You are on page 1of 8

Signature and Name of Invigilator OMR Sheet No. : .........................................

(To be filled by the Candidate)


1. (Signature) __________________________
Roll No.
(Name) ____________________________
(In figures as per admission card)
2. (Signature) __________________________
Roll No.____________________________
(Name) ____________________________
(In words)

J 87 1 0
PAPER-II
Test Booklet No.

Time : 1 1/4 hours] [Maximum Marks : 100


COMPUTER SCIENCE AND APPLICATIONS
Number of Pages in this Booklet : 8 Number of Questions in this Booklet : 50
Instructions for the Candidates
1. Write your roll number in the space provided on the top of 1.
this page. 2. -
2. This paper consists of fifty multiple-choice type of questions. 3. , -
3. At the commencement of examination, the question booklet -
will be given to you. In the first 5 minutes, you are requested :
to open the booklet and compulsorily examine it as below :
(i) -
(i) To have access to the Question Booklet, tear off the paper
seal on the edge of this cover page. Do not accept a booklet
-
without sticker-seal and do not accept an open booklet.

(ii) Tally the number of pages and number of questions in (ii) -
the booklet with the information printed on the cover
page. Faulty booklets due to pages/questions missing /
or duplicate or not in serial order or any other
discrepancy should be got replaced immediately by a
correct booklet from the invigilator within the period -
of 5 minutes. Afterwards, neither the Question Booklet -
will be replaced nor any extra time will be given.
(iii) After this verification is over, the Test Booklet Number (iii) - OMR
should be entered in the OMR Sheet and the OMR Sheet OMR -
Number should be entered on this Test Booklet.

4. Each item has four alternative responses marked (A), (B), (C)
and (D). You have to darken the oval as indicated below on the
4. (A), (B), (C) (D)
correct response against each item.
Example : A B C D

where (C) is the correct response.
: A B C D
5. Your responses to the items are to be indicated in the Answer
(C)
Sheet given inside the Paper I Booklet only. If you mark at 5. I -
any place other than in the ovals in the Answer Sheet, it will
not be evaluated. ,
6. Read instructions given inside carefully. 6.
7. Rough Work is to be done in the end of this booklet. 7. (Rough Work)
8. If you write your name or put any mark on any part of the test 8. -
booklet, except for the space allotted for the relevant entries, ,
which may disclose your identity, you will render yourself

liable to disqualification.
9. You have to return the test question booklet and OMR Answer
9. - OMR -
sheet to the invigilators at the end of the examination
compulsorily and must not carry it with you outside the
Examination Hall. 10. /
10. Use only Blue/Black Ball point pen. 11. ()
11. Use of any calculator or log table etc., is prohibited.
12. There is no negative marks for incorrect answers. 12.
D-0109
J-87-10 1 P.T.O.
COMPUTER SCIENCE & APPLICATIONS
Paper II

Note : This paper contains fifty (50) objective type questions, each question carrying
two (2) marks. Attempt all the questions.

1. x1 is a clone of x means x1 is 3. My Lafter Machin (MLM)


identical to x in terms of the physical recognizes the following strings :
attributes namely, height, weight and (i) a
complexion. Given, height, weight (ii) aba
and complexion only form a (iii) abaabaaba
complete set of attributes for an (iv) abaabaabaabaabaabaabaabaaba
entity, cloning is an equivalence Using this as an information, how
relation. What is your impression would you compare the following
about this statement ? regular expressions ?
x
(A) The statement is true (i) (aba)3
x
(ii)a.(baa)3 1. ba
(B) The statement is false x
ab.(aab).3 1.a
(iii)
(C) The truth value of the (A) (ii) and (iii) are same, (i) is
statement cannot be computed different.
(B) (ii) and (iii) are not same.
(D) None of these (C) (i), (ii) and (iii) are different.
(D) (i), (ii) and (iii) are same.
4. S1 : I teach algorithms and maths.
2. R is a robot of M means R can S2 : My professor teaches maths,
perform some of the tasks that
electronics and computer
otherwise M would do and R is
science.
unable to do anything else. Which of
S3 : I have a student of maths.
the following is the most appropriate
representation to model this S4 : Algorithm is a part of
situation ? computer science.
S5 : Maths students know computer
(A) science.
What would be the chromatic
number of a graph, vertices of which
are the actors/entities that are
involved in the sentences S1 to S5
(B)
and edges-to represent the
associations/relationships amongst
the entities/actors as expressed in the
sentences S1 to S5 above ?
(C)
(A) 2
(B) 3
(C) 4
(D) None of these (D) None of these
Paper-II 2 J-8710
5. Four your ATM debit card, you have 7. Advantage of synchronous
sequential circuits over
a 4-decimal-digit personal secret asynchronous ones is
code. In the absence of any clue, a (A) faster operation
brute-force attack takes time-t to
(B) ease of avoiding problems due
crack the code on an ATM terminal. to hazard
Therefore t is the secure-time for a (C) lower hardware requirement
customer to report in case the card is (D) better noise immunity
misplaced. Your Bank has decided to
facilitate an increased secure-time. 8. What is the transitive voltage for the
Out of the following, which option voltage input of a CMOS operating
should provide the largest rise in the from 10V supply ?
value of t ? (A) 1V (B) 2V

(A) Instead of 4-decimal-digits, (C) 5V (D) 10 V


maintain the personal secret
code in 4-hexadecimal-digits. 9. What is decimal equivalent of BCD
11011.1100 ?
(B) Instead of 4-decimal digits,
(A) 22.0 (B) 22.2
maintain a 5-decimal-digit
(C) 20.2 (D) 21.2
personal secret code.
(C) Reduce the processing speed
10. The function represented by the k-
of the ATM terminals to the map given below is
half of their current speed.
BC
(D) None of the above provides A
any improvement. 1 0 0 1
1 0 0 1
6. The logic expression for the output (A) A B
of the circuit shown in the figure is (B) AB + BC + CA

(C) BC
(D) A B C

11. The statement


(A) AC + BC + CD
print f ( % d, 10 ? 0 ? 5 : 1 : 12);
(B) AC + BC + CD
will print

(C) ABC + CD (A) 10 (B) 0

(D) AB + BC + CD (C) 12 (D) 1

J-8710 3 Paper-II
12. What will be the output of the 15. The data type created by the data
following c-code ? abstraction process is called
void main ( ) (A) class
{ (B) structure
char *P = "ayqm" ; (C) abstract data type
char c; (D) user defined data type
c = ++*p ;
printf ("%c", c); 16. An entity instance is a single
} occurrence of an _______.
(A) a (B) c (A) entity type
(C) b (D) q (B) relationship type
(C) entity and relationship type
13. Member of a class specified as (D) None of these
_______ are accessible only to
method of the class.
17. Generalization is _______ process.
(A) private (B) public
(A) top-down
(C) protected (D) derive (B) bottom up
(C) both (A) & (B)
14. Match the following : (D) None of these
(a) Garbage 1. Java
collection 18. Match the following :
in
I. 2 NF (a) transitive
(b) Nameless 2. generic dependencies
object programming eliminated
(c) Template 3. defines a II. 3 NF (b) multivalued
support class attribute
removed
(d) A forward 4. member
reference function III. 4 NF (c) contain no
partial
(e) Derived 5. within a functional
class statement dependencies
inherits
from base IV. 5 NF (d) contains no
class join
dependency
Codes :
Codes :
(a) (b) (c) (d) (e) I II III IV
(A) 1 5 4 2 3 (A) (a) (c) (b) (d)
(B) 1 5 2 3 4 (B) (d) (a) (b) (c)
(C) 5 1 2 3 4 (C) (c) (d) (a) (b)
(D) 5 4 3 1 2 (D) (d) (b) (a) (c)
Paper-II 4 J-8710
19. Which data management language 24. A chained hash table has an array
component enabled the DBA to size of 100. What is the maximum
define the schema components ? number of entries that can be placed
(A) DML in the table ?
(B) Sub-schema DLL (A) 100
(C) Schema DLL (B) 200
(D) All of these
(C) 10000
20. The PROJECT Command will create (D) There is no upper limit
new table that has
(A) more fields than the original 25. In a B tree of order 5, the following
table keys are inserted as follows :
(B) more rows than original table 7, 8, 1, 4, 13, 20, 2, 6 and 5
(C) both (A) & (B)
How many elements are present in
(D) none of these
the root of the tree ?
21. If we have six stack operations- (A) 1 (B) 2
pushing and popping each of A, B (C) 3 (D) 4
and C-such that push (A) must occur
before push (B) which must occur
before push (C), then A, C, B is a 26. The ______ field is the SNMP PDV
possible order for the pop operations, reports an error in a response
since this could be our sequence : message.
push (A), pop (A), push (B), push (A) error index
(C), pop (C), pop (B). Which one of (B) error status
the following orders could not be the (C) set request
order the pop operations are run, if
(D) agent index
we are to satisfy the requirements
described above ?
(A) ABC (B) CBA 27. What does the URL need to access
(C) BAC (D) CAB documents ?
I. Path name
22. What is the most appropriate data
structure to implement a priority II. Host name
queue ? III. DNS
(A) Heap IV. Retrieval method
(B) Circular array V. Server port number
(C) Linked list
(A) I, II, III (B) I, III, V
(D) Binary tree
(C) I, II, IV (D) III, IV, V
23. In a complete binary tree of n nodes,
how far are the two most distant
nodes ? Assume each edge in the 28. End-to-End connectivity is provided
path counts as ! from Last-to-Last in
(A) About log2n (A) Network layer
(B) About 2 log2n (B) Session layer
(C) About n log2n (C) Transport layer
(D) About 2n (D) Data link layer
J-8710 5 Paper-II
29. What services does the internet layer 34. Which of the following is the most
provide ? general phase structured grammar ?
1. Quality of service (A) Regular
2. Routing (B) Context-sensitive
3. Addressing
(C) Context free
4. Connection oriented delivery
5. Framing bits (D) None of the above
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5 35. Which of the following is used for
grouping of characters into tokens
30. What is the maximum operating rate (in a computer) ?
of a wireless LAN using infrared
(A) A parser
communication ?
(A) 1 mbps (B) 2 mbps (B) Code optimizer
(C) 5 mbps (D) 11mbps (C) Code generator
(D) Scanner
31. In an absolute loading scheme,
which loader function is
accomplished by a loader ? 36. Match the following :
(A) Re-allocation (a) Disk 1. Round-robin
(B) Allocation scheduling
(C) Linking (b) Batch 2. SCAN
(D) Loading processing
32. Which of the following expression is (c) Time 3. LIFO
represented by the parse tree ? sharing
(d) Interrupt 4. FIFO
processing
Codes :
(a) (b) (c) (d)
(A) 3 4 2 1
(B) 4 3 2 1
(C) 2 4 1 3
(A) (A + B) * C (B) A + * BC
(C) A + B * C (D) A * C + B (D) 1 4 3 2

