Question Paper Code: 98/2011
Exam: HSST Computer Science
Category No: 111/2010
Date of Test: 01-09-2011
Alpha code: B



1. Which of the following preposition is a tautology?
(A) p v q-> p (B) p->(q-> p)
(C) p v (q-> p) (D) none of these
Answer: B
2. p->q->r is equivalent to:
(A) p->q->r (B) p->(q->r)
(C) p v (q->r) (D) none of these
Answer: A
3. Why do we go for Normalization of Data Bases?
(A) To avoid the repetitions (B) To prevent fragmentation
(C) Avoid redundancy (D) To prevent replication
Answer: C
4. Name the component carrying the ALU and Control Unit in Digital Computer:
(A) Microprocessors (B) Nano chips
(C) MEMS (D) Hybrid Computer
Answer: A
5. Give the name of the Linear list in which elements can be added at ends but not in the middle:
(A) Array (B) Queue
(C) Tree (D) Circular Queue
Answer: X
Explanation:
Circular queue is a linear data structure. In circular queue the last node is connected back to the first node to make a circle. Circular linked list follow the First In First Out principle. Elements are added at the rear end and the elements are deleted at front end of the queue.
Queue is an abstract data structure. Queue is opened at both ends. One end is always used to insert data and the other is used to remove data. Queue follows First-In-First-Out methodology, i.e., the data item stored first will be accessed first.
A double-ended queue is an abstract data type similar to a simple queue, it allows you to insert and delete from both sides.
6. The switching devices used in First Generation computer’s were:
(A) Transistors (B) SSI chips
(C) VLSI chips (D) Vacuum Tubes
Answer: D
7. The Automation accepting the regular expression of any number of a’s is:
(A) a* (B) ab*
(C) (a/b)* (D) a*b*c
Answer: A
8. Flip-flop is the basic structure of the device:
(A) Hard disk (B) Memory
(C) Cells (D) Speakers
Answer: B
9. In C language data type of “3” is:
(A) an integer (B) a word
(C) a character (D) a digit
Answer: String
10. If every node “a” in a graph G is adjacent to every node “b” in G, then the graph is:
(A) Isolated graph (B) Connected graph
(C) Eulerian graph (D) Complete graph
Answer: D



11. In C language an user defined header is identified by the inclusion:
(A) #include "test.h" (B) #include
(C) include "test.h" (D) none of these
Answer: A
12. Number of locations that could be addressed by a microprocessor with 12 address lines is:
(A) 1024 (B) 64K
(C) 4096 (D) 2048
Answer: C
13. Number of bit width of any memory chip is:
(A) 16 (B) 64
(C) 32 (D) 8
Answer: D
14. The command that lists the last few lines from a file named “file”:
(A) tail file (B) end file
(C) grep file (D) cat file -last25
Answer: A
15. The percentage of time that a computer system is not available for use is:
(A) down time (B) seek time
(C) delay time (D) access time
Answer: A
16. By the thread of the same process, sharing is not allowed in:
(A) queue (B) message
(C) stack (D) address space
Answer: C
17. How to declare an interface class in C++?
(A) by declare all methods pure virtual in a class
(B) make all methods abstract in a class
(C) declare the class as interface
(D) none of the above three
Answer: D
18. Which device translates between data formats?
(A) Hub (B) Switch
(C) Bridge (D) Gateways
Answer: D
19. if a relation is in BCNF then it is in:
(A) 2 NF (B) 3 NF
(C) 1 NF (D) 1 NF and 2 NF
Answer: B
20. Minimum Hamming distance method is used for correction of:
(A) syntactic errors (B) semantic errors
(C) algorithmic errors (D) programming errors
Answer: A

