COMPUTER SCIENCE AND APPLICATIONS
1. The postfix expression AB + CD – * can be evaluated using a
(A) stack
(B) tree
(C) queue
(D) linked list
Ans: A
2. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above
Ans: C
3. The branch logic that provides making capabilities in the control unit is known as
(A) Controlled transfer
(B) Conditional transfer
(C) Unconditional transfer
(D) None of the above
Ans: A
4. The number of colours required to properly colour the vertices of every planer graph is
(A) 2
(B) 3
(C) 4
(D) 5
Ans: D
5. Networks that use different technologies can be connected by using
(A) Packets
(B) Switches
(C) Bridges
(D) Routers
Ans: D
6. Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is
(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)
Ans: A
7. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by
(A) Jamming
(B) Password
(C) Documentation
(D) Record lock
Ans: D
8. A binary search tree is a binary tree :
(A) All items in the left subtree are less than root
(B) All items in the right subtree are greater than or equal to the root
(C) Each subtree is itself a binary search tree
(D) All of the above
Ans: D
9. What deletes the entire file except the file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK
Ans: C
10. Which command is the fastest among the following ?
(A) COPY TO <NEW FILE>
(B) COPY STRUCTURE TO <NEW FILE>
(C) COPY FILE <FILE 1> <FILE 2>
(D) COPY TO MFILE-DAT DELIMITED
Ans: B
11. B+ tree are preferred to binary tree in Database because
(A) Disk capacity are greater than memory capacities
(B) Disk access is much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disks are more reliable than memory
Ans: B
12. A Transaction Manager is which of the following ?
(A) Maintains a log of transactions
(B) Maintains before and after database images
(C) Maintains appropriate concurrency control
(D) All of the above
Ans: D
13. Leaves of which of the following trees are at the same level ?
(A) Binary tree
(B) B-tree
(C) AVL-tree
(D) Expression tree
Ans: B
14. Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ?
(A) RAP
(B) RIP
(C) ARP
(D) X.25
Ans: C
15. Decryption and encryption of data are the responsibility of which of the following layer ?
(A) Physical layer
(B) Data Link layer
(C) Presentation layer
(D) Session layer
Ans: C
16. In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ?
(A) Space division
(B) Time division
(C) Virtual
(D) Packet
Ans: B
17. In which Routing Method do all the routers have a common database ?
(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method
Ans: B
18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate).
(A) 2400 bauds (B) 1200 bauds
(C) 4800 bauds (D) 9600 bauds
Ans: A
19. The station to hub distance in which it is 2000 metres.
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1
Ans: B
20. Main aim of software engineering is to produce
(A) program
(B) software
(C) within budget
(D) software within budget in the given schedule
Ans: D
21. Key process areas of CMM level 4 are also classified by a process which is
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above
Ans: C
22. Validation means
(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above
Ans: B
23. If a process is under statistical control, then it is
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable
Ans: C
24. In a function oriented design, we
(A) minimize cohesion and maximize coupling
(B) maximize cohesion and minimize coupling
(C) maximize cohesion and maximize coupling
(D) minimize cohesion and minimize coupling
Ans: B
25. Which of the following metric does not depend on the programming language used ?
(A) Line of code
(B) Function count
(C) Member of token
(D) All of the above
Ans: B
26. A / B+ tree index is to be built on the name attribute of the relation STUDENT. Assume that all students names are of length 8 bytes, disk block are of size 512 bytes and index pointers are of size 4 bytes. Given this scenario what would be the best choice of the degree (i.e. the number of pointers per node) of the B+ tree ?
(A) 16 (B) 42
(C) 43 (D) 44
Ans: A
27. The Inorder traversal of the tree will yield a sorted listing of elements of tree in
(A) Binary tree
(B) Binary search tree
(C) Heaps
(D) None of the above
Ans: B
28. Mobile IP provides two basic functions.
(A) Route discovery and registration
(B) Agent discovery and registration
(C) IP binding and registration
(D) None of the above
Ans: B
29. Pre-emptive scheduling is the strategy of temporarily suspending a gunning process
(A) before the CPU time slice expires
(B) to allow starving processes to run
(C) when it requests I/O
(D) to avoid collision
Ans: A
30. In round robin CPU scheduling as time quantum is increased the average turn around time
(A) increases
(B) decreases
(C) remains constant
(D) varies irregularly
Ans: D
31. Resources are allocated to the process on non-sharable basis is
(A) mutual exclusion
(B) hold and wait
(C) no pre-emption
(D) circular wait
Ans: A
32. Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM. Which memory models are best suited (i.e. improves the performance most) for which programs ?
(i) Cached memory is best suited for small loops.
(ii) Interleaved memory is best suited for small loops
(iii) Interleaved memory is best suited for large sequential code.
