TNPSC-2017-Polytechnic-CS

Question 1
If there are ‘n’ number of states in NFA, then its equivalent DFA may contain atmost ________ number of states.
A
2n
B
n
C
n2
D
2n+1
Question 1 Explanation: 
If there are ‘n’ number of states in NFA ,then its equivalent DFA may contain atmost 2n number of states.
Question 2
To get the PDA, the CFG should be in the form of :
A
CFG
B
GNF
C
RE
D
CNF
Question 2 Explanation: 
To get the PDA, the CFG should be in the form of GNF.
Question 3
One of the uses of CNF is to turn parse tree into :
A
AVL trees
B
Binary search trees
C
Binary trees
D
None of the above
Question 3 Explanation: 
One of the uses of CNF is to turn parse trees into binary trees. – These trees have some convenient properties, one of which we exploit here.
Theorem 7.17: Suppose we have a parse tree according to a Chomsky- Normal-Form grammar G = (V, T, P, S), and suppose that the yield of the tree is a terminal string w.
Question 4
The grammar A→AA|(A)|∈ is not suitable for predictive parsing because the grammar is:
A
Ambiguous
B
Left - Recursive
C
Right Recursive
D
An operator grammar
Question 4 Explanation: 
Let’s draw parse tree for string ‘( )’

Since for the given string two parse trees are possible. So the given grammar is ambiguous.
Question 5
The overall logical structure of a database can be expressed graphically by:
A
Entity relationship model
B
Relation model
C
Object based model
D
Semi structured model
Question 5 Explanation: 
The overall logical data structure of a database can be expressed graphically by an E-R diagram. Which consists of rectangle (entity), ellipse (attribute), diamond (relationship), and lines.
Question 6
The relation schema describes:
A
Set of tuples (Records)
B
Set of fields (Column heads/Attributes)
C
Set of associated values
D
Domain of each field
Question 6 Explanation: 
The relation schema describes set of fields (Column heads/Attributes).
Question 7
“X is not a proper subset of any Key” is a 3NF violation called as:
A
Partial dependency
B
Total dependency
C
Transitive dependency
D
None of the above
Question 7 Explanation: 
If X is not a proper subset of any key means there is no partial dependency. And if there is a violation then the only possibility left is transitive dependency, means if there is transitive dependencies then there is 3NF violation.
Question 8
ALL or NONE refers:
A
Consistency
B
Isolation
C
Durability
D
Atomicity
Question 8 Explanation: 
There are four properties of transactions that must be followed,
A-Atomicity
C-Consistency
I-Isolation
D-Durability
And the question is asking all or none refers to which of the property.
All or None refers to Atomicity.
Question 9
Inheritance achieved by the key word in SQL is:
A
of
B
sub
C
under
D
from
Question 9 Explanation: 
Inheritance achieved by the keyword in SQL is ‘under’.
Question 10
Which of the following is not specified in Abstract data type?
A
Type
B
Set of operations on that type
C
How the type is implemented
D
(A) and (B)
Question 10 Explanation: 
An ADT does not specify how the data type is implemented.
Question 11
Backtracking uses __________ node generation _____________ bounding functions :
A
Breadth first, with
B
Breadth first, without
C
Depth-first, with
D
Depth-first, without
Question 11 Explanation: 
Backtracking is a depth-first search with any bounding function.
Question 12
Which of the following are not valid IPV4 addresses?
A
192.10.14.3
B
200.172.287.33
C
65.92.11.00
D
10.34.110.77
Question 12 Explanation: 
Each octet of IP address has the maximum value of 255. Since in option B, third octet exceeds the value 255,hence invalid.
Question 13
In which kind of communication, the destination address in each packet is the same for all duplicate?
A
Unicasting
B
Multicasting
C
Multiple unicasting
D
Broad casting
Question 13 Explanation: 
In broadcasting communication ,the destination address of all the packets are same since that packet has to be distributed among all the hosts of the network.
Question 14
In IPV4, using the classful addressing scheme, the whole address space is divided into how many classes:
A
8
B
16
C
24
D
5
Question 14 Explanation: 
There are 5 classful addressing scheme, Class A, Class B, Class C, Class D, Class D, Class E.
Question 15
A functional dependency is a relationship between:
A
Tables
B
Attributes
C
Rows
D
Relations
Question 15 Explanation: 
A functional dependency is a relationship between attributes.
Question 16
___________ operator is used to retain the unmatched rows of relations when they joined.
A
Outer join
B
Inner join
C
Natural join
D
Self join
Question 16 Explanation: 
Outer join operator is used to retain the unmatched rows of relations when they joined.
Question 17
The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is:
A
B – Tree File
B
Hashed File
C
Indexed File
D
Sequential File
Question 17 Explanation: 
The physical location of a record is determined by a mathematical formula, which transforms a file key into a record location in hashed file. Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.
Question 18
Which one of the following statements is FALSE?
A
A relation with two attributes is in BCNF
B
Lossless dependency preserving decomposition into BCNF is always possible
C
BCNF is stricter than 3NF
D
Lossless, dependency preserving decomposition into 3NF is always possible
Question 18 Explanation: 
Option B is false because Lossless decomposition into BCNF is always possible but dependency preserving decomposition into BCNF is not always possible.
Question 19
The primary objective of formal technical reviews is to:
A
fix errors
B
find errors
C
clear errors
D
modify errors
Question 19 Explanation: 
Primary objective of formal technical reviews:
Find errors during the process so that they do not become defects after release of the software. Benefit - the early discovery of errors so they do not propagate to the next step in the software process
Question 20
___________ is a class which implement lower level business abstractions required to manage the business domain class :
A
User interface class
B
System class
C