Stet 3RD Shift
Stet 3RD Shift
Subject Question
Question 1 Question Id : 1
How many inputs does a full -adder circuit have for each individual binary digit being added or subtracted?
Answer : Option Id
(A) 1 input
1001
(B) 2 inputs
1002
(C) 3 inputs
1003
(D) 4 inputs
1004
Question 2 Question Id : 55
Which flip-flop type is known for having a forbidden state, where both inputs are set to '1'?
Answer : Option Id
(A) S-R flip-flop
55001
(C) D flip-flop
55003
(D) T flip-flop
55004
Question 3 Question Id : 54
What is the key advantage of using a carry-lookahead adder instead of a ripple-carry adder?
Answer : Option Id
(A) Simplicity of design
54001
Question 4 Question Id : 53
Given binary numbers A = 101010 and B = 111111, what is the result of (A AND B) OR (A XOR B)?
Answer : Option Id
(A) 111111
53001
(B) 101111
53002
(C) 111010
53003
(D) 101010
53004
Answer : Option Id
(A) A + B + C
52001
(B) A'B + AC
52002
(C) A + B + C'
52003
(D) A'B'C
52004
Question 6 Question Id : 51
In a ROM-based design, how are logic functions implemented?
Answer : Option Id
(A) By programming the inputs and outputs of the ROM
51001
Question 7 Question Id : 50
When adding two positive binary numbers using the 2's complement method, if the result has a carry-out from the most significant bit (MSB), what should
be done?
Answer : Option Id
(A) Ignore the carry
50001
Question 8 Question Id : 49
In Hamming Code, how are parity bits positioned within a data unit?
Answer : Option Id
(A) At the beginning of the data unit
49001
(B) Memory
48002
Question 10 Question Id : 47
In which year did Intel release the first x86 microprocessor, the 8086, which laid the foundation for the x86 architecture widely used in personal computers?
Answer : Option Id
(A) 1971
47001
(B) 1981
47002
(C) 1986
47003
(D) 1991
47004
Question 11 Question Id : 46
Which addressing mode involves specifying a value within the instruction itself, rather than referencing a memory location?
Answer : Option Id
(A) Direct addressing
46001
Question 12 Question Id : 45
Which Karnaugh Map simplification technique involves grouping cells that are not adjacent but share a common variable value?
Answer : Option Id
(A) Pair simplification
45001
Question 13 Question Id : 44
When using the parity bit method, how does the receiver determine if an error has occurred during transmission?
Answer : Option Id
(A) By counting the number of ones in the data
44001
Question 14 Question Id : 43
Algorithm analysis is primarily concerned with:
Answer : Option Id
(A) Determining the best algorithm for a specific problem
43001
Question 15 Question Id : 42
Answer : Option Id
(A) g(n) is a lower bound on f(n)
42001
Question 16 Question Id : 41
When analyzing the time complexity of an algorithm using Big-O notation, what property allows us to ignore lower-order terms?
Answer : Option Id
(A) Reflexivity
41001
(B) Addition
41002
(C) Multiplication
41003
Question 17 Question Id : 56
In the context of minimum spanning trees, the "cut property" is used to justify the correctness of Prim's algorithm. What does the cut property state?
Answer : Option Id
(A) The algorithm always cuts the maximum weight edge.
56001
(C) The algorithm always cuts an edge crossing the cut with the minimum weight.
56003
(D) The algorithm always cuts an edge crossing the cut with the maximum weight.
56004
Question 18 Question Id : 57
In the context of the All-Pair Shortest Paths algorithm, what does the term "transitive property" refer to?
Answer : Option Id
(A) The property of having a cyclic path
57001
(C) The property of being able to reach one vertex from another
57003
Question 19 Question Id : 58
What is the time complexity of Merge Sort for sorting an array of size "n"?
Answer : Option Id
(A) O(n)
58001
(B) O(log n)
58002
(D) O(n^2)
58004
Question 20 Question Id : 67
In a Binary Search Tree (BST), the operation of deleting a node with one child involves:
Answer : Option Id
(A) Removing the node and replacing it with its left child
67001
(B) Removing the node and replacing it with its right child
67002
Question 21 Question Id : 73
Counting Sort is particularly efficient for sorting arrays where the range of elements is:
Answer : Option Id
(A) Very large
73001
(C) Constant
73003
(D) Sorted
73004
Question 23 Question Id : 71
Which implementation of a stack requires a fixed amount of memory allocated for a fixed number of elements?
