Вы находитесь на странице: 1из 19

8458343220870056

AWES PGT Computer Science Informatics

Question block created by wizard

1. What will be the result of following two expressions if i=10 initially?

(i) ++i<=10
(ii) i++<=10

o (a) (i) True


(ii) True

o (b) (i) False


(ii) False

o (c) (i) True


(ii) False

 (d) (i) False


(ii) True

If choice d is selected set score to 1.

2. Give the Output of the following code fragment:-

int ch=20;
System.out.println(++ch);
System.out.println(ch);

 (a) 21
21

o (b) 20
20

o (c) 20
21

o (d) 21
20

If choice a is selected set score to 1.

3. Consider the following code snippet:-

int i=10;
int n = i++%5;

What are the values of i & n after the code is executed?

o (a) 10 & 0
 (b) 11 & 0
o (c) 11 & 2
o (d) Can't be calculated

Page 1
8458343220870056
AWES PGT Computer Science Informatics

If choice b is selected set score to 1.

4. Give the output of the following code:-

System.out.println("m is" +m);

o (a) m is 100
o (b) m is 10
 (c) No output
o (d) None of the above

If choice c is selected set score to 1.

5. Which event gets fired when:-

(i) user presses enter in a text field


(ii) a check box is clicked

 (a) Action event & Item event


o (b) Adjustment event & Action event
o (c) Change event & Item event
o (d) Item Event & Item Event

If choice a is selected set score to 1.

6. Name the class used to create the following:-

(i) a list control


(ii) a combo box control

o (a) JComboBox & Timer


o (b) Timer & JComboBox
 (c) JList & JComboBox
o (d) None of the above

If choice c is selected set score to 1.

7. How many times the following code prints the string "APS"?

for( i=1; i<=1000;i++); cout<< "APS";

o (a) Zero
 (b) 1
o (c) 1000

Page 2
8458343220870056
AWES PGT Computer Science Informatics

o (d) Syntax error

If choice b is selected set score to 1.

8. Which allows you to create a derived class that inherits properties from more than one base class?

o (a) Hybrid Inheritance


o (b) Hierarchical Inheritance
o (c) Multilevel inheritance
 (d) Multiple inheritance

If choice d is selected set score to 1.

9. Null character needs a space of :-

 (a) One byte


o (b) Zero bytes
o (c) Three bytes
o (d) Four bytes

If choice a is selected set score to 1.

10. The arguments that determine the state of the cout object are called:-

o (a) State controllers


 (b) Format flags or state flags
o (c) Classes
o (d) Manipulators

If choice b is selected set score to 1.

11. The statement int num[2][3]={ {1,2}, {3,4}, {5, 6} };

o (a) Assigns a value 3 to num[1][2]


o (b) Assigns a value 2 to num[1][2]
o (c) Assigns a value 4 to num[1][2]
 (d) Gives an error message

If choice d is selected set score to 1.

12. ____________ is the key to ____________.

o (a) Persistence, serialization


o (b) Inheritance, object
 (c) Serialization, persistence
o (d) Persistence, inheritance

If choice c is selected set score to 1.

Page 3
8458343220870056
AWES PGT Computer Science Informatics

13. The JDBC-ODBC bridge allows ____________ to be used as __________.

o (a) JDBC drivers, ODBC drivers


o (b) Application, drivers
o (c) Drivers, Application
 (d) ODBC drivers, JDBC drivers

If choice d is selected set score to 1.

14. A semiconductor memory constructed using bipolar transistors or MOS transistor stores information
in the form of a:-

o (a) Opcodes values


o (b) Byte
o (c) Bit
 (d) Flip-flop voltage levels

If choice d is selected set score to 1.

15. The concept of multiple inheritance is implemented in Java by:-

o (a) a) Extending two or more classes


o (b) b) Implementing two or more interfaces
o (c) c) Extending one class and implementing one or more interfaces
 (d) d) Both (b) and (c)

If choice d is selected set score to 1.

16. Twisted pair have maximum segment:-

o (a) 2000m
 (b) 100m
o (c) 200m
o (d) 500m

If choice b is selected set score to 1.

17. ______________ software makes use of non numerical algorithms to solve complex problems that
are not amenable to computation or straightforward analysis.

o (a) Web-based
o (b) Real time
 (c) Artificial Intelligence
o (d) Embedded

If choice c is selected set score to 1.

