Sunteți pe pagina 1din 18

0915544663101215

AWES PGT Computer Science Informatics Part B

PGT Computer Science Informatics


1.

What will be the result of following two expressions if i=10 initially?


(i) ++i<=10
(ii) i++<=10
a. (i) True
(ii) True
b. (i) False
(ii) False
c.

(i) True
(ii) False

d. (i) False
(ii) True

2.

Give the Output of the following code fragment:int ch=20;


System.out.println(++ch);
System.out.println(ch);
a. 21
21
b. 20
20
c.

20
21

d. 21
20

3.

Consider the following code snippet:int i=10;


int n = i++%5;
What are the values of i & n after the code is executed?
a.
b.
c.
d.

10 & 0
11 & 0
11 & 2
Can't be calculated

Page 1

0915544663101215
AWES PGT Computer Science Informatics Part B

4.

Give the output of the following code:-

System.out.println("m is" +m);


a.
b.
c.
d.

5.

m is 100
m is 10
No output
None of the above

Which event gets fired when:(i) user presses enter in a text field
(ii) a check box is clicked
a.
b.
c.
d.

6.

Action event & Item event


Adjustment event & Action event
Change event & Item event
Item Event & Item Event

Name the class used to create the following:(i) a list control


(ii) a combo box control
a.
b.
c.
d.

7.

JComboBox & Timer


Timer & JComboBox
JList & JComboBox
None of the above

How many times the following code prints the string "APS"?
for( i=1; i<=1000;i++); cout<< "APS";
a.
b.
c.
d.

Zero
1
1000
Syntax error

Page 2

0915544663101215
AWES PGT Computer Science Informatics Part B

8.

Which allows you to create a derived class that inherits properties from more than one base class?
a.
b.
c.
d.

9.

Hybrid Inheritance
Hierarchical Inheritance
Multilevel inheritance
Multiple inheritance

Null character needs a space of :a.


b.
c.
d.

One byte
Zero bytes
Three bytes
Four bytes

10. The arguments that determine the state of the cout object are called:a.
b.
c.
d.

State controllers
Format flags or state flags
Classes
Manipulators

11. The statement int num[2][3]={ {1,2}, {3,4}, {5, 6} };


a.
b.
c.
d.

Assigns a value 3 to num[1][2]


Assigns a value 2 to num[1][2]
Assigns a value 4 to num[1][2]
Gives an error message

12. ____________ is the key to ____________.


a.
b.
c.
d.

Persistence, serialization
Inheritance, object
Serialization, persistence
Persistence, inheritance

13. The JDBC-ODBC bridge allows ____________ to be used as __________.


a.
b.
c.
d.

JDBC drivers, ODBC drivers


Application, drivers
Drivers, Application
ODBC drivers, JDBC drivers

Page 3

0915544663101215
AWES PGT Computer Science Informatics Part B

14. A semiconductor memory constructed using bipolar transistors or MOS transistor stores information
in the form of a:a.
b.
c.
d.

Opcodes values
Byte
Bit
Flip-flop voltage levels

15. The concept of multiple inheritance is implemented in Java by:a.


b.
c.
d.

a) Extending two or more classes


b) Implementing two or more interfaces
c) Extending one class and implementing one or more interfaces
d) Both (b) and (c)

16. Twisted pair have maximum segment:a.


b.
c.
d.

2000m
100m
200m
500m

17. ______________ software makes use of non numerical algorithms to solve complex problems that
are not amenable to computation or straightforward analysis.
a.
b.
c.
d.

Web-based
Real time
Artificial Intelligence
Embedded

18. The ___________ model stipulates that the requirements be completely specified before the rest of
the development can processed.
a.
b.
c.
d.

Rapid Application Development (RAD)


Incremental Development
Iterative Development
Waterfall

19. _____________ model couples the iterative nature of the prototyping with the controlled and
systematic aspects of the linear sequential model.
a.
b.
c.
d.

Iterative Development
Rapid Application Development (RAD)
Incremental Development
Spiral

Page 4

0915544663101215
AWES PGT Computer Science Informatics Part B

20. ____________ strategy assumes that residual faults remain in the system and can continue in
operation after some system failures have occurred.
a.
b.
c.
d.

