Friday, 29 July 2016

HSST Computer Science Solved Paper (SR For ST) 144/2013 - Part 3

21.       The expansion of nested macro calls follows ............... rule
(A) LILO             (B) LIFO
(C) FIFO            (D) priority
Answer: B
22.       Von Neumann architecture is
(A) SISD            (B) SIMD
(C) MIMD           (D) MISD
Answer: A
23.       The device that is used to forward data packets from one network to another is called a .....................
(A) Bridge          (B) Hub
(C) Switch         (D) Gateway
Answer: C
24.       Which among the following is the most general phrase structured grammar ?
(A) Context – Sensitive          (B) Context - Free
(C) Regular                               (D) None of the above
Answer: A
25.       When the following instructions have been executed, what will be the contents of register AL ?
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
(A) 0A and carry flag is reset
(B) 0A and carry flag is set
(C) 6A and carry flag is reset
(D) 6A and carry flag is set
Answer: B

26.       The first modern computer was called ..................
(A) UNIVAC-I    (B) FLOW-MATIC
(C) ENIAC         (D) INTEL
Answer: C
27.       In which of the language paradigms is the addition of two values expressed as (+ 10 20)?
(A) procedural  (B) functional
(C) logic             (D) object-oriented
Answer: Question Cancelled
28.       What is the purpose of this bit of code
void init()
{
...
}
(A) A place to declare variables
(B) A required method in an applet
(C) A class that initializes the applet
(D) Interacting with the user
Answer: B
29.       In Relational Algebra the query that finds customers who have a balance of over 800 is
(A) Πcustomer_name(σ balance >800(Deposit))
(B) σcustomer_name(Πbalance>800(Deposit))
(C) Πcustomer_name(σbalance>800(Borrow))
(D) σcustomer_name(Πbalance>500(Borrow))
Answer: A
30.    Secret-key encryption is also known as
(A) Secret-encryption              (B) Asymmetric encryption
(C) Symmetric encryption      (D) Private encryption
Answer: C


0 comments:

Post a Comment