Custom Search

Wednesday, 25 March 2009

PREVIOUS QUESTION PAPER OF HSST(SENIOR), IN COMPUTER SCIENCE/COMPUTER APPLICATION IN THE KERALA HIGHER SECONDARY EDUCATION


PREVIOUS QUESTION PAPER OF HSST(SENIOR),IN COMPUTER SCIENCE/COMPUTER APPLICATION IN THE KERALA HIGHER SECONDARY EDUCATION DEPARTMENT

1. The size of an ATM cell is ---------- bytes.

(a) 25 (b) 32 (c) 53 (d) 64

2. “Stored program concept is attributed to :

(a)Ken Thompson (b) Dennis Ritchie (c) Von Neumann (d) Edsger Dijkstra

3. In a UNIX system, the macro htons is used to :

(a) Convert a short number from host to network order
(b) Convert a long number from host to network order
(c) Convert a short number from network to host order
(d) Convert a long number from network to host order

4. The cache which is on the same chip as the processor is called :

(a) L1 (b) L2 (c)L3 (d)None of these

5. Which level of RAID uses mirroring to achieve redundancy?

(a) 0 (b)1 (c)2 (d)3

6. Which IEEE standard is refers to fast Ethernet?

(a) 802.1 (b) 802.3b (c) 802.3u (d) 802.12

7. The new generation Intel processor with the IA-64 architecture is called :

(a) Itanium (b) Pentium 4 (c) Athlon (d)Xeon


8. A MAC address is ---------bytes long:

(a)4 (b)6 (c)8 (d)12


9. RARP is used to convert:

(a) IP address to MAC address (b) MAC address to IP address

(c) IP address to port number (d) Port number to IP address


10. Which among the following is an NP-Complete problem?

(a)3SAT Problem (b) Traveling Salesman

(d) Graph 3-coloring (d) All of the above


11. The solution to the count-to-infinity problem in which a router never advertises the cost of a destination to its neighbour N, if N is the next hop to that destination, is called :

(a) Triggered update (b) Source tracing (c) Split-horizon (d) Path vector

12. A compiler which runs on one machine and produces target code for another is called a :

(a)Bootstrapping compiler (b) Just-in-time compiler
(c)Cross compiler (d) Optimizing compiler

13. Which among the following is an interior routing protocol ?

(A)OSPF (b)EGP (c)BGP (d)NNTP

14. The maximum length (in bytes) of an IP packet:

(a)255 (b)1023 (c)32767 (d)65535

15. Which among the following is not a type of HTTP request ?

(a)GET (b)HEAD (c)RELEASE (d)POST

16. Which among the following is not a real time operating system ?

(a)RT-Linux (b)VxWorks (c) Solaris (d)Lynx

17. What is returned by a fork() call to the child process ?

(a)0 (b)Process-id-pf parent (c)Process-id of child (d)-1

18. The degree of multiprogramming is controlled primarily by ?

(a)Short-term scheduler (b)Medium-term scheduler

(c)Long-term scheduler (d) Disk scheduler


19. Which of the following is a high-level synchronization concept ?

(a)Interrupt (b)Semaphore (c)Mutex (d)Monitor

20. Paging solves the problem of:

(a)Thrashing (b)Page faults (c)Internal fragmentation (d)External fragmentation
21. For some page –replacement algorithms, the page-fault rate may increase as the number of allocated frames increases. This is known as :

(a)Thrashing (b)Swapping (c)Belady’s anomaly (d)Fragmentation

22. The Unix incode contains-------pointers to data blocks and -----pointers to indirect blocks.

(a)10,3 (b)10,5 (c)12,3 (d)15,5

23. Which of the following disk scheduling algorithms may result instarvation?

(a)FCFS (b)Shortest-seek-time-first (c)SCAN (d)C-SCAN

24. An RPC uses------------to execute a routine on a remote system.

(a)FTP (b)TFTP (c)TCP (d)UDP

25. ‘Location transparency’ in distributed systems means that :

