Home »» Placement Papers »» All Papers »» DRDO(CEPTAM) »» Placement Paper

DRDO Placement Paper – Computer Science Questions

• What shall be the value of I at the end of pseudocode?
a. 6
b. 4
c. 7
d. 4

• What shall be the number of digit I present in the binary representation?
3*512+7*64+5*8+3 is 
a. 10
b. 8
c. 12
d. 9

• What is the level of aggregation of information required for operational control?
a. Qualitative
b. Detailed
c. Aggregate
d. None of the above

• What does the principle of locality of reference justifies?
a. Interrupts
b. Cache memory
c. Virtual memory
d. Main memory

• Explain the meaning of the term ‘aging’.
a. Letting job reside in memory for a certain amount of time so that the number of pages required can be estimated accurately.
b. Booting up the priority of a process in multi – level of queue without feedback.
c. Gradually increasing the priority of jobs that wait in the system for a long time to remedy infinite blocking.
d. Keeping track of the following a page has been in memory for the purpose of LRU replacement.

• What will be the chromatic number of a graph that requires K different colours for its proper colouring?
a. K
b. K/2
c. K-1
d. 1

• What is the reason that you will use Djikstra’s algorithm?
a. Calculate the routing tables.
b. Create a link state databases
c. Create LSA’s
d. Flood an internet with information

• Which address will a router look at when a host on network A sends a message to a host on network B?
a. IP
b. Subnet mask
c. Port
d. Physical

• What is the full form of SSL?
a. Secure Sockets Layer
b. Standard Security Label 
c. Standard Secure Layer
d. None of the above

• Which operation will you choose to extract specified columns from a table?
a. Join 
b. Substitute
c. Project
d. Extract

• Choose the correct option which is the aggregate function in SQL.
a. Ordered by
b. Avg
c. Distinct
d. Select

• What do you mean be Semaphores?
a. They are used for memory management
b. Synchronises critical resources to prevent deadlock
c. Are used to do I/O
d. Synchronises critical resources to prevent contention

• What is the hexadecimal equivalent of 01111100110111100011?
a. ABD3F
b. CD73E
c. FA4CD
d. 7CDE3

• What is a virtual memory?
a. A technique to allow a program, of size more than the size of the main memory, town
b. Part of secondary storage used in program execution
c. Part of main memory only used for swapping
d. None of the above

• What will be a graph with ‘n’ vertices and n-1 edges which is not a tree?
a. Euler
b. Connected
c. A circuit
d. Disconnected

• What will 0.75 in decimal system be equivalent to in octal system?
a. 0.50
b. 0.60
c. 0.54
d. 0.52

• What does a task in blocked state mean?
a. It must still be placed in the run queues
b. It is waiting for some temporarily unavailable resources
c. It is executable
d. It is running

• In relational database which command will you use to control access over objects?
d. None of the above

• In which cases will you not use BCNF?
a. The candidate key overlap
b. Two or more candidate keys
c. Two mutually exclusive foreign keys
d. The candidate key overlap

• What is the standard of certificate used on internet?
a. X.409
b. X.25
c. X.509
d. X.301

• Choose the correct model from the below mentioned options which can be used for software reliability.
a. Rayleigh
b. Waterfall
c. Musa

• What does IEEE 802.11 stand for?
a. Broadband Wireless
b. Wireless LANs
c. Ethernet
d. Bluetooth

• What is SSL not responsible for?
a. Data integrity protection
b. Mutual authentication of client & server
c. Secret communication
d. Error detection & correction

• A language that provides garbage collection automatically is:
a. C++
b. C
c. Fortran
d. Lisp

• What does Armstrong’s inference rule doesn’t determine?
a. Transitivity
b. Reflexivity
c. Augmentation
d. Mutual dependency

• Who determines the number of page frames that must be allocated to a running process in a virtual memory environment?
a. Page size
b. The instruction set architecture
c. Physical memory size
d. Number of processes in memory

• Ring counter is analogous to:
a. Latch
b. Toggle switch
c. S – R flip flop
d. Stepping switch

• What does bit stuffing refer to?
a. Appending a nibble to the flag sequence
b. Inserting a ‘0’ in user stream to differentiate it with a flag
c. Appending a nibble to the use data stream
d. Inserting a ‘0’ in flag stream to avoid ambiguity

• What is the role of Ethernet hub?
a. Connects to a token – ring network
b. Functions as a repeater
c. Functions as a getaway
d. Connects to a digital PBX

• Round Robin scheduling is essentially the pre – emptive version of:
a. Shortest Job First
c. Longest remaining time
d. Shortest remaining time

• What shall be the highest frequency of a bandwidth of a signal is 5 kHz and the lowest frequency is 52 kHz?
a. 57 kHz
b. 10 kHz
c. 5 kHz
d. 47 kHz

• Choose the correct option that is printed as a result of the call demo (1234)?
a. 12344321
b. 1441
c. 43211234
d. 3443

• Fill in the blanks
The output 0 and I level for TTL logic family is approximately
a. 0.9 and 1.75 V
b. 0.1 and 5 V
c. –i.75 and 0.9 V
d. 0.6 and 3.5 V

• What will you call a view of database that appears to an application program?
a. Virtual table
b. Schema
c. Subschema
d. None of the above

• Choose the correct alternative that represents an example of selection sort algorithm design technique.
a. Backtracking
b. Greedy Method
c. Dynamic Programming
d. Divide and Conquer

• Which of the following option stands true in respect to 2phase commit protocol?
a. Detects Deadlock
b. Ensures Serializability
c. Recover from Deadlock
d. Prevents Deadlock

• Choose the option which is not a UML Diagram.
a. Class Diagram
b. Use Case
c. Swimlane Diagram
d. Analysis Diagram

• What does the computer store in the Big – Indian system?
a. LSB of data in the highest memory address of data unit
b. MSB of data in the lowest memory address of data unit
c. LSB of data in the lowest memory address of data unit
d. MSB of data in the highest memory address of data unit

• Choose the RAID level that provides the highest data transfer rate from the below mentioned options.
a. RAID 3
b. RAID 1
c. RAID 5
d. RAID 4

• Choose the option that does not represent a feature of WAP 2.0.
a. Interface to a storage device
b. Hashing
c. Multimedia Messaging
d. Push & Pull Model


0 Answers