Saturday, 8 April 2017

Direct Mapping Cache

Cache is divided into lines and Main memory is divided into blocks.
In direct mapping cache,  all block numbers having same last bits will be mapped to one line in cache.
Hence the address generated by CPU is divided into 2 parts, block number and block offset.
by looking at the block number, you can identify to which line in cache we may find it.

As many block number will have same last bits, it is difficuilt to identify which block is mapped to this line in cache.

Hence the address generated by CPU is divided into 2 parts, block number and block offset.
Each block number is divided into 2 parts  : 1) tag and 2) cache line number

first bits in block number bits in logical address represent tag
and last bits represent cache line number. (number of bits used to represent cache line number depends on the number of lines present in cache. Remaining bits will be used to represent tag).

by seeing the cache line number bits , we can identify the cache line number and
by seeing the tag, we can identify which block is mapped in that cache.

Sunday, 18 October 2015

CBSE NET Fuzzy sets Questions and Answers

Check the link below for more such questions
http://ugcnetsolved-computerscience.blogspot.in/?view=flipcard

1. How to denote a fuzzy set?
IF X is the universe of discourse and x is a particular element of X, then a fuzzy set A defined on X may be written as a collection of ordered pairs:
A={(x,µA(A))}, x belongs to X
The pair (x, µA(A)) is called a singleton.
In crisp sets, a singleton is simply the element x by itself.
In fuzzysets, a singleton is composed of two terms: x and µA(x).
A singleton is also written as µA(x)/x. That is by putting the membership function first followed by the ‘/’symbol and is used to separate the function from x.
Singletons whose membership to a fuzzy set is 0 may be omitted.

2. Union of two fuzzy sets
µAUB(x) = µA(x) V µB(x) = max(µA(x), µB(x))

3. Intersection of two fuzzy sets
µA Intersection B(x) = µA(x) ^ µB(x) = min(µA(x), µB(x))

4. Complement of a fuzzy set
The complement of a fuzzy set A is a new fuzzy set A Complement, containing all the elements which are in the universe of discourse but not in A, with the membership function
Complement of µA(x) = 1 - µA(x)

5. Height of a fuzzy set
The height of a fuzzy set is the highest membership value of the membership function:
Height(A) = max µA(xi)
A fuzzy set with height 1 is called a normal fuzzy set.
In contrast, a fuzzy set whose height is less than 1 is called a subnormal fuzzy set.

6. α-cut of a fuzzy set
α-cut of a fuzzy set A denoted as Aα, is the crisp set comprised of the elements x of a universe of discourse X for which the membership function of A is greater than or equal to α.

Solved problems from various NET papers.
JUNE 2012 – PAPER III Q.No 6
6. If two fuzzy sets A and B are given with membership functions μA(x) = {0.2, 0.4, 0.8, 0.5, 0.1} μB(x) = {0.1, 0.3, 0.6, 0.3, 0.2} Then the value of μ ––– will be A∩B
(A) {0.9, 0.7, 0.4, 0.8, 0.9}
(B) {0.2, 0.4, 0.8, 0.5, 0.2}
(C) {0.1, 0.3, 0.6, 0.3, 0.1}
(D) {0.7, 0.3, 0.4, 0.2, 0.7}
Ans:-A
Explanation:- 
The fuzzy intersection of two fuzzy sets A and B on universe of discourse X: μA∩B(x) = min [μA(x), μB(x)] , where x∈X
But here in the question, they are asking for complement of A intersection B and so the answer would be 1-min[A(x),B(x)].
The minimum of 0.2 and 0.1 will be 0.1, and 1-0.1 will be 0.9
The second value is min(0.4,0.3)=0.3 and 1-0.3=0.7

The third value is min(0.8,0.6)=0.6 and 1-0.6=0.4

The fourth value is min(0.5,0.3)=0.3 and 1-0.3=0.7

The last value is min(0.1,0.2)=0.1 and 1-0.1=0.9

The only option which has got the values 0.9,0.7,0.4,0.7 and 0.9, although the fourth value is given as 0.8 instead of 0.7 is option A.
So the answer is option A.

