COMPUTER SCIENCE AND APPLICATIONS- PAGE 4
1. Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ?
I. The beam-penetration is used with random scan monitors.
II. Shadow-mask is used in rasterscan systems.
III. Beam-penetration method is better than shadow-mask method.
IV. Shadow-mask method is better than beam-penetration method.
(A) I and II (B) II and III
(C) III only (D) IV only
Ans: C
2. Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used are
(A) Butt cap and sharp cap (B) Butt cap and round cap (C) Butt cap, sharp cap and round cap (D) Butt cap, round cap and projecting square cap
Ans: D
3. Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes :
List – I List – II
a. Line i. Type, Size, Color
b. Fill Area ii. Color, Size, Font
c. Text iii. Style, Color, Pattern d
. Marker iv. Type, Width, Color
Codes : a b c d
(A) i ii iii iv
(B) ii i iii iv
(C) iv iii ii i
(D) iii i iv ii
Ans: C
4. Consider a window bounded by the lines : x = 0; y= 0; x = 5 and y = 3. The line segment joining (–1, 0) and (4, 5), if clipped against this window will connect the points
(A) (0, 1) and (2, 3) (B) (0, 1) and (3, 3) (C) (0, 1) and (4, 3) (D) (0, 1) and (3, 2)
Ans: A
5. Which of the following color models are defined with three primary colors ?
(A) RGB and HSV color models (B) CMY and HSV color models (C) HSV and HLS color models (D) RGB and CMY color models
Ans: D
6. In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps ?
(A) 10 bps (B) 100 bps (C) 1000 bps (D) 10000 bps
Ans: C
7. Which of the following is used in the options field of IPv4 ?
(A) Strict source routing (B) Loose source routing (C) time stamp (D) All of the above
Ans: D
8. Consider a fuzzy set old as defined below Old = {(20, 0.1), (30, 0.2), (40, 0.4), (50, 0.6), (60, 0.8), (70, 1), (80, 1)} Then the alpha-cut for alpha = 0.4 for the set old will be
(A) {(40, 0.4)}
(B) {50, 60, 70, 80}
(C) {(20, 0.1), (30, 0.2)}
(D) {(20, 0), (30, 0), (40, 1),
(50, 1), (60, 1), (70, 1), (80, 1)}
Ans: D
9. Perceptron learning, Delta learning and LMS learning are learning methods which falls under the category of
(A) Error correction learning – learning with a teacher
(B) Reinforcement learning – learning with a critic
(C) Hebbian learning
(D) Competitive learning – learning without a teacher
Ans: A
10. Code blocks allow many algorithms to be implemented with the following parameters :
(A) clarity, elegance, performance (B) clarity, elegance, efficiency (C) elegance, performance, execution (D) execution, clarity, performance
Ans: B
11. Match the following with respect to the jump statements :
List – I List – II
a. return i. The conditional test and increment portions
b. goto ii. A value associated with it
c. break iii. Requires a label for operation
d. continue iv. An exit from only the innermost loop
Codes : a b c d
(A) ii iii iv I
(B) iii iv i ii
(C) iv iii ii i
(D) iv iii i ii
Ans: A
12. The control string in C++ consists of three important classifications of characters
(A) Escape sequence characters, Format specifiers and Whitespace characters
(B) Special characters, White-space characters and Non-white space characters
(C) Format specifiers, White-space characters and Non-white space characters
(D) Special characters, White-space characters and Format specifiers
Ans: C
13. Match the following with respect to I/O classes in object oriented programming :
List – I List – II
a. fopen() i. returns end of file
b. fclose() ii. return for any problem report
c. ferror() iii. returns 0
d. feof() iv. returns a file pointer
Codes : a b c d
(A) iv i ii iii (B) iii i iv ii
(C) ii iii iv i (D) iv iii i ii
Ans: A
14. Which one of the following describes the syntax of prolog program ?
I. Rules and facts are terminated by full stop (.)
II. Rules and facts are terminated by semicolon (;)
III. Variables names must start with upper case alphabets.
IV. Variables names must start with lower case alphabets.
Codes :
(A) I, II (B) III, IV (C) I, III (D) II, IV
Ans: C
15. Let L be any language. Define even (W) as the strings obtained by extracting from W the letters in the even-numbered positions and even(L) = {even (W) | W ∈ L}. We define another language Chop (L) by removing the two leftmost symbols of every string in L given by Chop(L) = {W | ν W ∈ L, with | ν | = 2}. If L is regular language then
(A) even(L) is regular and Chop(L) is not regular.
(B) Both even(L) and Chop(L) are regular.
(C) even(L) is not regular and Chop(L) is regular.
(D) Both even(L) and Chop(L) are not regular.
Ans: B
16. Software testing is
(A) the process of establishing that errors are not present.
(B) the process of establishing confidence that a program does what it is supposed to do.
(C) the process of executing a program to show that it is working as per specifications.
(D) the process of executing a program with the intent of finding errors.
Ans: D
17. Assume that a program will experience 200 failures in infinite time. It has now experienced 100 failures. The initial failure intensity was 20 failures/CPU hr. Then the current failure intensity will be
(A) 5 failures/CPU hr (B) 10 failures/CPU hr. (C) 20 failures/CPU hr. (D) 40 failures/CPU hr.
Ans: B
18. Consider a project with the following functional units : Number of user inputs = 50 Number of user outputs = 40 Number of user enquiries = 35 Number of user files = 06 Number of external interfaces = 04 Assuming all complexity adjustment factors and weighing factors as average, the function points for the project will be
(A) 135 (B) 722 (C) 675 (D) 672
Ans: D
19. Match the following :
List – I List – II
a. Correctness i. The extent to which a software tolerates the unexpected problems
b. Accuracy ii. The extent to which a software meets its specifications
c. Robustness iii. The extent to which a software has specified functions
d. Completeness iv. Meeting specifications with precision
Codes : a b c d
(A) ii iv i iii (B) i ii iii iv
(C) ii i iv iii (D) iv ii i iii
Ans: A
20. Which one of the following is not a definition of error ?
(A) It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct value.
