Quiz Electronics Engineering

Exam: NIC

Topic: Miscellaneous

Date: 12/06/2020

Each Question carries 1 Mark

Negative Marking: 1/4

Time: 10 Minutes

Q1. How many RAM chips of size (256 K × 1 bit) are required to build 1 MB memory?

(a) 8

(b) 10

(c) 24

(d) 32

L1 Difficulty 2

QTags Digital Electronics

QCreator Vikram Kumar

Q2. A hash-function f defined as f(key) = key mod 7, with linear probing, insert the keys 37, 38, 72, 48, 98, 11, 56, into a table indexed from 11 will be stored in the location

(a) 3

(b) 4

(c) 5

(d) 6

L1 Difficulty 3

QTags Computer

QCreator Vikram Kumar

Q3. The CFG s ⟶ as | bs | a | b is equivalent to regular expression

(a) (a + b)

(b) (a + b)(a + b)*

(c) (a + b)(a + b)

(d) All of these

L1 Difficulty 2

QTags Compiler Design

QCreator Vikram Kumar

Q4. In a Single Pass Assembler, most of the forward references can be avoided by putting the restriction

(a) on the number of strings/lifereacts

(b) that the data segment must be defined after the code segment

(c) on unconditional rump

(d) that the data segment be defined before the code segment

L1 Difficulty 3

QTags Compiler Design

QCreator Vikram Kumar

Q5. The file structure that redefines its first record at a base of zero uses the term

(a) relative organization

(b) key fielding

(c) dynamic reallocation

(d) All of these

L1 Difficulty 3

QTags Data Structure

QCreator Vikram Kumar

Q6. For a database relation R(a, b, c, d), where the domains of a, b, c, d include only atomic values, only the functional dependencies and those that can be inferred from them hold:

a ⟶ c ; b ⟶ d ; the relation is in

(a) first normal form but not in second normal form

(b) second normal form but not in third normal form

(c) third normal form

(d) None of the above

L1 Difficulty 3

QTags DBMS

QCreator Vikram Kumar

Q7. The extent to which the software can control to operate correctly despite the introduction of invalid input is called as

(a) reliability

(b) robustness

(c) fault tolerance

(d) portability

L1 Difficulty 3

QTags Software Engineering

QCreator Vikram Kumar

Q8. A packet-switching network

(a) is free

(b) can reduce the cost of using an information utility

(c) allows communication channel to be shared among more than one user

(d) both (b) and (c)

L1 Difficulty 3

QTags Networking

QCreator Vikram Kumar

Q9. When signed numbers are used in binary arithmetic, then which of the following notations would have unique representation for zero?

(a) Sign-magnitude

(b) 1’s complement

(c) 2’s complement

(d) 9,s complement

L1 Difficulty 3

QTags Computer Organization & Microprocessor

QCreator Vikram Kumar

Q10. The data-bus width of a 2048 x 8 bits is

(a) 8

(b) 10

(c) 12

(d) 16

L1 Difficulty 1

QTags Digital Electronics

QCreator Vikram Kumar

SOLUTIONS

S1. Ans.(d)

Sol.

Memory capacity = 1 MB = 2^20 bytes = 2^20 × 8 bits = 2^23 bits

RAM chip size = 256 K × 1 bit = 2^18 bits

Now, Number of RAM chips are = 2^23/2^18 = 2^5 = 32

S2. Ans.(c)

Sol. Hash function = f(key) = key mod 7

Insertion order is 37, 38, 72, 48, 98, 11, 56

Step 1: Insert 37 ⇒ 37 mod 7 = 2. It occupies 2nd location.

Step 2: Insert 38 ⇒ 38 mod 7 = 3. It occupies 3rd location.

Step 3: Insert 72 ⇒ 72 mod 7 = 2, but 2nd location already occupied, so after linear probing it would occupy 4th location.

Step 4: Insert 48 ⇒ 48 mod 7 = 6. It occupies 6th location.

Step 5: Insert 98 ⇒ 98 mod 7 = 0. It occupies 0th location.

Step 6: Insert 11 ⇒ 11 mod 7 = 4, but 4th location already occupied, after linear probing it would get into 5th location.

S3. Ans.(b)

(a + b)(a + b)*

S4. Ans.(d)

Sol. A single pass assembler scans the program only once and creates the equivalent machine codes. Data segment must be defined before the code segment to avoid forward references.

S5. Ans.(a)

Sol. A relative file is a file in which each record is identified by its ordinal position in the file (record 1, record 2 and so on). This means that records can be accessed randomly as well as sequentially. If defined Access Mode is Dynamic then file can be accessed both sequentially and randomly.

S6. Ans.(a)

Sol. If every attribute in a relation is single valued attribute then it is in 1NF.

candidate key of above relation is ab.

Since all a, b, c, d are single valued attribute so the relation is in 1 NF.

a ⟶ c and b ⟶ d are partially dependent so they are not in 2 NF.

Therefore, the relation is in first normal form but not in second normal form.

S7. Ans.(b)

Sol. Robustness is the ability of a computer system to withstand errors during execution and invalid input. It focuses on handling unexpected termination and unexpected actions.

S8. Ans.(d)

-can reduce the cost of using an information utility

-allows communication channel to be shared among more than one user

S9. Ans.(c)

Sol. In 1’s complement, 9’s complement and sign-magnitude zero is represented in more than one notation but in 2’s complement it is represented in only 1 way.

S10. Ans.(a)

8