76.Natural objects can be realistically modeled using:
 (A) Binary space partitioning tree (B) Fractal Geometry (ANS)
 (C) Octrees (D) Constructive Solid Geometry

77.Not a storage placement strategy for an incoming program/ data:
 (A) First Fit  (B) Average Fit (ANS) (C) Worst Fit  (D) Best Fit

78.An attribute or set of attributes within one relation that matches the candidate key of some (possibly the same) relation:
 (A) Super key  (B) Candidate key (C) Primary key  (D)Foreign key (ANS)

79.A subset of data in a data warehouse in the forrn of summary data, related to a particular department or business function :
 (A) Meta Data  (B) Archive data
 (C) Data Marts (ANS) (D) Operational Data Store

80.In an IP packet, header checksum computes:
(A) l's complement sum of 16 bit words in the header without data field (ANS)
(B) 2' s complement sum of 16 bit words in the header without data field
(C) l's complement sum of 16 bit words in the header including data field
(D) 2' s complement sum of 16 bit words in the header including data field

81. A TCP server must prepare to accept a connection attempt from a TCP client by calling the function:
(A) connect ( )
(B) bind ()
(C) accept ( )
(D) listen ( ) (ANS)

82.The normalization of 1 N F relations to 2N F involves:
(A) Removal of partial dependencies (ANS)
(B) Removal of full dependencies
(C) Removal of transitive dependencies
(D) Removal of multi-valued dependencies

83.The technique used for dimensionality reduction of original data:
 (A) Discrete Wavelet transform  (B) Principal Component Analysis
 (C) Both (A) and (B) (ANS) (D) Neither (A) nor (B)

84.The technique used for producing color displays with random scan CRT monitors:
 (A) Beam Penetration (ANS) (B) Shadow Mask
 (C) Direct View Storage  (D) Gas - Discharge

85.An objective measure of pattern interestingness in data mining:
 (A) Support rule  (B) Confidence rule
 (C) Both (A) and (B) (ANS) (D) Neither (A) nor (B)

86. DHCP stands for:
(A) Dynamic Host Configuration Protocol (ANS)
(B) Dynamic Host Control Protocol
(C) Dynamic Heap Control Protocol
(D) Dynamic Heap Configuration Protocol

87.A static member function can have access to :
(A) Static functions in the same class (B) Static members in the same class
(C) Static members of other classes (ANS) (D) Public functions of the same class

88.Hidden terminals in a wireless network may cause:
 (A) Delay  (B) Collisions (ANS)
 (C) Drain of battery charge  (D) Reduction of Signal Strength

89.IC 80287 is :
(A) Graphics Processor
(B) Microprocessor
(C) Micro-controller
(D) Co-processor (ANS)

90. The maximum size of main memory of a computer is determined by:
(A) Operating System  (B) Address Bus (ANS)
(C) Data Bus  (D) Chipset

91. In computer terminology, POST stands for:
(A) Power Operating System  (B) Push Pop Stack
(C) Power On Self Test (ANS) (D)Power Storage

92.SaaS is a popular term in the field of :
(A) Datamining  (B) Bioinformatics
(C) Information Security  (D) Cloud Computing(ANS)

93. An assembler directive
(A) XCHG(ANS)
(B) ASSUME
(C) SHORT
(D) DB

94.In a CDMA system, a code for a certain system should have:
(A) Good auto correlation with other codes
(B) Orthogonality to other codes
(C) High standard deviation
(D) Both (A) and (B) (ANS)

95. 1 Kilo Bytes refers to :
(A) 1000 Bytes  (B) 1024 Bytes (ANS) (C) 8000 Bytes (D) 8192 Bytes

96.Tuple in relational algebra refers to :
(A) Row(ANS) (B) Column  (C) Table (D) Relation

97. A ternary operator in C++
(A) ?: (ANS)  (B) ||  (C):: (D).*