Higher Secondary School Teacher – 144-2013
Question Paper Code: 144/2013
Medium of Question: English
Date of Test 29-08-2014
Alphacode A
—
—
Question 1 : In a BST, the traversal type which would print the values in the nodes in sorted order is
1. Preorder
2. Inorder
3. Postorder
4. None of the above
Click here for answer
2. Inorder
Question 2 : The contrapositive of the statement, “You win the game if you know the rules but are not overconfident” is :
1. If you lose the game then you don’t know the rules or you are overconfident.
2. If you know the rules and are overconfident then you win the game.
3. A necessary condition that you know the rules or you are not overconfident is that you win the game.
4. If you dont’t know the rules or are overconfident you lose the game.
Click here for answer
1. If you lose the game then you don’t know the rules or you are overconfident.
Question 3 : In which one of the following models can requirements be redefined
1. Spiral Model
2. Prototyping Model
3. Waterfall Model
4. Evolutionary Model
Click here for answer
2. Prototyping Model
Question 4 : The method adopted by the memory management module of an OS of a computer to periodically collect all the free memory space to form contiguous block of free space is called
1. Dynamic Memory Allocation
2. Garbage Collection
3. Concatenation
4. Collision
Click here for answer
2. Garbage Collection
Question 5 : Among the following statements about binary trees which one is NOT true ?
1. Every non-empty tree has exactly one root node.
2. Every non-root node has exactly one parent.
3. Every binary tree has at least one node.
4. Every node has at most two children.
Click here for answer
3. Every binary tree has at least one node.
Question 6 : DRAM is used as main memory in a computer system because it
1. needs refreshing circuitary
2. consumes less power
3. has higher speed
4. has lower cell density
Click here for answer
3. has higher speed
Question 7 : 8251 is a
1. UART
2. USART
3. Programmable interval timer/counter
4. Programmable Interrupt Controller
Click here for answer
2. USART
Question 8 : A public key encryption system
1. Allows only the correct receiver to decode the data
2. Does not encode the data before transmitting it
3. Allows only the correct sender to decode the data
4. Allows only one to decode the transmission
Click here for answer
1. Allows only the correct receiver to decode the data
Question 9 : Environment variables can be accessed by
1. System programs
2. C programs
3. Shell scripts
4. All of these
Click here for answer
4. All of these
Question 10 : DML is used for
1. Addition of new structures in the database system
2. Manipulation and processing of database
3. Definition of physical structure of database system
4. Description of logical structure of database
Click here for answer
2. Manipulation and processing of database
Question 11 : Suppose that N = {1, 2, 3, …} be ordered by divisibility, which one of the following subset is totally ordered?
1. (2, 6, 24)
2. (4, 15, 30)
3. (3,5,15)
4. (2,9,16)
Click here for answer
1. (2, 6, 24)
Question 12 : Which among the following searching technique takes O(1) time to locate a data ?
1. Binary Search
2. Tree Search
3. Hashing
4. Linear Search
Click here for answer
3. Hashing
Question 13 : The cause for poor response time is
1. High I/O rates
2. High paging rates
3. Process busy
4. Any of the above
Click here for answer
4. Any of the above
Question 14 : Which among the following statements is false ?
1. The data dictionary contains the name and description of each data element
2. Data elements in the database can be modified by changing the data dictionary
3. The data dictionary is a tool used exclusively by the database administrator
4. Database administrator normally maintains the data dictionary
Click here for answer
2. Data elements in the database can be modified by changing the data dictionary
Question 15 : The infix expression for the postfix expression x 12 + z 17 y + 42 * / + is
1. x + 12 + z / 17 + y * 42
2. x + 12 + z / (17 + y)*42
3. (x + 12 + z)/(17 + y * 42)
4. x + 12 + z / ((17 + y) * 42)
Click here for answer
4. x + 12 + z / ((17 + y) * 42)
Question 16 : The basic types of programmable arrays are made of ________________
1. AND gates
2. AND gates and OR gates
3. OR gates
4. NAND and NOR gates
Click here for answer
2. AND gates and OR gates
Question 17 : A COCOMO model is
1. Complete Cost Estimation Model
2. Constructive Cost Estimation Model
3. Common Cost Estimation Model
4. Comprehensive Cost Estimation Model
Click here for answer
2. Constructive Cost Estimation Model
Question 18 : The interval between the time of submission and completion of a job is called as ___________
1. Turnaround time
2. Waiting time
3. Response time
4. Throughput
Click here for answer
1. Turnaround time
Question 19 : An assembler is
1. data dependent
2. programming language dependent
3. machine dependent
4. syntax dependent
Click here for answer
3. machine dependent
Question 20 : The expansion of nested macro calls follows _________ rule
1. LILO
2. LIFO
3. FIFO
4. priority
Click here for answer
2. LIFO
Question 21 : Von Neumann architecture is
1. SISD
2. SIMD
3. MIMD
4. MISD
Click here for answer
1. SISD
Question 22 : The device that is used to forward data packets from one network to another is called a _________
1. Bridge
2. Hub
3. Switch
4. Gateway
Click here for answer
3. Switch
Question 23 : Which among the following is the most general phrase structured grammar ?
1. Context – Sensitive
2. Context – Free
3. Regular
4. None of the above
Click here for answer
1. Context – Sensitive
Question 24 : When the following instructions have been executed, what will be the contents of register AL ?MOV BL, 8C.MOV AL, 7E.ADD AL, BL.
1. 0A and carry flag is reset
2. 0A and carry flag is set
3. 6A and carry flag is reset
4. 6A and carry flag is set
Click here for answer
2. 0A and carry flag is set
Question 25 : The first modern computer was called __________
1. UNIVAC-I
2. FLOW-MATIC
3. ENIAC
4. INTEL
Click here for answer
3. ENIAC
Question 26 : Secret-key encryption is also known as
1. Secret-encryption
2. Asymmetric encryption
3. Symmetric encryption
4. Private encryption
Click here for answer
3. Symmetric encryption
Question 27 : DNS is a
1. Distributed hierarchical naming system
2. Vertical naming system
3. Horizontal naming system
4. Client Server system
Click here for answer
1. Distributed hierarchical naming system
Question 28 : E-commerce is not suitable for
1. Online job searching
2. Sale/Purchase of expensive jewellery and antiques
3. Sale/Purchase of branded clothes
4. Sale/Purchase of mobile phones
Click here for answer
1. Online job searching
Question 29 : Several factors exist that affect the efficiency of lookup operations in a hash table. Which among the following is NOT one of those factors ?
1. Size of elements stored in the hash table.
2. Number of elements stored in the hash table.
3. Quality of the hash function.
4. Number of buckets in the hash table.
Click here for answer
1. Size of elements stored in the hash table.
Question 30 : A DBMS query language is designed to
1. specify the structure of a database
2. support end users with English-like commands
3. support the development of complex applications software
4. all of the above
Click here for answer
4. all of the above
Question 31 : Let r be a resource. There are 3 user processes each requiring 2 units of R. Then the minimum number of units of R such that no deadlocks will occur is
1. 4
2. 3
3. 5
4. 6
Click here for answer
1. 4
Question 32 : Assume a cache memory with associative mapping. If the main memory is of 8K bytes and the cache memory is of 2K words, then each word of cache memory is
1. 21 bits
2. 11 bits
3. 16 bits
4. 20 bits
Click here for answer
3. 16 bits
Question 33 : Which of the following is true ?
1. Stream cipher technique is an encryption technique
2. Block cipher technique is an encryption technique
3. Both (A) and (B)
4. Neither of (A) and (B)
Click here for answer
3. Both (A) and (B)
Question 34 : Given a linked list with n elements. Then the time taken to insert an element after an element pointed to by some pointer is
1. O(n log2 n)
2. O(1)
3. O(log2 n)
4. O(n)
Click here for answer
2. O(1)
Question 35 : Let h be a hashing function and is used to hash n keys into a table of size m (given n<=m). Then the expected number of collisions involving a particular key x is
1. less than 1
2. less than m
3. less than n
4. less than n/2
Click here for answer
1. less than 1
Question 36 : If L is a lattice, then for every a and b in L which among the following is correct?
1. a ν (b Λ c) =a
2. a ν (b ν c) = (a ν b) ν c
3. a ν b = a Λ b
4. a ν (b ν c) = b
Click here for answer
2. a ν (b ν c) = (a ν b) ν c
Question 37 : The technique of improving the priority of process waiting in queue for CPU allocation is called _________________
1. Starvation
2. Ageing
3. Revocation
4. Relocation
Click here for answer
2. Ageing
Question 38 : PSW is saved in stack when there is a
1. interrupt recognized
2. execution of CALL instruction
3. execution of RST instruction
4. all of these
Click here for answer
1. interrupt recognized
Question 39 : The default subnet mask for a Class C network is
1. 127.0.0.1
2. 255.0.0.0
3. 255.255.0.0
4. 255.255.255.0
Click here for answer
4. 255.255.255.0
Question 40 : Which one of the following is NOT an advantage of Distributed System?
1. Reliability
2. Incremental growth
3. Resource sharing
4. None of the above
Click here for answer
4. None of the above
Question 41 : Cache memory is based
1. on the property of locality of reference
2. on the fact that references generally tend to cluster
3. on the heuristic 90-10 rule
4. all of the above
Click here for answer
1. on the property of locality of reference
Question 42 : The language component of DBMS which can be embedded in a program is
1. the database administrator (DBA)
2. the data manipulation language (DML)
3. the data definition language (DDL)
4. a query language
Click here for answer
2. the data manipulation language (DML)
Question 43 : A computer system that permits multiple users to run programs at same time is _______
1. Real time system
2. Time sharing system
3. Multiprogramming system
4. Multi tasking system
Click here for answer
4. Multi tasking system
Question 44 : Which of the following statement is the negation of the statement, “10 is even and -5 is negative”
1. 10 is even and -5 is not negative
2. 10 is odd and -5 is not negative
3. 10 is even or -5 is not negative
4. 10 is odd or -5 is not negative
Click here for answer
4. 10 is odd or -5 is not negative
Question 45 : The __________ sort relatively passes through a list to exchange the first element with any element less than it and then repeats with a new first element
1. selection sort
2. quick sort
3. insertion sort
4. heap sort
Click here for answer
2. quick sort
Question 46 : Which among the following is the data structure that is used to check balanced parenthesis in an expression
1. Stack
2. Tree
3. Queue
4. Array
Click here for answer
1. Stack
Question 47 : p → q is logically equivalent to
1. ~q → p
2. ~pνq
3. ~pΛq
4. ~p → q
Click here for answer
2. ~pνq
Question 48 : Which of the following regular expression over {0,1} denotes the set of all strings not containing 100 as substring?
1. 0*1*01*
2. 0*1010*
3. 0*(1*0)*
4. 0*(10+1)*
Click here for answer
4. 0*(10+1)*
Question 49 : Which one of the following is NOT a size metric?
1. Cyclomatic complexity
2. Function count
3. LOC
4. Program Length
Click here for answer
1. Cyclomatic complexity
Question 50 : The scheduling policy that is most suitable for a time-shared operating system is :
1. SJF
2. Elevator
3. Round Robin
4. FCFS
Click here for answer
3. Round Robin
Question 51 : If a node in a BST has two children, then its inorder predecessor has
1. no child
2. no left child
3. no right child
4. two children
Click here for answer
3. no right child
Question 52 : The maximum number of processes that may be simultaneously inside the critical section inorder to avoid race condition is
1. one
2. zero
3. more than two
4. two
Click here for answer
1. one
Question 53 : The time required by a sector to reach below read/write head is called as ___________
1. Seek time
2. Access time
3. Latency time
4. None
Click here for answer
3. Latency time
Question 54 : Which on of the following TCP/IP protocol is used for transferring e-mail messages from one machine to another?
1. RPC
2. FTP
3. SMTP
4. RTP
Click here for answer
3. SMTP
Question 55 : Among the following, which one is used to connect two systems, specifically if the systems use different protocols.
