HSST – COMPUTER SCIENCE – SR FOR ST ONLY

FINAL ANSWER KEY
Question Paper Code: 144/2013
Exam: HSST
Medium of Question: English
Date of Test 29-08-2014
Alphacode A

Question1:-In a BST, the traversal type which would print the values in the nodes in sorted order is :-
A:-Preorder
B:-Inorder
C:-Postorder
D:-None of the above
Correct Answer:- Option-B

Question2:-The contrapositive of the statement, “You win the game if you know the rules but are not overconfident” is :
A:-If you lose the game then you don’t know the rules or you are overconfident.
B:-If you know the rules and are overconfident then you win the game.
C:-A necessary condition that you know the rules or you are not overconfident is that you win the game.
D:-If you dont’t know the rules or are overconfident you lose the game.
Correct Answer:- Option-A

Question3:-If L1 be the class of languages accepted by finite state machines and L2 be the class of languages represented by regular expressions then,
A:-L1 ∩ L2 = Φ
B:-L2 ⊆ L1
C:-L1 ⊂ L2
D:-L1 = L2
Correct Answer:- Option-D

Question4:-In which one of the following models can requirements be redefined
A:-Spiral Model
B:-Prototyping Model
C:-Waterfall Model
D:-Evolutionary Model
Correct Answer:- Option-B

Question5:-The method adopted by the memory management module of an OS of a computer to periodically collect all the free memory space to form contiguous block of free space is called
A:-Dynamic Memory Allocation
B:-Garbage Collection
C:-Concatenation
D:-Collision
Correct Answer:- Option-B

Question6:-Among the following statements about binary trees which one is NOT true ?
A:-Every non-empty tree has exactly one root node.
B:-Every non-root node has exactly one parent.
C:-Every binary tree has at least one node.
D:-Every node has at most two children.
Correct Answer:- Option-C

Question7:-DRAM is used as main memory in a computer system because it
A:-needs refreshing circuitary
B:-consumes less power
C:-has higher speed
D:-has lower cell density
Correct Answer:- Option-C
Question8:-8251 is a
A:-UART
B:-USART
C:-Programmable interval timer/counter
D:-Programmable Interrupt Controller
Correct Answer:- Option-B
Question9:-A public key encryption system
A:-Allows only the correct receiver to decode the data
B:-Does not encode the data before transmitting it
C:-Allows only the correct sender to decode the data
D:-Allows only one to decode the transmission
Correct Answer:- Option-A
Question10:-Environment variables can be accessed by
A:-System programs
B:-C programs
C:-Shell scripts
D:-All of these
Correct Answer:- Option-D

Question11:-DML is used for
A:-Addition of new structures in the database system
B:-Manipulation and processing of database
C:-Definition of physical structure of database system
D:-Description of logical structure of database
Correct Answer:- Option-B

Question12:-Suppose that N = {1, 2, 3, …} be ordered by divisibility, which one of the following subset is totally ordered?
A:-(2, 6, 24)
B:-(4, 15, 30)
C:-(3,5,15)
D:-(2,9,16)
Correct Answer:- Option-A

Question13:-Which among the following searching technique takes O(1) time to locate a data ?
A:-Binary Search
B:-Tree Search
C:-Hashing
D:-Linear Search
Correct Answer:- Option-C

Question14:-The cause for poor response time is
A:-High I/O rates
B:-High paging rates
C:-Process busy
D:-Any of the above
Correct Answer:- Option-D

Question15:-Which among the following statements is false ?
A:-The data dictionary contains the name and description of each data element
B:-Data elements in the database can be modified by changing the data dictionary
C:-The data dictionary is a tool used exclusively by the database administrator
D:-Database administrator normally maintains the data dictionary
Correct Answer:- Option-B

Question16:-The infix expression for the postfix expression x 12 + z 17 y + 42 * / + is :-
A:-x + 12 + z / 17 + y * 42
B:-x + 12 + z / (17 + y)*42
C:-(x + 12 + z)/(17 + y * 42)
D:-x + 12 + z / ((17 + y) * 42)
Correct Answer:- Option-D

