NETWORKING guess paper for CCAT examination of C-DAC for Jun Jul 2013
For more details please visit http://cdacguru.wordpress.com or http://facebook.com/cdacguru
This document contains 27 multiple choice questions about object-oriented programming concepts in C++. The questions cover topics such as what makes a class abstract, class relationships like inheritance and polymorphism, access specifiers, static and virtual functions, operator overloading, and encapsulation. Additional resources on the topics are provided at the end of the document.
This document contains a sample test paper with 69 multiple choice questions related to computer science topics like computer generations, Boolean logic, memory, programming, data structures, operating systems, C language fundamentals, and more. Each question has 4 answer options and there is negative marking for incorrect answers. The paper also provides information on the duration, scoring scheme, and instructions for the exam.
The document provides a list of 50 multiple choice questions related to computers and technology. It covers topics like computer hardware, software, operating systems, networking, the internet, and applications of computing. The questions are intended as practice for tests on different computing categories. More practice questions can be found on the listed website.
For more classes visit
www.snaptutorial.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
For more classes visit
www.snaptutorial.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
Question 2. 2. Hiding data in a class is also called (Points : 3)
encapsulation.
accessibility inversion.
For more classes visit
www.snaptutorial.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
Gsp 125 Enthusiastic Study / snaptutorial.comStephenson101
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
Question 2. 2. Hiding data in a class is also called (Points : 3)
encapsulation.
accessibility inversion.
confusion culling.
redirection.
This document contains 27 multiple choice questions about object-oriented programming concepts in C++. The questions cover topics such as what makes a class abstract, class relationships like inheritance and polymorphism, access specifiers, static and virtual functions, operator overloading, and encapsulation. Additional resources on the topics are provided at the end of the document.
This document contains a sample test paper with 69 multiple choice questions related to computer science topics like computer generations, Boolean logic, memory, programming, data structures, operating systems, C language fundamentals, and more. Each question has 4 answer options and there is negative marking for incorrect answers. The paper also provides information on the duration, scoring scheme, and instructions for the exam.
The document provides a list of 50 multiple choice questions related to computers and technology. It covers topics like computer hardware, software, operating systems, networking, the internet, and applications of computing. The questions are intended as practice for tests on different computing categories. More practice questions can be found on the listed website.
For more classes visit
www.snaptutorial.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
For more classes visit
www.snaptutorial.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
Question 2. 2. Hiding data in a class is also called (Points : 3)
encapsulation.
accessibility inversion.
For more classes visit
www.snaptutorial.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
Gsp 125 Enthusiastic Study / snaptutorial.comStephenson101
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
Question 2. 2. Hiding data in a class is also called (Points : 3)
encapsulation.
accessibility inversion.
confusion culling.
redirection.
This document provides code for a simple text-based game that uses object-oriented principles in C++. The game code is provided to demonstrate refactoring a procedural program into an object-oriented structure. Students are instructed to refactor the given code by:
1) Creating classes and structures to represent game entities and vectors
2) Adding game logic to check for a win or loss condition
3) Using an enum to represent different game states
The refactored code is intended to demonstrate OOP concepts like encapsulation, abstraction, and polymorphism.
For more course tutorials visit
www.tutorialrank.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
For more classes visit
www.snaptutorial.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
Question 2. 2. Hiding data in a class is also called (Points : 3)
The document provides a list of 25 multiple choice questions related to C++ programming concepts such as classes, objects, inheritance, polymorphism, memory management, and more. Each question has 3-4 possible answer choices and is worth a certain number of points. The questions cover topics that would be included on a final exam for a C++ programming course.
For more course tutorials visit
uophelp.com is now newtonhelp.com
www.newtonhelp.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
Question 2. 2. Hiding data in a class is also called (Points : 3)
encapsulation.
accessibility inversion.
confusion culling.
redirection.
A school wants to set up a computer network and asks which topology to use. The document provides sample questions and answers about computer networks and databases. It includes questions about network topologies, communication channels, software licensing, Bluetooth networks, HTTP protocol, MySQL commands, and SQL queries involving tables with data. The document provides context for summarizing key aspects of computer networks and databases.
This document provides a guide for a final exam on C++ concepts including classes, inheritance, pointers, memory allocation, and more. It contains 40 multiple choice and coding questions to test understanding of fundamental C++ topics.
This document provides a guide for the GSP 125 final exam with 40 multiple choice and coding questions about C++ concepts like classes, inheritance, pointers, memory management, and object-oriented programming. Sample questions and short coding exercises are included to help students prepare for the exam.
GSP 125 RANK Education for Service--gsp125rank.comclaric25
The document provides a guide for a GSP 125 final exam with multiple choice questions covering topics in C++ classes, objects, inheritance, templates, pointers, and more. It also includes coding questions to test understanding of concepts like writing classes, using inheritance, dynamically allocating memory, and more. The guide provides the questions, points possible for each, and blank space for answers. It directs students to a website for more exam preparation materials.
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2’s complement and logical operations are
used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.
For more course tutorials visit
www.newtonhelp.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
This document provides instructions for Assignment 1 of the COIT20262 - Advanced Network Security course. It consists of four questions analyzing network protocols with Wireshark, investigating web application attacks in Virtnet, performing cryptographic operations with OpenSSL, and researching ransomware. Students are asked to complete tasks for each question, such as summarizing network activity from a packet capture, demonstrating an unvalidated redirect attack, using OpenSSL to generate keys and encrypt/sign files, and writing a report on ransomware. Files are to be submitted on Moodle and will be evaluated based on correctness of the cryptographic operations and level of understanding demonstrated.
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm using metaheuristics
and in particular genetic algorithms. The classic fitness function when using such an algorithm
is to compare n-gram statistics of a the decrypted message with those of the target message. We show that
using such a function is irrelevant in case of Genetic Algorithm, simply because there is no correlation
between the distance to the real key (the optimum) and the value of the fitness, in other words, there is no
hidden gradient. In order to emphasize this assumption we experimentally show that a genetic algorithm
perform worse than a random search on the cryptanalysis of the simplified data encryption standard
algorithm.
