# SAT – Sample Quiz

19 Questions | Total Attempts: 111  Settings  A score of 80% in the practice exam is a good check for basic knowledge. It is a good practice to give the test at one shot. . . .

• 1.
A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet?
• A.

14

• B.

30

• C.

62

• D.

126

• 2.
Which one of the following is NOT shared by the threads of the same process ?
• A.

Stack

• B.

• C.

File Descriptor Table

• D.

Message Queue

• 3.
The following C function takes two ASCII strings and determines whether one is an anagram of the other. An anagram of a string s is a string obtained by permuting the letters in s. int anagram (char *a, char *b){int count , j;for (j = 0;j < 128; j++) count[j] = 0;j = 0;while (a[J] && b[J]){A;B; }for (j = 0;j < 128; j++) if(count[j]) return 0;return 1;}Choose the correct alternative for statements A and B.
• A.

A : count [a[j]]++and B : count[b[j]]-

• B.

A : count [a[j]]++and B : count[b[j]]++

• C.

A : count [a[j++]]++and B : count[b[j]]-

• D.

A : count [a[j]]++and B : count[b[j++]]-

• 4.
Let M = (K, å, d, s, F) be a finite state automaton, whereK = {A, B}, å = {a, b}, s = A, F = {B},d(A, a) = A, d(A, b) = B, d(B,a) = B and d(B, b) = AA grammar to generate the language accepted by M can be specified as G = (V, å, R, S), where V = K È S, and S = AWhich one of the following set of rules will make L(G) = L(M) ?
• A.

{A ® aB, A ® bA, B ® bA, B ® aA, B ® e}

• B.

{A ® aA, A ® bB, B ® aB, B ® bA, B ® e}

• C.

{A ® bB, A ® aB, B ® aA, B ® bA, B ® e}

• D.

{A ® aA, A ® bA, B ® aB, B ® bA, A ® e}

• 5.
Which one of the following regular expressions is NOT equivalent to the regular expression (a + b + c)* ?
• A.

(a* + b* + c*)*

• B.

(a*b*c*)*

• C.

((ab)* + c*)*

• D.

(a*b* + c*)*

• 6.
Let G be a weighted undirected graph and e be an edge with maximum weight in G. Suppose there is a minimum weight spanning tree in G containing the edge e. Which of the following statements is always TRUE?
• A.

There exists a cutset in G having all edges of maximum weight.

• B.

There exists a cycle in G having all edges of maximum weight.

• C.

Edge e cannot be contained in a cycle.

• D.

All edges in G have the same weight.

• 7.
A software organization has been assessed at SEI CMM Level 4. Which of the following does the organization need to practice beside Process Change Management and Technology Change Management in order to achieve Level 5 ?
• A.

Defect Detection

• B.

Defect Prevention

• C.

Defect Isolation

• D.

Defect Propagation

• 8.
A CPU has only three instructions II, 12 and 13, which use the following signals in time steps T1-T5:I1: T1: Ain, Bout, Cin T2: PCout, Bin T3: Zout, Ain T4: PCin, Bout T5: EndI2: Tl: Cin, Bout, Din T2: Aout,Bin T3: Zout, Ain T4: Bin, Cout T5: EndI3: Tl: Din, out T2: Din,Bout T3: Zout, Ain T4: Dout,Ain T5: EndWhich of the following logic functions will generate the hardwired control for the signal Ain?
• A.

T1.I1 + T2.I3 + T4 . I3 + T3

• B.

(T1 + T2 + T3) . I3 + T1.I1

• C.

(T1 + T2 ) . I1 + (T2 + T4) . I3 + T3

• D.

(T1 + T2 ) . I2 + (Tl + T3) . I1+ T3

• 9.
Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffle-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key is
• A.

3

• B.

4

• C.

5

• D.

6

• 10.
Consider the following message M = 1010001101. The cyclic redundancy check (CRC) for this message using the divisor polynomial x5 + x4 + x2 + 1 is :
• A.

01110

• B.

01011

• C.

10101

• D.

10110

• 11.
Which of the following statements is FALSE regarding a bridge
• A.

Bridge is a layer 2 device

• B.

Bridge reduces collision domain

• C.

Bridge is used to connect two or more LAN segments

• D.

• 12.
What is the availability of a software with the following reliability figures?Mean Time Between Failure (MTBF) = 25 daysMean Time To Repair (MTTR) = 6 hours
• A.

1%

• B.

24%

• C.

99%

• D.

99.009%

• 13.
In a population of N families, 50% of the families have three children, 30% of the families have two children and the remaining families have one child. What is the probability that a randomly picked child belongs to a family with two children?
• A.

3/23

• B.

6/23

• C.

3/10

• D.

3/5

• 14.
A student wishes to create symbolic links in a computer system running Unix. Three text files named “file 1”, “file 2” and “file 3” exist in her current working directory, and the student has read and write permissions for all three files. Assume that file 1 contains information about her hobbies, file 2 contains information about her friends and file 3 contains information about her courses. The student executes the following sequence of commands from her current working directoryIn -s file 1 file 2 In -s file 2 file 3Which of the following types of information would be lost from her file system?(I) Hobbies (II) Friends (III) Courses
• A.

(I) and (II) only

• B.

(II) and (III) only

• C.

(II) only

• D.

(I) and (III) only

• 15.
A channel has a bit rate of 4 kbps and one-way propagation delay of 20 ms. The channel uses stop and wait protocol. The transmission time of the acknowledgement frame is negligible. To get a channel efficiency of at least 50%, the minimum frame size should be
• A.

80 bytes

• B.

80 bits

• C.

160 bytes

• D.

160 bits

• 16.
Consider an XML file called intro.xml and a document type defintion (DTD) file intro. dtd as follows:intro.xmlWelcome to XML intro.dtd A validating parser will classify intro.xml as
• A.

Well-formed and validated

• B.

Well-formed but not validated

• C.

Validated but not well-formed

• D.

Neither validated not well-formed

• 17.
In an inventory management system implemented at a trading corporation, there are several tables designed to hold all the information. Amongst these, the following two tables hold information on which items are supplied by which suppliers, and which warehouse keeps which items along with the stock-level of these items.Supply = (supplierid, itemcode)Inventory = (itemcode, warehouse, stocklevel)For a specific information required by the management, following SQL query has been writtenSelect distinct STMP supplieridFrom Supply as STMPWhere not unique (Select ITMP . supplieridFrom Inventory, Supply as ITMPWhere STMP . supplierid = ITMP . supplieridAnd ITMP . itemcode = Inventory . itemcodeAnd Inventory . warehouse = ‘Nagpur’);For the warehouse at Nagpur, this query will find all suppliers who
• A.

Do not supply any item

• B.

Supply exactly one item

• C.

Supply one or more items

• D.

Supply two or more items

• 18.
In a depth-first traversal of a graph G with n vertices, k edges are marked as tree edges. The number of connected components in G is
• A.

K

• B.

K+1

• C.

N-k-l

• D.

N-k

• 19.
Which of the following statements is TRUE about CSMA/CD
• A.

IEEE 802.11 wireless LAN runs CSMA/CD protocol

• B.

Ethernet is not based on CSMA/CD protocol

• C.

CSMA/CD is not suitable for a high propagation delay network like satellite network

• D.

There is no contention in a CSMA/CD network

Related Topics Back to top