DECEMBER 2012 – PAPER III Q.No 13
13. Consider a fuzzy set A defined on the interval x=[0,10] of integers by the membership function.
µA(x) = x / x+ 2
α cut corresponding to α = 0.5 will be
(A) { 0,1,2,3,4,5,6,7,8,9,10}
(B) {1,2,3,4,5,6,7,8,9,10}
(C) {2,3,4,5,6,7,8,9,10}
(D) { }
Ans:- C
Explanation:-
In the fundamentals, refer to the answer given for question no. 6 regarding α-cut.
α-cut of a fuzzy set A denoted as Aα, is the crisp set comprised of the elements x of a universe of discourse X for which the membership function of A is greater than or equal to α.
Given, x = In the range [0,10]
Membership function = x/x+2
Calculate the value of membership function for the interval from 0 to 10, substituting in the formula x/x+2.
µA(0) = 0 / 0+ 2 = 0

µA(1) = 1 / 1+ 2 = 0.33

µA(2) = 2 / 2+ 2 = 0.5

µA(3) = 3 / 3+ 2 = 0.6

µA(4) = 4 / 4+ 2 = 0.66

µA(5) = 5 / 5+ 2 = 0.71

µA(6) = 6 / 6+ 2 = 0.75

µA(7) = 7 / 7+ 2 = 0.77

µA(8) = 8 / 8+ 2 = 0.8

µA(9) = 9 / 9+ 2 = 0.81

µA(10) = 10 / 10+ 2 = 0.83

α= 0.5. We have to find the corresponding α-cut,

That will be a crisp set, having those values of x, for which the membership function is returning a value of 0.5 or above.

µA(2) = 0.5 and all the values of x above 2 is getting a value greater than 0.5. So the crisp set will contain the following values.

{ 2,3,4,5,6,7,8,9,10}.

So the correct answer is C.


DECEMBER 2013 – PAPER III Q.No 28
28. If A and B are two fuzzy sets with membership functions μA(x) = {0.2, 0.5, 0.6, 0.1, 0.9} μB(x) = {0.1, 0.5, 0.2, 0.7, 0.8} Then the value of μA ∩B

will be

(A) {0.2, 0.5, 0.6, 0.7, 0.9}

(B) {0.2, 0.5, 0.2, 0.1, 0.8}

(C) {0.1, 0.5, 0.6, 0.1, 0.8}

(D) {0.1, 0.5, 0.2, 0.1, 0.8}

Ans:-D

Explanation:-

Intersection of two fuzzy sets

µA ∩B (x) = µA(x) ^ µB(x) = min(µA(x), µB(x))

μA(x) = {0.2, 0.5, 0.6, 0.1, 0.9}

μB(x) = {0.1, 0.5, 0.2, 0.7, 0.8}

μA ∩B={0.1,0.5,0.2,0.1,0.8}

So, the correct answer is D.


29. The height h(A) of a fuzzy set A is defined as h(A) =sup A(x) where x belongs to A. Then the fuzzy set A is called normal when

(A)h(A)=0

(B)h(A)<0

(C)h(A)=1

(D)h(A)<1

Ans:- C

Explanation:-

Explanation:- The height of a fuzzy set is the highest membership value of the membership function: Height(A) = max µA(xi)

A fuzzy set with height 1 is called a normal fuzzy set.

In contrast, a fuzzy set whose height is less than 1 is called a subnormal fuzzy set. So, according to the above rule, the fuzzy set A is called normal when h(A)=1.

So, the correct answer is 1.