33. Consider the following left 37. ________ synchronizes critical


associative operators in decreasing resources to prevent dead lock.
order of precedence : (A) P-operator (B) V-operator
subtraction (highest precedence)
(C) Semaphore (D) Swapping
* multiplication
$ exponentiation (lowest
precedence) 38. _______ is one of pre-emptive
What is the result of the following scheduling algorithm.
expression ? (A) RR
3 2 * 4 $ | * 2**3 (B) SSN
(A) 61 (B) 64 (C) SSF
(C) 512 (D) 4096 (D) Priority based
Paper-II 6 J-8710
39. In order to allow only one process to 46. The cost of the network is usually
enter its critical section, binary determined by
semaphore are initialized to (A) time complexity
(A) 0 (B) 1
(B) switching complexity
(C) 2 (D) 3
(C) circuit complexity
40. Remote Computing Service involves (D) none of these
the use of time sharing and _______.
(A) multi-processing
47. A leased special high-speed
(B) interactive processing
connection from the local telephone
(C) batch processing
carrier for business users that
(D) real-time processing
transmits at 1.544 mbps is known as
________ carrier.
41. Software engineering primarily aims
on (A) T1 (B) T2
(A) reliable software (C) T3 (D) T4
(B) cost effective software
(C) reliable and cost effective
software 48. CDMA Cell uses ________ carriers
(D) none of the above of 1.25 MHz.
42. Top-down design does not require (A) 9 (B) 18
(A) step-wise refinement (C) 22 (D) 64
(B) loop invariants
(C) flow charting 49. At any given time Parallel Virtual
(D) modularity Machine (PVM) has ________ send
43. Which model is simplest model in buffer and ________ receive buffer.
Software Development ? (A) one-one (B) one-two
(A) Waterfall model (C) two-two (D) two-one
(B) Prototyping
(C) Iterative
(D) None of these 50. Data Mining uses ________,
________ and ________ to build
44. Design phase will usually be effective predictive model.
(A) top-down (i) Data set
(B) bottom-up
(C) random (ii) Information set
(D) centre fringing (iii) Input set
(iv) Process set
45. Applications-software
(A) is used to control the operating (v) Output set
system (vi) Test set
(B) includes programs designed to (A) (i), (ii) and (iv)
help programmers (B) (ii), (iv) and (v)
(C) performs a specific task for
computer users (C) (i), (v) and (vi)
(D) all of the above (D) (ii), (iii) and (v)

J-8710 7 Paper-II
Space For Rough Works

Paper-II 8 J-8710

You might also like