(B) It refers to the actual output of a software and the correct output.
(C) It refers to a condition that causes a system to fail.
(D) It refers to human action that results in software containing a defect or fault.
Ans: C
21. Which one of the following is not a key process area in CMM level 5 ?
(A) Defect prevention (B) Process change management
(C) Software product engineering (D) Technology change management
Ans: C
22. Consider the following relational schemas for a library database :
Book (Title, Author, Catalog_no, Publisher, Year, Price) Collection(Title, Author, Catalog_no) with the following functional dependencies :
I. Title, Author → Catalog_no
II. Catalog_no → Title, Author, Publisher, Year
III. Publisher, Title, Year → Price Assume (Author, Title) is the key for both schemas.
Which one of the following is true ?
(A) Both Book and Collection are in BCNF.
(B) Both Book and Collection are in 3NF.
(C) Book is in 2NF and Collection in 3NF.
(D) Both Book and Collection are in 2NF.
Ans: C
23. Specialization Lattice stands for
(A) An entity type can participate as a subclass in only one specialization.
(B) An entity type can participate as a subclass in more than one specialization.
(C) An entity type that can participate in one specialization.
(D) An entity type that can participate in one generalization.
Ans: B
24. Match the following :
List – I List – II
a. Timeout ordering protocol i. Wait for graph
b. Deadlock prevention ii. Roll back
c. Deadlock detection iii. Wait-die scheme
d. Deadlock recovery iv. Thomas Write Rule
Codes : a b c d
(A) iv iii i ii
(B) iii ii iv i
(C) ii i iv iii
(D) iii i iv iii
Ans: A
25. Which layers of the OSI reference model are host-to-host layers ?
(A) Transport, Session, Presentation, Application
(B) Network, Transport, Session, Presentation
(C) Data-link, Network, Transport, Session
(D) Physical, Data-link, Network, Transport
Ans: A
26. Which one of the following is not a Client-Server application ?
(A) Internet chat (B) Web browser (C) E-mail (D) Ping
Ans: B
27. Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock : I. 2-phase locking II. Time phase ordering
(A) Both I & II (B) II only (C) I only (D) Neither I nor II
Ans: B
28. Match the following :
List – I List – II
a. Expert systems i. Pragmatics
b. Planning ii. Resolution
c. Prolog iii. Means-end analysis
d. Natural language processing iv. Explanation facility
Codes : a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) i ii iii iv
(D) iv iii ii I
Ans: D
29. STRIPS addresses the problem of efficiently representing and implementation of a planner. It is not related to which one of the following ?
(A) SHAKEY (B) SRI (C) NLP (D) None of these
Ans: C
30. Slots and facets are used in
(A) Semantic Networks (B) Frames (C) Rules (D) All of these
Ans: B
31. Consider f(N) = g(N) + h(N) Where function g is a measure of the cost of getting from the start node to the current node N and h is an estimate of additional cost of getting from the current node N to the goal node. Then f(N) = h(N) is used in which one of the following algorithms ?
(A) A* algorithm (B) AO* algorithm (C) Greedy best first search algorithm (D) Iterative A* algorithm
Ans: C
32. ________predicate calculus allows quantified variables to refer to objects in the domain of discourse and not to predicates or functions. (A) Zero-order (B) First-order (C) Second-order (D) High-order
Ans: B
33. ________ is used in game trees to reduce the number of branches of the search tree to be traversed without affecting the solution.
(A) Best first search (B) Goal stack planning (C) Alpha-beta pruning procedure (D) Min-max search
Ans: C
34. Consider a uniprocessor system where new processes arrive at an average of five processes per minute and each process needs an average of 6 seconds of service time. What will be the CPU utilization ?
(A) 80 % (B) 50 % (C) 60 % (D) 30 %
Ans: B
35. Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the pages. The page reference string is : 1 2 3 2 5 6 3 4 6 3 7 3 1 5 3 6 3 4 2 4 3 4 5 1 The number of page faults in LRU and optimal page replacement algorithms are respectively (without including initial page faults to fill available page frames with pages) :
(A) 9 and 6 (B) 10 and 7 (C) 9 and 7 (D) 10 and 6
Ans: B
36. Which of the following statements is not true about disk-arm scheduling algorithms ?
(A) SSTF (shortest seek time first) algorithm increases performance of FCFS.
(B) The number of requests for disk service are not influenced by file allocation method.
(C) Caching the directories and index blocks in main memory can also help in reducing disk arm movements.
(D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.
Ans: B
37. _________ maintains the list of free disk blocks in the Unix file system.
(A) I-node (B) Boot block
(C) Super block (D) File allocation table
Ans: C
38. A part of Windows 2000 operating system that is not portable is
(A) Device Management (B) Virtual Memory Management
(C) Processor Management (D) User Interface
Ans: B
39. Match the following with reference to Unix shell scripts :
List – I List – II
a. $? i. File name of the current script
b. $# ii. List of arguments
c. $0 iii. The number of arguments
d. $* iv. Exit status of last command
Codes : a b c d
(A) iii ii i iv
(B) ii iii i iv
(C) iv iii i ii
(D) i iii i iv
Ans: C
40. The advantage of _______ is that it can reference memory without paying the price of having a full memory address in the instruction.
(A) Direct addressing (B) Indexed addressing
(C) Register addressing (D) Register Indirect addressing
Ans: D
41. The reverse polish notation equivalent to the infix expression ((A + B) * C + D)/(E + F + G)
(A) A B + C * D + EF + G + /
(B) A B + C D * + E F + G + /
(C) A B + C * D + E F G + +/
(D) A B + C * D + E + F G + /
Ans: A
42. The output of a sequential circuit depends on
(A) present input only (B) past input only
(C) both present and past input (D) past output only
Ans: C
43. A terminal multiplexer has six 1200 bps terminals and ‘n’ 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ?
(A) 4 (B) 8 (C) 16 (D) 28
Ans: D
44. Which of the following flip-flops is free from race condition ?
(A) T flip-flop (B) SR flip-flop
(C) Master-slave JK flip-flop (D) None of the above
Ans: D
45. One of the main features that distinguish microprocessor from micro-computers is
(A) words are usually larger in microprocessors. (B) words are shorter in microprocessors.
