Header Ads

NIELIT NIC Scientic Technical Assistant Questions

NIELIT NIC Scientic Technical Assistant Questions
NIC Scientic Technical Assistant Questions
NIELIT NIC Scientist B Questions

1.The body tag usually used after
 A. Title tag
B. HEAD tag
C. EM tag
D. FORM tag

Ans- B

2.White spaces in XML includes
A. Things like space characters, new lines and tabs
B. Only spaces
C. Space between two double quotes
D. None of these

Ans-C

3.What is XML?
A. Subset of SGML, Extensible Markup Language
B. Superset of SGML, Extendable Markup Language
C. Like SGML, Extended Markup Language
D. None of these

Ans A


4. RMI uses stub and skeleton for communication with the ________ object.
a) client
b) remote
c) server
d) any

Ans-B

5 File transfer protocol (FTP) is built on _________architecture
a. Peer to peer
b. Client server
c. Both a and b
d. None of the above

Ans-B

6. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access

Ans - A

7. Packets of the same session may be routed through different paths in:
(a) TCP, but not UDP
(b) TCP and UDP
(c) UDP, but not TCP
(d) Neither TCP nor UDP

Ans-B

8) In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1-bit delay in this network is equivalent to:
(A) 500 metres of cable.
(B) 200 metres of cable.
(C) 20 metres of cable.
(D) 50 metres of cable.


Ans-c
Transmission delay for 1 bit t = 1/(10^7) = 0.1 micro seconds. 200 meters can be traveled in 1 micro second. Therefore, in 0.1 micro seconds, 20 meters can be traveled.

9) An organization has a class B network and wishes to form subnets for 64 departments. The subnet mask would be:
(a) 255.255.0.0
(b) 255.255.64.0
(c) 255.255.128.0
(d) 255.255.252.0

Ans-D
The size of network ID is 16 bit in class B networks. So bits after 16th bit must be used to create 64 departments. Total 6 bits are needed to identify 64 different departments. Therefore, subnet mask will be 255.255.252.0.

10. The DSS signature uses which hash algorithm? 
a) MD5 
b) SHA-2 
c) SHA-1 
d) Does not use hash algorithm

Ans-C


11. Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?
a) Algorithm Negotiation; End of key exchange; Service request; Identification string exchange
b) Identification string exchange; Algorithm Negotiation; End of key exchange; Service request
c) Identification string exchange; End of key exchange; Service request; Algorithm Negotiation
d) Algorithm Negotiation; Identification string exchange; End of key exchange; Service request

Ans-B

12.Bluetooth has used a sophisticated version of
a.CSK
b.FSK
c.TDMA
d.CDMA

Ans -B

13.Which SDLC activity does the user initiates the request for a desired software product?
a. Requirement gathering
b. Implementation
c. Disposition
d. Communication

Ans-D

14.Which coupling is also known as "Global coupling"?
a. Content coupling
b. Stamp coupling
c. Data coupling
d. Common coupling

Ans-D

15 Abbreviate the term CMMI.
a. Capability Maturity Model Integration
b. Capability Model Maturity Integration
c. Capability Maturity Model Instructions
d. Capability Model Maturity Instructions

Ans-A

16.Consider a computer system with 6 tape drives and n processes completing for them. What is the maximum value of n for the system to be deadlock free assuming each processes may need 3 tape drives?
(A) 3
(B) 2
(C) 4
(D) 7

Ans-B

17) A program is executing in a pure demand paging system with 100 records per page with 1 free main memory frame. The address sequence that is generated by tracing this program is recorded as follows. 0100, 0200, 0430, 0499, 0510, 0530, 0560, 0120, 0220, 0240, 0260, 0320, 0370. The number of page faults is
(A) 8
(B) 11
(C) 7
(D) 12

Ans-C

 18 A machine has a physical memory of 64Mbyte and virtual address space of 32-bit. The page size is 4kbyte and the page table size is approximately

(A) 24Mbyte
(B) 16Mbyte
(C) 2Mbyte
(D) 8Mbyte

Ans D

19.In a resident-OS computer ___________ must reside in the main memory under all situation 
(A) Linker 
(B) Loader 
(C) Assembler 
(D) Compiler

Ans B

(20) Which one of the following statement is true? 
(A) Canonical LR parser is more powerful than LALR parser 
(B) SLR parser is more powerful than LALR 
(C) LALR parser is more powerful than canonical LR parser 
(D) SLR parser, canonical LR parser and LALR parser all have the same power


Ans-A

21. Which of the following is used for grouping of characters into tokens? 
a) Parser 
b) Code optimization 
c) Code generator 
d) Lexical analyser

Ans-D

22. The context free grammar S → SS | 0S1 | 1S0 | ɛ generates 
a) Equal number of 0’s and 1’s 
b) Unequal number of 0’s and 1’s 
c) Number of 0’s followed by any number of 1’s 
d) None of the mentioned

Ans-A


23. A linker is given object module for a set of programs that were compiled separately. What is not true about an object module 
a) Object code 
b) Relocation bits 
c) Names and locations of all external symbols denied in the object module 
d) Absolute addresses of internal symbols

Ans-D
a linker or link editor is a computer program that takes one or more object files generated by a compiler and combines them into a single executable file, library file, or another object file.