Question17:-The basic types of programmable arrays are made of ________________
A:-AND gates
B:-AND gates and OR gates
C:-OR gates
D:-NAND and NOR gates
Correct Answer:- Option-B

Question18:-A COCOMO model is
A:-Complete Cost Estimation Model
B:-Constructive Cost Estimation Model
C:-Common Cost Estimation Model
D:-Comprehensive Cost Estimation Model
Correct Answer:- Option-B

Question19:-The interval between the time of submission and completion of a job is called as ___________
A:-Turnaround time
B:-Waiting time
C:-Response time
D:-Throughput
Correct Answer:- Option-A

Question20:-An assembler is
A:-data dependent
B:-programming language dependent
C:-machine dependent
D:-syntax dependent
Correct Answer:- Option-C

Question21:-The expansion of nested macro calls follows _________ rule
A:-LILO
B:-LIFO
C:-FIFO
D:-priority
Correct Answer:- Option-B

Question22:-Von Neumann architecture is
A:-SISD
B:-SIMD
C:-MIMD
D:-MISD
Correct Answer:- Option-A

Question23:-The device that is used to forward data packets from one network to another is called a _________
A:-Bridge
B:-Hub
C:-Switch
D:-Gateway
Correct Answer:- Option-C

Question24:-Which among the following is the most general phrase structured grammar ?
A:-Context – Sensitive
B:-Context – Free
C:-Regular
D:-None of the above
Correct Answer:- Option-A

Question25:-When the following instructions have been executed, what will be the contents of register AL ?
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
A:-0A and carry flag is reset
B:-0A and carry flag is set
C:-6A and carry flag is reset
D:-6A and carry flag is set
Correct Answer:- Option-B

Question26:-The first modern computer was called __________
A:-UNIVAC-I
B:-FLOW-MATIC
C:-ENIAC
D:-INTEL
Correct Answer:- Option-C
Question27:-In which of the language paradigms is the addition of two values expressed as (+ 10 20)?
A:-procedural
B:-functional
C:-logic
D:-object-oriented
Correct Answer:-Question Cancelled
Question28:-What is the purpose of this bit of code
void init()
{