18. The ___________ model stipulates that the requirements be completely specified before the rest of
the development can processed.

o (a) Rapid Application Development (RAD)

Page 4
8458343220870056
AWES PGT Computer Science Informatics

o (b) Incremental Development


o (c) Iterative Development
 (d) Waterfall

If choice d is selected set score to 1.

19. _____________ model couples the iterative nature of the prototyping with the controlled and
systematic aspects of the linear sequential model.

o (a) Iterative Development


o (b) Rapid Application Development (RAD)
o (c) Incremental Development
 (d) Spiral

If choice d is selected set score to 1.

20. ____________ strategy assumes that residual faults remain in the system and can continue in
operation after some system failures have occurred.

o (a) Fault detection


o (b) Fault avoidance
 (c) Fault tolerance
o (d) None of the above

If choice c is selected set score to 1.

21. _____________ is a classification scheme, which shows how an object class is related to other
classes through common attributes and services.

o (a) Inheritances
 (b) Taxonomy
o (c) Hierarchy
o (d) None of the above

If choice b is selected set score to 1.

22. Decryption and encryption of data are responsibility of:-

o (a) Data link layer


o (b) Physical layer
 (c) Presentation layer
o (d) Session layer

If choice c is selected set score to 1.

23. A bridge has access to which address of a station on the same network?

o (a) Network
 (b) Physical
o (c) Service Access point
o (d) All of the above

Page 5
8458343220870056
AWES PGT Computer Science Informatics

If choice b is selected set score to 1.

24. Which of the following is not a primary object of ASP Object Model?

o (a) The Response object


 (b) The code object
o (c) The Server object
o (d) The Request object

If choice b is selected set score to 1.

25. Satellite Switched Time-Division Multiple Access (SS/TDMA) is:-

o (a) The method of determining which device has access to transmission medium at any time
 (b) A form of TDMA in which circuit switching is used to dynamically change channel
assignments
o (c) Is a medium access control technique for TDMA
o (d) All of the above

If choice b is selected set score to 1.

26. Repeaters function in:-

 (a) a) Physical layer


o (b) b) Data link layer
o (c) c) Network layer
o (d) d) Both (a) and (b) above

If choice a is selected set score to 1.

27. How many hosts can be attached to each of the local area network?

 (a) 254
o (b) 128
o (c) 168
o (d) 192

If choice a is selected set score to 1.

28. DTD's are:-

o (a) Not associated with the document element


o (b) Are associated to scheme
 (c) Associated with the document element
o (d) None of the above

If choice c is selected set score to 1.

Page 6
8458343220870056
AWES PGT Computer Science Informatics

29. MSXML is:-

o (a) Used for interacting with XML


o (b) A Microsoft language
 (c) XML parser that ships with IE5.0
o (d) None of the above

If choice c is selected set score to 1.

30. www is based on which model?

 (a) Client-server
o (b) 3-tier
o (c) Peer to peer
o (d) Local-server

If choice a is selected set score to 1.

31. Which of the following is TRUE only of XML but not HTML?

 (a) It allows user defined tags


o (b) It is derived from SGML
o (c) It describes content and layout
o (d) It is restricted only to be used with web browsers

If choice a is selected set score to 1.

32. The statement f1.write ((char*) &obj1, sizeof (obj1));

o (a) Writes the address of obj1 to f1


 (b) Writes the data in obj1 to f1
o (c) Writes a member functions of obj1 to f1
o (d) Writes the member functions and data of obj1 to f1

If choice b is selected set score to 1.

33. The Operation which is commutative but not associative:-

o (a) OR
o (b) AND
o (c) EX-OR
 (d) NAND

If choice d is selected set score to 1.

34. If x={a,b,c,d}, then number of binary operations that can be defined on x is:-
16
o (a) 4
2
o (b) 4

16
(c) 2
4
o (d) 2

Page 7
8458343220870056
AWES PGT Computer Science Informatics

If choice c is selected set score to 1.

35. The simplified form of the Boolean expression (X+Y+XY)(X+Z) is:-

o (a) XY+YZ
 (b) X+YZ
o (c) XZ+Y
o (d) X+Y+Z

If choice b is selected set score to 1.

