Fpl2 - Mcqs Bank For Download
Fpl2 - Mcqs Bank For Download
Fpl2 - Mcqs Bank For Download
PICT
PUNE
FPL2 QUESTIONS BANK WITH ANSWERS
Major Contributors :-
Teachers ( ITDEPT ) :-
1. Prof. Abhinay G. Dhamankar
2. Prof. Sachin D. Shelke
3. Prof. Vishal B. Bhosale
4. Prof. Aniket H. Bhaise
5. Prof. Rohini S. Rahate
Teaching Assistants ( ME IT ):-
1. Mr. Gaurav Dalvi
2. Mr. Palash Karmore
3. Mr. Himanshu Joshi
4. Ms. Suverna Jadhav
5. Ms. Sushmita Jain
6. Mr. Shubham Agrawal
7. Mr. Rashid Salman
FE Students :-
All students, who submitted their MCQs
on Moodle System.
IMP Instruction :
Correct option shown as an underlined.
PICT-FPL2-Unit-01-MiPro&MiControl-(321) KEY
1. 80386DX is a _______ bit microprocessor?
A. 16
B. 20
C. 32
D. 64
A. 16
B. 20
C. 30
D. 32
A. 16
B. 32
C. 40
D. 64
4. 80386DX supports__________________.
A. 1 TeraByte
B. 64 TeraByte
C. 16 TeraByte
D. 8TeraByte
A. 1 MB
B. 64 MB
C. 16 MB
D. 4 GB
A. Execution unit
B. Bus Control unit
C. Pipeline Unit
D. Memory Management Unit
A. Execution unit
B. Bus Control unit
C. Memory Management Unit
D. Decode Unit
A. Execution unit
B. Decode Unit
C. Prefetch unit
D. Control Unit
A. Execution unit
B. Decode Unit
C. Prefetch unit
D. Control Unit
A. Segmentation Unit
B. Bus Control unit
C. Decode Unit
D. Paging Unit
A. Segmentation Unit
B. Bus Control unit
C. Decode Unit
D. Paging Unit
A. Memory
B. CPU
C. Instruction queue
D. Prefetch queue
17. Instructions are read from memory by prefetch unit & stored in _________
__.
A. Memory
B. CPU
C. Instruction queue
D. Prefetch queue
A. Virtual mode
B. Parallel Mode
C. Real Mode
D. Protected Mode
A. Dual Mode
B. Parallel Mode
C. Virtual Mode
D. Simple Mode
A. 8008
B. 4004
C. 8086
D. 80486
22. Which of the following is true about external memory?
A. High capacity
B. Fast access
C. High cost
D. None of these
A. ROM
B. PROM
C. EROM
D. All of above
A. greater than
B. less than
C. equal to
D. not defined
A. greater than
B. less than
C. equal to
D. not defined
26. Which of the following are true about primary memory compared to
secondary memory?
A. High cost
B. Low speed
C. High storage
D. None of these
A. Direct
B. Sequential
C. Both of the above
D. None of these
A. SRAM
B. DRAM
C. ROM
D. All Of Above
30. Which computer memory used for storing programs and data currently being
processed by the CPU?
A. Mass Memory
B. Internal Memory
C. Non volatile memory
D. PROM
A. Keyboard
B. Disk
C. Mouse
D. All of above
A. RAM
B. ROM
C. EPROM
D. PROM
A. SRAM
B. PROM
C. DRAM
D. EPROM
A. large
B. chip
C. fast
D. slow
35. Which of the following memories has the shortest access times?
A. Cache memory
B. Magnetic Bubble Memory
C. Magnetic Core Memory
D. RAM
36. size of primary cache is usually ---------as that of secondary cache.
A. Greater than
B. Smaller than
C. equal to
D. not defined
A. It's RAM
B. It's ROM
C. It's EEPROM
D. It's EPROM
A. Hard disk,register,RAM,Cache
B. Cache,Register,RAM,Hard disk
C. Register,Cache,RAM,Hard disk
D. Hard disk,RAM,Register,Cache
40. What are the characteristics of memory at the bottom of the hierarchy?
41. Which of the following is fastest and most expensive type of storage?
A. Magnetic Disk
B. Registers
C. Cache
D. Main Momory
A. Cache
B. DRAM
C. SRAM
D. Magnetic disk
43. Which memory can be erased by exposing it to ultraviolet light.
A. ROM
B. PROM
C. RAM
D. EPROM
A. EPROM
B. SRAM
C. DRAM
D. None of these
A. Less than
B. Greater than
C. Equal to
D. Not defined
A. Oprands
B. Operation
C. Both A & B
D. None
A. Unidirectional
B. Homodirectional
C. Bidirectional
D. All of above
A. 5
B. 15
C. 35
D. 45
A. 8 bit
B. 2 bytes
C. 16 bytes
D. 2 bit
50. 1 KB = ---------------------
A. 1024 bytes
B. 5024 bytes
C. 124 bytes
D. 2024 bytes
A. INTR
B. TRAP
C. RST6.5
A. Stack pointer
B. Program counter
C. a & b
A. RST5.5
B. RST4.5
C. RST4
A. INTR&TRAP
B. RST6.5&RST5.5
C. RST7.5&RST6.5
A. RST 0 - 7
B. RST 5.5 - 7.5
C. INTR, TRAP
A. Clock
B. Data bus width
C. Address bus width
D.
A. Yes
B. No
C. sometimes yes, sometimes no
A. 0020H
B. 0028H
C. 0018H
65. The advantage of memory mapped I/O over I/O mapped I/O is,
A. Faster
B. Many instructions supporting memory mapped I/O
C. Require a bigger address decoder
D. All the above
A. Accumulator
B. B register
C. Data register
D. Accumulator and B register
67. The registers that contains the status information is
A. control registers
B. instruction registers
C. program status word
D. all of the mentioned
A. hard disk
B. processor and memory
C. operating system
D. processor and input-output unit(s).
69. The device that generates the basic timing clock signal for the operation
of the circuit using crystal oscillator is
A. timing unit
B. timing and control unit
C. oscillator
D. clock generator
70. The registers that are not accessible by the user are
71. The ________of the memory chip will identify and select the register for
the EPROM
A. internal decoder
B. external decoder
C. address decoder
D. data decoder
72. Microprocessor provides signal like ____ to indicate the read operation
A. LOW
B. MCMW
C. MCMR
D. MCMWR
73. To interface memory with the microprocessor, connect register the lines
of the address bus must be added to address lines of the _______ chip.
A. single
B. memory
C. multiple
D. triple
74. The remaining address line of ______ bus is decoded to generate chip
select signal
A. data
B. address
C. control bus
D. both (a) and (b)
75. _____ has certain signal requirements write into and read from its
registers
A. memory
B. register
C. both (a) and (b)
D. control
A. internal decoder
B. external decoder
C. encoder
D. register
77. The primary function of the _____________ is to accept data from I/P
devices
A. multiprocessor
B. microprocessor
C. peripherals
D. interfaces
78. ___________ signal prevent the microprocessor from reading the same data
more than one
A. pipelining
B. handshaking
C. controlling
D. signaling
A. priority resolver
B. control logic
C. interrupt request register
D. interrupt register
A. peripheral device
B. cascade
C. I/O devices
D. control unit
81. In which year, 8086 was introduced?
A. 1978
B. 1979
C. 1977
D. 1981
A. direct enable
B. data entered
C. data enable
D. data encoding
A. Sequential
B. Parallel Mode
C. pipelined
D. simultaniously
85. Multiplexed pin contain address is A0 and Data is D0 then name of pin is
____.
A. A0D0
B. AD0
C. Both
D. AD
A. 64
B. 32
C. 23
D. 16
A. 4KB
B. 8KB
C. 16KB
D. 32KB
88. speed of 80386DX is
A. 20khz
B. 30KHZ
C. 40KHZ
D. 10KHZ
89. 25.61 in decimal number system is equivalent to how much in binary number
system?
A. 11001.10011
B. 11000.111
C. 11111.10011
D. 11111.11111
A. 30
B. 27
C. 28
D. 31
A. 50.6875
B. 50.7568
C. 25.6875
D. 25.7568
A. 4bits
B. 8bits
C. 16bit
D. 1bit
A. Wait
B. Halt
C. interrupt
D. Restart
A. 16
B. 32
C. 40
D. 64
A. 1 TeraByte
B. 64 TeraByte
C. 16 TeraByte
D. 8TeraByte
A. Execution unit
B. Bus Control unit
C. Pipeline Unit
D. Memory Management Unit
102. _________ Unit of 803806DX microprocessor reads the instruction from
instruction queue
A. Execution unit
B. Bus Control unit
C. Memory Management Unit
D. Decode Unit
A. Memory
B. CPU
C. Instruction queue
D. Prefetch queue
A. 8008
B. 4004
C. 8086
D. 80486
A. High capacity
B. Fast access
C. High cost
D. None of these
A. ROM
B. PROM
C. EROM
D. All of above
107. Which of the following are true about primary memory compared to
secondary memory
A. High cost
B. Low speed
C. High storage
D. None of these
A. Keyboard
B. Disk
C. ALU
D. All of above
A. RAM
B. ROM
C. EPROM
D. PROM
A. Hard disk,register,RAM,Cache
B. Cache,Register,RAM,Hard disk
C. Register,Cache,RAM,Hard disk
D. Hard disk,RAM,Register,Cache
A. Oprands
B. Operation
C. Both A & B
D. None
A. Unidirectional
B. Homodirectional
C. Bidirectional
D. All of above
114. 1 KB = ---------------------
A. 1024 bytes
B. 5024 bytes
C. 124 bytes
D. 2024 bytes
A. GPRS
B. SFRs
C. ROM
D. None of these
A. 8 address lines
B. 16 address lines
C. 32 address lines
D. 64 address lines
120. The unit that organizes the physical memory, in terms of pages of 4KB
size each is
A. segmentation unit
B. execution unit
C. paging unit
D. instruction unit
122. The signal that is used to insert WAIT states in a bus cycle in 80386
is
A. HOLD
B. HLDA
C. READY
D. PEREQ
123. One computer that is not considered a portable computer is
A. Minicomputer
B. A laptop computer
C. Tablet PC
D. All of the above
125. Which of the following devices have a limitation that we can only store
information to it but cannot erase or modify it?
