COMPUTER
SCIENCE AND APPLICATIONS
PAPER—II
Note
: This paper contains fifty (50) multiple-choice questions, each
question carrying two (2) marks. Attempt all of them.
1.
AVA = A is called :
(A)
Identity law (B) De Morgan’s law
(C)
Idempotant law
(D) Complement law
2.
If f (x) =x+1 and g(x)=x+3 then f 0 f 0 f 0 f is :
(A)
g (B)
g+1
(C)
g4 (D) None of the above
3.
The context-free languages are closed for :
(i)
Intersection (ii) Union
(iii)
Complementation (iv) Kleene Star
then
(A)
(i) and (iv) (B) (i) and (iii)
(C)
(ii) and (iv) (D)
(ii) and (iii)
4.
The following lists are the degrees of all the vertices of a graph
:
(i)
1, 2, 3, 4, 5 (ii) 3, 4, 5, 6, 7
(iii)
1, 4, 5, 8, 6 (iv) 3, 4, 5, 6
then
(A)
(i) and (ii) (B)
(iii) and (iv)
(C)
(iii) and (ii) (D) (ii) and (iv)
5.
If Im denotes the set of integers modulo m, then the following are
fields with respect to the operations of addition modulo m and
multiplication modulo m :
(i)
Z23 (ii)
Z29
(iii)
Z31 (iv) Z33
Then
(A)
(i) only (B) (i) and (ii) only
(C)
(i), (ii) and (iii) only (D) (i), (ii), (iii) and (iv)
6.
An example of a binary number which is equal to its 2’s
complement is :
(A)
1100 (B) 1001
(C)
1000 (D)
1111
7.
When a tri-state logic device is in the third state, then :
(A)
it draws low current (B)
it does not draw any current
(C)
it draws very high current (D) it presents a low impedance
8.
An example of a connective which is not associative is :
(A)
AND (B) OR
(C)
EX-OR (D)
NAND
9.
Essential hazards may occur in :
(A)
Combinational logic circuits
(B)
Synchronous sequential logic circuits
(C)
Asynchronous sequential logic circuits working in the fundamental
mode
(D)
Asynchronous sequential logic circuits working in the pulse mode
10.
The characteristic equation of a T flip-flop is :
(A)
Qn+1=TQn
+ T
Qn
(B)
Qn115T1Qn
(C)
Qn115TQn (D) Qn115 T Q n
The
symbols used have the usual meaning.
11.
Suppose x and y are two Integer Variables having values 035AB6 and
0361CD respectively. The result (in hex) of applying bitwise operator
and to x and y will be :
(A)
035089 (B) 034084
(C)
0378A4 (D) 033AD1
12.
Consider the following statements,
Int
i=4, j=3, k=0;
k=++i
- --j + i++ - --j +j++; What will be the values of i, j and k after
the
statement.
(A)
7, 2, 8 (B) 5, 2, 10
(C)
6, 2, 8 (D)
4, 2, 8
13.
What is the value of the arithmetic expression (Written in C)
2*3/423/4*
2
(A)
0
(B) 1
(C)
1.5 (D) None of the above
14.
A function object :
(A)
is an instance of a class for which operator ( ) is a member
function.
(B)
is an instance of a class for which operator รข†’ is a member
function.
(C)
is a pointer to any function
(D)
is a member function of a class
15.
Polymorphism means :
(A)
A template function
(B)
Runtime type identification within a class hierarchy
(C)
Another name for operator overloading
(D)
Virtual inheritance
16.
The E-R model is expressed in terms of :
(i)
Entities
(ii)
The relationship among entities
(iii)
The attributes of the entities
Then
(A)
(i) and (iii) (B) (i) and (ii)
(C)
(ii) and (iii)
(D) None of the above
17.
Specialization is a __________ process.
(A)
Top - down (B) Bottom -Up
(C)
Both (A) and (B) (D) None of the above
18.
The completeness constraint has rules :
(A)
Supertype, Subtype (B)Total
specialization, Partial specialization
(C)
Specialization, Generalization (D) All of the above
19.
The entity type on which the __________ type depends is called the
identifying owner.
(A)
Strong entity (B) Relationship
(C)
Weak entity
(D) E - R
20.
Match the following :
(i)
1 NF (a) Transitive dependencies eliminated
(ii)
2 NF (b) Multivalued attribute removed
(iii)3
NF (c) Contains no partial functional dependencies
(iv)
4 NF (d) Contains no join dependency
(A)
i-a, ii-c, iii-b, iv-d (B)
i-d, ii-c, iii-a, iv-b
(C)
i-d, ii-c, iii-b, iv-a (D) i-a, ii-b, iii-c, iv-d
21.
What item is at the root after the following sequence of insertions
into an empty splay
tree
:
1,
11, 3, 10, 8, 4, 6, 5, 7, 9, 2, ?
(A)
1
(B) 2
(C)
4 (D) 8
22.
Suppose we are implementing quadratic probing with a Hash function,
Hash (y)=X
mode
100. If an element with key 4594 is inserted and the first three
locations attempted are already occupied, then the next cell that
will be tried is :
(A)
2 (B) 3
(C)
9
(D) 97
23.
