COMPUTER SCIENCE AND APPLICATIONS- PAGE 1
1. Infrared signals can be used for short range communication in a closed area using _______ propagation.
(A) ground (B) sky
(C) line of sight (D) space
Ans: C
2. A bridge has access to _______ address in the same network.
(A) Physical (B) Network
(C) Datalink (D) Application
Ans: A
3. The minimum frame length for 10 Mbps Ethernet is _______ bytes and maximum is _______ bytes.
(A) 64 & 128 (B) 128 & 1518
(C) 1518 & 3036 (D) 64 & 1518
Ans: D
4. The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is _______.
(A) 500 baud/sec
(B) 1000 baud/sec
(C) 3000 baud/sec
(D) 18000 baud/sec.
Ans: A
5. Match the following :
List – I List – II
a. Physical layer i. Allow resources to network access
b. Datalink layer ii. Move packets from one destination to other
c. Network layer iii. Process to process message delivery
d. Transport layer iv. Transmission of bit stream
e. Application Layer v. Formation of frames
Codes :
a b c d e
(A) iv v ii iii i
(B) v iv i ii iii
(C) i iii ii v iv
(D) i ii iv iii v
Ans: A
6. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar ?
(A) Removing left recursion alone
(B) Removing the grammar alone
(C) Removing left recursion and factoring the grammar
(D) None of the above
Ans: D
7. A shift reduce parser suffers from
(A) shift reduce conflict only
(B) reduce reduce conflict only
(C) both shift reduce conflict and reduce reduce conflict
(D) shift handle and reduce handle Conflicts
Ans: C
8. KPA in CMM stands for
(A) Key Process Area
(B) Key Product Area
(C) Key Principal Area
(D) Key Performance Area
Ans: A
9. Which one of the following is not a risk management technique for managing the risk due to unrealistic schedules and budgets ?
(A) Detailed multi source cost and schedule estimation.
(B) Design cost
(C) Incremental development
(D) Information hiding
Ans: D
10. _______ of a system is the structure or structures of the system which comprise software elements, the externally visible properties of these elements and the relationship amongst them.
(A) Software construction
(B) Software evolution
(C) Software architecture
(D) Software reuse
Ans: C
11. In function point analysis, the number of complexity adjustment factors is
(A) 10 (B) 12
(C) 14 (D) 20
Ans: C
12. Regression testing is primarily related to
(A) Functional testing
(B) Development testing
(C) Data flow testing
(D) Maintenance testing
Ans: D
13. How many different truth tables of the compound propositions are there that involve the propositions p & q ?
(A) 2 (B) 4
(C) 8 (D) 16
Ans: D
14. The notation ∃!xP(x) denotes the proposition “there exists a unique x such that P(x) is true”.
Give the truth values of the following statements :
I. ∃!xP(x) → ∃xP(x)
II. ∃!x ¬ P(x) → ¬∀xP(x)
(A) Both I & II are true.
(B) Both I & II are false.
(C) I – false, II – true
(D) I – true, II – false
Ans: A
15. Give a compound proposition involving propositions p, q and r that is true when exactly two of p, q and r are true and is false otherwise.
(A) (p∨q∧¬r) ∧ (p∧¬q∧r) ∧ (¬p∧q∧r)
(B) (p∧q∧¬r) ∧ (p∨q∧¬r) ∧ (¬p∧q∧r)
(C) (p∧q∧¬r) ∨ (p∧¬q∧r) ∧ (¬p∧q∧r)
(D) (p∧q∧¬r) ∨ (p∧¬q∧r) ∨ (¬p∧q∧r)
Ans: D
16. How many cards must be chosen from a deck to guarantee that atleast
i. two aces of two kinds are chosen.
ii. two aces are chosen.
iii. two cards of the same kind are chosen.
iv. two cards of two different kinds are chosen.
