28-Computer Science
28-Computer Science
10. Which one of the following is true for a typical RISC architecture?
(A) Makes use of micro programmed control unit
(B) Makes use of Hardwired control unit
(C) Much smaller cache than CISC processor
(D) Supports many addressing modes
(E) Answer not known
12. After fetching the instructions from the memory, the binary code of
the instructions is stored in which one of the following?
(A) Accumulator (B) Again in memory
(C) Instruction pointer (D) Instruction Register
(E) Answer not known
14. The Von Neumann bottleneck can be attributed to which one of the
following?
(A) Mismatch between the speeds of the primary and secondary
storages
(B) Mismatch between the speed of CPU and primary storages
(C) Slow speed of Input/Output devices
(D) Low clock speed
(E) Answer not known
19. What is the time taken to execute an ‘n’ cycle instruction if ‘i’
operations are performed without using pipeline?
(A) (n. i) cycles (B) (n –1) cycles
(C) (n +1) cycles (D) (n + i –1) cycles
(E) Answer not known
22. A –––––––––– tree is a complete binary tree in which each node has a
smaller key than its children.
(A) Red-black tree (B) Heap tree
(C) Skewed tree (D) AVL tree
(E) Answer not known
23. How many passes does bubble sorting technique require to sort an
array on ‘n’ elements?
(A) 1 (B) n
(C) n–1 (D) n – 2
(E) Answer not known
25. The worst case and average case running time of a heap sort is
(A) O(n log n) and O(n2 ) (B) O(n log n) and O(n log n)
(C) O(n2 ) and O(n log n) (D) O(log n) and O(n log n)
(E) Answer not known
32. If 2, 1, 5, 8 are the stack contents with element 2 being at the top of
the stack, then what will be the stack contents after following
operations:
(i) PUSH (11)
(ii) POP ( )
(iii) POP ( )
(iv) POP ( )
(v) PUSH (7)
(A) 11, 2, 1 (B) 8, 11, 7
(C) 7, 5, 8 (D) 5, 8, 7
(E) Answer not known
34. Which one of the following is true to access the records in sequential
files?
(A) Records are accessed one by one
(B) Records are accessed directly
(C) Records are accessed with unique key
(D) Records are accessed with primary key
(E) Answer not known
35. What is the name of the function, which returns a pointer to the
first occurrence of S2 in S1?
(A) Strcmp (s1, s2) (B) Strcat (s1, s2)
(C) Strchr (s1, s2) (D) Strstr (s1,s2)
(E) Answer not known
47. The situation that some buckets are assigned more records than are
others, so a bucket may overflow even when other buckets still have
space is known as
(A) Insufficient buckets (B) Bucket skew
(C) Bucket overflow (D) Bucket chaining
(E) Answer not known
49. Which normal form satisfies the condition that, it cannot be further
non-loss decomposed?
(A) 3 NF (B) 4 NF
(C) BCNF (D) 5 NF
(E) Answer not known
51. When matching records are only displayed from both the tables, it is
called as
(A) Self-join (B) Inner-join
(C) Outer-join (D) Equi join
(E) Answer not known
55. Data should be correct with respect to the real world entity that
they represent, is known as
(A) Persistence (B) Validity
(C) Consistency (D) Independence
(E) Answer not known
57. The model which is useful for representing records which have
many-to-many relationships is known as
(A) Relational Data Model (B) Hierarchical Data Model
(C) Network Data Model (D) Both (A) and (B)
(E) Answer not known
287 - Computer Science 16
58. –––––––––– is defined as the data about data.
(A) Information (B) Knowledge
(C) Intelligence (D) Metadata
(E) Answer not known
59. In –––––––––– organization the data are shared, secured and has
quick access time.
(A) File (B) Data base
(C) Computer (D) Network
(E) Answer not known
60. In –––––––––– phase, a transaction may release locks, but may not
obtain any new locks.
(A) Normalization (B) Growing
(C) Rollback (D) Shrinking
(E) Answer not known
64. The –––––––––– attribute is set to the URL of the target resource.
(A) SRC (B) HREF
(C) LINK (D) URL
(E) Answer not known
70. –––––––––– are the virtual locations on IRC network where users
meet to talk to one another.
(A) Channels (B) Frames
(C) Web Directory (D) Search Engines
(E) Answer not known
72. Which technique removes the ‘‘dead air’’ or blank space from the
front of a recording and any unnecessary extra time off the end is
your first sound editing task?
(A) Splicing (B) Assembly
(C) Trimming (D) Normalize
(E) Answer not known
84. Find the correct threat action using the following statement
‘‘Sensitive dates are directly released to an unauthorized entity’’
(A) Exposure (B) Intrusion
(C) Interception (D) Inference
(E) Answer not known
86. Which is the open source tool deployed by the private cloud?
(A) Eucalyptus (B) Amazon AWS
(C) Microsoft Azure (D) IBM Blue cloud
(E) Answer not known
94. Name the threshold value that a minimizing node represents the
beta in alpha-beta pruning.
