APPSC-2012-DL-CS
Question 1 |
The storage place that holds data and instruction temporarily within CPU is
Accumulator | |
Bus | |
Register | |
Addresses |
Question 1 Explanation:
Register holds both data and instruction temporarily within the CPU .
Note that Accumulator holds only data and not the instruction.
Note that Accumulator holds only data and not the instruction.
Question 2 |
Which of the following supports the concept of multiple inheritance?
C++ | |
Java | |
Both C++ and Java | |
None |
Question 2 Explanation:
C++ supports multiple inheritance whereas java does not.
Question 3 |
Which of the following statements is false?
A tree contains a cycle
| |
Every tree is a graph
| |
A tree with N nodes contain N-1 edges | |
All the above
|
Question 3 Explanation:
A tree does not contain a cycle. A tree with n vertices contains n-1 edges. And every tree is a graph.
Question 4 |
Match the following typical example problems with suitable algorithm-design paradigms
A: Minimal Spanning Tree
B: Binary Search Algorithm
C: Depth-First Search
D: Optimization
I: Divide and Conquer
II: Greedy Method
III: NLP
IV: Backtracking
A-II, B-I, C-IV, D-III
| |
A-III, B-II, C-IV, D-I
| |
A-III, B-I, C-IV, D-II
| |
A-IV, B-I, C-II, D-III |
Question 4 Explanation:
A. Minimal spanning tree is a greedy algorithm.
B. Binary Search algorithm is a divide and conquer strategy.
C. Depth first search algorithm is a backtracking method.
D. Optimization is a NLP method.
B. Binary Search algorithm is a divide and conquer strategy.
C. Depth first search algorithm is a backtracking method.
D. Optimization is a NLP method.
Question 5 |
What is the output of the following Pascal program segment?
{c: array [1..10] of integer;
m, n, temp : integer;
procedure r (k, j : integer)
begin
k :=k+1; j :=j+2;
end r;
…
m :5; n := 3;
r(m, n)
temp;=m; m:=n; n:temp;
write m, n;
}
3, 5
| |
5, 3 | |
Either 3, 5 or 5, 3 | |
Unpredictable | |
Answer the above question with explanation |
Question 6 |
Which of the following statements is false?
An unambiguous grammar has the same leftmost and rightmost derivation | |
An LL(1) parser is a top-down parser | |
LALR is more powerful than SLR | |
An unambiguous grammar can never be LR(k) for any k |
Question 6 Explanation:
1 is false because unambiguous grammar need not have the same leftmost and rightmost derivation.
4 is false because the correct statement is an ambiguous grammar can never be LR(K) for any k.
4 is false because the correct statement is an ambiguous grammar can never be LR(K) for any k.
Question 7 |
With respect to paging, which of the following is false
It is based on a linear logical memory addressing concept. | |
Entire program need not be loaded into memory before execution | |
It suffers from both internal and external fragmentations | |
Page table is not required once a program is loaded |
Question 7 Explanation:
paging does not suffers from external fragmentation because space allocated to a process need not be contiguous. But paging suffers from internal fragmentation because on an average half of the last page of process gets wasted.
Question 8 |
Relation R with an associated set of functional dependencies F is decomposed into BCNF. The redundancy (arising out of functional dependencies) in the resulting set of relations is
Zero | |
More than Zero but less than that of an equivalent 3NF | |
Proportional to the size of F+ | |
Indeterminate |
Question 8 Explanation:
Redundancy in the resulting set of relations decomposed BCNF is zero.
Question 9 |
A wire frame model is
visual presentation of an electronic representation of a 3D physical object | |
exploits hidden line removal via cutting planes | |
allows visualization of the underlying design structure of a 3D model | |
all the above |
Question 10 |
In which layer of the OSI model, DBMS and email software are found
Presentation Layer | |
Transport layer | |
Application Layer | |
Sessional layer |
Question 10 Explanation:
Both the end user and the application layer interact with the software applications.
Question 11 |
The consistency model supported in IVT (Integrated shared virtual memory at yale) is
Sequential Consistency | |
General Consistency | |
Strict Consistency | |
Weak Consistency | |
Update it |
Question 12 |
____________ is the assurance that the application will perform its intended function with the required precision over an extended period of time
Compatibility | |
Reliability | |
Maintainability | |
portability | |
Update it |
Question 13 |
Which sorting method is best suited for external sorting?
Quick Sort | |
Heap Sort | |
Merge sort | |
All the above |
Question 13 Explanation:
External sorting is a term for a class of sorting algorithms that can handle massive amounts of data. External sorting is required when the data being sorted do not fit into the main memory of a computing device (usually RAM) and instead they must reside in the slower external memory (usually a hard drive). External sorting typically uses a hybrid sort-merge strategy. In the sorting phase, chunks of data small enough to fit in main memory are read, sorted, and written out to a temporary file. In the merge phase, the sorted sub-files are combined into a single larger file.
Question 14 |
Which of the following is a symmetric key algorithm?
Blowfish | |
IDEA | |
AES | |
All the above |
Question 14 Explanation:
Blowfish,IDEA,AES all are private key or symmetric key encryption algorithms.
Question 15 |
Which of the following is a random access (primary) memory?
Disk | |
Tape | |
ROM | |
None |
Question 15 Explanation:
Disk ,Tape ,ROM are all permanent storage memory.
Question 16 |
The main difference between a CISC and a RISC processor is/are that a RISC processor typically has
Has fewer instructions and addressing modes | |
Has more registers | |
Easy to implement using hardwired control logic | |
All of the above |
Question 16 Explanation:
All of the above statements are the characteristics of RISC processor.
Question 17 |
What is the proper way of defining a class named A so that it cannot be subclassed?
class A{ } | |
abstract final class A { } | |
class A {final;} | |
final class A { } |
Question 18 |
BFS uses the following data structure to hold nodes that are waiting to be processed
Queue | |
Stack | |
File | |
All the above |
Question 18 Explanation:
BFS uses Queue data structure.
DFS uses Stack data structure.
Question 19 |
Which of the following is not a right paradigm for solving the 0/1-knapsack problem?
Dynamic Programming | |
Branch and Bound | |
Greedy Approximation | |
Divide and Conquer |
Question 19 Explanation:
0/1-knapsack problem is a dynamic programming paradigm.
Question 20 |
__________ is the enforcement of a clear separation between the abstract properties of a data type and the concrete details of its implementation.
Control Abstraction | |
Data Abstraction | |
Abstract Data Type (ADT) | |
None of the above |
Question 21 |
Type checking is normally done during
Lexical Analysis | |
Syntax-directed Translation | |
Syntax Analysis | |
Code Optimization |
Question 21 Explanation:
Type checking is normally done during syntax-directed translation.
Question 22 |
System call is a
A mechanism used by a program to request service from the OS | |
A mechanism used by a programmer to request service from the administrator. | |
A mechanism used by a programmer to request service from the I/O devices. | |
All the above |
Question 22 Explanation:
System call is a mechanism used by a program to request service from OS.