A. Floppy Disk
B. Hard Disk
C. Tape Drive
D. CDROM
A. Disk
B. CPU
C. Printer
D. ALU
A. ALU
B. CU
C. Memory
D. None of above
A. Diligence
B. Intelligence
C. Slavery
D. Reliability
130. As compared to the secondary memory, the primary memory of a computer
is
A. Large
B. Cheap
C. Fast
D. Slow
131. The language that the computer can understand and execute is called
A. Machine language
B. Application software
C. System program
D. All of above
A. Dennis M. Ritchie
B. Niklaus Writh
C. Seymour Papert
D. Donald Kunth
133. Which computer memory is used for storing programs and data currently
being processed by the CPU?
A. Mass memory
B. Internal memory
C. Non-volatile memory
D. PROM
A. Portable Projector
B. Printer
C. Flat Screen
D. Touch Screen
A. reading
B. writing
C. controlling
D. hand shaking
A. program
B. CPU
C. text
D. output
A. system software
B. process software
C. documentation
D. application software
A. logic
B. storage
C. input device
D. output device
A. byte
B. record
C. word
D. nibble
141. In the binary number 110.101, the fractional part has the value
A. 0.625
B. 0.125
C. 0.875
D. 0.5
A. 20
B. 40
C. 400
D. None of these
143. The ASCII code is for information interchange by a binary code for
A. numbers only
B. alphabets only
C. alphanumeric and other common symbols
D. None of these
144. A characteristic of multiprogramming system is
145. Communication circuits that transmit data in both directions but not at
the same time are operating in
A. simplex mode
B. half-duplex mode
C. full-duplex mode
D. asynchronous mode
A. input/output control
B. virtual storage
C. multiprogramming
D. all of the above
A. computers
B. modem
C. printer
D. cable
A. 1000 bytes
B. 1024 bytes
C. 2048 bytes
D. 512 bytes
A. Screen
B. keyboard
C. printer
D. plotter
A. link
B. bus
C. cable
D. port
151. Memories in which any location can be reached in a fixed and short
amount of time after specifying its address is called
152. Which of the following is used as storage locations both in the ALU and
in the control section of a computer
A. accumalator
B. register
C. adder
D. decoder
A. RAM
B. ROM
C. EPROM
D. PROM
A. a network layer
B. an administrative layer
C. user data
D. a packet switch
A. seventh layer
B. sixth layer
C. fifth layer
D. fourth layer
A. satellite
B. frame delay
C. ATM
D. user agent
158. Which of the following technique provides dedicated communication
channel between two stations.
A. switch network
B. circuit switching
C. packet switching
D. none of these
A. network layer
B. session layer
C. data link layer
D. transport layer
A. Harvard
B. Von Neumann
C. none of the mentioned
D. both of the mentioned in A and B
A. Operands
B. Operation
C. Both of above
D. None of the above
A. Instructions
B. Operands
C. Pins
D. Opcodes
A. Operation Indicator
B. Data on which is to be performed
C. Instructions
D. None of the above
167. Interrupt is a ..
A. Disturbance to microprocessor
B. Signal given to microprocessor
C. Signal given to microprocessor
D. all of the above
A. Name of microprocessor
B. Small Program that services the corresponding Interrupt
C. Is a special type of interrupt
D. None of the above
A. 4MB
B. 4GB
C. 64MB
D. 64TB
172. The virtual memory of 80386 can be a maximum of_____________
A. 4MB
B. 4GB
C. 64MB
D. 64TB
A. 2
B. 3
C. 4
D. 5
FALSE
TRUE
FALSE
A. 80287
B. 80387
C. Both of the above
D. None of the above
178. Parity flag is ____________ to indicate that the result has even parity
A. 0
B. 1
C. 2
D. None of the above
A. 0
B. 1
C. 2
D. None of the above
181. Sign flag is __ to indicate that the signed result is negative
A. zero
B. one
C. two
D. none
182. Sign flag is__ to indicate that the signed result is positive
A. 0
B. 1
C. 2
D. NONE
183. Over flow flag is__to indicate that the signed result is out of range
A. 0
B. 1
C. 2
D. NONE
A. Execution unit
B. Bus Control unit
C. Pipeline Unit
D. Memory Management Unit
A. Execution unit
B. Bus Control unit
C. Memory Management Unit
D. Decode Unit
A. greater than
B. less than
C. equal to
D. not defined
188. Which of the following memory need refresh?
A. SRAM
B. DRAM
C. ROM
D. All Of Above
A. variable
B. fixed
C. both variable and fixed
D. none
A. 2 Kbytes
B. 2 bytes
C. 4 Kbytes
D. 4 bytes
192. Scheduling is
193. The instructions available in the 80386 that are not available in its
real address mode is
A. addressing techniques
B. instructions for protected address mode
C. instructions for interrupt handling
D. all of the mentioned
A. Data line
B. Control line
C. Address line
D. None
195. When the process is returned after an interrupt service ______ should be
loaded again
i) Register contents
ii) Condition codes
iii) Stack contents
iv) Return addresses
A. i,iv
B. ii,iii and iv
C. iii,iv
D. i,ii
196. The time between the recieval of an interrupt and its service is ______
A. Interrupt delay
B. Interrupt latency
C. Cycle time
D. Switching time
A. Batch processing
B. Multitasking
C. Real-time processing
D. Multi-user
198. The resistor which is attached to the service line is called _____
A. Push-down resistor
B. Pull-up resistor
C. Break down resistor
D. Line resistor
A. Vectored interrupt
B. Non-maskable interrupt
C. Maskable interrupt
D. High priority interrupt
A. RST 5.5
B. RST 7.5
C. TRAP
D. Both a and b
201. 80386 can be interfaced with _____ math coprocessor
A. 80287
B. 80387
C. both of the above
D. none of the above
U1 MicroPro... #37
TRUE
U1 MicroPro... #39
203. There are ______ number of input channels for the 10 bit ADC in
PIC18F877
A. 4
B. 8
C. 12
D. 16
U1 MicroPro... #96
A. 8
B. 16
C. 32
D. 64
U1 MicroPro... #31
205. Parity flag is _____ to indicate that the result has odd parity
A. 0
B. 1
C. 2
D. none of the above
U1 MicroPro... #49
206. There is a ______________ level stack in the PIC18F877 for storing the
return address of the program counter
A. 6
B. 8
C. 10
D. 12
U1 MicroPro... #99
207. 80386 can operate in ____ mode
A. Real address
B. Protected
C. Virtual 8086
D. All of the above
U1 MicroPro... #56
U1 MicroPro... #3
209. Selector for selecting the descriptor in the descriptor table is _______
_
A. Index Register
B. Base Register
C. Segment Register
D. General purpose registers
U1 MicroPro... #67
210. to maintain protection amongst the task the _____ and________ are
compared while accessing a I/O location
U1 MicroPro... #72
U1 MicroPro... #13
212. The capture mode of PIC18F877 can capture the time at every
A. falling edge
B. rising edge
C. every 4th rising edge
D. all of the above
U1 MicroPro... #105
213. Privilege level 3 is used for
A. kernel
B. system services
C. operating system
D. Applications
U1 MicroPro... #62
A. Faraday's Law
B. Coulomb's Law
C. Locality of reference
D. Reference of locality
U1 MicroPro... #17
A. 4MB
B. 4GB
C. 64MB
D. 64TB
U1 MicroPro... #35
FALSE
U1 MicroPro... #40
U1 MicroPro... #28
A. Instructions
B. Operands
C. Pins
D. Opcodes
U1 MicroPro... #2
219. _____ register works as counter for loop , rotate ,etc instruction
A. EBX
B. EAX
C. EDX
D. ECX
U1 MicroPro... #42
220. (16)10=(?)16
A. (10)16
B. (F)16
C. (11)16
D. None of above
U1 MicroPro... #119
221. The page table in main memory stores information of pages present in
main memory.
TRUE
U1 MicroPro... #26
222. Sign flag is _____ to indicate that the sign result is within range
A. 0
B. 1
C. 2
D. none of the above
U1 MicroPro... #55
A. 8,32
B. 14,16
C. 8,16
D. 14,16
U1 MicroPro... #33
224. Code stored in a segment with PL=p can be accessed only by code
executing at a PL, numerically, _________
A. at least privileged as p
B. the same or lower PL than p
C. at the same PL
D. none of the above
U1 MicroPro... #65
225. IDTR points the base of __________
U1 MicroPro... #75
A. 1
B. 2
C. 3
D. 4
U1 MicroPro... #91
U1 MicroPro... #27
U1 MicroPro... #24
A. (1010)2
B. (1101)2
C. (0111)2
D. None of the above
U1 MicroPro... #118
230. A required data when not found in main memory, entire page is brought
into the main memory and is retained for some time based on _________ .
A. Faraday's Law
B. Coulomb's Law
C. Spatial principle of locality of reference
D. Temporal principle of locality of reference
U1 MicroPro... #22
231. The instruction set size of PIC18F877 is _________ instructions
A. 25
B. 35
C. 45
D. 45
U1 MicroPro... #98
A. kernel
B. system services
C. operating system
D. Applications
U1 MicroPro... #61
A. 2
B. 3
C. 4
D. 5
U1 MicroPro... #36
A. 0000H
B. 0001H
C. 0004H
D. 1FFFH
U1 MicroPro... #112
U1 MicroPro... #23
A. (10)16
B. (F)16
C. (E)16
D. None
U1 MicroPro... #121
237. Privilege level 1 is used for
A. kernel
B. system services
C. operating system
D. applications
U1 MicroPro... #60
A. fixed 1 MB
B. Fixed 4 GB
C. variable from 1 byte to 1 MB
D. Variable from 1 byte to 1 GB
U1 MicroPro... #77
U1 MicroPro... #100
A. 6
B. 16
C. 32
D. 64
U1 MicroPro... #30
A. once by manufacturer
B. once by the user
C. many times by user
D. ten times by user
U1 MicroPro... #29
A. 2
B. 4
C. 8
D. 16
U1 MicroPro... #111
243. Overflow flag is _____ to indicate that the sign result is out of range
A. 0
B. 1
C. 2
D. none of the above
U1 MicroPro... #54
A. kernel
B. System service
C. operating system
D. application
U1 MicroPro... #59
245. Data stored in a segment with PL=p can be accessed only by code
executing at a PL , numerically, ____________
A. at least as privileged as p
B. the same or lower PL than p
C. at the same PL
D. none of the above
U1 MicroPro... #64
U1 MicroPro... #102
FALSE
U1 MicroPro... #95
A. 6
B. 8
C. 10
D. 12
U1 MicroPro... #97
249. The data EEPROM size in PIC18F877 is ______________ bytes
A. 256
B. 356
C. 368
D. 512
U1 MicroPro... #88
250. The 'ED" bit being 1, in the access right byte of the non-system, non
executable descriptor indicates
A. System Descriptor
B. code segment
C. data segment
D. stack segment
U1 MicroPro... #81
A. at least as priviliged as p
B. the same or lower PL than p
C. at the same PL
D. none of the above
U1 MicroPro... #66
252. Auxillary carry flag holds the carry generated from ________
U1 MicroPro... #47
A. The segment and the descriptor are available and not used by any other
task.