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
The document analyzes the security of the Advanced Encryption Standard (AES) algorithm and proposes a modification to enhance its security. It summarizes AES, including its key expansion process, rounds, and steps. It then evaluates AES-128 security based on time security against brute force attacks and avalanche effect criteria. The authors propose modifying AES by XORing an additional random byte with the s-box value to increase time security and strict avalanche criterion. Security measurements of the modified AES sometimes fluctuate due to the random additional key.
Java implementation and performance evaluation of someAlexander Decker
This document summarizes a study that compares the performance of four symmetric block ciphers - DES, Triple DES, AES, and Blowfish - under Windows XP and Linux operating systems. The algorithms were implemented in Java using the Java Cryptography Architecture and Java Cryptography Extension. Performance was evaluated based on CPU execution time for encryption, decryption, and key generation operations on files of varying sizes. Test results showed that Blowfish had the fastest performance, followed by AES and then DES, with Triple DES being the slowest. Performance was better under Linux than Windows XP for all algorithms.
DVLSI Guess paper for CDAC CCAT Jun- Jul 2013 Enterence examination prabhatjon
This document contains a 54 question multiple choice quiz on topics related to digital logic design and computer architecture. The questions cover topics such as 8-bit computers, flip-flops, MOS transistors, logic gates, digital circuits, CMOS logic families, and sequential circuits. The questions are multiple choice with one correct answer out of four possible choices for each question.
The document contains 10 multiple choice questions about computer science concepts like sorting algorithms, data structure operations, algorithm time complexities, file systems, and operating system functions. The questions cover topics like the fastest sorting algorithm for pre-sorted data, the average number of comparisons in sequential search, data structures that use push/pop and queue operations, examples of linear time algorithms, disk allocation methods, file types supported by systems, file access methods, and components managed by an operating system.
This document contains 14 multiple choice questions related to digital logic circuits and Boolean algebra. The questions cover topics such as truth tables, logic gates, logic families, shift registers, Boolean expressions, and vector systems. Each question has 4 possible answer choices.
this is good question set for CCAT exam and alos for CCEE
for more details please visit
http://acts.cdac.in
http://cdacguru.wordpress.com
http://fb.com/cdacguru
GUESS FUNDAMENTAL PAPER FOE CCAT Feb 2014prabhatjon
This document contains a quiz about computing fundamentals with 47 multiple choice questions and answers. It covers topics like software types, computer hardware, operating systems, networking, databases, security, and more. Additional resources for practice papers are provided at the end.
This document provides code for a simple text-based game that uses object-oriented principles in C++. The game code is provided to demonstrate refactoring a procedural program into an object-oriented structure. Students are instructed to refactor the given code by:
1) Creating classes and structures to represent game entities and vectors
2) Adding game logic to check for a win or loss condition
3) Using an enum to represent different game states
The refactored code is intended to demonstrate OOP concepts like encapsulation, abstraction, and polymorphism.
For more course tutorials visit
www.tutorialrank.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
For more classes visit
www.snaptutorial.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
Question 2. 2. Hiding data in a class is also called (Points : 3)
The document provides a list of 25 multiple choice questions related to C++ programming concepts such as classes, objects, inheritance, polymorphism, memory management, and more. Each question has 3-4 possible answer choices and is worth a certain number of points. The questions cover topics that would be included on a final exam for a C++ programming course.
For more course tutorials visit
uophelp.com is now newtonhelp.com
www.newtonhelp.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
print statements.
variables.
Question 2. 2. Hiding data in a class is also called (Points : 3)
encapsulation.
accessibility inversion.
confusion culling.
redirection.
A school wants to set up a computer network and asks which topology to use. The document provides sample questions and answers about computer networks and databases. It includes questions about network topologies, communication channels, software licensing, Bluetooth networks, HTTP protocol, MySQL commands, and SQL queries involving tables with data. The document provides context for summarizing key aspects of computer networks and databases.
This document provides a guide for a final exam on C++ concepts including classes, inheritance, pointers, memory allocation, and more. It contains 40 multiple choice and coding questions to test understanding of fundamental C++ topics.
This document provides a guide for the GSP 125 final exam with 40 multiple choice and coding questions about C++ concepts like classes, inheritance, pointers, memory management, and object-oriented programming. Sample questions and short coding exercises are included to help students prepare for the exam.
GSP 125 RANK Education for Service--gsp125rank.comclaric25
The document provides a guide for a GSP 125 final exam with multiple choice questions covering topics in C++ classes, objects, inheritance, templates, pointers, and more. It also includes coding questions to test understanding of concepts like writing classes, using inheritance, dynamically allocating memory, and more. The guide provides the questions, points possible for each, and blank space for answers. It directs students to a website for more exam preparation materials.
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2’s complement and logical operations are
used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.
For more course tutorials visit
www.newtonhelp.com
Question 1. 1. In addition to grouping functions together, a class also groups (Points : 3)
libraries.
math operations.
This document provides instructions for Assignment 1 of the COIT20262 - Advanced Network Security course. It consists of four questions analyzing network protocols with Wireshark, investigating web application attacks in Virtnet, performing cryptographic operations with OpenSSL, and researching ransomware. Students are asked to complete tasks for each question, such as summarizing network activity from a packet capture, demonstrating an unvalidated redirect attack, using OpenSSL to generate keys and encrypt/sign files, and writing a report on ransomware. Files are to be submitted on Moodle and will be evaluated based on correctness of the cryptographic operations and level of understanding demonstrated.
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm using metaheuristics
and in particular genetic algorithms. The classic fitness function when using such an algorithm
is to compare n-gram statistics of a the decrypted message with those of the target message. We show that
using such a function is irrelevant in case of Genetic Algorithm, simply because there is no correlation
between the distance to the real key (the optimum) and the value of the fitness, in other words, there is no
hidden gradient. In order to emphasize this assumption we experimentally show that a genetic algorithm
perform worse than a random search on the cryptanalysis of the simplified data encryption standard
algorithm.
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
The document analyzes the security of the Advanced Encryption Standard (AES) algorithm and proposes a modification to enhance its security. It summarizes AES, including its key expansion process, rounds, and steps. It then evaluates AES-128 security based on time security against brute force attacks and avalanche effect criteria. The authors propose modifying AES by XORing an additional random byte with the s-box value to increase time security and strict avalanche criterion. Security measurements of the modified AES sometimes fluctuate due to the random additional key.