21. Full Binary tree with n leaves contain:
(A) n nodes (B) 2n-1 nodes
(C) n-1 nodes (D) log n nodes
Answer: B
22. Which is not possible in a thread?
(A) Ready (B) Wait
(C) Suspended (D) Running
Answer: B
Explanation:
Thread exists in several states. A thread can be running .It can be ready to run as soon as it gets CPU time. A running state can be suspended.
23. The margin of a word document can be displayed on the horizontal or vertical ruler with the mouse and the:
(A) FONT SIZE Button (B) ALT key
(C) DELETE key (D) CTRL key
Answer: B
24. The 2’s complement of the binary value 10 is:
(A) 10 (B) 11
(C) 01 (D) 110
Answer: A
25. The property that the OOPs will permit the same operation to be carried out differently, based on the object is:
(A) inheritance (B) polymorphism
(C) function overloading (D) data abstraction
Answer: B
26. The IP address 127.0.0.1 is named as:
(A) Loop back address (B) IP address in a standard network
(C) LAN server address (D) Default router address
Answer: A
27. The Virtual Memory is located logically:
(A) in the CPU
(B) in main memory
(C) in between CPU and primary memory
(D) in the Hard disk
Answer: D
28. The Banker’s algorithm in resource allocation deals with:
(A) Dead lock prevention (B) Dead lock recovery
(C) Deadlock avoidance (D) Mutual exclusion
Answer: C
29. Thrashing occurs in:
(A) large computers
(B) a natural consequence of the virtual memory system
(C) can always be avoided by swapping
(D) poor paging algorithm
Answer: D
Explanation:
A process that is spending more time paging than executing is said to be thrashing. (i.e., page fault occurs frequently). In other words, that the process doesn't have enough frames to hold all the pages for its execution, so it is swapping pages in and out very frequently to keep executing. As poor paging algorithm is used page fault occurs frequently. So, poor paging algorithms can quickly lead to thrashing.
30. Compilers can identify:
(A) syntax errors (B) semantic errors
(C) logical errors (D) mathematical errors
Answer: A



31. What was the first Scientific Computer Programming Language?
(A) COBOL (B) LISP
(C) ADA (D) FORTRAN
Answer: D
32. Which is the first Object Oriented Language?
(A) ADA (B) COBOL
(C) LISP (D) FORTRAN
Answer: A
33. Producer consumer problem is example for application of:
(A) Monitors (B) For Monitors, Semaphores and Event counters
(C) Semaphores (D) Event counters
Answer: B
34. What was the data transmission method in which bi-directional data flow is allowed?
(A) Simplex (B) Duplex
(C) Analog (D) Single side mode
Answer: B
35. Yahoo was developed by:
(A) Dennis Ritchie and Ken Thompson (B) Vint Cerf and Robert Kahn
(C) David Filo and Jerry Yang (D) Steve Case and Jeff Bezos
Answer: C
36. Resolution of Video display unit does not depend on:
(A) Raster scan rate (B) Band width
(C) Vertical and Horizontal scans (D) Screen size
Answer: D
37. Resolution of Video display unit does not depend on:
(A) Raster scan rate (B) Band width
(C) Vertical and Horizontal scans (D) Screen size
Answer: D
38. The true statement for parallel transmission is:
(A) simultaneous transmission of all bits
(B) speed is specified in bps
(C) slower than serial
(D) micro computers use this
Answer: A
39. Gray code for the decimal number 7 is:
(A) 0111 (B) 0100
(C) 0101 (D) 1011
Answer: B
40. Evaluate the pre-fix expression -*63-41 will result in:
(A) 25 (B) 23
(C) 15 (D) 12
Answer: C
41. Error correction in the data link layer is achieved by:
(A) Equalization (B) Cyclic redundancy codes
(C) Hamming codes (D) Bit stuffing
Answer: C
Explanation:
Cyclic Redundancy Code is an error detection code only. Hamming Code is an error correcting code used in Data link layer.
42. The system program that set up executable program in RAM, ready for execution is:
(A) Loader (B) Linker
(C) Linkage Editor (D) Compiler
Answer: A
43. File transfer protocol that uses UDP is:
(A) FTP (B) TFTP
(C) TELNET (D) NFS
Answer: B
44. To check the presence of a computer in the network, use the command:
(A) ping (B) cmd
(C) check (D) ipconfig
Answer: A
45. In cryptology the code STUDYING is written as RUTEXJMH, then the code for OTHER is:
(A) TOHRE (B) ROHTE
(C) NUGFQ (D) MOTHR
Answer: C
46. The Number of equivalent relations of the set {1,2,3,4} is:
(A) 4 (B) 15
(C) 16 (D) 24
Answer: B
47. Which of the sets are empty?
(A) {x:x=/x} (B) {x:x=x}
(C) {x:x=/x2} (D) {x:x=/xx}
Answer: A
48. In any undirected graph, the sum of the degrees of all nodes is:
(A) must be even (B) is always ODD
(C) need not be even (D) is twice number of edges
Answer: A & D
Explanation:
Option D is true. But it also implies that option A is true. Because twice of any number must be even.
49. An undirected graph is Eulerian if and only if all vertices of G are of the sum of the degrees of all nodes is:
(A) Same degree (B) ODD degree
(C) Need not be ODD (D) is twice number of edges
Answer: B
50. An undirected graph G has n vertices and n-1 edges then G is:
(A) Cyclic (B) Addition of edge will make it cyclic
(C) Eulerian (D) Is a Tree
Answer: D