B. The descriptor table is available and not used by any other task
C. The processor is available and not used by any other task.
D. The register set is available and not reached by any other task.
U1 MicroPro... #78
A. Page hit
B. Cache hit
C. Page miss
D. Cache miss
U1 MicroPro... #20
255. ______ register works as a via register for I/O access
A. EBX
B. EAX
C. EDX
D. ECX
U1 MicroPro... #43
U1 MicroPro... #9
A. 0000H
B. 0005H
C. 0015H
D. 1FFFH
U1 MicroPro... #115
A. 1
B. 2
C. 3
D. 4
U1 MicroPro... #116
259. A required data when not found in main memory an entire page is brought
into main memory based on _________
A. Faraday's Law
B. Coulomb's Law
C. Spatial principle of locality of reference
D. Temporal principle of locality of reference
U1 MicroPro... #21
U1 MicroPro... #10
261. Sign flag is _____ to indicate that the sign result is negative
A. 0
B. 1
C. 2
D. none of the above
U1 MicroPro... #52
262. Zero flag is _____ to indicate that the result is not zero
A. 0
B. 1
C. 2
D. none of the above
U1 MicroPro... #51
A. CS:ESI
B. CS:EDI
C. CS:EBX
D. CS:EIP
U1 MicroPro... #45
U1 MicroPro... #110
U1 MicroPro... #104
A. Multi-threading
B. Multi-processing
C. Multi-tasking
D. Multi-processors
U1 MicroPro... #63
267. PIC18F877 is a____________ bit microcontroller
A. 4
B. 8
C. 16
D. 32
U1 MicroPro... #84
FALSE
U1 MicroPro... #38
U1 MicroPro... #73
A. 8k,8
B. 16k,8
C. 8k,14
D. 16k,14
U1 MicroPro... #86
U1 MicroPro... #103
FALSE
U1 MicroPro... #93
A. 0000H
B. 0001H
C. 0004H
D. 1FFFH
U1 MicroPro... #113
274. Cache uses _______ type of memory
A. SRAM
B. DRAM
C. Magnetic
D. Optical
U1 MicroPro... #16
A. EBX
B. EAX
C. EDX
D. ECX
U1 MicroPro... #41
A. Asynchronous (full-duplex)
B. Synchronous- Master (half duplex)
C. Synchronous- Slave (half-duplex)
D. all of the above
U1 MicroPro... #109
A. 4
B. 6
C. 8
D. 10
U1 MicroPro... #69
U1 MicroPro... #14
U1 MicroPro... #11
280. Interrupt service routine is a __________
A. name of microprocessor
B. small program that services the corresponding interrupt
C. is a special type of interrupt
D. none of the above
U1 MicroPro... #8
A. Disturbance to microprocessor
B. signal given by microprocessor
C. signal given to microprocessor
D. all of the above
U1 MicroPro... #7
U1 MicroPro... #83
A. 8
B. 16
C. 32
D. 64
U1 MicroPro... #32
A. 0000H
B. 0001H
C. 0004H
D. 1FFFH
U1 MicroPro... #114
A. 4
B. 5
C. 6
D. 7
U1 MicroPro... #90
286. (1011) 2=(?)10
A. (9)10
B. (10)10
C. (11)10
D. None of above
U1 MicroPro... #120
A. Operands
B. Operation
C. Both of the above
D. None of the above
U1 MicroPro... #1
288. Parity flag is _____ to indicate that the result has even parity
A. 0
B. 1
C. 2
D. none of the above
U1 MicroPro... #48
289. To maintain protection amongst the tasks the _______ and ____________
are compared while acessing a memory location.
U1 MicroPro... #71
A. Page Hit
B. Cache Hit
C. Page miss
D. Cache miss
U1 MicroPro... #18
U1 MicroPro... #76
292. (6) 10=(?)2
A. (1010)2
B. (110) 2
C. (011) 2
D. None of the above
U1 MicroPro... #117
293. Each task can access a maximum of_________ local and global registers
A. 8192
B. 16384
C. 32768
D. 65536
U1 MicroPro... #68
TRUE
U1 MicroPro... #108
295. The PWM mode of PIC18F877 can be used to make a DAC (Digital to analog
convertor)
TRUE
U1 MicroPro... #107
U1 MicroPro... #4
TRUE
U1 MicroPro... #94
298. In real mode 80386 uses the ____ formula to generate the physical
address
U1 MicroPro... #58
299. Control bus is _________
U1 MicroPro... #5
A. Page hit
B. Cache hit
C. Page miss
D. Cache miss
U1 MicroPro... #19
301. Demand paging refers to providing the required page to the main memory
when demanded by the processors
TRUE
U1 MicroPro... #25
U1 MicroPro... #101
A. 10 MHZ
B. 20MHZ
C. 30 MHZ
D. 40 MHZ
U1 MicroPro... #85
A. EBX
B. EAX
C. EDX
D. ECX
U1 MicroPro... #44
305. The number of interrupt source in PIC18F877 is ________________
A. 13
B. 14
C. 15
D. 16
U1 MicroPro... #89
A. 1 MB + 64 KB
B. 1MB
C. 1MB + 64KB - 16 B
D. 4GB
U1 MicroPro... #57
A. Operation Indicator
B. Data on which operation is to be performed
C. instruction
D. none of the above
U1 MicroPro... #6
308. Sign flag is _____ to indicate that the sign result is positive
A. 0
B. 1
C. 2
D. none of the above
U1 MicroPro... #53
U1 MicroPro... #70
310. A processor that has 32 address lines can access _______ memory
locations
A. 32
B. 4
C. 4Giga
D. 32Giga
U1 MicroPro... #15
311. The 'E" bit being 1, in the access right byte of the non-system
descriptor indicates
A. System descriptor
B. code segment
C. data segment
D. stack segment
U1 MicroPro... #80
A. 4MB
B. 4GB
C. 64MB
D. 64KB
U1 MicroPro... #34
A. 256
B. 356
C. 368
D. 512
U1 MicroPro... #87
U1 MicroPro... #46
A. 1
B. 2
C. 3
D. 4
U1 MicroPro... #92
U1 MicroPro... #12
317. The compare mode of PIC18F877 can perform ________ with every match in
the compare register and the actual timer value
U1 MicroPro... #106
TRUE
U1 MicroPro... #82
319. The 'S" bit being 1, in the access right byte of descriptor indicates
A. System descriptor
B. code segment
C. Data segment
D. Stack Segment
U1 MicroPro... #79
U1 MicroPro... #74
A. 0
B. 1
C. 2
D. none of the above
U1 MicroPro... #50
PICT-FPL2-Unit-02-Linux(50) KEY
1. Which of the following below are true functionalities of Kernel ?
A. pid
B. ld
C. processed
D. proid
A. pzip
B. gcat
C. pgcat
D. gzip
A. man
B. manual
C. *man
D. %man
A. % clear
B. clear
C. clrscr
D. either A or C
A. ||
B. |
C. ^
D. $
A. less
B. srch
C. %src
D. grep
8. The dmesg command
A. macro
B. read
C. script
D. none of the above
A. HP
B. IBM
C. Digital Equipment Corp
D. Sun Microsystems
A. Solaris
B. AIX
C. IRIX
D. AS400
A. C
B. C++
C. Assembly Language
D. Fortran
A. which
B. where
C. wexec
D. what
A. grep
B. wc
C. count
D. cut
15. Which of these commands could you use to show one page of output at a
time ?
A. less
B. sed
C. pause
D. grep
16. Which commands will give you information about how much disk space each
file in the current directory uses ?
A. ls -l
B. ls -la
C. du
D. ls -a
A. ls
B. help
C. date
D. ls l
18. Which command is used to display all the files including hidden files in
your current and its subdirectories ?
A. ls aR
B. ls a
C. ls R
D. ls l
A. user password
B. present working directory
C. print name of current/working directory
D. none of the mentioned
A. dm
B. rm
C. delete
D. erase
A. rdir
B. remove
C. rd
D. rmdir
22. What command is used with vi editor to delete a single character ?
A. x
B. y
C. a
D. z
23. What hardware architectures are not supported by Red Hat Linux?
A. SPARC
B. IBM-compatible
C. Alpha
D. Macintosh
E. None of the above
A. demount
B. unmount
C. dmount
D. umount
A. 755
B. 743
C. 754
D. 745
A. cp -r
B. cp -i
C. cp
D. none of these
A. uname -r
B. uname -n
C. uname -t
D. kernel
A. print
B. ptr
C. lpr
D. none of the above
29. find / -name * will
A. cat
B. type
C. zcat
D. print
A. du
B. ds
C. dd
D. dds
32. Which command creates an empty file if file does not exist ?
A. cat
B. touch
C. ed
D. read
33. Which option of rm command is used to remove a directory with all its
subdirectories
A. b
B. o
C. p
D. r
A. Type
B. File
C. Finfo
D. Info
35. Write the command to display the current date in the form dd/mm/yyyy.
A. date +%d/%m/%Y
B. date +%d/%m/%Y
C. date +/%d/%m/20%y
D. date +/%d/%m/20%y
36. The command syntax to display the file sample.txt one page at a time is
A. mv new old
B. move new old
C. cp new old
D. ren new old
38. Shell is ?
A. Command Interpreter
B. Interface between Kernel and Hardware
C. Interface between user and applications
D. Command Compiler
A. os
B. Unix
C. kernel
D. uname
A. 128 bytes
B. 255 bytes
C. 32 bytes
D. 64 bytes
A. Ctrl + t
B. Ctrl + z
C. Ctrl + d
D. Ctrl + e
42. Which command(s) is/are used to get help about a command in Linux ?
A. info
B. man
C. None of these
D. Both a and b
43. Which of the following OS is not based on Linux ?
A. Ubuntu
B. Redhat
C. CentOs
D. BSD
44. Which key combination is used to see all the hidden files in Nautilus
file manager ?
A. Ctrl + Shift + h
B. Ctrl + h
C. Ctrl + Alt + h
D. None of the above
A. touch
B. cat
C. echo
D. All of the above
A. file
B. directory
C. executables
D. None of the above
A. C shell
B. Net Shell
C. Bash Shell
D. Z shell
48. Which directory in Linux contains all the config file of the system ?
A. /etc
B. /var
C. /lib
D. /bin
49. Which of the following command is used to know last shutdown/reboot date
and time ?
