4year

1
tytytytytytytytytyty fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff fffffffffffffffffffffffffffffffffffffffffooooooooooooooooooooooooooooooooooooooooooooo oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo ooooooooooopppppppppppppppppppppppppppppppppppppppppppppppp jdfjldkfkdfkdfjd eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee eeeeeeeeeeeeeeeeeeqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh

Upload: mkmanojdevil

Post on 12-Apr-2016

9 views

Category:

Documents


3 download

DESCRIPTION

pgt computer science army public school

TRANSCRIPT

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 1

PGT Computer Science Informatics

1. What will be the result of following two expressions if i=10 initially? (i) ++i<=10 (ii) i++<=10

a. (i) True (ii) True

b. (i) False (ii) False

c. (i) True (ii) False

d. (i) False (ii) True

2. Give the Output of the following code fragment:- int ch=20; System.out.println(++ch); System.out.println(ch);

a. 21 21

b. 20 20

c. 20 21

d. 21 20

3. Consider the following code snippet:- int i=10; int n = i++%5; What are the values of i & n after the code is executed?

a. 10 & 0 b. 11 & 0 c. 11 & 2 d. Can't be calculated

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 2

4. Give the output of the following code:-

System.out.println("m is" +m);

a. m is 100 b. m is 10 c. No output d. None of the above

5. Which event gets fired when:- (i) user presses enter in a text field (ii) a check box is clicked

a. Action event & Item event b. Adjustment event & Action event c. Change event & Item event d. Item Event & Item Event

6. Name the class used to create the following:- (i) a list control (ii) a combo box control

a. JComboBox & Timer b. Timer & JComboBox c. JList & JComboBox d. None of the above

7. How many times the following code prints the string "APS"? for( i=1; i<=1000;i++); cout<< "APS";

a. Zero b. 1 c. 1000 d. Syntax error

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 3

8. Which allows you to create a derived class that inherits properties from more than one base class?

a. Hybrid Inheritance b. Hierarchical Inheritance c. Multilevel inheritance d. Multiple inheritance

9. Null character needs a space of :-

a. One byte b. Zero bytes c. Three bytes d. Four bytes

10. The arguments that determine the state of the cout object are called:-

a. State controllers b. Format flags or state flags c. Classes d. Manipulators

11. The statement int num[2][3]={ {1,2}, {3,4}, {5, 6} };

a. Assigns a value 3 to num[1][2] b. Assigns a value 2 to num[1][2] c. Assigns a value 4 to num[1][2] d. Gives an error message

12. ____________ is the key to ____________.

a. Persistence, serialization b. Inheritance, object c. Serialization, persistence d. Persistence, inheritance

13. The JDBC-ODBC bridge allows ____________ to be used as __________.

a. JDBC drivers, ODBC drivers b. Application, drivers c. Drivers, Application d. ODBC drivers, JDBC drivers

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 4

14. A semiconductor memory constructed using bipolar transistors or MOS transistor stores information in the form of a:-

a. Opcodes values b. Byte c. Bit d. Flip-flop voltage levels

15. The concept of multiple inheritance is implemented in Java by:-

a. a) Extending two or more classes b. b) Implementing two or more interfaces c. c) Extending one class and implementing one or more interfaces d. d) Both (b) and (c)

16. Twisted pair have maximum segment:-

a. 2000m b. 100m c. 200m d. 500m

17. ______________ software makes use of non numerical algorithms to solve complex problems that are not amenable to computation or straightforward analysis.

a. Web-based b. Real time c. Artificial Intelligence d. Embedded

18. The ___________ model stipulates that the requirements be completely specified before the rest of the development can processed.

a. Rapid Application Development (RAD) b. Incremental Development c. Iterative Development d. Waterfall

19. _____________ model couples the iterative nature of the prototyping with the controlled and systematic aspects of the linear sequential model.

a. Iterative Development b. Rapid Application Development (RAD) c. Incremental Development d. Spiral

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 5

20. ____________ strategy assumes that residual faults remain in the system and can continue in operation after some system failures have occurred.

a. Fault detection b. Fault avoidance c. Fault tolerance d. None of the above

21. _____________ is a classification scheme, which shows how an object class is related to other classes through common attributes and services.

a. Inheritances b. Taxonomy c. Hierarchy d. None of the above

22. Decryption and encryption of data are responsibility of:-

a. Data link layer b. Physical layer c. Presentation layer d. Session layer

23. A bridge has access to which address of a station on the same network?

a. Network b. Physical c. Service Access point d. All of the above

24. Which of the following is not a primary object of ASP Object Model?

a. The Response object b. The code object c. The Server object d. The Request object

25. Satellite Switched Time-Division Multiple Access (SS/TDMA) is:-

a. The method of determining which device has access to transmission medium at any time b. A form of TDMA in which circuit switching is used to dynamically change channel assignments c. Is a medium access control technique for TDMA d. All of the above

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 6

26. Repeaters function in:-

a. a) Physical layer b. b) Data link layer c. c) Network layer d. d) Both (a) and (b) above