Fault detection
Fault avoidance
Fault tolerance
None of the above

21. _____________ is a classification scheme, which shows how an object class is related to other
classes through common attributes and services.
a.
b.
c.
d.

Inheritances
Taxonomy
Hierarchy
None of the above

22. Decryption and encryption of data are responsibility of:a.


b.
c.
d.

Data link layer


Physical layer
Presentation layer
Session layer

23. A bridge has access to which address of a station on the same network?
a.
b.
c.
d.

Network
Physical
Service Access point
All of the above

24. Which of the following is not a primary object of ASP Object Model?
a.
b.
c.
d.

The Response object


The code object
The Server object
The Request object

25. Satellite Switched Time-Division Multiple Access (SS/TDMA) is:a.


b.
c.
d.

The method of determining which device has access to transmission medium at any time
A form of TDMA in which circuit switching is used to dynamically change channel assignments
Is a medium access control technique for TDMA
All of the above

Page 5

0915544663101215
AWES PGT Computer Science Informatics Part B

26. Repeaters function in:a.


b.
c.
d.

a) Physical layer
b) Data link layer
c) Network layer
d) Both (a) and (b) above

27. How many hosts can be attached to each of the local area network?
a.
b.
c.
d.

254
128
168
192

28. DTD's are:a.


b.
c.
d.

Not associated with the document element


Are associated to scheme
Associated with the document element
None of the above

29. MSXML is:a.


b.
c.
d.

Used for interacting with XML


A Microsoft language
XML parser that ships with IE5.0
None of the above

30. www is based on which model?


a.
b.
c.
d.

Client-server
3-tier
Peer to peer
Local-server

31. Which of the following is TRUE only of XML but not HTML?
a.
b.
c.
d.

It allows user defined tags


It is derived from SGML
It describes content and layout
It is restricted only to be used with web browsers

Page 6

0915544663101215
AWES PGT Computer Science Informatics Part B

32. The statement f1.write ((char*) &obj1, sizeof (obj1));


a.
b.
c.
d.

Writes the address of obj1 to f1


Writes the data in obj1 to f1
Writes a member functions of obj1 to f1
Writes the member functions and data of obj1 to f1

33. The Operation which is commutative but not associative:a.


b.
c.
d.

OR
AND
EX-OR
NAND

34. If x={a,b,c,d}, then number of binary operations that can be defined on x is:a.
b.
c.
d.

16

4
2
4
16
2
4
2

35. The simplified form of the Boolean expression (X+Y+XY)(X+Z) is:a.


b.
c.
d.

XY+YZ
X+YZ
XZ+Y
X+Y+Z

36. A toggle operation cannot be performed using a single:a.


b.
c.
d.

XOR gate
NAND gate
AND gate
NOR gate

37. A combinational logic circuit which generates a particular binary word or number is:a.
b.
c.
d.

Encode
Demultiplexer
Decoder
Multiplexer

Page 7

0915544663101215
AWES PGT Computer Science Informatics Part B

38. The refreshing rate of dynamic RAMs is approximately once in:a.


b.
c.
d.

Two seconds
Two micro seconds
Fifty nano seconds
Two milli seconds

39. Which of the following memories allows simultaneous read and write operations?
a.
b.
c.
d.

RAM
EPROM
ROM
None of the above

40. What technology is used for flat panel displays?


a.
b.
c.
d.

Direct view storage tube


Solid state
RGB monitor
VLSI

41. Which of the following keyboard is fastest?


a.
b.
c.
d.

QWERTY
Numeric
Dvorak
Alphanumeric

42. Plotter accuracy is measured in terms of repeatability and:a.


b.
c.
d.

Intelligence
Resolution
Buffer size
Vertical dimension

43. What is a spider?


a.
b.
c.
d.

A program that catalogs Web Sites


A computer virus
A hacker
A spying software

Page 8

0915544663101215
AWES PGT Computer Science Informatics Part B

44. Relationship produced from E-R model will always be in:a.


b.
c.
d.

2NF
B CNF
1 NF
3NF

45. In relational Schema, each tuple is divided into fields called:a.


b.
c.
d.

Records
Relations
Domains
Queries

46. Manager's salary details are hidden from the employee. This is called:a.
b.
c.
d.

Physical constraint
External constraint
Conceptual constraint
None of the above

47. An access path is provided by:a.


b.
c.
d.

