Posts

Showing posts from September, 2017

Programming Languages : 2nd Day Discussion

Q. Which data type is used to represent the absence of parameters? a) int b) short c) void d) float Answer : C Q.  Minimum number of temporary variable needed to swap the contents of 2 variables is: a. 1 b. 2 c. 3 d. 0 Answer : D Explanation : a=a+b b=a-b a=a-b Q. Which of the following also known as an instance of a class? A. Friend Functions B. Member Variables C. Member Functions D. Object Answer : D Q. Encapsulation is known as (A) Information hiding (B) Data abstraction (C) Data about data (D) None of these  Answer : A Encapsulation means  “we have enclosed all the characteristics of an object in the object itself”. Encapsulation and information hiding are much related concepts (information hiding is achieved using Encapsulation).  We have seen in previous lecture that object characteristics include data members and behavior of the object in the form of functions.  So we can say that Data and Behavior are tightly coupled inside an object

Today's Discussion30/09/2017 : Topic : Programming Languages : 2nd Day

   Q.By default class variables and member functions are A. Public B. Protected C. Private D. None Answer: C Q. Which of the following is not a type of inheritance? A.    Multiple B.    Multilevel C.    Distributive D.    Hierarchica Answer: C Q.How would you round off a value from 1.66 to 2.0? A. ceil(1.66)  B. floor(1.66) C. roundup(1.66)  D. roundto(1.66) Answer:A In a publicly derived subclass, the protected members of a superclass are: (A) available with public visibility (B) available with protected visibility (C) available with private visibility (D) not available Answer; Q. The recursive function defined by f(n)=1 if n=1 and f(n)=n+f(n-1) computes the value: (A) n2                 (B) n! (C) n(n+1)/2      (D) 2n Answer: C More Questions and Discussion...

Today's Discussion 29/09/2017 : Topic : Programming Languages

Module VI – Programming Languages C programming – Basic concepts, arrays, functions, pointers, structures, files. Object oriented programming – concepts, comparison with structural programming, classes andobjects, data abstraction, encapsulation inheritence, polymorphism, dynamic binding, messagepassing, advantages – reusability, maintenance, security.Access modifiers, static members, friend function constructors and destructors, polymorphism,operator overloading, inheritance, virtual base classes.Java programming, brief history, java basics, data types, variables and arrays, operators, controlstatements, classes and methods, inheritance, exception handling – multi threading, stream I/Ostring handling packages. Inheritance and interface, deriving classes, method overriding, methodoverloading, access modifiers, abstract class and method, interfaces, packages imports and classpath, exception handling try-catch-finally clause, threads, creating threads in applications, methodin thre

Today's Topic: 28/09/2017 : Software Engineering

Image
Q.RAD stands for a) Relative Application Development b) Rapid Application Development c) Rapid Application Document d) None of these Answer: B Q.Efficiency in a software product does not include ____ a) responsiveness b) licensing c) memory utilization d) processing time  Answer: B Q.Which one of the following models is not suitable for accommodating any change? a) Build & Fix Model b) Prototyping Model c) RAD Model d) Waterfall Model Answer: D Q.Which one of the following is NOT desired in a good Software Requirement Specifications (SRS) document? (A) Functional Requirements (B) Non-Functional Requirements (C) Goals of Implementation (D) Algorithms for Software Implementation  Answer: D  Q. A Pseudo code is A) a machine - level code B) a random number C) a flow chart D) Structured English to communicate the logic of a program Answer: D Q.Who is responsible for acceptance testing? a) Software tester b) Designer c) Customer d) Developer

Today's Topic: 27/09/2017 : Computer Organization

Image
Q. The excess-3 code for 597 is given by a) 100011001010 b) 100010100111 c) 010110010111 d) 010110101101 Answer:A The Excess-3 code for a given decimal number is determined by adding '3' to each decimal digit in the given number and then replacing each digit of the newly found decimal number by its four bit binary equivalent. The table gives is the Excess-3 code. For example, XS3 code of 24 is obtained as   2       4 +3    +3   5       7 0101 0111 Thus, XS3 code of 24 is 0101 0111. Voice Explanation Q. In what format is Java's character set represented ?  A:-16 bits ASCII  B:-16 bits unicode  C:-16 bits EBC  D:-None of the above Answer: B Q.Which of the following is a Data Model? A. Entity-Relationship model B. Relational data model C. Object-Based data model D. All of the above Answer:D Q.Which one of the following CPU registers holds the address of the instructions (instructions in the program stored in memory) t