(iv) Cached memory is best suited for large sequential code.
(A) (i) and (ii) are true.
(B) (i) and (iii) are true.
(C) (iv) and (ii) are true.
(D) (iv) and (iii) are true.
Ans: B
33. Consider the following page trace :
4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5
Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m = 4 will be
(A) 8
(B) 9
(C) 10
(D) 12
Ans: C
34. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of
(A) Integer
(B) Character
(C) Real numbers
(D) Bits
Ans: D
35. Which of the following is not offered as an independent service layer in Cloud Computing ?
(a) Hardware as a service (b) Platform as a service
(c) Software as a service (d) Infrastructure as a service
Ans: A
36. Which of the following logic families is well suited for high-speed operations ?
(A) TTL
(B) ECL
(C) MOS
(D) CMOS
Ans: B
37. Interrupts which are initiated by an instruction are
(A) Internal
(B) External
(C) Hardware
(D) Software
Ans: D
38. printf(“%c”, 100);
(A) prints 100
(B) prints ASCII equivalent of 100
(C) prints garbage
(D) none of the above
Ans: B
39. For the transmission of the signal, Bluetooth wireless technology uses
(A) time division multiplexing
(B) frequency division multiplexing
(C) time division duplex
(D) frequency division duplex
Ans: C
40. Consider the following statements :
I. Recursive languages are closed under complementation.
II. Recursively enumerable languages are closed under union.
III. Recursively enumerable languages are closed under complementation.
Which of the above statements are true ?
(A) I only
(B) I and II
(C) I and III
(D) II and III
Ans: B
41. What is the routing algorithm used by RIP and IGRP ?
(A) OSPF
(B) Link-state
(C) Dynamic
(D) Dijkestra vector
Ans: D
42. Identify the incorrect statement :
(A) The overall strategy drives the E-Commerce data warehousing strategy.
(B) Data warehousing in an E-Commerce environment should be done in a classical manner.
(C) E-Commerce opens up an entirely new world of web server.
(D) E-Commerce security threats can
be grouped into three major
categories.
Ans: D
43. Reliability of software is directly dependent on
(A) quality of the design
(B) number of errors present
(C) software engineers experience
(D) user requirement
Ans: B
44. ______ is not an E-Commerce application.
(A) House banking
(B) Buying stocks
(C) Conducting an auction
(D) Evaluating an employee
Ans: D
45. ______ is a satellite based tracking system that enables the determination of person’s position.
(A) Bluetooth
(B) WAP
(C) Short Message Service
(D) Global Positioning System
Ans: D
46. A complete microcomputer system consists of
(A) Microprocessor
(B) Memory
(C) Peripheral equipment
(D) All of the above
Ans: D
47. Where does a computer add and compare data ?
(A) Hard disk
(B) Floppy disk
(C) CPU chip
(D) Memory chip
Ans: C
48. Pipelining strategy is called implement
(A) instruction execution
(B) instruction prefetch
(C) instruction decoding
(D) instruction manipulation
Ans: B
49. Which of the following data structure is linear type ?
(A) Strings
(B) Lists
(C) Queues
(D) All of the above
Ans: D
50. To represent hierarchical relationship between elements, which data structure is suitable ?
(A) Dequeue
(B) Priority
(C) Tree
(D) All of the above
Ans: C
(A) stack
(B) tree
(C) queue
(D) linked list
Ans: A
2. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above
Ans: C
3. The branch logic that provides making capabilities in the control unit is known as
(A) Controlled transfer
(B) Conditional transfer
(C) Unconditional transfer
(D) None of the above
Ans: A
4. The number of colours required to properly colour the vertices of every planer graph is
(A) 2
(B) 3
(C) 4
(D) 5
Ans: D
5. Networks that use different technologies can be connected by using
(A) Packets
(B) Switches
(C) Bridges
(D) Routers
Ans: D
6. Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is
(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)
Ans: A
7. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by
(A) Jamming
(B) Password
(C) Documentation
(D) Record lock
Ans: D
8. A binary search tree is a binary tree :
(A) All items in the left subtree are less than root
(B) All items in the right subtree are greater than or equal to the root
(C) Each subtree is itself a binary search tree
(D) All of the above
Ans: D
9. What deletes the entire file except the file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK
Ans: C
10. Which command is the fastest among the following ?
(A) COPY TO <NEW FILE>
(B) COPY STRUCTURE TO <NEW FILE>
(C) COPY FILE <FILE 1> <FILE 2>
(D) COPY TO MFILE-DAT DELIMITED
Ans: B
11. B+ tree are preferred to binary tree in Database because
(A) Disk capacity are greater than memory capacities
(B) Disk access is much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disks are more reliable than memory
Ans: B
12. A Transaction Manager is which of the following ?
(A) Maintains a log of transactions
(B) Maintains before and after database images
(C) Maintains appropriate concurrency control
(D) All of the above
Ans: D
13. Leaves of which of the following trees are at the same level ?
(A) Binary tree
(B) B-tree
(C) AVL-tree
(D) Expression tree
Ans: B
14. Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ?
