You are on page 1of 15

NOV - 37211/II

Computer Science and Applications


Paper II
Time Allowed : 75 Minutes]
[Maximum Marks : 100
Note : This Paper contains Fifty (50) multiple-choice questions, each question
carrying Two (2) marks. Attempt All of them.
1.

In a transmission of binary digits 0

3.

A graph is strongly connected if

and 1, the probability of a bit being

for all v i, v j G, both the (i, j)

in error is 1/4. If three digits are

and (j, i)th cell in the path matrix

transmitted, then the probability of

are :

error-free transmission is :
(A) (0, 0)
(A) 27/64
(B) (1, 0)
(B) 1/64
(C) (0, 1)
(C) 3/4
(D) (1, 1)
(D) 1/4
2.

4.

If A and B are subsets of universal

The type-1 grammar corresponds


to :

set S, A is a subset of B and


A B, then :

(A) Regular grammar

(A) BC A =

(B) Context free grammar

(B) A B = B

(C) Context sensitive grammar

(C) B AC =

(D) A general phase structure

(D) B (A B)

grammar
1

[P.T.O.

NOV - 37211/II
5.

8.

A non-empty subset S of G is a

What is the output of the following


circuit ?

subgroup of <G, *> iff :


(A) For all a, b S, a * b1 S
(B) For all a, b S, a1 * b S
(C) For all a, b S, a1 * b1 S

6.

(A) 0

(D) For all a, b S, a * b S

(B) 1

Which of the following logic has the

(C) X

maximum Fanout ?

(D) X
9.

(A) RTL

The range of 8 bit 2s complement


number expressed in decimal is :

(B) ECL

7.

(A) 127 to +128

(C) NMOS

(B) 128 to +127

(D) CMOS

(C) 127 to +127

Which of the following is a weighted

(D) 128 to +128


10. Which of the following is divisible

code ?

by 4 ?
(A) 8421 code
(A) 1001011
(B) Excess-3 code

(B) 1110001

(C) 1248 code

(C) 1111001

(D) 5211 code

(D) 1010100
2

NOV - 37211/II
11. Choose the correct output in a typical

13. What will be the output for following

DOS environment :

code ?

void main()
main()
{
{

int c = --2;

static int var = 5;

printf(c=%d, c);
}

printf(%d, var--);

(A) 1

if(var)

(B) 2
main();

(C) 2
}

(D) Compilation Error


12. Choose the correct output :

(A) Compilation Error

#include<stdio.h>

(B) Execution Error

#define a 10
(C) 5 4 3 2 1
main()
(D) Stack Overflow

14. Which of the following operators

#define a 50

cannot be overloaded in C++ ?

printf(%d, a);
}

(A) /

(A) Execution error

(B)

(B) Compilation error


(C) >>

(C) 10

(D) &

(D) 50
3

[P.T.O.

NOV - 37211/II
15. What will be the output for following
code ?
class base
{
public:
virtual void baseFun()
{cout<<from base<<endl;}
};
class deri:public base
{
public:
void baseFun()
{cout<<from derived<<endl;}
};
void SomeFunc(base *baseObj)
{
baseObj->baseFun();
}
int main()
{
base baseObject;
SomeFunc(&baseObject);
deri deriObject;
SomeFunc(&deriObject);
}
(A) from base
from derived
(B) from derived
from base
(C) from base
from base
(D) from derived
from derived

16. In DBMS which normal form


requires multi-valued dependency ?
(A) 3NF
(B) BCNF
(C) 4NF
(D) 5NF
17. Which data management language
component enables the DBA to
define the schema components ?
(A) Subschema DLL
(B) DML
(C) Schema DLL
(D) CREATE
18. Non-catastrophic failure is :
(A) System crash
(B) Disk failure
(C) Physical problem
(D) Logical error
4

NOV - 37211/II
19. The physical location of a record is

22. Consider the algorithm :

determined by a mathematical

Guess(A[0....n1], k){

formula that transforms a recordA(n1)=k

key into a record location is :

i=0

(A) A B-tree file

while(A[i]!=k)

(B) A hash file

(C) An index file

i=i+1

(D) A sequential file


}

20. In DBMS SQL%FOUND, SQL%

If(i<n1)

NOTFOUND, SQL%ROWCOUNT,
SQL%ISOPEN are called as :

return i

(A) Implicit cursor attributes

else

(B) Explicit cursor attributes

return 1

(C) Cursor attributes

(D) Cursor value

The algorithm returns 1, if

21. The value of the expression

(A) k is the first element of the

ABC*+DE*F+G/-, when all variables

array

assume the value 1 (one), is :


(B) k is the last element of the
(A) 0

array

(B) 1

(C) k is the middle element of the

(C) 1

array

(D) 3

(D) k is not in the array


5

[P.T.O.

