Question : Character readers are those devices which read the characters printed on the source documents and then convert them directly into computer usable input. which of he following is not a character reader ?
Solution : OCR
Description - Devices that read printed or handwritten characters and convert them into digital input for a computer are called: OCR (Optical Character Recognition) devices These scan printed documents, recognize the characters using pattern recognition or AI, and convert them into editable digital text. Examples: Document scanners with OCR software Bank cheque readers Passport/ID scannersOptical Character Recognition (OCR) Devices
Question : which of the following is not a type of database ?
Solution : Transition
Description - category or classification of a database based on how it stores, organizes, and manages data. Here are the main types of databases: Structure: Tables (rows and columns) Use Case: Structured data, transactional systems Examples: MySQL PostgreSQL Oracle Database Microsoft SQL Server Designed for unstructured or semi-structured data. Four main subtypes: Structure: JSON-like documents Examples: MongoDB, CouchDB Structure: Key-value pairs Examples: Redis, Amazon DynamoDB Structure: Columns grouped into families Examples: Apache Cassandra, HBase Structure: Nodes and edges (for relationships) Examples: Neo4j, Amazon Neptune Optimized for: Time-stamped or time-series data Examples: InfluxDB, TimescaleDB Structure: Objects (like in OOP languages) Examples: db4o, ObjectDB Hybrid: Combine SQL structure with NoSQL scalability Examples: Google Spanner, CockroachDB Legacy systems: Tree (hierarchical) or graph (network) structures Examples: IBM IMS (hierarchical), IDMS (network)
1. Relational Databases (RDBMS)
2. NoSQL Databases
a. Document Databases
b. Key-Value Stores
c. Column-Family Stores
d. Graph Databases
3. Time-Series Databases
4. Object-Oriented Databases
5. NewSQL Databases
6. Hierarchical and Network Databases
Question : Parameter passing to function is called :
Solution : all of the above
Description -
Method
What is Passed
Can Modify Original?
Common in
Call by Value
Copy of the value
No
C, Java (primitives)
Call by Address
Address of variable
Yes
C (with pointers), C++
Call by Name
Expression (unevaluated)
Depends
ALGOL, theoretical
Question : Assembly language is a -
Solution : Low Level Language
Description - Assembly language is a low-level programming language. Here's what that means in more detail: Close to Hardware: Architecture-Specific: Human-Readable (to a degree): Manual Control: Writing performance-critical code Writing device drivers or embedded systems Learning how computers work at a fundamental level No Built-in Abstractions:Key Characteristics of Assembly Language:
Assembly is just one step above machine code (binary). Each assembly instruction typically corresponds directly to a single machine instruction for a specific CPU architecture.
Assembly is written for a specific processor (like x86, ARM, MIPS, etc.), and code written for one type won't run on another without modification.
While it's more readable than raw binary or hex machine code, it’s still very detailed and technical. For example, instead of writing 10110000 01100001
(in binary), you might write MOV AL, 61h
in assembly.
Programmers have precise control over registers, memory addresses, and instruction execution, which is useful for:
Unlike high-level languages (e.g., Python, Java), assembly has no built-in support for complex data types, error handling, or memory management—you have to handle all of that manually.
Question : Which logic gates is known as coincidence detector?
Solution : AND
Description - The logic gate known as a coincidence detector is the AND gate. An AND gate only outputs HIGH (1) when all its inputs are HIGH (1) simultaneously. This "simultaneity" or "coincidence" of input signals is what makes it a coincidence detector. Only when A = 1 and B = 1 — a "coincidence" — does the output become 1.Example:
Input A
Input B
Output (A AND B)
0
0
0
0
1
0
1
0
0
1
1
1
Question : Encapsulation is also know as -
Solution : information hiding
Description - Encapsulation is one of the fundamental principles of Object-Oriented Programming (OOP). It refers to the bundling of data (variables) and the methods (functions) that operate on that data into a single unit, typically a class. It also involves restricting direct access to some of an object's components, which is a way of protecting the internal state of an object from unintended or harmful changes. Data Hiding: Only expose what is necessary. Use access modifiers (like Getter and Setter Methods: Use getters to retrieve data. Use setters to update data, often with validation.Key Concepts of Encapsulation:
private
, protected
, and public
) to control access to class members.
Question : E-Commerce refers to -
Solution : Electronic commerce
Description -
Question : In C++, by default, the members of a class are :
Solution : Private
Description - In C++, by default, the members of a class are private.
