Professional Documents
Culture Documents
II Computer Science and Applications A-04-02: Name & Signature of Invigilator
II Computer Science and Applications A-04-02: Name & Signature of Invigilator
Test Paper
AND APPLICATIONS
A-04-02
: ____________________________________
Paper
Signature : ___________________________________
: II
1.
2.
3.
4.
II
5.
6.
7.
8.
9.
10.
11.
12.
A$M$ *^$
D #r O VZ Cy Z $ sMs $ >$y.
D { {$$ *O $O_eM {$ MW E.
{$$ D {{$$ $M$ Cy$$. $$s I$
$$$Z D {{$$$ _ M A$ V>
^*$My.
(i) D { {$$$ ^*yyM Mh A^$ E M>W# $$
_^y. tMP $ $$$ CM _ E {{$$$
$$ AXM^$.
(ii) M$ h O $${_ *^ {M> D {{$$Z i
Q$ $$$ { Q$ ^*$My. i QM$
_ V> *__ QZ {$ M#r f{
M>M#r {$ {M$Z M#r HO y$y$r
s N$O { { r $$s I$ $Z >
M$M W C_a M $$V> V>Y E {{ $My.
{{$$ *ay$ A# $$ Cy$.
(iii) O V>
^*$M > {{ Q$ OMR {$$ O
A V> OMR {$$ Q$ D {{$$ O t Z >$$.
{ {M$ $V$ {*$ {$ (A), (B), (C) $$$ (D)
$V> Cyz$$. {{M$ O {$ G$M M V>
OMR {$$Z { { QM$ Cy $V$ Z O
{$ *_^ $$s M V>
N^.
A
B
C
D
E :
(C) O { A$$
{M$ {$ D {{$$ Cy OMR {$$ O
Cy Z N_ V$^. AM>M * {O M ^r
V$ $ { $*M ^$y$.
{ {$$ Z C_a *^$ g{VV> ^y.
_$ {{$$ _ C_a R $$Z ^*.
OMR {$$ O ~ Z *_^ >$ _ C Z
$ V$#$ V> $ $ >$y V> C _$ rty
V> ^r$$ $ AM$ $ $#$.
N $$ > $ {{ $$$ OMR { V>
M$yM C. s V $rM$ $M$M*y$.
/ V$ $$s *{$ E*W^.
V$ s$, M>M$r$, G[M>tM M>$ $$V$ VZ
E*W^y .
*M$ *$P WY# $.
A-04-02
*A0402*
II
A-04-02
*A0402*
COMPUTER SCIENCE AND APPLICATIONS
Paper II
5. If no exception is thrown
(D) Execution time
execute
(A) Online Analytical Project
bypassed
6. Consider the following pseudo-code :
A=A+1
B=B+1
ENDIF
(B) Flow-chart
(C) Algorithm
(D) DFD
II
(A) 2
(B) 3
(C) 4
(D) 5
A-04-02
*A0402*
9. Match the following :
i. The lowest
layer whose
a software system ?
function is to
activate, deactivate
circuit between
2. Physical Layer
3. Presentation
Layer
recovery of errors
in the transmitted
data
1. ( )
4. Network Layer
2. &
3.
II
4. #
I. 0 (log n)
1. Heap sort
II. 0 (n)
2. DFS
III. 0 (n log n)
3. Binary search
IV. 0 (n2)
4. Bubble sort
II
III
IV
(A)
(B)
(B) I 4, II 1, III 3, IV 2
(C)
(C) I 3, II 1, III 2, IV 4
(D)
(D) I 3, II 2, III 4, IV 1
(A) I 3, II 2, III 1, IV 4
A-04-02
*A0402*
11. The string accepted by the following finite
automaton
q0
q1
q2
a, b
(A) abb*
2n
(B) 2n
(D) 2
(B)
n2
(C)
UPDATE
(A) DDL
(B) PL
(C) DML
(D) DCL
(D)
II
A-04-02
*A0402*
18. Suppose a tree has d1 vertices of degree 1, 2
(A) 6
(B) 4
(A) m + n and 0
(C) 8
(B) mn and 0
(D) 12
(C) m + n and m n
(D) mn and m + n
polymorphism.
(B) Both (A) and (R) are true but (R) is not
A-04-02
*A0402*
20. Assertion A : Implicit type conversion in
(C) Loop-free
conversion is recommend
interdomain
routing
FALSE
test.
I. X + X = X
II. X . X = X
III. X . 1 = X
IV. X + 1 = 1
(A) True, True
II
(D) All four (I, II, III and IV) are correct
A-04-02
*A0402*
26. In a software project, COCOMO
1. Full adder
estimate
II. To add 3 bits
4. Half adder
II
III
of the software
(C) Effort and cost based on the duration
IV
of the software
(A)
(B)
(C)
(A) 0111
(D)
3
(B) 1011
(C) 0100
(D) 0101
achieved by
(A) Bit stuffing
(B) AMPLITUDE
(C) ATTENUATION
(C) Equalization
(D) MODULATION
II
A-04-02
*A0402*
29. In Unix, the file descriptor returned by
(A) FILE
(B) Integer
language
(B) To build a literal table and an identifier
(C) Char
table
(D) Structure
set represented by
(A) 110* (0 + 1)
*
*
*
(B) (10) (01) (00 + 11)
I. The processes ID
1. grep
II. Editor
2. ps
3. cat
4. vi
II
II
III
IV
(A) LEX
(A)
(B) YAAC
(B)
(C) TEX
(C)
(D) EMACS
(D)
A-04-02
*A0402*
34. Consider this C code to swap two integers
{
(A) Optimizing compiler
* px = *px *py ;
*py = *px + *py;
passed
S3 : Correctly implement the swap
procedure for all input pointers
referring to integers stored in memory
2. LRU algorithm
3. Bankers
algorithm
4. Petersons
algorithm
job
II
III
IV
(A)
(B)
(C)
(D)
input pointers.
S5 : May add or subtract integers and
pointers.
(A) S1
(B) S2 and S3
(C) S2 and S4
(D) S2 and S5
II
10
A-04-02
*A0402*
37. Match the following :
P. Regular expression
1. Syntax analysis
Q. Pushdown automata
2. Code generation
R. Dataflow analysis
3. Lexical analysis
S. Register allocation
4. Code optimization
(A) P 4, Q 1, R 2, S 3
digital signature
ii. An encryption technique DES
(C) P 3, Q 4, R 1, S 2
(D) P 2, Q 1, R 4, S 3
be dealt with
consisting of fields A, B, C, D, E, F
dependency ?
II
(A) 1NF
(B) 2NF
(C) BCNF
A-04-02
*A0402*
43. The number of flipflops required in a
decade counter is
(A) 3
memory.
(B) 10
(C) 5
(D) 4
i. Stack
reason for P
(B) Both P and Q are true, and Q is not
ii. Queue
reason for P
iii. Tree
iv. Graph
tautology ?
(A) (p q) p
(B) p (q p)
(C) iii and iv
(C) p (p q)
(D) i, ii and v
II
(D) q (p q)
12
A-04-02
*A0402*
47. Fense Register is used for
Process
P1
P2
P3
P4
(A) P1 P2 P3 P4
(B) P4 P3 P2 P1
(C) P2 P3 P1 P4
ACTIVE tag
(D) P3 P1 P4 P2
II
13
A-04-02
*A0402*
Space for Rough Work
II
14
A-04-02
*A0402*
Space for Rough Work
II
15
A-04-02
*A0402*
Space for Rough Work
II
16
A-04-02