HSST – COMPUTER SCIENCE – SR FOR ST ONLY
FINAL ANSWER KEY
Question Paper Code: 144/2013
Exam: HSST
Medium of Question: English
Date of Test 29-08-2014
Alphacode A
Question1:-In a BST, the traversal type which would print the values in the nodes in sorted order is :-
A:-Preorder
B:-Inorder
C:-Postorder
D:-None of the above
Correct Answer:- Option-B
Question2:-The contrapositive of the statement, “You win the game if you know the rules but are not overconfident” is :
A:-If you lose the game then you don’t know the rules or you are overconfident.
B:-If you know the rules and are overconfident then you win the game.
C:-A necessary condition that you know the rules or you are not overconfident is that you win the game.
D:-If you dont’t know the rules or are overconfident you lose the game.
Correct Answer:- Option-A
Question3:-If L1 be the class of languages accepted by finite state machines and L2 be the class of languages represented by regular expressions then,
A:-L1 ∩ L2 = Φ
B:-L2 ⊆ L1
C:-L1 ⊂ L2
D:-L1 = L2
Correct Answer:- Option-D
Question4:-In which one of the following models can requirements be redefined
A:-Spiral Model
B:-Prototyping Model
C:-Waterfall Model
D:-Evolutionary Model
Correct Answer:- Option-B
Question5:-The method adopted by the memory management module of an OS of a computer to periodically collect all the free memory space to form contiguous block of free space is called
A:-Dynamic Memory Allocation
B:-Garbage Collection
C:-Concatenation
D:-Collision
Correct Answer:- Option-B
Question6:-Among the following statements about binary trees which one is NOT true ?
A:-Every non-empty tree has exactly one root node.
B:-Every non-root node has exactly one parent.
C:-Every binary tree has at least one node.
D:-Every node has at most two children.
Correct Answer:- Option-C
Question7:-DRAM is used as main memory in a computer system because it
A:-needs refreshing circuitary
B:-consumes less power
C:-has higher speed
D:-has lower cell density
Correct Answer:- Option-C
Question8:-8251 is a
A:-UART
B:-USART
C:-Programmable interval timer/counter
D:-Programmable Interrupt Controller
Correct Answer:- Option-B
Question9:-A public key encryption system
A:-Allows only the correct receiver to decode the data
B:-Does not encode the data before transmitting it
C:-Allows only the correct sender to decode the data
D:-Allows only one to decode the transmission
Correct Answer:- Option-A
Question10:-Environment variables can be accessed by
A:-System programs
B:-C programs
C:-Shell scripts
D:-All of these
Correct Answer:- Option-D
Question11:-DML is used for
A:-Addition of new structures in the database system
B:-Manipulation and processing of database
C:-Definition of physical structure of database system
D:-Description of logical structure of database
Correct Answer:- Option-B
Question12:-Suppose that N = {1, 2, 3, …} be ordered by divisibility, which one of the following subset is totally ordered?
A:-(2, 6, 24)
B:-(4, 15, 30)
C:-(3,5,15)
D:-(2,9,16)
Correct Answer:- Option-A
Question13:-Which among the following searching technique takes O(1) time to locate a data ?
A:-Binary Search
B:-Tree Search
C:-Hashing
D:-Linear Search
Correct Answer:- Option-C
Question14:-The cause for poor response time is
A:-High I/O rates
B:-High paging rates
C:-Process busy
D:-Any of the above
Correct Answer:- Option-D
Question15:-Which among the following statements is false ?