Question : Which of the following is an operating system call?
Solution : None of these
Description - An operating system (OS) call, commonly referred to as a system call, is a way for programs to interact with the operating system. When a user application wants the OS to perform a task (like reading a file or creating a process), it makes a system call. System calls provide an interface between: User space (where applications run) Kernel space (where the OS runs) User programs cannot directly access hardware or critical OS functions, so they use system calls to request services from the OS. Here's a breakdown by category:What System Calls Do
Examples of Common System Calls
Category
System Calls (Linux/UNIX examples)
Description
Process Control
fork()
, exec()
, exit()
Create or end processes
File Management
open()
, read()
, write()
, close()
Manage files
Device Management
ioctl()
, read()
, write()
Access I/O devices
Information Maintenance
getpid()
, alarm()
, sleep()
Get system info, set timers
Communication
pipe()
, shmget()
, mmap()
Inter-process communication (IPC)
Question : Which of the following is not used as a data structure?
Solution : Directory
Description - List of data structure given below : These structures store data in a sequential manner. Array Linked List Singly Linked List Doubly Linked List Circular Linked List Stack Queue Simple Queue Circular Queue Priority Queue Deque (Double-Ended Queue) These structures don’t store data sequentially. Tree Binary Tree Binary Search Tree (BST) AVL Tree Red-Black Tree Segment Tree B-Tree / B+ Tree Trie (Prefix Tree) Graph Directed Graph (Digraph) Undirected Graph Weighted Graph Unweighted Graph Directed Acyclic Graph (DAG) Fast lookup by keys. Hash Table Hash Map Hash Set Used for specific applications or performance improvements. Heap Min-Heap Max-Heap Fibonacci Heap Disjoint Set (Union-Find) Suffix Tree / Suffix Array Bloom Filter Skip List Fenwick Tree (Binary Indexed Tree) These define behavior rather than implementation. List Stack Queue Deque Map / Dictionary Set Graph TreeLinear Data Structures
Non-Linear Data Structures
Hash-Based Structures
Specialized or Advanced Data Structures
Abstract Data Types (ADTs)
Question : An encoder has 2^n input lines and ...... output lines.
Solution : n
Description - An encoder with 2^n input lines has n output lines. The encoder’s job is to encode one active input line (out of 2^n possible inputs) into an n-bit binary code. Since there are 2^n input lines, the number of output lines must be enough to represent all those inputs uniquely in binary. n output lines can represent 2^n unique combinations (from 0 to 2^n−1). So: Encoder with 2n input lines has n output lines.Explanation:
Question : Which of the following scheduler is in charge of handling the swapped out process?
Solution : Medium term
Description - In an operating system (OS), the term "swapped out process" refers to a process that has been temporarily removed from main memory (RAM) and placed into secondary storage (usually a swap space or page file on disk) to free up memory for other active processes. Swapping is a memory management technique. When the system is low on RAM, it swaps out less active or idle processes to disk. This allows more active processes to use physical memory. The swapped-out process is not currently executable until it is swapped back in. The medium-term scheduler is responsible for managing suspended (swapped-out) processes. It controls which of them should be swapped back into memory (RAM) to become eligible for execution.What Does "Swapped Out" Mean?
Key Responsibilities of the Medium-Term Scheduler:
Function
Description
Swapping Out
Chooses a process to suspend and swap out to disk to free up memory.
Swapping In
Decides when a suspended process should be brought back into RAM.
Balancing Load
Helps balance CPU and memory usage by controlling the degree of multiprogramming.
Question : __________________allows you to upload web pages.
Solution : HTTP
Description - HTTP (HyperText Transfer Protocol) is the foundational protocol used for communication on the World Wide Web. It defines how messages are formatted and transmitted, and how web servers and browsers should respond to various requests. Protocol Type: Application layer protocol in the Internet protocol suite. Purpose: Transfers data (like HTML documents, images, videos) between a client (usually a web browser) and a server. Stateless: Each request is independent; the server doesn't retain any memory of previous requests. Uses: Used to load web pages, send form data, retrieve APIs, etc.Key Points:
Basic HTTP Operations (Methods):
GET
: Retrieve data from the server.POST
: Send data to the server (e.g., form submissions).PUT
: Update existing data.DELETE
: Remove data.
