Professional Documents
Culture Documents
: ______________________
OMR Sheet No. : ________________________________
Test Subject : COMPUTER SCIENCE
AND APPLICATIONS Hall Ticket No.
Test Subject Code : A-04-03 (Figures as per admission card)
IIIá 2 A-04-03
*A0403*
COMPUTER SCIENCE AND APPLICATIONS
Paper – III
IIIá 3 A-04-03
*A0403*
7. The concatenation of two lists is to be 9. Search algorithms are Judged on the basis
of
performed in 0(1) time. Which of the
I. Completeness
following implementation of a list should II. Optimality
be used ? III. Time complexity
IV. Space complexity
(A) Singly linked list
(A) I and II
(B) I, II and III
(B) Doubly linked list
(C) II, III and IV
(C) Circularly doubly linked list (D) All of the above
(D) Array implementation of list 10. Choose the answer from the following
register(s) that store the address of a
memory location.
8. Match the following : I. Program counter
II. Accumulator
I. Non vectored interrupt 1. ISR
III. MAR
IIIá 4 A-04-03
*A0403*
12. The number of vectored interrupts in 16. An Abstract Data Type (ADT) is
8085 is
(A) same as an abstract class
(A) 4
(B) a data type that cannot be instantiated
(B) 5
(C) a data type for which only the
(C) 6
operations defined on it can be used
(D) 3
(D) all of the above
13. The Java compiler translates source code
17. In a paged memory the page hit ratio is
into
0.35. The time required to access a page
(A) Machine Code
in secondary memory is equal to 100 nsec.
(B) Assembly Code
The time required to access a page in
(C) Byte Code
primary memory is 10 nsec. The average
(D) All of the above time required to access a page is
IIIá 5 A-04-03
*A0403*
19. A process executes the code 21. The overlay tree for a program is given
below. What will be the size of the physical
fork ( ) ; memory partition required to load and run
the program ?
fork ( ) ;
fork ( ) ;
fork ( ) ;
8KB
The total number of child processes
(A) 8 KB (B) 20 KB
created is
(C) 12 KB (D) 14 KB
(A) 4
22. The complexity of inter connection among
(B) 15 modules is described by
(D) Coupling
20. If A = { 0, 1 }, then the number of possible
23. A 1000 K byte memory is managed using
strings of length ‘n’ is
variable partitions but to compaction. It
currently has two partitions of sizes 200 K
(A) n !
bytes and 340 K bytes respectively. The
IIIá 6 A-04-03
*A0403*
24. The grammar guaranteed by production 27. The algorithm used for searching AND-OR
rules graph is
S → a SBc , CB → BC , aB → aa is (A) A*
26. Given the basic ER and relational models, 29. The Natural Language sentence will be
represented in NLP with
which of the following is INCORRECT ?
I. ATN
(A) An attribute of an entity can have more
than one value II. RTN
IIIá 7 A-04-03
*A0403*
30. The file organization in which the physical 32. Which of the sorting algorithm is the
location of a record is determined by a slowest ?
Mathematical function that maps the key
(A) Bubble sort
to address of the record is
(B) Quick sort
(A) Hashed file organization
(C) Shell sort
(B) B Tree file organization
(D) Heap sort
(C) B′ Tree file organization
33. The approach used in top-down analysis
(D) Sequential file organization
and design is
31. Consider the following statements about (A) to identify the top level functions by
the cyclomatic complexity of the control combining many smaller components
flow graph of a program module. Which of into a single entity
these are TRUE ? (B) to identify a top level function and then
i. The cyclomatic complexity of a module create a hierarchy of lower level
is equal to the maximum number of modules and components
linearly independent circuits in the (C) to prepare flowcharts after
graph. programming has been completed
ii. The cyclomatic complexity of a module (D) all of the above
is the number of decisions on the
module plus one. Where a decision is 34. Match the following :
IIIá 8 A-04-03
*A0403*
35. Slow start is a technique used by the TCP 38. What is difference between a Java applet
to reduce and a Java application ?