27. How many hosts can be attached to each of the local area network?

a. 254 b. 128 c. 168 d. 192

28. DTD's are:-

a. Not associated with the document element b. Are associated to scheme c. Associated with the document element d. None of the above

29. MSXML is:-

a. Used for interacting with XML b. A Microsoft language c. XML parser that ships with IE5.0 d. None of the above

30. www is based on which model?

a. Client-server b. 3-tier c. Peer to peer d. Local-server

31. Which of the following is TRUE only of XML but not HTML?

a. It allows user defined tags b. It is derived from SGML c. It describes content and layout d. It is restricted only to be used with web browsers

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 7

32. The statement f1.write ((char*) &obj1, sizeof (obj1));

a. Writes the address of obj1 to f1 b. Writes the data in obj1 to f1 c. Writes a member functions of obj1 to f1 d. Writes the member functions and data of obj1 to f1

33. The Operation which is commutative but not associative:-

a. OR b. AND c. EX-OR d. NAND

34. If x={a,b,c,d}, then number of binary operations that can be defined on x is:-

a. 416

b. 4

2

c. 216

d. 2

4

35. The simplified form of the Boolean expression (X+Y+XY)(X+Z) is:-

a. XY+YZ b. X+YZ c. XZ+Y d. X+Y+Z

36. A toggle operation cannot be performed using a single:-

a. XOR gate b. NAND gate c. AND gate d. NOR gate

37. A combinational logic circuit which generates a particular binary word or number is:-

a. Encode b. Demultiplexer c. Decoder d. Multiplexer

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 8

38. The refreshing rate of dynamic RAMs is approximately once in:-

a. Two seconds b. Two micro seconds c. Fifty nano seconds d. Two milli seconds

39. Which of the following memories allows simultaneous read and write operations?

a. RAM b. EPROM c. ROM d. None of the above

40. What technology is used for flat panel displays?

a. Direct view storage tube b. Solid state c. RGB monitor d. VLSI

41. Which of the following keyboard is fastest?

a. QWERTY b. Numeric c. Dvorak d. Alphanumeric

42. Plotter accuracy is measured in terms of repeatability and:-

a. Intelligence b. Resolution c. Buffer size d. Vertical dimension

43. What is a spider?

a. A program that catalogs Web Sites b. A computer virus c. A hacker d. A spying software

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 9

44. Relationship produced from E-R model will always be in:-

a. 2NF b. B CNF c. 1 NF d. 3NF

45. In relational Schema, each tuple is divided into fields called:-

a. Records b. Relations c. Domains d. Queries

46. Manager's salary details are hidden from the employee. This is called:-

a. Physical constraint b. External constraint c. Conceptual constraint d. None of the above

47. An access path is provided by:-

a. File key b. Physical record key c. Both of the above d. None of the above

48. Index consists of:-

a. A list of keys b. Pointers to master list c. Both of the above d. None of the above

49. Which of the command closes text file which have been created using "SET ALTERNATIVE" <FILENAME> "Command" ?

a. CLOSE ALTERNATIVE b. SET ALTERNATIVE OFF c. CLEAR ALL d. CLOSE DATABASE

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 10

50. Which command is fastest among the following?

a. COPY STRUCTURE TO <new file> b. COPY FILE <FILE 1><FILE 2> c. COPY TO M FILE-DAT DELIMITED d. COPY TO <NEW File>

51. A clustering index is defined on fields which are of type:-

a. Non-key and non-ordering b. Non-key and ordering c. Key and non-ordering d. Key and ordering

52. Which of following statements are TRUE about an SQL query? P: An SQL query can contain a HAVING clause even if it does not have a GROUP BY clause. Q: An SQL query can contain a HAVING clause only if it has a GROUP BY clause. R: All the attributes used in the GROUP BY clause must appear in the SELECT clause. S: Not all the attributes used in the GROUP BY clause need to appear in the SELECT clause.

a. P and S b. Q and R c. Q and S d. P and R

53. Consider the following ER diagram:-

The minimum number of tables needed to represent M, N, P, R1 and R2 is:-

a. 4 b. 5 c. 3 d. 2

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 11

54. The output of following code is:-

a. 4 b. 7 c. 8 d. None of the above

55. Which one of the given answers is correct?

a. 1 = 4, n = 6 b. 1 = 2, n = 6 c. 1 = 3, n = 8 d. None of the above

56. Which of the following formulas can be used to generate random integers between 1 and 10?

a. 10 + rand() % (10 + 1) b. 1 + (10 - 1 + 1) % rand() c. 1 + rand() % (10 - 1 + 1) d. rand()%10+1-1

57. How many times is the following loop executed?

a. 0 b. 5 c. Infinite d. Error

58. Name the function in which there exists a statement that calls the function itself.

a. Virtual function b. Recursive function c. Friend function

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 12

d. Static function

59. _______________ package is used by compiler itself. So it does not need to be imported for use.