}
A:-A place to declare variables
B:-A required method in an applet
Home Page http://localhost/psc/modules/marklist/answer_sheet/prin…
2 of 8 09/19/2014 10:05 AM
C:-A class that initializes the applet
D:-Interacting with the user
Correct Answer:- Option-B
Question29:-In Relational Algebra the query that finds customers who have a balance of over 800 is
A:-∏customer_name(σ balance >800(Deposit))
B:-σcustomer_name(∏balance>800(Deposit))
C:-∏customer_name(σbalance>800(Borrow))
D:-σcustomer_name(∏balance>500(Borrow))
Correct Answer:- Option-A
Question30:-Secret-key encryption is also known as
A:-Secret-encryption
B:-Asymmetric encryption
C:-Symmetric encryption
D:-Private encryption
Correct Answer:- Option-C
Question31:-DNS is a
A:-Distributed hierarchical naming system
B:-Vertical naming system
C:-Horizontal naming system
D:-Client Server system
Correct Answer:- Option-A
Question32:-E-commerce is not suitable for
A:-Online job searching
B:-Sale/Purchase of expensive jewellery and antiques
C:-Sale/Purchase of branded clothes
D:-Sale/Purchase of mobile phones
Correct Answer:- Option-A
Question33:-Several factors exist that affect the efficiency of lookup operations in a hash table. Which among the following is NOT one of those factors ?
A:-Size of elements stored in the hash table.
B:-Number of elements stored in the hash table.
C:-Quality of the hash function.
D:-Number of buckets in the hash table.
Correct Answer:- Option-A
Question34:-A DBMS query language is designed to
A:-specify the structure of a database
B:-support end users with English-like commands
C:-support the development of complex applications software
D:-all of the above
Correct Answer:- Option-D
Question35:-Let r be a resource. There are 3 user processes each requiring 2 units of R. Then the minimum number of units of R such that no deadlocks will occur is
A:-4
B:-3
C:-5
D:-6
Correct Answer:- Option-A
Question36:-Assume a cache memory with associative mapping. If the main memory is of 8K bytes and the cache memory is of 2K words, then each word of cache memory is
A:-21 bits
B:-11 bits
C:-16 bits
D:-20 bits
Correct Answer:- Option-C
Question37:-Which of the following is true ?
A:-Stream cipher technique is an encryption technique
B:-Block cipher technique is an encryption technique
C:-Both (A) and (B)
D:-Neither of (A) and (B)
Correct Answer:- Option-C
Question38:-Given a linked list with n elements. Then the time taken to insert an element after an element pointed to by some pointer is
A:-O(n log2 n)
B:-O(1)
C:-O(log2 n)
D:-O(n)
Correct Answer:- Option-B
Question39:-Let h be a hashing function and is used to hash n keys into a table of size m (given n<=m). Then the expected number of collisions involving a particular key x is A:-less than 1 B:-less than m C:-less than n D:-less than n/2 Correct Answer:- Option-A Question40:-If L is a lattice, then for every a and b in L which among the following is correct? A:-a ν (b Λ c) =a B:-a ν (b ν c) = (a ν b) ν c C:-a ν b = a Λ b D:-a ν (b ν c) = b Correct Answer:- Option-B Question41:-In the spiral model 'risk analysis' is performed A:-in every loop B:-in the first and second loop C:-before using spiral model D:-in the first loop Correct Answer:-Question Cancelled Question42:-The technique of improving the priority of process waiting in queue for CPU allocation is called _________________ A:-Starvation B:-Ageing C:-Revocation D:-Relocation Correct Answer:- Option-B Question43:-PSW is saved in stack when there is a A:-interrupt recognized Home Page http://localhost/psc/modules/marklist/answer_sheet/prin... 3 of 8 09/19/2014 10:05 AM B:-execution of CALL instruction C:-execution of RST instruction D:-all of these Correct Answer:- Option-A Question44:-The default subnet mask for a Class C network is A:-127.0.0.1 B:-255.0.0.0 C:-255.255.0.0 D:-255.255.255.0 Correct Answer:- Option-D Question45:-Which one of the following is NOT an advantage of Distributed System? A:-Reliability B:-Incremental growth C:-Resource sharing D:-None of the above Correct Answer:- Option-D Question46:-Cache memory is based A:-on the property of locality of reference B:-on the fact that references generally tend to cluster C:-on the heuristic 90-10 rule D:-all of the above Correct Answer:- Option-A Question47:-The language component of DBMS which can be embedded in a program is A:-the database administrator (DBA) B:-the data manipulation language (DML) C:-the data definition language (DDL) D:-a query language Correct Answer:- Option-B Question48:-A computer system that permits multiple users to run programs at same time is _______ A:-Real time system B:-Time sharing system C:-Multiprogramming system D:-Multi tasking system Correct Answer:- Option-D Question49:-What is the ouput of the following code segment? void test() { char c; cin.get(c); if (c!