(A) RAP
(B) RIP
(C) ARP
(D) X.25
Ans: C
15. Decryption and encryption of data are the responsibility of which of the following layer ?
(A) Physical layer
(B) Data Link layer
(C) Presentation layer
(D) Session layer
Ans: C
16. In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ?
(A) Space division
(B) Time division
(C) Virtual
(D) Packet
Ans: B
17. In which Routing Method do all the routers have a common database ?
(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method
Ans: B
18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate).
(A) 2400 bauds (B) 1200 bauds
(C) 4800 bauds (D) 9600 bauds
Ans: A
19. The station to hub distance in which it is 2000 metres.
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1
Ans: B
20. Main aim of software engineering is to produce
(A) program
(B) software
(C) within budget
(D) software within budget in the given schedule
Ans: D
21. Key process areas of CMM level 4 are also classified by a process which is
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above
Ans: C
22. Validation means
(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above
Ans: B
23. If a process is under statistical control, then it is
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable
Ans: C
24. In a function oriented design, we
(A) minimize cohesion and maximize coupling
(B) maximize cohesion and minimize coupling
(C) maximize cohesion and maximize coupling
(D) minimize cohesion and minimize coupling
Ans: B
25. Which of the following metric does not depend on the programming language used ?
(A) Line of code
(B) Function count
(C) Member of token
(D) All of the above
Ans: B
26. A / B+ tree index is to be built on the name attribute of the relation STUDENT. Assume that all students names are of length 8 bytes, disk block are of size 512 bytes and index pointers are of size 4 bytes. Given this scenario what would be the best choice of the degree (i.e. the number of pointers per node) of the B+ tree ?
(A) 16 (B) 42
(C) 43 (D) 44
Ans: A
27. The Inorder traversal of the tree will yield a sorted listing of elements of tree in
(A) Binary tree
(B) Binary search tree
(C) Heaps
(D) None of the above
Ans: B
28. Mobile IP provides two basic functions.
(A) Route discovery and registration
(B) Agent discovery and registration
(C) IP binding and registration
(D) None of the above
Ans: B
29. Pre-emptive scheduling is the strategy of temporarily suspending a gunning process
(A) before the CPU time slice expires
(B) to allow starving processes to run
(C) when it requests I/O
(D) to avoid collision
Ans: A
30. In round robin CPU scheduling as time quantum is increased the average turn around time
(A) increases
(B) decreases
(C) remains constant
(D) varies irregularly
Ans: D
31. Resources are allocated to the process on non-sharable basis is
(A) mutual exclusion
(B) hold and wait
(C) no pre-emption
(D) circular wait
Ans: A
32. Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM. Which memory models are best suited (i.e. improves the performance most) for which programs ?
(i) Cached memory is best suited for small loops.
(ii) Interleaved memory is best suited for small loops
(iii) Interleaved memory is best suited for large sequential code.
(iv) Cached memory is best suited for large sequential code.
(A) (i) and (ii) are true.
(B) (i) and (iii) are true.
(C) (iv) and (ii) are true.
(D) (iv) and (iii) are true.
Ans: B
33. Consider the following page trace :
4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5
Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m = 4 will be
(A) 8
(B) 9
(C) 10
(D) 12
Ans: C
34. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of
(A) Integer
(B) Character
(C) Real numbers
(D) Bits
Ans: D
35. Which of the following is not offered as an independent service layer in Cloud Computing ?
(a) Hardware as a service (b) Platform as a service
(c) Software as a service (d) Infrastructure as a service
Ans: A
36. Which of the following logic families is well suited for high-speed operations ?
(A) TTL
(B) ECL
(C) MOS
(D) CMOS
Ans: B
37. Interrupts which are initiated by an instruction are
(A) Internal
(B) External
(C) Hardware
(D) Software
Ans: D
38. printf(“%c”, 100);
(A) prints 100
(B) prints ASCII equivalent of 100
(C) prints garbage
(D) none of the above
Ans: B
39. For the transmission of the signal, Bluetooth wireless technology uses
(A) time division multiplexing
(B) frequency division multiplexing
(C) time division duplex
(D) frequency division duplex
Ans: C
40. Consider the following statements :
I. Recursive languages are closed under complementation.
II. Recursively enumerable languages are closed under union.
III. Recursively enumerable languages are closed under complementation.
Which of the above statements are true ?