Java implementation and performance evaluation of someAlexander Decker
This document summarizes a study that compares the performance of four symmetric block ciphers - DES, Triple DES, AES, and Blowfish - under Windows XP and Linux operating systems. The algorithms were implemented in Java using the Java Cryptography Architecture and Java Cryptography Extension. Performance was evaluated based on CPU execution time for encryption, decryption, and key generation operations on files of varying sizes. Test results showed that Blowfish had the fastest performance, followed by AES and then DES, with Triple DES being the slowest. Performance was better under Linux than Windows XP for all algorithms.
DVLSI Guess paper for CDAC CCAT Jun- Jul 2013 Enterence examination prabhatjon
This document contains a 54 question multiple choice quiz on topics related to digital logic design and computer architecture. The questions cover topics such as 8-bit computers, flip-flops, MOS transistors, logic gates, digital circuits, CMOS logic families, and sequential circuits. The questions are multiple choice with one correct answer out of four possible choices for each question.
The document contains 10 multiple choice questions about computer science concepts like sorting algorithms, data structure operations, algorithm time complexities, file systems, and operating system functions. The questions cover topics like the fastest sorting algorithm for pre-sorted data, the average number of comparisons in sequential search, data structures that use push/pop and queue operations, examples of linear time algorithms, disk allocation methods, file types supported by systems, file access methods, and components managed by an operating system.
This document contains 14 multiple choice questions related to digital logic circuits and Boolean algebra. The questions cover topics such as truth tables, logic gates, logic families, shift registers, Boolean expressions, and vector systems. Each question has 4 possible answer choices.
this is good question set for CCAT exam and alos for CCEE
for more details please visit
http://acts.cdac.in
http://cdacguru.wordpress.com
http://fb.com/cdacguru
GUESS FUNDAMENTAL PAPER FOE CCAT Feb 2014prabhatjon
This document contains a quiz about computing fundamentals with 47 multiple choice questions and answers. It covers topics like software types, computer hardware, operating systems, networking, databases, security, and more. Additional resources for practice papers are provided at the end.
To create backup files in the event of system failure, you create a backup. A print server uses a spool, which is a buffer that holds files before sending them to the printer. A URL identifies a specific web page and its computer on the web. Electronic data interchange (EDI) is the computer-to-computer exchange of routine business data between trading partners in standard data formats. The ping command is used to test whether a device on a network is reachable. Routers can connect two different types of networks.
Hsc computer science chap 1 Operating System (1).pdfAAFREEN SHAIKH
An operating system is a program that acts as an interface between the user and computer hardware. It provides an environment for users to execute programs and manages computer hardware efficiently. The main functions of an operating system include making hardware convenient to use, helping users execute programs, controlling program execution to prevent errors, providing security for user information, and scheduling resources among users. An operating system divides its services into three main areas: information management, process management, and memory management.
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdfAAFREEN SHAIKH
Here are the explanations of the terms related to magnetic disks:
i. Tracks and Sectors:
- A magnetic disk is divided into concentric circles called tracks.
- Each track is further divided into sectors.
- Tracks allow the read/write heads to move radially while sectors allow logical grouping of data on tracks.
ii. Seek time:
- It is the time required by the read/write heads to move from the current track to the desired track.
iii. Transmission time:
- It is the time required to transfer data between the disk and memory once the heads are positioned over the desired sector.
iv. Latency time/Rotational latency (
This document provides information about Vivekananda College in Madurai, India. It is a residential college that offers postgraduate programs including a Master's in Commerce. The document then provides a practice test on computer awareness topics for students in the B.Com III (Bachelor of Commerce third year) program. The test contains multiple choice questions covering topics like computer hardware, software, operating systems, networking, the internet, and other general technology topics.
The document contains multiple choice questions and answers related to computers and operating systems. It tests knowledge about storage and memory, input/output devices, operating systems, file management, networking, and security. Some key topics covered include the functions of operating systems, components of computers like CPU and memory, file systems, basic networking concepts, and security threats.
The document discusses the producer-consumer problem and its solution. The producer and consumer share a fixed size buffer as a queue. The producer's job is to generate data and put it in the buffer, while the consumer's job is to remove data from the buffer. The problem is to ensure the producer doesn't add data if the buffer is full and the consumer doesn't remove data if the buffer is empty. The solution is for the producer to sleep if the buffer is full, and the consumer to sleep if the buffer is empty. When data is added or removed, they notify each other to resume work.
Operating System And Data Storage
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call: 9971223030
IBPSEXAM provides sample questions from previous computer knowledge exams, including questions about:
- The basic functions of a computer as input, processing, output, and storage.
- Common computer terms like bits, bytes, RAM, ROM, and storage devices.
- Operating systems, software types, file extensions and properties.
- Networking protocols, security practices, and basic computer hardware.
The document provides 50 multiple choice questions to help students prepare for an exam on fundamental computer knowledge topics.
IBPSEXAMS provides a sample computer knowledge exam with questions and answers. The exam covers topics like computer components, operating systems, software applications, programming, databases, networking, information security and ethics. It aims to test fundamental computer literacy and knowledge required for many administrative or entry-level IT jobs. The exam contains multiple choice questions with a single correct answer to choose from several options.
ব্যাংকের কম্পিউটার বিষয়ের প্রস্তুতির জন্য ৩০টি মডেল টেস্ট (মোট এমসিকিউঃ ৩০*৩০=৯০০টি)
প্রত্যেকটি নৈব্যত্তিক প্রশ্ন বিগত সালের ব্যাংকের প্রশ্ন থেকে সংগ্রহ করা হয়েছে
Computer and information model test for bank exams
This document contains a series of questions and answers related to computers and technology. It covers topics like computer components, operating systems, storage, memory, networking, security, and common commands in DOS/Windows. There are over 60 multiple choice questions with a single correct answer provided for each. The questions range from basic to more advanced concepts.
The document contains a computer quiz with 20 multiple choice questions testing knowledge of various computer concepts. The questions cover topics such as binary number system, computer memory, formatting, editing documents, backups, file compression, programming languages, databases, printers, and more. For each question there are 5 possible answers and the correct answer is indicated.
