OCET 2010

Code No.: 210101
Important : Please consult your Admit Card / Roll No. Slip before filling your Roll Number on the Test Booklet and Answer Sheet.

Roll No.

In Figures

In Words

O.M.R. Answer Sheet Serial No.
Signature of the Candidate :

Subject : M.Sc. (Hons. School)-Computer Science
Time : 90 minutes Number of Questions : 75 Maximum Marks : 75 DO NOT OPEN THE SEAL ON THE BOOKLET UNTIL ASKED TO DO SO INSTRUCTIONS 1. Write your Roll No. on the Question Booklet and also on the OMR Answer Sheet in the space provided and nowhere else. 2. Enter the Subject and Code No. of Question Booklet on the OMR Answer Sheet. Darken the corresponding bubbles with Black Ball Point / Black Gel pen. 3. Do not make any identification mark on the Answer Sheet or Question Booklet. 4. To open the Question Booklet remove the paper seal(s) gently when asked to do so. 5. Please check that this Question Booklet contains 75 questions. In case of any discrepancy, inform the Assistant Superintendent within 10 minutes of the start of test. 6. Each question has four alternative answers (A, B, C, D) of which only one is correct. For each question, darken only one bubble (A or B or C or D), whichever you think is the correct answer, on the Answer Sheet with Black Ball Point / Black Gel pen. 7. If you do not want to answer a question, leave all the bubbles corresponding to that question blank in the Answer Sheet. No marks will be deducted in such cases. 8. Darken the bubbles in the OMR Answer Sheet according to the Serial No. of the questions given in the Question Booklet. 9. Negative marking will be adopted for evaluation i.e., 1/4th of the marks of the question will be deducted for each wrong answer. A wrong answer means incorrect answer or wrong filling of bubble. 10. For calculations, use of simple log tables is permitted. Borrowing of log tables and any other material is not allowed. 11. For rough work only the sheets marked “Rough Work” at the end of the Question Booklet be used. 12. The Answer Sheet is designed for computer evaluation. Therefore, if you do not follow the instructions given on the Answer Sheet, it may make evaluation by the computer difficult. Any resultant loss to the candidate on the above account, i.e., not following the instructions completely, shall be of the candidate only. 13. After the test, hand over the Question Booklet and the Answer Sheet to the Assistant Superintendent on duty. 14. In no case the Answer Sheet, the Question Booklet, or its part or any material copied/noted from this Booklet is to be taken out of the examination hall. Any candidate found doing so, would be expelled from the examination. 15. A candidate who creates disturbance of any kind or changes his/her seat or is found in possession of any paper possibly of any assistance or found giving or receiving assistance or found using any other unfair means during the examination will be expelled from the examination by the Centre Superintendent/ Observer whose decision shall be final. 16. Telecommunication equipment such as pager, cellular phone, wireless, scanner, etc., is not permitted inside the examination hall. Use of calculators is not allowed.

Employee_ID = B. (A) (C) 3. B.Spouse_Name FROM Employee A LEFT OUTER JOIN Spouse B ON A. the other of spouses. Relational operator that yields all values from all rows in a table is known as (A) (C) 7.M.Employee_ID (A) (B) (C) (D) A list of all employee’s names.Employee_Name. 4. School)-Computer Science/210101 1. including the name of their spouse if they have one A list of all employees that have spouses. 8. (Hons. A field or a combination of fields that has a unique value is called : (A) (C) 6. School) Computer Science/210101/DNB-11703 . (Hons. with spouse names included in the list A list of employee’s spouses Two lists : One list of employees. Referential integrity controls relationships between : (A) (C) (D) tables in a database. Database structure data higher query processing efficiency reduced I/O for most queries (D) Sorted data (B) smaller number of tables Which one of the following is a direct benefit of databse normalization ? (D) reduced data redundancy What is the result of the following SQL statement ? SELECT A. What will be suitable criteria that should be entered for a query to search for Employee Names beginning with M ? (A) (C) Start with M Like ‘M?’ (B) 1 Like M [Turn over (D) Like ‘M*’ M.Sc. The ability to modify the conceptual schema without causing any change to the application program is known as : (A) (C) Physical data independence External data independence Secondary key Primary key difference select attributes in a table instances of a class (B) Logical data independence (D) Static data (B) Foreign key (D) Alternate key (B) product (D) project (B) operations of an object 5.Sc. Which one of the following is provided by a data dictionary ? (A) User data (B) Functional data (C) 2.