(A) I only
(B) I and II
(C) I and III
(D) II and III
Ans: B
41. What is the routing algorithm used by RIP and IGRP ?
(A) OSPF
(B) Link-state
(C) Dynamic
(D) Dijkestra vector
Ans: D
42. Identify the incorrect statement :
(A) The overall strategy drives the E-Commerce data warehousing strategy.
(B) Data warehousing in an E-Commerce environment should be done in a classical manner.
(C) E-Commerce opens up an entirely new world of web server.
(D) E-Commerce security threats can
be grouped into three major
categories.
Ans: D
43. Reliability of software is directly dependent on
(A) quality of the design
(B) number of errors present
(C) software engineers experience
(D) user requirement
Ans: B
44. ______ is not an E-Commerce application.
(A) House banking
(B) Buying stocks
(C) Conducting an auction
(D) Evaluating an employee
Ans: D
45. ______ is a satellite based tracking system that enables the determination of person’s position.
(A) Bluetooth
(B) WAP
(C) Short Message Service
(D) Global Positioning System
Ans: D
46. A complete microcomputer system consists of
(A) Microprocessor
(B) Memory
(C) Peripheral equipment
(D) All of the above
Ans: D
47. Where does a computer add and compare data ?
(A) Hard disk
(B) Floppy disk
(C) CPU chip
(D) Memory chip
Ans: C
48. Pipelining strategy is called implement
(A) instruction execution
(B) instruction prefetch
(C) instruction decoding
(D) instruction manipulation
Ans: B
49. Which of the following data structure is linear type ?
(A) Strings
(B) Lists
(C) Queues
(D) All of the above
Ans: D
50. To represent hierarchical relationship between elements, which data structure is suitable ?
(A) Dequeue
(B) Priority
(C) Tree
(D) All of the above
Ans: C
51. COCOMO stands for
(A) COmposite COst MOdel
(B) COnstructive COst MOdel
(C) COnstructive COmposite MOdel
(D) COmprehensive COnstruction MOdel
Ans: B
52. Match the following :
a. Good quality i. Program does not fail for a specified time in a given environment
b. Correctness ii. Meets the functional requirements
c. Predictable iii. Meets both functional and non-functional requirements
d. Reliable iv. Process is under statistical control
Codes :
a b c d
(A) iii ii iv i
(B) ii iii iv i
(C) i ii iv iii
(D) i ii iii iv
Ans: A
53. While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure which one of the following ?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Ans: B
54. A good software design must have
(A) High module coupling, High module cohesion
(B) High module coupling, Low module cohesion
(C) Low module coupling, High module cohesion
(D) Low module coupling, Low module cohesion
Ans: C
55. Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e+n–2
(B) V(G) = e–n+2
(C) V(G) = e+n+2
(D) V(G) = e–n–2
Ans: B
56. When the following code is executed what will be the value of x and y ?
int x = 1, y = 0;
y = x++;
(A) 2,1
(B) 2,2
(C) 1,1
(D) 1,2
Ans: A
57. How many values can be held by an array A(–1,m;1,m) ?
(A) m
(B) m2
(C) m(m+1)
(D) m(m+2)
Ans: D
58. What is the result of the expression (1&2)+(3/4) ?
(A) 1
(B) 2
(C) 3
(D) 0
Ans: D
59. How many times the word ‘print’ shall be printed by the following program segment ?
for (i=1, i<2,i++)
for (j=1,j<2,j++)
for(k=1,k<2,k++)
printf("print/n")
(A) 1
(B) 3
(C) 6
(D) 8
Ans: D
60. Which of the following is not a type of Database Management System ?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Ans: D
61. Manager’s salary details are to be hidden from Employee Table. This Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Ans: C
