how to use this ebook - educationjockey.com · how to use this ebook this ebook has 3 sections....

27

Upload: others

Post on 17-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year
Page 2: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

How to use this eBook

This ebook has 3 Sections.

Section 1: section-1 of this ebook contains Topic wise questions from previous

year papers grouped together

Topic wise total questions details is given below :

Topic Total number of questions in this ebook

Discrete Structures 87 Computer Arithmetic 64 Programming in C and C++ 67 Relational Database Design and SQL

72

Data and File structures 89 Computer Networks 96 System Software and Compilers 63 Operating Systems 91 Software Engineering 85 Current Trends and Technologies 79

The answers to the questions are given in red or green color.This section will give

you idea about how questions come from each Topic. You can take Print out as

answers are marked ticked also.

Section 2: This section of ebook contains full length year wise questions with

answer. You can practice full length paper here. You can take Print out as answers

are marked ticked also.

Section 3 : This section has full length papers without answers for your practice.

You can take print out and practice and check how much marks youn score in

each paper.

Page 3: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

INDEX

SECTION 1:

TOPIC PAGE NUMBER Discrete Structures 11 Computer Arithmetic 27 Programming in C and C++ 40 Relational Database Design and SQL 51 Data and File structures 64 Computer Networks 78 System Software and Compilers 91 Operating Systems 102 Software Engineering 117 Current Trends and Technologies 131

SECTION 2:

TOPIC PAGE NUMBER SOLVED PAPER2 NOVEMBER2017 144 SOLVED PAPER2 JANUARY 2017 152 SOLVED PAPER2 AUGUST 2016 162 SOLVED PAPER2 JULY 2016 171 SOLVED PAPER2DECEMBER 2015 180 SOLVED PAPER2 JUNE 2015 191 SOLVED PAPER2 DECEMBER 2014 201 SOLVED PAPER2 JUNE 2014 210 SOLVED PAPER2 DECEMBER 2013 221 SOLVED PAPER2 JUNE 2013 231 SOLVED PAPER2 DECEMBER 2012 241 SOLVED PAPER2 JUNE 2012 251 SOLVED PAPER2 DECEMBER 2011 260

Page 4: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

SOLVED PAPER2 JUNE 2011 268 SOLVED PAPER1 DECEMBER 2010 275 SOLVED PAPER2 JUNE 2010 283 SOLVED PAPER1 DECEMBER 2009 292 SOLVED PAPER2 JUNE 2009 299

SECTION 3:

TOPIC PAGE NUMBER UNSOLVED PAPER2 NOVEMBER 2017 306 UNSOLVED PAPER2 JANUARY 2017 315 UNSOLVED PAPER2 AUGUST 2016 326 UNSOLVED PAPER2 JULY 2016 337 UNSOLVED PAPER2DECEMBER 2015 348 UNSOLVED PAPER2 JUNE 2015 358 UNSOLVED PAPER2 DECEMBER 2014 368 UNSOLVED PAPER2JUNE 2014 377 UNSOLVED PAPER2 DECEMBER 2013 388 UNSOLVED PAPER2 JUNE 2013 398 UNSOLVED PAPER2 DECEMBER 2012 408 UNSOLVED PAPER2 JUNE 2012 418 UNSOLVED PAPER2 DECEMBER 2011 427 UNSOLVED PAPER2 JUNE 2011 435 UNSOLVED PAPER2 DECEMBER 2010 442 UNSOLVED PAPER2 JUNE 2010 451 UNSOLVED PAPER2 DECEMBER 2009 461 UNSOLVED PAPER2 JUNE 2009 468

Page 5: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

SYLLABUS

CBSE UGC NET Computer Science and Applications 87 code

1. Discrete Structures :

Sets, Relations, Functions. Pigeonhole Principle, Inclusion-Exclusion Principle, Equivalence and Partial Orderings, Elementary Counting Techniques, Probability. Measure ( s ) for information and Mutual information.

Computability : Models of computation-Finite Automata, Pushdown Automata, Non – determinism and NFA, DPDA and PDAs and Languages accepted by these structures. Grammars, Languages, Non – computability and Examples of non – computable problems.