A:-The data dictionary contains the name and description of each data element
B:-Data elements in the database can be modified by changing the data dictionary
C:-The data dictionary is a tool used exclusively by the database administrator
D:-Database administrator normally maintains the data dictionary
Correct Answer:- Option-B
Question16:-The infix expression for the postfix expression x 12 + z 17 y + 42 * / + is :-
A:-x + 12 + z / 17 + y * 42
B:-x + 12 + z / (17 + y)*42
C:-(x + 12 + z)/(17 + y * 42)
D:-x + 12 + z / ((17 + y) * 42)
Correct Answer:- Option-D
Question17:-The basic types of programmable arrays are made of ________________
A:-AND gates
B:-AND gates and OR gates
C:-OR gates
D:-NAND and NOR gates
Correct Answer:- Option-B
Question18:-A COCOMO model is
A:-Complete Cost Estimation Model
B:-Constructive Cost Estimation Model
C:-Common Cost Estimation Model
D:-Comprehensive Cost Estimation Model
Correct Answer:- Option-B
Question19:-The interval between the time of submission and completion of a job is called as ___________
A:-Turnaround time
B:-Waiting time
C:-Response time
D:-Throughput
Correct Answer:- Option-A
Question20:-An assembler is
A:-data dependent
B:-programming language dependent
C:-machine dependent
D:-syntax dependent
Correct Answer:- Option-C
Question21:-The expansion of nested macro calls follows _________ rule
A:-LILO
B:-LIFO
C:-FIFO
D:-priority
Correct Answer:- Option-B
Question22:-Von Neumann architecture is
A:-SISD
B:-SIMD
C:-MIMD
D:-MISD
Correct Answer:- Option-A
Question23:-The device that is used to forward data packets from one network to another is called a _________
A:-Bridge
B:-Hub
C:-Switch
D:-Gateway
Correct Answer:- Option-C
Question24:-Which among the following is the most general phrase structured grammar ?
A:-Context – Sensitive
B:-Context – Free
C:-Regular
D:-None of the above
Correct Answer:- Option-A
Question25:-When the following instructions have been executed, what will be the contents of register AL ?
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
A:-0A and carry flag is reset
B:-0A and carry flag is set
C:-6A and carry flag is reset
D:-6A and carry flag is set
Correct Answer:- Option-B
Question26:-The first modern computer was called __________
A:-UNIVAC-I
B:-FLOW-MATIC
C:-ENIAC
D:-INTEL
Correct Answer:- Option-C
Question27:-In which of the language paradigms is the addition of two values expressed as (+ 10 20)?
A:-procedural
B:-functional
C:-logic
D:-object-oriented
Correct Answer:-Question Cancelled
Question28:-What is the purpose of this bit of code
void init()
{
…
}
A:-A place to declare variables
B:-A required method in an applet
Home Page http://localhost/psc/modules/marklist/answer_sheet/prin…
2 of 8 09/19/2014 10:05 AM
C:-A class that initializes the applet
D:-Interacting with the user
Correct Answer:- Option-B
Question29:-In Relational Algebra the query that finds customers who have a balance of over 800 is
A:-∏customer_name(σ balance >800(Deposit))
B:-σcustomer_name(∏balance>800(Deposit))
C:-∏customer_name(σbalance>800(Borrow))
D:-σcustomer_name(∏balance>500(Borrow))
Correct Answer:- Option-A
Question30:-Secret-key encryption is also known as
A:-Secret-encryption
B:-Asymmetric encryption
C:-Symmetric encryption
D:-Private encryption
Correct Answer:- Option-C
Question31:-DNS is a
A:-Distributed hierarchical naming system
B:-Vertical naming system
C:-Horizontal naming system
D:-Client Server system
Correct Answer:- Option-A
Question32:-E-commerce is not suitable for
A:-Online job searching
B:-Sale/Purchase of expensive jewellery and antiques
C:-Sale/Purchase of branded clothes
D:-Sale/Purchase of mobile phones
Correct Answer:- Option-A
Question33:-Several factors exist that affect the efficiency of lookup operations in a hash table. Which among the following is NOT one of those factors ?
A:-Size of elements stored in the hash table.
B:-Number of elements stored in the hash table.
C:-Quality of the hash function.
D:-Number of buckets in the hash table.
Correct Answer:- Option-A
Question34:-A DBMS query language is designed to
A:-specify the structure of a database
B:-support end users with English-like commands
C:-support the development of complex applications software
D:-all of the above
Correct Answer:- Option-D
Question35:-Let r be a resource. There are 3 user processes each requiring 2 units of R. Then the minimum number of units of R such that no deadlocks will occur is
A:-4
B:-3
C:-5
D:-6
Correct Answer:- Option-A
Question36:-Assume a cache memory with associative mapping. If the main memory is of 8K bytes and the cache memory is of 2K words, then each word of cache memory is
A:-21 bits
B:-11 bits
C:-16 bits
D:-20 bits
Correct Answer:- Option-C
Question37:-Which of the following is true ?
