Documente Academic
Documente Profesional
Documente Cultură
(i) True
(ii) False
d. (i) False
(ii) True
2.
20
21
d. 21
20
3.
10 & 0
11 & 0
11 & 2
Can't be calculated
Page 1
0915544663101215
AWES PGT Computer Science Informatics Part B
4.
5.
m is 100
m is 10
No output
None of the above
Which event gets fired when:(i) user presses enter in a text field
(ii) a check box is clicked
a.
b.
c.
d.
6.
7.
How many times the following code prints the string "APS"?
for( i=1; i<=1000;i++); cout<< "APS";
a.
b.
c.
d.
Zero
1
1000
Syntax error
Page 2
0915544663101215
AWES PGT Computer Science Informatics Part B
8.
Which allows you to create a derived class that inherits properties from more than one base class?
a.
b.
c.
d.
9.
Hybrid Inheritance
Hierarchical Inheritance
Multilevel inheritance
Multiple inheritance
One byte
Zero bytes
Three bytes
Four bytes
10. The arguments that determine the state of the cout object are called:a.
b.
c.
d.
State controllers
Format flags or state flags
Classes
Manipulators
Persistence, serialization
Inheritance, object
Serialization, persistence
Persistence, inheritance
Page 3
0915544663101215
AWES PGT Computer Science Informatics Part B
14. A semiconductor memory constructed using bipolar transistors or MOS transistor stores information
in the form of a:a.
b.
c.
d.
Opcodes values
Byte
Bit
Flip-flop voltage levels
2000m
100m
200m
500m
17. ______________ software makes use of non numerical algorithms to solve complex problems that
are not amenable to computation or straightforward analysis.
a.
b.
c.
d.
Web-based
Real time
Artificial Intelligence
Embedded
18. The ___________ model stipulates that the requirements be completely specified before the rest of
the development can processed.
a.
b.
c.
d.
19. _____________ model couples the iterative nature of the prototyping with the controlled and
systematic aspects of the linear sequential model.
a.
b.
c.
d.
Iterative Development
Rapid Application Development (RAD)
Incremental Development
Spiral
Page 4
0915544663101215
AWES PGT Computer Science Informatics Part B
20. ____________ strategy assumes that residual faults remain in the system and can continue in
operation after some system failures have occurred.
a.
b.
c.
d.
Fault detection
Fault avoidance
Fault tolerance
None of the above
21. _____________ is a classification scheme, which shows how an object class is related to other
classes through common attributes and services.
a.
b.
c.
d.
Inheritances
Taxonomy
Hierarchy
None of the above
23. A bridge has access to which address of a station on the same network?
a.
b.
c.
d.
Network
Physical
Service Access point
All of the above
24. Which of the following is not a primary object of ASP Object Model?
a.
b.
c.
d.
The method of determining which device has access to transmission medium at any time
A form of TDMA in which circuit switching is used to dynamically change channel assignments
Is a medium access control technique for TDMA
All of the above
Page 5
0915544663101215
AWES PGT Computer Science Informatics Part B
a) Physical layer
b) Data link layer
c) Network layer
d) Both (a) and (b) above
27. How many hosts can be attached to each of the local area network?
a.
b.
c.
d.
254
128
168
192
Client-server
3-tier
Peer to peer
Local-server
31. Which of the following is TRUE only of XML but not HTML?
a.
b.
c.
d.
Page 6
0915544663101215
AWES PGT Computer Science Informatics Part B
OR
AND
EX-OR
NAND
34. If x={a,b,c,d}, then number of binary operations that can be defined on x is:a.
b.
c.
d.
16
4
2
4
16
2
4
2
XY+YZ
X+YZ
XZ+Y
X+Y+Z
XOR gate
NAND gate
AND gate
NOR gate
37. A combinational logic circuit which generates a particular binary word or number is:a.
b.
c.
d.
Encode
Demultiplexer
Decoder
Multiplexer
Page 7
0915544663101215
AWES PGT Computer Science Informatics Part B
Two seconds
Two micro seconds
Fifty nano seconds
Two milli seconds
39. Which of the following memories allows simultaneous read and write operations?
a.
b.
c.
d.
RAM
EPROM
ROM
None of the above
QWERTY
Numeric
Dvorak
Alphanumeric
Intelligence
Resolution
Buffer size
Vertical dimension
Page 8
0915544663101215
AWES PGT Computer Science Informatics Part B
2NF
B CNF
1 NF
3NF
Records
Relations
Domains
Queries
46. Manager's salary details are hidden from the employee. This is called:a.
b.
c.
d.
Physical constraint
External constraint
Conceptual constraint
None of the above
File key
Physical record key
Both of the above
None of the above
A list of keys
Pointers to master list
Both of the above
None of the above
49. Which of the command closes text file which have been created using
"SET ALTERNATIVE" <FILENAME> "Command" ?
a.
b.
c.
d.