0.0. (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) Message. The most frequently used UTP connector is _______ . circuit NINE (9) FORTY (40) category 5 connector RJ45 255.0 15. packet (B) TEN (10) 13.255. (D) 255. What rows will this select statement return ? SELECT * FROM products WHERE ordernumber > = 1000 (A) (B) (C) (D) (A) (C) (A) (C) All rows in the products table whose order number is greater than or equal to 1000 All rows in the products table whose order number is less than or equal to 1000 The first 1000 rows of the product table All rows in the products table whose order number is greater than 1000 Simplex full-duplex TCP/IP UNIX (B) half-duplex (D) automatic (B) NCP 10. School) Computer Science/210101/DNB-11703 . ______ is the protocol suite for the Internet which we use presently : (D) ACM 12. (Hons.255 (B) ARPANET 16.0 Intranet ARPA Bits per second Bytes Memory capacity Secondary storage capacity (B) Circuit. (D) FORTY-FIVE (45) (B) EIA 232 14.255. Cache memory enhances (D) Secondary storage access time M.255. Clock speed is measured in (D) Hertz (B) Memory access time 2 18. The Internet began as an experimental network called (D) DoDNET (B) Baud 17. The natural mask for class C IP address is _______ . (D) JR45 (B) 255. 11.9. A television broadcast is an example of ______transmission.0 255. Forty-five physical channels link________devices arranged in a mesh topology.255.255. message (D) Circuit. circuit Packet.0.Sc. _______ switching is well suited for voice communication while______ switching is better suited for data and other non-voice communication.

Three players A. alpha = 10. System. var 2 = 7. 23. C are in a race.Sc. What is the probable cause of the error described above ? (A) (B) (C) (D) The file ‘myuse’ contains syntax errors The file ‘myuse’ cannot be located because the user has not set his PATH properly The user does not have permission to read his directory The file mode for the owner of ‘myuse’ is not executable. switch (num) { case 3 : alpha++. break. A user complains that he has created a shell script ‘myuse’ that will report his usage of disk space by a directory in UNIX. (A) (C) Result = 35 Result = 3 int num. num = 4. In following Java code snippet. what will be the output of following : (B) Result = 57 (D) Error 22. School) Computer Science/210101/DNB-11703 . A is twice as likely to win as B and B is twice as likely to win as C.out. but when he executes the script he only receives the message : myuse : cannot execute. case 8 : alpha = alpha + 4. case 4 : case 6 : alpha = alpha + 3. } System. 20.println(“Result=” + var l * var 3). (Hons. Then the probability that B wins = (A) (C) 1/2 1/3 int var 1 = 5. default : alpha = alpha + 5. Consider the following segment of a Java program. break. What will the output be when the above segment is executed as a program ? (A) (C) (A) (C) 15 17 Frame buffer ROM (B) 16 (D) 18 (B) RAM 3 [Turn over (B) 2/3 (D) 2/7 21.out. The region of memory sufficiently large to hold all pixels of the display is called a (D) Cache Memory M.println (alpha).19. B.

is displayed as the output with H1 font. Consider the following two relations : A (Students) B St_Id Name Address St_Id Name Address 1000000004 Ratan Mumbai 1000000001 Mahesh Gangtok 1000000001 Mahesh Gangtok 1000000002 Samir Indore 1000000008 Babita Delhi 1000000004 Ratan Mumbai 1000000002 Samir Indore 1000000008 Babita Delhi Applying a certain SQL statement to relation A gives relation B. (C) </HTML> . When you are creating a structure in C/C++.Sc. Which of the following statements is correct regarding Bitmap images ? (A) They are based on lines and curves (B) They are best for real-world images like Photography and Painted pictures (C) They have a small data size (D) One does not need to compress the file for transferring. 26. School) Computer Science/210101/DNB-11703 4 . 27. you need to use the keyword (A) structure (B) object (C) struct (D) record M. (B) Hello BIT </HTML> . (D) <H1> Hellow BIT <HI> is displayed as the output. is displayed as the output with default font. Consider the code snippet given below : <HTML> <BODY> & lt H1 & gt Hello BIT & lt H1 & gt </BODY> </HTML> Which of the following is correct in relation to the above code snippet ? (A) Hello BIT is displayed as the output with H1 font. (B) SELECT * FROM Students ORDER BY Name.24. (D) SELECT * FROM Students ORDER BY Name DESC. Which of the following statements could this SQL statement be ? (A) SELECT * FROM Students ORDER BY St_Id. ………… is a process model used to show the flow of data through a system and the work or processing performed by the system : (A) Document Flow Diagram (B) Data Flow Diagram (C) Entity Relationship Diagram (D) Use Case Diagram. 25. 28. (C) SELECT * FROM Students ORDER BY St_Id DESC. (Hons.

