Higher Secondary School Teacher - 144-2013



Higher Secondary School Teacher – 144-2013

Question Paper Code: 144/2013

Medium of Question: English

Date of Test 29-08-2014

Alphacode A




Question 1 : In a BST, the traversal type which would print the values in the nodes in sorted order is

1. Preorder

2. Inorder

3. Postorder

4. None of the above


Click here for answer

2. Inorder

Question 2 : The contrapositive of the statement, “You win the game if you know the rules but are not overconfident” is :

1. If you lose the game then you don’t know the rules or you are overconfident.

2. If you know the rules and are overconfident then you win the game.

3. A necessary condition that you know the rules or you are not overconfident is that you win the game.

4. If you dont’t know the rules or are overconfident you lose the game.


Click here for answer

1. If you lose the game then you don’t know the rules or you are overconfident.

Question 3 : In which one of the following models can requirements be redefined

1. Spiral Model

2. Prototyping Model

3. Waterfall Model

4. Evolutionary Model


Click here for answer

2. Prototyping Model

Question 4 : The method adopted by the memory management module of an OS of a computer to periodically collect all the free memory space to form contiguous block of free space is called

1. Dynamic Memory Allocation

2. Garbage Collection

3. Concatenation

4. Collision


Click here for answer

2. Garbage Collection

Question 5 : Among the following statements about binary trees which one is NOT true ?

1. Every non-empty tree has exactly one root node.

2. Every non-root node has exactly one parent.

3. Every binary tree has at least one node.

4. Every node has at most two children.


Click here for answer

3. Every binary tree has at least one node.

Question 6 : DRAM is used as main memory in a computer system because it

1. needs refreshing circuitary

2. consumes less power

3. has higher speed

4. has lower cell density


Click here for answer

3. has higher speed

Question 7 : 8251 is a

1. UART

2. USART

3. Programmable interval timer/counter

4. Programmable Interrupt Controller


Click here for answer

2. USART

Question 8 : A public key encryption system

1. Allows only the correct receiver to decode the data

2. Does not encode the data before transmitting it

3. Allows only the correct sender to decode the data

4. Allows only one to decode the transmission


Click here for answer

1. Allows only the correct receiver to decode the data

Question 9 : Environment variables can be accessed by

1. System programs

2. C programs

3. Shell scripts

4. All of these


Click here for answer

4. All of these

Question 10 : DML is used for

1. Addition of new structures in the database system

2. Manipulation and processing of database

3. Definition of physical structure of database system

4. Description of logical structure of database


Click here for answer

2. Manipulation and processing of database


Question 11 : Suppose that N = {1, 2, 3, …} be ordered by divisibility, which one of the following subset is totally ordered?

1. (2, 6, 24)

2. (4, 15, 30)

3. (3,5,15)

4. (2,9,16)


Click here for answer

1. (2, 6, 24)

Question 12 : Which among the following searching technique takes O(1) time to locate a data ?

1. Binary Search

2. Tree Search

3. Hashing

4. Linear Search


Click here for answer

3. Hashing

Question 13 : The cause for poor response time is

1. High I/O rates

2. High paging rates

3. Process busy

4. Any of the above


Click here for answer

4. Any of the above

Question 14 : Which among the following statements is false ?

1. The data dictionary contains the name and description of each data element

2. Data elements in the database can be modified by changing the data dictionary

3. The data dictionary is a tool used exclusively by the database administrator

4. Database administrator normally maintains the data dictionary


Click here for answer

2. Data elements in the database can be modified by changing the data dictionary

Question 15 : The infix expression for the postfix expression x 12 + z 17 y + 42 * / + is

1. x + 12 + z / 17 + y * 42

2. x + 12 + z / (17 + y)*42

3. (x + 12 + z)/(17 + y * 42)

4. x + 12 + z / ((17 + y) * 42)


Click here for answer

4. x + 12 + z / ((17 + y) * 42)

Question 16 : The basic types of programmable arrays are made of ________________