Weighted graph :
(A)
Is a bi-directional graph
(B)
Is directed graph
(C)
Is graph in which number associated with arc
(D)
Eliminates table method
24.
What operation is supported in constant time by the doubly linked
list, but not by the singly linked list ?
(A)
Advance (B) Backup
(C)
First (D)
Retrieve
25.
How much extra space is used by heapsort ?
(A)
O (1)
(B) O (Log n)
(C)
O (n) (D) O (n2)
26.
Error control is needed at the transport layer because of potential
error occurring __________.
(A)
from transmission line noise (B)
in router
(C)
from out of sequency delivery (D) from packet losses
27.
Making sure that all the data packets of a message are delivered to
the destination is _________ control.
(A)
Error (B)
Loss
(C)
Sequence (D) Duplication
28.
Which transport class should be used with a perfect network layer ?
(A)
TP0 and TP2
(B) TP1 and TP3
(C)
TP0, TP1, TP3 (D) TP0, TP1, TP2, TP3, TP4
29.
Which transport class should be used with residual-error network
layer ?
(A)
TP0, TP2
(B)
TP1, TP3
(C)
TP1, TP3, TP4 (D) TP0, TP1, TP2, TP3, TP4
30.
Virtual circuit is associated with a __________ service.
(A)
Connectionless (B) Error-free
(C)
Segmentation (D)
Connection-oriented
31.
Which activity is not included in the first pass of two pass
assemblers ?
(A)
Build the symbol table
(B)
Construct the intermediate code
(C)
Separate mnemonic opcode and operand fields
(D)
None of the above
32.
Which of the following is not collision resolution technique?
(A)
Hash addressing
(B) Chaining
(C)
Both (A) and (B) (D) Indexing
33.
Code optimization is responsibility of :
(A)
Application programmer (B) System programmer
(C)Operating
system (D)
All of the above
34.
Which activity is included in the first pass of two pass assemblers ?
(A)
Build the symbol table
(B)
Construct the intermediate code
(C)
Separate mnemonic opcode and operand fields
(D)
None of these
35.
In two pass assembler the symbol table is used to store :
(A)
Label and value
(B) Only value
(C)
Mnemonic (D) Memory Location
36.
Semaphores are used to :
(A)
Synchronise critical resources to prevent deadlock
(B)
Synchronise critical resources to prevent contention
(C)
Do I/o
(D)
Facilitate memory management
37.
In which of the following storage replacement strategies, is a
program placed in the largest available hole in the memory ?
(A)
Best fit (B) First fit
(C)
Worst fit
(D) Buddy
38.
Remote computing system involves the use of timesharing systems and :
(A)
Real time processing (B) Batch processing
(C)
Multiprocessing (D)
All of the above
39.
Non modifiable procedures are called
(A)
Serially useable procedures (B) Concurrent procedures
(C)
Reentrant procedures
(D) Topdown procedures
40.
Match the following
(a)
Disk scheduling (1) Round robin
(b)
Batch processing (2) Scan
(c)
Time sharing (3) LIFO
(d)
Interrupt processing (4) FIFO
(A)
a-3, b-4, c-2, d-1 (B) a-4, b-3, c-2, d-1
(C)
a-2, b-4, c-1, d-3 (D)
a-3, b-4, c-1, d-2
41.
The main objective of designing various modules of a software system
is :
(A)
To decrease the cohesion and to increase the coupling
(B)
To increase the cohesion and to decrease the coupling
(C)
To increase the coupling only
(D)
To increase the cohesion only
42.
Three essential components of a software project plan are :
(A)
Team structure, Quality assurance plans, Cost estimation
(B)
Cost estimation, Time estimation, Quality assurance plan
(C)
Cost estimation, Time estimation, Personnel estimation
(D)
Cost estimation, Personnel estimation, Team structure
43.
Reliability of software is dependent on :
(A)
Number of errors present in software
(B)
Documentation
(C)
Testing suties
(D)
Development Processes
44.
In transform analysis, input portion is called :
(A)
Afferent branch
(B) Efferent branch
(C)
Central Transform (D) None of the above
45.
The Function Point (FP) metric is :
(A)
Calculated from user requirements
(B)
Calculated from Lines of code
(C)
Calculated from softwar’s complexity assessment
(D)
None of the above
46.
Data Mining can be used as _________ Tool.
(A)
Software (B) Hardware
(C)
Research
(D)
Process
47.
The processing speeds of pipeline segments are usually :
(A)
Equal (B)
Unequal
(C)
Greater (D) None of these
48.
The cost of a parallel processing is primarily determined by :
(A)
Time complexity
(B) Switching complexity
(C)
Circuit complexity (D) None of the above
49.
A data warehouse is always _________.
(A)
Subject oriented (B)
Object oriented
(C)
Program oriented (D) Compiler oriented
50.
The term 'hacker' was originally associated with :
(A)
A computer program
(B)
Virus
(C)
Computer professionals who solved complex computer problems.
(D)
All of the above
No comments:
Post a Comment