Exam Details

Subject computer science
Paper paper 1
Exam / Course
Department
Organization rajasthan public service commission
Position college lecturer
Exam Date 28, June, 2016
City, State rajasthan,


Question Paper

24/06/2016 College Lecturer Exam ComputerScienceI
1/44
Rajasthan Public Service Commission 2016
Paper ComputerScienceI
Ques: 150
Time: 3 Hours
Ques
Which of the following instruction need not to be executed in kernel mode
Change memory management registers
Set the time of day clock
Change processor priority
Write the program counter
...... ... .. .... ...... .. .... ... ... ........... .... .. ........ ..... ..
...ó. ..... ...... .....
... Õ.. .. ... ... ....
...... .g ........ .....
..O.. ...... .. .....
Ques
Which of the following process state transition is not possible




...... ... .. .... ...... ..... ... ..... ..... .... ..... ..




Ques
A1
B2
C3
A3
B2
C1
A2
B3
C1
A3
B1
C2
A1
B2
C3
A3
B2
C1

24/06/2016 College Lecturer Exam ComputerScienceI
2/44
A2
B3
C1
A3
B1
C2
Ques
8
16
24
32
8
16
24
32
Ques
Which one is not true related to segmentation
Segmentation is faster than paging.
Program is divided into variable size segments.
Compiler divides program into segments.
Offset must be added to starting segment address.
.......... .. ....... ... .. ..... ... .... ..... ..
....'...., ...... .. ... ..
..O.. .. .... .. ....'. ....... .... ..
......., ..O.. .. ....'. ....... .... ..
....'. .... .. ..... ..... .. ..... .ä.I ..
Ques
Size of virtual memory depends on the size of
Data bus
Address Bus
Main Memory
None of these
........ ....... .. .... ...... ... .. ...... .... .. ....... ..
.... ..
.... ..
... .....I
.... .. ... ..I.
Ques
Sector interleaving in disks is done by
Disk Manufacturer
Disk Controller
Operating System
None of these

24/06/2016 College Lecturer Exam ComputerScienceI
3/44
.... ... ...... ............ ...... ...... ..... .... ..
.... ó.....
.... ó.....
....Õ... .....
.... .. ... ..I.
Ques
In round robin CPU scheduling as the time quantum is increased the average turn around time
Increases
Decreases
Remain constant
Varies irregularly
..... ...... ......... ........... ........ ..., .. .... ....... .. ..... .... .. .. ... .... ...... ...
.....
.....
ó... .....
.ó..... .....
Ques
In operating system which one of the following is not a scheduling algorithms
FCFS
SJF
Round Robin
Starvation
......... ....... ..., .... .. ... ........... .......... ..... ..
FCFS
SJF
..... ..!..
........
Ques :10
Fence register is used for
Memory Protection
File Protection
CPU Protection
All of these
.... ....... .. ..... ..... .... ..
...ó. ...u.
.... ...u.
......... ...u.
...' .. ...
Ques :11
Amount of work completed in a unit of time is

24/06/2016 College Lecturer Exam ComputerScienceI
4/44
Throughput
Response
Turn Around
Latency
.... ........ ... ........... ..... .. ... .... ..
.....
N......
.. ......
...'..
Ques :12
Which one the following is a technique to prevent starvation
Context Switching
Flooding
Aging
Dispatching
...... ... .. ..... ..... ......... .. ..... .. .... ..
..... .. .......
......
.....
.........
Ques :13
Which of the following is not a memory allocation method
First fit
Best fit
Worst fit
Not fit
...... ... .. ... .. ....... ..... .. ...... ..... ..
... ...
.... ...
... ...
... ...
Ques :14
Physical memory is broken into fixed size blocks called
Frames
Pages
Chunks
Buffer
...... ....... .. ..... .... .. ........ .... ...... ..
....
...
...
...

24/06/2016 College Lecturer Exam ComputerScienceI
5/44
Ques :15
Which of the following system objects that are neither files nor directories
Semaphore
Monitor
Both Semaphore and Monitor
None of these
...... ... .. ..... ....... ....... .. .. .... .. .. ... ...........
.......
..ó...
....... .. ..ó... ...Ï
.... .. ... ..I.
Ques :16
Solution to critical section problem is
Mutual exclusion Progress, Bounded waiting
Mutual exclusion Progress, Race Condition
Bounded Waiting, Progress, Unbounded Buffer
Race Condition, Unbounded buffer, Progress
......... ...... ...... .. .... ..
...þ.... . . .... ..O.. ....... ..Õ...
...þ.... . . .... ..O.. ... ..
....... ..Õ... ..O.. ......... ...
... .. ......... ... ..O..
Ques :17
A successful " fork " system call in unix return to child process.
PID (Parent)
0
1
NULL
........ .. .. ... " ..... " ....... ... ...... ...... .. ..... .. .
.........
0
1
.. NULL
Ques :18
Number of arguments specified in a Unix command line argument is identified by




........ ..... .... ........... ... ........... ........... .. ...... .. ..... .... ..