Graph : Definition, walks, paths, trails, connected graphs, regular and bipartite graphs, cycles and circuits. Tree and rooted tree. Spanning trees. Eccentricity of a vertex radius and diameter of a graph. Central Graphs. Centres of a tree. Hamiltonian and Eulerian graphs, Planar graphs.

Groups : Finite fields and Error correcting / detecting codes.

2. Computer Arithmetic :

Propositional ( Boolean ) Logic, Predicate Logic, Well – formed – formulae ( WFF ), Satisfiability and Tautology.

Logic Families : TTL, ECL and C – MOS gates. Boolean algebra and Minimization of Boolean functions. Flip-flops – types, race condition and comparison. Design of combinational and sequential circuits.

Representation of Integers : Octal, Hex, Decimal, and Binary. 2′s complement and 1′s complement arithmetic. Floating point representation.

3. Programming in C and C++ :

Programming in C : Elements of C – Tokens, identifiers, data types in C. Control structures in C. Sequence, selection and iteration(s). Structured data types in C-arrays, struct, union, string, and pointers.

Page 6: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

O – O Programming Concepts : Class, object, instantiation. Inheritance, polymorphism and overloading.

C++ Programming : Elements of C++ – Tokens, identifiers. Variables and constants, Datatypes, Operators, Control statements. Functions parameter passing. Class and objects. Constructors and destructors. Overloading, Inheritance, Templates, Exception handling.

4. Relational Database Design and SQL :

E-R diagrams and their transformation to relational design, normalization – INF, 2NF, 3NF, BCNF and 4NF. Limitations of 4NF and BCNF.

SQL : Data Definition Language ( DDL ), Data Manipulation Language ( DML ), Data Control Language ( DCL ) commands. Database objects like-Views, indexes, sequences, synonyms, data dictionary.

5. Data and File structures :

Data, Information, Definition of data structure. Arrays, stacks, queues, linked lists, trees, graphs, priority queues and heaps.

File Structures : Fields, records and files. Sequential, direct, index-sequential and relative files. Hashing, inverted lists and multi – lists. B trees and B+ trees.

6. Computer Networks :

Network fundamentals : Local Area Networks ( LAN ), Metropolitan Area Networks ( MAN ), Wide Area Networks ( WAN ), Wireless Networks, Inter Networks.

Reference Models : The OSI model, TCP / IP model.

Data Communication : Channel capacity. Transmission media-twisted pair, coaxial cables, fibre – optic cables, wireless transmission-radio, microwave, infrared and millimeter waves. Lightwave transmission. Thelephones – local loop, trunks, multiplexing, switching, narrowband ISDN, broadband ISDN, ATM, High speed LANS. Cellular Radio. Communication satellites-geosynchronous and low-orbit.

Page 7: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

Internetworking : Switch / Hub, Bridge, Router, Gateways, Concatenated virtual circuits, Tunnelling, Fragmentation, Firewalls.

Routing : Virtual circuits and datagrams. Routing algorithms. Conjestion control.

Network Security : Cryptography-public key, secret key. Domain Name System ( DNS ) – Electronic Mail and Worldwide Web ( WWW ). The DNS, Resource Records, Name servers. E-mail-architecture and Serves.

7. System Software and Compilers :

Assembly language fundamentals ( 8085 based assembly language programming ). Assemblers-2-pass and single-pass. Macros and macroprocessors.

Loading, linking, relocation, program relocatability. Linkage editing. Text editors. Programming Environments. Debuggers and program

generators. Compilation and Interpretation. Bootstrap compilers. Phases of

compilation process. Lexical analysis. Lex package on Unix system. Context free grammars. Parsing and parse trees. Representation of

parse ( derivation ) trees as rightmost and leftmost derivations. Bottom up parsers-shift-reduce, operator precedence, and LR. YACC package on Unix system.

Topdown parsers-left recursion and its removal. Recursive descent parser. Predictive parser. Intermediate codes-Quadruples, Triples, Intermediate code generation, Code generation, Code optimization.