62. A Network Schema
(A) restricts to one to many relationship
(B) permits many to many relationship
(C) stores Data in a Database
(D) stores Data in a Relation
Ans: B
63. Which normal form is considered as adequate for usual database design ?
(A) 2NF
(B) 3NF
(C) 4NF
(D) 5NF
Ans: B
64. If D1,D2, .. ..Dn are domains in a relational model, then the relation is a table, which is a subset of
(A) D1+D2+ … +Dn
(B) D1×D2× … ×Dn
(C) D1∪D2∪ … ∪Dn
(D) D1–D2– … –Dn
Ans: B
65. Which of the following addresses is used to deliver a message to the correct application program running on a host ?
(A) Port
(B) IP
(C) Logical
(D) Physical
Ans: A
66. In ________ substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
(A) polyalphabetic
(B) monoalphabetic
(C) transpositional
(D) multialphabetic
Ans: B
67. In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Ans: B
68. In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy ?
(A) 10 clusters, 24 regions and 20 routers
(B) 12 clusters, 20 regions and 20 routers
(C) 16 clusters, 12 regions and 25 routers
(D) 15 clusters, 16 regions and 20 routers
Ans: D
69. In IPv4 header, the ______ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.
(A) identification
(B) fragment offset
(C) time to live
(D) header checksum
Ans: A
70. Given L1=L(a*baa*) and L2=L(ab*). The regular expression corresponding to language L3 = L1/L2 (right quotient) is given by
(A) a*b
(B) a*baa*
(C) a*ba*
(D) None of the above
Ans: C
71. Given the production rules of a grammar G1 as
S1 → AB | aaB
A → a | Aa
B → b
and the production rules of a grammar G2 as
S2 → aS2bS2 | bS2aS2 | λ
Which of the following is correct statement ?
(A) G1 is ambiguous and G2 is not ambiguous.
(B) G1 is ambiguous and G2 is ambiguous.
(C) G1 is not ambiguous and G2 is ambiguous.
(D) G1 is not ambiguous and G2 is not ambiguous.
Ans: B
72. Given a grammar : S1 → Sc, S →SA | A, A → aSb | ab, there is a rightmost derivation S1 ⇒ Sc ⇒SAC ⇒ SaSbc
Thus, SaSbc is a right sentential form, and its handle is
(A) SaS
(B) bc
(C) Sbc
(D) aSb
Ans: D
73. Which is the correct statement(s) for Non Recursive predictive parser ?
S1 : First(α) = {t| α ⇒* tβ for some string β} ⇒*tβ
S2 : Follow(X)={ a| S⇒*αXaβ for some strings α and β}
(A) Both statements S1 and S2 are incorrect.
(B) S1 is incorrect and S2 is correct.
(C) S1 is correct and S2 is incorrect.
(D) Both statements S1 and S2 are correct.
Ans: D
74. For a B-tree of height h and degree t, the total CPU time used to insert a node is
(A) O(h log t)
(B) O(t log h)
(C) O(tᴧ2h)
(D) O(th)
Ans: D
75. The time complexity to build a heap with a list of n numbers is
(A) O(log n)
(B) O(n)
(C) O(n logn)
(D) O(nᴧ2)
Ans: B
76. The value of postfix expression :
8 3 4 + – 3 8 2 / + * 2 $ 3 + is
(A) 17
(B) 131
(C) 64
(D) 52
Ans: D
77. Consider the following statements for priority queue :
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2 : The elements of a priority queue may be complex structures that are ordered on one or several fields.
Which of the following is correct ?
(A) Both S1 and S2 are incorrect.
(B) S1 is correct and S2 is incorrect.
(C) S1 is incorrect and S2 is correct.
(D) Both S1 and S2 are correct.
Ans: D
78. Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
(A) Data mining
(B) Meta data
(C) Data warehousing
(D) Database
Ans: C
79. The task of correcting and pre processing data is called as
(A) Data streaming
(B) Data cleaning
(C) Data mining
(D) Data storming
Ans: B
80. Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
(A) BUTAEEZ
(B) SUZANNE
(C) XYZABCD
(D) ABCDXYZ
Ans: A
81. The relation “divides” on a set of positive integers is ________.
(A) Symmetric and transitive
(B) Anti symmetric and transitive
(C) Symmetric only
(D) Transitive only
Ans: B
82. Which of the following connected simple graph has exactly one spanning tree ?
(A) Complete graph
(B) Hamiltonian graph
(C) Euler graph
(D) None of the above
Ans: D
83. How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components ?
(A) M+N–C
(B) M–N–C
(C) M–N+C
(D) M+N+C
Ans: C
84. Which of the following shall be a compound proposition involving the propositions p, q and r, that is true when exactly two of the p, q and r are true and is false otherwise ?
(A) (p ∨ q ∧⎤ r) ∨ ( p ∧ q ∧ r) ∧ (⎤ p ∧ q ∨ r)
(B) (p ∧ q ∨ r) ∧ ( p ∧ q ∧ r) ∨ (⎤ q ∧⎤ p∧⎤ r)
(C) (p ∧ q ∧⎤ r) ∨ ( p ∧⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
(D) (p ∨ r ∧ q) ∨ ( p ∧ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
Ans: C
85. The truth value of the statements : ∃!xP(x) → ∃xP(x) and ∃!x⎤ P(x) →⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition “There exists a unique x such that P(x) is true”) are :
(A) True and False
(B) False and True
(C) False and False
(D) True and True
Ans: D
86. Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement form ?
