COMPUTER SCIENCE AND APPLICATIONS- PAGE 2
1. When data and acknowledgement are sent in the same frame, this is called as
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing
Ans: B
2. Encryption and Decryption is the responsibility of _______ Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink
Ans: C
3. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are _______ and _______.
(A) 4000 bauds \ sec & 1000 bps
(B) 2000 bauds \ sec & 1000 bps
(C) 1000 bauds \ sec & 500 bps
(D) 1000 bauds \ sec & 4000 bps
Ans: D
4. The VLF and LF bauds use _______ propagation for communication.
(A) Ground (B) Sky
(C) Line of sight (D) Space
Ans: A
5. Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is
(A) 101 (B) 103
(C) 105 (D) 107
Ans: B
6. FAN IN of a component A is defined as
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
Ans: A
7. The relationship of data elements in a module is called
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity
Ans: C
8. Software Configuration Management is the discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
Ans: D
9. Which one of the following is not a step of requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysis
(C) Requirement design
(D) Requirement documentation
Ans: C
10. Testing of software with actual data and in actual environment is called
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above
Ans: B
11. The student marks should not be greater than 100. This is
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
Ans: A
12. GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to
(A) 28th record (B) 27th record
(C) 3rd record (D) 4th record
Ans: B
13. An ER Model includes
I. An ER diagram portraying entity types.
II. Attributes for each entity type
III. Relationships among entity types.
IV. Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV (B) I & IV
(C) I, II & IV (D) I & III
Ans: A
14. Based on the cardinality ratio and participation ________ associated with a relationship type, choose either the Foreign Key Design, the
Cross Referencing Design or Mutual Referencing Design.
(A) Entity (B) Constraints
(C) Rules (D) Keys
Ans: B
15. Data Integrity control uses _______
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
Ans: B
16. What does the following declaration mean ?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
Ans: B
17. Which of the following has compilation error in C ?
(A) int n = 32 ;
(B) char ch = 65 ;
(C) float f = (float) 3.2 ;
(D) none of the above
Ans: D
18. Which of the following operators can not be overloaded in C+ + ?
(A) ∗ (B) + =
(C) = = (D) : :
Ans: D
19. _________ allows to create classes which are derived from other classes, so that they automatically include some of its “parent’s” members, plus its own members.
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation
Ans: B
20. The correct way to round off a floating number x to an integer value is
(A) y = (int) (x + 0.5)
(B) y = int (x + 0.5)
(C) y = (int) x + 0.5
(D) y = (int) ((int)x + 0.5)
Ans: A
21. If the queue is implemented with a linked list, keeping track of a front pointer and a rear pointer, which of these pointers will change during an insertion into a non-empty queue ?
(A) Neither of the pointers change
(B) Only front pointer changes
(C) Only rear pointer changes
(D) Both of the pointers changes
Ans: C
22. _______ is often used to prove the correctness of a recursive function.
(A) Diagonalization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
Ans: C
23. For any B-tree of minimum degree t ≥ 2, every node other than the root must have atleast ________ keys and every node can have at most
________ keys.
(A) t – 1, 2t + 1
(B) t + 1, 2t + 1
(C) t – 1, 2t – 1
(D) t + 1, 2t – 1
Ans: C
24. Given two sorted list of size ‘m’ and ‘n’ respectively. The number of comparison needed in the worst case by the merge sort algorithm will be
(A) m × n
(B) max (m, n)
(C) min (m, n)
(D) m + n – 1
Ans: D
25. Given the following statements :
S1 : SLR uses follow information to guide reductions. In case of LR and LALR parsers, the lookaheads are associated with the items and they make use of the left context available to the parser.
S2 : LR grammar is a larger subclass of context free grammar as compared to that SLR and LALR grammars.
Which of the following is true ?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
Ans: D
26. The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called _______.
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation
Ans: D
27. Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right.
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation
Ans: A
28. The dual of a Boolean expression is obtained by interchanging
(A) Boolean sums and Boolean products
(B) Boolean sums and Boolean products or interchanging 0’s and 1’s
(C) Boolean sums and Boolean products and interchanging 0’s & 1’s
(D) Interchanging 0’s and 1’s
Ans: C
29. Let f and g be the functions from the set of integers to the set integers defined by f(x) = 2x + 3 and g(x) = 3x + 2 Then the composition of f and g and g and f is given as