Discussion Today : 26/09/2017 : Topic : DBMS

Q.  max no of super keys for relation schema R(E,FG,H) with E as the key is? A) 10 B) 6 C) 4 D) 8 Answer: D The maximum number of super keys for the relation schema R ( E,F,G, H ) with E as the key is 2^3= 8, because any subset of non key attributes along with key attribute will form the super key of R. As, we have 3 non-keys (F, G and H), so answer will be 2^3i.e. 8. Q.The operation which is not considered a basic operation of relational algebra is (A)    Join.                                               (B)    Selection.  (C)    Union.                                           (D)    Cross product. Answer: A An SQL join clause combines columns from one or more tables in a relational database. It creates a set that can be saved as a table or used as it is. AJOIN is a means for combining columns from one (self-table) or more tables by using values common to each. Q1. ER modelling technique is a.tree structure b.top down c.bottom up d. right left approach Answe

Discussion: 25/09/2017 : Network : Protocol : Network Devices:VIRUS

Image
Q. Binary Huffman coding is a a) Prefix condition code b) Suffix condition code c) Both of the mentioned d) None of the mentioned Answer: A Q1.First computer virus is known as (a) Rabbit (b) Creeper Virus (c) Elk Cloner (d) SCA Virus Answer: b Q2). The technique of temporarily delaying outgoing acknowledgements so that they can be hooked on to the next outgoing data frame is called ------------- A) piggybacking. B)cyclic redundancy check. C) code repeat check. D) none of the above Answer: A Q3.Network device belong at the OSI physical layer a) repeater b) router c) switch d) bridge Answer: a Q4. The default port number used for HTTP is__________. A. 22 B. 80 C. 443 D. 110 Answer: B If the plain text is ABCABA , then what will be the code for A,B & C in Huffman codding,  1.A =1 B=0 C=11 2. A =1 B=0 C=10 3. A =0 B=1  C=11 4. A =0 B=10  C=11 Answer: 4 Explanation Q5.In communication sa