The document discusses operating systems and processes. It defines an operating system as an interface between the user and computer hardware that manages system resources efficiently. Processes are programs in execution that are represented in memory by a process control block containing information like state, registers, scheduling details. Processes go through states like new, running, waiting, ready and terminated. The document also discusses process creation, termination, and context switching between processes.
The document contains 20 multiple choice questions related to computer fundamentals and IT concepts. The questions cover topics such as data types, binary operations, printer specifications, operating systems, and DOS commands.
The document discusses operating systems and processes. It defines an operating system as an interface between the user and computer hardware that manages system resources efficiently. Processes are programs in execution that are represented in memory by a process control block containing information like state, registers, scheduling details. Processes go through various states like running, ready, waiting and terminated. The document also describes process creation, termination, and context switching between processes.
1. The document contains a CSS midterm exam with multiple choice, fill-in-the-blank, enumeration, and essay questions about acronyms, missing words/phrases, OHS procedures, network devices/topology, and CMD commands.
2. Questions cover topics like OHS legislation and safety procedures, LAN connections, proper handling of equipment, computer system components, networking basics, and internetworking.
3. The exam also tests knowledge of searching for CMD, opening CMD as administrator, navigating directories, copying/deleting files, exiting CMD, and shutting down the computer.
The document contains three sections: (1) multiple choice questions about computer programs, components, and concepts; (2) a matching question about networking terms; (3) short answer questions defining e-commerce and information systems.
Process, Threads, Symmetric Multiprocessing and Microkernels in Operating SystemLieYah Daliah
The document discusses processes and process management in operating systems. It begins by defining a process as a program in execution along with its associated data and process control block (PCB). It then describes the different states a process can be in, including running, ready, blocked, and suspended. It also discusses process creation, termination, and scheduling. The document outlines the five-state process model and differences between single-threaded and multi-threaded processes. It concludes by comparing user-level threads and kernel-level threads.
The document provides specifications and configuration settings for a candidate's laptop for an exam. It lists minimum requirements as a processor of P4 or above, 1GB RAM or more, and Windows XP, 7, 8, or 8.1. It also lists required browsers. It specifies that the laptop network settings should be configured to obtain IP and DNS addresses automatically. JavaScript must be enabled on the listed browsers, which are IE, Mozilla, and Chrome. Steps are provided to enable these settings. The laptop must have antivirus installed and be free of viruses. It must have backup power for the exam duration.
CDAC CCAT examination important questionprabhatjon
This document contains 20 multiple choice questions related to computer science topics like data structures, algorithms, programming languages, and more. Some key points covered are:
- Inserting an element into a stack with a linked implementation has time complexity of O(1).
- Flowcharts, pseudocode, and decision tables can be used to represent algorithms pictorially.
- LISP was designed for artificial intelligence research.
- Time and memory requirements are primary factors for judging algorithm quality.
- The malloc() function is used for dynamic memory allocation and is available in the stdlib.h header file.
This document contains 20 multiple choice questions about Java programming concepts such as classes, constructors, exceptions, arrays, inheritance, and more. The questions cover topics like output of code snippets, default values of array elements, reserved keywords, valid code constructs, and true/false statements about classes, wrappers, and exceptions.
This document contains 10 multiple choice questions about operating systems concepts like mutual exclusion, multiprocessing, multithreading, and threads. The questions cover topics such as resource sharing, producer-consumer problems, CPU scheduling, thread-specific data, and dual mode operation. The document provides the questions and possible multiple choice answers about key OS synchronization and concurrency concepts.
This document provides instructions for a 100 question, 300 point exam that will take place from 11:00 am to 1:00 pm. The exam covers four subjects: Functional English, Mathematical Aptitude, Reasoning, and Computing Awareness. Examinees must fill out an Optical Mark Reader (OMR) answer sheet using a black or blue ballpoint pen. Electronic devices are prohibited. Each correct answer is worth 3 points, while unanswered questions receive 0 points and multiple answers to a question are considered incorrect. Examinees must sign and fill out identifying information on the OMR sheet correctly and return all exam materials before leaving.
This document provides 15 multiple choice critical reasoning questions and 16 mathematical problems questions that assess aptitude for computer science programs. The questions cover topics like percentages, probability, ratios, time/work problems, number series, coding/decoding, and logical reasoning. Sample questions include calculating patient survival rates based on treatment timelines, evaluating mathematical expressions with variables representing operations, and finding distances and directions from descriptions of paths traveled.
this is a java paper you can use it as a reference in interview for java
for more info please visit
http://acts.cdac.in
or
http://cdac.in
or
http://cdacguru.wordpress.com
Diploma in Advanced Software Development Methodologies (DASDM)prabhatjon
This document provides information about the Diploma in Advanced Software Development Methodologies (DASDM) program offered by C-DAC's Advanced Computing Training School. The one-year program aims to develop skills in current software development technologies and prepare students for jobs in the growing IT industry. The document outlines the program structure, eligibility requirements, admission process, training centers, course fees, and placement assistance. Upon completion, students will be equipped to work as software developers, programmers, testers or analysts.
Several major technology and consulting companies recruited from the August 2012 batch of students from placement companies in Noida, including Samsung, NECHCL, FISERV, MindInfotech, CDAC R&D Noida, MTree, and GrapeCity. Over 40 companies held recruitment drives, seeking candidates for roles such as software engineers, developers, consultants and more. The list highlighted the many opportunities for new graduates in and around Noida.
C-DAC
ACTS will start operating from its new premise
with effect from August 20, 2013
for more details please visit http://acts.cdac.in
or http://cdacguru.wordpress.com
or http://www.facebook.com/cdacguru
CDAC run large no or courses , having various centers across India, Bytes Softech is CDAC ATC in New Delhi that also run CDAC affiliated courses this PDF give a simple gimps
for more info please visit http://bytessoftech.com
or http://www.facebook.com/bytesedu
or call Tel No: 011-46579380, 40503451
This document provides information about C-DAC's admission process for their post graduate diploma courses in August 2013. It outlines the eligibility criteria and fees for different courses, highlights of the courses, common campus placement programs, details of the Common Admission Test (C-CAT) including syllabus, schedule and test centers. C-CAT is required for admission to most courses except PG-DST which requires a separate exam. The document provides tables listing courses, fees, eligibility, C-CAT sections and syllabus details.