(A) 6x + 7, 6x + 11
(B) 6x + 11, 6x + 7
(C) 5x + 5, 5x + 5
(D) None of the above
Ans: A
30. Which of the following statements are true ?
I. A circuit that adds two bits, producing a sum bit and a carry bit is called half adder.
II. A circuit that adds two bits, producing a sum bit and a carry bit is called full adder.
III. A circuit that adds two bits and a carry bit producing a sum bit and a carry bit is called full adder.
IV. A device that accepts the value of a Boolean variable as input and produces its complement is called an inverter.
(A) I & II (B) II & III
(C) I, II, III (D) I, III & IV
Ans: D
31. Active X controls are Pentium binary programs that can be embedded in ________
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages
Ans: D
32. Match the following :
List – I List – II
a. Wireless Application Environment i. HTTP
b. Wireless Transaction Protocol ii. IP
c. Wireless Datagram Protocol iii. Scripts
d. Wireless iv. UDP
Codes :
a b c d
(A) ii iv i iii
(B) iv iii ii i
(C) iv iii i ii
(D) iii i iv ii
Ans: D
33. Which of the following is widely used inside the telephone system for long-haul data traffic ?
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN
Ans: B
34. The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the
following standard organisation :
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE
Ans: B
35. Electronic Data Interchange Software consists of the following four layers :
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope
Ans: B
36. The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64 page table entries and a
4-way set associative (i.e. with 4- cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is
(A) 12 bits
(B) 15 bits
(C) 16 bits
(D) 20 bits
Ans: C
37. How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ?
(A) 332.8 KB
(B) 83.6 KB
(C) 266.2 KB
(D) 256.6 KB
Ans: A
38. Linux operating system uses
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next
Ans: B
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing
Ans: B
2. Encryption and Decryption is the responsibility of _______ Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink
Ans: C
3. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are _______ and _______.
(A) 4000 bauds \ sec & 1000 bps
(B) 2000 bauds \ sec & 1000 bps
(C) 1000 bauds \ sec & 500 bps
(D) 1000 bauds \ sec & 4000 bps
Ans: D
4. The VLF and LF bauds use _______ propagation for communication.
(A) Ground (B) Sky
(C) Line of sight (D) Space
Ans: A
5. Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is
(A) 101 (B) 103
(C) 105 (D) 107
Ans: B
6. FAN IN of a component A is defined as
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
Ans: A
7. The relationship of data elements in a module is called
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity
Ans: C
8. Software Configuration Management is the discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
Ans: D
9. Which one of the following is not a step of requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysis
(C) Requirement design
(D) Requirement documentation
Ans: C
10. Testing of software with actual data and in actual environment is called
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above
Ans: B
11. The student marks should not be greater than 100. This is
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
Ans: A
12. GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to
(A) 28th record (B) 27th record
(C) 3rd record (D) 4th record
Ans: B
13. An ER Model includes
I. An ER diagram portraying entity types.
II. Attributes for each entity type
III. Relationships among entity types.
IV. Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV (B) I & IV
(C) I, II & IV (D) I & III
Ans: A
14. Based on the cardinality ratio and participation ________ associated with a relationship type, choose either the Foreign Key Design, the
Cross Referencing Design or Mutual Referencing Design.
(A) Entity (B) Constraints
(C) Rules (D) Keys
Ans: B
15. Data Integrity control uses _______
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
Ans: B
16. What does the following declaration mean ?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
Ans: B
17. Which of the following has compilation error in C ?
(A) int n = 32 ;
(B) char ch = 65 ;
(C) float f = (float) 3.2 ;
(D) none of the above
Ans: D
18. Which of the following operators can not be overloaded in C+ + ?
(A) ∗ (B) + =
(C) = = (D) : :
Ans: D
19. _________ allows to create classes which are derived from other classes, so that they automatically include some of its “parent’s” members, plus its own members.
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation
Ans: B
20. The correct way to round off a floating number x to an integer value is
(A) y = (int) (x + 0.5)
(B) y = int (x + 0.5)
(C) y = (int) x + 0.5
(D) y = (int) ((int)x + 0.5)
Ans: A
21. If the queue is implemented with a linked list, keeping track of a front pointer and a rear pointer, which of these pointers will change during an insertion into a non-empty queue ?
(A) Neither of the pointers change
(B) Only front pointer changes
(C) Only rear pointer changes
(D) Both of the pointers changes
Ans: C
22. _______ is often used to prove the correctness of a recursive function.
(A) Diagonalization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
Ans: C
23. For any B-tree of minimum degree t ≥ 2, every node other than the root must have atleast ________ keys and every node can have at most
________ keys.
(A) t – 1, 2t + 1
(B) t + 1, 2t + 1
(C) t – 1, 2t – 1
(D) t + 1, 2t – 1
Ans: C
24. Given two sorted list of size ‘m’ and ‘n’ respectively. The number of comparison needed in the worst case by the merge sort algorithm will be
(A) m × n
(B) max (m, n)
(C) min (m, n)
(D) m + n – 1
Ans: D
25. Given the following statements :
S1 : SLR uses follow information to guide reductions. In case of LR and LALR parsers, the lookaheads are associated with the items and they make use of the left context available to the parser.
S2 : LR grammar is a larger subclass of context free grammar as compared to that SLR and LALR grammars.
Which of the following is true ?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
Ans: D
26. The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called _______.
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation
Ans: D
27. Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right.
