PSC Lecturer in Computer Application Model Questions and Answers
51. What is Q, when S=1 and R=1 for SR flip-flop?
(A) No change
(B) Clear to 0
(C) Set to 1
(D) Indeterminate
Answer: D
52. What does T stands for in T filp-flop?
(A) Top
(B) Type
(C) Toggle
(D) Tickle
Answer: C
53. What number will z be in the sample code given below?
int z, x=5, y=−10, a=4, b=2;
z=x++−−−y*b/a;
(A) 5
(B) 6
(C) 10
(D) 11
Answer: A
54. Which of the following is not a keyword in C language?
(A) Void
(B) Volatile
(C) Sizeof
(D) Getchar
Answer: D
55. What is the return value of the following statement if it is placed in C program?
strcmp (“ABC”, “ABC’’);
(A) 33
(B) −1
(C) 1
(D) 0
Answer: D
56. Every C program consists of …………… function(s).
(A) Only one
(B) Only two
(C) One or two
(D) One or many
Answer: D
57. What is the only function, all C programs must contain?
(A) Start()
(B) System()
(C) Main()
(D) Program()
Answer: C
58. Which of the following is not a correct variable type?
(A) Float
(B) Real
(C) Int
(D) Double
Answer: B
59. HTTP (Hyper Text Transfer Protocol) has similarities to both of the following protocols:
(A) FTP; SMTP
(B) FTP; SNMP
(C) FTP; MTV
(D) FTP; URL
Answer: A
60. MIME allows what type of data to be sent through SMTP?
(A) Audio
(B) Non-ASCII data
(C) Image
(D) FTP; SMTP
Answer: A
61. What names objects, defines the type of data that can be stored in an object, and encodes data for network transmission?
(A) MIB
(B) SMI
(C) SNMP
(D) ASN.1
Answer: B
62. Which of the following application protocol is a framework for managing devices in an internet using the TCP/IP protocol suite?
(A) SMTP
(B) SNMP
(C) FTP
(D) TELNET
Answer: B
63. What is the bit combination used by the SAPI field of ISDN’s data link layer, to control call for end-to-end signaling in LAPD addressing format?
(A) 000000
(B) 000010
(C) 010000
(D) 000001
Answer: D
64. The values for the position(i), position(j) where i=14 and j=11, are:
(A) 2, 8
(B) 8, 2
(C) 8, 13
(D) 2, 13
Answer: C
65. What is the value to find the reachability of the problem with which you can say the solution is reachable or not?
(A) 71
(B) 72
(C) 73
(D) 69
Answer: B
66. The upper bound on the time complexity of the nondeterministic sorting algorithm is:
(A) O(n)
(B) O(n log n)
(C) O(1)
(D) O(log n)
Answer: A
67. There is a chain of 20 stores; each of the store having 5 departments. Then, which of the following is a correct representation of array size?
(A) 5*20
(B) 6*21
(C) 20*5
(D) 21*6
Answer: C
68. One from the following is also known as Pre-Order traversal. What that one is?
(A) LNR
(B) LRN
(C) RLN
(D) NLR
Answer: D
69. From the following, select the valid data structure which reflects hierarchical relationship between the elements:
(A) Graph
(B) Queue
(C) Tree
(D) Stack
Answer: C
70. Which of the following matrix does have high proportions of zero entries as the elements?
(A) Inverse Matrix
(B) Sparse Matrix
(C) Determinant Matrix
(D) Square Matrix
Answer: B
71. Recursive algorithms are based on:
(A) Divide and conquer approach
(B) Top-down approach
(C) Bottom-up approach
(D) Hierarchical approach
Answer: B
72. What do you call the selected keys in the quick sort method?
(A) Outer key
(B) Inner key
(C) Partition key
(D) Pivot key
Answer: D
73. How many nodes does a complete binary tree of level 5 have?
(A) 16
(B) 15
(C) 32
(D) 31
Answer: D
74. The Sorting method which is used for external sort is:
(A) Bubble sort
(B) Quick sort
(C) Merge sort
(D) Radix sort
Answer: C
75. A node of a directed graph G having no out-degree and a positive in-degree is called:
(A) Source node
(B) Sink node
(C) Sibling node
(D) Null node
Answer: A