The document lists the candidates who have been offered admission to the PG Diploma in Software Technology (PG-DST) program offered by the Centre for Development of Advanced Computing in Mumbai for the August 2013 batch. It provides the names of the candidates in ascending order of their hall ticket numbers who have been given confirmed admission as well as the waitlisted candidates. It also outlines the important dates for the admission process such as the last dates for payment of installments and registration for the program.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
1. DITISS Guess Paper Jun -Jul 2013 Page 1 of 1
CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING
Each question shall carry one mark. There will be a negative
marking i.e., quarter (0.25) mark will be deducted for every
wrong answer.
1. C – programming language is related to which of
the following generation?
1. Fourth
2. Third
3. Second
4. First
2. Who introduce the concept of Stored Program?
1. Charles Babbage
2. Howard A
3. Von Neumann
4. John Atanasoff
3. The primary advantage of key-to-tape data entry
system is___________.
1. A large percentage of editing can be
performed at the time of data entry.
2. Key verification is easily performed
3. The tape is reusable
4. Keying errors can be detected as they occur.
4. While inserting a diskette into the diskette drive of a
PC, the diskette’s label side should face_________.
1. East
2. North
3. South
4. Up
5. Firewire is usually used for__________.
1. Connecting to the internet
2. Downloading Digital Camera pictures
3. Connecting to the printer
4. Interfacing to a Digital Camcorder
6. What is USB?
1. A new Hard Disk standard
2. A new CD-ROM specification
3. A high-speed serial connection
4. A high-speed video connection
7. Where is your BIOS stored?
1. DRAM
2. SDRAM
3. Flash
4. Hard Disk
8. Where does your PC store your programs when
the power is off?
1. DRAM
2. Cache
3. Hard Disk Drive
4. Monitor
9. What type of character recognition technologies
used by the banking industry to process checks?
1. CIRT
2. OICR
3. MICR
4. SICR
10. Print resolution is measured in__________
1. PPM
2. DPI
3. Pixels
4. Fonts
11. Who created Pretty Good Privacy (PGP)?
1. Paul Zimmerman
2. Tim Berners-Lee
3. Marc Andreessen
4. Ken Thompson
12. Who co-founded Hotmail in 1996 and then sold the
company to Microsoft?
1. Shawn Fanning
2. Ada Byron Lovelace
3. Sabeer Bhatia
4. Ray Tomlinson
13. What is the max length for primary name of a
computer file under DOS?
1. 8
2. 12
3. 3
4. 16
14. Which of the following could be a valid DOS file
specification?
1. NOSFILE.POST
2. NOSFILE.P.OST
3. NOSFILE.DOC
4. NOST.FILEDOC
15. In which configuration, multiple computers are
connected to a host computer?
1. Star Networks
2. Rings Networks
3. Bus Networks
4. Hybrid Networks
16. What would be the best way to move around a 3-D
environment?
1. Use a space mouse
2. Use a tracker ball
3. Use a keyboard
4. Use touch screen
17. _________is capable of changing signals from one
form to another?
1. Converter
2. Transducer
3. Conductor
4. All of the above
18. When single medium is used to present
information is called as__________.
1. Unimedium presentation
2. Single medium Presentation
3. Both 1& 2
4. None of the above
19. In India first computer installed in _________.
1. Indian institute of Technology,
2. Indian Institute of Science,
3. Indian Iron & Steel Co. Ltd.
4. Indian Statistical Institute, Calcutta,
20. Main component of the CPU is __________
1. Control unit and registers
2. Registers and main memory
3. Control Unit and ALU
4. ALU and BUS
21. When a computer is first turned on or restarted, a
special type of absolute loader called ________ is
executed.
1. Compile and Go loader
2. Boot loader
3. Bootstrap loader
4. Relating loader
GUESSPAPERFORDITISSJUNJUL2013
2. ,
Page 2 of 2
22. Why the virtual memory is used?
a. A process cannot be loaded and has to keep
waiting for its execution to start until sufficient
free memory for loading the entire process
become available.
b. A process cannot be loaded in a system
whose main memory size is less than the total
memory required by the process.
1. Only a
2. Only b
3. Both a and b
4. None of the above
23. Single-user operating system is __________.
1. MS-DOS
2. UNIX
3. OS/2
4. All of the above
24. The operating system creates _________from the
physical computer.
1. Virtual space
2. Virtual computers
3. Virtual device
4. None of the above
25. Which of the following OS does not implement
multi tasking truly _________.
1. Windows 98
2. Windows NT
3. Windows XP
4. MS DOS
26. Which of the following OS would you prefer to
implement a Client-Server architecture?
1. MS DOS
2. Windows 95
3. Windows 98
4. Windows 2000
27. In First-Come, First-Served scheduling policy, I/O
bound processes may have to wait long in the
ready queue waiting for a CPU bound job to finish.
This is known as __________.
1. Aging
2. Priority inversion
3. Priority inheritance
4. Convoy effect
28. The minimum number of page frames that must be
allocated to a running process in a virtual memory
environment is determined by
1. the instruction set architecture
2. page size
3. physical memory size
4. number of processes in memory
29. Which of the following is used to describe
interconnected computer configurations with two or
more CPUs.
1. Multitasking
2. Time Sharing
3. Multiprogramming
4. Multiprocessing
30. A ________ is an application or a process that
responds to a client request.
1. client
2. thread
3. server
4. All of the above
31. ________ is a protocol that enables applications to
exchange data in a variety of formats.
1. Dynamic data exchange
2. Component object model
3. Data copy
4. None of the above
32. _________ is an efficient way for two or more
processes on the same computer to share data.
1. File exchange
2. File sharing
3. File mapping
4. None of the above
33. Dirty bit is used to show the _________.
1. Page with corrupted data
2. The wrong page in the memory
3. Page that is less frequently accessed
4. Page that is modified after being loaded into
cache memory
34. The first-fit, best-fit and the worst-fit algorithm can
be used for _________.