(A) Middle bound (B) Upper bound
(C) Lower bound (D) Minimum bound
(E) Answer not known
{ }
101. A k (i, j ) = min A k −1 (i, j ), A k −1 (i, k ) + A k −1 (k, j ) , where k ≥1 is
releated
(A) Single source shortest path problem
(B) All-pairs shortest path problem
(C) Spanning tree problem
(D) Minimum spanning tree problem
(E) Answer not known
109. Write the CFG productions for the language over = {a, b}
{
L = a nbm a 2n |n, m ≥ 0}
(A) S → aSaa | B, B → bB |∈ (B) S → aSa | B, B → bB |∈
(C) S → abS |∈ (D) S → aaSa | B, B → Bb|∈
(E) Answer not known
115. –––––––––– served as the input language for many systems that
process strings.
(A) Programming languages (B) Strings
(C) Regular sets (D) Regular expressions
(E) Answer not known
119. The state for which there are no outgoing transitions and leads to
some non-final state is called as
(A) Start state (B) Accepting state
(C) Sink state (D) Intermediate state
(E) Answer not known
120. Which automation can only access the information on its stack in a
last-in-first-out way?
(A) Linear bounded automation
(B) Deterministic finite automation
(C) Push down automation
(D) Non-deterministic finite automation
(E) Answer not known
(A) M 2 × n2 (B) M + n
(C) M ×n (D) M × n2
(E) Answer not known
(A) Unambiguous
(B) Ambiguous
(C) Ambiguous or not depends on the given sentence
(D) Context free and context sensitive
(E) Answer not known
137. A table which stores all the terminal symbols used in a program is
called
(A) Identifier table (B) Uniform symbol table
(C) Terminal symbol table (D) Literal table
(E) Answer not known
144. Find out the two limitations of the WAP architecture in wireless
web access.
(A) The limitation of home agent, the low data rates
(B) The limitations of mobile node, the low data rates
(C) The limitations of foreign agent, the low data rates
(D) The limitations of mobile network, the low data rates
(E) Answer not known
145. Which alternative addresses, the peer may use to access this session
service user? It can be used to facilitate a switch to a news bearer
when a session is resumed.
(A) Foreign address (B) Home address
(C) Aliases (D) Server address
(E) Answer not known
147. Which provides security services between the mobile device and the
WAP gateway?
(A) Wireless Transport Layer Security (WTLS)
(B) Wireless Transaction Protocol Security (WTPS)
(C) Wireless Session Layer Security (WSLS)
(D) Wireless Datagram Layer Security (WDLS)
(E) Answer not known
157. MAC protocol comes under the which layer is OSI model.
(A) Network layer (B) Physical layer
(C) Data link layer (D) Session layer
(E) Answer not known
160. If the care-of-address is co-located, the mobile node send the request
for registration directly to
(A) The foreign agent
(B) The home agent
(C) Both the foreign agent and the home agent
(D) Either foreign agent or home agent
(E) Answer not known
164. Which one of the following risk is associated with technology that
might affect product development
(A) Requirement changes (B) Estimation risk
(C) Organizational risk (D) Managerial risk
(E) Answer not known
165. Which are the two main approaches to the identification of risk?
(A) Index and content
(B) Format and frame work
(C) Check list and brainstorming
(D) Planning and Implementation
(E) Answer not known
166. What is the risk prevention principle that encourages the free flow
of information between all project levels?
(A) Integrate management (B) Forward-looking view
(C) Open communication (D) Teamwork
(E) Answer not known
168. What is the name of the process that ensures resource demand does
not exceed resource availability
(A) Resource leveling (B) Resource smoothing
(C) Resource aggregation (D) Resource verification
(E) Answer not known
173. The function points are equivalent to –––––––––– for any given
project.
(A) Function count * Technical complexity factor
(B) Function count / Technical complexity factor
(C) Technical complexity factor / Function count
(D) Function count + Technical complexity factor
(E) Answer not known
176. –––––––––– include the salaries and other employment costs of the
staff involved in the development project and all associated costs.
(A) Development costs (B) Setup costs
(C) Operational costs (D) Maintenance costs
(E) Answer not known
177. –––––––––– the degree of uncertainity that the product will meet its
requirements and be fit for its intended use.
(A) Cost risk (B) Performance risk
(C) Support risk (D) Schedule risk
(E) Answer not known
193. –––––––––– defines the outside (actors) and inside (use case) of the
system behavior.
(A) Use case model (B) Domain object model
(C) Analysis object model (D) Test model
(E) Answer not known
195. Which one captures the intended behavior of the system, that are
developing without having to specify how that behavior is
implemented?
(A) Collaborative (B) Use case
(C) Deployment (D) State machine
(E) Answer not known
200. One general rule for –––––––––– is that use names with which the
users (or) clients are comfortable.
(A) Naming attributes (B) Naming classes
(C) Naming Entities (D) Naming activities
(E) Answer not known
–––––––––––––––––––