(C) microprocessor does not contain I/O devices. (D) None of the above.
Ans: C
46. The output generated by the LINUX command : $ seq 1 2 10 will be
(A) 1 2 10
(B) 1 2 3 4 5 6 7 8 9 10
(C) 1 3 5 7 9
(D) 1 5 10
Ans: C
47. All the classes necessary for windows programming are available in the module :
(A) win.txt (B) win.main (C) win.std (D) MFC
Ans: A
48. Windows 32 API supports
(A) 16-bit Windows (B) 32-bit Windows (C) 64-bit Windows (D) All of the above
Ans: D
49. Superficially the term “objectoriented”, means that, we organize software as a
(A) collection of continuous objects that incorporates both data structure and behaviour.
(B) collection of discrete objects that incorporates both discrete structure and behaviour.
(C) collection of discrete objects that incorporates both data structure and behaviour.
(D) collection of objects that incorporates both discrete data structure and behaviour.
Ans: C
50. The “part-whole”, or “a-part-of”, relationship in which objects representing the components of something associated with an object representing the entire assembly is called as
(A) Association (B) Aggregation (C) Encapsulation (D) Generalisation
Ans: B
I. The beam-penetration is used with random scan monitors.
II. Shadow-mask is used in rasterscan systems.
III. Beam-penetration method is better than shadow-mask method.
IV. Shadow-mask method is better than beam-penetration method.
(A) I and II (B) II and III
(C) III only (D) IV only
Ans: C
2. Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used are
(A) Butt cap and sharp cap (B) Butt cap and round cap (C) Butt cap, sharp cap and round cap (D) Butt cap, round cap and projecting square cap
Ans: D
3. Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes :
List – I List – II
a. Line i. Type, Size, Color
b. Fill Area ii. Color, Size, Font
c. Text iii. Style, Color, Pattern d
. Marker iv. Type, Width, Color
Codes : a b c d
(A) i ii iii iv
(B) ii i iii iv
(C) iv iii ii i
(D) iii i iv ii
Ans: C
4. Consider a window bounded by the lines : x = 0; y= 0; x = 5 and y = 3. The line segment joining (–1, 0) and (4, 5), if clipped against this window will connect the points
(A) (0, 1) and (2, 3) (B) (0, 1) and (3, 3) (C) (0, 1) and (4, 3) (D) (0, 1) and (3, 2)
Ans: A
5. Which of the following color models are defined with three primary colors ?
(A) RGB and HSV color models (B) CMY and HSV color models (C) HSV and HLS color models (D) RGB and CMY color models
Ans: D
6. In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps ?
(A) 10 bps (B) 100 bps (C) 1000 bps (D) 10000 bps
Ans: C
7. Which of the following is used in the options field of IPv4 ?
(A) Strict source routing (B) Loose source routing (C) time stamp (D) All of the above
Ans: D
8. Consider a fuzzy set old as defined below Old = {(20, 0.1), (30, 0.2), (40, 0.4), (50, 0.6), (60, 0.8), (70, 1), (80, 1)} Then the alpha-cut for alpha = 0.4 for the set old will be
(A) {(40, 0.4)}
(B) {50, 60, 70, 80}
(C) {(20, 0.1), (30, 0.2)}
(D) {(20, 0), (30, 0), (40, 1),
(50, 1), (60, 1), (70, 1), (80, 1)}
Ans: D
9. Perceptron learning, Delta learning and LMS learning are learning methods which falls under the category of
(A) Error correction learning – learning with a teacher
(B) Reinforcement learning – learning with a critic
(C) Hebbian learning
(D) Competitive learning – learning without a teacher
Ans: A
10. Code blocks allow many algorithms to be implemented with the following parameters :
(A) clarity, elegance, performance (B) clarity, elegance, efficiency (C) elegance, performance, execution (D) execution, clarity, performance
Ans: B
11. Match the following with respect to the jump statements :
List – I List – II
a. return i. The conditional test and increment portions
b. goto ii. A value associated with it
c. break iii. Requires a label for operation
d. continue iv. An exit from only the innermost loop
Codes : a b c d
(A) ii iii iv I
(B) iii iv i ii
(C) iv iii ii i
(D) iv iii i ii
Ans: A
12. The control string in C++ consists of three important classifications of characters
(A) Escape sequence characters, Format specifiers and Whitespace characters
(B) Special characters, White-space characters and Non-white space characters
(C) Format specifiers, White-space characters and Non-white space characters
(D) Special characters, White-space characters and Format specifiers
Ans: C
13. Match the following with respect to I/O classes in object oriented programming :
List – I List – II
a. fopen() i. returns end of file
b. fclose() ii. return for any problem report
c. ferror() iii. returns 0
d. feof() iv. returns a file pointer
Codes : a b c d
(A) iv i ii iii (B) iii i iv ii
(C) ii iii iv i (D) iv iii i ii
Ans: A
14. Which one of the following describes the syntax of prolog program ?
I. Rules and facts are terminated by full stop (.)
II. Rules and facts are terminated by semicolon (;)
III. Variables names must start with upper case alphabets.
IV. Variables names must start with lower case alphabets.
Codes :
(A) I, II (B) III, IV (C) I, III (D) II, IV
Ans: C
15. Let L be any language. Define even (W) as the strings obtained by extracting from W the letters in the even-numbered positions and even(L) = {even (W) | W ∈ L}. We define another language Chop (L) by removing the two leftmost symbols of every string in L given by Chop(L) = {W | ν W ∈ L, with | ν | = 2}. If L is regular language then
(A) even(L) is regular and Chop(L) is not regular.
(B) Both even(L) and Chop(L) are regular.
(C) even(L) is not regular and Chop(L) is regular.
(D) Both even(L) and Chop(L) are not regular.
Ans: B
16. Software testing is
(A) the process of establishing that errors are not present.
(B) the process of establishing confidence that a program does what it is supposed to do.
