5year PDF
5year PDF
5year PDF
a. 0 to 101
b. 0 to 99
c. 1 to 100
d. 1 to 101
2. ______________ allows that a section of a program is compiled only if the defined constant that is
specified as the parameter has been defined, independently of its value.
a. #if
b. #define
c. #typedef
d. #ifdef
a. '\0'
b. '!=0'
c. '\a'
d. '\!'
4. The arguments that are given during the function call are known as:-
a. Actual parameters
b. Manipulators
c. Default parameters
d. Formal parameters
Page 1
4414070771526328
AWES PGT Computer Science Informatics-1
a. U
b. N
c. O
d. M
a. -1,-2
b. -1,2
c. 0,-2
d. 0,2
8. Which of the following formulas can be used to generate random numbers in the range 0-10?
(including 0 and 10)
a. 1 + rand(%) (10 - 1 + 1)
b. random(10)+1
c. rand()%10+1-1
d. 1 + (10 - 1 + 1) % random()
Page 2
4414070771526328
AWES PGT Computer Science Informatics-1
a. Infinite
b. 7
c. 5
d. 6
10. A member function can be declared static if does not access _________ members.
a. Global
b. Private
c. Non static
d. Public
Which of the following function calls is illegal? (Assume m and n are declared as integers.)
a. The function accesses the argument's original value in the calling program
b. The function cannot access the argument's value
c. The function copies the value of argument to its own variable
d. Arguments reference is used in function definition
Page 3
4414070771526328
AWES PGT Computer Science Informatics-1
a. In C++ classes & structures may contain data members that are pointers to their own type
b. In C++, a pointer to a base class can point to objects of a derived class
c. The contents of two pointers that point to adjacent variables of type float differ by 4 bytes
d. A pointer to void cannot hold pointers to any data type
a. conio.h
b. stdlib.h
c. stdio.h
d. string.h
16. If function with same name exists in both the derived class and base class, the compiler decides the
function call as:-
a. The function in the base class is executed, if it is called by an object of the base class
b. The function in the base class is executed, if it is called by an object of the derived class
c. The function in the derived class is executed, if it is called by an object of the base class
d. None of the above
a. Delete
b. Undo
c. New
d. Release
18. Which of the following function is used to check invalid I/O operations and unrecoverable errors that
may occur during file input/output operations?
a. clear()
b. rdstate()
c. bad()
d. fail()
Page 4
4414070771526328
AWES PGT Computer Science Informatics-1
a. 20.5
b. 4
c. 8
d. Error, I undefined
a. A long double
b. Private
c. Public
d. Depends upon memory model that you are using
21. Given an array A[0:20]. If the address of A[10]=2075 and address of A[15]=2090, then calculate the
address of A[6].
a. 2055
b. 2059
c. 2049
d. 2035
22. A linear list in which elements can be added or removed at either end but not in middle, is known
as:-
a. deque
b. priority queue
c. linked queue
d. queue
23. In C++ programming language, which of the following operators has the lowest precedence?
a. ||
b. &&
c. ,
d. ! equals
Page 5
4414070771526328
AWES PGT Computer Science Informatics-1
a. (n+2)/2
n
b. log2
c. (n+1)/2
d. n(n+2)/2
a. Laplace
b. Karl Pearson
c. Gosset
d. Fisher
27. The way a particular application views the data from the database that application uses is a:-
a. Subschema
b. Schema
c. Relational model
d. Module
28. The employee salary should not be greater than 2000. This is:-
a. Over-defined
b. Referential constraint
c. Integrity constraint
d. External constraint
a. Subtotals
b. Columnar totals
c. Calculations
d. All of the above
Page 6
4414070771526328
AWES PGT Computer Science Informatics-1
30. Which of the following is the correct statement to create an object of Data class?
31. Which of the following commands permanently delete the record marked for deletion from the
database filed?
a. SEEK
b. PACK
c. SKIP
d. ZAP
a. Check
b. Index
c. Primary key
d. Alias name
35. The _________ allows for automatic deletion of child records when a parent record is deleted.
a. On erase cascade
b. On delete cascade
c. On demand delete
d. On priority delete
Page 7
4414070771526328
AWES PGT Computer Science Informatics-1
36. What was the name of network architecture that was developed by IBM?
a. XNS
b. Novell
c. DECNET
d. SNA
a. CCITT
b. AT and T
c. Hayes
d. BELL
a. Token bus
b. CSMA/CD
c. Token ring
d. Broad band
a. Full-duplex
b. Simplex
c. Half- duplex
d. All of the above
a. Ring
b. Mesh
c. Bus
d. Star
41. Frequency range at which the land coaxial cables are used, is:-
16 8
a. 10 to 10 Hz
6 8
b. 100 to 100 Hz
6 18
c. 10 to 10 Hz
6 8
d. 10 to 10 Hz
Page 8
4414070771526328
AWES PGT Computer Science Informatics-1
42. Which of the following program is used to copy files to and from another using timesharing system
over a single link?
a. UART
b. TFTP
c. VMTP
d. UUCP
44. Poll / select line discipline requires what to identify the packet recipient?
a. Address
b. Dedicated
c. Buffer
d. Timer
45. A packet switching network (highly loaded) has the following characteristics:-
At what time the last bit of the last packet will reach the receiver?
