Subject: Computer Science & Application
Subject: Computer Science & Application
Subject: Computer Science & Application
3. Which of the following binary codes for decimal digits are self complementary
(A) 8421 Code (B) 2421 Code
(C) Excess-3 gray Code (D) 8421, Excess-3 gray Codes
10. Data warehouse contains _______ data that is never found in operational Environment
(A) Summary (B) Encoded
(C) Scripted (D) Encrypted
1
11. A process to upgrade the quality of data before moved to data warehouse is
(A) Data mining (B) Data Scrubbing
(C) Data Cleaning (D) both B and C
15. A stack can be implemented using queue, but then need to use at least______queues;
(A) 2 (B) 3
(C) 5 (D) 7
18. What is the result of the following postfix expression ab*cd*+ where a=2, b=2, c=3, d=4.
(A) 16 (B) 40
(C) 14 (D) 28
2
21. What is the maximum number of parenthesis that will appear on the stack at any one time for
parenthesis expression given by ( ( ) ( ( ) ) ( ( ) ) )
(A) 2 (B) 3
(C) 4 (D) 5
22. Consider a B+ tree in which maximum number of keys in a node is 5. The minimum number
of keys in any non-root node is
(A) 1 (B) 2
(C) 3 (D) 4
24. In PERT/CPM, the _____ event represents completion of two or more events
(A) Merge (B) Splitting
(C) Composition (D) Association
25. In the following scenarios, when will you use selection sort
27. Which of the following algorithm design technique is used in the quick sort
algorithm
(A) Dynamic programming (B) Backtracking
(C) Divide and conquer (D) Greedy method
28. If the period of signal is 100ns. Then its frequency in Hertz is;
(A) 10 (B)100
(C) 1000 (D)10000
29. Session Layer of OSI model offers services
(A) Synchronization, Dialog control, token management
(B) Dialog control, Flow control, token management
(C) Asynchronization, Dialog control, Errors
(D) Synchronization, token management, flow control
3
30. Which layers of the OSI reference model are host-to-host layers
(A) Transport, Session, Presentation, Application
(B) Network, Transport, Session, Presentation
(C) Data-link, Network, Transport, Session
(D) Physical, Data-link, Network, Transport
32. In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How
many extra bits per second does the receiver receive if the data rate is 1 Mbps?
(A) 10 bps (B) 100 bps
(C) 1000 bps (D) 10000 bps
34. The number of states in the minimal deterministic finite automaton corresponding to the regular
expression (0 + 1) ∗ (10) is
(A). 2 (B). 3
(C). 4 (D). 5
36. Which of the following machine model can be used in a necessary and sufficient sense for
lexical analysis in modern computer language
(A). Deterministic push down automates (B). Non-deterministic finite
automates
(C) Finite automata (D). Turing Marching
37. To implement the Boolean function (AB+C) with using only 2 NOR gates. ______ gates are
required.
(A) 2 (B) 3
(C) 5 (D) 9
4
38. How many address lines and data lines are required to provide a memory capacity of 16K X 16
(A) 10,4 (B) 16, 16
(C) 14,16 (D) 4,16
39. A processor can support a maximum memory of 4 GB, where the memory is word-
addressable (a word consists of two bytes). The size of the address bus of the processor is at
least __________ bits.
A. 21 B. 25
C. 31 D. 35
40. A multiplexer is placed between a group of 32 register and an accumulator to regulate data
movement such at that any given point in time the content of only one register will move to
the accumulator. The minimum number of select lines needed for the multiplexer is
A. 5 B.13
C.15 D.24
41. To design a synchronous counter that counts the sequence 0-1-0-2-0-3 and then repeats. The
minimum number of J-K flip-flops required to implement this counter is
A. 2 B. 3
C. 4 D. 5
42. The size of the data count register of a DMA controller is 16 bits. The processor needs to transfer
a file of 29,154 kilobytes from disk to main memory. The memory is byte addressable. The
minimum number of times the DMA controller needs to get the control of the system bus
from the processor to transfer the file from the disk to main memory is
A. 312 B. 456
C. 512 D. 634
43. One of the main features that distinguish microprocessor from micro-computers is
(A) words are usually larger in microprocessors.
(B) words are shorter in microprocessors.
(C) microprocessor does not contain I/O devices.
(D) None of the above.
44. In which addressing mode, the effective address of the operand is generated by adding a constant
value to the contents of register
(A) Absolute mode (B) Immediate mode
(C) Index Mode (D) Indirect mode
45. A shift reduce parser suffers from
(A) Shift reduce conflict only
(B) Reduce conflict only
(C) Both shifts reduce conflict and reduce conflict
(D) Shift handle and reduce handle conflicts
5
46. A 32-bit wide main memory unit with a capacity of 1 GB is built using 256 M 4-bit DRAM
14
chips. The number of rows of memory cells in the DRAM chip is 2 . The time taken to
perform one refresh operation is 50 nanoseconds. The refresh period is 2 milliseconds. The
percentage (rounded to the closest integer) of the time available for performing the memory
read/write operations in the main memory unit is ____________.
(A) 27 (B) 43
(C) 59 (D) 83
47. The degree of multiprogramming is
(A) the number of processes executed per unit time
(B) the number of processes in the ready queue
(C) the number of processes in the I/O queue
(D) the number of processes in memory
48. The advantage of _______ is that it can reference memory without paying the price of having
a full memory address in the instruction.
