4year
DESCRIPTION
pgt computer science army public schoolTRANSCRIPT
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 1
PGT Computer Science Informatics
1. What will be the result of following two expressions if i=10 initially? (i) ++i<=10 (ii) i++<=10
a. (i) True (ii) True
b. (i) False (ii) False
c. (i) True (ii) False
d. (i) False (ii) True
2. Give the Output of the following code fragment:- int ch=20; System.out.println(++ch); System.out.println(ch);
a. 21 21
b. 20 20
c. 20 21
d. 21 20
3. Consider the following code snippet:- int i=10; int n = i++%5; What are the values of i & n after the code is executed?
a. 10 & 0 b. 11 & 0 c. 11 & 2 d. Can't be calculated
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 2
4. Give the output of the following code:-
System.out.println("m is" +m);
a. m is 100 b. m is 10 c. No output d. None of the above
5. Which event gets fired when:- (i) user presses enter in a text field (ii) a check box is clicked
a. Action event & Item event b. Adjustment event & Action event c. Change event & Item event d. Item Event & Item Event
6. Name the class used to create the following:- (i) a list control (ii) a combo box control
a. JComboBox & Timer b. Timer & JComboBox c. JList & JComboBox d. None of the above
7. How many times the following code prints the string "APS"? for( i=1; i<=1000;i++); cout<< "APS";
a. Zero b. 1 c. 1000 d. Syntax error
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 3
8. Which allows you to create a derived class that inherits properties from more than one base class?
a. Hybrid Inheritance b. Hierarchical Inheritance c. Multilevel inheritance d. Multiple inheritance
9. Null character needs a space of :-
a. One byte b. Zero bytes c. Three bytes d. Four bytes
10. The arguments that determine the state of the cout object are called:-
a. State controllers b. Format flags or state flags c. Classes d. Manipulators
11. The statement int num[2][3]={ {1,2}, {3,4}, {5, 6} };
a. Assigns a value 3 to num[1][2] b. Assigns a value 2 to num[1][2] c. Assigns a value 4 to num[1][2] d. Gives an error message
12. ____________ is the key to ____________.
a. Persistence, serialization b. Inheritance, object c. Serialization, persistence d. Persistence, inheritance
13. The JDBC-ODBC bridge allows ____________ to be used as __________.
a. JDBC drivers, ODBC drivers b. Application, drivers c. Drivers, Application d. ODBC drivers, JDBC drivers
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 4
14. A semiconductor memory constructed using bipolar transistors or MOS transistor stores information in the form of a:-
a. Opcodes values b. Byte c. Bit d. Flip-flop voltage levels
15. The concept of multiple inheritance is implemented in Java by:-
a. a) Extending two or more classes b. b) Implementing two or more interfaces c. c) Extending one class and implementing one or more interfaces d. d) Both (b) and (c)
16. Twisted pair have maximum segment:-
a. 2000m b. 100m c. 200m d. 500m
17. ______________ software makes use of non numerical algorithms to solve complex problems that are not amenable to computation or straightforward analysis.
a. Web-based b. Real time c. Artificial Intelligence d. Embedded
18. The ___________ model stipulates that the requirements be completely specified before the rest of the development can processed.
a. Rapid Application Development (RAD) b. Incremental Development c. Iterative Development d. Waterfall
19. _____________ model couples the iterative nature of the prototyping with the controlled and systematic aspects of the linear sequential model.
a. Iterative Development b. Rapid Application Development (RAD) c. Incremental Development d. Spiral
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 5
20. ____________ strategy assumes that residual faults remain in the system and can continue in operation after some system failures have occurred.
a. Fault detection b. Fault avoidance c. Fault tolerance d. None of the above
21. _____________ is a classification scheme, which shows how an object class is related to other classes through common attributes and services.
a. Inheritances b. Taxonomy c. Hierarchy d. None of the above
22. Decryption and encryption of data are responsibility of:-
a. Data link layer b. Physical layer c. Presentation layer d. Session layer
23. A bridge has access to which address of a station on the same network?
a. Network b. Physical c. Service Access point d. All of the above
24. Which of the following is not a primary object of ASP Object Model?
a. The Response object b. The code object c. The Server object d. The Request object
25. Satellite Switched Time-Division Multiple Access (SS/TDMA) is:-
a. The method of determining which device has access to transmission medium at any time b. A form of TDMA in which circuit switching is used to dynamically change channel assignments c. Is a medium access control technique for TDMA d. All of the above
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 6
26. Repeaters function in:-
a. a) Physical layer b. b) Data link layer c. c) Network layer d. d) Both (a) and (b) above
27. How many hosts can be attached to each of the local area network?
a. 254 b. 128 c. 168 d. 192
28. DTD's are:-
a. Not associated with the document element b. Are associated to scheme c. Associated with the document element d. None of the above
29. MSXML is:-
a. Used for interacting with XML b. A Microsoft language c. XML parser that ships with IE5.0 d. None of the above
30. www is based on which model?