a. 1038.7 sec
b. 1024.5 sec
c. 2048.5 sec
d. 512.5 sec
a. XML
b. HTML 5.0
c. HTML 4.0
d. SGML
a. BIN
b. CGI-BIN
Page 9
4414070771526328
AWES PGT Computer Science Informatics-1
c. RECYCLE BIN
d. All of the above
a. 22 characters
b. 12 characters
c. 18 characters
d. 24 characters
a. THM extension
b. HTML extension
c. HMT extension
d. None of the above
51. _____ tag defines how to divide the window into frames.
a. <iframe>
b. <frameset>
c. <frame>
d. <frame src>
a. SMTP
b. SMIP
c. PPP
d. POP
53. What is the correct HTML code for adding a background color?
a. <body bgcolor=”yellow”>
b. <background> yellow </background>
c. < body color=”yellow”>
d. <body backcolor=”yellow”>
Page 10
4414070771526328
AWES PGT Computer Science Informatics-1
54. Which of the following objects can be used in expressions and scriplets in JSP without explicitly
declaring them?
55. Any part of the graphic that is not included in another hot zone is considered to be part of:-
a. Rect
b. Default
c. Point
d. Polygon
a. About a second
b. A few milliseconds
c. About a hundredth of a second
d. A few billionth of second
57. What logic function is produced by adding an inverter to the output of an AND gate?
a. XOR
b. OR
c. NAND
d. NOR
a. Multilevel
b. Multiple
c. Hierarchical
d. Single
a. AND gate
b. OR gate
c. NOR gate
d. XOR gate
Page 11
4414070771526328
AWES PGT Computer Science Informatics-1
60. A logic circuit which is used to change a BCD number into an equivalent decimal number is:-
a. Code converter
b. Decoder
c. Multiplexer
d. Encoder
61. The expression for sum of A, B in the half adder is given by:-
a. A eXclusive B
b. AB
c. A+B
d. None of the above
62. In 2's compliment representation, a certain negative number -N is 1011. The representation of +N
is:-
a. 0011
b. 0110
c. 0100
d. 0101
a. 0.4375
b. 0.0625
c. 0.4222
d. 0.375
64. A decimal number has 30 digits. Approximately how many digits would the binary representation
have?
a. 60
b. 120
c. 30
d. 90
a. -0.1101
b. 0.0110
c. 0.1010
d. 1.0010
Page 12
4414070771526328
AWES PGT Computer Science Informatics-1
66. A system program that set-up an executable program in main memory ready for execution is:-
a. Linker
b. Text editor
c. Assembler
d. Loader
a. SLR
b. Canonical LR
c. Operator-precedence
d. LALR
a. Allocation
b. Loading
c. Linking
d. Reallocation
a. Allocation
b. Loading
c. Linking
d. Reallocation
70. At a particular time, the value of a counting semaphore is 10. It will become 7 after:-
a. 3 V operations
b. 5 V operations and 2 P operations
c. 13 P operations and 10 V operations
d. 3 P operations
71. A system has 3 processors sharing 4 resources. If each process needs a maximum of 2 units, then:-
Page 13
4414070771526328
AWES PGT Computer Science Informatics-1
a. Branches off to the interrupt service routine after completion of the current instruction
b. Halts it for a predetermined time
c. Branches off to the interrupt service routine immediately
d. Hands over control of address bus and data bus to the interrupting device
a. 8
b. 256
c. 132
d. 16
76. In MS-DOS, relocatable object files and load modules have extensions:-
Page 14
4414070771526328
AWES PGT Computer Science Informatics-1
78. In a modem using dibit phase, encoding has the bit rate:-
80. A class implements an interface but does not override all the methods of interface then _____.
81. ____________ mode is used whenever either end of a security association is gateway.
a. Encapsulating
b. Transport
c. Tunnel
d. Gateway
83. ____________ is used to carry traffic of one protocol over network that does not support that
protocol directly.
a. Transferring
b. Switching
c. Tunneling
d. Trafficking
Page 15
4414070771526328
AWES PGT Computer Science Informatics-1
84. Which collection class associates values with keys and orders the keys according to their natural
order?
a. java.util.HashSet
b. java.util.SortedSet
c. java.util.LinkedList
d. java.util.TreeMap
85. ___________ are used in denial of service attacks, typically against targeted web sites.
a. Virus
b. Worm
c. Trojan horse
d. Zombie
86. The ______________ method is used when we simply want to retrieve data from a table without
modifying the contents of the table.
a. execute()
b. queryexecute()
c. query()
d. executeQuery()
87. To execute SQL statements, you need to instantiate a _______ object using the _______ object.
88. Suppose a class has public visibility. In this class we define a protected method. Which of the
following statements is correct?
a. In a class, you can not declare methods with a lower visibility than the visibility of the class in
which it is defined.
b. From within protected methods you do not have access to public methods.
c. This method is accessible from within the class itself and from within all classes defined in the
same package as the class itself
d. This method is only accessible from inside the class itself and from inside all subclasses.
a. DEF_PRIORITY
b. NORM_PRIORITY
c. NORMAL_PRIORITY
Page 16
4414070771526328
AWES PGT Computer Science Informatics-1
d. DEFAULAT_PRIORITY
06 Feedback
91. How was the overall experience while giving the test?
a. Excellent
b. Very Good
c. Good
d. Average
Page 17