Академический Документы
Профессиональный Документы
Культура Документы
(i) ++i<=10
(ii) i++<=10
int ch=20;
System.out.println(++ch);
System.out.println(ch);
(a) 21
21
o (b) 20
20
o (c) 20
21
o (d) 21
20
int i=10;
int n = i++%5;
o (a) 10 & 0
(b) 11 & 0
o (c) 11 & 2
o (d) Can't be calculated
Page 1
8458343220870056
AWES PGT Computer Science Informatics
o (a) m is 100
o (b) m is 10
(c) No output
o (d) None of the above
7. How many times the following code prints the string "APS"?
o (a) Zero
(b) 1
o (c) 1000
Page 2
8458343220870056
AWES PGT Computer Science Informatics
8. Which allows you to create a derived class that inherits properties from more than one base class?
10. The arguments that determine the state of the cout object are called:-
Page 3
8458343220870056
AWES PGT Computer Science Informatics
14. A semiconductor memory constructed using bipolar transistors or MOS transistor stores information
in the form of a:-
o (a) 2000m
(b) 100m
o (c) 200m
o (d) 500m
17. ______________ software makes use of non numerical algorithms to solve complex problems that
are not amenable to computation or straightforward analysis.
o (a) Web-based
o (b) Real time
(c) Artificial Intelligence
o (d) Embedded
18. The ___________ model stipulates that the requirements be completely specified before the rest of
the development can processed.
Page 4
8458343220870056
AWES PGT Computer Science Informatics
19. _____________ model couples the iterative nature of the prototyping with the controlled and
systematic aspects of the linear sequential model.
20. ____________ strategy assumes that residual faults remain in the system and can continue in
operation after some system failures have occurred.
21. _____________ is a classification scheme, which shows how an object class is related to other
classes through common attributes and services.
o (a) Inheritances
(b) Taxonomy
o (c) Hierarchy
o (d) None of the above
23. A bridge has access to which address of a station on the same network?
o (a) Network
(b) Physical
o (c) Service Access point
o (d) All of the above
Page 5
8458343220870056
AWES PGT Computer Science Informatics
24. Which of the following is not a primary object of ASP Object Model?
o (a) The method of determining which device has access to transmission medium at any time
(b) A form of TDMA in which circuit switching is used to dynamically change channel
assignments
o (c) Is a medium access control technique for TDMA
o (d) All of the above
27. How many hosts can be attached to each of the local area network?
(a) 254
o (b) 128
o (c) 168
o (d) 192
Page 6
8458343220870056
AWES PGT Computer Science Informatics
(a) Client-server
o (b) 3-tier
o (c) Peer to peer
o (d) Local-server
31. Which of the following is TRUE only of XML but not HTML?
o (a) OR
o (b) AND
o (c) EX-OR
(d) NAND
34. If x={a,b,c,d}, then number of binary operations that can be defined on x is:-
16
o (a) 4
2
o (b) 4
16
(c) 2
4
o (d) 2
Page 7
8458343220870056
AWES PGT Computer Science Informatics
o (a) XY+YZ
(b) X+YZ
o (c) XZ+Y
o (d) X+Y+Z
37. A combinational logic circuit which generates a particular binary word or number is:-
o (a) Encode
o (b) Demultiplexer
o (c) Decoder
(d) Multiplexer
39. Which of the following memories allows simultaneous read and write operations?
o (a) RAM
o (b) EPROM
o (c) ROM
(d) None of the above
Page 8
8458343220870056
AWES PGT Computer Science Informatics
o (a) QWERTY
o (b) Numeric
(c) Dvorak
o (d) Alphanumeric
o (a) Intelligence
(b) Resolution
o (c) Buffer size
o (d) Vertical dimension
o (a) 2NF
o (b) B CNF
o (c) 1 NF
(d) 3NF
o (a) Records
o (b) Relations
(c) Domains
o (d) Queries
Page 9
8458343220870056
AWES PGT Computer Science Informatics
46. Manager's salary details are hidden from the employee. This is called:-
49. Which of the command closes text file which have been created using
"SET ALTERNATIVE" <FILENAME> "Command" ?