A:-Stream cipher technique is an encryption technique
B:-Block cipher technique is an encryption technique
C:-Both (A) and (B)
D:-Neither of (A) and (B)
Correct Answer:- Option-C
Question38:-Given a linked list with n elements. Then the time taken to insert an element after an element pointed to by some pointer is
A:-O(n log2 n)
B:-O(1)
C:-O(log2 n)
D:-O(n)
Correct Answer:- Option-B
Question39:-Let h be a hashing function and is used to hash n keys into a table of size m (given n<=m). Then the expected number of collisions involving a particular key x is
A:-less than 1
B:-less than m
C:-less than n
D:-less than n/2
Correct Answer:- Option-A
Question40:-If L is a lattice, then for every a and b in L which among the following is correct?
A:-a ν (b Λ c) =a
B:-a ν (b ν c) = (a ν b) ν c
C:-a ν b = a Λ b
D:-a ν (b ν c) = b
Correct Answer:- Option-B
Question41:-In the spiral model 'risk analysis' is performed
A:-in every loop
B:-in the first and second loop
C:-before using spiral model
D:-in the first loop
Correct Answer:-Question Cancelled
Question42:-The technique of improving the priority of process waiting in queue for CPU allocation is called _________________
A:-Starvation
B:-Ageing
C:-Revocation
D:-Relocation
Correct Answer:- Option-B
Question43:-PSW is saved in stack when there is a
A:-interrupt recognized
Home Page http://localhost/psc/modules/marklist/answer_sheet/prin...
3 of 8 09/19/2014 10:05 AM
B:-execution of CALL instruction
C:-execution of RST instruction
D:-all of these
Correct Answer:- Option-A
Question44:-The default subnet mask for a Class C network is
A:-127.0.0.1
B:-255.0.0.0
C:-255.255.0.0
D:-255.255.255.0
Correct Answer:- Option-D
Question45:-Which one of the following is NOT an advantage of Distributed System?
A:-Reliability
B:-Incremental growth
C:-Resource sharing
D:-None of the above
Correct Answer:- Option-D
Question46:-Cache memory is based
A:-on the property of locality of reference
B:-on the fact that references generally tend to cluster
C:-on the heuristic 90-10 rule
D:-all of the above
Correct Answer:- Option-A
Question47:-The language component of DBMS which can be embedded in a program is
A:-the database administrator (DBA)
B:-the data manipulation language (DML)
C:-the data definition language (DDL)
D:-a query language
Correct Answer:- Option-B
Question48:-A computer system that permits multiple users to run programs at same time is _______
A:-Real time system
B:-Time sharing system
C:-Multiprogramming system
D:-Multi tasking system
Correct Answer:- Option-D
Question49:-What is the ouput of the following code segment?
void test()
{
char c;
cin.get(c);
if (c!='\n'){
test();
cout.put(c);
}}
A:-It will print an empty line
B:-The string entered is printed as it is
C:-It will go into an infinite loop
D:-The string entered is printed in reverse order
Correct Answer:- Option-D
Question50:-Which of the following statement is the negation of the statement, "10 is even and -5 is negative"
A:-10 is even and -5 is not negative
B:-10 is odd and -5 is not negative
C:-10 is even or -5 is not negative
D:-10 is odd or -5 is not negative
Correct Answer:- Option-D
Question51:-The __________ sort relatively passes through a list to exchange the first element with any element less than it and then repeats with a new first element
A:-selection sort
B:-quick sort
C:-insertion sort
D:-heap sort
Correct Answer:- Option-B
Question52:-Which among the following is the data structure that is used to check balanced parenthesis in an expression
A:-Stack
B:-Tree
C:-Queue
D:-Array
Correct Answer:- Option-A
Question53:-p → q is logically equivalent to
A:-~q → p
B:-~pνq
C:-~pΛq
D:-~p → q
Correct Answer:- Option-B
Question54:-Which of the following regular expression over {0,1} denotes the set of all strings not containing 100 as substring?
A:-0*1*01*
B:-0*1010*
C:-0*(1*0)*
D:-0*(10+1)*
Correct Answer:- Option-D
Question55:-Which one of the following is NOT a size metric?