a. Client-server b. 3-tier c. Peer to peer d. Local-server
31. Which of the following is TRUE only of XML but not HTML?
a. It allows user defined tags b. It is derived from SGML c. It describes content and layout d. It is restricted only to be used with web browsers
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 7
32. The statement f1.write ((char*) &obj1, sizeof (obj1));
a. Writes the address of obj1 to f1 b. Writes the data in obj1 to f1 c. Writes a member functions of obj1 to f1 d. Writes the member functions and data of obj1 to f1
33. The Operation which is commutative but not associative:-
a. OR b. AND c. EX-OR d. NAND
34. If x={a,b,c,d}, then number of binary operations that can be defined on x is:-
a. 416
b. 4
2
c. 216
d. 2
4
35. The simplified form of the Boolean expression (X+Y+XY)(X+Z) is:-
a. XY+YZ b. X+YZ c. XZ+Y d. X+Y+Z
36. A toggle operation cannot be performed using a single:-
a. XOR gate b. NAND gate c. AND gate d. NOR gate
37. A combinational logic circuit which generates a particular binary word or number is:-
a. Encode b. Demultiplexer c. Decoder d. Multiplexer
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 8
38. The refreshing rate of dynamic RAMs is approximately once in:-
a. Two seconds b. Two micro seconds c. Fifty nano seconds d. Two milli seconds
39. Which of the following memories allows simultaneous read and write operations?
a. RAM b. EPROM c. ROM d. None of the above
40. What technology is used for flat panel displays?
a. Direct view storage tube b. Solid state c. RGB monitor d. VLSI
41. Which of the following keyboard is fastest?
a. QWERTY b. Numeric c. Dvorak d. Alphanumeric
42. Plotter accuracy is measured in terms of repeatability and:-
a. Intelligence b. Resolution c. Buffer size d. Vertical dimension
43. What is a spider?
a. A program that catalogs Web Sites b. A computer virus c. A hacker d. A spying software
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 9
44. Relationship produced from E-R model will always be in:-
a. 2NF b. B CNF c. 1 NF d. 3NF
45. In relational Schema, each tuple is divided into fields called:-
a. Records b. Relations c. Domains d. Queries
46. Manager's salary details are hidden from the employee. This is called:-
a. Physical constraint b. External constraint c. Conceptual constraint d. None of the above
47. An access path is provided by:-
a. File key b. Physical record key c. Both of the above d. None of the above
48. Index consists of:-
a. A list of keys b. Pointers to master list c. Both of the above d. None of the above
49. Which of the command closes text file which have been created using "SET ALTERNATIVE" <FILENAME> "Command" ?
a. CLOSE ALTERNATIVE b. SET ALTERNATIVE OFF c. CLEAR ALL d. CLOSE DATABASE
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 10
50. Which command is fastest among the following?
a. COPY STRUCTURE TO <new file> b. COPY FILE <FILE 1><FILE 2> c. COPY TO M FILE-DAT DELIMITED d. COPY TO <NEW File>
51. A clustering index is defined on fields which are of type:-
a. Non-key and non-ordering b. Non-key and ordering c. Key and non-ordering d. Key and ordering
52. Which of following statements are TRUE about an SQL query? P: An SQL query can contain a HAVING clause even if it does not have a GROUP BY clause. Q: An SQL query can contain a HAVING clause only if it has a GROUP BY clause. R: All the attributes used in the GROUP BY clause must appear in the SELECT clause. S: Not all the attributes used in the GROUP BY clause need to appear in the SELECT clause.
a. P and S b. Q and R c. Q and S d. P and R
53. Consider the following ER diagram:-
The minimum number of tables needed to represent M, N, P, R1 and R2 is:-
a. 4 b. 5 c. 3 d. 2
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 11
54. The output of following code is:-
a. 4 b. 7 c. 8 d. None of the above
55. Which one of the given answers is correct?
a. 1 = 4, n = 6 b. 1 = 2, n = 6 c. 1 = 3, n = 8 d. None of the above
56. Which of the following formulas can be used to generate random integers between 1 and 10?
a. 10 + rand() % (10 + 1) b. 1 + (10 - 1 + 1) % rand() c. 1 + rand() % (10 - 1 + 1) d. rand()%10+1-1
57. How many times is the following loop executed?
a. 0 b. 5 c. Infinite d. Error
58. Name the function in which there exists a statement that calls the function itself.
a. Virtual function b. Recursive function c. Friend function
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 12
d. Static function
59. _______________ package is used by compiler itself. So it does not need to be imported for use.