JUNE 2013 – PAPER III Q.No 74
74. If A and B are two fuzzy sets with membership functions μA(x) = {0.6, 0.5, 0.1, 0.7, 0.8} μB(x) = {0.9, 0.2, 0.6, 0.8, 0.5}

Then the value of μ Complement A∪B(x) will be

(A) {0.9, 0.5, 0.6, 0.8, 0.8}

(B) {0.6, 0.2, 0.1, 0.7, 0.5}

(C) {0.1, 0.5, 0.4, 0.2, 0.2}

(D){0.1,0.5,0.4,0.2,0.3}

Ans:- C

Union of two fuzzy sets

µAUB(x) = µA(x) V µB(x) = max(µA(x), µB(x))

μA(x) = {0.6, 0.5, 0.1, 0.7, 0.8}

μB(x) = {0.9, 0.2, 0.6, 0.8, 0.5}

µAUB(x) = {0.9,0.5,0.6,0.8,0.8}

Complement of µAUB(x)={0.1,0.5,0.4,0.2,0.2}

So, the correct answer is C.


JUNE 2014 – PAPER III Q.No 7,8 7. Given U = {1, 2, 3, 4, 5, 6, 7} A = {(3, 0.7), (5, 1), (6, 0.8)} then

~ A will be : (where ~ →complement)

(A) {(4, 0.7), (2, 1), (1, 0.8)}

(B) {(4, 0.3), (5, 0), (6, 0.2) }

(C) {(1, 1), (2, 1), (3, 0.3), (4, 1), (6, 0.2), (7, 1)}

(D) {(3, 0.3), (6.0.2)}

Ans:- C

Explanation:-

Complement of a fuzzy set

The complement of a fuzzy set A is a new fuzzy set A Complement, containing all the elements which are in the universe of discourse but not in A, with the membership function

Complement of µA(x) = 1 - µA(x)

Complement of a fuzzy set A is a new fuzzy set A complement. Since it is a fuzzy set, there will be two members in a singleton. The first member will be all the elements which are in the universe of discourse but not in A. The membership function will be 1- µA(x).

So, the complement of A will be

{(1,1),(2,1),(3,0.3),(4,1),(6,0.2),(7,1)}

The first is (1,1). The first 1 is in U but not in A, so it should be added in the complement. The second 1 is because the membership function is 1- µA(x). 1-0=1.

The same reason why you get (2,1).

The third one (3,0.3) because it is (3,1-0.7)=(3,0.3).

Same reason why you have (4,1) and (7,1).

(6,1-0.8)=(6,0.2).

The member (5,0) is not included because , a singleton whose membership to a fuzzy set is 0, can be excluded .


8. Consider a fuzzy set old as defined below

old={(20,0),(30,0.2),(40,0.4),(50,0.6),(60,0.8),(70,1),(80,1)}. Then the alpha-cut for alpha=0.4 for the set old will be (A){(40,0.3)}

(B){50,60,70,80}

(C){(20,0.1),(30,0.2)}

(D){(20,0),(30,0),(40,1),(50,1),(60,1),(70,1),(80,1)}

Ans:-D

Explanation:-

alpha-cut of a fuzzy set A will contain those elements where the membership function value is equal to or greater than alpha.

Here, alpha is given a value 0.4. Starting from (40,0.4) all the members have membership function equal or greater than 0.4. so, except

(20,0) and (30,0.2) all the menbers are included in the alpha-cut of the fuzzy set. The only option which has 40,50,60,70, and 80 included is option D. It has

(20,0) and (30,0) too. But it is already noted that any singleton where the membership function is 0 can be considered not included. So basically these two members are not part of the alpha-cut of the fuzzy set A. So the correct option is D.

Saturday, 11 April 2015

GATE 2016 cse important links


The below website is enough to check previous year questions topic wise with answers
http://www.gateinfo.in/CS/Syllabus/Computer-Science-Information-Technology/

If you want to discuss

http://gateoverflow.in/

For notes
http://www.prepjunkie.com/web/gate_sub.php#
http://www.ankurgupta.net/gate-notes/

To practice u can on
http://virtualgate.in/login/index.php

For videos
https://www.youtube.com/channel/UCJjC1hn78yZqTf0vdTC6wAQ

Previous Year Question papers
http://gateguide.in/gate-previous-year-question-papers-for-cse-computer-science-free-pdf/

Books
Book by nb venkateswarlu sir
https://books.google.co.in/books?id=iSiAAQAAQBAJ&pg=SA1-PA107&lpg=SA1-PA107&dq=4+interface+units+with+4+registers+2k+ram&source=bl&ots=FWRF8dsL-O&sig=HeUu-5jZ3JT_x0OUksR0UlQaEvg&hl=en&sa=X&ei=9OHZVMKII4yeugTIm4AI&ved=0CB8Q6AEwAA#v=onepage&q=4%20interface%20units%20with%204%20registers%202k%20ram&f=false

 

Few more additional links

For Networks
http://dcis.uohyd.ac.in/~apcs/networks/quiz1.html 

For CO
http://www.sitams.org/cource/gate/it/co_it_gate.pdf
http://www.gateinfo.in/CS/Syllabus/Computer-Science-Information-Technology/Computer-Organization-Architecture



Other Links
O.S
http://www.personal.kent.edu/~rmuhamma/OpSystems/Myos/threads.htm


http://www.academia.edu/1976253/Selection_of_Best_Sorting_Algorithm


 http://www.geeksforgeeks.org/tag/gate-cs-ds-algo/
http://www.geeksforgeeks.org/tag/DBMS/
http://www.geeksforgeeks.org/tag/AT/

http://www.geeksforgeeks.org/tag/operating-systems/
http://www.geeksforgeeks.org/tag/cn/
http://www.geeksforgeeks.org/fundamentals-of-algorithms/


http://cs.nyu.edu/courses/spring99/V22.0102-002/quick.html



Computer Networks

http://www.erg.abdn.ac.uk/users/gorry/eg3567/inet-pages/ip-fragmentatiion.html

https://books.google.co.in/books?id=PqLaakCibvQC&pg=PA534&lpg=PA534&dq=design+a+memory+/component+address+map&source=bl&ots=NmeSx3SVhb&sig=3jAhTWe8V2DBW-y_jPWxuLGYMwg&hl=en&sa=X&ei=h-PUVOGbBMW6uATx0YEQ&ved=0CE4Q6AEwCA#v=onepage&q=design%20a%20memory%20%2Fcomponent%20address%20map&f=false  


http://www.avatto.com/computer-science/test/mcqs/windows-programming/questions/195/1.html 
http://mcqquestions.com/multiple-choice-questions-of-operating-systems-set-3



http://www.lisquiz.com

http://www.computersciencetest.com/

http://comquestionanswer.blogspot.in/

http://www.sanfoundry.com/

http://www.geeksforgeeks.org/

http://www.netcomputerscience.in/

http://www.jagranjosh.com/articles-ugc-net-sample-model-papers-1356093807-1

http://www.indiabix.com/

http://www.avatto.com/

 http://www.testmerit.com/

 http://ashkerala.com 

Windows Programming MCQ questions


1.      ________ enables one to explore the resources of Windows:


a.       API
b.      CPP
c.       MFC
d.      ATL


2.      Which application  we will use to make program more portable:


a.       WindowsAPI
b.      WindowApp
c.       MFC
d.      None of these


3.      The Win32API supports:


a.       16-bit Windows
b.      32-bit Windows
c.       64-bit Windows
d.      All of these


4.      Win32Program utilizes a central function called:


a.       Main
b.      App
c.       WinMain
d.      None of these


5.      The arguments of the WinMain() function are mandatory and it communicate with:


a.       Operating System
b.      Hardware
c.       Kernel
d.      None of these


6.      Which is the parameter of the WinMain():


a.       HInstance
b.      hPrecInstance
c.       LPSTR lpCmdLine
d.      Int nCmdShow
e.       All of these


7.      Which is used to install and configure the service application:


a.       Administration and Management
b.      Networking
c.       Archie

d.      Gopher


8.      ______ is done by pressing the restart button while the computer is on:


a.       Cold boot
b.      Warm boot
c.       Both a and b
d.      None of these


9.      ______ is done by pressing the power switch when it is turned off:


a.       Cold boot
b.      Warm boot
c.       Both a and b
d.      None of these


10.  What is the full form of BIOS-ROM:
a.       Basic Input Output System – Read Only Memory
b.      Binary Input Output System – Read Only Memory
c.       Binary Input Output System – Random Only Memory
d.      Basic Input Output System – Random Only Memory


11.  VRML stands for:
a.       Virtual Reality Model Language
b.      Virtual Reality Modeling Language
c.       Virtual Read-only Modeling Language
d.      Virtual Reality Mode Language
12.  HTML stands for:


a.       Hyper Text Meta Language
b.      High Text Markup Language
c.       Hyper Text Markup Language
d.      High Test Markup Language


13.  WPF stands for:
a.       Windows Presentation Function
b.      Windows Presentation Foundation
c.       Windows Procedure Foundation
d.      None of these
14.  WCF stands for:
a.       Windows Computer Foundation
b.      Windows Communication Foundation
c.       Windows Central Foundation
d.      None of these
15.  RPC stands for:


a.       Remote Presentation Call
b.      Radio Presentation Call
c.       Remote Procedure Call
d.      None of these


16.  SNMP stands for:
a.       Secure Network Management Protocol
b.      Simple Network Management Protocol
c.       Secured Network Management Procedure
d.       Simple Network Management Procedure
17.  HTTP stand for:
a.       Hyper Text Tele Protocol
b.      Hyper Text Transfer Protocol
c.       Hyper Text Transfer Procedure
d.      Hyper Tele Transfer Procedure
18.  FTP stands for:


a.       File Transaction Protocol
b.      File Transfer Protocol
c.       Format Transfer Protocol
d.      Formal Transfer Protocol


19.  DNS stands for:


a.       Domain Network System
b.      Domain Name System
c.       Data Name System
d.      Data Name Service


20.  BITS stands for:
a.       Binary Intelligent Transfer Service
b.      Background Intelligent Transfer Service
c.       Background Integrated Transfer Service
d.      Binary Integrated Text Service
21.  WWW stands for:


a.       World Web Wide
b.      World Wide Web
c.       Web Wide World
d.      None of These


22.  XML stands for:
a.       eXtensible Markup Language
b.      eXtra Markup Language
c.       eXtensible Mode Language
d.      None of these
23.  URI stands for:
a.       Universal Resource Identifier
b.      Uniform Resource Identifier
c.       Uniform Resource Identification
d.      Universal Resource Identification
24.  TCP/IP stands for:
a.       Transfer Control Protocol / Internet Protocol
b.      Transmission Control Protocol / Internet Protocol
c.       Transfer Configuration Protocol / Internet Protocol
d.      None of these
25.  CSP stands for:
a.       Cryptographic System Provider
b.      Cryptographic Service Providers
c.       Computer Service Provider
d.      Cryptographic Service Protocol
26.  _________ is a standard by which internet names are translated to their corresponding IP addresses:


a.       DSP
b.      DSW
c.       DNS
d.      DLL


27.  ________ is supported by TCP/IP client accessing Web document on Web server:


a.       Web Browsers
b.      Operating System
c.       Windows
d.      None of these


28.  What is return type of InitInstance:


a.       bool
b.      int
c.       char
d.      double


29.  In Win32 which function is used to create application:


a.       WinMain
b.      WinApp
c.       WinAPI
d.      None of these


30.  Security protects the data from:


a.       Authorized accessing
b.      Unauthorized accessing
c.       Administrator accessing
d.      None of these


31.  Which function handle the key container:


a.       CryptoAPI
b.      CryptAcquireContext
c.       CAPICOM
d.      CryptoGraphics


32.  The MFC library is a predefined set of:


a.       Data types
b.      Function
c.       Classes
d.      Constant
e.       All of these


33.  Which class is used to display something on screen:


a.       CWinApp
b.      MFC
c.       CWinAPI
d.      None of these


34.    Which function is provide by CWinApp to display something on screen:


a.       Start()
b.      Load()
c.       Close()
d.      InitApplication()


