Вы находитесь на странице: 1из 5

Which header file/s contain/s information about the size of data type? 1. limit.h2. float.h3. Both of the above4.

None of the above A pointer is a/an 1. address of a varible2. indication of a variable3. variable which stores the address of another varible4. none of the above Define preprocessor command can be used for defining 1. macro2. for loop3. both of the above4. symbolic constant The function calloc is used 1. to free memory space2. to allocate memory space3. both of the above4. none of the above The numeric data stored in C is in ____form. 1. binary2. octal3. hexadecimal4. none of the above The unions are ____ data types. 1. basic2. primary3. derived4. none of the above The loop which filters the source code before compilation is 1. macro2. stack3. preprocessor4. none of the above Define is used to define a 1. logical constant2. real constant3. symbolic constant4. none of the above Which of the following files is used to search the whole directory? 1. < * . h >2. <* . * . h >3. < find.h >4. None of the above Header files generally contain _____ function. 1. declaration2. initialization3. calling4. none of the above Arrays are passed as arguments to a function by some 1. value2. reference3. both of the above4. none of the above

If - else statement is used for 1. looping2. iteration3. condition4. all of the abovehe above The statement used to transfer the control to some other part of the program is known as 1. skip2. next3. goto4. none of the above Variables have ___ number of scopes. 1. two2. one3. three4. none of the above The ____ variable is present in the short and selected programs. 1. local2. global3. both of the above4. none of the above |Distributed variables are 1. private2. local3. global4. none of the above

C has multiway decision control construct known as 1. if statement2. if - else statement3. switch statement4. none of the above Repetitive calling of C function is called as 1. iteration2. recursion3. repeater4. none of the above |Which function terminates the execution of the program? 1. break2. exit()3. goto4. None of the above The looping do is in 1. ending of the loop2. beginning of the loop3. middle of the loop4. none of the above Structure is a group of 1. data type2. data items and data variables3. integers4. none of the above A pointer is a/an 1. address of a varible2. indication of a variable3. variable which stores the address of another variable4. none of the above The link between object and variable in a structure is shown by the operator 1. .2. :3. +4. / Stack follows 1. LIFO2. FIFO3. FILO4. None of the above C doesn't use pointer with 1. functions2. array3. structure4. Union

______ is also called as process. Task/Job/Batch/Unit _____ operating systems allow simultaneous access to a computer. Multiprocess/Multiaccess/Mutiread None of Identify 1 characteristic of RARP? IP to MAC address translation/Connectionless delivery of packets/Can be used to initiate remote O/S load sequence Generates error and control messagesthese The key objective of a distributed operating system is ______. /reliability/efficiency/transparency/none of these _______ is also called as multi-programming. Multi-tasking Multi-jobing

Multi-batching None of these SPOOL means Simultaneous Peripheral Operations Online/Simultaneous Partial Operations Online/Some Peripheral Operations Online Some P In a linked list each link contains a pointer to the next link/an array of pointers points to the link/no link contains data/the links are stored in an arrayeripheral Objects Online The GOTO statement causes the control to go to an operator/a label/a function/a variable The exception is activated through which keyword? Try/Catch/Struct Throw The identifiers which can not be used as names of variables or other user defined elements are called keywords/constants/tokens/operators When a multi-dimensional array is accessed, each array index is separated by commas/surrounded by brackets and separated by commas/surrounded by brackets/separated by co The keyword void is used to declare a member function that is defined in a subclass designate the absence of a type/declare objects that can be modified outside of program control/declare a synonym f The first element of the string is the name of string the first character in the string the length of string/the name of array holding the stringor an existing typemmas and surrounded by brackets Which of the following is not used in Local Area Networks? Computer/Modem/Cable/Printer Which topology provides highest reliability? Bus/Star//Ring Mesh How many layers does OSI reference model have? 5/6/7/8 Which network uses dynamic or adaptive routing? TYMNET/ARPANET/SNA/None of these Which data communication method is used for sending data in both directions at the same time? Super duplex/Simplex/Half duplex/full duplex

Full d ______ supports multiple users. Single user systems/Multiuser systems/Both 1 and 2/None of theseuplex An instance of a program in execution is called a _______. 1.job2.process3.batch4.unit Find out the odd term among of the following. Twisted pair/Fibre optic/Coaxial cable/Microwave What is a typical local loop between the central office and our home made up of? Twisted pair/Fibre optic/Coaxial cable/Satellite Un-modulated signal coming from a transmitter is called carrier signal/primary signal/base band signal/none of these Which of the following is enclosed in double quotation marks? Integer constant/Floating Constant/Character Constant/String Constant Manipulators are used to allocate memory/free allocated memory/resolve scope of variable/formats data display FTP stands for Fit To Parity File Transfer Protocol Fund Tracking Protocol File To Process Which high level protocols run over IP? FTP/SMTP/HTTP/All of these What are smallest and highest possible values for an IP octet? 0 and 255/0 and 256/0 and 512/0 and 999 Bit stuffing refers to inserting a '0' in user data stream to differentiate it with a flaginserting a '0' in flag stream to avoid ambiguity/appending a nibble to data stream/appending a nibble to flag stream Error detection in data link layer is achieved by bit stuffing/cyclic redundancy codes/hamming codes/equalization Which transmission mode is used by telephone lines? Parallel/Serial/Synchronous/Asynchronous The Internet is evolved from

DECNET ARPANET IBM SNA network NoWhich is not a field of Ethernet message packet? Type Data Pin code Addressne of these HDLC is Bit oriented Bit transparent Code dependent None of these

Вам также может понравиться