8. Operating Systems ( with Case Study of Unix ) :

Main functions of operating systems. Multiprogramming, multiprocessing, and multitasking.

Memory Management : Virtual memory, paging, fragmentation.

Concurrent Processing : Mutual exclusion. Critical regions, lock and unlock.

Scheduling : CPU scheduling, I / O scheduling, Resource scheduling. Deadlock and scheduling algorithms. Banker’s algorithm for deadlock handling.

Page 8: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

UNIX :

The Unix System : File system, process management, bourne shell, shell variables, command line programming.

Filters and Commands : Pr, head, tail, cut, paste, sort, uniq, tr, join, etc., grep, egrep, fgrep, etc., sed, awk, etc.

System Calls ( like ) : Creat, open, close, read, write, iseek, link, unlink, stat, fstat, umask, chmod, exec, fork, wait, system.

9. Software Engineering :

System Development Life Cycle ( SDLC ) : Steps, Water fall model, Prototypes, Spiral model.

Software Metrics : Software Project Management. Software Design : System design, detailed design, function oriented

design, object oriented design, user interface design. Design level metrics.

Coding and Testing : Testing level metrics. Software quality and reliability. Clean room approach, software re engineering.

10. Current Trends and Technologies :

The topics of current interest in Computer Science and Computer Applications shall be covered. The experts shall use their judgement from time to time to include the topics of popular interest, which are expected to be known for an application development software professional, currently, they include :

Parallel Computing :

Parallel virtual machine ( pvm ) and message passing interface ( MPI ) libraries and calls. Advanced architectures. Today’s fastest computers.

Mobile Computing :

Mobile connectivity – Cells, Framework, wireless delivery technology and switching methods, mobile information access devices, mobile data internetworking standards, cellular data communication protocols, mobile computing applications. Mobile databases – protocols, scope, tools and technology. M-business.

Page 9: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

E – Technologies :

Electronic Commerce : Framework, Media Convergence of Applications, Consumer Applications, Organisation Applications.

Electronic Payment Systems : Digital Token, Smart Cards, Credit Cards, Risks in Electronic Payment System, Designing Electronic Payment Systems.

Electronic Data Interchange ( EDI ) : Concepts, Applications, ( Legal, Security and Privacy ) issues, EDI and Electronic Commerce, Standardization and EDI, EDI Software Implementation, EDI Envelope for Message Transport, Internet – Based EDI.

Digital Libraries and Data Warehousing : Concepts, Types of Digital documents, Issues behind document Infrastructure, Corporate Data Warehouses.

Software Agents : Characteristics and Properties of Agents, Technology behind Software Agents ( Applets, Browsers and Software Agents ).

Broadband Telecommunications : Concepts, Frame Relay, Cell Relay, Switched Multimegabit Data Service, Asynchronous Transfer Mode. Main concepts in Geographical Information System ( GIS ), E – cash, E – Business, ERP packages.

Data Warehousing : Data Warehouse environment, architecture of a data warehouse methodology, analysis, design, construction and administration.

Data Mining : Extracting models and patterns from large databases, data mining techniques, classification, regression, clustering, summarization, dependency modelling, link analysis, sequencing analysis, mining scientific and business data.

Windows Programming :

Introduction to Windows programming – Win32, Microsoft Foundation Classes ( MFC ), Documents and views, Resources, Message handling in windows.

Simple Applications ( in windows ) : Scrolling, splitting views, docking toolbars, status bars, common dialogs.

Advanced Windows Programming :

Page 10: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

Multiple Document Interface ( MDI ), Multithreading. Object linking and Embedding ( OLE ). Active X controls. Active Template Library ( ATL ). Network programming.

Page 11: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

SECTION-1

TOPIC WISE

QUESTIONS

WITH

ANSWERS

Page 12: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

TOPIC 1 :Discrete Structures

Nov 2017

1. If the time is now 4 O’clock, what will be the time after 101 hours from now ?

(1) 9 O’clock (2) 8 O’clock (3) 5 O’clock (4) 4 O’clock

2. Let m=(313)4 and n=(322)4 Find the base 4 expansion of m+n.

(1) (635)4 (2) (32312)4

(3) (21323)4 (4) (1301)4

3. Let A=

𝟏 𝟏 𝟎𝟎 𝟏 𝟎𝟏 𝟏 𝟎𝟎 𝟎 𝟏

and B= 𝟏 𝟎 𝟎 𝟎𝟎 𝟏 𝟏 𝟎𝟏 𝟎 𝟏 𝟏

Find the boolean product A⊙ B of the two matrices.

(1)

1 1 1 00 1 1 01 1 1 01 0 1 1

(2)

1 1 0 10 1 0 11 1 1 01 0 1 1

(3)

1 1 0 10 1 1 01 1 1 01 0 1 1

(4)

1 1 1 00 1 1 01 0 1 11 0 1 1

4. How many distinguishable permutations of the letters in the word BANANA are there ?

(1) 720 (2) 120 (3) 60 (4) 360

5. Consider the graph given below :

Page 13: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

Use Kruskal’s algorithm to find a minimal spanning tree for the graph. The List of the

edges of the tree in the order in which they are choosen is ?

(1) AD, AE, AG, GC, GB, BF (2) GC, GB, BF, GA, AD, AE

(3) GC, AD, GB, GA, BF, AE (4) AD, AG, GC, AE, GB, BF

Note : None of the above answer

JAN 2017

1. Consider a sequence F00 defined as :

F00(0) = 1, F00 (1) = 1

F00(n) = (10* F00 (n-1) + 100 ) / F00 (n-2)

for n ≥ 2

Then what shall be the set of values of the sequence F00?

(1) (1, 110, 1200) (2) (1, 110, 600, 1200)

(3) (1, 2, 55, 110, 600, 1200) (4) (1, 55, 110, 600, 1200)

2. Match the following :

Page 14: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

SECTION 2 FULL PAPERS WITH

ANSWERS

Page 15: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

SOLVED PAPER NOV 2017 -- COMPUTER SCIENCE AND APPLICATIONS

PAPER - II

Note : This paper contains fifty (50) objective type questions of two (2) marks each. All

questions

are compulsory.

1. If the time is now 4 O’clock, what will be the time after 101 hours from now ?

(1) 9 O’clock (2) 8 O’clock (3) 5 O’clock (4) 4 O’clock

2. Let m=(313)4 and n=(322)4 Find the base 4 expansion of m+n.

(1) (635)4 (2) (32312)4

(3) (21323)4 (4) (1301)4

3. Let A=

𝟏 𝟏 𝟎𝟎 𝟏 𝟎𝟏 𝟏 𝟎𝟎 𝟎 𝟏

and B= 𝟏 𝟎 𝟎 𝟎𝟎 𝟏 𝟏 𝟎𝟏 𝟎 𝟏 𝟏

Find the boolean product A⊙ B of the two matrices.

(1)

1 1 1 00 1 1 01 1 1 01 0 1 1

(2)

1 1 0 10 1 0 11 1 1 01 0 1 1

(3)

1 1 0 10 1 1 01 1 1 01 0 1 1

(4)

1 1 1 00 1 1 01 0 1 11 0 1 1

4. How many distinguishable permutations of the letters in the word BANANA are there ?

(1) 720 (2) 120 (3) 60 (4) 360

5. Consider the graph given below :

Use Kruskal’s algorithm to find a minimal spanning tree for the graph. The List of the

edges of the tree in the order in which they are choosen is ?