(C) the process of executing a program to show that it is working as per specifications.
(D) the process of executing a program with the intent of finding errors.
Ans: D
17. Assume that a program will experience 200 failures in infinite time. It has now experienced 100 failures. The initial failure intensity was 20 failures/CPU hr. Then the current failure intensity will be
(A) 5 failures/CPU hr (B) 10 failures/CPU hr. (C) 20 failures/CPU hr. (D) 40 failures/CPU hr.
Ans: B
18. Consider a project with the following functional units : Number of user inputs = 50 Number of user outputs = 40 Number of user enquiries = 35 Number of user files = 06 Number of external interfaces = 04 Assuming all complexity adjustment factors and weighing factors as average, the function points for the project will be
(A) 135 (B) 722 (C) 675 (D) 672
Ans: D
19. Match the following :
List – I List – II
a. Correctness i. The extent to which a software tolerates the unexpected problems
b. Accuracy ii. The extent to which a software meets its specifications
c. Robustness iii. The extent to which a software has specified functions
d. Completeness iv. Meeting specifications with precision
Codes : a b c d
(A) ii iv i iii (B) i ii iii iv
(C) ii i iv iii (D) iv ii i iii
Ans: A
20. Which one of the following is not a definition of error ?
(A) It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct value.
(B) It refers to the actual output of a software and the correct output.
(C) It refers to a condition that causes a system to fail.
(D) It refers to human action that results in software containing a defect or fault.
Ans: C
21. Which one of the following is not a key process area in CMM level 5 ?
(A) Defect prevention (B) Process change management
(C) Software product engineering (D) Technology change management
Ans: C
22. Consider the following relational schemas for a library database :
Book (Title, Author, Catalog_no, Publisher, Year, Price) Collection(Title, Author, Catalog_no) with the following functional dependencies :
I. Title, Author → Catalog_no
II. Catalog_no → Title, Author, Publisher, Year
III. Publisher, Title, Year → Price Assume (Author, Title) is the key for both schemas.
Which one of the following is true ?
(A) Both Book and Collection are in BCNF.
(B) Both Book and Collection are in 3NF.
(C) Book is in 2NF and Collection in 3NF.
(D) Both Book and Collection are in 2NF.
Ans: C
23. Specialization Lattice stands for
(A) An entity type can participate as a subclass in only one specialization.
(B) An entity type can participate as a subclass in more than one specialization.
(C) An entity type that can participate in one specialization.
(D) An entity type that can participate in one generalization.
Ans: B
24. Match the following :
List – I List – II
a. Timeout ordering protocol i. Wait for graph
b. Deadlock prevention ii. Roll back
c. Deadlock detection iii. Wait-die scheme
d. Deadlock recovery iv. Thomas Write Rule
Codes : a b c d
(A) iv iii i ii
(B) iii ii iv i
(C) ii i iv iii
(D) iii i iv iii
Ans: A
25. Which layers of the OSI reference model are host-to-host layers ?
(A) Transport, Session, Presentation, Application
(B) Network, Transport, Session, Presentation
(C) Data-link, Network, Transport, Session
(D) Physical, Data-link, Network, Transport
Ans: A
26. Which one of the following is not a Client-Server application ?
(A) Internet chat (B) Web browser (C) E-mail (D) Ping
Ans: B
27. Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock : I. 2-phase locking II. Time phase ordering
(A) Both I & II (B) II only (C) I only (D) Neither I nor II
Ans: B
28. Match the following :
List – I List – II
a. Expert systems i. Pragmatics
b. Planning ii. Resolution
c. Prolog iii. Means-end analysis
d. Natural language processing iv. Explanation facility
Codes : a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) i ii iii iv
(D) iv iii ii I
Ans: D
29. STRIPS addresses the problem of efficiently representing and implementation of a planner. It is not related to which one of the following ?
(A) SHAKEY (B) SRI (C) NLP (D) None of these
Ans: C
30. Slots and facets are used in
(A) Semantic Networks (B) Frames (C) Rules (D) All of these
Ans: B
31. Consider f(N) = g(N) + h(N) Where function g is a measure of the cost of getting from the start node to the current node N and h is an estimate of additional cost of getting from the current node N to the goal node. Then f(N) = h(N) is used in which one of the following algorithms ?
(A) A* algorithm (B) AO* algorithm (C) Greedy best first search algorithm (D) Iterative A* algorithm
Ans: C
32. ________predicate calculus allows quantified variables to refer to objects in the domain of discourse and not to predicates or functions. (A) Zero-order (B) First-order (C) Second-order (D) High-order
Ans: B
33. ________ is used in game trees to reduce the number of branches of the search tree to be traversed without affecting the solution.
(A) Best first search (B) Goal stack planning (C) Alpha-beta pruning procedure (D) Min-max search
Ans: C
34. Consider a uniprocessor system where new processes arrive at an average of five processes per minute and each process needs an average of 6 seconds of service time. What will be the CPU utilization ?
(A) 80 % (B) 50 % (C) 60 % (D) 30 %
Ans: B
35. Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the pages. The page reference string is : 1 2 3 2 5 6 3 4 6 3 7 3 1 5 3 6 3 4 2 4 3 4 5 1 The number of page faults in LRU and optimal page replacement algorithms are respectively (without including initial page faults to fill available page frames with pages) :
(A) 9 and 6 (B) 10 and 7 (C) 9 and 7 (D) 10 and 6
Ans: B
36. Which of the following statements is not true about disk-arm scheduling algorithms ?
(A) SSTF (shortest seek time first) algorithm increases performance of FCFS.
(B) The number of requests for disk service are not influenced by file allocation method.
(C) Caching the directories and index blocks in main memory can also help in reducing disk arm movements.
(D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.
Ans: B
37. _________ maintains the list of free disk blocks in the Unix file system.