A:-Cyclomatic complexity
B:-Function count
C:-LOC
D:-Program Length
Correct Answer:- Option-A
Question56:-How many times is the symbol '&' printed by the call sample(4)?
void sample(int i){
if(i>1){
sample(i/2);
sample(i/2);
}
cout<<"&";
Home Page http://localhost/psc/modules/marklist/answer_sheet/prin...
4 of 8 09/19/2014 10:05 AM
}
A:-3
B:-4
C:-7
D:-8
Correct Answer:- Option-C
Question57:-The scheduling policy that is most suitable for a time-shared operating system is :
A:-SJF
B:-Elevator
C:-Round Robin
D:-FCFS
Correct Answer:- Option-C
Question58:-If a node in a BST has two children, then its inorder predecessor has
A:-no child
B:-no left child
C:-no right child
D:-two children
Correct Answer:- Option-C
Question59:-The maximum number of processes that may be simultaneously inside the critical section inorder to avoid race condition is
A:-one
B:-zero
C:-more than two
D:-two
Correct Answer:- Option-A
Question60:-The time required by a sector to reach below read/write head is called as ___________
A:-Seek time
B:-Access time
C:-Latency time
D:-None
Correct Answer:- Option-C
Question61:-Which on of the following TCP/IP protocol is used for transferring e-mail messages from one machine to another?
A:-RPC
B:-FTP
C:-SMTP
D:-RTP
Correct Answer:- Option-C
Question62:-Among the following, which one is used to connect two systems, specifically if the systems use different protocols.
A:-hub
B:-bridge
C:-gateway
D:-repeater
Correct Answer:- Option-C
Question63:-The disadvantage of a pipe is that
A:-It is a one way communication channel
B:-It dies along with the process that created it
C:-It cannot be shared by unrelated processes
D:-All of the above
Correct Answer:- Option-D
Question64:-a subschema expresses
A:-the physical view
B:-the logical view
C:-the external view
D:-all of the above
Correct Answer:- Option-C
Question65:-Given that modules X and Y operate on the same input and output data, then the cohesion is
A:-Procedural
B:-Communicational
C:-Logical
D:-Sequential
Correct Answer:- Option-B
Question66:-Which among the following sorting methods is the most suitable one for sorting a list which is almost sorted
A:-Bubble Sort
B:-Quick sort
C:-Selection sort
D:-Insertion sort
Correct Answer:- Option-A
Question67:-_____________ is the scheduler which selects processes from secondary storage for scheduling
A:-Process scheduler
B:-Short term scheduler
C:-Medium term scheduler
D:-Long term scheduler
Correct Answer:- Option-C
Question68:-Among the following which one is NOT a weighted code?
A:-Binary number system
B:-Excess 3 code
C:-Decimal number system
D:-None of these
Correct Answer:- Option-B
Question69:-LDAP stands for
A:-Large Directory Access Protocol
B:-Lightweight Directory Access Protocol
C:-Large Data Access Protocol
D:-Lightweight Data Access Protocol
Correct Answer:- Option-B
Question70:-EPROM is erased by using
A:-Ultraviolet rays
B:-24 V electric pulse
C:-12 V electric pulse
D:-infrared rays
Home Page http://localhost/psc/modules/marklist/answer_sheet/prin...
5 of 8 09/19/2014 10:05 AM
Correct Answer:- Option-A
Question71:-The language that has recently become the defacto standard for interfacing application programs with relational database system is
A:-4GL
B:-SQL
C:-DBase
D:-Oracle
Correct Answer:- Option-B
Question72:-A translator which performs macro expansion is called as ____________
A:-Micro pre-processor
B:-Macro processor
C:-Assembler
D:-Macro pre-processor
Correct Answer:- Option-D
Question73:-The term 'page traffic' refers to
A:-the movement of pages in and out of memory
B:-number of pages of executing programs loaded in memory
C:-number of pages in memory at a given instant
D:-number of pages required to be brought in at a given page request
Correct Answer:- Option-A
Question74:-The term 'page traffic' refers to
A:-the movement of pages in and out of memory
B:-number of pages of executing programs loaded in memory
C:-number of pages in memory at a given instant
D:-number of pages required to be brought in at a given page request
Correct Answer:- Option-A
Question75:-The running time of the following fragment of code is :
for (int i=0;i<20;i++)
for(int j=0;j