Page 10
8458343220870056
AWES PGT Computer Science Informatics
o (a) P and S
(b) Q and R
o (c) Q and S
o (d) P and R
o (a) 4
o (b) 5
o (c) 3
(d) 2
o (a) 4
o (b) 7
(c) 8
o (d) None of the above
Page 11
8458343220870056
AWES PGT Computer Science Informatics
o (a) 1 = 4, n = 6
(b) 1 = 2, n = 6
o (c) 1 = 3, n = 8
o (d) None of the above
56. Which of the following formulas can be used to generate random integers between 1 and 10?
o (a) 0
o (b) 5
(c) Infinite
o (d) Error
58. Name the function in which there exists a statement that calls the function itself.
59. _______________ package is used by compiler itself. So it does not need to be imported for use.
o (a) java.math
Page 12
8458343220870056
AWES PGT Computer Science Informatics
(b) java.lang
o (c) java.applet
o (d) java.awt
o (a) ArithmeticException
(b) Throwable
o (c) Class
o (d) Exception
62. In JDBC ____________ imports all Java classes concerned with database connectivity.
o (a) java.mysql.*
o (b) javax.sql.*
(c) java.sql.*
o (d) com.*
o (a) Socket
o (b) Web server
o (c) Compiler
(d) Database
o (a) Integer
o (b) No
(c) Initial
o (d) Float
Page 13
8458343220870056
AWES PGT Computer Science Informatics
o (a) 2.4
(b) 2.3
o (c) 2.2
o (d) 2.1
o (a) HSIDES
o (b) BELOW
o (c) ABOVE
(d) VOID
69. A compiler for high level language that runs on one machine and produces code for a another
machine is called as:-
Page 14
8458343220870056
AWES PGT Computer Science Informatics
70. To avoid the race condition, the number of processes that may be simultaneously inside their critical
section is:-
o (a) 0
o (b) 2
o (c) 4
(d) 1
73. The term _________ is used to describe a secret or undocumented means of getting into a
computer system.
o (a) Spyware
o (b) Trapdoor
(c) Backdoor
o (d) Trojan
74. Viruses that change their characteristics as they infect are called ___________.
(a) Polymorphic
o (b) Stealth
o (c) Camouflage
o (d) Armored
75. Two or more copies of the same data that mismatch are known as:-
Page 15
8458343220870056
AWES PGT Computer Science Informatics
77. Lily tells her friends, Ka Kee (KaKee@hkeaa.edu.hk), Po Yan (PoYan@hkeaa.edu.hk) and Mo Yi
(MoYi@hkeaa.edu.hk), the date of her birthday party through an email as shown below. Which of the
following statement cannot be derived from this email?
o (a) Mo Yi does not know that Ka Kee and Po Yan received the email
o (b) Ka Kee knows that Po Yan received the email
(c) Po Yan knows that Mo Yi received the email
o (d) Ka Kee knows that the birthday party is held on 25/4
79. _______________ management is the process, which controls the changes made to a system, and
manages the different versions of the evolving software product.
o (a) Release
o (b) Version
o (c) Software
(d) Configuration
Page 16
8458343220870056
AWES PGT Computer Science Informatics
80. An exception condition in a computer system caused by an event external to the CPU is called
___________.
o (a) Halt
o (b) Process
o (c) Wait
(d) Interrupt
84. Member functions defined inside a class specifier are ______________ by default.
o (a) Inline
o (b) Private
(c) Both of the above
o (d) None of the above
85. Converting a predefined data type to another explicitly by programmer is known as __________.
Page 17
8458343220870056
AWES PGT Computer Science Informatics
(a) A double
o (b) A long double
o (c) A float
o (d) Depends upon memory model that you are using
89. A short integer occupies 2 bytes, an ordinary integer 4 bytes and a long integer occupies 8 bytes of
memory. If a structure is defined as
o (a) 24
(b) 140
o (c) 40
o (d) 14
Page 18
8458343220870056
AWES PGT Computer Science Informatics
90. What can be said about the array representation of circular queue when it contains only one
element?
Page 19