(A) 50, 50, 14, 5 (B) 51, 51, 15, 7
(C) 52, 52, 14, 5 (D) 51, 51, 14, 5
Ans: A
17. Match the following with respect to the mobile computing technologies :
List – I List – II
a. GPRS i. An integrated digital radio standard
b. GSM ii. 3G wireless/Mobile technology
c. UMTS iii. Nine different schemes for modulation and error correction
d. EDGE iv. An emerging wireless service that offers a mobile data
Codes :
a b c d
(A) iii iv ii i
(B) iv i ii iii
(C) ii iii iv i
(D) ii i iv iii
Ans: B
18. Object Request Broker (ORB) is
I. A software program that runs on the client as well as on the application server.
II. A software program that runs on the client side only.
III. A software program that runs on the application server, where most of the components reside.
(A) I, II & III (B) I & II (C) II & III (D) I only
Ans: D
19. A software agent is defined as
I. A software developed for accomplishing a given task.
II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.
(A) I
(B) II
(C) III
(D) All of the above
Ans: B
20. Match the following :
List – I List – II
a. Classification i. Principal component analysis
b. Clustering ii. Branch and Bound
c. Feature Extraction iii. K-nearest neighbour
d. Feature Selection iv. K-means
Codes :
a b c d
(A) iii iv ii i
(B) iv iii i ii
(C) iii iv i ii
(D) iv iii ii i
Ans: C
21. SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for
(A) Secure Electronic Transaction
(B) Secular Enterprise for Transaction
(C) Security Electronic Transmission
(D) Secured Electronic Termination
Ans: A
22. In a paged memory management algorithm, the hit ratio is 70%. If it takes 30 nanoseconds to search Translation Look-aside Buffer (TLB) and 100 nanoseconds (ns) to access memory, the effective memory access time is
(A) 91 ns (B) 69 ns
(C) 200 ns (D) 160 ns
Ans: D
23. Match the following :
List – I List – II
a. Multilevel feedback queue i. Time-slicing
b. FCFS ii. Criteria to move processes between queues
c. Shortest process next iii. Batch processing
d. Round robin scheduling iv. Exponential smoothening
Codes :
a b c d
(A) i iii ii iv
(B) iv iii ii i
(C) iii i iv i
(D) ii iii iv i
Ans: D
24. Match the following :
List – I List – II
a. Contiguous allocation i. This scheme supports very large file sizes.
b. Linked allocation ii. This allocation technique supports only sequential files.
c. Indexedal location iii. Number of disks required to access file is minimal.
d. Multi-level indexed iv. This technique suffers from maximum wastage of space in storing pointers.
Codes :
a b c d
(A) iii iv ii i
(B) iii ii iv i
(C) i ii iv iii
(D) i iv ii iii
Ans: B
25. Which of the following commands will output “onetwothree” ?
(A) for val; do echo-n $val; done <one two three
(B) for one two three; do echo-n-; done
(C) for n in one two three; do echo-n $n; done
(D) for n in one two three {echo –n $ n}
Ans: C
26. Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the merge step ?
(A) The array elements form a heap.
(B) Elements in each half of the array are sorted amongst themselves.
(C) Elements in the first half of the array are less than or equal to elements in second half of the array.
(D) All of the above
Ans: B
27. A text is made up of the characters α, β, γ, δ and σ with the probability 0.12, 0.40, 0.15, 0.08 and 0.25 respectively. The optimal coding technique will have the average length of
(A) 1.7 (B) 2.15
(C) 3.4 (D) 3.8
Ans: B
28. Searching for an element in the hash table requires O(1) time for the ________ time, whereas for direct addressing it holds for the ________
time.
(A) worst-case, average
(B) worst-case, worst-case
(C) average, worst-case
(D) best, average
Ans: C
29. What is the maximum number of parenthesis that will appear on the stack at any one time for parenthesis expression given by
( ( ) ( ( ) ) ( ( ) ) )
(A) 2 (B) 3
(C) 4 (D) 5
Ans: B
30. Match the following :
List – I List – II
a. Automatic storage class i. Scope of the variable is global.
b. Register storage class ii. Value of the variable persists between different function calls.
c. Static storage class iii. Value stored in memory and local to the block in which the variable is defined.
d. External storage class iv. Value stored in CPU registers.