(A) – 42
(B) – 22
(C) – 21
(D) – 106
Ans: B
87. A set of processors P1, P2, ……, Pk can execute in parallel if Bernstein’s conditions are satisfied on a pairwise
basis; that is
P1 || P2 || P3 || ….. || Pk if and only if :
(A) Pi || Pj for all i ≠ j
(B) Pi || Pj for all i = j+1
(C) Pi || Pj for all i < j
(D) Pi || Pj for all i > j
Ans: A
88. When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as _______.
(A) handoff
(B) mobile switching
(C) mobile routing
(D) cell switching
Ans: A
89. A virtual memory based memory management algorithm partially swaps out a process. This is an example of
(A) short term scheduling
(B) long term scheduling
(C) medium term scheduling
(D) mutual exclusion
Ans: C
90. Assuming that the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O block
requests are 98, 37, 14, 124, 65, 67 :
(A) 310
(B) 324
(C) 320
(D) 321
Ans: D
91. Let the page fault service time be 10 millisecond(ms) in a computer with average memory access time being 20 nanosecond(ns). If one page fault is generated for every 106 memory accesses, what is the effective access time for memory ?
(A) 21 ns
(B) 23 ns
(C) 30 ns
(D) 35 ns
Ans: C
92. Consider the following UNIX command :
sort <in> temp; head – 30 <temp; rm temp
Which of the following functions shall be performed by this command ?
(A) Sort, taking the input from “temp”, prints 30 lines from temp and delete the file temp
(B) Sort the file “temp”, removes 30 lines from temp and delete the file temp
(C) Sort, taking the input from “in” and writing the output to “temp” then prints 30 lines from temp on terminal. Finally “temp” is removed.
(D) Sort, taking the input from “temp” and then prints 30 lines from “temp” on terminal. Finally “temp” is removed.
Ans: C
93. The mv command changes
(A) the inode
(B) the inode-number
(C) the directory entry
(D) both the directory entry and the inode
Ans: C
(A) COmposite COst MOdel
(B) COnstructive COst MOdel
(C) COnstructive COmposite MOdel
(D) COmprehensive COnstruction MOdel
Ans: B
52. Match the following :
a. Good quality i. Program does not fail for a specified time in a given environment
b. Correctness ii. Meets the functional requirements
c. Predictable iii. Meets both functional and non-functional requirements
d. Reliable iv. Process is under statistical control
Codes :
a b c d
(A) iii ii iv i
(B) ii iii iv i
(C) i ii iv iii
(D) i ii iii iv
Ans: A
53. While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure which one of the following ?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Ans: B
54. A good software design must have
(A) High module coupling, High module cohesion
(B) High module coupling, Low module cohesion
(C) Low module coupling, High module cohesion
(D) Low module coupling, Low module cohesion
Ans: C
55. Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e+n–2
(B) V(G) = e–n+2
(C) V(G) = e+n+2
(D) V(G) = e–n–2
Ans: B
56. When the following code is executed what will be the value of x and y ?
int x = 1, y = 0;
y = x++;
(A) 2,1
(B) 2,2
(C) 1,1
(D) 1,2
Ans: A
57. How many values can be held by an array A(–1,m;1,m) ?
(A) m
(B) m2
(C) m(m+1)
(D) m(m+2)
Ans: D
58. What is the result of the expression (1&2)+(3/4) ?
(A) 1
(B) 2
(C) 3
(D) 0
Ans: D
59. How many times the word ‘print’ shall be printed by the following program segment ?
for (i=1, i<2,i++)
for (j=1,j<2,j++)
for(k=1,k<2,k++)
printf("print/n")
(A) 1
(B) 3
(C) 6
(D) 8
Ans: D
60. Which of the following is not a type of Database Management System ?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Ans: D
61. Manager’s salary details are to be hidden from Employee Table. This Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Ans: C
62. A Network Schema
(A) restricts to one to many relationship
(B) permits many to many relationship
(C) stores Data in a Database
(D) stores Data in a Relation
Ans: B
63. Which normal form is considered as adequate for usual database design ?
(A) 2NF
(B) 3NF
(C) 4NF
(D) 5NF
Ans: B
64. If D1,D2, .. ..Dn are domains in a relational model, then the relation is a table, which is a subset of
(A) D1+D2+ … +Dn
(B) D1×D2× … ×Dn
(C) D1∪D2∪ … ∪Dn
(D) D1–D2– … –Dn
Ans: B
65. Which of the following addresses is used to deliver a message to the correct application program running on a host ?
(A) Port
(B) IP
(C) Logical
(D) Physical
Ans: A
66. In ________ substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
(A) polyalphabetic
(B) monoalphabetic
(C) transpositional
(D) multialphabetic
Ans: B
67. In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Ans: B
68. In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy ?
(A) 10 clusters, 24 regions and 20 routers
(B) 12 clusters, 20 regions and 20 routers
(C) 16 clusters, 12 regions and 25 routers
(D) 15 clusters, 16 regions and 20 routers
Ans: D
69. In IPv4 header, the ______ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.
(A) identification
(B) fragment offset
(C) time to live
(D) header checksum
Ans: A
70. Given L1=L(a*baa*) and L2=L(ab*). The regular expression corresponding to language L3 = L1/L2 (right quotient) is given by
(A) a*b
(B) a*baa*
(C) a*ba*
(D) None of the above
Ans: C
71. Given the production rules of a grammar G1 as
S1 → AB | aaB
A → a | Aa
B → b
and the production rules of a grammar G2 as
S2 → aS2bS2 | bS2aS2 | λ
Which of the following is correct statement ?