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation
Ans: A
28. The dual of a Boolean expression is obtained by interchanging
(A) Boolean sums and Boolean products
(B) Boolean sums and Boolean products or interchanging 0’s and 1’s
(C) Boolean sums and Boolean products and interchanging 0’s & 1’s
(D) Interchanging 0’s and 1’s
Ans: C
29. Let f and g be the functions from the set of integers to the set integers defined by f(x) = 2x + 3 and g(x) = 3x + 2 Then the composition of f and g and g and f is given as
(A) 6x + 7, 6x + 11
(B) 6x + 11, 6x + 7
(C) 5x + 5, 5x + 5
(D) None of the above
Ans: A
30. Which of the following statements are true ?
I. A circuit that adds two bits, producing a sum bit and a carry bit is called half adder.
II. A circuit that adds two bits, producing a sum bit and a carry bit is called full adder.
III. A circuit that adds two bits and a carry bit producing a sum bit and a carry bit is called full adder.
IV. A device that accepts the value of a Boolean variable as input and produces its complement is called an inverter.
(A) I & II (B) II & III
(C) I, II, III (D) I, III & IV
Ans: D
31. Active X controls are Pentium binary programs that can be embedded in ________
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages
Ans: D
32. Match the following :
List – I List – II
a. Wireless Application Environment i. HTTP
b. Wireless Transaction Protocol ii. IP
c. Wireless Datagram Protocol iii. Scripts
d. Wireless iv. UDP
Codes :
a b c d
(A) ii iv i iii
(B) iv iii ii i
(C) iv iii i ii
(D) iii i iv ii
Ans: D
33. Which of the following is widely used inside the telephone system for long-haul data traffic ?
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN
Ans: B
34. The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the
following standard organisation :
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE
Ans: B
35. Electronic Data Interchange Software consists of the following four layers :
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope
Ans: B
36. The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64 page table entries and a
4-way set associative (i.e. with 4- cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is
(A) 12 bits
(B) 15 bits
(C) 16 bits
(D) 20 bits
Ans: C
37. How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ?
(A) 332.8 KB
(B) 83.6 KB
(C) 266.2 KB
(D) 256.6 KB
Ans: A
38. Linux operating system uses
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next
Ans: B
39. What does the following expression means ?
char ∗(∗(∗ a[N]) ( )) ( );
(A) a pointer to a function returning array of n pointers to function returning character pointers.
(B) a function return array of N pointers to functions returning pointers to characters
(C) an array of n pointers to function returning pointers to characters
(D) an array of n pointers to function returning pointers to functions returning pointers to characters.
Ans: All options are correct
40. In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced page is modified. What is the average access time to service a page fault assuming that the page to be replaced is modified 70% of the time ?
(A) 11.6 m.sec. (B) 16.4 m.sec.
(C) 28 m.sec. (D) 14 m.sec.
Ans: B
41. __________ are applied throughout the software process.
(A) Framework activities (B) Umbrella activities
(C) Planning activities (D) Construction activities
Ans: B
42. Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level
(A) Performed
(B) Managed
(C) Defined
(D) Optimized
Ans: C
43. The software _________ of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them.
(A) Design
(B) Architecture
(C) Process
(D) Requirement
Ans: B
44. Which one of the following set of attributes should not be encompassed by effective software metrics ?
(A) Simple and computable
(B) Consistent and objective
(C) Consistent in the use of units and dimensions
(D) Programming language dependent
Ans: D
45. Which one of the following is used to compute cyclomatic complexity ?
(A) The number of regions – 1
(B) E – N + 1, where E is the number of flow graph edges and N is the number of flow graph nodes.
(C) P – 1, where P is the number of predicate nodes in the flow graph G.
(D) P + 1, where P is the number of predicate nodes in the flow graph G.
Ans: D
46. Consider the following statements S1 and S2 :
S1 : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell.
S2 : A soft handover is one in which the channel in the source cell is released and only then the channel in the target cell is engaged.
(A) S1 is true and S2 is not true. (B) S1 is not true and S2 is true.
(C) Both S1 and S2 are true. (D) Both S1 and S2 are not true.
Ans: D
47. Fact-less fact table in a data warehouse contains
(A) only measures (B) only dimensions
(C) keys and measures (D) only surrogate keys
Ans: D
48. Which e-business model allows consumers to name their own price for products and services ?
(A) B2 B (B) B2 G
(C) C2 C (D) C2 B
Ans: D
49. __________ model is designed to bring prices down by increasing the number of customers who buy a particular product at once.
(A) Economic Order Quantity (B) Inventory
(C) Data Mining (D) Demand-Sensitive Pricing
Ans: D
50. Match the following :
List – I List – II
a. Call control protocol i. Interface between Base Transceiver Station (BTS) and Base Station Controller (BSC)
b. A-bis ii. Spread spectrum
c. BSMAP iii. Connection management
d. CDMA iv. Works between Mobile Switching Centre (MSC) and Base Station Subsystem (BSS)
Codes :
a b c d
(A) iii iv i ii
(B) iii i iv ii
(C) i ii iii iv
(D) iv iii ii i
Ans: B
char ∗(∗(∗ a[N]) ( )) ( );
(A) a pointer to a function returning array of n pointers to function returning character pointers.
(B) a function return array of N pointers to functions returning pointers to characters
(C) an array of n pointers to function returning pointers to characters
(D) an array of n pointers to function returning pointers to functions returning pointers to characters.
Ans: All options are correct
40. In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced page is modified. What is the average access time to service a page fault assuming that the page to be replaced is modified 70% of the time ?
(A) 11.6 m.sec. (B) 16.4 m.sec.