(a) Name of the file does not reveal any hint of its physical storage location
(b) Name of the file does not need to be changed when the storage location changes
(c) The storage location can be understood from the name of the file
(d) Name of the file will change if the storage location changes

26. The BSD version of UNIX was developed by :
(a)Bell Labs (b)MIT (c)University of Berkeley (d) Sun Microsystems

27. An example of a file system whose contents are not actually stored anywhere, but are computed on demand is :

(a)NTFS (b)NFS (c)proc (d)ext3

28. Which among the following is a type of top-down parsing ?

(a)Predictive parsing (b)Shift-reduce parsing
(c)Operator precedence parsing (d) LR parsing

29. If r and s are regular expressions denoting languages L(r) and L(s), then (r)|(s) is a regular expression denoting :

(a)L(r) U L(s) (b)L(r) L(s) (c){E} (d) L(rs)

30. What will the following program fragment output?

Integer i=new integer (5);
Integer j=new Integer (5);
If (i==j)System.out.println(“Equal”);
else System.out.println(“Not equal”);

(a)Equal
(b)Not Equal

(c) Equal
Not equal
(d) The program doesn’t compile= = can’t be used with references

31. A grammar with the property that no production right side has two adjacent non-terminals is called:

(a) Context-free grammar (b) Context sensitive grammar

(d) Operator Grammar (d) Regular grammar

32. Yacc is a :

(a) Lexical analyzer generator (b) Parser generator
(b)Macro preprocessor (d) Code optimizer

33. ----------uses an FAT for file allocation.
(a)OS/2 (b) Linux (c) Unix (d)Solaris

34. Which among the following is true of LL (1) grammar?
(a)ambiguous (b)not ambiguous (d)sometimes ambiguous (d)left-recursive

35. Apple Computer’s version of the high-performance serial bus used to connect devices to the personal computer is :

(a)Fire Wire (b) High-Performance Parallel Interface

(c) Parallel sysplex (d) iLINK

36. Which among the following is a set of ANSI parallel interfaces that allow personal computers to communicate with peripheral hardware?

(a) UPnP (b) SCSI (c) ISRC (d) ASPI

37. Which among the following is false?

(a)A relation scheme can be in Third Normal Form but not in Boyce-Codd Normal Form (BCNF)
(b)Every BCNF relation scheme is in Third Normal Form.

(c) BCNF provides freedom from insertion and deletion anomalies.

(d) If a relation scheme has partial dependencies, it is in Second Normal Form.

38. A foreign key imposes a specific kind of integrity to related tables. What is the name of this integrity?

(a) Schema (b) Referential (c) Expatriate (d) Data
39. Which among the following is a high-bandwidth interface between a computer and a hard disk or a tape device? The latest version of this interface supports RAID.

(a) Intelligent Peripheral interface (b) Small Computer System Interface

(c) RS-232C (d) Centronics parallel interface

40. The-------consists of individual user views of portions of the database.

(a)User-level Schema (b) Internal-level Schema
(c)External-level Schema (d) Conceptual –level schema


41. An attribute that is used as a linkage from records in one table to a record in another table is specified as the----------

(a)Pointer field(b)Foreign Key (c)Secondary Key (d)Primary Key

42. Data is stored on computer systems in files. The two basic file types are :

(a) Master and Database (b)Master and Transaction
(c) Transaction and DBMS (d)Master File and Accounts Receivable File

43. Which of the following statements in not true with respect to the characeristics of the Master and the Transaction files ?

(a)A transaction files contain records that hold the details of daily events affecting an attribute of the master file
(b)A master file should only contain data that are of a permanent or semi-permanent nature
(c) A transaction file is similar to a ledger in a manual accounting system
(d) Records in the transaction file are used to update some of the data in the master file.