='\n'){ test(); cout.put(c); }} A:-It will print an empty line B:-The string entered is printed as it is C:-It will go into an infinite loop D:-The string entered is printed in reverse order Correct Answer:- Option-D Question50:-Which of the following statement is the negation of the statement, "10 is even and -5 is negative" A:-10 is even and -5 is not negative B:-10 is odd and -5 is not negative C:-10 is even or -5 is not negative D:-10 is odd or -5 is not negative Correct Answer:- Option-D Question51:-The __________ sort relatively passes through a list to exchange the first element with any element less than it and then repeats with a new first element A:-selection sort B:-quick sort C:-insertion sort D:-heap sort Correct Answer:- Option-B Question52:-Which among the following is the data structure that is used to check balanced parenthesis in an expression A:-Stack B:-Tree C:-Queue D:-Array Correct Answer:- Option-A Question53:-p → q is logically equivalent to A:-~q → p B:-~pνq C:-~pΛq D:-~p → q Correct Answer:- Option-B Question54:-Which of the following regular expression over {0,1} denotes the set of all strings not containing 100 as substring? A:-0*1*01* B:-0*1010* C:-0*(1*0)* D:-0*(10+1)* Correct Answer:- Option-D Question55:-Which one of the following is NOT a size metric? A:-Cyclomatic complexity B:-Function count C:-LOC D:-Program Length Correct Answer:- Option-A Question56:-How many times is the symbol '&' printed by the call sample(4)? void sample(int i){ if(i>1){
sample(i/2);
sample(i/2);
}
cout<<"&"; Home Page http://localhost/psc/modules/marklist/answer_sheet/prin... 4 of 8 09/19/2014 10:05 AM } A:-3 B:-4 C:-7 D:-8 Correct Answer:- Option-C Question57:-The scheduling policy that is most suitable for a time-shared operating system is : A:-SJF B:-Elevator C:-Round Robin D:-FCFS Correct Answer:- Option-C Question58:-If a node in a BST has two children, then its inorder predecessor has A:-no child B:-no left child C:-no right child D:-two children Correct Answer:- Option-C Question59:-The maximum number of processes that may be simultaneously inside the critical section inorder to avoid race condition is A:-one B:-zero C:-more than two D:-two Correct Answer:- Option-A Question60:-The time required by a sector to reach below read/write head is called as ___________ A:-Seek time B:-Access time C:-Latency time D:-None Correct Answer:- Option-C Question61:-Which on of the following TCP/IP protocol is used for transferring e-mail messages from one machine to another? A:-RPC B:-FTP C:-SMTP D:-RTP Correct Answer:- Option-C Question62:-Among the following, which one is used to connect two systems, specifically if the systems use different protocols. A:-hub B:-bridge C:-gateway D:-repeater Correct Answer:- Option-C Question63:-The disadvantage of a pipe is that A:-It is a one way communication channel B:-It dies along with the process that created it C:-It cannot be shared by unrelated processes D:-All of the above Correct Answer:- Option-D Question64:-a subschema expresses A:-the physical view B:-the logical view C:-the external view D:-all of the above Correct Answer:- Option-C Question65:-Given that modules X and Y operate on the same input and output data, then the cohesion is A:-Procedural B:-Communicational C:-Logical D:-Sequential Correct Answer:- Option-B Question66:-Which among the following sorting methods is the most suitable one for sorting a list which is almost sorted A:-Bubble Sort B:-Quick sort C:-Selection sort D:-Insertion sort Correct Answer:- Option-A Question67:-_____________ is the scheduler which selects processes from secondary storage for scheduling A:-Process scheduler B:-Short term scheduler C:-Medium term scheduler D:-Long term scheduler Correct Answer:- Option-C Question68:-Among the following which one is NOT a weighted code? A:-Binary number system B:-Excess 3 code C:-Decimal number system D:-None of these Correct Answer:- Option-B Question69:-LDAP stands for A:-Large Directory Access Protocol B:-Lightweight Directory Access Protocol C:-Large Data Access Protocol D:-Lightweight Data Access Protocol Correct Answer:- Option-B Question70:-EPROM is erased by using A:-Ultraviolet rays B:-24 V electric pulse C:-12 V electric pulse D:-infrared rays Home Page http://localhost/psc/modules/marklist/answer_sheet/prin... 5 of 8 09/19/2014 10:05 AM Correct Answer:- Option-A Question71:-The language that has recently become the defacto standard for interfacing application programs with relational database system is A:-4GL B:-SQL C:-DBase D:-Oracle Correct Answer:- Option-B Question72:-A translator which performs macro expansion is called as ____________ A:-Micro pre-processor B:-Macro processor C:-Assembler D:-Macro pre-processor Correct Answer:- Option-D Question73:-The term 'page traffic' refers to A:-the movement of pages in and out of memory B:-number of pages of executing programs loaded in memory C:-number of pages in memory at a given instant D:-number of pages required to be brought in at a given page request Correct Answer:- Option-A Question74:-The term 'page traffic' refers to A:-the movement of pages in and out of memory B:-number of pages of executing programs loaded in memory C:-number of pages in memory at a given instant D:-number of pages required to be brought in at a given page request Correct Answer:- Option-A Question75:-The running time of the following fragment of code is : for (int i=0;i<20;i++) for(int j=0;j

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *