(Paper-II). - UGC Net

Write your roll number in the space provided on the top of this page. 2. This paper consists of fifty multiple-choice type of questions. 3. At the com...

2 downloads 684 Views 100KB Size
PAPER-II COMPUTER SCIENCE AND APPLICATIONS Signature and Name of Invigilator 1. (Signature) __________________________

OMR Sheet No. : ............................................... (To be filled by the Candidate)

(Name) ____________________________ Roll No.

2. (Signature) __________________________

(In figures as per admission card)

(Name) ____________________________

D

87

Roll No.________________________________ (In words)

1 0

1

Time : 1 /4 hours]

[Maximum Marks : 100

Number of Pages in this Booklet : 8

Number of Questions in this Booklet : 50

¯Ö¸ü߁ÖÖÙ£ÖµÖÖë êú ׻֋ ×­Ö¤ìü¿Ö

Instructions for the Candidates 1. Write your roll number in the space provided on the top of this page. 2. This paper consists of fifty multiple-choice type of questions. 3. At the commencement of examination, the question booklet will be given to you. In the first 5 minutes, you are requested to open the booklet and compulsorily examine it as below : (i) To have access to the Question Booklet, tear off the paper seal on the edge of this cover page. Do not accept a booklet without sticker-seal and do not accept an open booklet. (ii) Tally the number of pages and number of questions in the booklet with the information printed on the cover page. Faulty booklets due to pages/questions missing or duplicate or not in serial order or any other discrepancy should be got replaced immediately by a correct booklet from the invigilator within the period of 5 minutes. Afterwards, neither the Question Booklet will be replaced nor any extra time will be given. (iii) After this verification is over, the OMR Sheet Number should be entered on this Test Booklet. 4. Each item has four alternative responses marked (A), (B), (C) and (D). You have to darken the oval as indicated below on the correct response against each item. B C A Example : D where (C) is the correct response. 5. Your responses to the items are to be indicated in the Answer Sheet given inside the Paper I Booklet only. If you mark at any place other than in the ovals in the Answer Sheet, it will not be evaluated. 6. Read instructions given inside carefully. 7. Rough Work is to be done in the end of this booklet. 8. If you write your name or put any mark on any part of the test booklet, except for the space allotted for the relevant entries, which may disclose your identity, you will render yourself liable to disqualification. 9. You have to return the test question booklet and OMR Answer sheet to the invigilators at the end of the examination compulsorily and must not carry it with you outside the Examination Hall. 10. Use only Blue/Black Ball point pen. 11. Use of any calculator or log table etc., is prohibited. 12. There is no negative marks for incorrect answers.