Answer : Option Id
(A) Array implementation
71001
Question 24 Question Id : 70
In the context of linked lists, what is the time complexity for inserting a node at the end of the list, assuming "n" is the number of nodes?
Answer : Option Id
(A) O(1)
70001
(B) O(n)
70002
(C) O(log n)
70003
(D) O(n^2)
70004
Question 25 Question Id : 69
The Tower of Hanoi problem is a classic example of a problem that can be solved using recursion. How many minimum moves are required to solve the
Tower of Hanoi problem with 3 disks?
Answer : Option Id
(A) 3
69001
(B) 7
69002
(C) 15
69003
(D) 63
69004
Question 26 Question Id : 68
In a triplet representation of a sparse matrix, each non-zero element is represented by:
Answer : Option Id
(A) Its value and column index
68001
Question 27 Question Id : 66
Which method is used to transfer small amounts of data between the CPU and I/O device using programmed I/O?
Answer : Option Id
(A) Polling
66001
(B) DMA
66002
Question 28 Question Id : 59
The "inode" in a Unix-like file system is used to:
Answer : Option Id
(A) Store the contents of the file
59001
Question 29 Question Id : 65
Which storage allocation strategy allocates the largest available block of memory to a process, ensuring that the remaining space is maximized?
Answer : Option Id
(A) Best Fit
65001
Question 30 Question Id : 64
The main advantage of the overlay technique in memory management is that it allows:
Answer : Option Id
(A) Processes to be loaded into memory as a whole
64001
Question 31 Question Id : 63
Which of the following is a solution to the deadlock problem that involves ensuring that processes hold all required resources before starting execution?
Answer : Option Id
(A) Avoidance
63001
(B) Detection
63002
(C) Prevention
63003
(D) Termination
63004
Question 32 Question Id : 62
The process of acquiring a semaphore and entering a critical section while ensuring mutual exclusion is often called:
Answer : Option Id
(A) Wait-free synchronization
62001
Question 33 Question Id : 61
In a preemptive multitasking system, a process in the "running" state may be interrupted by:
Answer : Option Id
(A) An I/O operation
61001
Question 34 Question Id : 60
Which command is used to remove a relation from an SQL?
Answer : Option Id
(A) Drop table
60001
(B) Delete
60002
(C) Purge
60003
(D) Remove
60004
(B) Tuples
40002
(C) Entity
40003
Question 36 Question Id : 39
The term "DFD" stands for?
Answer : Option Id
(A) Data file diagram
39001
Question 37 Question Id : 38
Which one of the following commands is used for removing (or deleting) a relation forms the SQL database?
Answer : Option Id
(A) Delete
38001
(B) Drop
38002
(C) Remove
38003
Question 38 Question Id : 37
Database Management System is a type of _________software
Answer : Option Id
(A) It is a kind of application software
37001
Question 39 Question Id : 17
Which one of the following is a type of Data Manipulation Command?
Answer : Option Id
(A) Delete
17001
(B) Alter
17002
(C) Create
17003
Question 40 Question Id : 16
A report generator is used to
Answer : Option Id
(A) Update file
16001
Question 41 Question Id : 15
What is the main purpose of the Data Link Control in the data link layer?
Answer : Option Id
(A) Error correction
15001
Question 42 Question Id : 14
What is the primary function of SNMP (Simple Network Management Protocol)?
Answer : Option Id
(A) File transfer
14001
Question 43 Question Id : 13
Which sublayer of the Data Link Layer manages access to the shared communication medium?
Answer : Option Id
(A) Logical Link Control (LLC)
13001
Question 44 Question Id : 12
Frame design in the Data Link Layer includes:
Answer : Option Id
(A) Deciding the routing path for data packets
12001
Question 45 Question Id : 11
A socket is used for:
Answer : Option Id
(A) Physical data transmission
11001
Question 46 Question Id : 10
SNMP (Simple Network Management Protocol) is used for:
Answer : Option Id
(A) Managing network devices and monitoring
10001
Question 47 Question Id : 9
TCP regulates the end-to-end packet flow by use of:
Answer : Option Id
(A) Source quench messages
9001
Question 49 Question Id : 7
White Box Testing is also known as:
Answer : Option Id
(A) Functional Testing
7001
Question 50 Question Id : 6
Delphi and COCOMO are techniques used for estimating:
Answer : Option Id
(A) Software size
6001
Question 51 Question Id : 5
What is the purpose of staffing level estimation in software project management?