(C) 28 m.sec. (D) 14 m.sec.
Ans: B
41. __________ are applied throughout the software process.
(A) Framework activities (B) Umbrella activities
(C) Planning activities (D) Construction activities
Ans: B
42. Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level
(A) Performed
(B) Managed
(C) Defined
(D) Optimized
Ans: C
43. The software _________ of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them.
(A) Design
(B) Architecture
(C) Process
(D) Requirement
Ans: B
44. Which one of the following set of attributes should not be encompassed by effective software metrics ?
(A) Simple and computable
(B) Consistent and objective
(C) Consistent in the use of units and dimensions
(D) Programming language dependent
Ans: D
45. Which one of the following is used to compute cyclomatic complexity ?
(A) The number of regions – 1
(B) E – N + 1, where E is the number of flow graph edges and N is the number of flow graph nodes.
(C) P – 1, where P is the number of predicate nodes in the flow graph G.
(D) P + 1, where P is the number of predicate nodes in the flow graph G.
Ans: D
46. Consider the following statements S1 and S2 :
S1 : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell.
S2 : A soft handover is one in which the channel in the source cell is released and only then the channel in the target cell is engaged.
(A) S1 is true and S2 is not true. (B) S1 is not true and S2 is true.
(C) Both S1 and S2 are true. (D) Both S1 and S2 are not true.
Ans: D
47. Fact-less fact table in a data warehouse contains
(A) only measures (B) only dimensions
(C) keys and measures (D) only surrogate keys
Ans: D
48. Which e-business model allows consumers to name their own price for products and services ?
(A) B2 B (B) B2 G
(C) C2 C (D) C2 B
Ans: D
49. __________ model is designed to bring prices down by increasing the number of customers who buy a particular product at once.
(A) Economic Order Quantity (B) Inventory
(C) Data Mining (D) Demand-Sensitive Pricing
Ans: D
50. Match the following :
List – I List – II
a. Call control protocol i. Interface between Base Transceiver Station (BTS) and Base Station Controller (BSC)
b. A-bis ii. Spread spectrum
c. BSMAP iii. Connection management
d. CDMA iv. Works between Mobile Switching Centre (MSC) and Base Station Subsystem (BSS)
Codes :
a b c d
(A) iii iv i ii
(B) iii i iv ii
(C) i ii iii iv
(D) iv iii ii i
Ans: B
51. Consider a set A = {1, 2, 3, …….., 1000}. How many members of A shall be divisible by 3 or by 5 or by both 3 and 5 ?
(A) 533 (B) 599
(C) 467 (D) 66
Ans: C
52. A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of degree 2. If the other vertices have degree 1, how many vertices are there in the graph ?
(A) 5 (B) n – 3
(C) 20 (D) 11
Ans: D
53. A computer program selects an integer in the set {k : 1 ≤ k ≤ 10,00,000} at random and prints out the result. This process is repeated 1 million times. What is the probability that the value k = 1 appears in the printout atleast once ?
(A) 0.5 (B) 0.704
(C) 0.632121 (D) 0.68
Ans: C
54. The BCD adder to add two decimal digits needs minimum of
(A) 6 full adders and 2 half adders
(B) 5 full adders and 3 half adders
(C) 4 full adders and 3 half adders
(D) 5 full adders and 2 half adders
Ans: D
55. The Excess-3 decimal code is a self-complementing code because
(A) The binary sum of a code and its 9’s complement is equal to 9.
(B) It is a weighted code.
(C) Complement can be generated by inverting each bit pattern.
(D) The binary sum of a code and its 10’s complement is equal to 9.
Ans: A & C
56. How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine (A ∗ B) + (C ∗ D/E) ?
(A) 4 PUSH and 3 POP instructions (B) 5 PUSH and 4 POP instructions
(C) 6 PUSH and 2 POP instructions (D) 5 PUSH and 3 POP instructions
Ans: B
57. What will be the output of the following ‘C’ code ?
main ( )
{ int x = 128;
printf (“\n%d”, 1 + x ++);
}
(A) 128 (B) 129
(C) 130 (D) 131
Ans: B
58. Which of the following is not a member of class ?
(A) Static function (B) Friend function
(C) Const function (D) Virtual function
Ans: B
59. When an array is passed as parameter to a function, which of the following statements is correct ?
(A) The function can change values in the original array.
(B) In C, parameters are passed by value, the function cannot change the original value in the array.
(C) It results in compilation error when the function tries to access the elements in the array.
(D) Results in a run time error when the function tries to access the elements in the array.
Ans: A
60. Which of the following differentiates between overloaded functions and overridden functions ?
(A) Overloading is a dynamic or runtime binding and overridden is a static or compile time binding.
(B) Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
(C) Redefining a function in a friend class is called overloading, while redefining a function in a derived class is called as overridden function.
(D) Redefining a function in a derived class is called function overloading, while redefining a function in a friend class is called function overriding.
Ans: B
61. Division operation is ideally suited to handle queries of the type :
(A) customers who have no account in any of the branches in Delhi.
(B) customers who have an account at all branches in Delhi.
(C) customers who have an account in atleast one branch in Delhi.