(1) AD, AE, AG, GC, GB, BF (2) GC, GB, BF, GA, AD, AE

Page 16: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

(3) GC, AD, GB, GA, BF, AE (4) AD, AG, GC, AE, GB, BF

Note : None of the above

6. The Boolean function with the Karnaugh map

is :

(1) (A+C).D+B (2) (A+B).C+D

(3) (A+D).C+B (4) (A+C).B+D

7. The Octal equivalent of the binary number 1011101011 is :

(1) 7353 (2) 1353 (3) 5651 (4) 5657

8. Let P and Q be two propositions, ¬ (P ↔ Q) is equivalent to :

(1) P ↔ ¬ Q (2) ¬ P ↔ Q (3) ¬ P ↔ ¬ Q (4) Q → P

9. Negation of the proposition › x H(x) is :

(1) › x ¬ H(x) (2) ∀ x ¬ H(x) (3) ∀ x H(x) (4) ¬ x H(x)

10. The output of the following combinational circuit is F.

The value of F is :

(1) P 1 + P2P 3 (2) P 1 + P 2 P 3

Page 17: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

(3) P 1 + P 2 P 3 (4) P 1 +P 2 P 3

11. ‘ptrdata’ is a pointer to a data type. The expression *ptrdata++ is evaluated as (in C++) :

(1) *(ptrdata++) (2) (*ptrdata)++

(3) *(ptrdata)++ (4) Depends on compiler

12. The associativity of which of the following operators is Left to Right, in C++ ?

(1) Unary Operator (2) Logical not

(3) Array element access (4) addressof

13. A member function can always access the data in __________ , (in C++).

(1) the class of which it is member (2) the object of which it is a member

(3) the public part of its class (4) the private part of its class

14. Which of the following is not correct for virtual function in C++ ?

(1) Must be declared in public section of class.

(2) Virtual function can be static.

(3) Virtual function should be accessed using pointers.

(4) Virtual function is defined in base class.

15. Which of the following is not correct (in C++) ?

(1) Class templates and function templates are instantiated in the same way.

(2) Class templates differ from function templates in the way they are initiated.

(3) Class template is initiated by defining an object using the template argument.

(4) Class templates are generally used for storage classes.

Page 18: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

SECTION 3 FULL PAPERS UNSOLVED

FOR PRACTICE

Page 19: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

Unsolved PAPER NOV 2017 -- COMPUTER SCIENCE AND APPLICATIONS

PAPER - II

Note : This paper contains fifty (50) objective type questions of two (2) marks each. All

questions

are compulsory.

1. If the time is now 4 O’clock, what will be the time after 101 hours from now ?

(1) 9 O’clock (2) 8 O’clock (3) 5 O’clock (4) 4 O’clock

2. Let m=(313)4 and n=(322)4 Find the base 4 expansion of m+n.

(1) (635)4 (2) (32312)4

(3) (21323)4 (4) (1301)4

3. Let A=

𝟏 𝟏 𝟎𝟎 𝟏 𝟎𝟏 𝟏 𝟎𝟎 𝟎 𝟏

and B= 𝟏 𝟎 𝟎 𝟎𝟎 𝟏 𝟏 𝟎𝟏 𝟎 𝟏 𝟏

Find the boolean product A⊙ B of the two matrices.

(1)

1 1 1 00 1 1 01 1 1 01 0 1 1

(2)

1 1 0 10 1 0 11 1 1 01 0 1 1

(3)

1 1 0 10 1 1 01 1 1 01 0 1 1

(4)

1 1 1 00 1 1 01 0 1 11 0 1 1

4. How many distinguishable permutations of the letters in the word BANANA are there ?

(1) 720 (2) 120 (3) 60 (4) 360

5. Consider the graph given below :

Use Kruskal’s algorithm to find a minimal spanning tree for the graph. The List of the

edges of the tree in the order in which they are choosen is ?

(1) AD, AE, AG, GC, GB, BF (2) GC, GB, BF, GA, AD, AE

Page 20: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

(3) GC, AD, GB, GA, BF, AE (4) AD, AG, GC, AE, GB, BF

None of the above

6. The Boolean function with the Karnaugh map

is :

(1) (A+C).D+B (2) (A+B).C+D

(3) (A+D).C+B (4) (A+C).B+D

7. The Octal equivalent of the binary number 1011101011 is :

(1) 7353 (2) 1353 (3) 5651 (4) 5657

8. Let P and Q be two propositions, ¬ (P ↔ Q) is equivalent to :

(1) P ↔ ¬ Q (2) ¬ P ↔ Q (3) ¬ P ↔ ¬ Q (4) Q → P

9. Negation of the proposition › x H(x) is :

(1) › x ¬ H(x) (2) ∀ x ¬ H(x) (3) ∀ x H(x) (4) ¬ x H(x)