36. A toggle operation cannot be performed using a single:-

o (a) XOR gate


o (b) NAND gate
 (c) AND gate
o (d) NOR gate

If choice c is selected set score to 1.

37. A combinational logic circuit which generates a particular binary word or number is:-

o (a) Encode
o (b) Demultiplexer
o (c) Decoder
 (d) Multiplexer

If choice d is selected set score to 1.

38. The refreshing rate of dynamic RAMs is approximately once in:-

o (a) Two seconds


o (b) Two micro seconds
o (c) Fifty nano seconds
 (d) Two milli seconds

If choice d is selected set score to 1.

39. Which of the following memories allows simultaneous read and write operations?

o (a) RAM
o (b) EPROM
o (c) ROM
 (d) None of the above

If choice d is selected set score to 1.

40. What technology is used for flat panel displays?

o (a) Direct view storage tube

Page 8
8458343220870056
AWES PGT Computer Science Informatics

 (b) Solid state


o (c) RGB monitor
o (d) VLSI

If choice b is selected set score to 1.

41. Which of the following keyboard is fastest?

o (a) QWERTY
o (b) Numeric
 (c) Dvorak
o (d) Alphanumeric

If choice c is selected set score to 1.

42. Plotter accuracy is measured in terms of repeatability and:-

o (a) Intelligence
 (b) Resolution
o (c) Buffer size
o (d) Vertical dimension

If choice b is selected set score to 1.

43. What is a spider?

 (a) A program that catalogs Web Sites


o (b) A computer virus
o (c) A hacker
o (d) A spying software

If choice a is selected set score to 1.

44. Relationship produced from E-R model will always be in:-

o (a) 2NF
o (b) B CNF
o (c) 1 NF
 (d) 3NF

If choice d is selected set score to 1.

45. In relational Schema, each tuple is divided into fields called:-

o (a) Records
o (b) Relations
 (c) Domains
o (d) Queries

If choice c is selected set score to 1.

Page 9
8458343220870056
AWES PGT Computer Science Informatics

46. Manager's salary details are hidden from the employee. This is called:-

o (a) Physical constraint


 (b) External constraint
o (c) Conceptual constraint
o (d) None of the above

If choice b is selected set score to 1.

47. An access path is provided by:-

 (a) File key


o (b) Physical record key
o (c) Both of the above
o (d) None of the above

If choice a is selected set score to 1.

48. Index consists of:-

o (a) A list of keys


o (b) Pointers to master list
 (c) Both of the above
o (d) None of the above

If choice c is selected set score to 1.

49. Which of the command closes text file which have been created using
"SET ALTERNATIVE" <FILENAME> "Command" ?

 (a) CLOSE ALTERNATIVE


o (b) SET ALTERNATIVE OFF
o (c) CLEAR ALL
o (d) CLOSE DATABASE

If choice a is selected set score to 1.

50. Which command is fastest among the following?

 (a) COPY STRUCTURE TO <new file>


o (b) COPY FILE <FILE 1><FILE 2>
o (c) COPY TO M FILE-DAT DELIMITED
o (d) COPY TO <NEW File>

If choice a is selected set score to 1.

51. A clustering index is defined on fields which are of type:-

o (a) Non-key and non-ordering


 (b) Non-key and ordering
o (c) Key and non-ordering

Page 10
8458343220870056
AWES PGT Computer Science Informatics

o (d) Key and ordering

If choice b is selected set score to 1.

52. Which of following statements are TRUE about an SQL query?


P: An SQL query can contain a HAVING clause even if it does not have a GROUP BY clause.
Q: An SQL query can contain a HAVING clause only if it has a GROUP BY clause.
R: All the attributes used in the GROUP BY clause must appear in the SELECT clause.
S: Not all the attributes used in the GROUP BY clause need to appear in the SELECT clause.

o (a) P and S
 (b) Q and R
o (c) Q and S
o (d) P and R

If choice b is selected set score to 1.

53. Consider the following ER diagram:-

The minimum number of tables needed to represent M, N, P, R1 and R2 is:-

o (a) 4
o (b) 5
o (c) 3
 (d) 2

If choice d is selected set score to 1.