this is always allowed. The design of classes in a way that hides the details of implementation from the user is known as : (A) (C) (A) (B) (C) (D) Encapsulation Data Abstraction No. ptr+5).} (A) (C) 0123456789 10101010101 (B) 0 2 4 6 8 10 12 14 16 18 (D) 10 10 10 10 10 31. printf (“ptr=%s/n”.Sc. but only if the main program does not declare both kinds Yes. if a catch statement is written to catch exception objects of a base class type. School) Computer Science/210101/DNB-11703 (B) ptr = fghijklmnop ptr = abcdefghijklmnop (D) ptr = efghijklmnop ptr = efghijklmnop 5 [Turn over . (A) (C) ptr = fghijklmnop ptr = fghijklmnop ptr = efghijklmnop ptr = abcdefghijklmnop M. What is the output of the following code in C ? for (int i = 0. What is printed when the following sample code of C is executed ? char *ptr. printf (“ptr = %s”. (B) Information Hiding (D) Reusability 33. Which arithmetic operator can replace the blank to make the statement correct ? (A) (C) – % (B) / (D) * 30. it can also catch all ______ derived from that base class. In C++. (A) (C) Exceptions for objects Arguments (B) Objects of classes (D) Errors 32. i++) {cout << i% 2 << '' ".29. Yes. i < 10. (Hons. Can two classes contain member functions with the same name ? 34. ptr). but only if the two classes have the same name Yes. char my String = “abcdefghijklmnop”. 54__7 = 5. ptr = myString.

01 is : 0100. (A) (C) (A) (C) (A) (C) (A) (B) (C) (D) (A) (C) (A) (C) (A) (B) (C) (D) 0 2 None stdio. The processing speed of different computers is compared using : (D) CPS 38.Sc. Who is associated with the development of ‘C’ language ? 39. School) Computer Science/210101/DNB-11703 . -.11 40. How many times will the “while” body be executed in the sampe code above ? int ch = 10. ++ ci.10 1011.ch . What standard include file is needed to use the exit ( ) function ? (D) std. (Hons.01 41. x–y x+y (B) 1 (D) 3 (B) Stdlib. Two’s complement of 1011. while (ch > ci) { cout << ch << endl .35. Boolean expression for NAND gate with two inputs x and y can be written as : (B) x+y (D) xy + xy (B) 0100. A friend function can be used to : M. int ci = 15.h (B) GHz 37.h 36.10 avoid arguments between classes allow access to classes whose source code is unavailable allow one class to access an unrelated class increases the versatility of an overload operator 6 (D) 0100.h RPM MIPS Niklaus Wirth Donald Knuth Dennis M Ritchie Charles Babbage.

ls.42.A' = 0 (B) counter (D) encoder (B) B 47. Which is correct : (D) A'. which layer is not present ? (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) physical layer transport layer 16 17 NOR AND 10000 00100 A. (Hons. In UNIX. The basic storage element in a digital system is 48. In TCP. 7 [Turn over M. (D) 8 (B) XOR 44. are stored in (D) /unix directory 51. In UNIX. The digit F in Hexadecimal system is equivalent to ________ in decimal system.A=0 A+A=A' flip flop multiplexer A 1 sort st /dev directory /tmp directory (B) data link layer (D) session layer (B) 15 43. which command is used to change the protection mode of files starting with the string emp and ending with 1. cat etc. 2 or 3 ? (A) (C) (A) (C) Chmod u+x emp[1-3] Chmod u+r ??? emp Local variables External variables (B) Chmod 777 emp* (D) Chmod 222 emp ? (B) Internal variables 52. The output of a______gate is only 1 when all of its inputs are 1 : (D) NOT (B) 01000 45. which command is used to sort the lines of data in a file in reverse order (D) sort –r (B) /bin directory 50. The commonly used UNIX commands like date. The variables which can be accessed by all modules in a C program. School) Computer Science/210101/DNB-11703 . AB + AB’ = (D) 0 (B) sh 49. 110012—100012 = (D) 00001 (B) A+1=A 46. are known as (D) Global variables.Sc.