10. The output of the following combinational circuit is F.

The value of F is :

(1) P 1 + P2P 3 (2) P 1 + P 2 P 3

Page 21: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

(3) P 1 + P 2 P 3 (4) P 1 +P 2 P 3

11. ‘ptrdata’ is a pointer to a data type. The expression *ptrdata++ is evaluated as (in C++) :

(1) *(ptrdata++) (2) (*ptrdata)++

(3) *(ptrdata)++ (4) Depends on compiler

12. The associativity of which of the following operators is Left to Right, in C++ ?

(1) Unary Operator (2) Logical not

(3) Array element access (4) addressof

13. A member function can always access the data in __________ , (in C++).

(1) the class of which it is member (2) the object of which it is a member

(3) the public part of its class (4) the private part of its class

14. Which of the following is not correct for virtual function in C++ ?

(1) Must be declared in public section of class.

(2) Virtual function can be static.

(3) Virtual function should be accessed using pointers.

(4) Virtual function is defined in base class.

15. Which of the following is not correct (in C++) ?

(1) Class templates and function templates are instantiated in the same way.

(2) Class templates differ from function templates in the way they are initiated.

(3) Class template is initiated by defining an object using the template argument.

(4) Class templates are generally used for storage classes.

16. Which of the following is/are true with reference to ‘view’ in DBMS ?

(a) A ‘view’ is a special stored procedure executed when certain event occurs.

(b) A ‘view’ is a virtual table, which occurs after executing a pre-compiled query.

Code :

(1) Only (a) is true (2) Only (b) is true

(3) Both (a) and (b) are true (4) Neither (a) nor (b) are true

17. In SQL, __________ is an Aggregate function.

(1) SELECT (2) CREATE (3) AVG (4) MODIFY

18. Match the following with respect to RDBMS :

(a) Entity integrity (i) enforces some specific business rule that do not fall

into entity or domain

(b) Domain integrity (ii) Rows can’t be deleted which are used by other

records

Page 22: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

(c) Referential integrity (iii) enforces valid entries for a column

(d) Userdefined integrity (iv) No duplicate rows in a table

Code:

(a) (b) (c) (d)

(1) (iii) (iv) (i) (ii)

(2) (iv) (iii) (ii) (i)

(3) (iv) (ii) (iii) (i)

(4) (ii) (iii) (iv) (i)

19. In RDBMS, different classes of relations are created using __________ technique to

prevent modification anomalies.

(1) Functional Dependencies (2) Data integrity

(3) Referential integrity (4) Normal Forms

20. __________ SQL command changes one or more fields in a record.

(1) LOOK-UP (2) INSERT (3) MODIFY (4) CHANGE

21. Consider an array representation of an n element binary heap where the elements are

stored from index 1 to index n of the array. For the element stored at index i of the array

(i<=n), the index of the parent is :

(1) floor ((i+1)/2) (2) ceiling ((i+1)/2)

(3) floor (i/2) (4) ceiling (i/2)

22. The following numbers are inserted into an empty binary search tree in the given order

: 10, 1, 3, 5, 15, 12, 16. What is the height of the binary search tree?

(1) 3 (2) 4 (3) 5 (4) 6

23. Let G be an undirected connected graph with distinct edge weight. with maximum

weight Let Emax be the edge and Emin the edge with minimum weight. Which of the

following statements is false ?

(1) Every minimum spanning tree of G must contain Emin

(2) If Emax is in minimum spanning tree, then its removal must disconnect G.

(3) No minimum spanning tree contains Emax .

(4) G has a unique minimum spanning tree.

24. A list of n strings, each of length n, is sorted into lexicographic order using merge - sort

algorithm. The worst case running time of this computation is :

(1) O(n log n) (2) O(n2 log n)

(3) O(n2 + log n) (4) O(n

3)

25. Postorder traversal of a given binary search tree T produces following sequence of keys:

3, 5, 7, 9, 4, 17, 16, 20, 18, 15, 14

Page 23: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

Which one of the following sequences of keys can be the result of an in-order traversal of

the tree T ?