(D) customers who have only joint account in any one branch in Delhi
Ans: B
62. Which of the following is true ?
I. Implementation of self-join is possible in SQL with table alias.
II. Outer-join operation is basic operation in relational algebra.
III. Natural join and outer join operations are equivalent.
(A) I and II are correct. (B) II and III are correct.
(C) Only III is correct. (D) Only I is correct.
Ans: D
63. What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-relationship diagram ?
(A) Generalization (B) Aggregation
(C) Specialization (D) Adding suitable attributes
Ans: D
64. The best normal form of relation scheme R(A, B, C, D) along with the set of functional dependencies F = {AB → C, AB → D, C → A, D → B} is
(A) Boyce-Codd Normal form (B) Third Normal form
(C) Second Normal form (D) First Normal form
Ans: B
65. Identify the minimal key for relational scheme R(A, B, C, D, E) with functional dependencies F = {A → B, B → C, AC → D}
(A) A (B) AE
(C) BE (D) CE
Ans: A
66. Convert the following infix expression into its equivalent post fix expression
(A + B^ D) / (E – F) + G
(A) ABD^ + EF – / G+ (B) ABD + ^EF – / G+
(C) ABD + ^EF / – G+ (D) ABD^ + EF / – G+
Ans: A
67. You have to sort a list L, consisting of a sorted list followed by a few ‘random’ elements. Which of the following sorting method would be most suitable for such a task ?
(A) Bubble sort (B) Selection sort
(C) Quick sort (D) Insertion sort
Ans: D
68. The directory can be viewed as ________ that translates filenames into their directory entries.
(A) Symbol table (B) Partition
(C) Swap space (D) Cache
Ans: A
69. Consider an array A[20, 10], assume 4 words per memory cell and the base address of array A is 100. What is the address of A[11, 5] ? Assume row major storage.
(A) 560 (B) 565
(C) 570 (D) 575
Ans: A
70. A full binary tree with n leaves contains
(A) n nodes (B) log2 n nodes
(C) 2n –1 nodes (D) 2n nodes
Ans: C
71. The period of a signal is 10 ms. What is its frequency in Hertz ?
(A) 10 (B) 100
(C) 1000 (D) 10000
Ans: B
72. In a classful addressing, first four bits in Class A IP address is
(A) 1010 (B) 1100
(C) 1011 (D) 1110
Ans: All options are correct
73. Which of the following algorithms is not a broadcast routing algorithm ?
(A) Flooding (B) Multidestination routing
(C) Reverse path forwarding (D) All of the above
Ans: D
74. An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element ?
(A) 0.336 bits/baud (B) 3 bits/baud
(C) 120,00,000 bits/baud (D) None of the above
Ans: B
75. How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key ?
(A) 16 (B) 17
(C) 18 (D) 19
Ans: D
76. Shift-Reduce parsers perform the following :
(A) Shift step that advances in the input stream by K(K > 1) symbols and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
(B) Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
(C) Shift step that advances in the input stream by K(K = 2) symbols and Reduce step that applies a completed grammar rule to form a single tree.
(D) Shift step that does not advance in the input stream and Reduce step that applies a completed grammar rule to form a single tree.
Ans: B
77. Which of the following is true ?
(A) Canonical LR parser is LR (1) parser with single look ahead terminal
(B) All LR(K) parsers with K > 1 can be transformed into LR(1) parsers.
(C) Both (A) and (B)
(D) None of the above
Ans: C
78. In a two-pass assembler, symbol table is
(A) Generated in first pass
(B) Generated in second pass
(C) Not generated at all
(D) Generated and used only in second pass
Ans: A
79. Debugger is a program that
(A) allows to examine and modify the contents of registers
(B) does not allow execution of a segment of program
(C) allows to set breakpoints, execute a segment of program and display contents of register
(D) All of the above
Ans: C
80. The following Context-Free Grammar (CFG) :
S → aB | bA
A → a | as | bAA
B → b | bs | aBB
will generate
(A) odd numbers of a’s and odd numbers of b’s
(B) even numbers of a’s and even numbers of b’s
(C) equal numbers of a’s and b’s
(D) different numbers of a’s and b’s
Ans: All options are correct
81. Consider the following justifications for commonly using the two-level CPU scheduling :
I. It is used when memory is too small to hold all the ready processes.
II. Because its performance is same as that of the FIFO.
III. Because it facilitates putting some set of processes into memory and a choice is
made from that.
IV. Because it does not allow to adjust the set of in-core processes.
Which of the following is true ?
(A) I, III and IV (B) I and II
(C) III and IV (D) I and III
Ans: D
82. A specific editor has 200 K of program text, 15 K of initial stack, 50 K of initialized data, and 70 K of bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared text is used ?
(A) 1135 K (B) 335 K
(C) 1065 K (D) 320 K
Ans: B
83. Which of the following conditions does not hold good for a solution to a critical section problem ?
(A) No assumptions may be made about speeds or the number of CPUs.
(B) No two processes may be simultaneously inside their critical sections.
(C) Processes running outside its critical section may block other processes.
(D) Processes do not wait forever to enter its critical section.