D-87-10

1. ¯ÖÆü»Öê ¯Öéšü êú ‰ú¯Ö¸ü ×­ÖµÖŸÖ Ã£ÖÖ­Ö ¯Ö¸ü †¯Ö­ÖÖ ¸üÖê»Ö ­Ö´²Ö¸ü ×»Ö׏֋ … 2. ‡ÃÖ ¯ÖÏ¿­Ö-¯Ö¡Ö ´Öë ¯Ö“ÖÖÃÖ ²ÖÆãü׾֍ú»¯ÖßµÖ ¯ÖÏ¿­Ö Æïü … 3. ¯Ö¸ü߁ÖÖ ¯ÖÏÖ¸ü´³Ö ÆüÖê­Öê ¯Ö¸ü, ¯ÖÏ¿­Ö-¯ÖãÛß֍úÖ †Ö¯ÖúÖê ¤êü ¤üß •ÖÖµÖêÖß … ¯ÖÆü»Öê ¯ÖÖÑ“Ö ×´Ö­Ö™ü †Ö¯ÖúÖê ¯ÖÏ¿­Ö-¯ÖãÛß֍úÖ ÖÖê»Ö­Öê ŸÖ£ÖÖ ˆÃ֍úß ×­Ö´­Ö×»Ö×ÖŸÖ •ÖÖÑ“Ö êú ׻֋ פüµÖê •ÖÖµÖëÖê, וÖÃ֍úß •ÖÖÑ“Ö †Ö¯ÖúÖê †¾Ö¿µÖ ú¸ü­Öß Æîü : (i) ¯ÖÏ¿­Ö-¯ÖãÛß֍úÖ ÖÖê»Ö­Öê êú ׻֋ ˆÃ֍êú ú¾Ö¸ü ¯Öê•Ö ¯Ö¸ü »ÖÖß úÖÖ•Ö úß ÃÖᯙ úÖê ±ú֛Íü »Öë … Öã»Öß Æãü‡Ô µÖÖ ×²Ö­ÖÖ Ã™üߍú¸ü-ÃÖᯙ úß ¯ÖãÛß֍úÖ Ã¾ÖߍúÖ¸ü ­Ö ú¸ëü … (ii) ú¾Ö¸ü ¯Öéšü ¯Ö¸ü ”û¯Öê ×­Ö¤ìü¿ÖÖ­ÖãÃÖÖ¸ü ¯ÖÏ¿­Ö-¯ÖãÛß֍úÖ êú ¯Öéšü ŸÖ£ÖÖ ¯ÖÏ¿­ÖÖë úß ÃÖӏµÖÖ úÖê †“”ûß ŸÖ¸üÆü “Öîú ú¸ü »Öë ׍ú µÖê ¯Öæ¸êü Æïü … ¤üÖêÂÖ¯ÖæÖÔ ¯ÖãÛß֍úÖ ×•Ö­Ö´Öë ¯Öéšü/¯ÖÏ¿­Ö ú´Ö ÆüÖë µÖÖ ¤ãü²ÖÖ¸üÖ †Ö ÖµÖê ÆüÖë µÖÖ ÃÖß׸üµÖ»Ö ´Öë ­Ö ÆüÖë †£ÖÖÔŸÖ ×úÃÖß ³Öß ¯ÖύúÖ¸ü úß ¡Öãיü¯ÖæÖÔ ¯ÖãÛß֍úÖ Ã¾ÖߍúÖ¸ü ­Ö ú¸ëü ŸÖ£ÖÖ ˆÃÖß ÃÖ´ÖµÖ ˆÃÖê »ÖÖî™ü֍ú¸ü ˆÃ֍êú ãÖÖ­Ö ¯Ö¸ü ¤æüÃÖ¸üß ÃÖÆüß ¯ÖÏ¿­Ö-¯ÖãÛß֍úÖ »Öê »Öë … ‡Ã֍êú ׻֋ †Ö¯ÖúÖê ¯ÖÖÑ“Ö ×´Ö­Ö™ü פüµÖê •ÖÖµÖëÖê … ˆÃ֍êú ²ÖÖ¤ü ­Ö ŸÖÖê †Ö¯Öúß ¯ÖÏ¿­Ö-¯ÖãÛß֍úÖ ¾ÖÖ¯ÖÃÖ »Öß •ÖÖµÖêÖß †Öî¸ü ­Ö Æüß †Ö¯ÖúÖê †×ŸÖ׸üŒŸÖ ÃÖ´ÖµÖ ×¤üµÖÖ •ÖÖµÖêÖÖ … (iii) ‡ÃÖ •ÖÖÑ“Ö êú ²ÖÖ¤ü OMR ¯Ö¡Öú úß Îú´Ö ÃÖӏµÖÖ ‡ÃÖ ¯ÖÏ¿­Ö-¯ÖãÛß֍úÖ ¯Ö¸ü †Ó׍úŸÖ ú¸ü ¤ëü … 4. ¯ÖϟµÖêú ¯ÖÏ¿­Ö êú ׻֋ “ÖÖ¸ü ˆ¢Ö¸ü ׾֍ú»¯Ö (A), (B), (C) ŸÖ£ÖÖ (D) פüµÖê ÖµÖê Æïü … †Ö¯ÖúÖê ÃÖÆüß ˆ¢Ö¸ü êú ¤üߑÖÔ¾Öé¢Ö úÖê ¯Öê­Ö ÃÖê ³Ö¸üú¸ü úÖ»ÖÖ ú¸ü­ÖÖ Æîü •ÖîÃÖÖ ×ú ­ÖߓÖê פüÖÖµÖÖ ÖµÖÖ Æîü … A B C ˆ¤üÖÆü¸üÖ : D •Ö²Ö׍ú (C) ÃÖÆüß ˆ¢Ö¸ü Æîü … 5. ¯ÖÏ¿­ÖÖë êú ˆ¢Ö¸ü êú¾Ö»Ö ¯ÖÏ¿­Ö ¯Ö¡Ö I êú †­¤ü¸ü פüµÖê ÖµÖê ˆ¢Ö¸ü-¯Ö¡Öú ¯Ö¸ü Æüß †Ó׍úŸÖ ú¸ü­Öê Æïü … µÖפü †Ö¯Ö ˆ¢Ö¸ü ¯Ö¡Öú ¯Ö¸ü פüµÖê ÖµÖê ¤üߑÖÔ¾Öé¢Ö êú †»ÖÖ¾ÖÖ ×úÃÖß †­µÖ ãÖÖ­Ö ¯Ö¸ü ˆ¢Ö¸ü דÖÅ­ÖÖÓ׍úŸÖ ú¸ŸÖê Æïü, ŸÖÖê ˆÃ֍úÖ ´Ö滵ÖÖӍú­Ö ­ÖÆüà Æü֐ê ÖÖ … 6. †­¤ü¸ü פüµÖê ÖµÖê ×­Ö¤ìü¿ÖÖë úÖê ¬µÖÖ­Ö¯Öæ¾Öԍú ¯ÖœÍëü … 7. ú““ÖÖ úÖ´Ö (Rough Work) ‡ÃÖ ¯ÖãÛß֍úÖ êú †Û­ŸÖ´Ö ¯Öéšü ¯Ö¸ü ú¸ëü … 8. µÖפü †Ö¯Ö ˆ¢Ö¸ü-¯ÖãÛß֍úÖ ¯Ö¸ü †¯Ö­ÖÖ ­ÖÖ´Ö µÖÖ ‹êÃÖÖ úÖê‡Ô ³Öß ×­Ö¿ÖÖ­Ö ×•ÖÃÖÃÖê †Ö¯Öúß ¯ÖÆü“ÖÖ­Ö ÆüÖê Ã֍êú, ׍úÃÖß ³Öß ³ÖÖÖ ¯Ö¸ü ¤ü¿ÖÖԟÖê µÖÖ †Ó׍úŸÖ ú¸üŸÖê Æïü ŸÖÖê ¯Ö¸ü߁ÖÖ êú ×»ÖµÖê †µÖÖêµÖ ‘ÖÖê×ÂÖŸÖ ú¸ü פüµÖê •ÖÖµÖëÖê … 9. †Ö¯ÖúÖê ¯Ö¸ü߁ÖÖ ÃÖ´ÖÖ¯ŸÖ ÆüÖê­Öê ¯Ö¸ü ¯ÖÏ¿­Ö-¯ÖãÛß֍úÖ ‹¾ÖÓ OMR ˆ¢Ö¸ü-¯Ö¡Öú ×­Ö¸ü߁֍ú ´ÖÆüÖê¤üµÖ úÖê »ÖÖî™üÖ­ÖÖ †Ö¾Ö¿µÖú Æîü †Öî¸ü ¯Ö¸ü߁ÖÖ ÃÖ´ÖÖÛ¯ŸÖ êú ²ÖÖ¤ü ˆÃÖê †¯Ö­Öê ÃÖÖ£Ö ¯Ö¸ü߁ÖÖ ³Ö¾Ö­Ö ÃÖê ²ÖÖÆü¸ü ­Ö »Öêú¸ü •ÖÖµÖë … 10. êú¾Ö»Ö ­Öß»Öê/úÖ»Öê ²ÖÖ»Ö ¯¾Öևՙü ¯Öê­Ö úÖ Æüß ‡ÃŸÖê´ÖÖ»Ö ú¸ëü … 11. ׍úÃÖß ³Öß ¯ÖύúÖ¸ü úÖ ÃÖӐ֝֍ú (îú»Öãú»Öê™ü¸ü) µÖÖ »ÖÖÖ ™êü²Ö»Ö †Öפü úÖ ¯ÖϵÖÖêÖ ¾ÖÙ•ÖŸÖ Æîü … 12. Ö»ÖŸÖ ˆ¢Ö¸üÖë êú ׻֋ úÖê‡Ô †Óú ú֙êü ­ÖÆüà •Ö֋ѐÖê … 1

P.T.O.

COMPUTER SCIENCE AND APPLICATIONS Paper – II Note : This paper contains fifty (50) objective type questions, each question carrying two (2) marks. Attempt all the questions. 1.

2.

5.

The number of integers between 1 and 250 that are divisible by 2, 5 and 7 is (A) 2

(B)

(C)

(D) 8

5

3

Consider the problem of connecting 19 lamps to a single electric outlet by using extension cords each of which has four outlets. The number of extension cords required is (A) 4

An undirected graph possesses an eulerian circuit if and only if it is connected and its vertices are

(B)

5

(C)

6

(D) 7

(A) all of even degree (B)

all of odd degree

(C)

of any degree

6.

(A) 2095.75

(D) even in number

3.

A partially ordered set is said to be a lattice if every two elements in the set have

a unique greatest lower bound

(C)

both (A) and (B)

7.

The minimum number of edges in a connected graph with ‘n’ vertices is equal to

(C)

8.

2095.937

AB +  A + B  is equivalent to

(B)

A XB

(C)

(A U B) XA

An astable multivibrator has (A) one stable state

n (n – 1) 2 2

n

(D) n – 1 Paper-II

(C)

(D) (A X B) U A

(A) n (n – 1) (B)

2095.075

(A) A U B

(D) none of the above

4.

(B)

(D) 2095.0937

(A) a unique least upper bound (B)

The decimal number equivalent of (4057.06)8 is

(B)

two stable states

(C)

no stable states

(D) none of these 2

D-87-10

9.

13.

(A) 01001001.1100

Which one of the following will set the value of y to 5 if x has the value 3, but not otherwise ?

(B)

11001001.1100

(A) if (x = 3) y = 5

(C)

10110110.0100

(B)

if x = = 3 (y = 5)

(D) 10110110.1100

(C)

if (x = = 3); y = 5

12-bit 2’s complement of –73.75 is

(D) if (x = = 3) y = 5 10.

Encoding of data bits 0011 into 7-bit even Parity Hamming Code is

14.

(A) 0011110 (B)

0101110

(C)

0010110

How many of the declarations are correct ?

the

following

(A) The body of a while loop is executed at least once.

(D) 0011100

11.

Which one of sentences is true ?

(B)

The body of a do … while loop is executed at least once.

(C)

The body of a do … while loop is executed zero or more times.

following

(D) A for loop can never be used in place of a while loop.

int z = 7.0; double void = 0.000; short array [2] = {0, 1, 2};

15.

char c = “\n”;

(A) Characters “Black”

(A) None (B)

One is correct

(C)

Two are correct

(D) All four are correct

12.

“Black” refers in the “Black-box” testing means of

(B)

I – O is hidden

(C)

Design is hidden

movie

(D) Users are hidden

The value of the following expression (13 / 4 * 3) % 5 + 1 is

16.

In generalisation, the differences between members of an entity is

(A) 5.75

(A) maximized

(B)

2.95

(B)

minimized

(C)

1.4875

(C)

both (A) & (B)

(D) 5 D-87-10

the

(D) None of these 3

Paper-II

17.

The dependency preservation decomposition is a property to decompose database schema D, in which each functional dependency X → Y specified in F,

21.

(A) 111

(A) appeared directly in one of the relation schemas Ri in the decomposed D. (B)

could be inferred from dependencies that appear in some Ri.

(C)

both (A) and (B) 22.

(C)

9999

A binary tree with 27 nodes has _______ null branches. (A) 54 (B)

27

(A) Validation based

(C)

26

Time stamp ordering (D) None of the above

(C) Lock-based (D) None of these 23.

Optical storage is a (A) high-speed direct storage device. (B)

The time complexity to build a heap of n elements is

access (A) 0(1)

low-speed direct access storage device.

(C)

medium-speed direct access storage device. (D) high-speed sequential access storage device. 20.

999

Which of the following is an optimistic concurrency control method ? (B)

19.

(B)

(D) None of the above

(D) None of these 18.

What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root at depth 0) ?

(B)

0(lgn)

(C)

0(n)

(D) 0(nlgn)

24.

Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges ?

Linear probing suffers problem known as

a

(A) Secondary clustering

(A) Authorization

(B)

Primary clustering

(B) (C)

(C)

Both (A) and (B)

Authentication Access Control

(D) None of these

(D) All of these Paper-II

from

4

D-87-10

25.

29.

Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88 ?

(A) FTP

(A) 90, 40, 65, 50, 88 (B)

90, 110, 80, 85, 88

(C)

190, 60, 90, 85, 88

Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ?

(B)

TFTP

(C)

TELNET

(D) NFS

(D) 65, 140, 80, 70, 88 30. 26.

Frequency shift keying is used mostly in

(A) exhibited by all demodulator, when the input signal to noise ratio is low.

(A) Radio transmission (B)

Telegraphy

(C)

Telephone

The threshold effect in demodulator is

(B)

the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.

(C)

the property exhibited by all A.M. suppressed carrier coherent demodulator.

(D) None of the above

27.

The baud rate is (A) always equal to the bit transfer rate (B) (C)

(D) the property exhibited correlation receiver.

equal to twice the bandwidth of an ideal channel

31.

not equal to the signalling rate

by

Object code is the output of ______. (A) Operating System

(D) equal to half of the bandwidth of an ideal channel

(B)

Compiler or Assembler

(C)

only Assembler

(D) only Compiler 28.

How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron ?

32.

‘Macro’ in an assembly program is _______.

(A) 300 MHz

(A) sub program

(B)

3 GHz

(B)

a complete program

(C)

300 THz

(C)

a hardware portion

(D) relative coding

(D) 30 KHz D-87-10

level

5

Paper-II

33.

38.

Grammar of the programming is checked at ________ phase of compiler.

WINDOWS operating.

is

a

_________

(A) Real time

(A) semantic analysis

(B)

Multi-user

(B)

code generation

(C)

Preemptive

(C)

syntax analysis

(D) Non-preemptive

(D) code optimization 39. 34.

The register or main memory location which contains the effective address of the operand is known as

(A) Interruption

(A) pointer (B)

special location

(C)

indexed register

(B)

Termination

(C)

Swapping

(D) None of the above

(D) None of the above 35.

Page making process from main memory to disk is called

40.

A Dead-lock in an Operating System is

Macro-processors are ______.

(A) Desirable process

(A) Hardware

(B)

Undesirable process

(B)

Compiler

(C)

Definite waiting process

(C)

Registers

(D) All of the above

(D) None of the above 41. 36.

Prototyping is used to

The dynamic allocation of storage areas with VSAM files is accomplished by

(A) test the software as an end product (B)

expand design details

(A) Hashing

(C)

refine and establish requirements gathering

(B)

Control splits

(C)

Overflow areas

(D) None of the above

(D) Relative recoding 37.

42.

Which of the following command the file names in multiple columns ?

Which one of these are not software maintenance activity ?

(A) IS – X

(A) Error correction

(B)

IS

(B)

Adaptation

(C)

IS – 1

(C)

Implementation of Enhancement

(D) Establishing scope

(D) IS – f – X Paper-II

6

D-87-10

43.

The system specification is the first deliverable in the computer system engineering process which does not include

47.

Data mining is (A) the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions. (B) a tool that allows end users direct access and manipulation of data from within datawarehousing environment without the intervention of customised programming activity. (C) a tool that helps end users extract useful business information from large database. (D) All of the above

48.

E-Choupal refers to (A) calling meeting of Surpanches electronically. (B) conducting Panchayat meeting using latest electronic gadgets. (C) providing window of information to villagers and farmers in NIC network. (D) None of the above

49.

The basic concepts of ethics in information society is/are (A) Responsibility (B) Accountability (C) Liability (D) All of the above

50.

One of the distinguished features of super-computer over other category of computer is (A) parallel processing (B) highest accuracy level (C) more speed (D) more capacity

(A) Functional Description (B)

Cost

(C)

Schedule

(D) Technical Analysis

44.

The COCOMO model was introduced in the book title “Software Engineering Economics” authored by (A) Abraham Silberschatz (B)

Barry Boehm

(C)

C.J. Date

(D) D.E. Knuth

45.

The Warnier diagram enables analyst (A) to represent information hierarchy in a compact manner (B)

to further identify requirement

(C)

to estimate the total cost involved

(D) None of the above

46.

A data mart may contain (A) summarised data (B)

de-normalized data

(C)

aggregate departmental data

(D) All of the above D-87-10

7

Paper-II

Space For Rough Works

Paper-II

8

D-87-10