(A) Direct addressing (B) Indexed addressing
(C) Register addressing (D) Register Indirect addressing
52. A direct mapped cache is of size 32KB and has block size 32 bytes. CPU also generates 32-bit
address. Number of bits needed for indexing the cache
(A) 10 (B) 14
(C) 15 (D) 23
6
54. Permissions required to get a location in Android is
(A) On Receive () and send intend ()
(B) ACCESS_FINE and ACCESS_COARSE
(C) Send Order Broad cast () and i-Chat
(D) ACCESS_FINE and ACCESS_LOC
55. If and only if no subject of individual requirements described in SRS conflicts with each other
then it is
(A) Correct (B) consistent
(C) verifiable (D) unambiguous
56. _______ of a system is the structure or structures of the system which comprise software
elements, the externally visible properties of these elements and the relationship amongst
them.
(A) Software construction (B) Software evolution
(C) Software architecture (D) Software reuse
58. Assume that a program will experience 200 failures in infinite time. It has now experienced
100 failures. The initial failure intensity was 20 failures/CPU hr. Then the current failure
intensity will be
(A) 5 failures/CPU hr (B) 10 failures/CPU hr.
(C) 20 failures/CPU hr. (D) 40 failures/CPU hr.
59. 97000 LOC Application software is developed with efforts of 5 person-year. What is the
productivity of person-months?
(A) 1.4 KLOC (B) 1.6 KLOC
(C) 3.2 KLOC (D) 5.8 KLOC
60. Match the following
1. Waterfall model a. Specification can be developed incrementally
2.Evolutionary model b. Re-usability in development
3 Component based c. Explicit recognition of risk
software engineering d. Inflexible partitioning of project into stages
4.Spiral developmentd. e. feasible configuration of tools
7
61. Software validation mainly checks for inconsistencies between
(A) function specifications and use cases
(B) use cases and user requirements
(C) Detailed specifications and user requirements
(D) Implementation and system design blue prints
67. ________ is used in game trees to reduce the number of branches of the search tree to be
traversed without affecting the solution.
(A) Best first search (B) Goal stack planning
(C) Alpha-beta pruning procedure (D) Min-max search
8
69. Beam-penetration and shadow-mask are the two basic techniques for producing color
displays with a CRT. Which of the following is not true?
I. The beam-penetration is used with random scan monitors.
II. Shadow-mask is used in raster scan systems.
III. Beam-penetration method is better than shadow-mask method.
IV. Shadow-mask method is better than beam-penetration method.
70. Which of the following color models are defined with three primary colors
(A) RGB and HSV color models (B) CMY and HSV color models
(C) HSV and HLS color models (D) RGB and CMY color models
72. Given an image of size 1024 × 1024 pixels in which intensity of each pixel is an 8-bit quality.
It requires _______ of storage space if the image is not compressed.
(A) one Terabyte (B) one Megabyte
(C) 8 Megabytes (D) 8 Terabytes
73. Which of the following protocol pairs can be used to send and retrieve e-mails (in that
order)
(A). IMAP, POP3 (B). SMTP, POP3
(C). SMTP, MIME (D). IMAP, SMTP
75. Which of the following is/are example(s) of stateful application layer protocols
(A). HTTP, FTP (B). FTP, TCP
(C). FTP, POP3 (D). POP3
76. The RSA encryption algorithm also works in reverse. This property is used in
(A) Certification (B) Intrusion detection systems
(C) Data compression (D) Digital signatures
77. The ability to inject packet into the Internet with false source address is
(A) IP sniffing (B) IP Spoofing
(C) IP Phishing (D) Man-in-the middle attack
9
78. A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number
of hosts it can handle?
(A) 1024 (B) 2048
(C) 4096 (D) 8192
81. _________ computing refers to applications and services that run on a distributed
network using virtualized resources.
(A) Distributed (B) Cloud
(C) Soft (D) Parallel
82. The “part-whole”, or “a-part-of”, relationship in which objects representing the components of
something associated with an object representing the entire assembly is called as
(A) Association (B) Aggregation
(C) Encapsulation (D) Generalization
10
85. A default constructor
(A) Takes no arguments
(B) Has default values for all its arguments
(C) Either (A) or (B)
(D) Neither (A) nor (B)
86. In Java, property, the class for ensuring the persistence must
(A) Serializable Interface (B) Utilization Interface
(C) Thread able Interface (D) Recognizable Interface
88. Which of the following is needed by the JVM for execution of Java code
(A) Class loader (B) Java Interpreter
(C) Class loader, and (D) Class loader, Java
java Interpreter Interpreter and API
90. Which of the following arrays are used in the implementation of list data type in python
(A) Bit array (B) Dynamic arrays
(C) Sparse arrays (D) Parallel arrays
92. Which of the following is actually considered as the first computer virus
(A) Sasser (B) Blaster
(C) Creeper (D) Net sky
11
93. The most important language for Data Science is
(A) Java (B) Ruby
(C) R (D) None of them
100. Which of the following cloud concept is related to pooling and sharing of resources
(A) Polymorphism (B) Abstraction
(C) Virtualization (D) None of them
12