What is the time taken to insert an element after an element pointed by some pointer ? (A) (C) (A) (C) (A) (C) O(1) O(n) Length of the list Maximum value in the list Insertion sort Quick sort (B) O(log2n) (D) O(n log2n) (B) Order of the list (D) Mean of the data value (B) Heap sort (D) Bubble sort 55. A sort which compares adjacent elements in a list and switches where necessary is a 57. laptop etc. (Hons. A system program that sets up an executable program in main memory ready for execution is (A) Assember (B) Linker (C) Loader (D) Compiler 59. Trojan-Horse programs (A) Are legitimate programs that allow unauthorized access (B) Do not usually work (C) (D) (A) (B) (C) (D) (A) (C) (A) (C) Are hidden programs that do not show up on the system Usually are immediately discovered.Sc. School) Computer Science/210101/DNB-11703 . Is an error in a specific page Occurs when a program accesses a page of memory Is an access to a page not currently in memory Is a reference to a page belonging to another program Word processing MS-DOS Backup Improve download speed (B) Spreadsheet 60. on sleep mode ? (D) Improve display quality M. Which data structure is needed to convert infix notations to postfix notations ? (A) (C) Branch Tree (B) Queue (D) Stack 54. What is the purpose of keeping electronic devices such as computer.53. An incremental backup (A) Should be done each month (B) Uses more tapes (C) Saves all files (D) Saves only files that have recently changed 58. A page fault 61. Which of the following software cannot be categorized as application software : (D) Database management system (B) Reduce Power Consumption 8 62. A characteristic of the data that binary search uses but the linear search ignores is the 56. Consider a linked list of n elements.

attached to the CPU.abc.abc. Inside which HTML element do we put the JavaScript ? (D) <scripting> (B) Math. To what memory does this refer ? (D) Cache memory (B) <br> (D) <line> (B) <a href="url" new> 67.com">abc</a> <a name="http://www. y) Record File (B) Random access memory (RAM) (B) Buffer (D) Core (B) Word wrap 64. Visual Basic uses an object called________to hold your table.abc. y) 70. y) Math. (D) Table M. A temporary storage area. How can you open a link in a new browser window ? (D) <a winhref="url"> (B) <javascript> 69.max (x. My Pentium 4 computer has 128 MB memory.ceil (x.com">abc</a> <a>http://www. y) (B) RecordSet 71.com">abc</a> <a href="http://www. Which Javascript function do you use to find the number with the highest value of x and y ? (D) top (x.abc. The ability of a word processing system that fits whole words on any line (D) Reformatting 65. What is the correct HTML tag for inserting a line break ? 68. School) Computer Science/210101/DNB-11703 9 [Turn over .com</a> Read only memory (ROM) External memory <lb> <break> <a href="url" target="_blank"> <a href="url" target="new"> <js> <script> ceil (x. (Hons. for I/O operations is a (A) (C) (A) (C) (A) (B) (C) (D) (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) (A) (C) Channel Register Micro spacing Clip art <a url="http://www.Sc. What is the correct HTML for creating a hyperlink ? 66.63.

What is the correct CSS syntax for making all the <p>elements bold ? M. In MS-Excel. (Hons.Sc. what displays the contents of the active cell ? 74. School) Computer Science/210101/DNB-11703 10 . Which one of the following is NOT a valid view ? (D) Web Server View 75. revealed row by row Namebox Formulabar Design View Navigation View p{font-weight:bold} <p style="font-size:bold"> p {text-size:bold} <p style="text-size:bold"> (B) clip art . Which of the following animations cannot be done in PowerPoint ? (A) (C) (A) (C) (A) (C) (A) (B) (C) (D) bullet list.Fly in from the bottom (D) chart.72. revealed by series (B) RowHeadings (D) Taskpane (B) Folders View 73. Several views are available in MS FrontPage. revealed one bullet point at a time table.

(Hons.ROUGH WORK M. School) Computer Science/210101/DNB-11703 11 [Turn over .Sc.

Sc. (Hons.ROUGH WORK M. School) Computer Science/210101/DNB-11703 12 160 .

All candidates will be given credit for this question Page 1 . Chandigarh OCET-2010 FINAL ANSWERS / KEY Subject: MSc(HS)(Computer Science) 1 C 11 A 21 X 31 A 41 C 51 A 61 C 71 B 2 D 12 D 22 C 32 A 42 D 52 D 62 B 72 C 3 A 13 B 23 A 33 D 43 B 53 D 63 B 73 C 4 B 14 C 24 B 34 B 44 C 54 A 64 B 74 D 5 C 15 A 25 B 35 A 45 B 55 B 65 C 75 A 6 X 16 B 26 A 36 B 46 B 56 D 66 B 7 D 17 D 27 X 37 C 47 A 57 D 67 B 8 X 18 B 28 C 38 C 48 A 58 C 68 A 9 A 19 D 29 C 39 C 49 D 59 A 69 C 10 A 20 D 30 X 40 B 50 B 60 C 70 C Note: An 'X' in the key indicates that either the question is ambiguous or it has printing mistake.Panjab University.

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.