Professional Documents
Culture Documents
www.examrace.com
COMPUTER SCIENCE AND APPLICATIONS
Paper – II
Note : This paper contains fifty (50) objective type questions of two (2) marks each. All
questions are compulsory.
www.examrace.com
10. Testing of software with actual data 15. Data Integrity control uses
and in actual environment is called (A) Upper and lower limits on
(A) Alpha testing numeric data.
(B) Beta testing (B) Passwords to prohibit
unauthorised access to files.
(C) Regression testing (C) Data dictionary to keep the data
(D) None of the above (D) Data dictionary to find last
access of data
11. The student marks should not be
greater than 100. This is 16. What does the following declaration
(A) Integrity constraint mean ?
int (*ptr) [10];
(B) Referential constraint (A) ptr is an array of pointers of 10
(C) Over-defined constraint integers.
(D) Feasible constraint (B) ptr is a pointer to an array of 10
integers.
(C) ptr is an array of 10 integers.
12. GO BOTTOM and SKIP-3
(D) none of the above.
commands are given one after
another in a database file of 30
17. Which of the following has
records. It shifts the control to
compilation error in C ?
(A) 28th record (B) 27th record (A) int n = 32 ;
(C) 3rd record (D) 4th record (B) char ch = 65 ;
(C) float f = (float) 3.2 ;
13. An ER Model includes (D) none of the above
I. An ER diagram portraying
18. Which of the following operators can
entity types.
(A) ∗
not be overloaded in C+ + ?
II. Attributes for each entity type (B) + =
III. Relationships among entity (C) = = (D) : :
types.
IV. Semantic integrity constraints 19. _________ allows to create classes
that reflects the business rules which are derived from other classes,
about data not captured in the so that they automatically include
ER diagram. some of its “parent’s” members, plus
(A) I, II, III & IV (B) I & IV its own members.
(C) I, II & IV (D) I & III (A) Overloading
(B) Inheritance
(C) Polymorphism
14. Based on the cardinality ratio and (D) Encapsulation
participation associated
with a relationship type, choose 20. The correct way to round off a floating
either the Foreign Key Design, the number x to an integer value is
Cross Referencing Design or Mutual (A) y = (int) (x + 0.5)
Referencing Design. (B) y = int (x + 0.5)
(A) Entity (B) Constraints (C) y = (int) x + 0.5
(C) Rules (D) Keys (D) y = (int) ((int)x + 0.5)
D-87-13 3 Paper-II
www.examrace.com
21. What is the value of the postfix 26. Given the following statements :
expression ? S1 : SLR uses follow information to
a b c d + – ∗ (where a = 8, b = 4, guide reductions. In case of LR
c = 2 and d = 5) and LALR parsers, the look-
3 8 aheads are associated with the
(A) – 8 (B) –
3 items and they make use of the
(C) 24 (D) –24 left context available to the parser.
S2 : LR grammar is a larger sub-
22. If the queue is implemented with a class of context free grammar
linked list, keeping track of a front as compared to that SLR and
pointer and a rear pointer, which of LALR grammars.
these pointers will change during an Which of the following is true ?
insertion into a non-empty queue ? (A) S1 is not correct and S2 is not
(A) Neither of the pointers change correct.
(B) Only front pointer changes (B) S1 is not correct and S2 is
(C) Only rear pointer changes correct.
(D) Both of the pointers changes (C) S1 is correct and S2 is not
correct.
23. is often used to prove the (D) S1 is correct and S2 is correct.
correctness of a recursive function.
(A) Diagonalization 27. The context free grammar for the
L = {an bm | n ≤ m + 3, n ≥ 0, m ≥ 0} is
(B) Communitivity language
B → Bb | λ
(D) Matrix Multiplication
(B) S → aaaA|λ, A → aAb | B,
B → Bb | λ
t ≥ 2, every node other than the root
24. For any B-tree of minimum degree
(C) S → aaaA | aa A | λ, A → aAb | B,
B → Bb| λ
must have atleast keys and
(D) S → aaaA | aa A | aA | λ, A →
every node can have at most
aAb | B, B → Bb | λ
keys.
