Professional Documents
Culture Documents
J 87 11
J 87 11
(Name) ____________________________
Roll No.
2. (Signature) __________________________
(Name) ____________________________
87
Roll No.________________________________
(In words)
1 1
Time : 1 /4 hours]
J-87-11
1.
2. -
3. , -
-
, :
(i) -
-
(ii) -
/
-
-
(iii) OMR -
4. (A), (B), (C) (D)
B
C
A
:
D
(C)
5. I -
,
6.
7. (Rough Work)
8. - ,
,
, ,
,
9. - OMR -
10. /
11. ()
12.
1
P.T.O.
2.
3.
4.
3n
5.
10 256 + 5 16 + 5 is
(D) 7
6.
(A) 5
(B)
(C)
(D) 8
3F2.98
(C)
2F3.89
(D) 2F3.98
7.
(A + B) AB is equivalent to
(A) A B
(B)
AuB
(C)
(A B) u A
(D) (A u B) A
8.
Paper-II
AND gates
(C)
J-87-11
9.
13.
(B)
(C)
(C)
14.
10.
(B)
Instruction by instruction
(C)
Line by line
(A) 01001101.0100
(B)
01001101.0010
(C)
10110010.1011
15.
(D) 10110010.1101
11.
(B)
(C)
Independent of platform
(B)
Easy development
(B)
Backup
(C)
Efficiency
(C)
Immediate update
What features
powerful ?
make
C++
so
(A) Authorization
(B)
(B)
Authentication
(C)
(C)
Access Control
Paper-II
18.
19.
24.
20.
21.
22.
23.
h(k) =
for
( 5 1)
. The location to the
2
key k = 123456 is
(A) 46
(B) 47
(C) 41
(D) 43
A =
Paper-II
25.
26.
27.
30.
(B)
(C)
(D) MSK
QAM
QPSK
(B)
Message switching
(C)
Packet switching
(ii)
31.
(B)
Loader
(C)
Linker
(D) Compiler
32.
(B)
(i, iii)
(A) Drive
(C)
(ii, iii)
(B)
Spooler
(C)
Interpreter
33.
(B)
(B)
Identifier table
(C)
(C)
Terminal table
(D) Telecommunications
J-87-11
Paper-II
34.
38.
(B)
(C)
Expand
macrocalls
substitute arguments
(A) Semaphore
and
(B)
Mutual exclusion
(C)
Multiprogramming
35.
39.
External subroutine
(C)
Data
located
procedure
in
other
(A) 3
(B)
(C)
(D) 5
(A) More
(B)
handle interrupts
(B)
Cat
(C)
(C)
Pg
A file organization
VSAM file is
component
not
one
of
software
engineering layers ?
(A) Process
(B)
(B)
Manufacturing
(C)
(C)
Method
the
(D) Tools
6
J-87-11
42.
46.
System Analysis
(C)
Testing
47.
Virtual memory is
(A) related to virtual reality
(B) a form of ROM
(C) a form of RAM
(D) None of the above
48.
M-Commerce refers to
(A) a myth which does not exist in
reality
(B) the ability of business to reach
potential customers wherever
they are
(C) the ability to have large
capacity of memory storage
dealing trade and commerce
(D) None of the above
49.
50.
Unnecessary delays
(C)
Task overlapping
(C)
Communication,
risk
management,
measurement,
production, reviewing
Analysis,
programming,
maintenance
designing,
Debugging,
Customer Myths
(C)
Practitioner Myths
Paper-II
D-0109
Paper-II
P.T.O.
J-87-11