1. hub
2. bridge
3. gateway
4. repeater
Click here for answer
3. gateway
Question 56 : The disadvantage of a pipe is that
1. It is a one way communication channel
2. It dies along with the process that created it
3. It cannot be shared by unrelated processes
4. All of the above
Click here for answer
4. All of the above
Question 57 : a subschema expresses
1. the physical view
2. the logical view
3. the external view
4. all of the above
Click here for answer
3. the external view
Question 58 : Given that modules X and Y operate on the same input and output data, then the cohesion is
1. Procedural
2. Communicational
3. Logical
4. Sequential
Click here for answer
2. Communicational
Question 59 : Which among the following sorting methods is the most suitable one for sorting a list which is almost sorted
1. Bubble Sort
2. Quick sort
3. Selection sort
4. Insertion sort
Click here for answer
1. Bubble Sort
Question 60 : _____________ is the scheduler which selects processes from secondary storage for scheduling
1. Process scheduler
2. Short term scheduler
3. Medium term scheduler
4. Long term scheduler
Click here for answer
3. Medium term scheduler
Question 61 : Among the following which one is NOT a weighted code?
1. Binary number system
2. Excess 3 code
3. Decimal number system
4. None of these
Click here for answer
2. Excess 3 code
Question 62 : LDAP stands for
1. Large Directory Access Protocol
2. Lightweight Directory Access Protocol
3. Large Data Access Protocol
4. Lightweight Data Access Protocol
Click here for answer
2. Lightweight Directory Access Protocol
Question 63 : EPROM is erased by using
1. Ultraviolet rays
2. 24 V electric pulse
3. 12 V electric pulse
4. infrared rays
Click here for answer
1. Ultraviolet rays
Question 64 : The language that has recently become the defacto standard for interfacing application programs with relational database system is
1. 4GL
2. SQL
3. DBase
4. Oracle
Click here for answer
2. SQL
Question 65 : A translator which performs macro expansion is called as ____________
1. Micro pre-processor
2. Macro processor
3. Assembler
4. Macro pre-processor
Click here for answer
4. Macro pre-processor
Question 66 : The term ‘page traffic’ refers to
1. the movement of pages in and out of memory
2. number of pages of executing programs loaded in memory
3. number of pages in memory at a given instant
4. number of pages required to be brought in at a given page request
Click here for answer
1. the movement of pages in and out of memory
Question 67 : The term ‘page traffic’ refers to
1. the movement of pages in and out of memory
2. number of pages of executing programs loaded in memory
3. number of pages in memory at a given instant
4. number of pages required to be brought in at a given page request
Click here for answer
1. the movement of pages in and out of memory
Question 68 : Which one of the following proposition is a tautology?
1. p→(p→q)
2. pν(q→p)
3. pν(p→q)
4. (pνq)→p
Click here for answer
3. pν(p→q)
Question 69 : Relocatable programs
1. do not need a linker
2. can be loaded almost anywhere in memory
3. can be loaded only at one specific location
4. cannot be used with fixed partitions
Click here for answer
2. can be loaded almost anywhere in memory
Question 70 : In the write operation of DMA, the data is transferred
1. from I/O to memory
2. from memory to memory
3. from memory to I/O
4. from I/O to I/O
Click here for answer
1. from I/O to memory
Question 71 : Which of the following language paradigms allows the programmer to express algorithms derived from a top-down design?
1. logic
2. functional
3. object-oriented
4. procedural
Click here for answer
4. procedural
Question 72 : The following is an example of bool-expression.
1. x=6
2. m1.setText(“Hello”)
3. cause=bYes
4. 70
Click here for answer
3. cause=bYes
Question 73 : If every requirement can be checked by a cost-effective process, then the SRS is said to be
1. verifiable
2. complete
3. traceable
4. modifiable
Click here for answer
1. verifiable
Question 74 : In order to sort a list L consisting of a sorted list followed by a few “random” elements, which one of the following sorting methods would be suitable?