(A) t – 1, 2t + 1
(B) t + 1, 2t + 1
28. Given the following statements :
(C) t – 1, 2t – 1 S1 : If L is a regular language then
the language {uv | u ∈ L, v ∈ LR}
(D) t + 1, 2t – 1
is also regular.
25. Given two sorted list of size ‘m’ and S2 : L = {wwR} is regular language.
‘n’ respectively. The number of
comparison needed in the worst case Which of the following is true ?
by the merge sort algorithm will be (A) S1 is not correct and S2 is not
(A) m × n correct.
(B) S1 is not correct and S2 is correct.
(B) max (m, n)
(C) min (m, n) (C) S1 is correct and S2 is not correct.
(D) m + n – 1 (D) S1 is correct and S2 is correct.
Paper-II 4 D-87-13
www.examrace.com
29. The process of assigning load 33. The sum of products expansion for
addresses to the various parts of the the function
program and adjusting the code and
F(x, y, z) = (x + y)–z is given as
data in the program to reflect the
assigned addresses is called _______. (A) –x yz
– + xy–z + –x y–z
(A) Symbol resolution
(B) xyz + xy–z + xy– –z
(B) Parsing
(C) x y– –z + –x y– –z + xy–z
(C) Assembly
(D) Relocation (D) x y–z + xy– –z + –x y–z
30. Which of the following derivations 34. Let P(m, n) be the statement
does a top-down parser use while “m divides n” where the universe of
parsing an input string ? The input is discourse for both the variables is the
scanned from left to right. set of positive integers. Determine
(A) Leftmost derivation the truth values of each of the
(B) Leftmost derivation traced out following propositions :
in reverse I. ∀m ∀n P(m, n),
(C) Rightmost derivation traced out II. ∃m ∀n P(m, n)
in reverse
(A) Both I and II are true
(D) Rightmost derivation
(B) Both I and II are false
(C) I – false & II – true
31. The dual of a Boolean expression is
obtained by interchanging (D) I – true & II – false
(A) Boolean sums and Boolean
products 35. Big – O estimate for
(B) Boolean sums and Boolean f(x) = (x + 1) log(x2 + 1) + 3x2 is
products or interchanging 0’s given as
and 1’s (A) O(x log x)
(C) Boolean sums and Boolean
(B) O(x2)
products and interchanging 0’s
& 1’s (C) O(x3)
(D) Interchanging 0’s and 1’s (D) O(x2 log x)
32. Given that (292)10 = (1204)x in some 36. How many edges are there in a forest
of t-trees containing a total of n
number system x. The base x of that
vertices ?
number system is
(A) 2 (A) n + t
(B) n–t
n∗t
(B) 8
(C) 10 (C)
(D) None of the above (D) nt
D-87-13 5 Paper-II
www.examrace.com
37. Let f and g be the functions from the 41. Active X controls are Pentium binary
set of integers to the set integers programs that can be embedded in
defined by
f(x) = 2x + 3 and g(x) = 3x + 2 (A) Word pages
Then the composition of f and g and (B) URL pages
g and f is given as (C) Script pages
(A) 6x + 7, 6x + 11 (D) Web pages
(B) 6x + 11, 6x + 7
(C) 5x + 5, 5x + 5 42. Match the following :
(D) None of the above
List – I List – II
a. Wireless i. HTTP
and n ≥ r, then p(n + 1, r) equals to
38. If n and r are non-negative integers
Application
Environment
p(n, r) (n + 1)
(A) b. Wireless ii. IP
(n + 1 – r)
Transaction
p(n, r) (n + 1) Protocol
(B) (n – 1 + r)
c. Wireless iii. Scripts
p(n, r) (n – 1) Datagram
(C) (n + 1 – r) Protocol
p(n, r) (n + 1) d. Wireless iv. UDP
(D) (n + 1 + r) Codes :