35.  Where the fundamental  classes of MFC are declared:


a.       afxwin.h
b.      include.h
c.       graphics.h
d.      conio.h


36.  What is included by frame of window:


a.       Location
b.      Dimension
c.       Borders
d.      All of these


37.  Which class is used by MFC to create the frame:


a.       CMainFrame
b.      CFrameWnd
c.       CMainWnd
d.      None of these


38.  Which class is used to create a Window frame:


a.       CFrameWnd
b.      CMainFrame
c.       CMainWnd
d.      None of these


39.   Which function is associated with window frame:


a.       InitApp()
b.      Stop()
c.       Destroy()
d.      Create()


40.  Which is the base class of CWinApp:


a.       CWinThread
b.      CWin
c.       CWin_Tread
d.      CThread


41.  Which function is called to display the frame in resultant window:


a.       CloseWindow()
b.      ShowWindow()
c.       DeleteWindow()
d.      None of these


42.  Which file is required to export the DLL function:


a.       A.def
b.      A.dll
c.       A.exe
d.      None of these


43.  Which function is used to create DLL files:****


a.       DllMain
b.      DefMain
c.       Main
d.      Void_main


44.   Which keyword is used to declare the variable and function to specify the external link:


a.       extern
b.      void
c.       this
d.      new


45.  Which macro is used to handle the command message:


a.       ON_COMMAND
b.      ON_LBUTTONDOWN
c.       ON_RBUTTONDOWN
d.      ON_LBUTTONDBLCLK


46.  Which class is used to handle the windows message and control notification:


a.       CWnd
b.      CFrameWnd
c.       CMDIFrameWnd
d.      CView


47.   Which classes are included by CWnd class:


a.       CFrameWnd
b.      CMDIFrameWnd
c.       CView
d.      CMDIChildWnd
e.       All of these


48.  MVC stands for:
a.       Model View Controller
49.  Which  key events are identified by wParam:


a.       Shift
b.      Ctrl
c.       Both a and b
d.      None of these


50.  Which class is provided by MFC library:


a.       CScrollView
b.      CView
c.       CFrame
d.      None of these


51.  Web browser can access:


a.       Client computer
b.      Application Programs
c.       Web Pages
d.      All of these


52.  Which protocol is supported by web browser:


a.       TCP/IP
b.      IP
c.       TCP
d.      All of these


53.  A browser can support:


a.       Hyper Text
b.      Images
c.       Sound Files
d.      Flash Animations
e.       All of these


54.  Security is implemented by:


a.       Crypto API
b.      Cryptographic Service Providers
c.       CAPICOM
d.      All of these


55.  Security protects data from:


a.       Fire
b.      Flood
c.       Unauthorized access
d.      Authenticated user


56.  CSP contains a key that is stored in….


a.       Web Browser
b.      Text files
c.       Encrypted files
d.      Key Database


57.  The parameters for Create() function are:


a.       LPCTSTR lpszClassName
b.      LPCTSTR lpszWindowName
c.       DWORD dwStyle
d.      lpszMenuName
e.       All of these


58.  Which function is essential for DLL files:


a.       DllMain
b.      DefMain
c.       VoidMain
d.      Main


59.  Parameter contains:


a.       ID
b.      wParam
c.       lParam
d.      All of these


60.  Which is the Scroll message handler:


a.       WM_VSCROLL
b.      WM_HSCROLL
c.       Both a and b
d.      None of these


61.  Which is the base class for Bitmap:


a.       CBitmap
b.      CView
c.       CScrollView
d.      None of these


62.  Which function load bitmap image into CBitmap object:


a.       LoadBitmapW
b.      StartBitmap
c.       DeleteBitmap
d.      None of these



63.  Which function is used to get size of scrolls:
a.       GetDeviceScrollSizes()
64.  Which is the parent of all MFC view classes:


a.       CDocView
b.      CTableView
c.       CScrollView
d.      CView


65.  The nMapMode argument holds a mapping mode that is:


a.       MM_TEXT
b.      MM_HIMETRIC
c.       MM_TWIPS
d.      MM_HIENGLISH
e.       All of these