1. AND gates

2. AND gates and OR gates

3. OR gates

4. NAND and NOR gates


Click here for answer

2. AND gates and OR gates

Question 17 : A COCOMO model is

1. Complete Cost Estimation Model

2. Constructive Cost Estimation Model

3. Common Cost Estimation Model

4. Comprehensive Cost Estimation Model


Click here for answer

2. Constructive Cost Estimation Model

Question 18 : The interval between the time of submission and completion of a job is called as ___________

1. Turnaround time

2. Waiting time

3. Response time

4. Throughput


Click here for answer

1. Turnaround time

Question 19 : An assembler is

1. data dependent

2. programming language dependent

3. machine dependent

4. syntax dependent


Click here for answer

3. machine dependent

Question 20 : The expansion of nested macro calls follows _________ rule

1. LILO

2. LIFO

3. FIFO

4. priority


Click here for answer

2. LIFO


Question 21 : Von Neumann architecture is

1. SISD

2. SIMD

3. MIMD

4. MISD


Click here for answer

1. SISD

Question 22 : The device that is used to forward data packets from one network to another is called a _________

1. Bridge

2. Hub

3. Switch

4. Gateway


Click here for answer

3. Switch

Question 23 : Which among the following is the most general phrase structured grammar ?

1. Context – Sensitive

2. Context – Free

3. Regular

4. None of the above


Click here for answer

1. Context – Sensitive

Question 24 : When the following instructions have been executed, what will be the contents of register AL ?MOV BL, 8C.MOV AL, 7E.ADD AL, BL.

1. 0A and carry flag is reset

2. 0A and carry flag is set

3. 6A and carry flag is reset

4. 6A and carry flag is set


Click here for answer

2. 0A and carry flag is set

Question 25 : The first modern computer was called __________

1. UNIVAC-I

2. FLOW-MATIC

3. ENIAC

4. INTEL


Click here for answer

3. ENIAC

Question 26 : Secret-key encryption is also known as

1. Secret-encryption

2. Asymmetric encryption

3. Symmetric encryption

4. Private encryption


Click here for answer

3. Symmetric encryption

Question 27 : DNS is a

1. Distributed hierarchical naming system

2. Vertical naming system

3. Horizontal naming system

4. Client Server system


Click here for answer

1. Distributed hierarchical naming system

Question 28 : E-commerce is not suitable for

1. Online job searching

2. Sale/Purchase of expensive jewellery and antiques

3. Sale/Purchase of branded clothes

4. Sale/Purchase of mobile phones


Click here for answer

1. Online job searching

Question 29 : Several factors exist that affect the efficiency of lookup operations in a hash table. Which among the following is NOT one of those factors ?

1. Size of elements stored in the hash table.

2. Number of elements stored in the hash table.

3. Quality of the hash function.

4. Number of buckets in the hash table.


Click here for answer

1. Size of elements stored in the hash table.

Question 30 : A DBMS query language is designed to

1. specify the structure of a database

2. support end users with English-like commands

3. support the development of complex applications software

4. all of the above


Click here for answer

4. all of the above


Question 31 : Let r be a resource. There are 3 user processes each requiring 2 units of R. Then the minimum number of units of R such that no deadlocks will occur is

1. 4

2. 3

3. 5

4. 6


Click here for answer

1. 4

Question 32 : Assume a cache memory with associative mapping. If the main memory is of 8K bytes and the cache memory is of 2K words, then each word of cache memory is

1. 21 bits

2. 11 bits

3. 16 bits

4. 20 bits


Click here for answer

3. 16 bits

Question 33 : Which of the following is true ?

1. Stream cipher technique is an encryption technique

2. Block cipher technique is an encryption technique

3. Both (A) and (B)

4. Neither of (A) and (B)


Click here for answer

3. Both (A) and (B)

Question 34 : Given a linked list with n elements. Then the time taken to insert an element after an element pointed to by some pointer is

1. O(n log2 n)

2. O(1)

3. O(log2 n)

4. O(n)


Click here for answer

2. O(1)

Question 35 : Let h be a hashing function and is used to hash n keys into a table of size m (given n<=m). Then the expected number of collisions involving a particular key x is

1. less than 1

2. less than m

3. less than n

4. less than n/2


Click here for answer

1. less than 1

Question 36 : If L is a lattice, then for every a and b in L which among the following is correct?

