A. two.
B. three.
C. four.
D. infinite.
Three types of logic gates are- “Not gate”, “OR gate” and “AND gate”.
A. logic algebra.
B. symbolic algebra.
C. George Boole algebra.
D. switching algebra.
It is so called because logic problems are binary decisions and Boolean algebra deals with these binary values.
A. binary statement.
B. compound statement.
C. boolean statement.
D. switching statement.
A compound statement consists of zero or more statements enclosed in curly braces { }. Compound statements are commonly called "blocks."
A. B’.C.A
B. B’.C + A
C. B.C + A’
D. B’.C.A’
Changing (+) to (.) and vice-versa and by replacing 0’s with 1’s and1’s with 0’s, the dual of the expression can be obtained.
A. X + X.Y = X
B. X + X’.Y = X
C. X + X.Y’ = X
D. X + X.Y = X’
The expression can be proved with the help of truth table. The values of X and X+XY are the same and therefore, this law is known as absorption law.
A. tautological statement.
B. logical statement.
C. boolean statements.
D. relational statements.
A statement which can be classified as true or false without ambiguity, is known as a logical statement.
A. logical variables.
B. logical constants.
C. binary statement.
D. binary constants.
In symbolic logic, a logical constant of a language L is a symbol that has the same semantic value in all models of (the expressions of) L. Two important types of logical constants are logical connectives and quantifiers.
A. switching speed.
B. running speed.
C. packet speed.
D. circuit speed.
Switching speed is the speed with which an electronic switch can change from ON to OFF and vice-versa. It is usually expressed in terms of the propagation delay time.
A.
A.B’ + C
B. A+B’.C
C.
A.’B’ +C
D. A+B+C’
Changing (+) to (.) and vice-versa and by replacing 0’s with 1’s and 1’s with 0’s, the dual of the expression can be obtained.
A. 1.
B. 0.
C. no output.
D. infinite.
In an inverter, output is always the reverse of the input. Therefore, when input is 1, the output will be 0.
A. x.y+x’.z’+y.z’
B. x.y+x’.z’+y’.z
C. x.y+x’.z’+y.z
D. x’.y+x’.z’+y.z
Changing (+) to (.) and vice-versa and by replacing 0’s with 1’s and 1’s with 0’s, the dual of the expression can be obtained.
A. X+X=1
B. X+X’=0
C. X’+X’=1
D. X+X’=1
Changing (+) to (.) and vice-versa and by replacing 0’s with 1’s and 1’s with 0’s, the dual of the expression can be obtained.
A. these gates were the first to develop.
B. these gates are combination of NOT, AND, OR gates.
C. any circuit diagram is possible using these two gates.
D. these gates follow distributive law.
NAND and NOR are functionally complete gates, i.e., any gate can be formed using these two gates.
A. 1110011.
B. 1111000.
C. 0110011.
D. 0010111.
The output of the NOT gate is always the reverse of the input. Here, 1 will be replaced by 0 and 0 will be replaced by 1.
A. processing is fast in boolean variable.
B. boolean variable is easy to use.
C. boolean variable takes only two values.
D. boolean variables are more widely used.
In the ordinary algebra, the variables can take any value like 1,2,3, etc. but the boolean variables can take only two values 0 and 1.
A. A+C’+C’D.
B. A’+B’C+C’D.
C. A+B’C’+C’D’.
D. A’+B’C’+C’D.
[A(B+C)(C+D’)]’ = A’ + (B+C)’ + (C + D’)’ = A’ + B’C’ + C’D.
A. to enhance the output.
B. to carry the calculations.
C. to reduce the cost.
D. to attract the users.
The main purpose is to reduce the number of gates required to build that function. Reduction of the gates reduces the cost of the circuit.
A. ((x’+y’)(x+z’))’.
B. ((x’+y’)(x+z’)).
C. ((x’+y’)(x+z))’.
D. ((x’+y)(x+z’))’.
(xy +x’z) = (xy +x’z)’ = ((xy)’.(x’z)’)’ = ((x’ + y’)(x + z’))’.
A. x’y’.
B. x’+y.
C. x’y.
D. xy’.
Changing (+) to (.) and vice-versa and by replacing 0’s with 1’s and1’s with 0’s, the dual of the expression can be obtained.
A. to maximize the boolean expression.
B. to correct the boolean expression.
C. to verify the boolean expression.
D. to minimize the Boolean expression.
The Karnaugh map, also known as a Veitch diagram, is a tool to facilitate the simplification of boolean algebra integrated circuit expressions.