Topic: GK and Current Affairs Questions 4 HSST Computer Science Exam

Aneesh Ikkara: ഇന്à´¤്യയിൽ_ഇപ്à´ªോൾ India_Now Updated on                              02/09/2017 . 🎀രാà´·്à´Ÿ്രപതി : à´¶്à´°ീ. à´°ാം à´¨ാà´¥് à´•ോà´µിà´¨്à´¦് 🎀ഉപ à´°ാà´·്à´Ÿ്രപതി : à´¶്à´°ീ. à´µെà´™്à´•à´¯്à´¯ à´¨ാà´¯ിà´¡ു 🎀പ്à´°à´§ാà´¨ മന്à´¤്à´°ി : à´¶്à´°ീ. നരേà´¨്à´¦്à´° à´®ോà´¦ി 🎀നീà´¤ി ആയോà´—് à´šെയർമാൻ : à´¶്à´°ീ. നരേà´¨്à´¦്à´° à´®ോà´¦ി 🎀നീà´¤ി ആയോà´—് à´µൈà´¸് à´šെയർമാൻ : à´¶്à´°ീ. à´¡ോ. à´°ാà´œീà´µ് à´•ുà´®ാർ 🎀നീà´¤ി ആയോà´—് CEO : à´¶്à´°ീ. à´…à´®ിà´¤ാà´¬് à´•ാà´¨്à´¤് 🎀സുà´ª്à´°ീം à´•ോà´Ÿà´¤ി à´šീà´«് ജസ്à´±്à´±ിà´¸്: ജസ്à´±്à´±ിà´¸്. à´¦ീപക് à´®ിà´¶്à´° (45മത്à´¤െ à´µ്യക്à´¤ി ) 🎀അറ്à´±ോർണി ജനറൽ : à´•െ. à´•െ. à´µേà´£ുà´—ോà´ªാൽ 🎀സോà´³ിà´¸ിà´±്റർ ജനറൽ : à´°à´ž്à´œിà´¤്à´¤് à´•ുà´®ാർ 🎀റിസർവ് à´¬ാà´™്à´•് ഗവർണ്ണർ : ഉർജിà´¤് പട്à´Ÿേൽ (24മത്à´¤െ à´µ്യക്à´¤ി ) 🎀കംà´ª്à´Ÿ്à´°ോളർ ആൻഡ്‌ à´“à´¡ിà´±്റർ ജനറൽ : à´°ാà´œീà´µ് മഹ്‌à´±ൈà´·ി (From SEP. 25 ) 🎀അറ്à´±ോà´®ിà´•് എനർജി à´•à´®്à´®ീഷൻ à´šെയർമാൻ : à´¡ോ. à´¶േഖർ ബസു 🎀ISRO à´šെയർമാൻ : à´¡ോ. à´Ž. à´Žà´¸്. à´•ിരൺ à´•ുà´®ാർ 🎀UPSC à´šെയർമാൻ : à´¡േà´µിà´¡്‌ ആർ. à´¸ാà´¯ിà´®ിà´²െà´¹് 🎀SSC à´šെയർമാൻ : ആഷിം à´–ുà´±ാà´¨ 🎀CBSE à´šെയർപേà´´്സൺ : à´…à´¨ിà´¤ കർവാൾ 🎀UGC à´šെയർമാൻ : à´µി.à´Žà´¸്‌. à´šൗà´¹ാൻ 🎀മുà´–്à´¯ à´µിവരാവകാà´¶ à´•à´®്à´®ീഷണർ : ആർ. à´•െ. à´®ാà´¤്à´¤ൂർ 🎀മുà´–്à´¯ à´¤ിà´°െà´ž്à´žെà´Ÿുà´ª്à´ª് à´•à´®്à´®ീഷണർ : അചൽ à´•ുà´®ാർ à´œ്à´¯ോà´¤ി 🎀ലോà´•്സഭ à´¸്à´ªീà´•്കർ : à´¸ുà´®ിà´¤്à´°

Today's Discussion: 24/09/2017 : Topic : Microprocessor

Image
Q1.First Microprocessor ? A. Intel 8085 B. AMD ATHLON C. Intel 4004 D. AMD SEMPRON Answer: C Q2. A medium term Scheduler Select  process/program from a) Secondary to main memory b) main memory to CPU c) secondary memory to CPU d) None of these. Answer: D Q3.The very first process created by the Kernel in UNIX is : (A) init (B) getty (C) fork (D) none among these Answer: A Q4.A 4 Bit Microprocessor can address how many memory locations? A. 8 B.16 C.4 D.32 Answer: 16 ie 2 ^ 4 An n Bit Mp can address 2 ^ n different locations Q5. The address bus width of a microprocessor which is capable of addressing 64 Kilo Bytes of the memory is A.8 B.12 C. 16 D. 20 Answer: C 64 Kbytes = 2 6 × 2 10 bytes = 2 16 bytes Hence 16 address buses are required to address 64 Kbytes of memory. Q6.  An 8-bit microprocessor can have ………….. address lines. a.8 b.16 c.32 d. cannot be predicted  Answer : d More Questions and Discussion...

Today's Discussion: 23/09/2017 : Topic : SE

Q1.Gray Code of 14 is a.1010   b. 1100  c.1001 d . 1110 Answer: C Q2._______________ is a measure of the degree of interdependence between modules. a) Cohesion b) Coupling c) dependency d) None of the mentioned Answer:b Explanation: Coupling or dependency is the degree to which each program module relies on each one of the other modules. Q3.  In which year Java was developed? (A) 1989 (B) 1990 (C) 1991 (D) 1995 Answer:  (D) Java  is a general-purpose computer programming language that is concurrent, ...  Java  was originally  developed  by James Gosling at Sun Microsystems . Q4. The minterm expansion of f(P, Q, R) = PQ + QR' + PR' is A) m2 + m4 + m6 + m7 B) m0 + m1 + m3 + m5 C)  m0 + m1 + m6 + m7 D) m2 + m3 + m4 + m5 Answer: A More Questions and Discussion...