a b c d
39. A graph is non-planar if and only if it
(A) ii iv i iii
contains a subgraph homomorphic to
(B) iv iii ii i
(A) K3, 2 or K5 (B) K3, 3 and K6
(C) iv iii i ii
(C) K3, 3 or K5 (D) K2, 3 and K5
(D) iii i iv ii
40. Which of the following statements 43. Which of the following is widely
are true ? used inside the telephone system for
I. A circuit that adds two bits, long-haul data traffic ?
producing a sum bit and a carry (A) ISDN
bit is called half adder. (B) ATM
II. A circuit that adds two bits, (C) Frame Relay
producing a sum bit and a carry
(D) ISTN
bit is called full adder.
III. A circuit that adds two bits and
a carry bit producing a sum bit 44. The document standards for EDI
and a carry bit is called full were first developed by large
adder. business house during the 1970s and
IV. A device that accepts the value are now under the control of the
of a Boolean variable as input following standard organisation :
and produces its complement is (A) ISO
called an inverter. (B) ANSI
(A) I & II (B) II & III (C) ITU-T
(C) I, II, III (D) I, III & IV (D) IEEE
Paper-II 6 D-87-13
www.examrace.com
45. Electronic Data Interchange Software 47. The virtual address generated by a
consists of the following four layers : CPU is 32 bits. The Translation
(A) Business application, Internal Look-aside Buffer (TLB) can hold
format conversion, Network total 64 page table entries and a
translator, EDI envelope 4-way set associative (i.e. with 4-
(B) Business application, Internal cache lines in the set). The page size
format conversion, EDI is 4 KB. The minimum size of TLB
translator, EDI envelope tag is
(C) Application layer, Transport (A) 12 bits
layer, EDI translator, EDI (B) 15 bits
envelope (C) 16 bits
(D) Application layer, Transport
(D) 20 bits
layer, IP layer, EDI envelope
48. Consider a disk queue with request
46. Consider a preemptive priority based
for input/output to block on cylinders
scheduling algorithm based on
dynamically changing priority. 98, 183, 37, 122, 14, 124, 65, 67
Larger priority number implies in that order. Assume that disk head
higher priority. When the process is is initially positioned at cylinder 53
waiting for CPU in the ready queue and moving towards cylinder number
(but not yet started execution), its 0. The total number of head
priority changes at a rate a = 2. When movements using Shortest Seek Time
it starts running, its priority changes First (SSTF) and SCAN algorithms
at a rate b = 1. All the processes are are respectively
assigned priority value 0 when they (A) 236 and 252 cylinders
enter ready queue. Assume that the
(B) 640 and 236 cylinders
following processes want to execute :
Process Arrival Service (C) 235 and 640 cylinders
ID Time Time (D) 235 and 252 cylinders
P1 0 4
P2 1 1 49. How much space will be required to
store the bit map of a 1.3 GB disk
P3 2 2
with 512 bytes block size ?
P4 3 1
(A) 332.8 KB
The time quantum q = 1. When two
processes want to join ready queue (B) 83.6 KB
simultaneously, the process which (C) 266.2 KB
has not executed recently is given (D) 256.6 KB
priority. The finish time of processes
P1, P2, P3 and P4 will respectively
50. Linux operating system uses
be
(A) 4, 5, 7 and 8 (A) Affinity Scheduling
(B) 8, 2, 7 and 5 (B) Fair Preemptive Scheduling
(C) 2, 5, 7 and 8 (C) Hand Shaking
(D) 8, 2, 5 and 7 (D) Highest Penalty Ratio Next
D-87-13 7 Paper-II
www.examrace.com
Space For Rough Work
Paper-II 8 D-87-13
www.examrace.com