File key
Physical record key
Both of the above
None of the above

48. Index consists of:a.


b.
c.
d.

A list of keys
Pointers to master list
Both of the above
None of the above

49. Which of the command closes text file which have been created using
"SET ALTERNATIVE" <FILENAME> "Command" ?
a.
b.
c.
d.

CLOSE ALTERNATIVE
SET ALTERNATIVE OFF
CLEAR ALL
CLOSE DATABASE

Page 9

0915544663101215
AWES PGT Computer Science Informatics Part B

50. Which command is fastest among the following?


a.
b.
c.
d.

COPY STRUCTURE TO <new file>


COPY FILE <FILE 1><FILE 2>
COPY TO M FILE-DAT DELIMITED
COPY TO <NEW File>

51. A clustering index is defined on fields which are of type:a.


b.
c.
d.

Non-key and non-ordering


Non-key and ordering
Key and non-ordering
Key and ordering

52. Which of following statements are TRUE about an SQL query?


P: An SQL query can contain a HAVING clause even if it does not have a GROUP BY clause.
Q: An SQL query can contain a HAVING clause only if it has a GROUP BY clause.
R: All the attributes used in the GROUP BY clause must appear in the SELECT clause.
S: Not all the attributes used in the GROUP BY clause need to appear in the SELECT clause.
a.
b.
c.
d.

P and S
Q and R
Q and S
P and R

53. Consider the following ER diagram:-

The minimum number of tables needed to represent M, N, P, R1 and R2 is:a.


b.
c.
d.

4
5
3
2

Page 10

0915544663101215
AWES PGT Computer Science Informatics Part B

54. The output of following code is:-

a.
b.
c.
d.

4
7
8
None of the above

55. Which one of the given answers is correct?

a.
b.
c.
d.

1 = 4, n = 6
1 = 2, n = 6
1 = 3, n = 8
None of the above

56. Which of the following formulas can be used to generate random integers between 1 and 10?
a.
b.
c.
d.

10 + rand() % (10 + 1)
1 + (10 - 1 + 1) % rand()
1 + rand() % (10 - 1 + 1)
rand()%10+1-1

57. How many times is the following loop executed?

a.
b.
c.
d.

0
5
Infinite
Error

58. Name the function in which there exists a statement that calls the function itself.
a. Virtual function
b. Recursive function
c. Friend function

Page 11

0915544663101215
AWES PGT Computer Science Informatics Part B

d. Static function

59. _______________ package is used by compiler itself. So it does not need to be imported for use.
a.
b.
c.
d.

java.math
java.lang
java.applet
java.awt

60. The class at the top of exception class hierarchy is _____________.


a.
b.
c.
d.

ArithmeticException
Throwable
Class
Exception

61. State whether true or false.


i) init( ) of servlet is called after a client request comes in
ii) Servlets are ultimately converted into JSP
a.
b.
c.
d.

i-false, ii-false
i-true, ii-true
i-false, ii-true
i-true, ii-false

62. In JDBC ____________ imports all Java classes concerned with database connectivity.
a.
b.
c.
d.

java.mysql.*
javax.sql.*
java.sql.*
com.*

63. Ingres is a ___________.


a.
b.
c.
d.

Socket
Web server
Compiler
Database

64. If a variable is declared final, it must include _____________ value.


a. Integer
b. No

Page 12

0915544663101215
AWES PGT Computer Science Informatics Part B

c. Initial
d. Float

65. The IDL compiler generates _______ and _____________


a.
b.
c.
d.

Stubs, skeleton
Client, stubs
Stubs, client
Runnable code, stubs

66. Filters were officially introduced in the servlet ____________ specification.


a.
b.
c.
d.

2.4
2.3
2.2
2.1

67. The default value of Frame attribute of table tag is:a.


b.
c.
d.

HSIDES
BELOW
ABOVE
VOID

68. Which method will a web browser call on a new applet?


a.
b.
c.
d.

Destroy method
Execute method
Init method
Main method

69. A compiler for high level language that runs on one machine and produces code for a another
machine is called as:a.
b.
c.
d.