A. produces 0 if the number of 1 inputs is odd.
B. produces 1 if the number of 1 inputs is even.
C. produces 1 if the number of 1 inputs is odd.
D. produces 1 if the number of 0 inputs is odd.
XOR gate has two or more inputs but one output,. It produces output 1 for only those input combinations that have odd number of 1's.
A. Exercise is necessary for good health.
B. Desert rats can survive longest without water.
C. Sound needs a medium to travel.
D. A camel’s hump stores water.
If the result is always FASLE or 0 it is called fallacy.
A. Dinosaurs are extinct.
B. Add the numbers.
C. Switch on the radio.
D. Finish your homework.
Sentences which can be determined to be true or false are called logical statements or truth functions and the results TRUE or FALSE are called truth values.
A. AND
B. OR
C. NOT
D. NOR
OR operator denotes operation called logical addition and the symbol used for it is +.
A. AND.
B. OR.
C. NOT
D. NOR.
AND operator performs another important operation of boolean algebra called logical multiplication and the symbol for AND operation is (.) dot.
A. Venn diagram.
B. K-map.
C. Truth Table.
D. AND logic gate.
Karnaugh map or K-map is a graphical display of the fundamental products in a truth table. Karnaugh map is nothing but a rectangle made up of certain number of squares, each square representing a Maxterm or Minterm.
A. inverted gates.
B. combination gates.
C. universal gates.
D. dual gates.
NAND gates are one of the two basic logic gates (the other being NOR logic) from which any other logic gates can be built. Due to this property, NAND and NOR gates are sometimes called "universal gates".
A. outputs 1 if any input is 1.
B. outputs 1 only if all inputs are 1.
C. outputs 1 if any input is 0.
D. outputs 0 if all inputs are 1.
AND operator performs another important operation of boolean algebra called logical multiplication and the symbol for AND operation is (.) dot. Thus, X.Y will be read as X AND Y.
The rules for AND operation are :
0.0=0
0.1=0
1.0=0
1.1=1
A. has 2 inputs and one output.
B. has 1 input and 2 outputs.
C. outputs 1 if input is 0.
D. outputs 1 if input is 1.
NOT operator operates on single variable and operation performed by NOT operator is called complementation.
A. overlapped group.
B. rolled over group.
C. reduced group.
D. redundant group.
Redundant Group is a group whose all 1's are overlapped by other groups (i.e., pairs, quads, octets). The removal of redundant group leads to much simpler expression.

A. two-input OR gate.
B. exclusive OR gate.
C. two-input AND gate.
D. exclusive NOR gate.
The OR operator denotes operation called logical addition and the symbol we use for it is +. The + symbol, therefore, does not have the 'normal' meaning, but is a logical addition or logical OR symbol. Thus A+B can be read as A OR B.
A. Gray code.
B. boolean values.
C. minterms.
D. canonical terms.
Gray code is the binary code in which each successive number differs only in one place.
A. 3n.
B. n2.
C. 23.
D. 2n.
There are 2n different n-tuples of 0s and 1s. A Boolean function is an assignment of 0 or 1 to each of these 2n different n-tuples.
Mathematical operators like +, -, /, * are used with variables to form algebraic expressions, like, a + b – c*d.
NOT, AND and OR are logical operators used to form logical expressions, such as, NOT French, English AND German, English OR German.
NOT operator
Not French - the only specification is that the person should not be French.
The Venn diagram below shows X as the set of French persons, the rest of the area, leaving X, represents those other than French, i.e. X. Thus, the bar negates X, or stands for the complement of X.
|
X |
_ X |
|
0 |
1 |
|
1 |
0 |

Truth Table for NOT operator
NOT operates on a single variable hence is a unary operator.
The AND operator
English AND German - our search is narrowed, as we can consider only those who know English as well as German. The logical AND operator is represented by '.' and is called logical multiplication. The Venn diagram shows the rectangle as all the available people, F is English speakers, H is German speakers and the overlapping part is people who know both. AND allows us to pick up only from the overlapped part.
|
X |
Y |
X . Y |
|
0 |
0 |
0 |
|
0 |
1 |
0 |
|
1 |
0 |
0 |
|
1 |
1 |
1 |

Truth Table for AND operator
The truth table shows that if X and Y both, are 1, the result of X.Y is 1.
The OR operator
English OR German - our search is broadened, as we can consider people who know English, those who know German, or both. The logical OR operator is represented by '+' and is called logical addition. The Venn diagram shows the rectangle as all the available people, F is English speakers, H is German speakers and the overlapping part is people who know both. OR allows us to pick up from any of the areas covered by F and H.
|
X |
Y |
X + Y |
|
0 |
0 |
0 |
|
0 |
1 |
1 |
|
1 |
0 |
1 |
|
1 |
1 |
1 |

Truth Table for OR operator
The truth table shows that if X or Y is 1, the result of X + Y is 1.
