Placement Papers: ICICI Paper on 25th Sept 2008

Glide to success with Doorsteptutor material for CTET/Paper-2 : get questions, notes, tests, video lectures and more- for all subjects of CTET/Paper-2.

  1. A 2MB PCM (pulse code modulation) has
    1. 32 channels
    2. 30 voice channels & 1 signalling channel.
    3. 31 voice channels & 1 signalling channel.
    4. 32 channels out of which 30 voice channels, 1 signalling channel, & 1 Synchronizatio channel.
  2. Answer: c
  3. Time taken for 1 satellite hop in voice communication is
    1. second
    2. 1 seconds
    3. 4 seconds
    4. 2 seconds
  4. Answer: a
  5. A dishonest shopkeeper professes to sell pulses at the cost price, but he uses a false weight of 950gm. For a kg. His gain is? % .
  6. Max number of satellite hops allowed in voice communication is:
    1. only one
    2. more than one
    3. two hops
    4. four hops
  7. Answer: c
  8. Conditional results after execution of an instruction in a micro processor is stored in
    1. register
    2. accumulator
    3. flag register
    4. flag register part of PSW (Program Status Word)
  9. Answer: d
  10. Frequency at which VOICE is sampled is
    1. 4 Khz
    2. 8 Khz
    3. 16 Khz
    4. 64 Khz
  11. Answer: a
  12. Line of Sight is
    1. Straight Line
    2. Parabolic
    3. Tx & Rx should be visible to each other
    4. none
  13. Answer: c
  14. Purpose of PC (Program Counter) in a Micro Processor is
    1. To store address of TOS (Top Of Stack)
    2. To store address of next instruction to be executed.
    3. count the number of instructions.
    4. to store base address of the stack.
  15. Answer: b
  16. What action is taken when the processor under execution is interrupted by a non-maskable interrupt?
    1. Processor serves the interrupt request after completing the execution of the current instruction.
    2. Processor serves the interupt request after completing the current task.
    3. Processor serves the interupt request immediately.
    4. Processor serving the interrupt request depends upon the priority of the current task under execution.
  17. Answer: a
  18. The status of the Kernel is
    1. task
    2. process
    3. not defined.
    4. none of the above:
  19. Answer: b
  20. To send a data packet using datagram, connection will be established
    1. before data tr Ans: Mission.
    2. connection is not established before data tr Ans: Mission.
    3. no connection is required.
    4. none of the above:
  21. Answer: c
  22. Word allignment is
    1. alligning the address to the next word boundary of the machine.
    2. alligning to even boundary.
    3. alligning to word boundary.
    4. none of the above:
  23. Ans: (a)
  24. When a C function call is made, the order in which parameters passed to the function are pushed into the stack is
    1. left to right
    2. right to left
    3. bigger variables are moved first than the smaller variales.
    4. smaller variables are moved first than the bigger ones.
    5. none of the above:
  25. Ans: (b)
  26. What is the type of signalling used between two exchanges?
    1. inband
    2. common channel signaling
    3. any of the above
    4. none of the above:
  27. Ans: (a)
  28. Buffering is
    1. the process of temporarily storing the data to allow for small variation in device speeds
    2. a method to reduce cross talks
    3. storage of data within tr Ans: Mitting medium until the receiver is ready to receive.
    4. a method to reduce routing overhead.
  29. Ans: (a)
  30. Memory allocation of variables declared in a program is
    1. allocated in RAM.
    2. allocated in ROM.
    3. allocated on stack.
    4. assigned to registers.
  31. Ans: (c)
  32. A software that allows a personal computer to pretend as a computer terminal is
    1. terminal adapter
    2. bulletin board
    3. modem
    4. terminal emulation
  33. Ans: (d)
  34. Find the output of the following program int āš¹ p, āš¹ q; p = (int āš¹) 1000; q = (int āš¹) 2000; printf ( ā€œ% dā€ (q-p) ,) ; Ans: 500
  35. Which addressing mode is used in the following statements:
    1. MVI B, 55
    2. MOV B, A
    3. MOV M, A
  36. Ans: a, Immediate addressing mode.
  37. (b) Register Addressing Mode
  38. (c) Direct addressing mode
  39. ā‚¹ -232C standard is used in ________. Ans: Serial I/O
  40. Memory. Management in Operating Systems is done by
    1. Memory Management Unit
    2. Memory management software of the Operating System
    3. Kernel
  41. Answer: b
  42. What is done for a Push opertion? Ans: SP is decremented and then the value is stored.
  43. Binary equivalent of 52 Ans: 110100
  44. Hexadecimal equivalent of 3452 Ans: 72A
  45. Explain Just In Time Concept? Ans: Elimination of waste by purchasing manufacturing exactly when needed
  46. A good way of unit testing s/w program is Ans: User test
  47. OOT uses Ans: Encapsulated of detect methods
  48. EDI useful in Ans: Electronic Tr Ans: Mission
  49. MRPII different from MRP Ans: Modular version of man redundant initials
  50. Hard disk time for R/W head to move to correct sector Ans: Latency Time
  51. The percentage of times a page number bound in associate register is called Ans: Bit ratio
  52. Expand MODEM Ans: Modulator and Demodulator
  53. RDBMS file system can be defined as Ans: Interrelated
  54. Super Key is Ans: Primary key and Attribute
  55. Windows 95 supports
    1. Multiuser
    2. n tasks
    3. Both
    4. None
  56. Ans: a
  57. In the command scanf, h is used for Ans: Short int
  58. A process is defined as Ans: Program in execution
  59. A thread is Ans: Detachable unit of executable code
  60. A thread is Ans: Detachable unit of executable code
  61. How is memory management done in Win95 Ans: Through paging and segmentation
  62. What is meant by polymorphism Ans: Redfinition of a base class method in a derived class
  63. What is the essential feature of inheritance Ans: All properties of existing class are derived
  64. What does the protocol FTP do AnsTr Ans: Fer a file b/w stations with user authentification
  65. In the tr Ansport layer, TCP is what type of protocol Ans: Connection oriented
  66. Why is a gateway used Ans: To connect incompatible networks
  67. How is linked list implemented Ans: By referential structures
  68. What method is used in Win95 in multitasking Ans: Non preemptive check
  69. What is a semaphore Ans: A method synchronization of multiple processes
  70. What is the precedence order from high to low, of the symbols () ++ /Ans: () . ++ , /
  71. Preorder of A āš¹ (B + C) /D-G Ans: āš¹ + ABC/-DG
  72. What is the efficiency of merge sort Ans: O (n log n)
  73. In which layer are routers used Ans: In network layer
  74. Which of the following sorting algorithem has average sorting behavior--Bubble sort, merge sort, heap sort, exchange sort Ans: Heap sort
  75. In binary search tree which traversal is used for getting ascending order values--Inorder, post order, preorder Ans: Inorder
  76. What are device drivers used for

Ans: To provide software for enabling the hardware