Intelli placement information Technology Technical evaluation

Information Technology – Sample Paper- Technical evaluation – IT


1) A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum

number of hosts that can belong to this subnet?

A) 14.

B) 30

C) 62

D) 126

Answer: (C)

2) In a particular Unix OS, each data block is of size 1024 bytes, each node has 10 direct

data block addresses and three additional addresses: one for single indirect block, one for

double indirect block and one for triple indirect block. Also, each block can contain

addresses for 128 blocks. Which one of the following is approximately the maximum size of

a file in the file system?

A) 512 MB

B) 2 GB

C) 8 GB

D) 16 GB

Answer: (D)

3) A software organization has been assessed at SEI CMM Level 4. Which of the following

does the organization need to practice beside Process Change Management and Technology

Change Management in order to achieve Level 5?

A) Defect Detection

B) Defect Prevention

C) Defect Isolation

D) Defect Propagation

Answer: (B)

4) A channel has a bit rate of 4 kbps and one-way propagation delay of 20 ms. The channel

uses stop and wait protocol. The transmission time of the acknowledgement frame is

negligible. To get a channel efficiency of at least 50%, the minimum frame size should be

A) 80 bytes

B) 80 bits

C) 160 bytes

D) 160 bits

Answer: (D)

5) Which one of the following is NOT shared by the threads of the same process ?

A) Stack

B) Address Space

C) File Descriptor Table

D) Message Queue

Answer: (A)

6) Suppose that two parties A and B wish to setup a common secret key (D-H key) between

themselves using the Diffle-Hellman key exchange technique. They agree on 7 as the

modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their

respective secrets. Their D-H key is

A) 3

B) 4

C) 5

D) 6

Answer: (C)

7) How many pulses are needed to change the contents of a 8-bit upcounter from

10101100 to 00100111 (rightmost bit is the LSB)?

A) 134

B) 133

C) 124

D) 123

Answer: (B)

8) What is the availability of software with the following reliability figures?

Mean Time Between Failure (MTBF) = 25 days

Mean Time To Repair (MTTR) = 6 hours

A) 1%

B) 24%

C) 99%

D) 99.009%

Answer: (B)

9) We have two designs D1 and D2 for a synchronous pipeline processor. D1 has 5 pipeline

stages with execution times of 3 nsec, 2 nsec, 4 nsec, 2 nsec and 3 nsec while the design

D2 has 8 pipeline stages each with 2 nsec execution time. How much time can be saved

using design D2 over design D1 for executing 100 instructions?

A) 214 nsec

B) 202 nsec

C) 86 nsec

D) -200 nsec

Answer: (A)

10) Which of the following statements is FALSE regarding a bridge

A) Bridge is a layer 2 device

B) Bridge reduces collision domain

C) Bridge is used to connect two or more LAN segments

D) Bridge reduces broadcast domain

Answer: (D)


No comments:

Post a Comment



Archive