Cross compiler
Optimizing compiler
One pass compiler
Multipass compiler

70. To avoid the race condition, the number of processes that may be simultaneously inside their critical
section is:a. 0
b. 2

Page 13

0915544663101215
AWES PGT Computer Science Informatics Part B

c. 4
d. 1

71. Which of the following is better known as 'mid range servers'?


a.
b.
c.
d.

Mini Computers
Micro Computers
Embedded Computers
Main Frame Computers

72. A Microprocessor with 12 address lines is capable of addressing:a.


b.
c.
d.

2048 locations
64K locations
4096 locations
1024 locations

73. The term _________ is used to describe a secret or undocumented means of getting into a
computer system.
a.
b.
c.
d.

Spyware
Trapdoor
Backdoor
Trojan

74. Viruses that change their characteristics as they infect are called ___________.
a.
b.
c.
d.

Polymorphic
Stealth
Camouflage
Armored

75. Two or more copies of the same data that mismatch are known as:a.
b.
c.
d.

Data reputancy
Data redundancy
Data inconsistency
Data conspiracy

76. Which of the following is not open source software?


a. Open Office
b. Internet Explorer
c. Fedora Linux

Page 14

0915544663101215
AWES PGT Computer Science Informatics Part B

d. Apache HTTP Server

77. Lily tells her friends, Ka Kee (KaKee@hkeaa.edu.hk), Po Yan (PoYan@hkeaa.edu.hk) and Mo Yi
(MoYi@hkeaa.edu.hk), the date of her birthday party through an email as shown below. Which of the
following statement cannot be derived from this email?

a.
b.
c.
d.

Mo Yi does not know that Ka Kee and Po Yan received the email
Ka Kee knows that Po Yan received the email
Po Yan knows that Mo Yi received the email
Ka Kee knows that the birthday party is held on 25/4

78. _______ is a list of names used by the systems, arranged alphabetically.


a.
b.
c.
d.

Name Dictionary
Data Dictionary
Data Library
System Dictionary

79. _______________ management is the process, which controls the changes made to a system, and
manages the different versions of the evolving software product.
a.
b.
c.
d.

Release
Version
Software
Configuration

80. An exception condition in a computer system caused by an event external to the CPU is called
___________.
a.
b.
c.
d.

Halt
Process
Wait
Interrupt

81. An enumerated data type brings together a group of:a. Related data variables

Page 15

0915544663101215
AWES PGT Computer Science Informatics Part B

b. Different looping constructs


c. Integers with user-defined names
d. Items of different data types

82. When an argument is passed by reference:a.


b.
c.
d.

A variable is created in the function to hold the argument's value


The function copies the value of argument to its own variable
The function cannot access the argument's value
The function accesses the argument's original value in the calling program

83. A member function can always access the data:a.


b.
c.
d.

In the public part of its class


In the class of which it is member
In the object of which it is a member
In any object of the class of which it is a member

84. Member functions defined inside a class specifier are ______________ by default.
a.
b.
c.
d.

Inline
Private
Both of the above
None of the above

85. Converting a predefined data type to another explicitly by programmer is known as __________.
a.
b.
c.
d.

Type modifier
Type operator
Visibility mode
Type casting

86. The new operator:a.


b.
c.
d.

Tells how much memory is available


Creates a variable called new
Returns a pointer to a variable
Obtain memory for a new variable

Page 16

0915544663101215
AWES PGT Computer Science Informatics Part B

87. What is the output of the following code?

a.
b.
c.
d.

Would vary from compiler to compiler


2
4
Error, i undefined

88. By default, any real number in 'C' is treated as:a.


b.
c.
d.

A double
A long double
A float
Depends upon memory model that you are using

89. A short integer occupies 2 bytes, an ordinary integer 4 bytes and a long integer occupies 8 bytes of
memory. If a structure is defined as
struct TAB { short a; int b; long c;} TABLE[10];
then the total memory requirement for TABLE is:a.
b.
c.
d.

24
140
40
14

90. What can be said about the array representation of circular queue when it contains only one
element?
a.
b.
c.
d.

Front = Rear -1
Front = Rear +1
Front = Rear
None of the above

02 Feedback
91. How was the overall experience while giving the test?
a. Excellent
b. Very Good

Page 17

0915544663101215
AWES PGT Computer Science Informatics Part B

c. Good
d. Average

Page 18

S-ar putea să vă placă și