1. Quick sort
2. Selection sort
3. Bubble sort
4. Insertion sort
Click here for answer
4. Insertion sort
Question 75 : SIMD organization represents
1. organization of single computer containing a control unit, processor unit and a memory unit
2. one that includes many processing units under the supervision of a common control unit
3. a computer system capable of processing several programs at the same time
4. none of the above
Click here for answer
2. one that includes many processing units under the supervision of a common control unit
Question 76 : The view of total database content is
1. External view
2. Physical view
3. Internal view
4. Conceptual view
Click here for answer
4. Conceptual view
Question 77 : Quick sort algorithm belongs to the _______________ design technique.
1. Backtracking
2. Dynamic programming
3. Greedy
4. Divide and Conquer
Click here for answer
3. Greedy
Question 78 : Among the following, which one is NOT a regular expression?
1. (1+2+0)*(1+2)
2. [(0+1)-(0b+a1)*(a+b)]*
3. [(a+b)*(aa+bb)]*
4. (01+11+10)*
Click here for answer
2. [(0+1)-(0b+a1)*(a+b)]*
Question 79 : Given a 4-input AND gate, how many inputs must be HIGH in order for the output of the logic gate to go HIGH?
1. any two of the inputs
2. any one of the inputs
3. any three of the inputs
4. all four inputs
Click here for answer
4. all four inputs
Question 80 : Let P be the risk probability, L be the loss, then Risk Exposure(RE) is computed as
1. RE=P+L
2. RE=P/L
3. RE=P*L
4. RE=2*P*L
Click here for answer
3. RE=P*L
Question 81 : Virtual memory is
1. less efficient in utilization of memory
2. used in all major commercial operating systems
3. simple to implement
4. useful when fast I/O devices are not available
Click here for answer
2. used in all major commercial operating systems
Question 82 : If we are to debug an implementation of a quicksort that is supposed to sort an array in ascending order, after the first partition step has been completed, the contents of the array are in the following order 2 10 1 14 17 24 22 20
1. The pivot could have been either 14 or 17
2. Neither 14 nor 17 could have been the pivot
3. The pivot could have been 17, but could not have been 14
4. The pivot could have been 14, but could not have been 17
Click here for answer
1. The pivot could have been either 14 or 17
Question 83 : An n-bit microprocessor has
1. n-bit program counter
2. n-bit ALU
3. n-bit address register
4. n-bit instruction register
Click here for answer
4. n-bit instruction register
Question 84 : Which one of the following is NOT a scripting language?
1. Javascript
2. HTML
3. Postscript
4. XML
Click here for answer
3. Postscript
Question 85 : Which one of the language paradigms express the addition of two values as (+10 20)?
1. procedural
2. object-oriented
3. logic
4. functional
Click here for answer
4. functional
Question 86 : In the spiral model ‘risk analysis’ is performed
1. before using spiral model
2. in the first and second loop
3. in every loop
4. in the first loop
Click here for answer
3. in every loop
Question 87 : Merging four sorted files containing 50, 10, 25 and 15 records respectively takes ________ time
1. O(200)
2. O(175)
3. O(125)
4. O(100)
Click here for answer
4. O(100)
Question 88 : Which one of the following is NOT a fundamental process state?
1. blocked
2. ready
3. terminated
4. executing
Click here for answer
1. blocked
Question 89 : The circuit that is used to store one bit of data is
1. Decoder
2. Register
3. Encoder
4. Flip Flop
Click here for answer
4. Flip Flop
Question 90 : Average time required to reach a storage location in memory and read its contents is
1. turnaround time
2. transfer time
3. seek time
4. access time
Click here for answer
4. access time
Question 91 : Using Bubble sort, the number of interchanges required to sort 5, 1, 6, 2 and 4 in ascending order is
1. 7
2. 5
3. 8
4. 6
Click here for answer
2. 5
FINAL ANSWER KEY
Question Paper Code: 144/2013
Higher Secondary School Teacher – 144-2013
Medium of Question: English
Date of Test 29-08-2014
Alphacode A
—
—
No comments:
Post a Comment
Note: only a member of this blog may post a comment.