1. a ν (b Λ c) =a

2. a ν (b ν c) = (a ν b) ν c

3. a ν b = a Λ b

4. a ν (b ν c) = b


Click here for answer

2. a ν (b ν c) = (a ν b) ν c

Question 37 : The technique of improving the priority of process waiting in queue for CPU allocation is called _________________

1. Starvation

2. Ageing

3. Revocation

4. Relocation


Click here for answer

2. Ageing

Question 38 : PSW is saved in stack when there is a

1. interrupt recognized

2. execution of CALL instruction

3. execution of RST instruction

4. all of these


Click here for answer

1. interrupt recognized

Question 39 : The default subnet mask for a Class C network is

1. 127.0.0.1

2. 255.0.0.0

3. 255.255.0.0

4. 255.255.255.0


Click here for answer

4. 255.255.255.0

Question 40 : Which one of the following is NOT an advantage of Distributed System?

1. Reliability

2. Incremental growth

3. Resource sharing

4. None of the above


Click here for answer

4. None of the above


Question 41 : Cache memory is based

1. on the property of locality of reference

2. on the fact that references generally tend to cluster

3. on the heuristic 90-10 rule

4. all of the above


Click here for answer

1. on the property of locality of reference

Question 42 : The language component of DBMS which can be embedded in a program is

1. the database administrator (DBA)

2. the data manipulation language (DML)

3. the data definition language (DDL)

4. a query language


Click here for answer

2. the data manipulation language (DML)

Question 43 : A computer system that permits multiple users to run programs at same time is _______

1. Real time system

2. Time sharing system

3. Multiprogramming system

4. Multi tasking system


Click here for answer

4. Multi tasking system

Question 44 : Which of the following statement is the negation of the statement, “10 is even and -5 is negative”

1. 10 is even and -5 is not negative

2. 10 is odd and -5 is not negative

3. 10 is even or -5 is not negative

4. 10 is odd or -5 is not negative


Click here for answer

4. 10 is odd or -5 is not negative

Question 45 : The __________ sort relatively passes through a list to exchange the first element with any element less than it and then repeats with a new first element

1. selection sort

2. quick sort

3. insertion sort

4. heap sort


Click here for answer

2. quick sort

Question 46 : Which among the following is the data structure that is used to check balanced parenthesis in an expression

1. Stack

2. Tree

3. Queue

4. Array


Click here for answer

1. Stack

Question 47 : p → q is logically equivalent to

1. ~q → p

2. ~pνq

3. ~pΛq

4. ~p → q


Click here for answer

2. ~pνq

Question 48 : Which of the following regular expression over {0,1} denotes the set of all strings not containing 100 as substring?

1. 0*1*01*

2. 0*1010*

3. 0*(1*0)*

4. 0*(10+1)*


Click here for answer

4. 0*(10+1)*

Question 49 : Which one of the following is NOT a size metric?

1. Cyclomatic complexity

2. Function count

3. LOC

4. Program Length


Click here for answer

1. Cyclomatic complexity

Question 50 : The scheduling policy that is most suitable for a time-shared operating system is :

1. SJF

2. Elevator

3. Round Robin

4. FCFS


Click here for answer

3. Round Robin


Question 51 : If a node in a BST has two children, then its inorder predecessor has

1. no child

2. no left child

3. no right child

4. two children


Click here for answer

3. no right child

Question 52 : The maximum number of processes that may be simultaneously inside the critical section inorder to avoid race condition is

1. one

2. zero

3. more than two

4. two


Click here for answer

1. one

Question 53 : The time required by a sector to reach below read/write head is called as ___________

1. Seek time

2. Access time

3. Latency time

4. None


Click here for answer

3. Latency time

Question 54 : Which on of the following TCP/IP protocol is used for transferring e-mail messages from one machine to another?

1. RPC

2. FTP

3. SMTP

4. RTP


Click here for answer

3. SMTP

Question 55 : Among the following, which one is used to connect two systems, specifically if the systems use different protocols.