44. Which of the following cannot be blank (Null) ?

(a) Foreign Key (b)Secondary Key (c)Primary Key (d)Connecting Key

45. Every DBMS provides for the three basic functions of creating, modifying and querying the database. Sets of commands (languages) exist to perform each of the three functions. Select the option that matches the order of the languages to the order of the functions: querying, creating and modifying the database.

(a)DQL,DDL,DML (b)DML, DDL,DQL
(c) DDL,DQL,DML (d)DML,DQL,DML

46. Third normal form is a tem used to describe :

(a)a database that is well structured
(b)a model that has been through three revisions.
(c) a table that has three columns
(d)a package containing the three levels of schema

47. A plug-and –play interface that allows you to add a new device such as a scanner or printer to your computer without having to add an adapter card or even having turn the computer off is :

(a) Audio/Modem Riser (b)Universal Serial Bus

(c) PCMCIA Card (d)Virtual deice driver

48. The microchip that controls a computer’s interface to its attached serial devices is :

(a)Virtual Device driver
(b)Universal Asynchronous Receiver/Transmitter
(c)Serial presence detect
(d)Bus master

49. Anomalies can occur in a poorly designed database. One type of anomaly occurs when the removal of a record in the customer table inadvertently removes information about sales. What is the name of this anomaly ?

(a)Erase anomaly (b)Delete anomaly

(c)Update anomaly (d)Insert anomaly

50. “Get me the date attribute of the third tuple in the sales order relation”. What is being requested ?

(a)The person wants the value in the date field of the third table that is related to sales order

(b)The person wants the value in the date field in the third row of the sales order item table.

(c)The person wants the value in the date field of the third record inthe sales order table.

(d)The person wants the value in the date field of the third sales order that is related to the sales order item table.

51. The file-oriented approach to data storage creates a set of files for each application program. The database approach combines all of the files in a database and lets the application programs get the data that they needs through a DBMS. Which of the following statements is correct?

(a) The database approach separates the logical view of data from the physical view

(b) The database approach reduces the amount of redundancy in an organization

(c) The database approach views data as an organizational resource that should be managed by the organization rather than by individual departments.


(d) All of the above are correct
52. When is the TTL field in an IP packet decremented?

(a) Each time the packet is forwarded
(b) Once every second
(c) When a packet reached destination
(d) When a packet is discarded.

53. Which protocol is used to carry error messages from the metwork to an IP source ?

(a)FTP (b)TFTP (c)ICMP (d)UDP

54. In which cache mapping method is it possible to load each main memory block to any line of the cache ?

(a)Direct Mapping (b) Associative mapping

(c)Set-associative mapping (d)None of the above


55. The capacity of a double-sided dual- layer DVD-ROM is :

(a)660MB (b)4.7GB (c) 8.5GB (d)17 GB


56. Which among the following chips is aProgrammable Peripheral Interface ?

(a)82C55A (b)82C59A (c)82C53 (D)8257A


57. Which among the folowwing is a little-endian machine ?

(a)DEC Alpha (b)IBM System 370 (c)Sun SPARC (d)Motorola 680x0

58. Hexadecimal equivalent of the decimal number 204.125 is :

(a)BD.201 (b)CC.201 (d)CC.1A (d)CC.2

59. Decimal equivalent of the binary number 11100.101 is :

(a)28.575 (b)28.625 (c)28.75 (d)28.875

60. Which of the following is TRUE about the switch statement in Java ?

(a) A default sends execution immediately to the end of the switch statement
(b) A break sends execution immediately to the end of the switch statement
(c) A case sends execution immediately to the end of the switch statement
(d) A break sends execution immediately to the end of the next case.