De Morgan’s two theorems are: 1
2
and
The first theorem says that when the sum(OR) of two variables is inverted, this is the same as inverting each variable individually and then ANDing these inverted variables.
![]()
According to Complementarity Law
(1)
and
(2) ![]()
The first of these laws states that when a logical variable (or expression) is added to its complement, the output is 1.
The second law states that when a logical variable (or expression) is multiplied with its complement, the output is 0.
Let us assume A = X + Y where A, X and Y are logical variables.
According to the Complimentarity Law,
and ![]()
![]()
If A = X + Y, then, A = X + Y ,
+ which according to De Morgan’s first theorem is equal to X.Y So, we will try to prove that
![]()
![]()
![]()
(X + Y) + X . Y = 1 and (X + Y) . X Y = 0
![]()
Proving (X + Y) + X . Y = 1

![]()
Proving (X + Y).X Y = 0
Thus De Morgan’s first theorem is proved.

Thus De Morgan’s first theorem is proved.
A. LAN.
B. MAN.
C. WAN.
D. WLL.
WAN stands for Wide Area Network. As the name suggests, it is a computer network that covers a far wider area than a LAN (Local Area Network). WANs cover cities, countries, continents and the whole world.
A. MAN.
B. WAN.
C. WLL.
D. LAN.
A local area network (LAN) is a computer network covering a small physical area like home, office or small group of buildings such as a school or an airport.
A. is a server on a network.
B. is a router.
C. is any computer on a network.
D. is present only in star topology.
A node is any device connected to a computer network. Nodes can be computers, Personal Digital Assistants (PDAs), cell phones or various other network appliances. On an IP network, a node is any device with an IP address.
A. manner in which data is transmitted.
B. interconnection of dissimilar networks.
C. pattern of inter-connection of nodes.
D. number of nodes in a network.
Topology refers to the way in which the network of computers is connected. Each topology is suited to specific tasks and has its own advantages and disadvantages.
A. bus topology.
B. star topology.
C. ring topology.
D. tree topology.
A star topology is one of the most common network setups where each of the devices and computers on a network connects to a central hub.
A. long cable length.
B. complexity.
C. centralization.
D. fault diagnosis problem.
Although bus topology is very simple, fault detection is very difficult in it. Hence, it is a disadvantage.
A. Large Application Number.
B. Large Authorised Network.
C. Local Area Network.
D. Large Authorisation Network.
A Local Area Network (LAN) is a computer network covering a small physical area like a home, office or small group of buildings such as a school or an airport.
A. Wide Area Network.
B. World Action Number.
C. Wide Action Normalization.
D. World Area Network.
Wide Area Network (WAN) is a computer network that covers a broad area, i.e., any network whose communication links cross metropolitan, regional or national boundaries.
A. SLIP.
B. WLL.
C. XML.
D. MOSAIC.
The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of the Internet Protocol designed to work over serial ports and modem connections.
A. Archie.
B. Veronica.
C. WAIS.
D. cracker.
Veronica is a search engine system for the Gopher protocol, developed in 1992 by Steven Foster and Fred Barrie at the University of Nevada, Reno.
A. 3G.
B. cookie.
C. archie.
D. host.
Host System’s usually run a multi-user operating system such as Unix, MVS or VMS, or at least an operating system with network services such as Windows NT, NetWare NDS or NetWare Bindery.
A. cheap.
B. minimum cost of installation.
C. hardware compatibility.
D. free from disturbances.
The advantage of optical fibers is that it is free from any type of disturbances like noise distortion.
A. repeater.
B. bridge.
C. router.
D. gateway.
A bridge is a device that helps to link two networks together. They are smart enough to know which computers are on which side of the bridge, so they only allow those messages that need to get to the other side to cross the bridge.
A. hub.
B. concentrator.
C. gateway.
D. modem.
Concentrator is a device that connects a number of circuits, which are not used at once, to a smaller group of circuits for economy.
A. modem.
B. gateway.
C. switch.
D. hub.
Modem is a device that modulates an analog carrier signal to encode digital information and also demodulates such a carrier signal to decode the transmitted information.
A. cookies.
B. firewall.
C. biometric systems.
D. smart cards.
Cookies are the parcels of text sent by a server to web client and then sent back unchanged by the client each time it accesses that server. HTTP cookies are used for authenticating session and maintaining specific information about users.
A. IC talk.
B. crosstalk.
C. corrupt talk.
D. interrelated talk.
Any phenomenon by which a signal transmitted on one circuit or channel of transmission system creates an undesirable effect in another circuit or channel is known as crosstalk. It is caused by capacitive, inductive or conducting coupling from one circuit to another.