1. hub

2. bridge

3. gateway

4. repeater


Click here for answer

3. gateway

Question 56 : The disadvantage of a pipe is that

1. It is a one way communication channel

2. It dies along with the process that created it

3. It cannot be shared by unrelated processes

4. All of the above


Click here for answer

4. All of the above

Question 57 : a subschema expresses

1. the physical view

2. the logical view

3. the external view

4. all of the above


Click here for answer

3. the external view

Question 58 : Given that modules X and Y operate on the same input and output data, then the cohesion is

1. Procedural

2. Communicational

3. Logical

4. Sequential


Click here for answer

2. Communicational

Question 59 : Which among the following sorting methods is the most suitable one for sorting a list which is almost sorted

1. Bubble Sort

2. Quick sort

3. Selection sort

4. Insertion sort


Click here for answer

1. Bubble Sort

Question 60 : _____________ is the scheduler which selects processes from secondary storage for scheduling

1. Process scheduler

2. Short term scheduler

3. Medium term scheduler

4. Long term scheduler


Click here for answer

3. Medium term scheduler


Question 61 : Among the following which one is NOT a weighted code?

1. Binary number system

2. Excess 3 code

3. Decimal number system

4. None of these


Click here for answer

2. Excess 3 code

Question 62 : LDAP stands for

1. Large Directory Access Protocol

2. Lightweight Directory Access Protocol

3. Large Data Access Protocol

4. Lightweight Data Access Protocol


Click here for answer

2. Lightweight Directory Access Protocol

Question 63 : EPROM is erased by using

1. Ultraviolet rays

2. 24 V electric pulse

3. 12 V electric pulse

4. infrared rays


Click here for answer

1. Ultraviolet rays

Question 64 : The language that has recently become the defacto standard for interfacing application programs with relational database system is

1. 4GL

2. SQL

3. DBase

4. Oracle


Click here for answer

2. SQL

Question 65 : A translator which performs macro expansion is called as ____________

1. Micro pre-processor

2. Macro processor

3. Assembler

4. Macro pre-processor


Click here for answer

4. Macro pre-processor

Question 66 : The term ‘page traffic’ refers to

1. the movement of pages in and out of memory

2. number of pages of executing programs loaded in memory

3. number of pages in memory at a given instant

4. number of pages required to be brought in at a given page request


Click here for answer

1. the movement of pages in and out of memory

Question 67 : The term ‘page traffic’ refers to

1. the movement of pages in and out of memory

2. number of pages of executing programs loaded in memory

3. number of pages in memory at a given instant

4. number of pages required to be brought in at a given page request


Click here for answer

1. the movement of pages in and out of memory

Question 68 : Which one of the following proposition is a tautology?

1. p→(p→q)

2. pν(q→p)

3. pν(p→q)

4. (pνq)→p


Click here for answer

3. pν(p→q)

Question 69 : Relocatable programs

1. do not need a linker

2. can be loaded almost anywhere in memory

3. can be loaded only at one specific location

4. cannot be used with fixed partitions


Click here for answer

2. can be loaded almost anywhere in memory

Question 70 : In the write operation of DMA, the data is transferred

1. from I/O to memory

2. from memory to memory

3. from memory to I/O

4. from I/O to I/O


Click here for answer

1. from I/O to memory


Question 71 : Which of the following language paradigms allows the programmer to express algorithms derived from a top-down design?

1. logic

2. functional

3. object-oriented

4. procedural


Click here for answer

4. procedural

Question 72 : The following is an example of bool-expression.

1. x=6

2. m1.setText(“Hello”)

3. cause=bYes

4. 70


Click here for answer

3. cause=bYes

Question 73 : If every requirement can be checked by a cost-effective process, then the SRS is said to be

1. verifiable

2. complete

3. traceable

4. modifiable


Click here for answer

1. verifiable

Question 74 : In order to sort a list L consisting of a sorted list followed by a few “random” elements, which one of the following sorting methods would be suitable?