NOV - 37211/II
23. If a heap with 11 elements is

25. Merge sort is an example of :

implemented as an array having


(A) Divide and conquer algorithm

subscripts ranging from 1 to 11, the


position of right child of the node at

(B) Dynamic programming algorithm

position three is :
(C) Greedy algorithm
(A) 1
(D) Branch and bound algorithm

(B) 2
(C) 6

26. The ....................... field in the SNMP

(D) 7
PUD, reports an error in a response
24. The in-degrees of the vertices can
message.
be computed from the adjacency
matrix of a directed graph as :

(A) Error index

(A) Sum of the diagonal elements

(B) Error status

(B) Sum of the columns


(C) Set request
(C) Sum of the rows
(D) Agent index

(D) Sum of all the elements


6

NOV - 37211/II
27. Device

on

one

network

29. The

can

mapping

of

IP

address

by Ethernet address is done by

communicate with a device on

...................... protocol.

another network via a :

(A) RIP

(A) Switch

(B) ARP
(B) Utility server
(C) USPF
(C) File server
(D) UDP
(D) Gateway
30. What is the maximum operating
28. The data rate of a ISDN-Basicrate of a wireless LAN using infrared
Access-B-Channel is :

communication ?

(A) 32 kbps

(A) 1 mbps

(B) 64 kbps

(B) 2 mbps

(C) 144 kbps

(C) 5 mbps

(D) 192 kbps

(D) 11 mbps
7

[P.T.O.

NOV - 37211/II

33. ............................ is created in pass 2

31. Assembler is a/an ........................

of the assembler.

(A) Interpreter

(A) Literal table


(B) Compiler
(B) Symbol table
(C) Preprocessor
(C) Base table
(D) Linker
(D) Top table
32. Which languages are recognized by
34. Which of the following tables is not
the finite state automaton ?
created during Lexical Analysis ?
(A) Regular
(A) Literal table
(B) Context sensitive

(B) Identifier table

(C) Context free

(C) Symbol table

(D) Syntax free

(D) Value table


8

NOV - 37211/II
35. LR parser will generate :

37. The memory allocation schema


subjected to external fragmentation

(A) Left most derivation

is :

(B) Right most derivation


(C) Left

most

derivation

(A) Segmentation

in

(B) Swapping

reverse

(C) Demand paging

(D) Right most derivation in


reverse

(D) Paged segmentation

36. The main function of dispatcher in

38. Locality of reference in memory

the portion of the process scheduler

management is :

is :

(A) Page used in the previous page

(A) Swapping a process to disk

reference

(B) Assigning ready process to CPU


(C) Suspending

some

of

(B) Page used in last few page


references

the

processes

(C) One of the page existing in


memory

(D) Bring process from the disk to


the main memory

(D) A page fault


9

[P.T.O.

NOV - 37211/II
41. Reliability of a software is dependent
39. Distributed system should :
upon :
(A) Meet

prescribed

(A) Number of errors present in the

time

software
constraints
(B) Documentation
(C) Testing suites

(B) Aim better resource sharing

(D) Development processes


(C) Aim better system utilization
42. In software metrics, McCABES
cyclomatic number is given by

(D) Aim low system overhead

following formula :
40. The scheduling policy which is well

Note :
C = McCABES cyclomatic number

suited for a time-shared operating

e = Number of edges
system is :
n = Number of nodes
(A) Shortest job first

p = Number of strongly connected


components

(B) FIFO
(A) C = e n + 2p
(B) C = e n p

(C) Round robin

(C) C = e + n + 2p
(D) Last in first out
(D) C = e n * 2p
10

NOV - 37211/II
43. Sliding windows concept of software

45. In the software testing process,

project management is :

when

(A) Preparation of comprehensible

is

validation

testing

performed ?

plan
(A) during coding
(B) Preparation of the various
(B) during unit testing
stages of development
(C) during module testing

(C) Ad-hoc planning

(D) during integration testing

(D) Requirement analysis


44. Software ........................ is work done

46. MPI library cannot be used from one

to enhance software functionality,

of the following C programming

correct errors and improve the

environments :

performance of software.
(A) Visual C++ 6.0
(A) re-design
(B) Turbo C++ 3.0
(B) maintenance
(C) GCC 4.0 for Windows

(C) corrections

(D) GCC 4.0 for Linux

(D) re-engineering
11

[P.T.O.