(1) 3, 4, 5, 7, 9, 14, 20, 18, 17, 16, 15

(2) 20, 18, 17, 16, 15, 14, 3, 4, 5, 7, 9

(3) 20, 18, 17, 16, 15, 14, 9, 7, 5, 4, 3

(4) 3, 4, 5, 7, 9, 14, 15, 16, 17, 18, 20

26. Which of the following devices takes data sent from one network device and forwards it

to the destination node based on MAC address ?

(1) Hub (2) Modem (3) Switch (4) Gateway

27. __________ do not take their decisions on measurements or estimates of the current

traffic and topology.

(1) Static algorithms (2) Adaptive algorithms

(3) Non - adaptive algorithms (4) Recursive algorithms

28. The number of bits used for addressing in Gigabit Ethernet is __________.

(1) 32 bits (2) 48 bits (3) 64 bits (4) 128 bits

29. Which of the following layer of OSI Reference model is also called end-to-end layer ?

(1) Network layer (2) Datalink layer

(3) Session layer (4) Transport layer

30. The IP address __________ is used by hosts when they are being booted.

(1) 0.0.0.0 (2) 1.0.0.0

(3) 1.1.1.1 (4) 255.255.255.255

31. Consider the following program fragment in assembly language :

mov ax, 0h

mov cx, 0A h

doloop :

dec ax

loop doloop

What is the value of ax and cx registers after the completion of the doloop ?

(1) ax=FFF5 h and cx=0 h (2) ax=FFF6 h and cx=0 h

(3) ax=FFF7 h and cx=0A h (4) ax=FFF5 h and cx=0A h

32. Consider the following assembly program fragment :

mov al, 11010110b

mov cl, 2

Page 24: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

rcl al, 3

rol al, 4

shr al, cl

mul cl

The contents of the destination register ax (in hexadecimal) and the status of Carry Flag

(CF) after the execution of above instructions, are :

(1) ax=003CH; CF=0 (2) ax=001EH; CF=0

(3) ax=007BH; CF=1 (4) ax=00B7H; CF=1

33. Which of the following regular expressions, each describing a language of binary

numbers (MSB to LSB) that represents non-negative decimal values, does not include even

values ?

(1) 0*1+0*1* (2) 0*1*0+1* (3) 0*1*0*1+ (4) 0+1*0*1*

Where {+, *} are quantification characters.

34. Which of the following statements is/are TRUE ?

(a) The grammar S → SS | a is ambiguous. (Where S is the start symbol)

(b) The grammar S → 0S1 | 01S is| € ambiguous. (The special symbol represents the

empty string) (Where S is the start symbol)

(c) The grammar (Where S is the start symbol)

S → T/U

T → x S y | xy | €

U → yT

generates a language consisting of the string yxxyy.

(1) Only (a) and (b) are TRUE. (2) Only (a) and (c) are TRUE.

(3) Only (b) and (c) are TRUE. (4) All of (a), (b) and (c) are TRUE.

35. Match the description of several parts of a classic optimizing compiler in List - I, with the

names of those parts in List - II :

List - I List - II

(a) A part of a compiler that is responsible for recognizing (i) Optimizer syntax.

(b) A part of a compiler that takes as input a stream of (ii) Semantic Analysis

characters and produces as output a stream of words along

with their associated syntactic categories.

(c) A part of a compiler that understand the meanings of (iii) Parser

variable names and other symbols and checks that they are

used in ways consistent with their definitions.

(d) An IR-to-IR transformer that tries to improve the IR (iv) Scanner

Page 25: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

program in some way (Intermediate Representation).

Code :

(a) (b) (c) (d)

(1) (iii) (iv) (ii) (i)

(2) (iv) (iii) (ii) (i)

(3) (ii) (iv) (i) (iii)

(4) (ii) (iv) (iii) (i)

36. In Distributed system, the capacity of a system to adapt the increased service load is

called __________ .