61. Among these Java expressions, which is of type String ?

(a) “0” (b)”ab”+”cd” (c)’0’ (d) (a) and (b)



62. Which among the following is false ?

(a) No LR(1) grammar can be ambiguous
(b) Every LL(1) grammar is an LR(1) grammar
(c) The regular expressions (a/b)* and (a*/b*)* are equivalent.
(d) Not all grammars can be converted to an equivalent operator grammar

63. The interface of a class refers to :

(a) the list of all of the fields and methods of the class
(b) the list of all of the public fields and public methods of the class
(c) the list of all of the private fields and public methods of the class
(d) the list of all of the private fields and private methods of the class

64. Consider the following Java code fragement.

Rectangle r1=new Rectangle();
R1.setColor(Color.blue);
Rectangle r2=r1;
R2.setColor(Color.red);

After the above code is executed, what are the colors of r1 and r2 (in this order) ?

(a)Color.blue, Color.red (b)Color.blue, Color.blue

(c)Color.blue, Color.red (d)Color.red, Color.blue

65. What is the type and value of the following Java expression?

-4+1/2+2*-3+5.0

(a) int -5 (b)double -4.5 (c)int -4 (d)double -5.0


66. Consider the two Java methods(within the same class):

Public int foo(int a, String s)
{ s=”Yellow”;a=a+2;return a;)}
Public void bar()
{ int a =3;
String s=”Blue”;
A=foo(a,s); System.out.println(“a=”+a+”s=”+s);}

What is printed?


(a) a=3 s=Blue
(b) a=5 s=Yellow
(c) a=3 s=Yellow
(d) a=5 s=Blue

67. Using De Morgan’s law, how would you rewrite the following:
Conditional statement? (i.e. rewrite the statement using && instead of || )
(c!=’n’ && z+2<=5)

(a) !(c!=’n’ || z+2<=5) (b) !(c= =’n’ || z+2>=5)


(c) !(c!=’n’ || z+2<5) (d) !(c==’n’ || z+2>5)



68. IEEE 802.11 standard is known as :

(a)CSMA/CA (b)CSMA/CD (c)Bluetooth (d)Token bus

69. Which of the following protocols is used to share the same IP address among different computers (as long as they are not simultaneously active)?

(a)NFS (b)DHCP (c)TFTP (d)SNMP

70. Ipc6 uses ----------bit addresses.

(a)32 (b)64 (c)128 (d)256

71. Consider the following Java class definition:

Public class Myclass{
private int value;
public void setValue(int i){/*code*/}
//Other methods…}

The method setValue assigns the value of i to the instances field value. What could you write for the implementation of setValue?

(a) value=I; (b)this.value=I; (c)value= = I; (d) (a) and (b)

72. Consider the following truth table for a logical operator “implies”:

P Q P implies Q

T T T

T F F

F T T

F F T

Which of the following java conditional expressions would reproduce the above truth table ?


(a) P || Q (b) (!P) &&(!Q) (c)(!P) || Q (d)P && (!Q)

73. Which among the following involves modifying your computer so that the microprocessor runs faster than the manufacturer-specified speed ?

(a) thrashing (b)debouncing (c)stepping (d)overclocking

74. Which was the first processor to be shipped with a 1 gigahertz clock speed ?

(a)Athlon (b)BeOS (c)Crusoe (d)Pentium

75. Which among the following involve the continuous and somewhat overlapped movement of instructions to the processor?

(a) flow control (b)cyclic redundancy checking
(c) inverse multiplexing (d) pipelining


76. The data path and physical interface between the processor and the L1 and L2 memory is called :

(a)Backlink (b)Backside bus (c)CardBus (d)Virtual memory

77. A group of microchips designed to work as a unit to perform one or more related functions is called :

(a)Biochip (b)Bus (c)Chipset (d)Diode

78. On a PC the keyboard and mouse are connected through ----------interface.

(a)QWERTY (b)Serial (c)TWAIN (d)Parallel

79. An interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation is :

(a)Peripheral Component Interconnect (b)Input/Output Supervisor


(c) Jumper block (d)12C bus

80. A term for technologies in which human neural activity or states would effectively be an input peripheral for a computer is :

(a)Machine vision (b)Wearable computer
(c)Artificial intelligence (d)Brain-Machine interface

