Wednesday, 19 October 2016

HSST Computer Science Solved Paper 19.09.2012 Cat. No.111.2010 - Part 2

21.       A hardware interface that allows for the connection of several peripheral devices to a single PCI board.
(A) SCSI                        (B) SATA
(C) ATA                         (D) PCI
Answer: A
22.       If n represents the dimension of cube and K, the radix (no. of nodes along each dimensions) then the number of nodes N of a k-ary n-cube network is:
(A) N=nk                        (B) N=logk n
(C) N=logn k      (D) N=kn
Answer: D
23.       The output generated by the following C program:
#include<stdio.h>
main()
{
int v=3;
int *pv;
pv=&v;
*pv=0;
printf(“*pv=%d v=%d”,*pv,v);
}
(A) *pv=0 v=0                (B) *pv=0 v=3
(C) *pv=3 v=3               (D) *pv=3 v=0
Answer: A
24.       A famous technique used in data warehousing:
(A) OODM                     (B) OLTP
(C) OLAP                      (D) ODBC
Answer: C
25.       The environment variable in Linux, that contain a list of directories the shell automatically recognizes.
(A) $PATH                    (B) $ENV
(C) $USER                   (D) $GREP
Answer: A
26.       Not an Anti-virus software:
(A) McAfee                    (B) Norton
(C) AVG                         (D) TROJAN 
Answer: D
27.       The following IP address format refers to:
D31
D30
D29
D28-D8
D7-D0
1
1
0
NETWORK
HOST
(A) Class A Addresses                       (B) Class B Addresses
(C) Class C Addresses                       (D) Class D Addresses
Answer: C
28.       In C++, a pointer that is automatically being passed to a member function during its invocation is:
(A) Base pointer                       (B) Derived pointer
(C) Virtual pointer                    (D) this pointer
Answer: D
29.       With QBE, inserting records from one or more source tables into a single target table can be achieved by:
(A) Append action query                    (B) Update action query
(C) Insert action query                                    (D) Make table action query
Answer: A
30.    Not an example of a network debugging utility:
(A) ping                         (B) nslookup
(C) traceroute               (D) telnet
Answer: D

31.    A secure protocol for personal emails:
(A) SSL              (B) PGP
(C) RSA             (D) Kerberos
Answer: B
32.    If f and g are functions, then f(n)=q(g(n)) if:
(A) f(n)=O(g(n))
(B) f(n)=W(g(n))
(C) f(n)=O(g(n)) or f(n)=W(g(n))
(D) f(n)=O(g(n)) and f(n)=W(g(n))
Answer: D
33.    Simplified form of the Boolean expression Y=A’BC’D’+ABC’D’+A’BCD’+ABCD’ is:
(A) C’D’ (B) CD’
(C) BD’  (D) BC’
Answer: C
Explanation:
Y= A’BC’D’+ABC’D’+A’BCD’+ABCD’
 =(A’+A)BC’D’+(A’+A)BCD’=BC’D’+BCD’=BD’(C’+C)=BD’
34.    The postfix form of the expression (A+B)*C-D/E is:
(A) AB+C*DE/-             (B) ABC*+DE/-
(C) ABCDE+*-/             (D) AB+C*DE-/
Answer: A
35.    When a process is accessing shared modifiable data, the process is said to be in:
(A) Dead lock                           (B) Critical Section
(C) Multitasking                       (D) Context Switching
Answer: B
36.    The first MPI function call made by every MPI process is the call to:
(A) MPI_Main()             (B) MPI_Wtick()
(C) MPI_Init()                (D) MPI_Bcast()
Answer: C
37.    The output generated by the following C program does not include the value:
#include<stdio.h>
main()
{
int n=3;
while(n>1)
{
if((n%2)!=1)
n=n/2;
else
n=3*n+1;
printf(“%d\n”,n);
}
}
(A) 5       (B) 6
(C) 8       (D) 16
Answer: B
38.    Boundary value analysis is a method for:
(A) White box testing              (B) Black box testing
(C) Structural testing               (D) Mutation testing
Answer: B
39.    Dijkstra’s Banker’s algorithm is used for:
(A) Deadlock Prevention                    (B) Deadlock Detection
(C) Deadlock Recovery                      (D) Deadlock Avoidance
Answer: D
40.   
 is a famous law in logic known as:
(A) Euclidian Law                    (B) Karnaugh Law
(C) Turing’s Law                      (D) De Morgan’s Law
Answer: D

Pages   2   3   4   5 

0 comments:

Post a Comment