A. last
B. lastlogin
C. lastreboot
D. lastshutdown
50. Which is the core of the operating system ?
A. Shell
B. Kernel
C. Commands
D. Script
PICT-FPL2-Unit-02-CPP(100) KEY
1. Which of the following access specifies is used in a class definition by
default?
A. Protected
B. Public
C. Private
D. Friend
A. Friend Functions
B. Object
C. Member Functions
D. Member Variables
A. an object is created
B. an object is used
C. a class is declared
D. an object goes out of scope.
A. data
B. functions
C. both a & b
D. none of the mentioned
A. 1
B. 2
C. 3
D. 4
A. :
B. ::
C. #
D. none of the mentioned
8. Which of the following statements are correct for a static member
function?
It can access only other static members of its class.
It can be called using the class name, instead of objects.
A. Only 1 is correct.
B. Only 2 is correct.
C. Both 1 and 2 are correct.
D. Both 1 and 2 are incorrect.
A. rect area:12
B. rect area: 12
C. rect area:24
D. none of the mentioned
A. protected
B. private
C. public
D. none of the mentioned
A. class A { int x; };
B. class B { }
C. public class A { }
D. object A { int x; };
12. Constructors are used to
A. integer
B. boolean
C. character
D. all of the mentioned
A. conditional operator
B. ternary operator
C. scope operator
D. none of the mentioned
A. 11
B. 01
C. 00
D. 10
16. What is the output of this program?
#include <iostream>
using namespace std;
namespace Box1
{
int a = 4;
} namespace Box2 {
int a = 13;
}
int main () {
int a = 16; Box1::a;
Box2::a;
cout << a;
return 0;
}
A. 4
B. 13
C. 16
D. compile time error
A. 1015
B. 1510
C. 55
D. compile time error
18. What is the output of this program?
#include <iostream>
using namespace std;
namespace extra
{
int i;
}
void i()
{
using namespace extra;
int i;
i = 9;
cout << i;
}
int main()
{
enum letter { i, j};
class i { letter j; };
::i();
return 0;
}
A. 9
B. 10
C. compile time error
D. none of the mentioned
A. 35
B. 20
C. 25
D. 40
A. -1
B. 1
C. 0
D. Programs do not return a value.
22. What is the only function all C++ programs must contain ?
A. start()
B. system()
C. main()
D. program()
23. What punctuation is used to signal the beginning and end of code blocks ?
A. { }
B. -> and <-
C. BEGIN and END
D. ( and )
A. . (dot)
B. ; (semi-colon)
C. : (colon)
D. ' (single quote)
A. */ Comments */
B. ** Comment **
C. /* Comment */
D. { Comment }
A. float
B. real
C. int
D. double
A. 1
B. 66
C. .1
D. -1
E. All of the above
28. Evaluate !(1 && !(0 || 1)).
A. True
B. False
C. Unevaluatable
D. Error
A. When you define a class, you define a blueprint for a data type.
B. When you define a class, you make get more funtionality.
C. When you define a class, you define the logic.
D. When you define a class, you make debugging.
A. structure
B. union
C. both use same memory
D. depends on a programmer
A. Using union
B. Using structure
C. Using pointers
D. Using scope resolution
A. Scope resolution
B. Conditional
C. New
D. Membership access
35. Operators such as ...................... cannot be overloaded.
A. +
B. ++
C. : :
D. = =
36. Which function return the current position of the get or put pointer in
bytes.
A. tellg( )
B. tellp( )
C. tell( )
D. Both A and B
A. 0, n-1
B. 1, n-1
C. 0, n
D. 1, n
A. Over
B. Overload
C. Void
D. Operator
A. automator
B. automatic
C. dynamic
D. static
40. Which of the following type of class allows only one object of it to be
created ?
A. Virtual class
B. Abstract class
C. Singleton class
D. Friend class
41. Which of the following is not a type of constructor ?
A. Copy constructor
B. Friend constructor
C. Default constructor
D. Parameterized constructor
A. Static function
B. Friend function
C. Const function
D. Virtual function
A. overload
B. operator
C. friend
D. override
A. Multilevel inheritance
B. Multiple inheritance
C. Hybrid inheritance
D. Hierarchical Inheritance
47. which one of the following is correct about the statements given below?
A. Only II is correct.
B. Both I and II are correct.
C. Only I is correct.
D. Both I and II are incorrect.
A. [ ]
B. ->
C. ?:
D. *
A. It speeds up execution.
B. It slows down execution.
C. It increases the code size.
D. Both A and C
A. class A { int x; };
B. class B { }
C. public class A { }
D. object A { int x; };
AGD FPL... #8
52. What is the output of the following program?
#include <iostream>
using namespace std;
int f(int p, int q)
{
if (p > q)
return p;
else
return q;
}
int main()
{
int a = 5, b = 10;
int k;
bool x = true;
bool y = f(a, b);
k =((a * b) + (x + y));
cout << k;
return 0;
}
A. 55
B. 62
C. 52
D. none of the mentioned
A. 5 6
B. 6 5
C. 6 7
D. none of the mentioned
A. !Classname( )
B. @Classname( )
C. $Classname( )
D. ~Classname( )
A. Array
B. Reference variable
C. Object
D. File
A. may be virtual
B. may not be virtual
C. will always be virtual
D. will never be virtual
A. Virtual polymorphism
B. Transient polymorphism
C. Ad-hoc polymorphism
D. Pseudo polymorphism
A. string
B. integer
C. float
D. any of above
A. 6 5
B. 5 6
C. 6 7
D. none of the mentioned
AGD FPL... #4
AGD FPL... #5
64. What is the output of the following program?
#include <iostream>
using namespace std;
int main()
{
int x = -1;
unsigned int y = 2;
if(x > y)
{
cout << "x is greater";
}
else
{
cout << "y is greater";
}
}
A. x is greater
B. y is greater
C. Implementation defined
D. Arbitrary
A. A
B. N
C. J
D. I
A. 54.3R
B. R4.35
C. 4.3R5
D. None of the mentioned
AGD FPL... #7
A. 0123456789
B. 123456789
C. 0
D. error
A. 0
B. 1
C. false
D. none of the mentioned
A. not defined
B. in any order
C. in the reverse order of constructor calls
D. in the same order of constructor calls
A. 234
B. 111
C. 123
D. 235
74. Which of the following is not an extension associated during the creation
of a C++ program ?
A. .cpp
B. .exe
C. .jpg
D. .bak
A. Creator
B. Distinct
C. Destroyer
D. Destructor
A. object@datamember
B. object*datamember
C. object->datamember
D. object.datamember
78. Which of the following header file includes definition of cin and cout ?
A. istream.h
B. ostream.h
C. iomanip.h
D. iostream.h
AGD FPL... #2
AGD FPL... #3
80. When struct is used instead of the keyword class means, what will happen
in the program ?
AGD FPL... #9
A. postfix
B. unary
C. shift
D. equality
A. i=1000 j=11
B. i=11 j=111
C. i=1010 j=11
D. i=1001 j=1100
83. Which one of the following is the correct way to declare a pure virtual
function?
AGD FPL... #1
A. array type
B. character type
C. boolean type
D. integer type
#include <iostream>
using namespace std;
enum test { A = 32, B, C };
int main()
{
cout << A << B<< C;
return 0;
}
A. 323334
B. 323232
C. 323130
D. none of the mentioned
A. 2035655065
B. 2035655035
C. 2035635065
D. none of the mentioned
A. Array subscripting
B. Function call
C. Addition and subtraction
D. Type cast
bool is_int(789.54)
A. True
B. False
C. 1
D. none of the mentioned
A. postfix
B. unary
C. shift
D. equality
A. 0
B. 1
C. Compiler error may be possible
D. Runtime error may be possible
A. Compiler error
B. 12
C. 10
D. Empty
A. A static member function can access only static data members of a class.
B. A static data member is shared among all the object of the class.
C. A static data member can be accessed directly from main().
D. Both A and B.
AGD FPL... #6
98. What does STL stand for ?
A. C front
B. Turbo C++
C. Borland C++
D. C++ compiler
A. 64
B. 128
C. 256
D. none of the mentioned
A. display()
B. print()
C. displayApplet()
D. PrintApplet()
A. display()
B. print()
C. drawString()
D. transient()
A. display()
B. print()
C. drawString()
D. transient()
A. transient
B. volatile
C. global
D. No modifier is needed
6. Which of these operators can be used to get run time information about an
object?
A. getInfo
B. Info
C. instanceOf
D. getinfoof
7. What is the length of the application box made by this program?
import java.awt.*;
import java.applet.*;
A. 20
B. 50
C. 100
D. System dependent
import java.awt.*;
import java.applet.*;
A. 20
B. Default Value
C. Compilation Error
D. Runtime Error
9. What is the output of this program?
import java.io.*;
class Chararrayinput
{
public static void main(String[] args)
{ String obj = "abcdefgh";
int length = obj.length();
char c[ ] = new char[length];
obj.getChars(0, length, c, 0);
CharArrayReader input1 = new CharArrayReader(c);
CharArrayReader input2 = new CharArrayReader(c, 1, 4);
int i; int j;
try
{
while((i = input1.read()) == (j = input2.read()))
{
System.out.print((char)i);
}
} catch (IOException e)
{
e.printStackTrace();
}
}
}
A.
B. abcd
C. abcde
D. None of the mentioned
A. stop()
B. sleep()
C. join()
D. call()
11. Which of these method is used to find out that a thread is still running
or not?
A. run()
B. Alive()
C. isAlive()
D. checkRun()
12. In Java, What is the default value of priority variable MIN_PRIORITY AND
MAX_PRIORITY?