Ans: C
(A) 533 (B) 599
(C) 467 (D) 66
Ans: C
52. A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of degree 2. If the other vertices have degree 1, how many vertices are there in the graph ?
(A) 5 (B) n – 3
(C) 20 (D) 11
Ans: D
53. A computer program selects an integer in the set {k : 1 ≤ k ≤ 10,00,000} at random and prints out the result. This process is repeated 1 million times. What is the probability that the value k = 1 appears in the printout atleast once ?
(A) 0.5 (B) 0.704
(C) 0.632121 (D) 0.68
Ans: C
54. The BCD adder to add two decimal digits needs minimum of
(A) 6 full adders and 2 half adders
(B) 5 full adders and 3 half adders
(C) 4 full adders and 3 half adders
(D) 5 full adders and 2 half adders
Ans: D
55. The Excess-3 decimal code is a self-complementing code because
(A) The binary sum of a code and its 9’s complement is equal to 9.
(B) It is a weighted code.
(C) Complement can be generated by inverting each bit pattern.
(D) The binary sum of a code and its 10’s complement is equal to 9.
Ans: A & C
56. How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine (A ∗ B) + (C ∗ D/E) ?
(A) 4 PUSH and 3 POP instructions (B) 5 PUSH and 4 POP instructions
(C) 6 PUSH and 2 POP instructions (D) 5 PUSH and 3 POP instructions
Ans: B
57. What will be the output of the following ‘C’ code ?
main ( )
{ int x = 128;
printf (“\n%d”, 1 + x ++);
}
(A) 128 (B) 129
(C) 130 (D) 131
Ans: B
58. Which of the following is not a member of class ?
(A) Static function (B) Friend function
(C) Const function (D) Virtual function
Ans: B
59. When an array is passed as parameter to a function, which of the following statements is correct ?
(A) The function can change values in the original array.
(B) In C, parameters are passed by value, the function cannot change the original value in the array.
(C) It results in compilation error when the function tries to access the elements in the array.
(D) Results in a run time error when the function tries to access the elements in the array.
Ans: A
60. Which of the following differentiates between overloaded functions and overridden functions ?
(A) Overloading is a dynamic or runtime binding and overridden is a static or compile time binding.
(B) Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
(C) Redefining a function in a friend class is called overloading, while redefining a function in a derived class is called as overridden function.
(D) Redefining a function in a derived class is called function overloading, while redefining a function in a friend class is called function overriding.
Ans: B
61. Division operation is ideally suited to handle queries of the type :
(A) customers who have no account in any of the branches in Delhi.
(B) customers who have an account at all branches in Delhi.
(C) customers who have an account in atleast one branch in Delhi.
(D) customers who have only joint account in any one branch in Delhi
Ans: B
62. Which of the following is true ?
I. Implementation of self-join is possible in SQL with table alias.
II. Outer-join operation is basic operation in relational algebra.
III. Natural join and outer join operations are equivalent.
(A) I and II are correct. (B) II and III are correct.
(C) Only III is correct. (D) Only I is correct.
Ans: D
63. What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-relationship diagram ?
(A) Generalization (B) Aggregation
(C) Specialization (D) Adding suitable attributes
Ans: D
64. The best normal form of relation scheme R(A, B, C, D) along with the set of functional dependencies F = {AB → C, AB → D, C → A, D → B} is
(A) Boyce-Codd Normal form (B) Third Normal form
(C) Second Normal form (D) First Normal form
Ans: B
65. Identify the minimal key for relational scheme R(A, B, C, D, E) with functional dependencies F = {A → B, B → C, AC → D}
(A) A (B) AE
(C) BE (D) CE
Ans: A
66. Convert the following infix expression into its equivalent post fix expression
(A + B^ D) / (E – F) + G
(A) ABD^ + EF – / G+ (B) ABD + ^EF – / G+
(C) ABD + ^EF / – G+ (D) ABD^ + EF / – G+
Ans: A
67. You have to sort a list L, consisting of a sorted list followed by a few ‘random’ elements. Which of the following sorting method would be most suitable for such a task ?
(A) Bubble sort (B) Selection sort
(C) Quick sort (D) Insertion sort
Ans: D
68. The directory can be viewed as ________ that translates filenames into their directory entries.
(A) Symbol table (B) Partition
(C) Swap space (D) Cache
Ans: A
69. Consider an array A[20, 10], assume 4 words per memory cell and the base address of array A is 100. What is the address of A[11, 5] ? Assume row major storage.
(A) 560 (B) 565
(C) 570 (D) 575
Ans: A
70. A full binary tree with n leaves contains
(A) n nodes (B) log2 n nodes
(C) 2n –1 nodes (D) 2n nodes
Ans: C
71. The period of a signal is 10 ms. What is its frequency in Hertz ?
(A) 10 (B) 100
(C) 1000 (D) 10000
Ans: B
72. In a classful addressing, first four bits in Class A IP address is
(A) 1010 (B) 1100
(C) 1011 (D) 1110
Ans: All options are correct
73. Which of the following algorithms is not a broadcast routing algorithm ?
(A) Flooding (B) Multidestination routing
(C) Reverse path forwarding (D) All of the above
Ans: D
74. An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element ?
(A) 0.336 bits/baud (B) 3 bits/baud
(C) 120,00,000 bits/baud (D) None of the above
Ans: B
75. How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key ?
(A) 16 (B) 17
(C) 18 (D) 19
Ans: D
76. Shift-Reduce parsers perform the following :
(A) Shift step that advances in the input stream by K(K > 1) symbols and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
(B) Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
(C) Shift step that advances in the input stream by K(K = 2) symbols and Reduce step that applies a completed grammar rule to form a single tree.