CLOSE ALTERNATIVE
SET ALTERNATIVE OFF
CLEAR ALL
CLOSE DATABASE
Page 9
0915544663101215
AWES PGT Computer Science Informatics Part B
P and S
Q and R
Q and S
P and R
4
5
3
2
Page 10
0915544663101215
AWES PGT Computer Science Informatics Part B
a.
b.
c.
d.
4
7
8
None of the above
a.
b.
c.
d.
1 = 4, n = 6
1 = 2, n = 6
1 = 3, n = 8
None of the above
56. Which of the following formulas can be used to generate random integers between 1 and 10?
a.
b.
c.
d.
10 + rand() % (10 + 1)
1 + (10 - 1 + 1) % rand()
1 + rand() % (10 - 1 + 1)
rand()%10+1-1
a.
b.
c.
d.
0
5
Infinite
Error
58. Name the function in which there exists a statement that calls the function itself.
a. Virtual function
b. Recursive function
c. Friend function
Page 11
0915544663101215
AWES PGT Computer Science Informatics Part B
d. Static function
59. _______________ package is used by compiler itself. So it does not need to be imported for use.
a.
b.
c.
d.
java.math
java.lang
java.applet
java.awt
ArithmeticException
Throwable
Class
Exception
i-false, ii-false
i-true, ii-true
i-false, ii-true
i-true, ii-false
62. In JDBC ____________ imports all Java classes concerned with database connectivity.
a.
b.
c.
d.
java.mysql.*
javax.sql.*
java.sql.*
com.*
Socket
Web server
Compiler
Database
Page 12
0915544663101215
AWES PGT Computer Science Informatics Part B
c. Initial
d. Float
Stubs, skeleton
Client, stubs
Stubs, client
Runnable code, stubs
2.4
2.3
2.2
2.1
HSIDES
BELOW
ABOVE
VOID
Destroy method
Execute method
Init method
Main method
69. A compiler for high level language that runs on one machine and produces code for a another
machine is called as:a.
b.
c.
d.
Cross compiler
Optimizing compiler
One pass compiler
Multipass compiler
70. To avoid the race condition, the number of processes that may be simultaneously inside their critical
section is:a. 0
b. 2
Page 13
0915544663101215
AWES PGT Computer Science Informatics Part B
c. 4
d. 1
Mini Computers
Micro Computers
Embedded Computers
Main Frame Computers
2048 locations
64K locations
4096 locations
1024 locations
73. The term _________ is used to describe a secret or undocumented means of getting into a
computer system.
a.
b.
c.
d.
Spyware
Trapdoor
Backdoor
Trojan
74. Viruses that change their characteristics as they infect are called ___________.
a.
b.
c.
d.
Polymorphic
Stealth
Camouflage
Armored
75. Two or more copies of the same data that mismatch are known as:a.
b.
c.
d.
Data reputancy
Data redundancy
Data inconsistency
Data conspiracy
Page 14
0915544663101215
AWES PGT Computer Science Informatics Part B
77. Lily tells her friends, Ka Kee (KaKee@hkeaa.edu.hk), Po Yan (PoYan@hkeaa.edu.hk) and Mo Yi
(MoYi@hkeaa.edu.hk), the date of her birthday party through an email as shown below. Which of the
following statement cannot be derived from this email?
a.
b.
c.
d.
Mo Yi does not know that Ka Kee and Po Yan received the email
Ka Kee knows that Po Yan received the email
Po Yan knows that Mo Yi received the email
Ka Kee knows that the birthday party is held on 25/4
Name Dictionary
Data Dictionary
Data Library
System Dictionary
79. _______________ management is the process, which controls the changes made to a system, and
manages the different versions of the evolving software product.
a.
b.
c.
d.
Release
Version
Software
Configuration
80. An exception condition in a computer system caused by an event external to the CPU is called
___________.
a.
b.
c.
d.
Halt
Process
Wait
Interrupt
81. An enumerated data type brings together a group of:a. Related data variables
Page 15
0915544663101215
AWES PGT Computer Science Informatics Part B
84. Member functions defined inside a class specifier are ______________ by default.
a.
b.
c.
d.
Inline
Private
Both of the above
None of the above
85. Converting a predefined data type to another explicitly by programmer is known as __________.
a.
b.
c.
d.
Type modifier
Type operator
Visibility mode
Type casting
Page 16
0915544663101215
AWES PGT Computer Science Informatics Part B
a.
b.
c.
d.
A double
A long double
A float
Depends upon memory model that you are using
89. A short integer occupies 2 bytes, an ordinary integer 4 bytes and a long integer occupies 8 bytes of
memory. If a structure is defined as
struct TAB { short a; int b; long c;} TABLE[10];
then the total memory requirement for TABLE is:a.
b.
c.
d.
24
140
40
14
90. What can be said about the array representation of circular queue when it contains only one
element?
a.
b.
c.
d.
Front = Rear -1
Front = Rear +1
Front = Rear
None of the above
02 Feedback
91. How was the overall experience while giving the test?
a. Excellent
b. Very Good
Page 17
0915544663101215
AWES PGT Computer Science Informatics Part B
c. Good
d. Average
Page 18