1. Contiguous allocation of memory
2. Linked allocation of memory
3. Indexed allocation of memory
4. All of the above
35. In Round Robin CPU scheduling, as the time
quantum is increased, the average turn around
time _________.
1. Increases
2. Decreases
3. Remain constant
4. Varies irregularly
36. Page size is always
1. In powers of 2
2. One
3. In powers of 3
4. None of the above
37. Which of the following memory allocation scheme
suffers from External fragmentation?
1. Segmentation
2. Swapping
3. Pure demand paging
4. Paging
38. _________ page replacement algorithm suffers
from Belady's anomaly.
1. LRU
2. MRU
3. FIFO
4. LIFO
39. Which of the following could be considered an
advantage of Virtual Memory Management?
1. Thrashing may occur when a program
requires two or more pages.
2. Only a part of each page needs to be loaded
into memory.
3. Job size is no longer restricted to the size of
main memory
4. All of the above
40. Memory mapped I/O involves
1. transferring information between memory locations
2. transferring information between the CPU
and I/O devices in the same way as between
the CPU and memory.
3. transferring information between registers
and memory
4. transferring information between I/O devices
and memory
DITISS Guess Paper Jun -Jul 2013
3. Page 3 of 3
41. In demand paging, while initiating execution of
process _________ space is allocated on paging
device for its logical address, its code & data.
1. Logical
2. Swap
3. Virtual
4. Physical
42. File length _________.
1. Should always be fixed
2. Should always be variable
3. Depends upon the size of the file.
4. Should be chosen to match the data
character
43. What is internal backup?
1. Uses more tapes
2. Should be done each month
3. Saves only files that have recently changed
4. Saves all files
44. When should backup be done?
1. Daily for most installations
2. Weekly for most installations
3. As several images copies, followed by an
incremental
4. As several incremental, followed by an
image copy
45. I/O devices can be classified according to the
following criteria
1. Nature of access
2. Purpose
3. Data Transfer Mode
4. All of the above
46. To perform an output operation, data to be written
onto the I/O device is first transferred from the
memory to the DMA buffer.
1. True
2. False
3. Can’t say
4. None of the above
47. Tapes and disks are _________ devices
1. Block Mode
2. Character Mode
3. Both
4. None of the above
48. Which of the following statement is false regarding
deadlock?
1. Deadlock affects OS performance.
2. A deadlock involving OS performance can
not have more severe consequences.
3. OS handles only deadlocks caused by
sharing of resources.
4. Operating system uses resource allocation
policies.
49. A set of processes is deadlocked if each of
them_________.
1. does not waits for an event
2. waits for an event can be caused only by
processes in the set.
3. Both 1 & 2
4. None of the above
50. Is the following statement is true?
Various kinds of deadlocks can arise in an OS.
1. Yes
2. No
3. Can’t say
4. None of the above
51. What is SMTP?
1. Simple Mailer transport protocol
2. Simple Mail Transport protocol
3. Single Mail transport protocol
4. None of the above
52. An organization that share devices, saves_______.
1. Money
2. Time
3. Space
4. All of the above
53. Which of the following is not a guided medium?
1. Coaxial cable
2. Fiber-optic cable
3. Atmosphere
4. None of the above
54. What is the major factor that makes coaxial cable
less susceptible to noise?
1. Inner conductor
2. Diameter of cable
3. Outer conductor
4. Insulating material
55. A _________ operates at the upper levels of the OSI
model and translates information between two completely
different network architectures or data formats.
1. Router
2. Switch
3. Gateway
4. None of the above
56. Which of the following device is responsible for the
connection of Local Area Networks with Wide Area
Networks?
1. Hub
2. Bridge
3. Data switch
4. Gateway
57. Which of these is not part of the TCP/IP model?
1. Network access
2. Internet
3. Presentation
4. Application
58. Which of the following is not true for switching
technology?
1. Packet Switching
2. Link Switching
3. Packets are switched in the form of
datagram
4. Circuit Switching techniques
59. Which of the following statement is a true
description of fiber Optic Cable?
1. Fiber optic cables transfer data in a mesh
2. Fiber optic cables transfer data in light form
3. Fiber optic cables are similar to coaxial
cables
4. None of the above
60. Which of the following topologies is used for Ethernet?
1. Star
2. Bus
3. Ring
4. All of the above
61. Which of the following is not always necessary for
accessing the Web?
1. A Web browser
2. A connection to an Internet Access Provider
3. A computer
4. A modem
DITISS Guess Paper Jun -Jul 2013
4. Page 4 of 4
62. A word that looks underlined on a web page is
usually __________.
1. important word
2. the web address
3. a "link" to another web page
4. a mistake
63. How many stations can a fiber optic network
support?
1. 25000
2. 10000
3. 5000
4. 1000
64. Which layer translates between physical and
logical addresses?
1. the MAC sublayer of the data link layer
2. transport
3. physical
4. network
65. Which of the following layer is responsible for
transmitting raw bit streams between two nodes?
1. Transport Layer
2. Presentation Layer
3. Physical Layer
4. Data Link Layer
66. ISO OSI model is used in __________.
1. Stand alone PC
2. Network environment
3. Any where
4. None of the above
67. Which of the following switching methods accept
only the first 6 bytes of a frame?
1. store and forward
2. cut-through
3. tag
4. fast flag
68. Which of the following ISO level is more closely
related to the physical communications facilities?
1. Application
2. Session
3. Network
4. Data link
69. Which of the following are benefits of using a
layered network model?
1. it facilitates troubleshooting
2. it breaks the complex process of networking
into more manageable chunks
3. it allows layers developed by different
vendors to interoperate
4. All of the above
70. Which of the following are considered to be the
upper layer protocols?
1. presentation and session
2. application and presentation
3. application, presentation, and session
4. application, presentation, session, and transport
71. The purpose of the ________ layer is to transport
a raw bit stream from one machine to another.
1. Physical Layer
2. Transport Layer
3. Network
4. Data Link Layer
72. The physical layer is concerned with the movement
of _______ over the physical medium.