(D) Shift step that does not advance in the input stream and Reduce step that applies a completed grammar rule to form a single tree.
Ans: B
77. Which of the following is true ?
(A) Canonical LR parser is LR (1) parser with single look ahead terminal
(B) All LR(K) parsers with K > 1 can be transformed into LR(1) parsers.
(C) Both (A) and (B)
(D) None of the above
Ans: C
78. In a two-pass assembler, symbol table is
(A) Generated in first pass
(B) Generated in second pass
(C) Not generated at all
(D) Generated and used only in second pass
Ans: A
79. Debugger is a program that
(A) allows to examine and modify the contents of registers
(B) does not allow execution of a segment of program
(C) allows to set breakpoints, execute a segment of program and display contents of register
(D) All of the above
Ans: C
80. The following Context-Free Grammar (CFG) :
S → aB | bA
A → a | as | bAA
B → b | bs | aBB
will generate
(A) odd numbers of a’s and odd numbers of b’s
(B) even numbers of a’s and even numbers of b’s
(C) equal numbers of a’s and b’s
(D) different numbers of a’s and b’s
Ans: All options are correct
81. Consider the following justifications for commonly using the two-level CPU scheduling :
I. It is used when memory is too small to hold all the ready processes.
II. Because its performance is same as that of the FIFO.
III. Because it facilitates putting some set of processes into memory and a choice is
made from that.
IV. Because it does not allow to adjust the set of in-core processes.
Which of the following is true ?
(A) I, III and IV (B) I and II
(C) III and IV (D) I and III
Ans: D
82. A specific editor has 200 K of program text, 15 K of initial stack, 50 K of initialized data, and 70 K of bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared text is used ?
(A) 1135 K (B) 335 K
(C) 1065 K (D) 320 K
Ans: B
83. Which of the following conditions does not hold good for a solution to a critical section problem ?
(A) No assumptions may be made about speeds or the number of CPUs.
(B) No two processes may be simultaneously inside their critical sections.
(C) Processes running outside its critical section may block other processes.
(D) Processes do not wait forever to enter its critical section.
Ans: C
84. In Delta Rule for error minimization
(A) weights are adjusted w.r.to change in the output
(B) weights are adjusted w.r.to difference between desired output and actual output
(C) weights are adjusted w.r.to difference between input and output
(D) none of the above
Ans: B
85. The concept of pipelining is most effective in improving performance if the tasks being performed in different stages :
(A) require different amount of time
(B) require about the same amount of time
(C) require different amount of time with time difference between any two tasks being same
(D) require different amount with time difference between any two tasks being different
Ans: B
86. What is Granularity ?
(A) The size of database (B) The size of data item (C) The size of record (D) The size of file
Ans: B
87. Suppose that a given application is run on a 64-processor machine and that 70 percent of the application can be parallelized. Then the expected performance improvement using Amdahl’s law is
(A) 4.22 (B) 3.22 (C) 3.32 (D) 3.52
Ans: B
88. Match the following :
(i) OLAP (a) Regression
(ii) OLTP (b) Data Warehouse
(iii) Decision Tree (c) RDBMS
(iv) Neural Network (d) Classification
(i) (ii) (iii) (iv)
(A) (b) (c) (a) (d)
(B) (b) (c) (d) (a)
(C) (c) (b) (a) (d)
(D) (c) (b) (d) (a)
Ans: B
89. Which level of Abstraction describes what data are stored in the Database ?
(A) Physical level (B) View level (C) Abstraction level (D) Logical level
Ans: D
90. The problem that occurs when one transaction updates a database item and then the transaction fails for some reason is ________.
(A) Temporary Select Problem (B) Temporary Modify Problem (C) Dirty Read Problem (D) None
Ans: C
91. X.25 is ________ Network.
(A) Connection Oriented Network
(B) Connection Less Network
(C) Either Connection Oriented or Connection Less
(D) Neither Connection Oriented nor Connection Less
Ans: A
92. Which of the following can be used for clustering of data ?
(A) Single layer perception (B) Multilayer perception (C) Self organizing map (D) Radial basis function
Ans: C
93. Which of the following is scheme to deal with deadlock ?
(A) Time out (B) Time in (C) Both (A) & (B) (D) None of the above
Ans: A
94. If the pixels of an image are shuffled then the parameter that may change is
(A) Histogram (B) Mean (C) Entropy (D) Covariance
Ans: D
95. The common property of functional language and logical programming language :
(A) Both are declarative (B) Both are based on λ-calculus (C) Both are procedural (D) Both are functional
Ans: A
96. Given the following statements :
(i) The power of deterministic finite state machine and nondeterministic finite state machine are same.