66.   _______ handles the connections from client and can provide several independent screens:


a.       Client
b.      Server
c.       Both a and b
d.      None of these


67.  What is required to provide the control for X server:


a.       Client’s hostname
b.      IP address
c.       Both a and b
d.      None of these


68.  By which program we can manipulate the access control list:


a.       Xhost
b.      Xhost+hostname
c.       Xhost-hostname
d.      None of these


69.  We can add a host to the list with:


a.       Xhost
b.      Xhost+hostname
c.       Xhost-hostname
d.      None of these


70.  We can remove host from the list with:


a.       Xhost
b.      Xhost+hostname
c.       Xhost-hostname
d.      None of these


71.  DECNET stands for:
a.       Digital Equipment Corporation Networking
72.  X contains:


a.       X Protocol
b.      X Display Server
c.       X Client
d.      Xlib routines


e.       All of these
73.  X was developed to create a platform-independent network-based:


a.       A complete OS
b.      Graphical User environment
c.       Both a and b
d.      None of these


74.  The X window protocol has the server that provides the ________ windowing mechanism:


a.       Advance basic
b.      Advance
c.       Basic
d.      None of these


75.  Server handles the connections from ________ and can provides several independent screens:


a.       Other servers
b.      Clients
c.       Internet
d.      None of these


76.  The function of the X Window is:


a.       Establish a connection with the X server
b.      Create a window
c.       Create X resources
d.      Wait, detect and perform event
e.       All of these


77.  The X windows system is GUI and is entirely based on:


a.       Microsoft Windows
b.      Macintosh Operating System
c.       Both a and b
d.      None of these


78.  The X-Term terminal emulator and the user interface that supports:


a.       Window
b.      Mouse
c.       Keyboard
d.      All of these


79.  It is used to listen to the network connections at a specific port is called:


a.       X Client
b.      X Server
c.       X Window
d.      X application


80.  X Server supports:


a.       Single Window Mode
b.      Multiple Window Mode
c.       Both a and b
d.      None of these


81.  Which network protocol is supported by X:


a.       TCP/IP
b.      DECNET
c.       STREAMS
d.      All of these


82.  Which variable is used to determine where the x server is located:


a.       Display
b.      Search
c.       Both a and b
d.      None of these


83.  What is the name of function that is added for WM_KEYDOWN:


a.       OnKeyDown
b.      OnKeyUp
c.       Both a and b
d.      None of these


84.  Which is the parameters / arguments of OnKeyDown function:


a.       nChar
b.      nRepCnt
c.       nFlags
d.      All of these


85.  Which function is used to set cursor:
a.       SetCursor
86.  In OnKeyDown which argument represent the number of times of key pressing:


a.       nChar
b.      nRepCnt
c.       nFlags
d.      None of these


87.   Which argument keeps a combination flag that checks whether key is being pressed at the same time with the other keys:


a.       nChar
b.      nRepCnt
c.       nFlags
d.      None of these


88.  The Class Wizard is use function for WM_SETCURSOR message:
a.       OnSetCursor
89.  To register your own window class containing the desired mouse pointer by using:


a.       AfxRegisterClass()
b.      AfxRegisterWndClass()
c.       Both a and b
d.      None of these


90.  Which class refers to the co-ordination point of screen:
a.       CPoint
91.  In which namespace cursor are stored:
a.       Cursor namespace
92.  Which is the property of the panel control:


a.       Location
b.      Size
c.       Border Style
d.      Cursor
e.       All of these


93.  Which is the protective mechanism that lies between the computer network and the Internet to protect from malfunctions and network-based security threats:


a.       Firewall
b.      Archie
c.       Finger
d.      Active attacks


94.  Which indicator represents the position of the mouse on a screen:


a.       Cursor
b.      Mouse
c.       Keyboard
d.      None of these


95.  Which program is used for searches files anywhere on the network by the filename:


a.       Archie
b.      Firewall
c.       Finger
d.      Active attacks


****************************************************************