A. 0 & 256
B. 0 & 1
C. 1 & 10
D. 1 & 256
13. Which of these method waits for the thread to treminate?
A. sleep()
B. isAlive()
C. join()
D. stop()
A. set()
B. make()
C. setPriority()
D. makePriority()
A. My Thread
B. Thread[My Thread,5,main]
C. Compilation Error
D. Runtime Error
17. What is the output of this program?
class newthread extends Thread
{
Thread t;
newthread()
{
t = new Thread(this,"My Thread");
t.start();
}
public void run()
{
try{
t.join();
System.out.println(t.getName());
}
catch(Exception e)
{
System.out.print("Exception");
}
}
}
class multithreaded_programing
{
public static void main(String args[]) {
new newthread();
}
}
A. My Thread
B. Thread[My Thread,5,main]
C. this,MyThread
D. Runtime Error
18. What is the output of this program?
class newthread extends Thread
{
Thread t;
newthread()
{
t = new Thread(this,"New Thread");
t.start();
}
public void run()
{
System.out.println(t.isAlive());
}
}
class multithreaded_programing
{
public static void main(String args[]) {
new newthread();
}
}
A. 0
B. 1
C. true
D. false
19. What is the output of this program?
A. true
B. false
C. truetrue
D. falsefalse
20. What is the Message is displayed in the applet made by this program?
import java.awt.*;
import java.applet.*;
public class myapplet extends Applet
{
public void paint(Graphics g)
{
g.drawString("A Simple Applet", 20, 20);
}
}
A. A Simple Applet
B. A Simple Applet 20 20
C. Compilation Error
D. Runtime Error
A. java.applet
B. java.awt
C. java.awt.image
D. java.io
22. Which of these package is used for analyzing code during run-time?
A. java.applet
B. java.awt
C. java.io
D. java.lang.reflect
23. Which of these package is used for handling security related issues in a
program?
A. java.security
B. java.lang.security
C. java.awt.image
D. java.io.security
24. Which of these class allows us to get real time data about private and
protected member of a class?
A. java.io
B. GetInformation
C. ReflectPermission
D. MembersPermission
A. java.rmi
B. java.awt
C. java.util
D. java.applet
26. Which of these package is used for all the text related modifications?
A.
B. java.awt
C. java.lang.text
D. java.text.modify
27. What is the output of this program?
import java.lang.reflect.*;
class Additional_packages
{
public static void main(String args[])
{
try {
Class c = Class.forName("java.awt.Dimension");
Constructor constructors[] = c.getConstructors();
for (int i = 0; i < constructors.length; i++)
System.out.println(constructors[i]);
}
catch (Exception e)
{
System.out.print("Exception");
}
}
}
import java.lang.reflect.*;
class Additional_packages
{
public static void main(String args[])
{
try {
Class c = Class.forName("java.awt.Dimension");
Field fields[] = c.getFields();
for (int i = 0; i < fields.length; i++)
System.out.println(fields[i]);
}
catch (Exception e)
{
System.out.print("Exception");
}
}
}
A. Numeric
B. Boolean
C. Characters
D. Both Numeric & Characters
class increment
{
public static void main(String args[])
{
double var1 = 1 + 5;
double var2 = var1 / 4;
int var3 = 1 + 5;
int var4 = var3 / 4;
System.out.print(var2 + " " + var4);
}
}
A. 1 1
B. 0 1
C. 1.5 1
D. 1.5 1.0
class Modulus
{
public static void main(String args[])
{
double a = 25.64;
int b = 25;
a = a % 10;
b = b % 10;
System.out.println(a + " " + b);
}
}
A. 5.640000000000001 5
B. 5.640000000000001 5.0
C. 5 5
D. 5 5.640000000000001
A. Abstract class
B. Parent class
C. Final class
D. None of the above
33. A Suspended thread can be revived by using?
A. start() method
B. Suspend() method
C. resume() method
D. yield() method
34. Which collection class associates values with keys, and orders the keys
according to their natural order?
A. java.util.HashSet
B. java.util.LinkedList
C. java.util.TreeMap
D. java.util.SortedSet
35. Which methods are utilized to control the access to an object in multi-
threaded programming?
A. Asynchronized methods
B. Synchronized methods
C. Serialized methods
D. None of above
class average
{
public static void main(String args[])
{
double num[] = {5.5, 10.1, 11, 12.8, 56.9, 2.5};
double result; result = 0;
for (int i = 0; i < 6; ++i)
result = result + num[i];
System.out.print(result/6);
}
}
A. 16.34
B. 16.5555
C. 16.46666666666667
D. 16.4666666666
37. What is the output of this program?
class conversion
{
public static void main(String args[])
{
double a = 295.04;
int b = 300;
byte c = (byte) a;
byte d = (byte) b;
System.out.println(c + " " + d);
}
}
A. 38 43
B. 39 44
C. 295 300
D. 295.4 300.6
class increment
{
public static void main(String args[])
{
int g = 3;
System.out.print(++g * 8);
}
}
A. 25
B. 24
C. 32
D. 33
A. malloc
B. new malloc
C. new
D. calloc
40. What is the output of this program?
class array_output
{
public static void main(String args[])
{
int array_variable [] = new int[10];
for (int i = 0; i < 10; ++i)
{
array_variable[i] = i;
System.out.print(array_variable[i] + " ");
i++;
}
}
}
A. 0 2 4 6 8
B. 1 3 5 7 9
C. 0 1 2 3 4 5 6 7 8 9
D. 1 2 3 4 5 6 7 8 9 10
A. executeQuery()
B. executeUpdate()
C. getConnection()
D. prepareCall()
42. All raw data types should be read and uploaded to the database as an
array of?
A. int
B. char
C. boolean
D. byte
A. java.util.Time
B. java.sql.Time
C. java.util.Date
D. None of the above
A. start()
B. stop()
C. init()
D. destroy()
45. Which of these is not a bitwise operator?
A. &
B. &=
C. |=
D. <=
46. Which operator is used to invert all the digits in binary representation
of a number?
A. ~
B. <<<
C. >>>
D. ^
A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit
A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit
A. 0
B. 0.0
C. 0L
D. not defined
A. Instance variables are static variables within a class but outside any
method.
B. Instance variables are variables defined inside methods, constructors or
blocks.
C. Instance variables are variables within a class but outside any method.
D. None of the above.
52. Static binding uses which information for binding?
A. type.
B. object.
C. Both of the above.
D. None of the above.
A. Throwable
B. Catchable
C. MainError
D. MainException
A. C programming language
B. PERRL
C. COBOL
D. Oak programming language
60. Java servlets are an efficient and powerful solution for creating ..
for the web.
A. Dynamic content
B. Static content
C. Hardware
D. Both a and b
A. 2.1
B. 2.3
C. 2.2
D. 2.4
A. java.awt.ActionEvent
B. java.awt.AWTEvent
C. java.awt.event.AWTEvent
D. java.awt.event.Event
A. 1,2 & 4
B. 1,2 & 3
C. 1, 2 & 4
D. none of the above
64. break statement is used to i) get out of method ii) end aprogram iii) get
out of a loop iv) get out of the system
A. 1 & 2
B. 1,2 & 3
C. 1 & 3
D. 3
65. Native protocol pure Java converts .. into the used by DBMSs
directly.
A. Void
B. Process
C. Runtime
D. System
A. if
B. switch
C. if & switch
D. None of the mentioned
A. if()
B. for()
C. continue
D. break
69. Which of the following loops will execute the body of loop even when
condition controlling the loop is initially false?
A. do-while
B. while
C. for
D. None of the mentioned
70. Which of these jump statements can skip processing remainder of code in
its body for a particular iteration?
A. break
B. return
C. exit
D. continue
A. 8 bit
B. 16 bit
C. 32 bit
D. not precisely defined
73. Which of the following is true about String?
A. String is mutable.
B. String is immutable.
C. String is a data type.
D. None of the above.
74. Does garbage collection guarantee that a program will not run out of
memory?
FALSE
TRUE
A. boolean b1 = 1;
B. boolean b2 = false;
C. boolean b3 = false;
D. boolean b4 = true
class mainclass
{
public static void main(String args[])
{
char a = 'A';
a++;
System.out.print((int)a);
}
}
A. 66
B. 67
C. 65
D. 64
A. malloc
B. alloc
C. new
D. new malloc
A. Row
B. Column
C. Both Row and Column
D. None of the mentioned
80. String in Java is a?
A. class
B. object
C. variable
D. character array
A. String is a class.
B. Strings in java are mutable.
C. Every string is an object of class String.
D. Java defines a peer class of String, called StringBuffer, which allows
string to be altered.
A. Integer
B. Boolean
C. Characters
D. Double
83. Which of these packages contain classes and interfaces used for input &
output operations of a program?
A. java.util
B. java.lang
C. java.io
D. All of the mentioned
A. int
B. float
C. void
D. None of the mentioned
85. Which of the following is a method having same name as that of its
class?
A. finalize
B. delete
C. class
D. constructor
86. Which operator is used by Java run time implementations to free the
memory of an object when it is no longer needed?
A. delete
B. free
C. new
D. None of the mentioned
87. What is multithreaded programming?
A. Process based
B. Thread based
C. Process and Thread based
D. None of the mentioned
89. Which of these packages contain all the Javas built in exceptions?
A. java.io
B. java.util
C. java.lang
D. java.net
A. Integer
B. Float
C. double
D. long
91. What will happen if two thread of same priority are called to be
processed simultaneously?
A. java.applet
B. java.awt
C. java.awt.image
D. java.io
94. What is the output of this program?
import java.lang.reflect.*;
class Additional_packages
{
public static void main(String args[]) {
try {
Class c = Class.forName("java.awt.Dimension");
Constructor constructors[] = c.getConstructors();
for (int i = 0; i < constructors.length; i++)
System.out.println(constructors[i]);
}
catch (Exception e)
{
System.out.print("Exception");
}
}
}
95. What is the name of the method used to start a thread execution?
A. init();
B. start();
C. run();
D. resume();
A. 1 and 3
B. 2 and 4
C. 1 and 2
D. 2 and 5
97. Which of the following will directly stop the execution of a Thread?
A. wait()
B. notify()
C. notifyall()
D. exits synchronized code
98. Which method must be defined by a class implementing the
java.lang.Runnable interface?
A. void run()
B. public void run()
C. public void start()
D. void run(int priority)
A. run();
B. start();
C. stop();
D. main();
A. wakeAll()
B. notify()
C. start()
D. notifyAll()
101. A top level class may have which one of the following access modifiers?
A. package
B. private
C. protected
D. public
PICT FPL2... #5
104. Which of the following is an invalid declaration for the main method in
java program?
A. All object of a class are allotted memory for the all the variables
defined in the class.
B. If a function is defined public it can be accessed by object of other
class by inheritation.
C. main() method must be made public.
D. All object of a class are allotted memory for the methods defined in the
class.
A. Robust
B. Procedural
C. Distributed
D. Multithreaded
107. In Java programming an object can take many forms. This feature called
A. Abstraction
B. Polymorphism
C. Encapsulation
D. Inheritance
PICT FPL2... #7
109. What is the output of this program?
1. class main_class {
2. public static void main(String args[])
3. {
4. int x = 9;
5. if (x == 9) {
6. int x = 8;
7. System.out.println(x);
8. }
9. }
10. }
A. 9
B. 8
C. Compile error
D. Runtime Error
PICT FPL2... #6
A. javac
B. java
C. run
D. execute
A. native
B. new
C. super
D. static
A. class
B. struct
C. int
D. None of the mentioned
PICT FPL2... #2
114. Java language has support for which of the following types of comments
A. friendly
B. final
C. static
D. none of these above
117. Which of the following option is not true about java programming
language?
118. The order of the three top level elements of the java source file are
119. What is the process of defining more than one method in a class
differentiated by method signature?
A. Function overriding
B. Function overloading
C. Function doubling
D. None of the mentioned
PICT FPL2... #9
120. A subclass is also called as
A. inner class
B. nested class
C. derived class
D. hidden class
A. package
B. object
C. interfaces
D. class
122. What is the return type of a method that does not returns any value?
A. int
B. float
C. void
D. double
PICT FPL2... #8
A. java
B. javaw
C. javapath
D. javadoc
A. static
B. final
C. only [A]
D. both [A] and [B]
A. malloc
B. alloc
C. new
D. give
PICT FPL2... #4
126. Method overloading
A. State
B. Method
C. Behavior
D. Procedures
129. Which of the following is true about of java hotspot virtual machine?
A. code reuse
B. overloading
C. overriding
D. ignoring irrelevant features from a software
A. Platform-dependent
B. Interpreter-dependent
C. Platform-independent
D. Interpreter-independent
A. finalize
B. class
C. constructor
D. delete
A. Java platform is software only platform that runs on the top of other
hardware based platform.
B. Java platform has two components: JVM, API.
C. Java technology is programming language as well as platform
D. All of the above.
A. creates executable
B. translates java source code to byte code
C. creates classes
D. produces java Interpreter
PICT FPL2... #3
A. class MainClass {
static public void main(String[] args)
{
System.out.println("Hello World!");
}
}
B. class MainClass {
public static void main(String[] args)
{
System.out.println("Hello World!");
}
}
C. class MainClass {
static public int main(String[] args)
{
System.out.println("Hello World!");
return 1;
}
}
D. Both option (a) and (b)
A. ASCII code
B. Unicode
C. Byte code
D. None of the above
A. final
B. transient
C. volatile
D. none of these above
142. What is the stored in the object obj in following lines of code?
PICT FPL2... #1
A. main method
B. finalize method
C. static method
D. private method
A. Yes
B. No
A. FILO
B. FIFO
C. LILO
D. Both a and c above
A. nodes
B. data
C. both a and b above
D. address
A. leaf
B. root
C. first node of left sub tree
D. first node of right sub tree
5. A _____________ tree is tree where for each parent node, there is only
one associated child node.
A. random
B. order of priority
C. as and when they come
D. none of the above
A. False
B. True
8. In graphs, A hyperedge is an edge that is allowed to take on any number of
_____________
A. Vertices
B. Edges
C. Both a and b above
D. Labels
A. Hash tables
B. Heaps
C. Both a and b
D. Skip list
A. Binary trees
B. Stacks
C. Graphs
D. Both a and c above
A. Insertion
B. Deletion
C. Updation
D. Retrival
14. Which of the following statements hold true for binary trees?
A. The left subtree of a node contains only nodes with keys less than the
nodes key.
B. The right subtree of a node contains only one nodes with key greater
than the nodes key.
C. Both a and b above
D. both left and right subtree nodes contains only nodes with keys less
than the nodes key.
15. Which of the following linked list below have last node of the list
pointing to the first node?
A. Yes
B. No
18. The time required in best case for search operation in binary tree is
A. O(n)
B. O(log n)
C. O(2n)
D. O(log 2n)
19. In ______________ tree, the heights of two child subtree of any node
differ by at most one.
A. Binary tree
B. Red black tree
C. Splay tree
D. AVL tree
PICT-FPL2-Unit-02-HTML(60) KEY
1. Width="500" and width="500%" are the same?
FALSE
A. fortname
B. fn
C. font
D. face
3. Which of the following tag is used for a multi-line text input control?
A. textml
B. text
C. textarea
D. Both b and c
TRUE
A. list
B. ls
C. li
D. ol
A. Pt
B. url
C. path
D. src
A. Space
B. Paragraph break
C. Line break
D. Word break
TRUE
9. Which tags are most commonly used by search engines?
A. Heading
B. Title
C. Paragraph
D. All
A. To replace paragraph
B. Logically divide the paragraphs
C. Logically divide the document
D. To provide space between tables
TRUE
TRUE
A. Rownum
B. Rownumb
C. Rn
D. Rowspan
18. For Frames in HTML, how do you specify the rest of the screen?
A. Using &
B. Using $
C. Using *
D. Using #
19. Which of the following type of information should not be included on the
web site?
TRUE
21. Which of the following web elements should you know about before building
your web site?
A. Basic
B. C++
C. MS Visual Basic
D. HTML
A. Structure tags
B. HTML tags
C. Heading tags
D. Body tags
25. What should be the first and last pair of tags in the web document?
A. <html></html>and<body></body>
B. <start><end> and <body></body>
C. <head><body>and<title></title>
D. <title></title>and<body></body>
26. When you use a heading tag in a document,what does the web browser
assumes?
27. For every Web document, you can add words that appear in the upper left
bar area of the browser. What set of tags allow to provide this
information?
A. <head></head>
B. <head><head>
C. <label><label>
D. <title></title>
28. If you wanted to create text that was a different color or font than
other text in your Web page,what type of tag would you use?
A. Layout
B. Basic formatting
C. Design
D. Outline
29. When creating a web document, what format is used to express an image's
height and width ?
A. Centimeters
B. Pixels
C. Dots per inch
D. Inches
A. 16.5 million
B. 16.6 million
C. 16.7 million
D. 16.8 million
31. The three image formats supported by most Web browsers are _____
A. GIF,BMP,PNG
B. PNG,BMP,JPEG
C. JPEG,BMP,GIF
D. GIF,PNG and JPEG
A. blue
B. red
C. green
D. navy
A. MOZILLA
B. The World Wide Web Consortium
C. Microsoft
D. Google
36. Which of the following tag is used for the largest heading
A. H1
B. H6
C. head
D. heading
A. <br/>
B. <lb/>
C. <break/>
D. <linebreak/>
38. Which of the following syntax is used to add background color in HTML?
A. <background>yellow</background>
B. <body style = "background-color:yellow">
C. <body background ="yellow">
D. <body style ="background-yellow">
A. <bold>
B. <b>
C. None
D. Both a and b
A. <italic>
B. <i>
C. None
D. both a and b
A. <a>http://www.pict.edu</a>
B. <a name ="http://www.pict.edu">pict.edu</a>
C. <a href = "http://www.pict.edu">pict.edu</a>
D. <a url = "http:// www.pict.edu">pict.edu</a>
A. <a href="mailto:xxx@yyy">
B. <mail href="xxx@yyy">
C. <a href="xxx@yyy">
D. <mail>xxx@yyy</mail>
A. <table><head><tfoot>
B. <table><tr><td>
C. <table><tr><tt>
D. <table><body><tr>
45. Choose the correct HTML tag to left-align the content inside a table cell
A. <td align="left">
B. <td valign="left">
C. <tdleft>
D. <td leftalign>
46. How can you make a list that lists the items with numbers ?
A. <ul>
B. <list>
C. <dl>
D. <ol>
47. How can you make a list that lists the items with bullets ?
A. <ul>
B. <list>
C. <dl>
D. <ol>
A. <input type="check"/>
B. <check>
C. <checkbox>
D. <input type="checkbox"/>
49. What is the correct HTML for making a text input field ?
A. <list>
B. <select>
C. <input type="dropdown"/>
D. <input type="list" />
A. <input type="textbox"/>
B. <input type="textarea" />
C. <textarea>
D. None
52. What is the correct HTML for inserting an image ?
A. <img alt="MyImage">image.gif</img>
B. <image src="image.gif" alt="MyImage" />
C. <img href="image.gif" alt="MyImage" />
D. <img src="image.gif" alt="MyImage" />
A. <body background="background.gif">
B. <img src="background.gif" background/>
C. <background img="background.gif">
D. None
54. To make the width of a table adjust to the current width of the viewer's
browser window, you should specify a table width of ______
A. 100%
B. 640 pixels
C. 1024 pixels
D. none of the above
55. What will happen if we do not use the width and height attributes in
<img> element?
A. element
B. attribute
C. value
D. operator
57. A ___________ URL describes the location of the desired fie with
reference to the location of the file that contains the URL itself.
A. relative
B. absolute
C. general
D. specific
58. To create a set of radio buttons that only allows a single button in the
set to be selected at one time, the ______ attribute of each button must
be the same.
A. label
B. value
C. name
D. src
59. Java ______ are little applications that can run in your browser to
create special effects on a web page.
A. scripts
B. modules
C. extensions
D. applets
60. To include a local style within an HTML tag, which of the following
attribute is used ?
A. link
B. local
C. format
D. style
PICT-FPL2-Unit-02-Linked List(14) KEY
1. Generally collection of nodes is called
A. Stack
B. Queue
C. Linked List
D. Heap
A. Graph
B. Queue
C. Linked List
D. Stack
A. static
B. Dynamic
C. Compile time
D. None of these
5. Each Node in Linked List contain minimum two fields , one field is called
data field to store data and another field is_____.
A. Pointer to character
B. Pointer to integer
C. Pointer to class
D. Pointer to Node
A. true
B. false
C. Depends on the compiler
D. Depends on the standard
A. calloc
B. malloc
C. Both a & b
D. free
8. In function free(p), p is a
A. int
B. Pointer returned by malloc()
C. Pointer returned by calloc()
D. Both b & c
1. #include <stdio.h>
2. void main()
3. {
4. char *p = calloc(100, 1);
5. p = "welcome";
6. printf("%sn", p);
7. }
A. Segmentation fault
B. Garbage
C. Error
D. welcome
A. Static area
B. Stack area
C. Heap area
D. Both b & c
A. remove(p);
B. delete(p);
C. free(p);
D. terminate(p);
13. Suppose pointer ptr points to a node in a linked in list . Which of the
Following statement changes ptr so that it points to the next node?