a. java.math b. java.lang c. java.applet d. java.awt

60. The class at the top of exception class hierarchy is _____________.

a. ArithmeticException b. Throwable c. Class d. Exception

61. State whether true or false. i) init( ) of servlet is called after a client request comes in ii) Servlets are ultimately converted into JSP

a. i-false, ii-false b. i-true, ii-true c. i-false, ii-true d. i-true, ii-false

62. In JDBC ____________ imports all Java classes concerned with database connectivity.

a. java.mysql.* b. javax.sql.* c. java.sql.* d. com.*

63. Ingres is a ___________.

a. Socket b. Web server c. Compiler d. Database

64. If a variable is declared final, it must include _____________ value.

a. Integer b. No

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 13

c. Initial d. Float

65. The IDL compiler generates _______ and _____________

a. Stubs, skeleton b. Client, stubs c. Stubs, client d. Runnable code, stubs

66. Filters were officially introduced in the servlet ____________ specification.

a. 2.4 b. 2.3 c. 2.2 d. 2.1

67. The default value of Frame attribute of table tag is:-

a. HSIDES b. BELOW c. ABOVE d. VOID

68. Which method will a web browser call on a new applet?

a. Destroy method b. Execute method c. Init method d. Main method

69. A compiler for high level language that runs on one machine and produces code for a another machine is called as:-

a. Cross compiler b. Optimizing compiler c. One pass compiler d. Multipass compiler

70. To avoid the race condition, the number of processes that may be simultaneously inside their critical section is:-

a. 0 b. 2

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 14

c. 4 d. 1

71. Which of the following is better known as 'mid range servers'?

a. Mini Computers b. Micro Computers c. Embedded Computers d. Main Frame Computers

72. A Microprocessor with 12 address lines is capable of addressing:-

a. 2048 locations b. 64K locations c. 4096 locations d. 1024 locations

73. The term _________ is used to describe a secret or undocumented means of getting into a computer system.

a. Spyware b. Trapdoor c. Backdoor d. Trojan

74. Viruses that change their characteristics as they infect are called ___________.

a. Polymorphic b. Stealth c. Camouflage d. Armored

75. Two or more copies of the same data that mismatch are known as:-

a. Data reputancy b. Data redundancy c. Data inconsistency d. Data conspiracy

76. Which of the following is not open source software?

a. Open Office b. Internet Explorer c. Fedora Linux

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 15

d. Apache HTTP Server

77. Lily tells her friends, Ka Kee ([email protected]), Po Yan ([email protected]) and Mo Yi ([email protected]), the date of her birthday party through an email as shown below. Which of the following statement cannot be derived from this email?

a. Mo Yi does not know that Ka Kee and Po Yan received the email b. Ka Kee knows that Po Yan received the email c. Po Yan knows that Mo Yi received the email d. Ka Kee knows that the birthday party is held on 25/4

78. _______ is a list of names used by the systems, arranged alphabetically.

a. Name Dictionary b. Data Dictionary c. Data Library d. System Dictionary

79. _______________ management is the process, which controls the changes made to a system, and manages the different versions of the evolving software product.

a. Release b. Version c. Software d. Configuration

80. An exception condition in a computer system caused by an event external to the CPU is called ___________.

a. Halt b. Process c. Wait d. Interrupt

81. An enumerated data type brings together a group of:-

a. Related data variables

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 16

b. Different looping constructs c. Integers with user-defined names d. Items of different data types

82. When an argument is passed by reference:-

a. A variable is created in the function to hold the argument's value b. The function copies the value of argument to its own variable c. The function cannot access the argument's value d. The function accesses the argument's original value in the calling program

83. A member function can always access the data:-

a. In the public part of its class b. In the class of which it is member c. In the object of which it is a member d. In any object of the class of which it is a member

84. Member functions defined inside a class specifier are ______________ by default.

a. Inline b. Private c. Both of the above d. None of the above

85. Converting a predefined data type to another explicitly by programmer is known as __________.

a. Type modifier b. Type operator c. Visibility mode d. Type casting

86. The new operator:-

a. Tells how much memory is available b. Creates a variable called new c. Returns a pointer to a variable d. Obtain memory for a new variable

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 17

87. What is the output of the following code?

a. Would vary from compiler to compiler b. 2 c. 4 d. Error, i undefined

88. By default, any real number in 'C' is treated as:-

a. A double b. A long double c. A float d. Depends upon memory model that you are using

89. A short integer occupies 2 bytes, an ordinary integer 4 bytes and a long integer occupies 8 bytes of memory. If a structure is defined as struct TAB { short a; int b; long c;} TABLE[10]; then the total memory requirement for TABLE is:-

a. 24 b. 140 c. 40 d. 14

90. What can be said about the array representation of circular queue when it contains only one element?

a. Front = Rear -1 b. Front = Rear +1 c. Front = Rear d. None of the above

02 Feedback

91. How was the overall experience while giving the test?

a. Excellent b. Very Good

0915544663101215 AWES PGT Computer Science Informatics Part B

Page 18

c. Good d. Average