A. MAN.
B. VAN.
C. LAN.
D. WAN.
A local area network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building.
A. chatting.
B. video-conferencing.
C. multi-conferencing.
D. two-way crosstalk.
Video-conferencing is a set of interactive telecommunication technologies, which allow two or more location to interact via two-way video and audio transmission simultaneously.
A. crackers.
B. cookies.
C. hackers.
D. host.
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge.
A. domain name system.
B. server name system.
C. character based system.
D. data based system.
DNS is a hierarchical naming system for computer, services or any resource participating in the internet. It also associates various information with domain names assigned to such participants.
A. bridge.
B. router.
C. repeater.
D. switch.
A repeater is an electronic device that receives a signal and retransmits it at a higher level, so that, the signal can cover longer distances without degradation.
A. hub.
B. concentrator.
C. connector.
D. switch.
A hub is a small rectangular box, often made up of plastic that receives its power from an ordinary wall outlet. A hub joins multiple computers to form a single network segment.
A. one type.
B. two types.
C. three types.
D. four types.
There are 3 types of modulation techniques: Amplitude modulation, Frequency modulation and Phase modulation.
A. modulation.
B. amplification.
C. frequency distribution.
D. crest formation.
Modulation is the process of varying a periodic waveform i.e. a tone, in order to use that signal to convey a message.
A. star.
B. bus.
C. ring.
D. circle.
In "star" topology communication between stations is passed through the central node.
A. node connection.
B. topology.
C. topography.
D. nodal system.
Network topology is the study of the arrangements or mapping of the elements of a network, especially the physical and logical interconnection between nodes.
A. RJ-45.
B. RJ-50.
C. RJ-55.
D. RJ-60.
RJ-45 is a registered jack connector and wiring pattern used for connection of a high-speed modem to a telephone network using a keyed 8P8C (8 position 8 contact) modular connector. 8P8C plugs and sockets are most regularly used as Ethernet connector.
A. data packets.
B. proxy server.
C. circuit-level gateway.
D. cookies.
Cookies are messages that a web server transmits to a browser so that the server can keep track of user's activity on a particular site.
A. LAN
B. WAN
C. MAN
D. ZAN
A MAN is optimized for a larger geographical area than LAN, ranging from several blocks of building to entire cities.
A. GMSK.
B. GPRS.
C. ETSI.
D. GSM.
GSM (Global System for Mobile communication) is a digital mobile telephony system that is widely used in all over the world. GSM is so called because it differs from its predecessors in both signaling and speech channels.
A. XML
B. HTML
C. HTTP
D. FTTP
XML is extensible markup language, which allows the user to define the mark-up elements.
A. baud.
B. amplitude.
C. frequency difference.
D. bandwidth.
Bandwidth is the measure of available or consumed data communication resources expressed in bit or multiple of bits.
A. bps.
B. gps.
C. mps.
D. rps.
Bit rate(bps) is the number of bits that are conveyed or processed per unit of time. Bit rate is quantified using the bits per second unit, often in conjunction with an SI prefix such as kilo, mega, giga or tera.
A. infrared.
B. laser.
C. microwave.
D. radio wave.
The laser transmission requires direct line-of-sight. The laser transmission is point-to-point transmission, typically between buildings
A. hackers.
B. crackers.
C. authenticators.
D. designers.
Cracker is a person, who breaks security, encryption or digital rights management scheme.
A. Code Duplication Multiple Access.
B. Character Division Multiple Access.
C. Code Division Multiple Access.
D. Character Duplication Multiple Access.
CDMA is a channel access method utilized by various radio communication technologies.
A. cookies.
B. biometric system.
C. encrypted smart card.
D. firewall.
A firewall is an integrated collection of security measures designed to prevent unauthorized access to a networked computer system.
A. multiply it with (X+X’).
B. add (X+X’).
C. add (X.X’).
D. multiply it with (X.X’).
MINTERM is a product of all the literals (with or without the bar) within the logic system.
A. AND OR NOT.
B. NOT OR AND.
C. OR AND NOT.
D. NOT AND OR.
Logic statements or truth functions are combined with the help of Logical Operators like AND, OR and NOT to form a Compound Statement or Logical function.
A. adds the latter half of a number.
B. adds the front half of the number.
C. adds 2 bytes.
D. adds 2 bits.
A half adder adds two bits together but cannot add in a carry from a previous operation.
A. $.
B. &.
C. ^.
D.
.
The XOR Gate produces output 1 for only those input combinations that have odd number 1's.