a. java.math b. java.lang c. java.applet d. java.awt
60. The class at the top of exception class hierarchy is _____________.
a. ArithmeticException b. Throwable c. Class d. Exception
61. State whether true or false. i) init( ) of servlet is called after a client request comes in ii) Servlets are ultimately converted into JSP
a. i-false, ii-false b. i-true, ii-true c. i-false, ii-true d. i-true, ii-false
62. In JDBC ____________ imports all Java classes concerned with database connectivity.
a. java.mysql.* b. javax.sql.* c. java.sql.* d. com.*
63. Ingres is a ___________.
a. Socket b. Web server c. Compiler d. Database
64. If a variable is declared final, it must include _____________ value.
a. Integer b. No
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 13
c. Initial d. Float
65. The IDL compiler generates _______ and _____________
a. Stubs, skeleton b. Client, stubs c. Stubs, client d. Runnable code, stubs
66. Filters were officially introduced in the servlet ____________ specification.
a. 2.4 b. 2.3 c. 2.2 d. 2.1
67. The default value of Frame attribute of table tag is:-
a. HSIDES b. BELOW c. ABOVE d. VOID
68. Which method will a web browser call on a new applet?
a. Destroy method b. Execute method c. Init method d. Main method
69. A compiler for high level language that runs on one machine and produces code for a another machine is called as:-
a. Cross compiler b. Optimizing compiler c. One pass compiler d. Multipass compiler
70. To avoid the race condition, the number of processes that may be simultaneously inside their critical section is:-
a. 0 b. 2
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 14
c. 4 d. 1
71. Which of the following is better known as 'mid range servers'?
a. Mini Computers b. Micro Computers c. Embedded Computers d. Main Frame Computers
72. A Microprocessor with 12 address lines is capable of addressing:-
a. 2048 locations b. 64K locations c. 4096 locations d. 1024 locations
73. The term _________ is used to describe a secret or undocumented means of getting into a computer system.
a. Spyware b. Trapdoor c. Backdoor d. Trojan
74. Viruses that change their characteristics as they infect are called ___________.
a. Polymorphic b. Stealth c. Camouflage d. Armored
75. Two or more copies of the same data that mismatch are known as:-
a. Data reputancy b. Data redundancy c. Data inconsistency d. Data conspiracy
76. Which of the following is not open source software?
a. Open Office b. Internet Explorer c. Fedora Linux
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 15
d. Apache HTTP Server
77. Lily tells her friends, Ka Kee ([email protected]), Po Yan ([email protected]) and Mo Yi ([email protected]), the date of her birthday party through an email as shown below. Which of the following statement cannot be derived from this email?
a. Mo Yi does not know that Ka Kee and Po Yan received the email b. Ka Kee knows that Po Yan received the email c. Po Yan knows that Mo Yi received the email d. Ka Kee knows that the birthday party is held on 25/4
78. _______ is a list of names used by the systems, arranged alphabetically.
a. Name Dictionary b. Data Dictionary c. Data Library d. System Dictionary
79. _______________ management is the process, which controls the changes made to a system, and manages the different versions of the evolving software product.
a. Release b. Version c. Software d. Configuration
80. An exception condition in a computer system caused by an event external to the CPU is called ___________.
a. Halt b. Process c. Wait d. Interrupt
81. An enumerated data type brings together a group of:-
a. Related data variables
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 16
b. Different looping constructs c. Integers with user-defined names d. Items of different data types
82. When an argument is passed by reference:-
a. A variable is created in the function to hold the argument's value b. The function copies the value of argument to its own variable c. The function cannot access the argument's value d. The function accesses the argument's original value in the calling program
83. A member function can always access the data:-
a. In the public part of its class b. In the class of which it is member c. In the object of which it is a member d. In any object of the class of which it is a member
84. Member functions defined inside a class specifier are ______________ by default.
a. Inline b. Private c. Both of the above d. None of the above
85. Converting a predefined data type to another explicitly by programmer is known as __________.
a. Type modifier b. Type operator c. Visibility mode d. Type casting
86. The new operator:-
a. Tells how much memory is available b. Creates a variable called new c. Returns a pointer to a variable d. Obtain memory for a new variable
0915544663101215 AWES PGT Computer Science Informatics Part B
Page 17
87. What is the output of the following code?
a. Would vary from compiler to compiler b. 2 c. 4 d. Error, i undefined
88. By default, any real number in 'C' is treated as:-
a. A double b. A long double c. A float d. Depends upon memory model that you are using
89. A short integer occupies 2 bytes, an ordinary integer 4 bytes and a long integer occupies 8 bytes of memory. If a structure is defined as struct TAB { short a; int b; long c;} TABLE[10]; then the total memory requirement for TABLE is:-
a. 24 b. 140 c. 40 d. 14
90. What can be said about the array representation of circular queue when it contains only one element?
a. Front = Rear -1 b. Front = Rear +1 c. Front = Rear d. None of the above
02 Feedback
91. How was the overall experience while giving the test?
a. Excellent b. Very Good