Question : The maximum number of nodes on level 5 of a binary tree
Solution : 16
Description - Maximum number of node at level 'n' in binary tree is 2^(n-1). if, n=5 then, maximum number of node is 2^(5-1) =16
Question : For tree, which of the following list traversing through the entire list is not necessary
Solution : Circular list
Description - Each node points to the next node, and the last node points back to the first. No One direction only. Use cases: Round-robin scheduling, buffering. Each node points to both the next and the previous node. Last node's Use cases: Multimedia playlists, complex data navigation. Each node has: Last node’s One-way traversal only. Pros: Simple, efficient memory usage Each node has: Traversal in both directions First node’s Last node’s Pros: Easy to navigate both directions1. Circular Linked List
➤ Circular Singly Linked List (CSLL)
NULL
at the end.
➤ Circular Doubly Linked List (CDLL)
next
→ first node, and first node's prev
→ last node.
2. Singly Linked List (SLL)
data
next
pointernext
= NULL
Cons: No backward traversal
3. Doubly Linked List (DLL)
data
next
pointerprev
pointerprev
= NULL
next
= NULL
Cons: More memory (extra pointer), slightly complex logic
Question : The ARP is a part of the ____________________layer of the TCP/IP network.
Solution : Network
Description - ARP (Address Resolution Protocol) is a part of the Link layer (also known as the Network Interface layer) of the TCP/IP network model. In the TCP/IP model, the Link layer is the lowest layer and is responsible for interactions with the physical network hardware. ARP operates at this layer to map IP addresses (Network layer addresses) to MAC addresses (Link layer addresses), allowing devices to communicate on a local network.Explanation:
Question : A linear list of elements in which deletion can be done from one end and insertion can take place only at the other end (rear) is known as :
Solution : Queues
Description - In Data Structures (DS), a queue is a linear data structure that follows the FIFO principle — First In, First Out. A queue is a collection of elements where: Insertion (enqueue) happens at the rear (end). Deletion (dequeue) happens at the front (beginning). A line at a ticket counter. Print jobs in a printer queue. Task scheduling in operating systems.Definition:
Real-life Examples:
Question : To change the ciphertext into plain text is known as-
Solution : Decryption
Description - Encryption / Decryption
Term
Purpose
Input
Output
Key Required?
Use Case
Encryption
Protect data by making it unreadable to unauthorized users
Plaintext
Ciphertext
✅ Yes
Secure communication, file protection
Decryption
Revert encrypted data back to its original form
Ciphertext
Plaintext
✅ Yes
Reading encrypted emails, unlocking files
Encoding / Decoding
Term
Purpose
Input
Output
Key Required?
Use Case
Encoding
Convert data into a specific format for transmission or storage
Data (text, binary, etc.)
Encoded format (ASCII, Base64)
❌ No
Data transmission, compatibility
Decoding
Revert encoded data back to original format
Encoded data
Original data
❌ No
Reading encoded messages or files
Question : In OSI network architecture, the routing is performed by:
Solution : network layer
Description - The Network Layer is the third layer in the OSI (Open Systems Interconnection) model of computer networking. It is responsible for routing, addressing, and delivering data packets from the source host to the destination host across multiple networks. Logical Addressing Assigns IP addresses to devices. Ensures each device on a network can be uniquely identified. Routing Determines the best path for data to travel across interconnected networks. Uses routing algorithms and protocols (like OSPF, BGP). Packet Forwarding Forwards data packets from one network to another based on destination IP. Fragmentation & Reassembly Breaks packets into smaller fragments to accommodate different network technologies, and reassembles them at the destination. Error Handling and Diagnostics Supports diagnostics tools like ICMP (e.g., Key Functions of the Network Layer:
ping
, traceroute
).
Question : Segmentation
Solution : All of the above
Description - In operating systems, segmentation is a memory management technique that divides a process’s memory into different segments based on the logical divisions of a program. Each segment represents a different type of information, such as code, data, stack, heap, etc. This is different from paging, where memory is divided into fixed-size blocks. Logical Address: Composed of two parts: Segment Table: OS uses a segment table for each process. Each entry has: Base: Starting address of the segment in physical memory. Limit: Length of the segment. Helps convert logical address → physical address. Address Translation: Valid if: Offset < Limit -Reflects the logical view of a program -Can cause external fragmentationComponents of Segmentation
(Segment Number, Offset)
Example: (2, 50) → 50th byte in segment 2.
Invalid if: Offset ≥ Limit (causes segmentation fault)Advantages of Segmentation
-Supports modular programming
-Allows independent segment protection
-Segments can grow/shrink independently
Disadvantages
-More complex than paging
-Slower address translation compared to paging