51. Graph having every pair of vertices connected is called:
(A) Cycle graph (B) Complete graph
(C) Peterson graph (D) Is a Tree
Answer: B
52. The Eigen vectors of a real symmetric matrix corresponding to different Eigen values are:
(A) Orthogonal matrix (B) Singular matrix
(C) Non-singular matrix (D) Inverse matrix
Answer: A
53. The system of equations 4x+6y=8, 3x+2y=1, 7x+8y=9 has:
(A) only one solution (B) infinite solutions
(C) two solutions (D) none of these
Answer: C
54. The Eigen values of the square matrix are:
(A) positive (B) imaginary
(C) real (D) negative
Answer: C
55. The Equations will have:
(A) no unique solution (B) only one solution
(C) has only two solutions (D) has infinite
Answer: Question not complete.
56. Which is fastest?
(A) DTL (B) TTL
(C) ECL (D) CMOS
Answer: C
57. Which is commutative but not associative?
(A) NOT (B) NOR
(C) XOR (D) NAND
Answer: B, D
Explanation:
NAND and NOR operations are commutative, but not associative.
(x↓y)↓z ≠ x↓(y↓z) (↓ = NOR operation)
(x↑y)↑z ≠ x↑(y↑z) (↑ = NAND operation)
58. Which is Universal gate?
(A) AND (B) NOR
(C) XOR (D) NOT
Answer: B
Explanation:
A universal gate is one from which all other basic gates can be formed. NAND and NOR are Universal gates.
59. How many NAND gates are needed to perform X.Y?
(A) 3 (B) 4
(C) 2 (D) 1
Answer: B
60. Which is non-volatile?
(A) RAM (B) PROM
(C) EPROM (D) ROM
Answer: D

61. Which is the access method to take data from tape memory?
(A) Direct (B) Sequential
(C) Parallel (D) Serial
Answer: B
62. The cycle time for a memory system is:
(A) access time (B) longer than access time
(C) less than access time (D) sub multiple of access time
Answer: B
63. How many RAM chips are needed to generate the (256K X 1 bit)?
(A) 8 (B) 12
(C) 32 (D) 64
Answer: C
64. T flip-flops are generally used for:
(A) counter (B) delay switch
(C) counter and frequency divider (D) decoder
Answer: C
65. Register used as working area in CPU is:
(A) Program counter (B) Stack
(C) Instruction register (D) Accumulator
Answer: D
66. A microprocessor can be:
(A) Programmable (B) Non Programmable
(C) Micro programmable (D) All of the above
Answer: D
67. Which is 16 bit microprocessor?
(A) Z 80 (B) Motorola 6800
(C) Intel 8086 (D) Intel 80486
Answer: C
68. “n” flip-flops will divide the frequency into a factor of:
(A) n (B) 1/n
(C) 2 to the power of 'n' (D) log(n)
Answer: C
69. 8 2 4 1 is the:
(A) BCD code (B) Gray code
(C) Excess -3 code (D) ASCII code
Answer: 8421 is BCD code.
Explanation:
BCD Code is 8421 (not 8241). Excess-3 and gray code are non-weighted codes.
70. (1001000010011001) base 2; equivalent in base 16 is:
(A) 9899 (B) 9989
(C) 8999 (D) 9999
Answer: Correct answer is 9099
Explanation:
An easy way to convert from binary to hexadecimal is to group binary digits into sets of four, starting with the least significant (rightmost) digits. Pad the most significant digits with zeros if necessary to complete a group of four. Here 1001000010011001 is grouped as 1001, 0000, 1001, 1001. Decimal equivalent of each group is 9 0 9 9. Hence 9099 base 16 is the answer.