(1) Tolerance (2) Scalability (3) Capability (4) Loading

37. In __________ disk scheduling algorithm, the disk head moves from one end to other

end of the disk, serving the requests along the way. When the head reaches the other end, it

immediately returns to the beginning of the disk without serving any requests on the return

trip.

(1) LOOK (2) SCAN (3) C – LOOK (4) C - SCAN

38. Suppose there are six files F1, F2, F3, F4, F5, F6 with corresponding sizes 150 KB, 225

KB, 75 KB, 60 KB, 275 KB and 65 KB respectively. The files are to be stored on a

sequential device in such a way that optimizes access time. In what order should the files be

stored ?

(1) F5, F2, F1, F3, F6, F4 (2) F4, F6, F3, F1, F2, F5

(3) F1, F2, F3, F4, F5, F6 (4) F6, F5, F4, F3, F2, F1

39. Which module gives control of the CPU to the process selected by the short - term

scheduler?

(1) Dispatcher (2) Interrupt (3) Schedular (4) Threading

40. Two atomic operations permissible on Semaphores are __________ and __________.

(1) wait, stop (2) wait, hold (3) hold, signal (4) wait, signal

41. Software does not wear-out in the traditional sense of the term, but software does tend

to deteriorate as it evolves, because :

(1) Software suffers from exposure to hostile environments.

(2) Defects are more likely to arise after software has been used often.

(3) Multiple change requests introduce errors in component interactions.

(4) Software spare parts become harder to order.

42. Software re-engineering is concerned with :

Page 26: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

(1) Re-constructing the original source code from the existing machine (low - level) code

program and modifying it to make it more user - friendly.

(2) Scrapping the source code of a software and re-writing it entirely from scratch.

(3) Re-organising and modifying existing software systems to make them more

maintainable.

(4) Translating source code of an existing software to a new machine (low - level) language.

43. Which of the following is not a key issue stressed by an agile philosophy of software

engineering ?

(1) The importance of self-organizing teams as well as communication and collaboration

between team members and customers.

(2) Recognition that change represents opportunity.

(3) Emphasis on rapid delivery of software that satisfies the customer.

(4) Having a separate testing phase after a build phase.

44. What is the normal order of activities in which traditional software testing is organized

?

(a) Integration Testing

(b) System Testing

(c) Unit Testing

(d) Validation Testing

Code :

(1) (c), (a), (b), (d)

(2) (c), (a), (d), (b)

(3) (d), (c), (b), (a)

(4) (b), (d), (a), (c)

45. Which of the following testing techniques ensures that the software product runs

correctly after the changes during maintenance ?

(1) Path Testing (2) Integration Testing

(3) Unit Testing (4) Regression Testing

46. Which of the following Super Computers is the fastest Super Computer ?

(1) Sun-way TaihuLight 2) Titan

(3) Piz Daint (4) Sequoia

47. Which of the following statements about ERP system is true ?

(1) Most ERP software implementations fully achieve seamless integration.

Page 27: How to use this eBook - educationjockey.com · How to use this eBook This ebook has 3 Sections. Section 1: section-1 of this ebook contains Topic wise questions from previous year

(2) ERP software packages are themselves combinations of seperate applications for

manufacturing, materials, resource planning, general ledger, human resources, procurement and

order entry.

(3) Integration of ERP systems can be achieved in only one way.

(4) An ERP package implemented uniformly throughout an enterprise is likely to contain

very flexible connections to allow charges and software variations.

48. Which of the following is not a Clustering method ?

(1) K - Mean method (2) Self Organizing feature map method

(3) K - nearest neighbor method (4) Agglomerative method

49. Which of the given wireless technologies used in IoT, consumes the least amount of

power ?

(1) Zigbee (2) Bluetooth (3) Wi-Fi (4) GSM/CDMA

50. Which speed up could be achieved according to Amdahl’s Law for infinite number of

processes if 5% of a program is sequential and the remaining part is ideally parallel ?

(1) Infinite (2) 5 (3) 20 (4) 50