(A) Number of buffers
(A) An application can in general be
(B) Number of timers
trusted whereas an applet can’t
(C) Number of TCP connections
(B) An applet must be executed in a
(D) Number of timeouts of segments
browser environment
36. A B-Tree used as an index for a large
database table has four levels including (C) An applet is not able to access the
root node. If a new key is inserted in this files of the computer it runs on
(A) 5 string
(B) 4
Which one of the following are true ? (A) Alpha and Beta Testing
(A) P1 is tautology, but not P2
(B) Top down and Bottom up testing
(B) P2 is tautology, but not P1
(D) Both P1 and P2 are not tautologies (D) All the above
IIIá 9 A-04-03
*A0403*
41. Choose the correct answer, the protocols 44. In UNIX, when the read system call
which returns IP address.
encounters EOF, it returns
I. ARP
II. RARP (A) Some positive integer
III. HTTP
IV. DNS (B) Positive integer related to error code
IIIá 10 A-04-03
*A0403*
47. _______________ is black box testing 51. Neural Networks are models of
method.
(A) Decision making system
(A) Boundary value analysis
(B) Data processing system
(B) Basic path analysis
(C) Control systems
(C) Code validation analysis
(D) Biological nervous systems
(D) All of the above
Question No.’s 52 and 53
48. If the hamming distance is ‘m’ then the
Disk requests come to a disk drive for
number of errors that can be corrected is
cylinders 10, 22, 20, 2, 40, 6 and 36 in
(A) Equal to ‘m’
that order at a time when the disk drive is
(B) Less than m/2 reading from cylinder 20. The seek time is
IIIá 11 A-04-03
*A0403*
Question No.’s 54, 55 and 56 58. Inference Engine consists of
I. Facts
The next three questions are based on
Huffman’s coding for the symbol A with II. User Interface
55. The minimum number of bits required to 59. With regarding to exceptions following is
represent all the symbols together is TRUE
IIIá 12 A-04-03
*A0403*
61. The following system calls are related to 63. Search engine is a ____________ agent.
file operations in UNIX (A) Learning
I. Signal (B) Negotiation
II. Kill (C) Intelligent
III. Seek (D) Business
IV. Unlink
64. The commonly used UNIX commands like
(A) I and III correct
date, ls, cut etc. are stored in
(B) III and IV correct
(A) / dev directory
(C) II and III correct
(B) / sys directory
D) II and IV correct
(C) / unix directory
62. HTML (Hyper Text Markup Language) has (D) / bin and /usr/bin directory
language elements which permit certain
65. ADO stands for
actions other than describing the structure
of the web document. Which one of the (A) Active × Data Object
IIIá 13 A-04-03
*A0403*
67. Fuzzy Logic is proposed by 70. Class C is inherited from Class A and
Class B, Class D is inherited from Class C
(A) MAMDHANI
Which of the following is true ?
(B) ZADEH I. Class C inherits Class A attributes
IIIá 14 A-04-03
*A0403*
73. Given an arbitrary Non-deterministic Finite 75. Which of the following statements are
TRUE about an SQL query ?
Automation (NFA) with N states, the
maximum number of states in an P : An SQL query can contain a HAVING
equivalent minimized DFA is atleast clause even if it doesnot have a
2
(A) N GROUP by clause.
(B) 2N Q : An SQL query can contain a HAVING
clause only if it has GROUP by
(C) 2N
clause.
(D) N!
R : All attributes used in the GROUP by
74. The maximum packet size of IPV4 is clause must appear in the SELECT
clause.
(A) 1500 bytes
S : Not all attributes used in the GROUP
(B) 2 MB
by clause need to appear in the
(C) 65535 bytes SELECT clause.
(D) 48 bytes (A) P and R (B) P and S
___________________
IIIá 15 A-04-03
*A0403*
Space for Rough Work
IIIá 16 A-04-03