1. Programs
2. Dialogs
3. Protocols
4. Bits
73. Fiber optics is an example of ________ layer.
1. Physical Layer
2. Data Link Layer
3. Network layer
4. Application Layer
74. FDM in Networking stands for __________.
1. Frequency Division Multiplexing
2. Frequency Distribution Multiplexing
3. Frequency Division Methods
4. Frequency Distribution Methods
75. NIC stands for __________.
1. Network Internet Cable
2. Network Internet Card
3. Network Internal Card
4. None of the above
76. When a process wants to establish a TCP
connection with a remote process, it attaches itself
to an unused TCP port on its own machine. This is
called a _________ port.
1. Source
2. Destination
3. External
4. Internal
77. Which one of the following is a connectionless protocol?
1. UDP
2. Ethernet
3. IPX
4. All of the above
78. Which of the following application uses the UDP
protocol?
1. DNS
2. TFTP
3. RIP
4. All of the above
79. The HTTP request line contains a _________
method to request a document from the server.
1. Get
2. Post
3. Copy
4. Do
80. Which of the following protocols is unacknowledged?
1. TCP
2. UDP
3. SPX
4. All of the above
81. The inclusion of the checksum in the TCP segment
is _________.
1. Optional
2. Mandatory
3. at the discretion of the application program
4. None of the above
82. The value of window size is determined by _________.
1. the sender
2. the receiver
3. both the sender and receiver
4. None of the above
83. E-mail use ________ communication protocol.
1. SMTP
2. HTTP
3. ICMP
4. TCP/IP
84. What is the default port number for SMTP?
1. 21
2. 22
3. 28
DITISS Guess Paper Jun -Jul 2013
5. ,
Page 5 of 5
4. 25
85. Current wireless MACs are based on _________.
1. CSMA/CD
2. CSMA/CA
3. Hybrid technique depending on traffic
4. Hybrid technique with fixed time partitions
86. Routers function in the _______ layers
1. physical and data link
2. physical, data link, and network
3. data link and network
4. None of the above
87. Which device act as a traffic cop?
1. Router
2. Hub
3. Switch
4. Modem
88. Any electronic device on a network is called _______.
1. Node
2. Hub
3. Router
4. Cable
89. ________ algorithm change their routing decisions
to reflect changes in the topology.
1. Routing
2. Session
3. Adaptive
4. Nonadaptive
90. Clients are the computers used by ________ users
for everyday work.
1. Individual
2. Group of
3. System administrator
4. None of the above
91. What does USB stand for in USB Port?
1. United System Booting
2. Universal System Bus
3. Universal Serial Bus
4. Universal System Booting
92. What data communications hardware converts
data from one standard to another?
1. Hub
2. Router
3. Repeater
4. Gateway
93. Which of the following is standard for transmitting a data?
1. Topology
2. Protocol
3. Packet
4. Token ring
94. Which of the following OSI layers is concerned with the
transmission of unstructured bit stream over a physical link?
1. 7
2. 1
3. 6
4. 2
95. What type of network architecture would be the
easiest to setup and maintain?
1. Local area network
2. Wide area network
3. Peer-to-peer network
4. Metropolitan network
96. What network is used at a military base?
1. Local area network
2. Wide area network
3. Campus area network
4. Office area network
97. What is the most widely used protocol for local
area networks?
1. HTML
2. TCP/IP
3. Ethernet
4. Token ring
98. At which layer does Flow control take place?
1. Physical
2. data link
3. Network
4. transport
99. At which layer error detection and recovery take
place?
1. transport
2. presentation
3. network
4. application
100. Which of the following statement is true about an
IP address?
1. IP address is based on your computer
network card
2. IP address is issued by a computer vendor
3. IP address is a Transport Protocol
4. IP address is not used on the internet
101. Which of the following words have correct spelling?
1. Vocabilary
2. Vocabullary
3. Vocabulary
4. Voccabulary
102. Which of the following is odd one?
1. Cow
2. Bull
3. Cock
4. Horse
103. Which of the following is synonymous to the word
’Disparity’?
1. Uniform
2. Equal
3. Par
4. Gap
104. Which of the following is synonymous to the word
’Deprivation’?
1. Scarcity
2. Control
3. Tenure
4. Custody
105. Which of the following is synonymous to the word
’Gleam’?
1. Atrocious
2. Nasty
3. Shimmer
4. Hide
106. Which of the following is synonymous to the word
’Compulsion’?
1. Obligation
2. Claim
3. Tribute
4. Recognize
107. Which of the following is synonymous to the word
’Ignoble’?
1. Remarkable
2. Splendid
3. Dastardly
4. Amazing
DITISS Guess Paper Jun -Jul 2013
6. Page 6 of 6
108. Adults differ a lot in their sleeping ________.
1. Manners
2. Time
3. Habits
4. Techniques
109. There should be ________of fresh air in the room.
1. Plenty
2. Much
3. more
4. Lots
110. If houses are made of wood, then they easily catch
________ fire.
1. to
2. on
3. the
4. with
111. The task calls ________ much effort.
1. at
2. specific
3. for
4. much
112. What is the antonym of the word ‘cyclic’?
1. Repeated
2. Recurring
3. Rare
4. Continual
113. What is the antonym of the word ‘Propel’?
1. Push
2. Drive
3. Force
4. Linger
114. Full : empty ::?
1. Chaos: water
2. Chaos: scattered
3. Chaos:frenzy
4. Chaos: order
115. Genuine: honest:: ?
1. Fraudulent :sensitive
2. Fraudulent :deceitful
3. Fraudulent :selfish
4. Fraudulent :truthful
116. The bus stops ________ the bus stop.
1. At
2. On
3. into
4. to
117. The clock ________ the wall is very old.
1. To
2. By
3. On
4. Over
118. 2,4,6,8,10, ________?
1. 13
2. 14
3. 12
4. 16
119. If PRIYA can coded as 15 then how can
TENDULKAR coded?
1. 108
2. 107
3. 106
4. 105
120. If DELETE is coded as 6 then how is INSERTED
coded?
1. 12
2. 13
3. 18
4. 14
121. C is the sister of F, B is the brother of E's husband,
D is the father of A and grandfather of F. There are
2 fathers, one mother and 3 brothers in the family.