(A) G1 is ambiguous and G2 is not ambiguous.
(B) G1 is ambiguous and G2 is ambiguous.
(C) G1 is not ambiguous and G2 is ambiguous.
(D) G1 is not ambiguous and G2 is not ambiguous.
Ans: B
72. Given a grammar : S1 → Sc, S →SA | A, A → aSb | ab, there is a rightmost derivation S1 ⇒ Sc ⇒SAC ⇒ SaSbc
Thus, SaSbc is a right sentential form, and its handle is
(A) SaS
(B) bc
(C) Sbc
(D) aSb
Ans: D
73. Which is the correct statement(s) for Non Recursive predictive parser ?
S1 : First(α) = {t| α ⇒* tβ for some string β} ⇒*tβ
S2 : Follow(X)={ a| S⇒*αXaβ for some strings α and β}
(A) Both statements S1 and S2 are incorrect.
(B) S1 is incorrect and S2 is correct.
(C) S1 is correct and S2 is incorrect.
(D) Both statements S1 and S2 are correct.
Ans: D
74. For a B-tree of height h and degree t, the total CPU time used to insert a node is
(A) O(h log t)
(B) O(t log h)
(C) O(tᴧ2h)
(D) O(th)
Ans: D
75. The time complexity to build a heap with a list of n numbers is
(A) O(log n)
(B) O(n)
(C) O(n logn)
(D) O(nᴧ2)
Ans: B
76. The value of postfix expression :
8 3 4 + – 3 8 2 / + * 2 $ 3 + is
(A) 17
(B) 131
(C) 64
(D) 52
Ans: D
77. Consider the following statements for priority queue :
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2 : The elements of a priority queue may be complex structures that are ordered on one or several fields.
Which of the following is correct ?
(A) Both S1 and S2 are incorrect.
(B) S1 is correct and S2 is incorrect.
(C) S1 is incorrect and S2 is correct.
(D) Both S1 and S2 are correct.
Ans: D
78. Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
(A) Data mining
(B) Meta data
(C) Data warehousing
(D) Database
Ans: C
79. The task of correcting and pre processing data is called as
(A) Data streaming
(B) Data cleaning
(C) Data mining
(D) Data storming
Ans: B
80. Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
(A) BUTAEEZ
(B) SUZANNE
(C) XYZABCD
(D) ABCDXYZ
Ans: A
81. The relation “divides” on a set of positive integers is ________.
(A) Symmetric and transitive
(B) Anti symmetric and transitive
(C) Symmetric only
(D) Transitive only
Ans: B
82. Which of the following connected simple graph has exactly one spanning tree ?
(A) Complete graph
(B) Hamiltonian graph
(C) Euler graph
(D) None of the above
Ans: D
83. How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components ?
(A) M+N–C
(B) M–N–C
(C) M–N+C
(D) M+N+C
Ans: C
84. Which of the following shall be a compound proposition involving the propositions p, q and r, that is true when exactly two of the p, q and r are true and is false otherwise ?
(A) (p ∨ q ∧⎤ r) ∨ ( p ∧ q ∧ r) ∧ (⎤ p ∧ q ∨ r)
(B) (p ∧ q ∨ r) ∧ ( p ∧ q ∧ r) ∨ (⎤ q ∧⎤ p∧⎤ r)
(C) (p ∧ q ∧⎤ r) ∨ ( p ∧⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
(D) (p ∨ r ∧ q) ∨ ( p ∧ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
Ans: C
85. The truth value of the statements : ∃!xP(x) → ∃xP(x) and ∃!x⎤ P(x) →⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition “There exists a unique x such that P(x) is true”) are :
(A) True and False
(B) False and True
(C) False and False
(D) True and True
Ans: D
86. Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement form ?