Answer : Option Id
(A) To determine the number of hardware components required
5001
Question 52 Question Id : 4
In the context of software project management, what is LOC an acronym for?
Answer : Option Id
(A) Line of Change
4001
(B) Level of Complexity
4002
Question 53 Question Id : 3
Which maintenance process model focuses on fixing defects as they are identified?
Answer : Option Id
(A) Waterfall Model
3001
Question 54 Question Id : 18
The model used for estimating software maintenance costs is called:
Answer : Option Id
(A) COCOMO
18001
Question 55 Question Id : 2
What is encapsulation in OOP?
Answer : Option Id
(A) The ability to inherit properties from multiple classes
2001
(C) The bundling of data and methods that operate on the data
2003
Question 56 Question Id : 19
Which keyword is used to define an abstract method within an abstract class?
Answer : Option Id
(A) abstract
19001
(B) virtual
19002
(C) override
19003
(D) implement
19004
Right Answer : Right Option Id : 19001
abstract
Question 57 Question Id : 21
What is the purpose of data abstraction in OOP?
Answer : Option Id
(A) To hide the implementation details
21001
Question 58 Question Id : 36
What is polymorphism in OOP?
Answer : Option Id
(A) Using abstract classes only
36001
Question 59 Question Id : 35
Which type of method does not have an implementation in the base class and must be overridden by derived classes?
Answer : Option Id
(A) Virtual method
35001
Question 60 Question Id : 34
Which keyword is used to indicate that a class cannot be inherited by other classes?
Answer : Option Id
(A) sealed
34001
(B) final
34002
(C) private
34003
(D) static
34004
(B) protected
33002
(C) package-private
33003
(D) public
33004
Question 62 Question Id : 32
What is the function of a DNS (Domain Name System)?
Answer : Option Id
(A) Sending emails
32001
Question 63 Question Id : 31
What is the purpose of CSS media queries?
Answer : Option Id
(A) To add multimedia content to a webpage
31001
Question 64 Question Id : 30
How can you make an asynchronous request to a server in JavaScript?
Answer : Option Id
(A) Using the "async" keyword
30001
Question 65 Question Id : 29
What is the role of a Document Type Definition (DTD) in XML?
Answer : Option Id
(A) It defines the structure and data types of XML documents.
29001
(B) It provides a list of external resources for an XML document.
29002
Question 66 Question Id : 28
Which programming languages are commonly supported by Dreamweaver for web development?
Answer : Option Id
(A) Python and Ruby
28001
Question 67 Question Id : 27
What is the purpose of SQL injection attacks?
Answer : Option Id
(A) To increase the performance of database queries
27001
Question 68 Question Id : 26
Which of the following is not a part of quin-tuple (five tuple) finite automata?
Answer : Option Id
(A) Input alphabet
26001
Question 69 Question Id : 25
Answer : Option Id
(A) 1
25001
(B) 2
25002
(C) 3
25003
(D) 4
25004
Question 70 Question Id : 24
Answer : Option Id
(A) 3
24001
(B) 7
24002
(C) 5
24003
(D) 6
24004
Question 71 Question Id : 23
A grammar that produces more than one parse tree for the same sentence is called
Answer : Option Id
(A) Contiguous
23001
(B) Ambiguous
23002
(C) Unambiguous
23003
(D) Regular
23004
Question 72 Question Id : 22
Answer : Option Id
(A) 4
22001
(B) 5
22002
(C) 6
22003
(D) 7
22004
Question 73 Question Id : 74
The language L={0ᵐ1ᵐ0ᵐ| m ≥ 1} is a
Answer : Option Id
(A) Regular language
74001
Question 74 Question Id : 20
Which of the following is true for the language: { ap| p is a prime}
Answer : Option Id
(A) It is regular but not context-free
20001
Question 75 Question Id : 75
Which among the following is not true about IoT?
Answer : Option Id
(A) IoT uses Micro Controllers
75001
Question 76 Question Id : 78
__________ is a light weight IoT protocol
Answer : Option Id
(A) IP
78001
(B) CoAP
78002
(C) HTTP
78003
(D) MQTT
78004
Question 77 Question Id : 92
SCADA is a ______________.
Answer : Option Id
(A) Hardware
92001
(B) System
92002
(C) Process
92003
(D) Protocol
92004
Question 79 Question Id : 94
ZigBee architecture has ________layers?