(A) I-node (B) Boot block
(C) Super block (D) File allocation table
Ans: C
38. A part of Windows 2000 operating system that is not portable is
(A) Device Management (B) Virtual Memory Management
(C) Processor Management (D) User Interface
Ans: B
39. Match the following with reference to Unix shell scripts :
List – I List – II
a. $? i. File name of the current script
b. $# ii. List of arguments
c. $0 iii. The number of arguments
d. $* iv. Exit status of last command
Codes : a b c d
(A) iii ii i iv
(B) ii iii i iv
(C) iv iii i ii
(D) i iii i iv
Ans: C
40. The advantage of _______ is that it can reference memory without paying the price of having a full memory address in the instruction.
(A) Direct addressing (B) Indexed addressing
(C) Register addressing (D) Register Indirect addressing
Ans: D
41. The reverse polish notation equivalent to the infix expression ((A + B) * C + D)/(E + F + G)
(A) A B + C * D + EF + G + /
(B) A B + C D * + E F + G + /
(C) A B + C * D + E F G + +/
(D) A B + C * D + E + F G + /
Ans: A
42. The output of a sequential circuit depends on
(A) present input only (B) past input only
(C) both present and past input (D) past output only
Ans: C
43. A terminal multiplexer has six 1200 bps terminals and ‘n’ 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ?
(A) 4 (B) 8 (C) 16 (D) 28
Ans: D
44. Which of the following flip-flops is free from race condition ?
(A) T flip-flop (B) SR flip-flop
(C) Master-slave JK flip-flop (D) None of the above
Ans: D
45. One of the main features that distinguish microprocessor from micro-computers is
(A) words are usually larger in microprocessors. (B) words are shorter in microprocessors.
(C) microprocessor does not contain I/O devices. (D) None of the above.
Ans: C
46. The output generated by the LINUX command : $ seq 1 2 10 will be
(A) 1 2 10
(B) 1 2 3 4 5 6 7 8 9 10
(C) 1 3 5 7 9
(D) 1 5 10
Ans: C
47. All the classes necessary for windows programming are available in the module :
(A) win.txt (B) win.main (C) win.std (D) MFC
Ans: A
48. Windows 32 API supports
(A) 16-bit Windows (B) 32-bit Windows (C) 64-bit Windows (D) All of the above
Ans: D
49. Superficially the term “objectoriented”, means that, we organize software as a
(A) collection of continuous objects that incorporates both data structure and behaviour.
(B) collection of discrete objects that incorporates both discrete structure and behaviour.
(C) collection of discrete objects that incorporates both data structure and behaviour.
(D) collection of objects that incorporates both discrete data structure and behaviour.
Ans: C
50. The “part-whole”, or “a-part-of”, relationship in which objects representing the components of something associated with an object representing the entire assembly is called as
(A) Association (B) Aggregation (C) Encapsulation (D) Generalisation
Ans: B
51. The pure object oriented programming language with extensive metadata available and modifiable at run time is
(A) Small talk (B) C++
(C) Java (D) Eiffel
Ans: A
52. Match the following interfaces of Java. Servlet package :
List – I List – II
a. Servlet Config i. Enables Servlets to log events
b. Servlet Context ii. Read data from a client
c. Servlet Request iii. Write data to a client
d. Servlet Response
iv. To get initialization parameters
Codes :
a b c d
(A) iii iv ii i
(B) iii ii iv i
(C) ii iii iv i
(D) iv i ii iii
Ans: D
53. The syntax of capturing events method for document object is
(A) CaptureEvents()
(B) CaptureEvents(Orgs eventType)
(C) CaptureEvents(eventType)
(D) CaptureEvents(eventVal)
Ans: C
54. Linking to another place in the same or another webpage require two A (Anchor) tags, the first with the ________ attribute and the second with the _________ attribute.
(A) NAME & LINK (B) LINK & HREF (C) HREF & NAME (D) TARGET & VALUE
Ans: C
55. Given an image of size 1024 × 1024 pixels in which intensity of each pixel is an 8-bit quality. It requires _______ of storage space if the image is not compressed.
(A) one Terabyte (B) one Megabyte (C) 8 Megabytes (D) 8 Terabytes
Ans: B
56. Match the following cryptographic algorithms with their design issues :
List – I List – II
a. DES i. Message Digest
b. AES ii. Public Key
c. RSA iii. 56-bit key
d. SHA-1 iv. 128-bit key
Codes : a b c d
(A) ii i iv iii (B) iii i iv ii
(C) iii iv ii i (D) iv i ii iii
Ans: C
57. Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is
(A) 5 (B) 10 (C) 8 (D) 9
Ans: A
58. Which of the following special cases does not require reformulation of the problem in order to obtain a solution ?
(A) Alternate optimality (B) Infeasibility (C) Unboundedness (D) All of the above
Ans: A
59. The given maximization assignment problem can be converted into a minimization problem by
(A) subtracting each entry in a column from the maximum value in that column.
(B) subtracting each entry in the table from the maximum value in that table.
(C) adding each entry in a column from the maximum value in that column.
(D) adding maximum value of the table to each entry in the table.
Ans: B
60. If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n < m, the expected number of collisions involving a particular key K is
(A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n
Ans: A
61. Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.
(A) 30,000 (B) 32,700 (C) 33,000 (D) None of the above
Ans: B
(A) Small talk (B) C++
(C) Java (D) Eiffel
Ans: A
52. Match the following interfaces of Java. Servlet package :
List – I List – II
a. Servlet Config i. Enables Servlets to log events
b. Servlet Context ii. Read data from a client
c. Servlet Request iii. Write data to a client
d. Servlet Response
iv. To get initialization parameters
Codes :
a b c d
(A) iii iv ii i
(B) iii ii iv i
(C) ii iii iv i
(D) iv i ii iii
Ans: D
53. The syntax of capturing events method for document object is
(A) CaptureEvents()
(B) CaptureEvents(Orgs eventType)
(C) CaptureEvents(eventType)
(D) CaptureEvents(eventVal)
Ans: C
54. Linking to another place in the same or another webpage require two A (Anchor) tags, the first with the ________ attribute and the second with the _________ attribute.