(A) – 42
(B) – 22
(C) – 21
(D) – 106
Ans: B
87. A set of processors P1, P2, ……, Pk can execute in parallel if Bernstein’s conditions are satisfied on a pairwise
basis; that is
P1 || P2 || P3 || ….. || Pk if and only if :
(A) Pi || Pj for all i ≠ j
(B) Pi || Pj for all i = j+1
(C) Pi || Pj for all i < j
(D) Pi || Pj for all i > j
Ans: A
88. When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as _______.
(A) handoff
(B) mobile switching
(C) mobile routing
(D) cell switching
Ans: A
89. A virtual memory based memory management algorithm partially swaps out a process. This is an example of
(A) short term scheduling
(B) long term scheduling
(C) medium term scheduling
(D) mutual exclusion
Ans: C
90. Assuming that the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O block
requests are 98, 37, 14, 124, 65, 67 :
(A) 310
(B) 324
(C) 320
(D) 321
Ans: D
91. Let the page fault service time be 10 millisecond(ms) in a computer with average memory access time being 20 nanosecond(ns). If one page fault is generated for every 106 memory accesses, what is the effective access time for memory ?
(A) 21 ns
(B) 23 ns
(C) 30 ns
(D) 35 ns
Ans: C
92. Consider the following UNIX command :
sort <in> temp; head – 30 <temp; rm temp
Which of the following functions shall be performed by this command ?
(A) Sort, taking the input from “temp”, prints 30 lines from temp and delete the file temp
(B) Sort the file “temp”, removes 30 lines from temp and delete the file temp
(C) Sort, taking the input from “in” and writing the output to “temp” then prints 30 lines from temp on terminal. Finally “temp” is removed.
(D) Sort, taking the input from “temp” and then prints 30 lines from “temp” on terminal. Finally “temp” is removed.
Ans: C
93. The mv command changes
(A) the inode
(B) the inode-number
(C) the directory entry
(D) both the directory entry and the inode
Ans: C
94. Which of the following is the correct value returned to the operating system upon the successful completion of a program ?
(A) 0
(B) 1
(C) – 1
(D) Program do not return a value.
Ans: A
95. Manager’s salary details are hidden from the employee. This is called as
(A) Conceptual level data hiding
(B) Physical level data hiding
(C) External level data hiding
(D) Local level data hiding
Ans: C
96. Which of the following statements is false ?
(A) Any relation with two attributes is in BCNF.
(B) A relation in which every key has only one attribute is in 2NF.
(C) A prime attribute can be transitively dependent on a key in 3NF relation.
(D) A prime attribute can be transitively dependent on a key in BCNF relation.
Ans: D
97. A clustering index is created when _______.
(A) primary key is declared and ordered
(B) no key ordered
(C) foreign key ordered
(D) there is no key and no order
Ans: A
98. Let R ={A, B, C, D, E, F} be a relation schema with the following dependencies C → F, E → A, EC → D, A → B. Which of the following is a key for R ?
(A) CD (B) EC
(C) AE (D) AC
Ans: B
99. Match the following :
List – I List – II
a. DDL i. LOCK TABLE
b. DML ii. COMMIT
c. TCL iii. Natural Difference
d. BINARY Operation iv. REVOKE
Codes :
a b c d
(A) ii i iii iv
(B) i ii iv iii
(C) iii ii i iv
(D) iv i ii iii
Ans: D
100. A friend function can be used to
(A) avoid arguments between classes.
(B) allow access to classes whose source code is unavailable.
(C) allow one class to access an unrelated class.
(D) None of the above
Ans: C
(A) 0
(B) 1
(C) – 1
(D) Program do not return a value.
Ans: A
95. Manager’s salary details are hidden from the employee. This is called as
(A) Conceptual level data hiding
(B) Physical level data hiding
(C) External level data hiding
(D) Local level data hiding
Ans: C
96. Which of the following statements is false ?
(A) Any relation with two attributes is in BCNF.
(B) A relation in which every key has only one attribute is in 2NF.
(C) A prime attribute can be transitively dependent on a key in 3NF relation.
(D) A prime attribute can be transitively dependent on a key in BCNF relation.
Ans: D
97. A clustering index is created when _______.
(A) primary key is declared and ordered
(B) no key ordered
(C) foreign key ordered
(D) there is no key and no order
Ans: A
98. Let R ={A, B, C, D, E, F} be a relation schema with the following dependencies C → F, E → A, EC → D, A → B. Which of the following is a key for R ?
(A) CD (B) EC
(C) AE (D) AC
Ans: B
99. Match the following :
List – I List – II
a. DDL i. LOCK TABLE
b. DML ii. COMMIT
c. TCL iii. Natural Difference
d. BINARY Operation iv. REVOKE
Codes :
a b c d
(A) ii i iii iv
(B) i ii iv iii
(C) iii ii i iv
(D) iv i ii iii
Ans: D
100. A friend function can be used to
(A) avoid arguments between classes.
(B) allow access to classes whose source code is unavailable.
(C) allow one class to access an unrelated class.
(D) None of the above
Ans: C
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15