-
-
-
Fuzzy logic system rely on
1. Crisp binary choices 2. Ambiguous data 3. Decision makers 4. All of them
-
non volatile memory
The term "non volatile memory" states 1. that memory is retained in the memory unit for some time even after power failure to the memory unit 2. that memory is lost by power failure but regained as soon as power is restored 3. that memory is retained in the memory unit at higher temperature 4. that memory is retained in the memory unit for years after power...
-
-
-
-
-
-
-
Which of the following architectures is/are not suitable for realizing SIMD ?
1. vector processor 2. array processor 3. von neumann 4. both array processor and von neumann
-
which of the following is not primitive recursive but computable ?
which of the following is not primitive recursive but computable ? 1. Carnot function 2. Riemann function 3. Bounded function 4. Ackermann function
-
the process of transforming one bit pattern into
the process of transforming one bit pattern into another by bit-wise operations is called 1. masking 2. pruning 3. biting 4. chopping
-
shift-reduce parsers are
shift-reduce parsers are 1. top-down parsers 2. bottom-up parsers 3. right-left parsers 4. left-right parsers
-
what is the total number of equivalent relations that
what is the total number of equivalent relations that can be defined on the set (1,2,3)? 1. 8 2. 64 3. 5 4. 3
-
in a ripple counter using edge-triggered JK flip-flop. the pulse input is applied to the
in a ripple counter using edge-triggered JK flip-flop. the pulse input is applied to the 1. clock input of oll flip-flops 2. clock input of one flip-flop 3. J and K input of one flip-flop 4. J and K input of all flip-flops
-
basic elements of a picture in volume graphics
the basic elements of a picture in volume graphics is 1. pixel 2. volsel 3. voxel 4. either pixel or voxel
-
Root Directory
The root directory of disk should be placed 1. at a fixed address in main memory 2. at a fixed location on disk 3. anywhere on the disk 4. at a fixed location on the system disk
-
Motorola's 68040 is comparable to
Motorola's 68040 is comparable to 1. 8085 2. 80286 3. 80386 4. 80486
-
A clock with time period 'T' is used with 'n' stage shift register
If a clock with time period 'T' is used with 'n' stage shift register, the output of the final stage will be delayed by 1. nT seconds 2. (n-1)T seconds 3. n/T seconds 4. (2n-1)T seconds
-
non volatile memory
73 The term "non volatile memory" states 1. that memory is retained in the memory unit for some time even after power failure to the memory unit 2. that memory is lost by power failure but regained as soon as power is restored 3. that memory is retained in the memory unit at higher temperature 4. that memory is retained in the memory unit for years after...
-
J-K flip-flop
If the input J is connected through K input of J-K flip-flop, the flip-flop will behave as a 1. D(Delay) type flip-flop 2. T-type flip-flop 3. Toggle Switch 4. 2 or 3 above
-
Input device
Which of the following is not an input device 1. MICR 2. OCR 3. DVD 4. JOYSTICK
-
ROM and RAM cards
Which of the following is is used to hold ROM and RAM cards 1. Computer Bus 2. Expansion cards 3. Mother Board 4. Cache memory
-
Fixed word length computers
Fixed word length computers are 1. generally faster per digit accessed than a variable word length computer 2. generally slower per digit accessed than a variable word length computer 3. wasteful of storage 4. non-existent
-
Integral data type
which one of the following is not an integral data type 1. Character 2. Boolean 3. Integer 4. Pointer type
-
function f(x) is continuous
The function f(x) is continuous in [0,1], such that f(0)=-1, f(1/2)=1 and f(1)=-1, We can conclude that 1. f attains the value zero at least twice in [0,1] 2. f attains the value zero exactly once in [0,1] 3. f is non-zero in [0,1] 4. f attains the value zero exactly twice in [0,1]
-
Memory Address Format
A computer system has 4k word cache organised in a block-set-associativemanner, with 4 blocks per set,64 words per block. The number of bits in theSET and WORD fields of the main memory address format is 1. 15,4 2. 6,4 3. 7,2 4. 4,6
-
Main Memory and physical cache block
Consider a computer with 8M bytes of main memory and a 128K cache. The cache block size is 4K. It uses a direct mapping scheme for cache management. How many different main memory blocks can map onto a given physical cache block. 1. 2048 2. 256 3. 64 4. None of these
-
Boolean Expression
The boolean expression X + XY equals 1. X + Y2. Y + YX3. XY + YX4. None of these
-
DVST monitor
A DVST monitor 1. cannot display colour 2. can display 4 colour 3. can display 3 colour 4. can display many colour
-
Length of IR(Instruction register)
What is the length of IR(Instruction register) 1. 6 bits 2. 8 bits 3. 12 bits 4. 16 bits
-
-
-
-
-
-
-
-
-
-
-
Which of the following ISO level is more closely related to physical communications facilities
1. Application 2. Session 3. Network 4. Data Link
-
-
-
-
-
-
Find the factorial of given positive integer.
Consider the following code for finding the factorial of given positive integer IFACT=1 DO 100 I=2,N,2 100 IFACT = IFACT*i*(i-1) For which value of N, the above FORTRAN code will not work ? 1. N is even 2. N is odd 3. N is perfect number 4. N mod 3 =0
-
-
-
puts (wer):
1. prints the string 8 8 8
2. prints the null string
3. prints the string m, n, b
4. none of these
">the following program fragment int m=n=b=8; char wer[80]; sprintf(wer, "%d%d%d", m, n, b,); puts (wer): 1. prints the string 8 8 8 2. prints the null string 3. prints the string m, n, b 4. none of these
-
-
-
-
-
which of the following symbol table implementation is based on the property of locality of reference ?
1. Linear list 2. search tree 3. Hash table 4. self-organization list
-
-
-
-
-
match the following in the context of data flow diagram :
i. circle a. source of data ii. square b. file or data base iii. arrow c. conversion process iv. parallel line d. data flow 1. l-a, ll-b,lll-c, lv-d 2. l-c, ll-a, lll-d, lv-b 3. l-c,ll-d, lll-a, lv-b 4. l-b, ll-a, lll-d, iv-c
-
-
-
-
-
Generally speaking,for a weak entity set to be meaningful it must be part of a
1. one-to-one relationship 2. one-to-many relationship 3. many-to-many relationship 4. depends on a particular situation
-
-
The network address made available to the transport layer should use a uniform numbering plan
1. In a session 2. In a LAN3. In a WAN 4. across LAN and WAN
-
-
-
-
-