81. Which among the following is a boot loader ?

(a)LILO (b)MBR (c)FAT (d)POST

82. Which among the following is the fastest sorting method ?

(a)Heapsort (b)Insertion sort (c)Selection sort (d)Bubble Sort

83. Who developed the concept of semaphores ?

(a)Dekker (b)Tanenbaum (c)Kruskal (d)Dijkstra

84. Which among the following is not object oriented ?

(a)Java (b)Smalltalk (c)Delphi (d)LISP

85. Which among the following is used for file sharing among different platforms ?

(a)NTFS (b)FAT (c)ext3 (d)SAMBA

86. Which among the foillowing SQL commands is a projection operation ?

(a)INSERT (b)SELECT (c)DELETE (d)CREATE

87. Which among the following is a clipping algorithm ?

(a)Kruskal’s (b)Cohen-Sutherland (c)Dijkstra’s (d)Prim’s

88. Which is not a comparison based sort ?

(a)Radix Sort (b)Quick sort (c) Heap Sort (d)Merge Sort


89. The worst case time of Quick sort is ?

(a)O(n log n) (b)O(n2) (c)O(n2 log n) (d)O(n2)

90. The port number used by SMTP is :

(a)21 (b)23 (c)25 (d)80


91. Which among the following problems is undecidable ?

(a) Given a grammar G and a string w, to determine whether w is in L(G)
(b) Given a grammar G1 and G2, to determine whether L(G1)=L(G2)
(c) For an arbitrary grammar G, to determine whether L(G) is empty.
(d) All of the above.

92. Which algorithm is used to form a minimum spanning tree ?

(a)Prim’s algorithm (b)Strassen’s algorithm
(c)Dijkstra’s algorithm (d)Stirling’s formula

93. In linux, the daemon which runs user programs at periodic scheduled times is :

(a) named (b)Ipd (c)crond (d)gated

94. Which of the following is a screen, attached externally to a monitor, that plugs into a serial or Universal Serial Bus(USB) port or a bus card installed inside the computer ?
(a) digiboard (b)patch panel (c)Source-route transparent bridging
(d)touch screen

95. The designation for an electronics standard for connecting devices to your personal computer is :

(a) Universal Serial Bus (b)IEEE 1394
(c) Universal Plug and Play (d) Attachment unit interface


96. In a Java program, you read the following statement that compiles and executes:
Cookie cookie=new Cookie(“chocolate chips”);
What can you conclude?

(a)Cookie is the name of the class
(b)Cookie is a primitive type variable

(c) The Cookie class must have a constructor that has one formal parameter of type String

(d) (a) and (c)

97. You are programming a game of dice in Java. You need to generate a random integer that can be 1,2,3,4,5 or 6.

Which of the following expression would you select ?

(a)math.random( )*6 (b)((int)Math.random( ))*6+1

(c) (int)(Math.random( )*6) +1 (d) (int)(Math.random( )+6)

98. Which among the following is not an e-mail protocol ?

(a)POP3 (b)SMTP (c) IMAP (d)SNMP

99. In linux, what does runlevel 6 of init do ?

(a)reboot (b)single-user mode (c)multi-user mode (d)shutdown

100. Which among the following products is a proxy server?

(a)Squid (b)Apache (c)Pine (d)IIS



Pls send the scanned copy of previous question papers of all PSC exams to questionforall@gmail.com. These previous questions will be helpful for all job seekers.

4 comments:

Anonymous said...

Thank you, that was extremely valuable and interesting...I will be back again to read more on this topic.

Anonymous said...

Sweet blog, I hadn't noticed questionforall.blogspot.com before in my searches!
Keep up the excellent work!

Anonymous said...

Hi,

I have a question for the webmaster/admin here at questionforall.blogspot.com.

May I use part of the information from this post above if I give a link back to this site?

Thanks,
Charlie

Meenakshi said...

U can use part of information from this post.For that u should provide the source of these contents as "www.questionforall.blogspot.com

Custom Search