(A) NAME & LINK (B) LINK & HREF (C) HREF & NAME (D) TARGET & VALUE
Ans: C
55. Given an image of size 1024 × 1024 pixels in which intensity of each pixel is an 8-bit quality. It requires _______ of storage space if the image is not compressed.
(A) one Terabyte (B) one Megabyte (C) 8 Megabytes (D) 8 Terabytes
Ans: B
56. Match the following cryptographic algorithms with their design issues :
List – I List – II
a. DES i. Message Digest
b. AES ii. Public Key
c. RSA iii. 56-bit key
d. SHA-1 iv. 128-bit key
Codes : a b c d
(A) ii i iv iii (B) iii i iv ii
(C) iii iv ii i (D) iv i ii iii
Ans: C
57. Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is
(A) 5 (B) 10 (C) 8 (D) 9
Ans: A
58. Which of the following special cases does not require reformulation of the problem in order to obtain a solution ?
(A) Alternate optimality (B) Infeasibility (C) Unboundedness (D) All of the above
Ans: A
59. The given maximization assignment problem can be converted into a minimization problem by
(A) subtracting each entry in a column from the maximum value in that column.
(B) subtracting each entry in the table from the maximum value in that table.
(C) adding each entry in a column from the maximum value in that column.
(D) adding maximum value of the table to each entry in the table.
Ans: B
60. If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n < m, the expected number of collisions involving a particular key K is
(A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n
Ans: A
61. Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.
(A) 30,000 (B) 32,700 (C) 33,000 (D) None of the above
Ans: B
62. A program P calls two subprograms P1 and P2. P1 can fail 50% times and P2 40% times. Then P can fail
(A) 50%
(B) 60%
(C) 10%
(D) 70%
Ans: D
63. Third normal form is based on the concept of ______.
(A) Closure Dependency
(B) Transitive Dependency
(C) Normal Dependency
(D) Functional Dependency
Ans: B
64. The factors that determine the quality of a software system are
(A) correctness, reliability
(B) efficiency, usability, maintainability
(C) testability, portability, accuracy, error tolerances, expandability, access control, audit.
(D) All of the above
Ans: D
65. ______ establishes information about when, why and by whom changes are made in a software.
(A) Software Configuration Management.
(B) Change Control.
(C) Version Control.
(D) An Audit Trail.
Ans: D
66. Match the following with respect to HTML tags and usage.
a. CITE 1. Italic representation
b. EM 2. Represents output from programmes
c. VAR 3. Represents to other source
d. SAMP 4. Argument to a programme
Codes :
a b c d
(A) 3 1 4 2
(B) 2 3 1 4
(C) 4 2 3 1
(D) 1 3 4 1
Ans: A
67. An expert system shell is an expert system without
(A) domain knowledge
(B) explanation facility
(C) reasoning with knowledge
(D) all of the above
Ans: A
68. An example of a dictionary-based coding technique is
(A) Run-length coding
(B) Huffman coding
(C) Predictive coding
(D) LZW coding
Ans: D
69. Which is the method used to retrieve the current state of a check box ?
(A) get State ( )
(B) put State ( )
(C) retrieve State ( )
(D) write State ( )
Ans: A
70. Referential integrity is directly related to
(A) Relation key
(B) Foreign key
(C) Primary key
(D) Candidate key
Ans: B
71. A cryptarithmetic problem of the type
SEND
+ MORE
MONEY
Can be solved efficiently using
(A) depth first technique
(B) breadth first technique
(C) constraint satisfaction technique
(D) bidirectional technique
Ans: C
72. Match the following :
a. Supervised learning 1. The decision system receives rewards for its action at the end of a sequence of steps.
b. Unsupervised learning 2. Manual labels of inputs are not used.
c. Reinforcement learning 3. Manual labels of inputs are used.
d. Inductive learning 4. System learns by example
Codes : a b c d
(A) 1 2 3 4
(B) 2 3 1 4
(C) 3 2 4 1
(D) 3 2 1 4
Ans: D
73. A * algorithm is guaranteed to find an optimal solution if
(A) h' is always 0. (B) g is always 1.
(C) h' never overestimates h. (D) h' never underestimates h.
Ans: C
74. Consider the program below in a hypothetical programming language which allows global variables and a choice of static or dynamic scoping
int i;
program Main( )
{
i = 10;
call f ( );
}
procedure f( )
{
int i = 20;
call g ( );
}
procedure g( )
{
print i;
}
Let x be the value printed under static scoping and y be the value printed under dynamic scoping. Then x and y are
(A) x = 10, y = 20
(B) x = 20, y = 10
(C) x = 20, y = 20
(D) x = 10, y = 10
Ans: D
75. The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system
(A) Class Model, Object Model and Analysis Model.
(B) Object Model, Dynamic Model, and Functional Model.
(C) Class Model, Dynamic Model and Functional Model.
(D) Object Model, Analysis Model and Dynamic Model.
Ans: B
76. Given the following statements :
(i) Recursive enumerable sets are closed under complementation.
(ii) Recursive sets are closed under complementation.
Which is/are the correct statements ?
(A) only (i)
(B) only (ii)
(C) both (i) and (ii)
(D) neither (i) nor (ii)
Ans: B
77. Skolmization is the process of
(A) bringing all the quantifiers in the beginning of a formula in FDL.
(B) removing all the universal quantifiers.
(C) removing all the existential quantifiers.
(D) all of the above.
Ans: C
78. Which level of Abstraction describes how data are stored in the data base ?
(A) Physical level (B) View level (C) Abstraction level (D) Logical level
Ans: A
79. The transform which possesses the “multi-resolution” property is
(A) Fourier transform (B) Short-time-Fourier transform
(C) Wavelet transform (D) Karhunen-Loere transform
Ans: C
80. Which one is a collection of templates and rules ?
(A) XML (B) CSS (C) DHTML (D) XSL
Ans: D
(A) 50%
(B) 60%
(C) 10%
(D) 70%
Ans: D
63. Third normal form is based on the concept of ______.
(A) Closure Dependency
(B) Transitive Dependency
(C) Normal Dependency
(D) Functional Dependency
Ans: B
64. The factors that determine the quality of a software system are
(A) correctness, reliability
(B) efficiency, usability, maintainability
(C) testability, portability, accuracy, error tolerances, expandability, access control, audit.