Today's Discussion: 22/09//2017 : Topic : Operating System

Q.The strategy of making processes that are logically runnable to be temporarily suspended is called : a) Non preemptive scheduling b) Preemptive scheduling c) Shortest job first d) First come First served Answer: B Q1.YACC is a.. .. A. lexical analyser  generator B.parser generator C.macro pre- processor D. Code optimizer Answer: B A parser generator that works for all grammars without any restrictions. Accent can be used like Yacc and it cooperates with Lex. Q2. The _______ table is created by YACC. a) LALR parsing b) LL parsing c) GLR parsing d) None of the mentioned Answer: A Q3.Which command is used to display the end of the file a) head-r   b) eof c) tail           d) bof Answer: C Q4. Which among the following is a clipping algorithm? A) kruskal's B) Cohen - Sutherland C) Dijkstra's. D) prim's Answer: B Q5. cache memory is made of a.DRAM b.SRAM c.RAM d.PROM Answer: B Q6. White Box techniques are also classif

Today's Discussed Questions 21/09/2017 : Topic : Number System & OS

Q1.The next largest integer corresponding to the positive integer whose representation in hexadecimal format is FF, represented in.octal form is A. 1000 B.100 C.400 D.200 Answer : C Explanation : ans : C FF binary representation :1111 1111 Decimal value. :255 Next largest integer : 256 Correponding Octal : 400 Q2. Q.Dijkstra's Bankers algorithm is used for A. Deadlock Prevention B. Deadlock Detection C. Deadlock Recovery D. Deadlock Avoidance Answer: D Q3. Session multiplexing is the function of _____ layer. A) Presentation layer B) Session layer C) Transport layer D) Physical layer Answer: Transport Layer Q4. .MOV extension refers usually to what kind of file? A.Image file B.Animation/movie file C.Audio file D.MS Office document Answer: B A MOV file is a common multimedia container file format developed by Apple and compatible with both Macintosh and Windows platforms. Q5. Which method/s of representation of numbers occupies large amou

HSST EXAM Syllabus As per Kerala PSC Official Website

COMPUTER SCIENCE SYLLABUS Module I Digital Systems, Microprocessors & Computer Organization Number System (binary, hexa, octal, complements) codes (ASCII, UNICODE, BCD,GRAY), Error detecting and correcting code-parity and Hamming codes. Boolean algebra& Laws. Combinational circuits – SOP & POS form, K-Map – encoders, Decoders, multiplexers,demultiplexers-sequential circuits-flipflops, registers & counters. Integer representation (signed & unsigned). Half and full address, sequential multiplier,Booth algorithm– floating point representation (IEEF). Basic operational concepts – functional units. Processor-8085-Architecture-instruction set, fetch & execute, addressing mode, interrupts. 8086 -Architecture-registers, RAM organization segment-offset addressing, real & protected modes, addressing modes, instructions – arithmetic, data movement, control, I/O string, logical. Subroutine call & return. Features of pentium processor. Control unit or

HSST Computer Science / Application Notification 2017

Extraordinary Gazette Date:- 30.08.2017 Last Date:- 04.10.2017 Category No: 328/2017 to 341/2017 Applications are invited Online only from qualified candidates for appointment in the undermentioned post in Kerala Government Service. Before applying for the post the candidatesshould register as per the One Time Registration through the official website of Kerala Public ServiceCommission. 1 Department: Kerala Higher Secondary Education 2 Name of Post: Higher Secondary School Teachers (Junior) in the following subjects Sl. No.14 Category No : 341/17 Subjects: Computer Science Scale of Pay : 32,300- 68,700/- No. of Vacancies  : Anticipated Separate Ranked Lists will be prepared and published for each subject mentioned above. The list of selected candidates published by the Commission in response to this notification shall remain in force for a minimum period of one year provided that the said list will continue to be in force till the publication of a new list after