NOV - 37211/II
49. Which of the following technology

47. What is the minimum number


of

fixed-location

solution a bank may use to transfer

transceivers

an e-cheque ?
required to be in a cell in a cellular
(A) XML

network ?

(B) EDI
(A) 1
(C) Encrypted e-Mail
(B) 4
(D) WML
(C) 6
50. In
(D) 8

MFC

programming,

an

applications EXE in Debug


directory will be ........................ than

48. Internet classifieds follow which

its counterpart in Release directory.

e-commerce business model ?

(A) Smaller
(A) B2B
(B) Bigger
(B) B2C
(C) Same size
(C) C2C
(D) Depends upon the nature of
(D) G2B

application
12

NOV - 37211/II
ROUGH WORK

13

[P.T.O.

NOV - 37211/II
ROUGH WORK

14

Test Booklet No.

iz'uif=dk -

NOV - 37211/II

Signature of Invigilators
1. .........................................
2. .........................................

Seat No.

COMPUTER SCIENCE AND APPLICATIONS (In figures as in Admit Card)

Paper II

Seat No. (In words) ............................

NOV - 37211

..............................................................
Answer Sheet No.

Time Allowed : 75 Minutes]


[Maximum Marks : 100
Number of Pages in this Booklet : 16
1.

2.
3.
4.

5.

6.
7.
8.

9.

Instructions for the Candidates


Write your Seat Number in the space
provided on the top of this page. Write
your Answer Sheet No. in the space
provided for Answer Sheet No. on the
top of this page.
Write and darken Test Booklet No. on
OMR Answer Sheet.
This paper consists of Fifty (50)
multiple choice type of questions.
Each item has four alternative
responses marked (A), (B), (C) and (D).
You have to darken the responses as
indicated below on the correct
response against each item.
Example :
A
B
C
D
Where (C) is the correct response.
Your responses to the items for this
paper are to be indicated on the
Answer Sheet only. Responses like ( )
( ) ( / ) and light shaded responses
will not be considered/evaluated.
Read instructions given inside
carefully.
One Sheet is attached at the end of the
booklet for rough work.
You should return the test booklet and
answer sheet both to the invigilator
at the end of the paper and should not
carry any paper with you outside the
examination hall.
Answers marked on the body of the
question paper will not be evaluated.

1.

2.
3.
4.

5.

6.
7.
8.

9.

15

ijh{kkFkhlkBh lwpuk
;k ikukojhy ojP;k dksi;kr vkiyk vklu ekad
rlsp vki.kkl fnysY;k mkjif=dspk ekad
R;k[kkyh fygkokiz'uif=dk ekad OMR mkjif=dsoj fnysY;k
jdkU;kr fygwu R;kizek.ks dkk djkok;k iz'uif=dsr ikkl cgqfuoM iz'u vkgsrizR;sd iz'uklkBh (A), (B), (C) vkf.k (D) v'kh
pkj fodYi mkjs fnyh vkgsr- R;krhy ;ksX; mkjkpk
jdkuk [kkyh n'kZfoY;kizek.ks Bdi.ks dkk
djkokmnkA
B
C
D
tj (C) gs ;ksX; mkj vlsy rj;k iz'uif=dsrhy iz'ukaph mkjs mkjif=dse/;sp
|kohr- mkjkP;k jdkU;ke/;s ( ) ( ) ( / ) o
vLi"Vi.ks dks dsysys mkj xzk /kjys tk.kkj
ukghvkr fnysY;k lwpuk dkthiwoZd okpkO;krdPP;k dkeklkBh iz'uif=dsP;k 'ksoVh dksjs iku
tksMys vkgs;k isijph ijh{kk laiY;kuarj iz'uif=dk o
mkjif=dk nksUgh i;Zos{kdkauk ijr djkoh- ;krhy
dks.krkgh dkxn rqeP;k cjkscj ijh{kk dsakckgsj
us.;kl lDr eukbZ vkgsiz'uif=dsoj n'kZfoysyh mkjs riklyh tk.kkj
ukghr[P.T.O.

You might also like