27. The following IP address format refers to:
 D31          D30    D29             D28-D8                   D7-D0
    1             1         0           NETWORK                 HOST
(A) Class A addresses  (B) Class B addresses
(C) Class C addresses (ANS) (D) Class D addresses

28.In C++, a pointer that is automatically being passed to a member function during its invocation is :
(A) Base pointer (B) Derived pointer (C) Virtual pointer (D) this pointer (ANS)

29.With QBE, inserting records from one or more source tables into a single target table can be achieved by :
 (A) Append action query(ANS)  (B) Update action query
 (C) Insert action query    (D) Make table action query

30. Not an example of a network debugging utility :
 (A) ping (B) nslookup (ANS) (C) traceroute (D) telnet
nslookup => to chek domain name system => why is this used for debugging. To check whether a domain name existthat you bought?

31.A security protocol for personal emails :
 (A) SSL  (B) PGP (ANS) (C) RSA (D) Kerberos
PGP => pretty good privacy
Note: SSL = secure socket layer => its also widely used for secure transaction especially credit debit cards. => Remember any site that use https is using SSL which means gmail like mail system also use SSL => SSL plays role in email transaction =>So answer can be PGP or SSL

32.If f and g are functions, then f(n) = e (g(n)) if :
 (A) f (n) = 0 (g(n))  (B) f (n) =11 (g(n)) (ANS)
 (C) f (n) = 0 (g(n)) or f (n) = 11 (g(n))  (D) f (n) = 0 (g(n)) and f (n) = 11 (g(n))

33.Simplified form of the Boolean expression Y = A' B C' D' + ABC' D' + A' BCD' + ABCD'
is :
(A) C' D'
(B) CD'
(C) BD' (ANS)
(D) B C'

34.The postfix form of the expression (A + B) * C - D / E is :
 (A) AB + C* D E/ - (ANS) (B) A B C* + D Ej-
 (C) ABC D E + * - /  (D) A B + C* D E - j

35.When a process is accessing shared modifiable data, the process is said to be in :
 (A) Dead lock  (B) Critical Section (ANS)
 (C) Multitasking  (D) Context Switching

36.The first MPI function call made by every MPI process is the call to:
 (A) MPLMain ()  (B) MPL Wtick()
 (C) MPL Init ( ) (ANS) (D) MPLBcast ( )

37.The output generated by the following C program does not include the value:
# include  
main ()
{ intn=3;
while (n>1)
{if «n % 2) !=1)
n=n/2;
else n=3* n + 1;
printf ( " % d ", n) ; }
}


(A) 5  (B) 6 (ANS) (C) 8  (D)12

38. Boundary value analysis is a method for:
 (A) White box testing  (B) Black box testing (ANS)
 (C) Structural testing  (D) Mutation testing

39.Dijkstra's Banker's algorithm is used for:
(A) Deadlock Prevention  (B) Deadlock Detection
(C) Deadlock Recovery  (D) Deadlock Avoidance (ANS)

40. ~(p v q) == ~ P /\ ~q is a famous law in logic known as :
 (A) Euclidian Law  (B) Karnaugh Law
 (C) Turing's Law  (D) De Morgan's Law (ANS)

41.The language accepted by a Push down Automata:
 (A) Type 0  (B) Type 1  (C) Type 2 (ANS) (D) Type 3

42. In parallel algorithm design, the process of grouping tasks into larger tasks in order to improve performance :
 (A) Agglomeration (ANS) (B) Domain Decomposition
 (C) Mapping  (D) None of these
=> grouping small tasks into larger task

43. A system call in Linux operating system to create a new child process, which is a copy of the parent process :
 (A) access  (B) fork (ANS) (C) flock  (D) exec

44.A preemptive type of process scheduling strategy :
(A) Highest Response Ratio Next Scheduling
(B) Shortest Job First Scheduling
(C) First in First out Scheduling
(D) Shortest Remaining Time Next Scheduling (ANS)
 It can be higest response next or shortest remaining time next => premeptive version means scheduler will stop abruptly and switch to next process based on some criteria.

45. The type of geometric transformation applied to an object for repositioning it along a straight line path from one location to another:
(A) Scaling  (B) Rotation  (C) Translation (ANS) (D) Reflection

46.Vignere Cipher is a kind of :
(A) Stream Cipher
(B) Mono alphabetic Cipher
(C) Poly alphabetic Cipher (ANS)
(D) Block Cipher

47. Recursive Descent Parsers are a type of :
(A) L L parsers (B) L R parsers (ANS)
(C) L A L R parsers (D) S L R parsers

48. The approach used for requirements elicitation in software design and development process:
 (A) View Points  (B) Interview  (C) Use - Cases (D) All of these (ANS)

49.The output generated by the following C program
# include  
int Update (int x)
{
static int y = 10;
y + = x;
return (y) ;
}

main ()
{
int a, count;
for (count =0 ; count < 3; ++ count)
{
a = Update (count) ;
printf ( "% d ", a);
}
}


(A) 10 11 12
(C) 0 1 3
(B) 10 11 13 (ANS)
(D) Compilation Error

50. Area on earth where signals of a satellite can be received:
(A) Foot- print (ANS) (B) Coverage  (C) Range (D) Vicinity