Codes :
a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) iv iii ii i
(D) iv iii i ii
Ans: B
31. When we pass an array as an argument to a function, what actually gets passed ?
(A) Address of the array
(B) Values of the elements of the array
(C) Base address of the array
(D) Number of elements of the array
Ans: C
32. While (87) printf(“computer”);
The above C statement will
(A) print “computer” 87 times
(B) print “computer” 0 times
(C) print “computer” 1 times
(D) print “computer” infinite times
Ans: D
(A) ground (B) sky
(C) line of sight (D) space
Ans: C
2. A bridge has access to _______ address in the same network.
(A) Physical (B) Network
(C) Datalink (D) Application
Ans: A
3. The minimum frame length for 10 Mbps Ethernet is _______ bytes and maximum is _______ bytes.
(A) 64 & 128 (B) 128 & 1518
(C) 1518 & 3036 (D) 64 & 1518
Ans: D
4. The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is _______.
(A) 500 baud/sec
(B) 1000 baud/sec
(C) 3000 baud/sec
(D) 18000 baud/sec.
Ans: A
5. Match the following :
List – I List – II
a. Physical layer i. Allow resources to network access
b. Datalink layer ii. Move packets from one destination to other
c. Network layer iii. Process to process message delivery
d. Transport layer iv. Transmission of bit stream
e. Application Layer v. Formation of frames
Codes :
a b c d e
(A) iv v ii iii i
(B) v iv i ii iii
(C) i iii ii v iv
(D) i ii iv iii v
Ans: A
6. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar ?
(A) Removing left recursion alone
(B) Removing the grammar alone
(C) Removing left recursion and factoring the grammar
(D) None of the above
Ans: D
7. A shift reduce parser suffers from
(A) shift reduce conflict only
(B) reduce reduce conflict only
(C) both shift reduce conflict and reduce reduce conflict
(D) shift handle and reduce handle Conflicts
Ans: C
8. KPA in CMM stands for
(A) Key Process Area
(B) Key Product Area
(C) Key Principal Area
(D) Key Performance Area
Ans: A
9. Which one of the following is not a risk management technique for managing the risk due to unrealistic schedules and budgets ?
(A) Detailed multi source cost and schedule estimation.
(B) Design cost
(C) Incremental development
(D) Information hiding
Ans: D
10. _______ of a system is the structure or structures of the system which comprise software elements, the externally visible properties of these elements and the relationship amongst them.
(A) Software construction
(B) Software evolution
(C) Software architecture
(D) Software reuse
Ans: C
11. In function point analysis, the number of complexity adjustment factors is
(A) 10 (B) 12
(C) 14 (D) 20
Ans: C
12. Regression testing is primarily related to
(A) Functional testing
(B) Development testing
(C) Data flow testing
(D) Maintenance testing
Ans: D
13. How many different truth tables of the compound propositions are there that involve the propositions p & q ?
(A) 2 (B) 4
(C) 8 (D) 16
Ans: D
14. The notation ∃!xP(x) denotes the proposition “there exists a unique x such that P(x) is true”.
Give the truth values of the following statements :
I. ∃!xP(x) → ∃xP(x)
II. ∃!x ¬ P(x) → ¬∀xP(x)
(A) Both I & II are true.
(B) Both I & II are false.
(C) I – false, II – true
(D) I – true, II – false
Ans: A
15. Give a compound proposition involving propositions p, q and r that is true when exactly two of p, q and r are true and is false otherwise.
(A) (p∨q∧¬r) ∧ (p∧¬q∧r) ∧ (¬p∧q∧r)
(B) (p∧q∧¬r) ∧ (p∨q∧¬r) ∧ (¬p∧q∧r)
(C) (p∧q∧¬r) ∨ (p∧¬q∧r) ∧ (¬p∧q∧r)
(D) (p∧q∧¬r) ∨ (p∧¬q∧r) ∨ (¬p∧q∧r)
Ans: D
16. How many cards must be chosen from a deck to guarantee that atleast
i. two aces of two kinds are chosen.
ii. two aces are chosen.
iii. two cards of the same kind are chosen.
iv. two cards of two different kinds are chosen.