(D) All of the above
Ans: D
65. ______ establishes information about when, why and by whom changes are made in a software.
(A) Software Configuration Management.
(B) Change Control.
(C) Version Control.
(D) An Audit Trail.
Ans: D
66. Match the following with respect to HTML tags and usage.
a. CITE 1. Italic representation
b. EM 2. Represents output from programmes
c. VAR 3. Represents to other source
d. SAMP 4. Argument to a programme
Codes :
a b c d
(A) 3 1 4 2
(B) 2 3 1 4
(C) 4 2 3 1
(D) 1 3 4 1
Ans: A
67. An expert system shell is an expert system without
(A) domain knowledge
(B) explanation facility
(C) reasoning with knowledge
(D) all of the above
Ans: A
68. An example of a dictionary-based coding technique is
(A) Run-length coding
(B) Huffman coding
(C) Predictive coding
(D) LZW coding
Ans: D
69. Which is the method used to retrieve the current state of a check box ?
(A) get State ( )
(B) put State ( )
(C) retrieve State ( )
(D) write State ( )
Ans: A
70. Referential integrity is directly related to
(A) Relation key
(B) Foreign key
(C) Primary key
(D) Candidate key
Ans: B
71. A cryptarithmetic problem of the type
SEND
+ MORE
MONEY
Can be solved efficiently using
(A) depth first technique
(B) breadth first technique
(C) constraint satisfaction technique
(D) bidirectional technique
Ans: C
72. Match the following :
a. Supervised learning 1. The decision system receives rewards for its action at the end of a sequence of steps.
b. Unsupervised learning 2. Manual labels of inputs are not used.
c. Reinforcement learning 3. Manual labels of inputs are used.
d. Inductive learning 4. System learns by example
Codes : a b c d
(A) 1 2 3 4
(B) 2 3 1 4
(C) 3 2 4 1
(D) 3 2 1 4
Ans: D
73. A * algorithm is guaranteed to find an optimal solution if
(A) h' is always 0. (B) g is always 1.
(C) h' never overestimates h. (D) h' never underestimates h.
Ans: C
74. Consider the program below in a hypothetical programming language which allows global variables and a choice of static or dynamic scoping
int i;
program Main( )
{
i = 10;
call f ( );
}
procedure f( )
{
int i = 20;
call g ( );
}
procedure g( )
{
print i;
}
Let x be the value printed under static scoping and y be the value printed under dynamic scoping. Then x and y are
(A) x = 10, y = 20
(B) x = 20, y = 10
(C) x = 20, y = 20
(D) x = 10, y = 10
Ans: D
75. The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system
(A) Class Model, Object Model and Analysis Model.
(B) Object Model, Dynamic Model, and Functional Model.
(C) Class Model, Dynamic Model and Functional Model.
(D) Object Model, Analysis Model and Dynamic Model.
Ans: B
76. Given the following statements :
(i) Recursive enumerable sets are closed under complementation.
(ii) Recursive sets are closed under complementation.
Which is/are the correct statements ?
(A) only (i)
(B) only (ii)
(C) both (i) and (ii)
(D) neither (i) nor (ii)
Ans: B
77. Skolmization is the process of
(A) bringing all the quantifiers in the beginning of a formula in FDL.
(B) removing all the universal quantifiers.
(C) removing all the existential quantifiers.
(D) all of the above.
Ans: C
78. Which level of Abstraction describes how data are stored in the data base ?
(A) Physical level (B) View level (C) Abstraction level (D) Logical level
Ans: A
79. The transform which possesses the “multi-resolution” property is
(A) Fourier transform (B) Short-time-Fourier transform
(C) Wavelet transform (D) Karhunen-Loere transform
Ans: C
80. Which one is a collection of templates and rules ?
(A) XML (B) CSS (C) DHTML (D) XSL
Ans: D
81. The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can be handled by this algorithm shall
(A) Depend on the application (B) be arbitrary no. of objects
(C) Depend on the memory availability (D) Depend on the processor
Ans: B
82. The power set of AUB, where A = {2, 3, 5, 7} and B = {2, 5, 8, 9} is
(A) 256 (B) 64 (C) 16 (D) 4
Ans: B
83. In Win32, which function is used to create Windows Applications ?
(A) Win APP (B) Win API (C) Win Main (D) Win Void
Ans: C
84. Everything below the system call interface and above the physical hardware is known as ______.
(A) Kernel (B) Bus (C) Shell (D) Stub
Ans: A
85. Which is not the correct statement ?
(A) The class of regular sets is closed under homomorphisms.
(B) The class of regular sets is not closed under inverse homomorphisms.
(C) The class of regular sets is closed under quotient.
(D) The class of regular sets is closed under substitution.
Ans: B
86. When a programming Language has the capacity to produce new datatype, it is called as,
(A) Overloaded Language
(B) Extensible Language
(C) Encapsulated Language
(D) Abstraction Language
Ans: B
87. Which of the following operating system is better for implementing client-server network ?
(A) Windows 95
(B) Windows 98
(C) Windows 2000
(D) All of these
Ans: C
88. Consider a system having m resources of the same type. These resources are shared by 3 processes A, B and C which have peak demands of 3, 4 and 6 respectively. For what value of m deadlock will not occur ?
(A) 7
(B) 9
(C) 10
(D) 13
Ans: D
89. The Default Parameter Passing Mechanism is called as
(A) Call by Value (B) Call by Reference (C) Call by Address (D) Call by Name
Ans: A
90. Which of the following regular expression identities are true ?
(A) (r + s)* = r* s*
(B) (r + s)* = r* + s*
(C) (r + s)* = (r*s*)*
(D) r* s* = r* + s*
Ans: C
91. Functions defined with class name are called as
(A) Inline function (B) Friend function (C) Constructor (D) Static function
Ans: C
92. If dual has an unbounded solution, then its corresponding primal has
(A) no feasible solution (B) unbounded solution (C) feasible solution (D) none of these
Ans: A
93. The number of distinct bracelets of five beads made up of red, blue, and green beads (two bracelets are indistinguishable if the rotation of one yield another) is,
(A) 243 (B) 81 (C) 51 (D) 47
Ans: C
94. Which are the classifications of data used in Mobile Applications ?
(A) Private data, User data, Shared data. (B) Public data, User data, Virtual data.
