72 3. 70 4. 60 DITISS Guess Paper Jun -Jul 2013
  • 8. , Page 8 of 8 147. A man buys a cycle for Rs. 1200 and sells it at a loss of 10%. What is the selling price of the cycle? 1. Rs. 1080 2. Rs. 1160 3. Rs. 1202 4. Rs. 1190 148. If 40% of a number is equal to two-third of another number, what is the ratio of first number to the second number? 1. 2:5 2. 3:7 3. 5:3 4. 7:3 149. A sum of money at simple interest amounts to Rs. 815 in 3 years and to Rs. 854 in 4 years. What is the sum? 1. Rs. 698 2. Rs. 690 3. Rs. 650 4. Rs. 700 150. A train can travel 50% faster than a car. Both start from point A at the same time and reach point B 75 kms away from A at the same time. On the way, however, the train lost about 12.5 minutes while stopping at the stations. What is the speed of the car? 1. 90 km/hr 2. 120 km/hr 3. 140 km/hr 4. 150 km/hr DITISS Guess Paper Jun -Jul 2013

×