(A) 50, 50, 14, 5 (B) 51, 51, 15, 7
(C) 52, 52, 14, 5 (D) 51, 51, 14, 5
Ans: A
17. Match the following with respect to the mobile computing technologies :
List – I List – II
a. GPRS i. An integrated digital radio standard
b. GSM ii. 3G wireless/Mobile technology
c. UMTS iii. Nine different schemes for modulation and error correction
d. EDGE iv. An emerging wireless service that offers a mobile data
Codes :
a b c d
(A) iii iv ii i
(B) iv i ii iii
(C) ii iii iv i
(D) ii i iv iii
Ans: B
18. Object Request Broker (ORB) is
I. A software program that runs on the client as well as on the application server.
II. A software program that runs on the client side only.
III. A software program that runs on the application server, where most of the components reside.
(A) I, II & III (B) I & II (C) II & III (D) I only
Ans: D
19. A software agent is defined as
I. A software developed for accomplishing a given task.
II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.
(A) I
(B) II
(C) III
(D) All of the above
Ans: B
20. Match the following :
List – I List – II
a. Classification i. Principal component analysis
b. Clustering ii. Branch and Bound
c. Feature Extraction iii. K-nearest neighbour
d. Feature Selection iv. K-means
Codes :
a b c d
(A) iii iv ii i
(B) iv iii i ii
(C) iii iv i ii
(D) iv iii ii i
Ans: C
21. SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for
(A) Secure Electronic Transaction
(B) Secular Enterprise for Transaction
(C) Security Electronic Transmission
(D) Secured Electronic Termination
Ans: A
22. In a paged memory management algorithm, the hit ratio is 70%. If it takes 30 nanoseconds to search Translation Look-aside Buffer (TLB) and 100 nanoseconds (ns) to access memory, the effective memory access time is
(A) 91 ns (B) 69 ns
(C) 200 ns (D) 160 ns
Ans: D
23. Match the following :
List – I List – II
a. Multilevel feedback queue i. Time-slicing
b. FCFS ii. Criteria to move processes between queues
c. Shortest process next iii. Batch processing
d. Round robin scheduling iv. Exponential smoothening
Codes :
a b c d
(A) i iii ii iv
(B) iv iii ii i
(C) iii i iv i
(D) ii iii iv i
Ans: D
24. Match the following :
List – I List – II
a. Contiguous allocation i. This scheme supports very large file sizes.
b. Linked allocation ii. This allocation technique supports only sequential files.
c. Indexedal location iii. Number of disks required to access file is minimal.
d. Multi-level indexed iv. This technique suffers from maximum wastage of space in storing pointers.
Codes :
a b c d
(A) iii iv ii i
(B) iii ii iv i
(C) i ii iv iii
(D) i iv ii iii
Ans: B
25. Which of the following commands will output “onetwothree” ?
(A) for val; do echo-n $val; done <one two three
(B) for one two three; do echo-n-; done
(C) for n in one two three; do echo-n $n; done
(D) for n in one two three {echo –n $ n}
Ans: C
26. Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the merge step ?
(A) The array elements form a heap.
(B) Elements in each half of the array are sorted amongst themselves.
(C) Elements in the first half of the array are less than or equal to elements in second half of the array.
(D) All of the above
Ans: B
27. A text is made up of the characters α, β, γ, δ and σ with the probability 0.12, 0.40, 0.15, 0.08 and 0.25 respectively. The optimal coding technique will have the average length of
(A) 1.7 (B) 2.15
(C) 3.4 (D) 3.8
Ans: B
28. Searching for an element in the hash table requires O(1) time for the ________ time, whereas for direct addressing it holds for the ________
time.
(A) worst-case, average
(B) worst-case, worst-case
(C) average, worst-case
(D) best, average
Ans: C
29. What is the maximum number of parenthesis that will appear on the stack at any one time for parenthesis expression given by
( ( ) ( ( ) ) ( ( ) ) )
(A) 2 (B) 3
(C) 4 (D) 5
Ans: B
30. Match the following :
List – I List – II
a. Automatic storage class i. Scope of the variable is global.
b. Register storage class ii. Value of the variable persists between different function calls.
c. Static storage class iii. Value stored in memory and local to the block in which the variable is defined.
d. External storage class iv. Value stored in CPU registers.