54. The output of following code is:-

o (a) 4
o (b) 7
 (c) 8
o (d) None of the above

Page 11
8458343220870056
AWES PGT Computer Science Informatics

If choice c is selected set score to 1.

55. Which one of the given answers is correct?

o (a) 1 = 4, n = 6
 (b) 1 = 2, n = 6
o (c) 1 = 3, n = 8
o (d) None of the above

If choice b is selected set score to 1.

56. Which of the following formulas can be used to generate random integers between 1 and 10?

o (a) 10 + rand() % (10 + 1)


o (b) 1 + (10 - 1 + 1) % rand()
 (c) 1 + rand() % (10 - 1 + 1)
o (d) rand()%10+1-1

If choice c is selected set score to 1.

57. How many times is the following loop executed?

o (a) 0
o (b) 5
 (c) Infinite
o (d) Error

If choice c is selected set score to 1.

58. Name the function in which there exists a statement that calls the function itself.

o (a) Virtual function


 (b) Recursive function
o (c) Friend function
o (d) Static function

If choice b is selected set score to 1.

59. _______________ package is used by compiler itself. So it does not need to be imported for use.

o (a) java.math

Page 12
8458343220870056
AWES PGT Computer Science Informatics

 (b) java.lang
o (c) java.applet
o (d) java.awt

If choice b is selected set score to 1.

60. The class at the top of exception class hierarchy is _____________.

o (a) ArithmeticException
 (b) Throwable
o (c) Class
o (d) Exception

If choice b is selected set score to 1.

61. State whether true or false.


i) init( ) of servlet is called after a client request comes in
ii) Servlets are ultimately converted into JSP

 (a) i-false, ii-false


o (b) i-true, ii-true
o (c) i-false, ii-true
o (d) i-true, ii-false

If choice a is selected set score to 1.

62. In JDBC ____________ imports all Java classes concerned with database connectivity.

o (a) java.mysql.*
o (b) javax.sql.*
 (c) java.sql.*
o (d) com.*

If choice c is selected set score to 1.

63. Ingres is a ___________.

o (a) Socket
o (b) Web server
o (c) Compiler
 (d) Database

If choice d is selected set score to 1.

64. If a variable is declared final, it must include _____________ value.

o (a) Integer
o (b) No
 (c) Initial
o (d) Float

Page 13
8458343220870056
AWES PGT Computer Science Informatics

If choice c is selected set score to 1.

65. The IDL compiler generates _______ and _____________

 (a) Stubs, skeleton


o (b) Client, stubs
o (c) Stubs, client
o (d) Runnable code, stubs

If choice a is selected set score to 1.

66. Filters were officially introduced in the servlet ____________ specification.

o (a) 2.4
 (b) 2.3
o (c) 2.2
o (d) 2.1

If choice b is selected set score to 1.

67. The default value of Frame attribute of table tag is:-

o (a) HSIDES
o (b) BELOW
o (c) ABOVE
 (d) VOID

If choice d is selected set score to 1.

68. Which method will a web browser call on a new applet?

o (a) Destroy method


o (b) Execute method
 (c) Init method
o (d) Main method

If choice c is selected set score to 1.

69. A compiler for high level language that runs on one machine and produces code for a another
machine is called as:-

 (a) Cross compiler


o (b) Optimizing compiler
o (c) One pass compiler
o (d) Multipass compiler

If choice a is selected set score to 1.

Page 14
8458343220870056
AWES PGT Computer Science Informatics

70. To avoid the race condition, the number of processes that may be simultaneously inside their critical
section is:-

o (a) 0
o (b) 2
o (c) 4
 (d) 1

If choice d is selected set score to 1.

71. Which of the following is better known as 'mid range servers'?

 (a) Mini Computers


o (b) Micro Computers
o (c) Embedded Computers
o (d) Main Frame Computers

If choice a is selected set score to 1.

72. A Microprocessor with 12 address lines is capable of addressing:-

o (a) 2048 locations


o (b) 64K locations
 (c) 4096 locations
o (d) 1024 locations

If choice c is selected set score to 1.

73. The term _________ is used to describe a secret or undocumented means of getting into a
computer system.

o (a) Spyware
o (b) Trapdoor
 (c) Backdoor
o (d) Trojan

If choice c is selected set score to 1.