Answer : Option Id
(A) 4
94001
(B) 5
94002
(C) 6
94003
(D) 7
94004
Question 80 Question Id : 97
Resource management includes?
Answer : Option Id
(A) IoT devices
97001
Question 81 Question Id : 96
AI is about
Answer : Option Id
(A) Playing games on Computer
96001
Question 82 Question Id : 91
The components expert system is/ are
Answer : Option Id
(A) Knowledge Base
91001
(B) Inference Engine
91002
Question 83 Question Id : 98
Where will the Hill Climbing Algorithm terminate?
Answer : Option Id
(A) Stopping Criterion met
98001
Question 84 Question Id : 99
Forward chaining systems are _____________ where as backward chaining systems are _________
Answer : Option Id
(A) Goal-driven, goal-driven
99001
Question 86 Question Id : 95
The advantage of using an expert system development tool is___________?
Answer : Option Id
(A) imposed structure
95001
Question 87 Question Id : 90
Which of the following is not a Capabilities of Expert Systems?
Answer : Option Id
(A) Advising
90001
(B) Demonstrating
90002
(C) Explaining
90003
(D) Expanding
90004
Question 88 Question Id : 77
Which products are people most likely to be more uncomfortable buying on the Internet?
Answer : Option Id
(A) Books
77001
(C) Furniture
77003
Question 89 Question Id : 88
Which of the following are advantages normally associated with B2B e‐commerce?
Answer : Option Id
(A) Wide Reach
88001
Question 90 Question Id : 87
Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials?
Answer : Option Id
(A) Horizontal
87001
(B) Vertical
87002
(C) integrated
87003
(D) isolated
87004
(B) Cryptography
89002
(C) Decryption
89003
Question 92 Question Id : 86
OTP stands for
Answer : Option Id
(A) One time password
86001
Question 93 Question Id : 85
Secret key is used for
Answer : Option Id
(A) Public Key Cryptography
85001
Question 94 Question Id : 84
Real time streaming protocol is used ___________
Answer : Option Id
(A) to control streaming media servers
84001
(C) to provide real time control of playback of media files from the server
84003
Question 95 Question Id : 76
In Audio and Video Compression, term RBG expresses_________
Answer : Option Id
(A) red, black, grey
76001
(B) blue, grey, white.
76002
Question 96 Question Id : 83
MP3 produces three data rates from 96 Kbps to_____________
Answer : Option Id
(A) 164 kbps
83001
Question 97 Question Id : 82
___________ is basically a form of pictorial presentation.
Answer : Option Id
(A) Photography
82001
(B) Animations
82002
(C) Drawing
82003
(D) Creativity
82004
Question 98 Question Id : 81
What are the categories of digital image processing?
Answer : Option Id
(A) Image Enhancement
81001
Question 99 Question Id : 80
Which of the following is the first and foremost step in Image Processing?
Answer : Option Id
(A) Image acquisition
80001
(B) Segmentation
80002
(C) Segmentation
79003
(D) Wavelets
79004
Art Of Teaching
(C) lecture
120003
(B) lecture
121002
(C) demonstration
121003
(D) blended
121004
(B) teacher
125002
(C) pupil
125003
(D) content
125004
(B) exercising
124002
(B) inquiry
119002
(D) drill
119004
(C) History
126003
(D) geography
126004
(C) demonstrates
127003
(B) recapitulation
108002
(C) recapitulation
122003
(D) evaluation
122004
(C) Easy
106003
(D) Acceptable
106004
(B) Test
110002
(C) Measurement
110003
Other Skills
(B) Sikkim
148002
(D) Punjab
145004
(C) Medicine
144003
(B) Streams
141002
(C) Deltas
141003
(B) Caffeine
131002
(B) 66 years
139002
(D) 70 years
139004
(B) 20.5
138002
(C) 20.4
138003
(D) 20.6
138004
(B) 138
136002
(C) 69
136003
(D) 23
136004
(B) 45°
135002
(C) 30°
135003
(D) 90°
135004
(B) bear
134002
(C) dream
134003
(D) sleep
134004
(B) Disease
133002
(C) Principal
133003
(D) Theater
133004
(B) 10
132002
(C) 12
132003
(D) 13
132004
(B) 41
140002
(C) 44
140003
(D) 46
140004
(B) Sister
150002
(C) Nephew
150003