Codes :
a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) iv iii ii i
(D) iv iii i ii
Ans: B
31. When we pass an array as an argument to a function, what actually gets passed ?
(A) Address of the array
(B) Values of the elements of the array
(C) Base address of the array
(D) Number of elements of the array
Ans: C
32. While (87) printf(“computer”);
The above C statement will
(A) print “computer” 87 times
(B) print “computer” 0 times
(C) print “computer” 1 times
(D) print “computer” infinite times
Ans: D
33. The worst case time complexity of AVL tree is better in comparison to binary search tree for
(A) Search and Insert Operations
(B) Search and Delete Operations
(C) Insert and Delete Operations
(D) Search, Insert and Delete Operations
Ans: D
34. The GSM network is divided into the following three major systems :
(A) SS, BSS, OSS
(B) BSS, BSC, MSC
(C) CELL, BSC, OSS
(D) SS, CELL, MSC
Ans: A
35. If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67.
(A) 239
(B) 310
(C) 321
(D) 325
Ans: C
36. Component level design is concerned with
(A) Flow oriented analysis
(B) Class based analysis
(C) Both of the above
(D) None of the above
Ans: C
37. The ‘C’ language is
(A) Context free language
(B) Context sensitive language
(C) Regular language
(D) None of the above
Ans: A
38. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
(A) SNMP (Simple Network Management Protocol)
(B) SMTP (Simple Mail Transfer Protocol)
(C) SS7 (Signalling System 7)
(D) HTTP (Hyper Text Transfer Protocol)
Ans: C
39. If a packet arrive with an M-bit value is ‘l’ and a fragmentation offset value ‘0’, then it is ______ fragment.
(A) First
(B) Middle
(C) Last
(D) All of the above
Ans: A
40. The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be
(A) 32
(B) 64
(C) 128
(D) 160
Ans: D
41. In compiler design ‘reducing the strength’ refers to
(A) reducing the range of values of input variables.
(B) code optimization using cheaper machine instructions.
(C) reducing efficiency of program.
(D) None of the above
Ans: B
42. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register ?
(A) Absolute
(B) Indirect
(C) Immediate
(D) Index
Ans: D
43. Which of the following is true ?
(A) A relation in BCNF is always in 3NF.
(B) A relation in 3NF is always in BCNF.
(C) BCNF and 3NF are same.
(D) A relation in BCNF is not in 3NF.
Ans: A
44. What is the size of the Unicode character in Windows Operating System ?
(A) 8-Bits
(B) 16-Bits
(C) 32-Bits
(D) 64-Bits
Ans: B
45. In which tree, for every node the height of its left subtree and right subtree differ almost by one ?
(A) Binary search tree
(B) AVL tree
(C) Threaded Binary Tree
(D) Complete Binary Tree
Ans: B
46. The design issue of Datalink Layer in OSI Reference Model is
(A) Framing
(B) Representation of bits
(C) Synchronization of bits
(D) Connection control
Ans: A
47. The maturity levels used to measure a process are
(A) Initial, Repeatable, Defined, Managed, Optimized.
(B) Primary, Secondary, Defined, Managed, Optimized.
(C) Initial, Stating, Defined, Managed, Optimized.
(D) None of the above
Ans: A
48. The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using :
(A) Parity bit
(B) Aging
(C) Compaction
(D) Timer
Ans: B
49. Which API is used to draw a circle ?
(A) Circle ( )
(B) Ellipse ( )
(C) Round Rect ( )
(D) Pie ( )
