Computer Science
Computer Science
TEST BOOKLET
INSTRUCTIONS TO CANDIDATES
1. Please do not open this Question Booklet until asked to do so.
2. Check the completeness of the Question Booklet immediately after opening.
3. Enter your Hall Ticket No. on the Test Booklet in the box provided alongside. Do not write
anything else on the Test Booklet.
up Test Booklet Serial No. & OMR Answer Sheet Serial No. in the Attendance Sheet carefully.
5. Each question has four answer options marked (A), (B), (C) & (D).
6. Answers are to be marked on the Answer Sheet, which is provided separately.
7. Choose the most appropriate answer option and darken the oval completely, corresponding to
(A), (B), (C) or (D) against the relevant question number.
8. Use only Blue/Black Ball Point Pen to darken the oval for answering.
9. Please do not darken more than one oval against any question, as scanner will read such markings
as wrong answer.
10. Each question carries equal marks. There will be no negative marking for wrong answer.
11. Electronic items such as calculator, mobile, etc., are not permitted inside the
examination hall.
12. Don’t leave the examination hall until the test is over and permitted by the invigilator.
13. The candidate is required to handover the original OMR sheet to the invigilator and
take the question booklet along with the candidate’s copy of OMR sheet after completion
of the test.
14. Sheet for rough work is appended in the Test Booklet at the end.
W-Computer Science-57 2
struct is replaced by
union will be:
struct data
{char x;
}d1;
(A) 8
(B) 6
(C) 5
(D) 4
(A) r
(B) w+
(C) +a
(D) a
6. What is the output of the following C code?
#include<stdio.h>
int main(){
int a=5, b, c;
b=++a;
c=b++;
printf(“%d”, c++);
}
(A) 5
(B) 6
(C) 7
(D) 8
7. What does the following algorithm do?
for i=1 to n-1
for j=i+1 to n
If (A[i]>A[j])
T=A[i]
A[i]=A[j]
A[j]=T
[End of inner for-loop]
[End of outer for-loop]
(A) Display the numbers 1 to n
(B) Display the numbers 1 to n in reverse order
(C) Arrange a list of numbers in increasing order of values
(D) Arrange a list of numbers in decreasing order of values
W-Computer Science-57 4
11. W
(A) AB/C+DEF-*+
(B) AB/CDEF-*++
(C) AB/C+DEF*-+
(D) AB/CD+EF-*+
12. The Inorder and Preorder traversal of a binary tree produces the following sequence.
Inorder: B E D A H F I C J G
Preorder: A B D E C F H I G J
(A) JGIHFCEDBA
(B) GJCIFHADEB
(C) EDBHIFJGCA
13. The order of time to locate an item in a doubly linked list with n nodes will be:
(A) O(1)
(B) O(n)
(C) O(n2)
(D) O(logn)
14. The height difference between the left and right subtree of any node in an AVL
tree is:
(A) 0
(B) -1
(C) +1
15. Which traversal method would arrange the values stored in a Binary Search tree in ascending
order?
(A) Preorder
(B) Postorder
(C) Inorder
(D) Level-by-level
memory?
(A) 2-D array
(B) Single linked list
(C) Binary tree
(D) Stack
18. An empty circular linked list with head node has at least ……….number of node(s).
(A) 0
(B) 1
(C) 2
(D) Can’t be determined
19. Which of the following statement is true for an output restricted deque?
(A) Allows insertion of items only at one end
(B) Allows insertion of items at both the ends
(C) Allows deletion of items at both the ends
(D) Does not allow deletion of items
20. What will be the maximum number of edges in an undirected graph with 10 vertices having
no self-loops?
(A) 100
(B) 90
(C) 45
(D) 50
(C) ceil(x)
(D) next(x)
32. Which of the following is a valid Java declaration?
(A) int arr[ ] [ ]= { {1, 1, 1, 1}, {2, 2, 2, 2} };
(B) arr=new int[2] [4 ];
(C) int arr[ ] [ ]=new int[2] [4 ];
(D) All of the above
33. The lifecycle of a Java thread includes the following states
(A) runnable, running, dead
(B) runnable, blocked, dead
(C) running, blocked, dead
(D) All of the above
W-Computer Science-57 8
34. Whe
(A) To create an object
(B) To allocate memory space to an object
(C) To reclaim memory space used by an object
(A) Private
(B) Public
(C) Protected
(D) Friendly
36. Which inheritance type is used in the following class declaration?
class A : public X, public Y
{
}
(A) Multilevel inheritance
(B) Multiple inheritance
(C) Hierarchical Inheritance
(D) Hybrid inheritance
37. Which of the following class does not override equals() method?
(A) java.lang.String
(B) java.lang.Double
(C) java.lang.StringBuffer
(D) java.lang.Character
38. Which two are valid constructors for Thread?
i. Thread (Runnable r, String name)
ii. Thread()
iii. Thread(int priority)
iv. Thread(Runnable r, int priority)
(A) i and iii
(B) ii and iv
(C) i and ii
(D) ii and iii
(A) Try
(B) Catch
(C) Finally
(D) Thrown
(A) P -> Q ~P Q
(A) 3
(B) 6
(C) 8
(D) 9
44. Which of the following is the correct representation of the sentence “some real numbers are
integers”?
W-Computer Science-57 10
45. The ease with which software can be transferred from one platform to another is referred to
as ……………..
(A) Usability
(B) Portability
(C) Reliability
(D) Transferability
46. Which of the following process model was introduced by Boehm?
(A) Waterfall
(B) Prototyping
(C) Iterative Waterfall
(D) Spiral
47. Which of the following is not included in the feasibility study during a software development
process?
(A) Technical feasibility
(B) Economic feasibility
(C) Developer feasibility
(D) Operational feasibility
48. The degree of interdependence among software modules is called ……………….
(A) Cohesion
(B) Coupling
(C) Interoperability
(D) Software integration
49. Which of the following software testing strategy is meant to test the internal structure of a
software?
(A) White box testing
(B) Black box testing
(C) Beta testing
(D) Stress testing
50. Which of the following is not a type of software maintenance?
(A) Corrective
(B) Preventive
(C) Adaptive
(D) Fault tolerant
W-Computer Science-57 12
(A) Single-level
(B) Two-level
(C) Tree structured
(D) Acyclic graph
58. Overlapped swapping can
(A) Increase overall swapping time
(B) reduce overall swapping time
(C) does not require any swapping time
(D) deteriorate system performance
59. Which of the following strategy would allocate the largest memory block to a requesting
process?
(A) First-Come-First-Serve
(B) Shortest-Remaining-Time-First
(C) Round-Robin
63. How many page faults will be encountered for the memory reference string 1, 2, 3, 4, 1, 2, 5,
1, 2, 3, 4, 5 using optimal page replacement technique with 4 frames per process?
(A) 4
(B) 5
(C) 6
(D) 7
65. Which of the following disk scheduling is also known as Elevator algorithm?
(A) Shortest-Seek-Time-First
(B) First-Come-First-Serve
(C) SCAN
(D) C-Look
W-Computer Science-57 14
67. Which of the following can be used as a synchronization tool?
(A) Buffering
(B) Rendezvous
(C) Semaphore
is referred as ………..
*******
W-Computer Science-57 16