74. Viruses that change their characteristics as they infect are called ___________.

 (a) Polymorphic
o (b) Stealth
o (c) Camouflage
o (d) Armored

If choice a is selected set score to 1.

75. Two or more copies of the same data that mismatch are known as:-

o (a) Data reputancy


o (b) Data redundancy

Page 15
8458343220870056
AWES PGT Computer Science Informatics

 (c) Data inconsistency


o (d) Data conspiracy

If choice c is selected set score to 1.

76. Which of the following is not open source software?

o (a) Open Office


 (b) Internet Explorer
o (c) Fedora Linux
o (d) Apache HTTP Server

If choice b is selected set score to 1.

77. Lily tells her friends, Ka Kee (KaKee@hkeaa.edu.hk), Po Yan (PoYan@hkeaa.edu.hk) and Mo Yi
(MoYi@hkeaa.edu.hk), the date of her birthday party through an email as shown below. Which of the
following statement cannot be derived from this email?

o (a) Mo Yi does not know that Ka Kee and Po Yan received the email
o (b) Ka Kee knows that Po Yan received the email
 (c) Po Yan knows that Mo Yi received the email
o (d) Ka Kee knows that the birthday party is held on 25/4

If choice c is selected set score to 1.

78. _______ is a list of names used by the systems, arranged alphabetically.

o (a) Name Dictionary


 (b) Data Dictionary
o (c) Data Library
o (d) System Dictionary

If choice b is selected set score to 1.

79. _______________ management is the process, which controls the changes made to a system, and
manages the different versions of the evolving software product.

o (a) Release
o (b) Version
o (c) Software
 (d) Configuration

If choice d is selected set score to 1.

Page 16
8458343220870056
AWES PGT Computer Science Informatics

80. An exception condition in a computer system caused by an event external to the CPU is called
___________.

o (a) Halt
o (b) Process
o (c) Wait
 (d) Interrupt

If choice d is selected set score to 1.

81. An enumerated data type brings together a group of:-

o (a) Related data variables


o (b) Different looping constructs
 (c) Integers with user-defined names
o (d) Items of different data types

If choice c is selected set score to 1.

82. When an argument is passed by reference:-

o (a) A variable is created in the function to hold the argument's value


o (b) The function copies the value of argument to its own variable
o (c) The function cannot access the argument's value
 (d) The function accesses the argument's original value in the calling program

If choice d is selected set score to 1.

83. A member function can always access the data:-

o (a) In the public part of its class


o (b) In the class of which it is member
 (c) In the object of which it is a member
o (d) In any object of the class of which it is a member

If choice c is selected set score to 1.

84. Member functions defined inside a class specifier are ______________ by default.

o (a) Inline
o (b) Private
 (c) Both of the above
o (d) None of the above

If choice c is selected set score to 1.

85. Converting a predefined data type to another explicitly by programmer is known as __________.

o (a) Type modifier


 (b) Type operator
o (c) Visibility mode

Page 17
8458343220870056
AWES PGT Computer Science Informatics

o (d) Type casting

If choice b is selected set score to 1.

86. The new operator:-

o (a) Tells how much memory is available


o (b) Creates a variable called new
 (c) Returns a pointer to a variable
o (d) Obtain memory for a new variable

If choice c is selected set score to 1.

87. What is the output of the following code?

o (a) Would vary from compiler to compiler


o (b) 2
o (c) 4
 (d) Error, i undefined

If choice d is selected set score to 1.

88. By default, any real number in 'C' is treated as:-

 (a) A double
o (b) A long double
o (c) A float
o (d) Depends upon memory model that you are using

If choice a is selected set score to 1.

89. A short integer occupies 2 bytes, an ordinary integer 4 bytes and a long integer occupies 8 bytes of
memory. If a structure is defined as

struct TAB { short a; int b; long c;} TABLE[10];


then the total memory requirement for TABLE is:-

o (a) 24
 (b) 140
o (c) 40
o (d) 14

If choice b is selected set score to 1.

Page 18
8458343220870056
AWES PGT Computer Science Informatics

90. What can be said about the array representation of circular queue when it contains only one
element?

o (a) Front = Rear -1


o (b) Front = Rear +1
 (c) Front = Rear
o (d) None of the above

If choice c is selected set score to 1.

Page 19

Вам также может понравиться