Ans: B
50. In DML, RECONNCT command cannot be used with
(A) OPTIONAL Set
(B) FIXED Set
(C) MANDATOR Set
(D) All of the above
Ans: B
(A) Search and Insert Operations
(B) Search and Delete Operations
(C) Insert and Delete Operations
(D) Search, Insert and Delete Operations
Ans: D
34. The GSM network is divided into the following three major systems :
(A) SS, BSS, OSS
(B) BSS, BSC, MSC
(C) CELL, BSC, OSS
(D) SS, CELL, MSC
Ans: A
35. If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67.
(A) 239
(B) 310
(C) 321
(D) 325
Ans: C
36. Component level design is concerned with
(A) Flow oriented analysis
(B) Class based analysis
(C) Both of the above
(D) None of the above
Ans: C
37. The ‘C’ language is
(A) Context free language
(B) Context sensitive language
(C) Regular language
(D) None of the above
Ans: A
38. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
(A) SNMP (Simple Network Management Protocol)
(B) SMTP (Simple Mail Transfer Protocol)
(C) SS7 (Signalling System 7)
(D) HTTP (Hyper Text Transfer Protocol)
Ans: C
39. If a packet arrive with an M-bit value is ‘l’ and a fragmentation offset value ‘0’, then it is ______ fragment.
(A) First
(B) Middle
(C) Last
(D) All of the above
Ans: A
40. The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be
(A) 32
(B) 64
(C) 128
(D) 160
Ans: D
41. In compiler design ‘reducing the strength’ refers to
(A) reducing the range of values of input variables.
(B) code optimization using cheaper machine instructions.
(C) reducing efficiency of program.
(D) None of the above
Ans: B
42. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register ?
(A) Absolute
(B) Indirect
(C) Immediate
(D) Index
Ans: D
43. Which of the following is true ?
(A) A relation in BCNF is always in 3NF.
(B) A relation in 3NF is always in BCNF.
(C) BCNF and 3NF are same.
(D) A relation in BCNF is not in 3NF.
Ans: A
44. What is the size of the Unicode character in Windows Operating System ?
(A) 8-Bits
(B) 16-Bits
(C) 32-Bits
(D) 64-Bits
Ans: B
45. In which tree, for every node the height of its left subtree and right subtree differ almost by one ?
(A) Binary search tree
(B) AVL tree
(C) Threaded Binary Tree
(D) Complete Binary Tree
Ans: B
46. The design issue of Datalink Layer in OSI Reference Model is
(A) Framing
(B) Representation of bits
(C) Synchronization of bits
(D) Connection control
Ans: A
47. The maturity levels used to measure a process are
(A) Initial, Repeatable, Defined, Managed, Optimized.
(B) Primary, Secondary, Defined, Managed, Optimized.
(C) Initial, Stating, Defined, Managed, Optimized.
(D) None of the above
Ans: A
48. The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using :
(A) Parity bit
(B) Aging
(C) Compaction
(D) Timer
Ans: B
49. Which API is used to draw a circle ?
(A) Circle ( )
(B) Ellipse ( )
(C) Round Rect ( )
(D) Pie ( )
Ans: B
50. In DML, RECONNCT command cannot be used with
(A) OPTIONAL Set
(B) FIXED Set
(C) MANDATOR Set
(D) All of the above
Ans: B
51. Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75 Ω used for
(A) Cable TV
(B) Ethernet
(C) Thin Ethernet
(D) Thick Ethernet
Ans: A
52. RAD stands for ______.
(A) Rapid and Design
(B) Rapid Aided Development
(C) Rapid Application Development
(D) Rapid Application Design
Ans: C
53. Suppose that someone starts with a chain letter. Each person who receives the letter is asked to send it on to 4 other people. Some people do this, while some do not send any letter. How many people have seen the letter, including the first person, if no one receives more than one letter and if the chain letter ends after there have been 100 people who read it but did not send it out ? Also find how many people
sent out the letter ?
(A) 122 & 22
(B) 111 & 11
(C) 133 & 33
(D) 144 & 44
Ans: C
54. Which of the following is true while converting CFG to LL(I) grammar ?
(A) Remove left recursion alone
(B) Factoring grammar alone
(C) Both of the above
(D) None of the above
Ans: C
55. Identify the Risk factors which are associated with Electronic payment system.
(A) Fraudulent use of Credit Cards.
(B) Sending Credit Card details over internet.
(C) Remote storage of Credit Card details.
(D) All of the above
Ans: D
56. Which of the following are two special functions that are meant for handling exception, that occur during exception handling itself ?