(C) Private data, Public data, Shared data. (D) Public data, Virtual data, User data.
Ans: C
95. 58 lamps are to be connected to a single electric outlet by using an extension board each of which has four outlets. The number of extension boards needed to connect all the light is
(A) 29 (B) 28 (C) 20 (D) 19
Ans: D
96. Match the following with respect to the Mobile Computing Architecture.
a. Downlink control 1. 100 Mbps
b. Radio communication data rate 2. Residency latency (RL)
c. The average duration of user’s stay in cell 3. Sending data from a BS to MD
d. FDDI bandwidth 4. 2-Mbps
Codes : a b c d
(A) 2 1 4 3
(B) 3 4 2 1
(C) 4 1 2 1
(D) 4 3 1 2
Ans: B
97. Which of the following flags are set when ‘JMP’ instruction is executed ?
(A) SF and CF (B) AF and CF (C) All flags (D) No flag is set
Ans: D
98. A thread is a light weight process. In the above statement, weight refers to
(A) time (B) number of resources (C) speed (D) All the above
Ans: B
99. Which of the following permutations can be obtained in the output using a stack of size 3 elements assuming that input, sequence is 1, 2, 3, 4, 5 ?
(A) 3, 2, 1, 5, 4 (B) 5, 4, 3, 2, 1 (C) 3, 4, 5, 2, 1 (D) 3, 4, 5, 1, 2
Ans: A and C
100. In a Linear Programming Problem, suppose there are 3 basic variables and 2 non-basic variables, then the possible number of basic solutions are
(A) 6 (B) 8 (C) 10 (D) 12
Ans: C
(A) Depend on the application (B) be arbitrary no. of objects
(C) Depend on the memory availability (D) Depend on the processor
Ans: B
82. The power set of AUB, where A = {2, 3, 5, 7} and B = {2, 5, 8, 9} is
(A) 256 (B) 64 (C) 16 (D) 4
Ans: B
83. In Win32, which function is used to create Windows Applications ?
(A) Win APP (B) Win API (C) Win Main (D) Win Void
Ans: C
84. Everything below the system call interface and above the physical hardware is known as ______.
(A) Kernel (B) Bus (C) Shell (D) Stub
Ans: A
85. Which is not the correct statement ?
(A) The class of regular sets is closed under homomorphisms.
(B) The class of regular sets is not closed under inverse homomorphisms.
(C) The class of regular sets is closed under quotient.
(D) The class of regular sets is closed under substitution.
Ans: B
86. When a programming Language has the capacity to produce new datatype, it is called as,
(A) Overloaded Language
(B) Extensible Language
(C) Encapsulated Language
(D) Abstraction Language
Ans: B
87. Which of the following operating system is better for implementing client-server network ?
(A) Windows 95
(B) Windows 98
(C) Windows 2000
(D) All of these
Ans: C
88. Consider a system having m resources of the same type. These resources are shared by 3 processes A, B and C which have peak demands of 3, 4 and 6 respectively. For what value of m deadlock will not occur ?
(A) 7
(B) 9
(C) 10
(D) 13
Ans: D
89. The Default Parameter Passing Mechanism is called as
(A) Call by Value (B) Call by Reference (C) Call by Address (D) Call by Name
Ans: A
90. Which of the following regular expression identities are true ?
(A) (r + s)* = r* s*
(B) (r + s)* = r* + s*
(C) (r + s)* = (r*s*)*
(D) r* s* = r* + s*
Ans: C
91. Functions defined with class name are called as
(A) Inline function (B) Friend function (C) Constructor (D) Static function
Ans: C
92. If dual has an unbounded solution, then its corresponding primal has
(A) no feasible solution (B) unbounded solution (C) feasible solution (D) none of these
Ans: A
93. The number of distinct bracelets of five beads made up of red, blue, and green beads (two bracelets are indistinguishable if the rotation of one yield another) is,
(A) 243 (B) 81 (C) 51 (D) 47
Ans: C
94. Which are the classifications of data used in Mobile Applications ?
(A) Private data, User data, Shared data. (B) Public data, User data, Virtual data.
(C) Private data, Public data, Shared data. (D) Public data, Virtual data, User data.
Ans: C
95. 58 lamps are to be connected to a single electric outlet by using an extension board each of which has four outlets. The number of extension boards needed to connect all the light is
(A) 29 (B) 28 (C) 20 (D) 19
Ans: D
96. Match the following with respect to the Mobile Computing Architecture.
a. Downlink control 1. 100 Mbps
b. Radio communication data rate 2. Residency latency (RL)
c. The average duration of user’s stay in cell 3. Sending data from a BS to MD
d. FDDI bandwidth 4. 2-Mbps
Codes : a b c d
(A) 2 1 4 3
(B) 3 4 2 1
(C) 4 1 2 1
(D) 4 3 1 2
Ans: B
97. Which of the following flags are set when ‘JMP’ instruction is executed ?
(A) SF and CF (B) AF and CF (C) All flags (D) No flag is set
Ans: D
98. A thread is a light weight process. In the above statement, weight refers to
(A) time (B) number of resources (C) speed (D) All the above
Ans: B
99. Which of the following permutations can be obtained in the output using a stack of size 3 elements assuming that input, sequence is 1, 2, 3, 4, 5 ?
(A) 3, 2, 1, 5, 4 (B) 5, 4, 3, 2, 1 (C) 3, 4, 5, 2, 1 (D) 3, 4, 5, 1, 2
Ans: A and C
100. In a Linear Programming Problem, suppose there are 3 basic variables and 2 non-basic variables, then the possible number of basic solutions are
(A) 6 (B) 8 (C) 10 (D) 12
Ans: C
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15