A. ptr ++;
B. ptr =link
C. ptr=ptr +link
D. ptr=ptr->link;
14. How many reference member, minimum, must a linked list node have ?
A. 0
B. 1
C. 2
D. 3
PICT-FPL2-Unit-02-Pointers(10) KEY
1. The operator used for dereferencing or indirection is ____
A. *
B. &
C. ->
D. >>
A. int *ip;
B. string s, *sp = 0;
C. int i; double* dp = &i;
D. int *pi = 0;
A. b is assigned to a
B. p now points to b
C. a is assigned to b
D. q now points to a
5. What is the output of this program? #include <iostream>
usingnamespacestd;
int main()
{
char*ptr;
charStr[]="abcdefg";
ptr=Str;
ptr+=5;
cout<<ptr;
return0;
}
A. fg
B. cdef
C. defg
D. abcd
A. 2
B. 320
C. 64
D. Compilation error
A. c questions
B. c (null)
C. (null) (null)
D. Compilation error
8. What will be output of following program?
#include<stdio.h>
#include<string.h>
int main()
{
register a = 25;
int far *p;
p=&a;
printf("%d ",*p);
return 0;
}
A. 25
B. 4
C. Address
D. Compilation error
A. 2 2
B. 4 4
C. 4 2
D. 2 4
A. 10
B. Address
C. 2
D. Compilation error
PICT-FPL2-Unit-02-Structure(37) KEY
1. Which of the following are themselves a collection of different data
types?
A. string
B. structures
C. char
D. All of the mentioned
A. struct
B. enum
C. typedef
D. All of the mentioned
A. -
B. <-
C. .
D. Both (b) and (c)
A. Another structure
B. Function
C. Array
D. None of the mentioned
A. struct temp{}s;
main(){}
B. struct temp{};
struct temp s;
main(){}
C. struct temp s;
struct temp{};
main(){}
D. None of the mentioned
6. What is the output of this C code?
1. #include <stdio.h>
2. struct student
3. {
4. int no;
5. char name[20];
6. }
7. void main()
8. {
9. struct student s;
10. s.no = 8;
11. printf("hello");
1. #include <stdio.h>
2. struct student
3. {
4. int no = 5;
5. char name[20];
6. };
7. void main()
8. {
9. struct student s;
10. s.no = 8;
11. printf("hello");
12. }
A. Nothing
B. Compile time error
C. hello
D. Varies
8. What is the output of this C code?
1. #include <stdio.h>
2. struct student
3. {
4. int no;
5. char name[20];
6. };
7. void main()
8. {
9. student s;
10. s.no = 8;
11. printf("hello");
12. }
A. Nothing
B. hello
C. Compile time error
D. Varies
1. #include <stdio.h>
2. void main()
3. {
4. struct student
5. {
6. int no;
7. char name[20];
8. };
9. struct student s;
10. s.no = 8;
11. printf("%d", s.no);
12. }
A. Nothing
B. Compile time error
C. Junk
D. 8
10. Can the above code be compiled successfully?
1. #include <stdio.h>
2. struct p
3. {
4. int k;
5. char c;
6. float f;
7. };
8. int main()
9. {
A. Yes
B. No
C. Depends on the standard
D. Depends on the platform
A. A character string containing the name of the file & the second argument
is the mode.
B. A character string containing the name of the user & the second argument
is the mode.
C. A character string containing file poniter & the second argument is the
mode.
D. None of the mentioned of the mentioned
12. For binary files, a ___ must be appended to the mode string.
A. Nothing
B. "b"
C. binary
D. "01"
13. If there is any error while opening a file, fopen will return
A. Nothing
B. EOF
C. NULL
D. Depends on compiler
A. Standard input
B. Standard output
C. Standard error
D. All of the menitoned
A. int type
B. char * type
C. struct type
D. None of the mentioned
A. Attach
B. Append
C. Apprehend
D. Add
A. a
B. f
C. w
D. t
A. .txt
B. .bin
C. .c
D. None of the mentioned
A. fp = fopen(abc.txt, r);
B. fp = fopen(/home/user1/abc.txt, w);
C. fp = fopen(abc, w);
D. None of the mentioned
21. What does the following segment of code do?
fprintf(fp, Copying!);
1. #include <stdio.h>
2. int main()
3. {
4. FILE *fp = stdin;
5. int n;
6. fprintf(fp, "%d", 45);
7. }
A. Compilation error
B. Nothing
C. 45
D. Depends on the standard
1. #include <stdio.h>
2. #include <stdlib.h>
3. int main()
4. {
5. FILE *fp = stdout;
6. int n;
7. fprintf(fp, "%d", 45);
8. }
A. Compilation error
B. 45
C. Nothing
D. Depends on the standard
25. stdout, stdin and stderr are
A. File pointers
B. File desciptors
C. Streams
D. Structure
26. Which of the following statements about stdout and stderr are true?
A. Same
B. Both connected to screen always.
C. Both connected to screen by default.
D. stdout is line buffered but stderr is unbuffered.
1. #include <stdio.h>
2. int main()
3. {
4. FILE *fp = stdout;
5. int n;
6. fprintf(fp, "%d ", 45);
7. fprintf(stderr, "%d ", 65);
8. return 0;
9. }
A. 45 65
B. 65 45
C. 65
D. Compilation error
1. #include <stdio.h>
2. int main()
3. {
4. FILE *fp = stdout;
5. int n;
6. fprintf(fp, "%dn ", 45);
7. fprintf(stderr, "%d ", 65);
8. return 0;
9. }
A. 45 65
B. 65 45
C. 65
D. Compilation error
29. What is the output of this C code?
1. #include <stdio.h>
2. int main()
3. {
4. FILE *fp = stdout;
5. int n;
6. fprintf(fp, "%d ", 45);
7. fflush(stdout);
8. fprintf(stderr, "%d", 65);
9. return 0;
10. }
A. 45 65
B. 65 45
C. 45
D. Compilation error
1. #include <stdio.h>
2. struct student
3. {
4. char *name;
5. };
6. struct student s;
7. struct student fun(void)
8. {
9. s.name = "newton";
1. #include <stdio.h>
2. struct student
3. {
4. char *name;
5. };
6. void main()
7. {
8. struct student s, m;
9. s.name = "st";
10. m = s;
11. printf("%s%s", s.name, m.name);
12. }
A. char *
B. struct
C. void
D. None of the mentioned
33. . Whats the output of the following code?
1. #include <stdio.h>
2. struct temp
3. {
4. int a;
5. } s;
6. void func(struct temp)
7. {
8. s.a = 10;
9. printf("%dt", s.a); s
10. }
11. main()
12. {
13. func(s);
14. printf("%dt", s.a);
15. }
A. 10 (Garbage Value)
B. 0 10
C. 10 0
D. (Garbage Value) 10
A. Typecasting of structure
B. Pointer to a variable of same structure
C. Dynamic allocation of memory for structure
D. All of the mentioned
A. Typecasting of structure
B. Pointer to a variable of same structure
C. Dynamic allocation of memory for structure
D. All of the mentioned
A. Syntax Error
B. structure
C. double data type
D. An ordinary variable name
37. The output of the code below is
1. #include <stdio.h>
2. struct student
3. {
4. char *name;
5. };
6. struct student fun(void)
7. {
8. struct student s;
9. s.name = "alan";
10. return s;
11. }
12. void main()
13. {
14. struct student m = fun();
15. s.name = "turing";
16. printf("%s", m.name);
17. }
A. alan
B. Turing
C. Compile time error
D. Nothing
PICT-FPL2-Unit-03-Embedded C(66) KEY
1. Which of the following is the header file for PIC18F877 in the MPLAB
A. header-16F877A
B. 16F877A.h
C. h.16F877A
D. header.16F877A
A. 32-bit
B. 64-bit
C. 80-bit
D. 128-bit
A. delaymilliseconds(n)
B. delaymilli(n)
C. delayms(n)
D. delay_ms(n)
A. x seconds
B. x milliseconds
C. x microseconds
D. none of the above
A. x seconds
B. x milliseconds
C. x microseconds
D. none of the above
8. The function output_A(x)
A. 4
B. 8
C. 12
D. none of the above
A. 8
B. 10
C. 12
D. 16
14. The input channels of the ADC of PIC 18F877 are available on _______pins
A. input_adc()
B. read_adc()
C. accept_adc()
D. none of the above
16. The function used to select the ADC input channel for the analog input is
A. select_adc_channel(n)
B. adc_channel(n)
C. set_adc_channel(n)
D. none of the above
A. #int_<interrupt_name>
B. #ISR_<interrupt_name>
C. #interrupt_name
D. #interrupt_<interrupt_name>
18. The function used to set the timer mode for a timer 'x' is ______
A. set_timerx(mode)
B. setup_timerx(mode)
C. settings timerx(mode)
D. timerx(mode)
19. The function used to read the contents of a timer 'x' is ______
A. input_timerx()
B. accept_timerx()
C. get_timerx()
D. set_timerx(n)
20. The function used to write to the contents of a timer 'x' is______
A. input_timerx()
B. accept_timerx(n)
C. get_timerx(n)
D. set_timerx(n)
21. The function used to get the data from the UART port of the PIC 18F877 is
A. gets()
B. getc()
C. getch()
D. getchar()
22. The function used to send the data from the UART port of the PIC 18F877
is
A. puts(x)
B. putch(x)
C. putchar(x)
D. putc(x)
23. The function used to get the data from the SPI port of the PIC 18F877 is
A. spi_gets()
B. spi_read()
C. spi_input()
D. spi_getchar()
24. The function used to send the data from the SPI port of the PIC 18F877 is
A. spi_puts(x)
B. spi_write(x)
C. spi_send(x)
D. spi_putc(x)
25. The function used to send data through the i2c port of PIC18F877 is _____
_
A. i2c_read()
B. i2c_accept()
C. i2c_input()
D. i2c_write(n)
26. The function used to read the data from the ic2 port of PIC18F877 is ____
__
A. i2c_read()
B. i2c_output(n)
C. i2c_write(n)
D. i2c_stop()
27. The function used to read the data from the i2c port 0f PIC18F877 is
A. i2c_read()
B. i2c_output(n)
C. i2c_write(n)
D. i2c_stop()
28. The function used to stop the data from the i2c port 0f PIC18F877 is
A. i2c_read()
B. i2c_output(n)
C. i2c_write(n)
D. i2c_stop()
29. The sequence of the 4-bits to be given for full stepping in a stepper
motor is _____
A. 09H,0AH,06H,05H
B. 09H,06H,05H,0AH
C. 0AH,09H,06H,05H
D. 05H,06H,09H,0AH
A. Chip
B. System board
C. CISC chip
D. Port
Embedded_rashid #1
A. True
B. False
C. Depends on condition
D. None of the above
Embedded_rashid #2
A. True
B. False
C. Depends on condition
D. None
Embedded_rashid #3
A. Reactive
B. Real time
C. Both (a) and (b)
D. None
Embedded_rashid #4
A. Firmware
B. System program
C. Operating system
D. All
Embedded_rashid #5
35. Software for embedded system is written in __________
A. ROM
B. Flash memory
C. Both A and B
D. None
Embedded_rashid #6
Embedded_rashid #7
A. Single user OS
B. Real time OS
C. Open source
D. All
Embedded_rashid #8
A. Pointers
B. Arrays
C. Strings
D. Functions
Embedded_rashid #9
Embedded_rashid #10
A. Pointers
B. Functions
C. Recursion
D. All
Embedded_rashid #11
41. Embedded C do not use standard C functions like
A. malloc
B. getch
C. printf
D. scanf
Embedded_rashid #12
A. Distributed system
B. Embedded system
C. Both A and B
D. None
Embedded_rashid #13
A. Bit manipulation
B. Calling function
C. Accessing underlying hardware
D. All
Embedded_rashid #14
A. Micro controllers
B. Desktop computers
C. Both A and B
D. None
Embedded_rashid #15
A. Digital camera
B. Mobile phone
C. Washing machine
D. All
Embedded_rashid #16
OR
A. Limited ROM
B. Limited RAM
C. Limited stack space
D. All
Embedded_rashid #17
47. Embedded system are programmed using________
A. Machine code
B. Low level language
C. High level language
D. All
Embedded_rashid #18
A. Desktop
B. Embedded system
C. Distributed system
D. None
Embedded_rashid #19
A. Binary form
B. AscII form
C. Decimal form
D. Alphanumeric form
Embedded_rashid #21
A. All
B. some
C. Specific
D. Cannot tell
Embedded_rashid #22
A. Compiler
B. Linker
C. Cross linker
D. Cross compiler
Embedded_rashid #23
52. Which of the following function will you use to create delay in
microseconds?