A. inverted OR gate.
B. inverted AND gate.
C. is also known as AND gate.
D. inverted XOR gate.
The NOR gate has two or more input signals but only one output signal. If all the inputs are 0 (i.e., low), then the output signal is 1 (high).
A.
X’Y’ + XY’
B.
(X+Y).(X’+Y)
C.
(X’+Y’).(X+Y’)
D. (X+Y).(X+Y)
Use duality principle, changing (+) to (.) and vice-versa and by replacing 0's with 1's and 1's with 0's.
A. logical multiplication.
B. logical division.
C. logical addition.
D. logical subtraction.
AND Operator performs another important operation of boolean algebra called logical multiplication and the symbol for AND operation is (.) dot. Thus X.Y will be read as X and Y.
A. logical multiplication.
B. logical division.
C. logical addition.
D. logical subtraction.
OR operator denotes operation called logical addition and the symbol used for it is '+'. The + symbol, therefore, does not have the 'normal' meaning but it is a logical addition or logical OR symbol. The X+Y can be read as X OR Y.
A. Inverter.
B. Converter.
C. Opposer.
D. Terminator.

A. (X.1) + (X+0+X’)
B. (X’.0) + (X’+1+X)
C. (X+1) . (X.0.X’)
D. (X’+1) . (X’.0.X)
Use duality principle, changing (+) to (.) and vice-versa and by replacing 0's with 1's and 1's with 0's.
A. X + X
B. X.X'
C. X+X''
D. take its dual
Idenpotence Law staes that a) X + X =X b) X.X = X
A. Exercise is necessary for good health.
B. Desert rats can survive longest without water.
C. Sound needs a medium to travel.
D. A camel's hump stores water.
A statement which is always false is fallacy.
A. 44.
B. 24.
C. 23.
D. 22.
If there are n inputs, then the number of possible combinations are n!.
A. boolean values are multiplied.
B. different sum terms are multiplied.
C. boolean variables are connected by * operator.
D. boolean variables are connected by AND operator.
When a boolean expression is represented purely as product of Maxterms, it is said to be in canonical product-of-sum form of expression.
A. X + X = X
B. X - X = X
C. X + X = 2X
D. X - X = 0
The two postulates of Idempotence law states that: X + X = X X . X = X
A. Basic postulates of Boolean Algebra.
B. Absorption Law.
C. De Morgan’s theorems.
D. Principle of Duality.
DeMorgan's theorem's are :

A. Karn map.
B. POS map.
C. Karnnaugh map.
D. SOP map.
Karnaugh map or K-map is a graphical display of fundamental products in a truth table.
A. have 3 variables.
B. have 4 variables.
C. have 2 variables.
D. have 8 variables.
The Karnaugh map, also known as a Veitch diagram (KV-map or K-map for short), is a method to simplify Boolean algebra expressions.
A. main gates.
B. logic circuits.
C. output gates.
D. input circuits.
Gates are digital circuits because the input and output signals are either low voltage or high voltage. Gates are often called logic circuits because they can be analyzed with boolean algebra.
A. outputs 1 if any input is 1.
B. outputs 1 only if all inputs are 1.
C. outputs 0 if any input is 0.
D. outputs 0 if all inputs are 1.
OR operator denotes operation called logical addition and the symbol used for it is '+'. For OR operation, the possible input and output combinations are as follows :
0+0=0
0+1=1
1+0=1
1+1=1
A. biometric systems.
B. firewall.
C. encrypted smart card.
D. cookies.
In IT, biometrics refers to technologies that measure and analyze human body characteristics such as fingerprints, eye retinas, irises, voice patterns, facial patterns and hand measurements for authentication purposes.
A. telnet.
B. www.
C. web hosting.
D. web browsing.
Telnet refers to a software, which implements the client part of the protocol.Telnet offers users the capability of running programs remotely and facilitates remote administration.
A. one type.
B. two types.
C. three types.
D. four types.
There are two types of coaxial cables: Thicknet and Thinnet cables.
A. twisted pair.
B. copper wire.
C. optical fibre.
D. coaxial cable.
Coaxial cables are usually made of a conducting wire. One layer is of insulation, another layer of conducting material. Such cables are used as a high-frequency transmission line to carry a high-frequency or broadband signal.
A. paradigms.
B. simple formats.
C. packets.
D. protocols.
A protocol means the rules that are applicable for a network, they define standardised formats.
A. message switching.
B. circuit switching.
C. packet switching.
D. network switching.
Store and forward principle applies to message switching. Data is stored first in buffer and then delivered to the destination.
A. concentrator.
B. repeater.
C. connector.
D. Ethernet card.