<--BACK
26.
A comparison of frequency division ad time division multiplexing system shows that
(A) FDM
requires a lower bandwidth, but TDM has greater noise immunity.
(B) FDM has
greater noise immunity and requires lower bandwidth than TDM.
(C) FDM
requires channel synchronization, while TDM has greater noise immunity.
(D) FDM
requires more multiplex while TDM requires band pass filter.
27.
If carrier modulated by a digital bit stream, has one one of the
possible phase of 0, 90, 180 and 270 degrees, then modulation called
(A) BPSK (B) QPSK (C)
QAM (D) MSK
28.
Consider the following statement :
(i) The
bandwidth of A.M., wave depends on the band width of the modulating signal.
(ii) The
bandwidth of the A.M.,wave depends on the modulation index.
(iii) The
bandwidth of the F.M, wave for all practical purpose depends on the amplitude
of the carrier.
Of these
statements the correct statements are
(A) (i, ii) (B) (i, iii) (C) (ii, iii) (D)
All of the above
29.
A smart modem can dial, hangup and answer incoming calls automatically.
Can you tell who provides the appropriate instructions to the modem for this
purpose ?
(A)
Communication software (B) Error
detection protocols
(C) Link
access procedure (LAP) (D) Telecommunications
30.
Which of the following switching techniques is most suitable for interactive
traffic ?
(A) Circuit
switching (B) Message switching
(C) Packet
switching (D) All of the above
31.
Object modules generated by assembler that contains unresolved external
references are resolved for two or more
object module by a/an
(A) Operating
system (B) Loader (C) Linker (D) Compiler
32.
A special software that is used to create a job queue is called
(A) Drive (B)
Spooler (C) Interpreter (D) Linkage editor
33.
Which of the following permanent database that has an entry for
each terminal symbol ?
(A) Literal
table (B) Identifier table (C) Terminal table (D) Source table
34.
In which way(s) a macroprocessor for assembly language can be implemented
?
(A)
Independent two-pass processor (B) Independent one-pass processor
(C) Expand
macrocalls and substitute arguments (D) All of the above
35.
Which of the following can be accessed by transfer vector approach
of linking ?
(A) External
data segments (B) External subroutine
(C) Data
located in other procedure (D) All of the above
36.
Block or Buffer caches are used to
(A) improve
disk performance
(B) handle
interrupts
(C) increase
the capacity of main memory
(D) speed up
main memory Read operations
37.
A file organization component VSAM file is
(A) Relative
records data set (B) Keyed sequential
data set
(C) Entry
sequential data set (D) All of the
above
38.
A relationship between processes such that each has some part
(critical section) which must not be executed while the critical section of
another is being executed, is known as
(A) Semaphore (B)
Mutual exclusion (C) Multiprogramming (D) Message passing
39.
How many states can a process be in ?
(A) 3 (B) 4 (C)
2 (D) 5
40.
Which command allows you to view your file 24 lines at a time ?
(A) More (B) Cat (C)
Pg (D) None of the above
41.
Which one of the items listed below is not one of the software engineering
layers ?
(A) Process (B) Manufacturing (C) Method
(D) Tools
42.
What is the first stage in program development ?
(A)
Specification and design (B) System Analysis
(C) Testing (D) None of the
above
43.
By means of a data flow diagram, the analyst can detect
(A) Task
duplication (B) Unnecessary
delays
(C) Task
overlapping (D) All of the
above
44.
Which of these are the 5 generic software engineering framework activities
?
(A)
Communication, planning, modelling, construction, deployment
(B)
Communication, risk management, measurement, production, reviewing
(C) Analysis,
designing, programming, Debugging, maintenance
(D) Analysis,
planning, designing, programming, testing
45.
Many causes of the software crisis can be traced to mythology
based on
(A) Management
Myths (B) Customer Myths
(C)
Practitioner Myths (D) All of the
above
46.
Data warehousing refers to
(A) storing
data offline at a separate site
(B) backing up
data regularly
(C) is related
to data mining
(D) uses tape
as opposed to disk
47.
Virtual memory is
(A) related to
virtual reality (B) a form of ROM
(C) a form of
RAM (D) None of the above
48.
“M-Commerce” refers to
(A) a myth
which does not exist in reality
(B) the
ability of business to reach potential customers wherever they are
(C) the
ability to have large capacity of memory storage dealing trade and commerce
(D) None of
the above
49.
The principal electronic payment systems for electronic commerce
is
(A) Credit
Card (B) Digital Wallet (C) Electronic Cheque (D) All of the above
50.
Which is the most valuable electronic commerce to individual
customer in long run ?
(A) Business
to Customer (B) Business to Business
(C) Customer
to Customer (D) None of the above
No comments:
Post a Comment