(ii) The power of deterministic pushdown automaton and nondeterministic pushdown automaton are same.
Which of the above is the correct statement(s) ?
(A) Both (i) and (ii) (B) Only (i)
(C) Only (ii) (D) Neither (i) nor (ii)
Ans: B
97. The quantiser in an image-compression system is a
(A) lossy element which exploits the psychovisual redundancy
(B) lossless element which exploits the psychovisual redundancy
(C) lossy element which exploits the statistical redundancy
(D) lossless element which exploits the statistical redundancy
Ans: A
98. Data Warehouse provides
(A) Transaction Responsiveness (B) Storage, Functionality Responsiveness to queries
(C) Demand and Supply Responsiveness (D) None of the above
Ans: B
99. A* algorithm uses f ' = g + h' to estimate the cost of getting from the initial state to the goal state, where g is a measure of the cost of getting from initial state to the current node and the function h' is an estimate of the cost of getting from the current node to the goal state. To find a path involving the fewest number of steps, we should set
(A) g = 1 (B) g = 0
(C) h' = 0 (D) h' = 1
Ans: A
100. The transform which possesses the highest ‘energy compaction’ property is
(A) Slant transform (B) Cosine transform (C) Fourier transform (D) Karhunen-Loeve transform
Ans: D
(A) weights are adjusted w.r.to change in the output
(B) weights are adjusted w.r.to difference between desired output and actual output
(C) weights are adjusted w.r.to difference between input and output
(D) none of the above
Ans: B
85. The concept of pipelining is most effective in improving performance if the tasks being performed in different stages :
(A) require different amount of time
(B) require about the same amount of time
(C) require different amount of time with time difference between any two tasks being same
(D) require different amount with time difference between any two tasks being different
Ans: B
86. What is Granularity ?
(A) The size of database (B) The size of data item (C) The size of record (D) The size of file
Ans: B
87. Suppose that a given application is run on a 64-processor machine and that 70 percent of the application can be parallelized. Then the expected performance improvement using Amdahl’s law is
(A) 4.22 (B) 3.22 (C) 3.32 (D) 3.52
Ans: B
88. Match the following :
(i) OLAP (a) Regression
(ii) OLTP (b) Data Warehouse
(iii) Decision Tree (c) RDBMS
(iv) Neural Network (d) Classification
(i) (ii) (iii) (iv)
(A) (b) (c) (a) (d)
(B) (b) (c) (d) (a)
(C) (c) (b) (a) (d)
(D) (c) (b) (d) (a)
Ans: B
89. Which level of Abstraction describes what data are stored in the Database ?
(A) Physical level (B) View level (C) Abstraction level (D) Logical level
Ans: D
90. The problem that occurs when one transaction updates a database item and then the transaction fails for some reason is ________.
(A) Temporary Select Problem (B) Temporary Modify Problem (C) Dirty Read Problem (D) None
Ans: C
91. X.25 is ________ Network.
(A) Connection Oriented Network
(B) Connection Less Network
(C) Either Connection Oriented or Connection Less
(D) Neither Connection Oriented nor Connection Less
Ans: A
92. Which of the following can be used for clustering of data ?
(A) Single layer perception (B) Multilayer perception (C) Self organizing map (D) Radial basis function
Ans: C
93. Which of the following is scheme to deal with deadlock ?
(A) Time out (B) Time in (C) Both (A) & (B) (D) None of the above
Ans: A
94. If the pixels of an image are shuffled then the parameter that may change is
(A) Histogram (B) Mean (C) Entropy (D) Covariance
Ans: D
95. The common property of functional language and logical programming language :
(A) Both are declarative (B) Both are based on λ-calculus (C) Both are procedural (D) Both are functional
Ans: A
96. Given the following statements :
(i) The power of deterministic finite state machine and nondeterministic finite state machine are same.
(ii) The power of deterministic pushdown automaton and nondeterministic pushdown automaton are same.
Which of the above is the correct statement(s) ?
(A) Both (i) and (ii) (B) Only (i)
(C) Only (ii) (D) Neither (i) nor (ii)
Ans: B
97. The quantiser in an image-compression system is a
(A) lossy element which exploits the psychovisual redundancy
(B) lossless element which exploits the psychovisual redundancy
(C) lossy element which exploits the statistical redundancy
(D) lossless element which exploits the statistical redundancy
Ans: A
98. Data Warehouse provides
(A) Transaction Responsiveness (B) Storage, Functionality Responsiveness to queries
(C) Demand and Supply Responsiveness (D) None of the above
Ans: B
99. A* algorithm uses f ' = g + h' to estimate the cost of getting from the initial state to the goal state, where g is a measure of the cost of getting from initial state to the current node and the function h' is an estimate of the cost of getting from the current node to the goal state. To find a path involving the fewest number of steps, we should set
(A) g = 1 (B) g = 0
(C) h' = 0 (D) h' = 1
Ans: A
100. The transform which possesses the highest ‘energy compaction’ property is
(A) Slant transform (B) Cosine transform (C) Fourier transform (D) Karhunen-Loeve transform
Ans: D
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15