Who is the mother?
1. A
2. B
3. C
4. E
122. 2(48)4, 3(74)7, 4(82)1, 3(___)2. What is the
missing number?
1. 64
2. 62
3. 66
4. 68
123. Which is the odd number, (33, 58), (66, 91), (42,
62), (55,80)?
1. (33, 58)
2. (66, 91)
3. (42, 62)
4. (55,80)
124. Sourav from his house walks towards north and
covers 15.5 km and then turns left and travels 7
km. He then turns left again and after traveling
31km, again turns left and stops after traveling
turns left and stops after traveling 7 km. How far is
he from his house?
1. 8.5 km
2. 46.5 km
3. 15.5 km
4. 60.5 km
125. Tarun walks towards east a distance of 120 m to
sell his product. Later he walks straight 70 m right
to sell his product. What would be approximately
the shortest distance between the two places?
1. 190
2. 138.9
3. 50
4. None of these
126. Sachin is 7th
from the left and Geeta is 5th
from the
right. When they interchange their positions Geeta
becomes 19
th
from the right. What is Sachin’s
position from the left?
1. 21st
2. 19
th
3. 23
th
4. 20
th
127. Flight to Mumbai leaves every 5 hrs. At the
information counter a man learnt that the flight took
off 25 min before. If the present time is 10:45 a.m.,
what is the time for the next flight?
1. 2:20 a.m.
2. 4:10 a.m.
3. 3:30 p.m.
4. 3:20 p.m.
128. If “Y% of 12 is 3 ” then what is ” H% of 50”?
1. 8
2. 4
3. 6
4. 2
DITISS Guess Paper Jun -Jul 2013
7. Page 7 of 7
129. If × means ‘addition’, - means ‘division’, ÷ means
‘subtraction’, and + means ‘multiplication’, what
would be the value of the following?
a) 18 × 5 ÷ 10 +4 –5
b) 18 +5 ÷ 10 × 4 – 5
1. 15,80
2. 815.8, 80.8
3. 15, 80.8
4. 15.5, 80.5
130. There are five friends A, B, K, D and E. K is taller
than B. B and D are of same height. A is taller than
E and there is only one shorter than A in the group.
Who is the taller in the group?
1. A
2. B
3. K
4. D
131. Swimming downstream in a river, you can swim 2
miles in 40 minutes, & in upstream 2 miles in 60
minutes. How long would it take you to swim a mile
in still water?
1. 25 Minutes
2. 23 Minutes
3. 24 Minutes
4. None of the above
132. If alternate letters are deleted from the following
series then which letter will divide the new series in
two equal parts?
ACEGIKMOQSUWY
1. N
2. M
3. K
4. O
133. If the following words are arranged according to
the dictionary order then which will be the second
word in that order?
1. youthful
2. yokel
3. young
4. youngster
134. How many times in a day the hands of a clock are
straight?
1. 22
2. 30
3. 44
4. None of the above
135. A sum of money doubles itself at compound
interest in 15 years. In how many years will it
become eight times?
1. 45 years
2. 40 years
3. 42 years
4. None of the above
136. Which is the greatest of the four least common
multiples of 3,5,7?
1. 1
2. 420
3. 315
4. 105
137. What will be the smallest one digit number to be
replaced by * in the number 6*106 so that the
number is exactly divisible by 11?
1. 4
2. 3
3. 2
4. 1
138. X began a business with Rs. 85,000. He was
joined afterwards by Y with Rs. 42,500. What will
be the profit ratio at the end of the year, if Y joins
after 4 months?
1. 1:2
2. 3:1
3. 2:1
4. 4:3
139. A student multiplied a number by 3/5 instead of
5/3. What is the percentage error in the
calculation?
1. 34%
2. 44%
3. 54%
4. 64%
140. How many words can be formed of the letters of
the word 'BANANA' be arranged so that the
consonants occupy the even places?
1. 36
2. 10
3. 3
4. 5
141. How many ways can 6 men be arranged in a
circle?
1. 720
2. 240
3. 120
4. None of the above
142. One pipe can fill a tank three times as fast as
another pipe. Together the two pipes can fill the
tank in 12 minutes, then in how many minutes the
slower pipe alone will be able to fill the tank?
1. 48 minutes
2. 81 minutes
3. 108 minutes
4. 192 minutes
143. Three taps P, Q and R can fill a tank in 12, 15 and
20 hours respectively. If P is open all the time and
Q and R are open for one hour each alternately, by
what time the tank will be full?
1. 6 hours
2. 7 hours 30 min
3. 6 hours 30 min
4. 7 hours
144. A bag contains 6 black and 8 white balls. One ball
is drawn at random. What is the probability that the
ball drawn is white?
1. 3/4
2. 4/7
3. 1/8
4. 3/7
145. There are 6 red shoes & 4 green shoes . If two of
red shoes are drawn what is the probability of
getting red shoes?
1. 1/3
2. 2/3
3. 3/5
4. 2/5
146. A shopkeeper expects a gain of 20 % on his cost
price. If in a week, his sale was of Rs. 360, what
was his profit?
1. 80
2. 72
3. 70
4. 60
DITISS Guess Paper Jun -Jul 2013
8. ,
Page 8 of 8
147. A man buys a cycle for Rs. 1200 and sells it at a
loss of 10%. What is the selling price of the cycle?
1. Rs. 1080
2. Rs. 1160
3. Rs. 1202
4. Rs. 1190
148. If 40% of a number is equal to two-third of another
number, what is the ratio of first number to the
second number?
1. 2:5
2. 3:7
3. 5:3
4. 7:3
149. A sum of money at simple interest amounts to Rs.
815 in 3 years and to Rs. 854 in 4 years. What is
the sum?
1. Rs. 698
2. Rs. 690
3. Rs. 650
4. Rs. 700
150. A train can travel 50% faster than a car. Both start
from point A at the same time and reach point B 75
kms away from A at the same time. On the way,
however, the train lost about 12.5 minutes while
stopping at the stations. What is the speed of the
car?
1. 90 km/hr
2. 120 km/hr
3. 140 km/hr
4. 150 km/hr
DITISS Guess Paper Jun -Jul 2013