(A) Void terminate ( ) and Void unexpected ( )
(B) Non void terminate ( ) and void unexpected ( )
(C) Void terminate ( ) and non void unexpected ( )
(D) Non void terminate ( ) and non void unexpected ( )
Ans: A
57. Which of the following memory allocation scheme suffers from external fragmentation ?
(A) Segmentation
(B) Pure demand paging
(C) Swapping
(D) Paging
Ans: A
58. Basis path testing falls under
(A) system testing
(B) white box testing
(C) black box testing
(D) unit testing
Ans: B
59. The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between
(A) DBMS & the Host record
(B) Host program and Host record
(C) Host program and DBMS
(D) Host program and Host language
Ans: C
60. Which of the following is the most powerful parring method ?
(A) LL(I)
(B) Canonical LR
(C) SLR
(D) LALR
Ans: B
61. In UNIX, which of the following command is used to set the task priority ?
(A) init
(B) nice
(C) kill
(D) PS
Ans: B
62. AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.
(A) 5, 7, 15
(B) 10, 12, 14
(C) 5, 6, 7
(D) 20, 12, 14
Ans: B
63. Match the following IC families with their basic circuits :
a. TTL 1. NAND
b. ECL 2. NOR
c. CMOS 3. Inverter
Code :
a b c
(A) 1 2 3
(B) 3 2 1
(C) 2 3 1
(D) 2 1 3
Ans: A
64. Match the following with respect to C++ data types :
a. User defined type 1. Qualifier
b. Built in type 2. Union
c. Derived type 3. Void
d. Long double 4. Pointer
Code :
a b c d
(A) 2 3 4 1
(B) 3 1 4 2
(C) 4 1 2 3
(D) 3 4 1 2
Ans: A
65. Given an empty stack, after performing push (1), push (2), Pop, push (3), push (4), Pop, Pop, push(5), Pop, what is the value of the top of the stack ?
(A) 4
(B) 3
(C) 2
(D) 1
Ans: D
66. Enumeration is a process of
(A) Declaring a set of numbers
(B) Sorting a list of strings
(C) Assigning a legal values possible for a variable
(D) Sequencing a list of operators
Ans: C
67. Which of the following mode declaration is used in C++ to open a file for input ?
(A) ios : : app
(B) in : : ios
(C) ios : : file
(D) ios : : in
Ans: D
68. Data Encryption Techniques are particularly used for ______.
(A) protecting data in Data Communication System.
(B) reduce Storage Space Requirement.
(C) enhances Data Integrity.
(D) decreases Data Integrity.
Ans: A
69. What is the result of the following expression ?
(1 & 2) + (3 & 4)
(A) 1
(B) 3
(C) 2
(D) 0
Ans: D
70. Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
(A) Forward from source to sink
(B) Backward from sink to source
(C) Forward from source to hidden nodes
(D) Backward from since to hidden nodes
Ans: B
71. Match the following :
a. TTL 1. High fan out
b. ECL 2. Low propagation delay
c. CMOS 3. High power dissipation
Code : a b c
(A) 3 2 1
(B) 1 2 3
(C) 1 3 2
(D) 3 1 2
Ans: A
72. ______ is an “umbrella” activity that is applied throughout the software engineering process.
(A) Debugging
(B) Testing
(C) Designing
(D) Software quality assurance
Ans: D
73. Identify the operation which is commutative but not associative ?
(A) OR
(B) NOR
(C) EX-OR
(D) NAND
Ans: B or D
(A) Cable TV
(B) Ethernet
(C) Thin Ethernet
(D) Thick Ethernet
Ans: A
52. RAD stands for ______.
(A) Rapid and Design
(B) Rapid Aided Development
(C) Rapid Application Development
(D) Rapid Application Design
Ans: C
53. Suppose that someone starts with a chain letter. Each person who receives the letter is asked to send it on to 4 other people. Some people do this, while some do not send any letter. How many people have seen the letter, including the first person, if no one receives more than one letter and if the chain letter ends after there have been 100 people who read it but did not send it out ? Also find how many people
sent out the letter ?