71. Which is a programmable interval timer?
(A) 8253 (B) NE 555
(C) 8275 (D) 8251
Answer: A
72. Negative number cannot be represented in:
(A) Signed magnitude form (B) 1's complement form
(C) 2's complement form (D) None of the above forms
Answer: D
73. Which of the following interrupt is both level and edge sensitive?
(A) RST 5.5 (B) INTER
(C) TRAP (D) RST 7.5
Answer: C
74. What is a BUFFER?
(A) Convert input data to output
(B) CPU stores program counter
(C) An Interphase between CPU and peripheral
(D) Convert program to EXE form
Answer: C
75. By default any real number in C is represented as:
(A) a float (B) a double
(C) a long double (D) long float
Answer: B
76. Integer division in “C” program results in:
(A) Truncation (B) Rounding
(C) Overflow (D) None of the above
Answer: A
77. The function sprintf() works like printf(), but operates on:
(A) data in a file (B) stderr
(C) stdin (D) string
Answer: D
78. The function exit() causes an exit from:
(A) from loop (B) from the block
(C) from the function (D) from program
Answer: D
79. The complexity of linear search algorithm of an array of n elements is:
(A) O log(n) (B) O (n)
(C) O nlog(n) (D) O(nXn)
Answer: B
80. How many elements can array A(-1…m, 1…m) have?
(A) mXm (B) (m+1)(m+1)
(C) mX(m-1) (D) (m-n)Xn
Answer: A

81. Which is useful to implement quick sort?
(A) List (B) Set
(C) Stack (D) Queue
Answer: C
82. Recursively enumerable languages are closed under:
(A) Union (B) Intersection
(C) Complementation (D) Concatenation
Answer: A, B & D
Explanation:
Recursively enumerable languages are closed under union, intersection, concatenation and Kleene star operations.
83. The Grammar that produce more than one Parse tree for same sentence is:
(A) Ambiguous (B) Unambiguous
(C) Complementation (D) Concatenation Intersection
Answer: A
84. The number of the external states of a Turing Machine should be at least:
(A) 1 (B) 2
(C) 3 (D) 4
Answer: B
85. Give name of the database in the general model of a compiler:
(A) Literal table (B) Terminal table
(C) SYMTAB (D) Productions
Answer: B
86. A file is:
(A) an abstract data type (B) logical storage unit
(C) usually non volatile (D) volatile
Answer: A, B, C
87. What property of the files prevents sharing of files and directories?
(A) Tree structure (B) One level structure
(C) Two level structure (D) Length
Answer: A
88. E-R modeling technique is:
(A) Tree structure (B) Top-down method
(C) Bottom-up method (D) Right-left approach
Answer: B
89. Data items stored as grouped items is:
(A) Record (B) List
(C) Strings (D) Title list
Answer: A
90. Data items are fragmented, replicated and propagated in:
(A) DBMS (B) RDBMS
(C) DDBMS (D) DML
Answer: C



91. In data manipulation the first element of T[5] is:
(A) T[1] (B) T[0]
(C) T[5] (D) T[3]
Answer: B
92. Processed data is called:
(A) Data base (B) File
(C) Information (D) Sample
Answer: C
93. Which factor of coding is most important?
(A) Productivity (B) Cost
(C) Readability (D) Less memory usage
Answer: C
94. Main container for <TR> <TD> and <TH> is:
(A) <TABLE> (B) <GROUP>
(C) <DATA> (D) <CAPTION>
Answer: A
95. Which of the following is the non-polling system?
(A) Stop and wait (B) Daisy chain
(C) DMA (D) TDMA
Answer: D
96. What is the working principle of a Digital Computer?
(A) De Morgan's Principle (B) Len's Principle
(C) Von Neumann's Principle (D) Euler's Principle
Answer: C
97. Give the unique name of the combination of Analog and Digital computer?
(A) Cray XMP 120 Computer (B) Param 2000 Computer
(C) IBM 320 Computer (D) Hybrid Computer
Answer: D
98. Why RAM is kept near to the Processor in a Digital Computer?
(A) Reduce the cost
(B) Get maximum speed
(C) To minimize the memory access time
(D) Increase frequency
Answer: C
99. Who designed the First Digital Computer using the Binary system?
(A) Blaise Pascal (B) Agutha Ada
(C) Isaac Newton (D) Dr. Dakunthala Devi
Answer: John Vincent Atanasoff
100. Give the name of the first operating system for Personal Computers:
(A) Linux (B) Windows 3.2
(C) CP/M (D) Disk operating system
Answer: C

Comments