24  A logical description of some portion of database that is required by a user to perform task is called as 
A. System View 
B. User View 
C. Logical View 
D. Data View

Ans-B


25. If every non-key attribute is functionally dependent on the primary key, the relation will be in 
A. First Normal Form 
B. Second Normal Form 
C. Third Normal Form 
D. Fourth Formal Form

Ans-C

26. Which of the following in true regarding Referential Integrity?
A. Every primary-key value must match a primary-key value in an associated table
B. Every primary-key value must match a foreign-key value in an associated table
C. Every foreign-key value must match a primary-key value in an associated table
D. Every foreign-key value must match a foreign-key value in an associated table


Ans-C


27.The type of function which allows performing additional operations and sending messages to other tables in database program is considered as 
a trigger 
b semantics 
c index 
d structure

Ans-A


28.The process which includes the functions such as retrieving particular data with the help of specific queries and generating reports of that data is classified as 
a constructing the database 
b manipulating the database 
c retrieving the database 
d controlling the database

Ans A

29.Under which category do the commands CREATE and ALTER belong to?


a. DML
b. DDL
c. UML
d. None of the above.

Ans - B


30.Which is the concurrency control protocol that ensure both conflict serializability and freedom from deadlock?  
a. Time stamp ordering 
b. 2 - phase locking 
c. Both A and B 
d. Neither A nor B

Ans-A


31 Which one of the following statements is / are true about SQL? 
a. SQL permits attribute names to be repeated in the same relation 
b. If there are no indexes on the relations then an SQL query will not work 
c. Duplicates are automatically eliminated by an SQL query 
d. None of the above

Ans-A


32  Which one of the following statement is incorrect for the basic ER and relational models? 
(A) An attribute of an entity can be composite 
(B) An attribute of an entity can have more than one value 
(C) An attribute can have exactly one value or a NULL value in a row of a relational table. 
(D) An attribute can have more than one value in a row of a relational table

Ans-D

33  If the maximum number of keys in a node of a B+ tree is 5 then the minimum number of keys in any non-root node is 
(A) 4 
(B) 3 
(C) 2 
(D) 1

Ans-C


 34  In domain relaional calculus “there exist” can be expressed as 
a) (P1(x)) 
b) (P1(x)) Э x 
c) V x (P1(x)) 
d) Э x (P1(x))

Ans-D




36. What would be the outcome of the above query?

a) It would not display any values
b) It would display the value TWO once
c) It would display the value TWO twice
d) It would display the values ONE, TWO, and TWO

Ans C

37. What does the following function check for? (all necessary headers to be included and function is called from main) 
#define MAX 10

 typedef struct stack

{

 int top;
 int item[MAX];
 }stack; 

int function(stack *s)
 {

 if(s->top == -1) return 1; 

else 

return 0;
 }

a) full stack
b) invalid index
c) empty stack
d) infinite stack


Ans-C 

38.Given an array of element 5, 7, 9, 1, 3, 10, 8, 4. Which of the following is the correct sequences of elements after inserting all the elements in a min-heap?
a) 1,3,4,5,7,8,9,10
b) 1,4,3,9,8,5,7,10
c) 1,3,4,5,8,7,9,10
d) 1,3,7,4,8,5,9,10

Ans- A


39.  Consider an implementation of unsorted singly linked list. Suppose it has its representation with a head pointer only.
Given the representation, which of the following operation can be implemented in O(1) time?
i) Insertion at the front of the linked list
ii) Insertion at the end of the linked list
iii) Deletion of the front node of the linked list
iv) Deletion of the last node of the linked list
a) I and II
b) I and III
c) I, II and III
d) I, II and IV


Ans-B


40.  What will be the output of the following C code (after linking to source file having definition of ary1)?


  #include <stdio.h>

    int main()

    {
        extern ary1[];

        printf("%d\n", ary1[0]);

    }


a) Value of ary1[0];
b) Compile time error due to multiple definition
c) Compile time error because size of array is not provided
d) Compile time error because datatype of array is not provided


Ans-D

41.Which variable has the longest scope in the following C code?

     #include <stdio.h>

    int b;

    int main()

    {
        int c;

        return 0;
    }


    int a;


a) a
b) b
c) c
d) Both a and b

Ans-B

42. An 24 bit address generates an address space of ______ locations.
a) 1024
b) 4096
c) 248
d) 16,777,216
Answer: d
Explanation: The number of addressable locations in the system is called as address space.

43. UART stands for ________
a) Universal Asynchronous Relay Transmission
b) Universal Accumulator Register Transfer
c) Universal Asynchronous Receiver Transmitter
d) None of the mentioned
Answer: c
Explanation: The UART is a standard developed for designing serial ports.

44.The method of mapping the consecutive memory blocks to consecutive cache blocks is called ______
a) Set associative
b) Associative
c) Direct
d) Indirect
Answer: c

Explanation: This method is most simple to implement as it involves direct mapping of memory blocks.


45.  The 68000 has a max of how many data registers?

a) 16
b) 20
c) 10
d) 8
Answer: d

Explanation: The data registers are solely used for the purpose of storing data items of the process.

found  any discrepancy in questions and answer , then put your doubt at comment section.

No comments