1. Quick sort

2. Selection sort

3. Bubble sort

4. Insertion sort


Click here for answer

4. Insertion sort

Question 75 : SIMD organization represents

1. organization of single computer containing a control unit, processor unit and a memory unit

2. one that includes many processing units under the supervision of a common control unit

3. a computer system capable of processing several programs at the same time

4. none of the above


Click here for answer

2. one that includes many processing units under the supervision of a common control unit

Question 76 : The view of total database content is

1. External view

2. Physical view

3. Internal view

4. Conceptual view


Click here for answer

4. Conceptual view

Question 77 : Quick sort algorithm belongs to the _______________ design technique.

1. Backtracking

2. Dynamic programming

3. Greedy

4. Divide and Conquer


Click here for answer

3. Greedy

Question 78 : Among the following, which one is NOT a regular expression?

1. (1+2+0)*(1+2)

2. [(0+1)-(0b+a1)*(a+b)]*

3. [(a+b)*(aa+bb)]*

4. (01+11+10)*


Click here for answer

2. [(0+1)-(0b+a1)*(a+b)]*

Question 79 : Given a 4-input AND gate, how many inputs must be HIGH in order for the output of the logic gate to go HIGH?

1. any two of the inputs

2. any one of the inputs

3. any three of the inputs

4. all four inputs


Click here for answer

4. all four inputs

Question 80 : Let P be the risk probability, L be the loss, then Risk Exposure(RE) is computed as

1. RE=P+L

2. RE=P/L

3. RE=P*L

4. RE=2*P*L


Click here for answer

3. RE=P*L


Question 81 : Virtual memory is

1. less efficient in utilization of memory

2. used in all major commercial operating systems

3. simple to implement

4. useful when fast I/O devices are not available


Click here for answer

2. used in all major commercial operating systems

Question 82 : If we are to debug an implementation of a quicksort that is supposed to sort an array in ascending order, after the first partition step has been completed, the contents of the array are in the following order 2 10 1 14 17 24 22 20

1. The pivot could have been either 14 or 17

2. Neither 14 nor 17 could have been the pivot

3. The pivot could have been 17, but could not have been 14

4. The pivot could have been 14, but could not have been 17


Click here for answer

1. The pivot could have been either 14 or 17

Question 83 : An n-bit microprocessor has

1. n-bit program counter

2. n-bit ALU

3. n-bit address register

4. n-bit instruction register


Click here for answer

4. n-bit instruction register

Question 84 : Which one of the following is NOT a scripting language?

1. Javascript

2. HTML

3. Postscript

4. XML


Click here for answer

3. Postscript

Question 85 : Which one of the language paradigms express the addition of two values as (+10 20)?

1. procedural

2. object-oriented

3. logic

4. functional


Click here for answer

4. functional

Question 86 : In the spiral model ‘risk analysis’ is performed

1. before using spiral model

2. in the first and second loop

3. in every loop

4. in the first loop


Click here for answer

3. in every loop

Question 87 : Merging four sorted files containing 50, 10, 25 and 15 records respectively takes ________ time

1. O(200)

2. O(175)

3. O(125)

4. O(100)


Click here for answer

4. O(100)

Question 88 : Which one of the following is NOT a fundamental process state?

1. blocked

2. ready

3. terminated

4. executing


Click here for answer

1. blocked

Question 89 : The circuit that is used to store one bit of data is

1. Decoder

2. Register

3. Encoder

4. Flip Flop


Click here for answer

4. Flip Flop

Question 90 : Average time required to reach a storage location in memory and read its contents is

1. turnaround time

2. transfer time

3. seek time

4. access time


Click here for answer

4. access time


Question 91 : Using Bubble sort, the number of interchanges required to sort 5, 1, 6, 2 and 4 in ascending order is

1. 7

2. 5

3. 8

4. 6


Click here for answer

2. 5

FINAL ANSWER KEY

Question Paper Code: 144/2013

Higher Secondary School Teacher – 144-2013

Medium of Question: English

Date of Test 29-08-2014

Alphacode A




No comments:

Post a Comment

Note: only a member of this blog may post a comment.