SUBJECTS
August 19, 2017
EMBEDDED SYSTEM - OVERVIEW OF 8051-MICRO CONTROLLER
EMBEDDED SYSTEM - MICROCONTROLLERS AND EMBEDDED PROCESSORS
CRYPTOGRAPHY AND NETWORK SECURITY - CLASSICAL CRYPTOGRAPHY
CRYPTOGRAPHY AND NETWORK SECURITY - INTRODUCTION TO NETWORK SECURITY
COMPUTER SCIENCE AND APPLICATIONS – MODEL QUESTIONS
1. Infrared signals can be used for short range communication in a closed area using _______ propagation.
(A) ground
(B) sky
(C) line of sight
(D) space
2. A bridge has access to _______address in the same network.
(A) Physical
(B) Network
(C) Datalink
(D) Application
3. The minimum frame length for 10 Mbps Ethernet is _______ bytes and maximum is _______ bytes.
(A) 64 & 128
(B) 128 & 1518
(C) 1518 & 3036
(D) 64 & 1518
4. The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is _______.
(A) 500 baud/sec
(B) 1000 baud/sec
(C) 3000 baud/sec
(D) 18000 baud/sec.
5. Match the following :
List – I List – II
a. Physical layer i. Allow resources to network access
b. Datalink layer ii. Move packets from one destination to other
c. Network layer iii. Process to process message delivery
d. Transport layer iv. Transmission of bit stream
e. Application Layer v. Formation of frames
(ANS) iv v ii iii i
6. A grammar G is LL(1) if and only if the following conditions hold for two distinct productions A → α | β
I. First (α) ∩ First (β) ≠ {a} where a is some terminal symbol of the grammar.
II. First (α) ∩ First (β) ≠ λ
III. First (α) ∩ Follow (A) = φ if λ ∈ First (β)
(A) I and II
(B) I and III
(C) II and III
(D) I, II and III
7. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar ?
(A) Removing left recursion alone
(B) Removing the grammar alone
(C) Removing left recursion and factoring the grammar
(D) None of the above
8. A shift reduce parser suffers from
(A) shift reduce conflict only
(B) reduce reduce conflict only
(C) both shift reduce conflict and reduce reduce conflict
(D) shift handle and reduce handle conflicts
9. KPA in CMM stands for
(A) Key Process Area
(B) Key Product Area
(C) Key Principal Area
(D) Key Performance Area
12. Which one of the following is not a risk management technique for managing the risk due to unrealistic schedules and budgets ?
(A) Detailed multi source cost and schedule estimation.
(B) Design cost
(C) Incremental development
(D) Information hiding
COMPILER DESIGN - PARSING GENERATOR, SEMANTIC PHASE INTRODUCTION
COMPILER DESIGN – OPERATOR PRECEDENCE PARSING ALGORITHM
SOFTWARE QUALITY MANAGEMENT - SOFTWARE CONFIGURATION MANAGEMENT
SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY METRICS
SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY ASSURANCE
SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING-10
SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING - 9
SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE-2
SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE
Subscribe to:
Posts (Atom)