(A) 122 & 22
(B) 111 & 11
(C) 133 & 33
(D) 144 & 44
Ans: C
54. Which of the following is true while converting CFG to LL(I) grammar ?
(A) Remove left recursion alone
(B) Factoring grammar alone
(C) Both of the above
(D) None of the above
Ans: C
55. Identify the Risk factors which are associated with Electronic payment system.
(A) Fraudulent use of Credit Cards.
(B) Sending Credit Card details over internet.
(C) Remote storage of Credit Card details.
(D) All of the above
Ans: D
56. Which of the following are two special functions that are meant for handling exception, that occur during exception handling itself ?
(A) Void terminate ( ) and Void unexpected ( )
(B) Non void terminate ( ) and void unexpected ( )
(C) Void terminate ( ) and non void unexpected ( )
(D) Non void terminate ( ) and non void unexpected ( )
Ans: A
57. Which of the following memory allocation scheme suffers from external fragmentation ?
(A) Segmentation
(B) Pure demand paging
(C) Swapping
(D) Paging
Ans: A
58. Basis path testing falls under
(A) system testing
(B) white box testing
(C) black box testing
(D) unit testing
Ans: B
59. The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between
(A) DBMS & the Host record
(B) Host program and Host record
(C) Host program and DBMS
(D) Host program and Host language
Ans: C
60. Which of the following is the most powerful parring method ?
(A) LL(I)
(B) Canonical LR
(C) SLR
(D) LALR
Ans: B
61. In UNIX, which of the following command is used to set the task priority ?
(A) init
(B) nice
(C) kill
(D) PS
Ans: B
62. AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.
(A) 5, 7, 15
(B) 10, 12, 14
(C) 5, 6, 7
(D) 20, 12, 14
Ans: B
63. Match the following IC families with their basic circuits :
a. TTL 1. NAND
b. ECL 2. NOR
c. CMOS 3. Inverter
Code :
a b c
(A) 1 2 3
(B) 3 2 1
(C) 2 3 1
(D) 2 1 3
Ans: A
64. Match the following with respect to C++ data types :
a. User defined type 1. Qualifier
b. Built in type 2. Union
c. Derived type 3. Void
d. Long double 4. Pointer
Code :
a b c d
(A) 2 3 4 1
(B) 3 1 4 2
(C) 4 1 2 3
(D) 3 4 1 2
Ans: A
65. Given an empty stack, after performing push (1), push (2), Pop, push (3), push (4), Pop, Pop, push(5), Pop, what is the value of the top of the stack ?
(A) 4
(B) 3
(C) 2
(D) 1
Ans: D
66. Enumeration is a process of
(A) Declaring a set of numbers
(B) Sorting a list of strings
(C) Assigning a legal values possible for a variable
(D) Sequencing a list of operators
Ans: C
67. Which of the following mode declaration is used in C++ to open a file for input ?
(A) ios : : app
(B) in : : ios
(C) ios : : file
(D) ios : : in
Ans: D
68. Data Encryption Techniques are particularly used for ______.
(A) protecting data in Data Communication System.
(B) reduce Storage Space Requirement.
(C) enhances Data Integrity.
(D) decreases Data Integrity.
Ans: A
69. What is the result of the following expression ?
(1 & 2) + (3 & 4)
(A) 1
(B) 3
(C) 2
(D) 0
Ans: D
70. Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
(A) Forward from source to sink
(B) Backward from sink to source
(C) Forward from source to hidden nodes
(D) Backward from since to hidden nodes
Ans: B
71. Match the following :
a. TTL 1. High fan out
b. ECL 2. Low propagation delay
c. CMOS 3. High power dissipation
Code : a b c
(A) 3 2 1
(B) 1 2 3
(C) 1 3 2
(D) 3 1 2
Ans: A
72. ______ is an “umbrella” activity that is applied throughout the software engineering process.
(A) Debugging
(B) Testing
(C) Designing
(D) Software quality assurance
Ans: D
73. Identify the operation which is commutative but not associative ?
(A) OR
(B) NOR
(C) EX-OR
(D) NAND
Ans: B or D
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15