A. delayms()
B. delaymicroseconds()
C. delay_ms()
D. delay_microsecods()
Embedded_rashid #24
53. Software for embedded system is written in ________
A. FlashROM
B. RAM
C. EEPROM
D. All
Embedded_rashid #25
A. SCK, SDI
B. SCL, SDA
C. PSP0 to PSP7
D. RXD, TSD
Embedded_rashid #26
Embedded_rashid #27
56. Which function is used to accept data received by serial I2C port?
A. getc()
B. I2C_read()
C. I2C_readdata()
D. psp_write()
Embedded_rashid #28
A. Machine code
B. Low level language
C. High level language
D. All
Embedded_rashid #30
Embedded_rashid #29
59. Why C(255) is used?
Embedded_rashid #31
Embedded_rashid #32
Embedded_rashid #33
62. Which function is used to read the digital output data from ADC ?
A. input_adc()
B. read_adc()
C. accept_adc()
D. any of above
Embedded_rashid #34
63. Which of the following functions is used to initialized ADC and to make
it use internal clock of the PIC ?
A. set_ADC()
B. setup_ADC()
C. set_adc_ports()
D. set_adc_channel()
Embedded_rashid #35
A. C
B. Pascal
C. Fortan
D. ALL
Embedded_rashid #36
65. SPL stands for ______________
Embedded_rashid #37
A. input_timerx()
B. accept_timerx()
C. get_timerx()
D. set_timerx()
Embedded_rashid #38
PICT-FPL2-Unit-04-Android(143) KEY
1. What is an activity in Android?
A. Margin is specifying the extra space left on all four sides in layout
B. Padding is used to offset the content of a view by specific px or dp
C. Both A and B are correct
D. None of the above
15. Data can be read from local source XML in android through
A. startActivityToResult() C. Bundle()
B. startActiivtyForResult() D. None of the above
A. Screen Size
B. Input configuration
C. Platform Version
D. Device features
E. All of above
A. finish() C. onProviderDisable()
B. getGPSStatus() D. getGPS().
38. What is the difference between margin and padding in android layout?
A. finish() C. By manually
B. system.exit(). D. stopSelf() and stopService()
A. Java C. Android
B. Ajax D. None of the Above
A. Two C. Many
B. One D. Zero
50. Why are these few users left with versions 1. 0 and 1. 1 ?
51. From the documentation of Android we can access the information about
articles and various tutorials on Andriod using_________
A. Home tab
B. Resources tab
C. Video tab
D. SDK tab
52. The AWT and swing libraries have been removed from the android library
set.
TRUE
A. A Java project
B. A Java class
C. A method call
D. none
55. What is the driving force behind an android application and that
ultimately gets converted into a Dalvik executable ?
FPL2 Unit... #5
A. Security
B. Portability
C. Networking
D. All
57. Which of these are not one of the three main components of Apk?
A. Dalvik executable
B. Resources
C. Native libraries.
D. Webkit.
58. The R. Java file is where you edit the resources for your project.
FALSE
FPL2 Unit... #13
A. Dalvik executable
B. Resources
C. Native Libraries
D. All of these are components of the Apk
A. stack.xml
B. text.xml
C. strings.xml
D. string.Java
FPL2 Unit... #6
A. Telephony
B. Applications
C. Sensors
D. The simulator can emulate / simulate all aspects"of a smart phone.
FPL2 Unit... #9
62. Which android version had the greatest share of the market as of January
2011 ?
A. 1. 1
B. 1. 5
C. 2. 3
D. 3. 4
63. The android software development kit (SDK) is all you need to develop
application for android.
TRUE
FPL2 Unit... #3
64. Android tries hard to low level components. Such as software stack, with
interfaces so that vender-specific code can be managed easily.
A. Confound
B. Abstract
C. Modularize
D. Compound
A. Runs the same base as the actual device, all the way down to the machine
layer.
B. Is more of a simulator and acts as a virtual machine for the android
device.
TRUE
67. What operating system is used as the base of the Android stack ?
A. Linux
B. Windows
C. Java
D. XML
A. 2005
B. 2006
C. 2007
D. 2008
A. Automatically
B. Manually
C. Emulated
D. None
FPL2 Unit... #8
70. what year was development on the Dalvik virtual machine started?
A. 2003
B. 2005
C. 2007
D. 2006
73. A device with android installed is needed to develop apps for android.
FALSE
74. When you distribute your application commercially, you'll want to sign it
with your own key ?
TRUE
FPL2 Unit... #20
TRUE
76. As an android programmer, what version of Android should you use as your
minimum development target ?
A. Versions1. 6 or 2. 0
B. Versions 1. 0 or 1. 1
C. Versions1. 2 or 1. 3
D. Versions 2. 3 or 3. 0
A. GNU's Gpl
B. Apache / MIT
C. OSS
D. Sourceforge
A. Cupcake
B. Ginger bread
C. Honeycomb
D. Muffin
80. Your java source code is what is directly run on the android device.
FALSE
FPL2 Unit... #16
A. Layout file
B. Manifest file
C. Strings XML
D. R file
FPL2 Unit... #4
82. Android release since 1. 5 have been given nicknames derived how ?
A. 2007
B. 2005
C. 2008
D. 2010
A. Application Package
B. Application Program Kit
C. Android Proprietary Kit
D. Android Package
FPL2 Unit... #1
A. Closing an app
B. Suspending an app
C. Opening a new app
D. Restoring the most recent app
FPL2 Unit... #7
88. What was Google's main business motivation for supporting Android?
A. Home tab
B. Dev tab
C. Video tab
D. SDK tab
90. How does Google check for malicious software in the Android market ?
A. Orientations and layouts that speed what the display looks like
B. The permission required by the application
C. The strings used in the application
D. The code which is complied to run the application
93. List and adapters are more organizations aids than user interface
elements in android.
TRUE
FPL2 Unit... #2
94. What is the name of the program that converts java byte code into Dalvik
byte code ?
A. Symbian
B. Palm
C. Pocket PC
D. RIM
FALSE
A. Mobile OS
B. DOS
C. Network OS
D. None
A. View manager
B. window manager
C. both (a) and (b)
D. none
FALSE
A. JVM
B. ADT
C. DVM
D. none
A. Apple
B. RIM
C. Google
D. Microsoft
FPL2 Unit... #8
104. From the documentation of Andriod we can access the information about
application design and development using _____.
A. Home tab
B. Dev tab
C. Video tab
D. SDK tab
TRUE
106. Android provides API for accessing peripherals like accelerometer, GPS
and compass.
TRUE
A. Application
B. Hardware
C. Software
D. None
FALSE
A. Google
B. OHA
C. AOSP
D. PaloAlto
A. Oracle
B. MS acess
C. SQLite
D. SQL
A. Activity manager
B. Telephony manager
C. Content manager
D. Location manager
TRUE
FPL2 Unit... #6
A. WTLS
B. WAE
C. WSP
D. WDP
A. Linux Torvald
B. Dennis Ritchie
C. Dan Bornstein
D. none
TRUE
TRUE
A. Eclipse
B. Python
C. Android
D. None
FPL2 Unit... #1
FPL2 Unit... #3
TRUE
FPL2 Unit... #42
A. Linux
B. Windows
C. Mac
D. None
FPL2 Unit... #2
FALSE
A. 4.1.X
B. 3.0
C. 1.5
D. 2.2
123. WAP enables the applications development for handled portable devices.
TRUE
A. JVM
B. DVM
C. CLR
D. None
FPL2 Unit... #4
TRUE
FPL2 Unit... #29
A. Protocol
B. Library function
C. plug in
D. none
TRUE
A. Activity
B. Intent
C. Context
D. Service
TRUE
FPL2 Unit... #9
131. From documentation of Andriod we can access the information about latest
development announcements and important links to Andriod topics using
.
A. Home tab
B. Dev tab
C. Video tab
D. SDK tab
FALSE
FPL2 Unit... #21
133. ______ acts as abstraction layer between hardware and other software
layers.
A. Application
B. Application Framework
C. Linux Kernel
D. DVm
134. Tasks that do not require user interaction can be encapsulated in ____.
A. Activity
B. Intent
C. Context
D. Service
136. ____ is responsible for java byte code to dalvik byte code conversion.
A. Java Compiler
B. Dalvik Compiler
C. C++ Compiler
D. None
A. JAVA
B. C++
C. Python
D. VB
FPL2 Unit... #7
A. Home tab
B. Dev tab
C. Video tab
D. SDK tab
TRUE
FPL2 Unit... #45
FALSE
FPL2 Unit... #5
FALSE
TRUE
A. Linux Kernel
B. Library function
C. Android runtime
D. Package manager