24/06/2016 College Lecturer Exam ComputerScienceI
6/44



Ques :19
Which among the following is language processor
Assembler
Compiler
Interpreter
All of these
...... ... .. ... .. ........ ....... ..
.......
.......
........
...' .. ... ..
Ques :20
RAID stands for
Redundant array of inexpensive disks
Relative array of inexpensive disks
Redundant array of interrelated
disks
Relative array of interrelated
disks
RAID .. .... ........ ..
N....'. ... .. ... ..'... .....
N...Õ.. ... .. ... ..'... .....
N....'. ... .. ....N......
.....
N...Õ.. ... .. ....N......
.....
Ques :21
Which of the statement is not true related to threads
Thread is a light weight process.
User level threads are managed by thread library
Kernel level threads are faster to create and manage than user level threads
Thread minimize context switching time
.... .. ......... ... .. ... .... ..... ..
... .. .... ... ..... ..
.... .... ... ... ......I .. ..... .... ..
.... .... ... .... .... ... .. .... .. ..... ... ..... .... ..
... .... .. ....... ... .. .. .... ..
Ques :22
Which of the following is not a valid mode of file opening for " open " system call in Unix
O_RDONLY
O_WRONLY
O_WRRD
O_RDWR

24/06/2016 College Lecturer Exam ComputerScienceI
7/44
........ .. " ... " ....... ... .. ....... ... ...... ... .. ..... .... ..... .. ... ... ..... ..
O_RDONLY
O_WRONLY
O_WRRD
O_RDWR
Ques :23
What is the return type of " write system call in Unix
size_t
ssize_t
int
char
........ .. " write " ....... ... .. ....... .... ... .. ..
size_t
ssize_t
int
char
Ques :24
" head " Unix command when used without an option displays how many lines of the file
3
5
10
100
..... ... ....... .... ........ .. " head " ..... ..... .... .. ...... ..... ......... .... ..
3
5
10
100
Ques :25
What will be the output of the following Unix command tail
c
512 filename
Copies last 512 bytes from file
Copies every byte after skipping 511 bytes
Copies last 512 lines from file
Copies every line after skipping 511 lines
...... ........ ..... .. ...... .... .... tail
c
512 filename
.... .. ....I 512 .... .... .....
511 .... .. ..... ...g ... .... .....
.... .. ..ó.. 512 ..... .... .....
511 ..... ..... ...g ... ..... .... .....
Ques :26
Which of the following wait is undesirable for a process
Waiting in ready queue
Waiting for input/output
Waiting for semaphore
Busy waiting

24/06/2016 College Lecturer Exam ComputerScienceI
8/44
...... ... .. ..... ....... wait ..... ...... .... ....... ..... ..
.... .. ...... (wait)
..... ...... .... ...... (wait)
....... .... ...... (wait)
!... ..Õ...
Ques :27
32 Bits
24 bits
16 bits
All of these
32 !..
24 !..
16 !..
...' .. ...
Ques :28
Which is false statement
The dispatcher module gives control to CPU, to process the selected short term scheduler
The dispatcher may invoke during process context switch
Dispatch latency stop one process and start another process
The dispatcher is not used in CPU scheduling.
.... .. ... .. ... ... ..
....... .. ..., CPU .. ó..... .... .. ..ó.. ........ ....... STS) ..ü.. .. .... .. ...
....... .. ..... .. .... .., ..ü.. .... .... .. .....
....... ...'.. .. ..ü.. .. ... .. .. ....I ..ü.. .... .... ..
....... CPU .. ...... ..... ..I. ...
Ques :29
The process arrive in a system at the rate of 10 processes/minute and average service time for each job is 3
seconds. What will be the system load




10 ...... ..... ..... .. .. .. ..... ....... ... ...... ... .. ... ... ....... ... 3 ..... ..... ... .. ..
....... .. ... ....



24/06/2016 College Lecturer Exam ComputerScienceI
9/44


Ques :30
On a system using non preemptive scheduling process with expected runtime of 18 9 ,12 are in ready
queue . In what order they should be run to minimize wait time
5 18 9 12
5 9 12 18
18 12 9 5
18 5 9 12
... .......... ........... ....... ....... .. .... .... ... ...... ..... ......... .. .... 18, 12 ..
... .. .. . ...... .... ... ... .. ..... ... ..... ....... .... ....... ...
5 18 9 12
5 9 12 18
18 12 9 5
18 5 9 12
Ques :31
A software metric that is a measure of the average length of words and sentences in documents is caused
Fanin
Fanout
Cyclomatic Complexity
Fog Index
.. ......... ..... .. .......... ... ..... ... ....... .. ... ...... .. .... .. ...... ..
.....
......
... ....ÕA. ....... ..I
... .... .
Ques :32
Which of the following software process model gives explicit recognition of risk
Waterfall Model
Incremental Development Model
Spiral Model
Prototyping Model
...... ... .. ..... ........ ...... .... ...... .. ...... ..... .... ..
....... ....
..üg.'.. ......'. ....
...... ....
........... ....
Ques :33
In software project risk management, accessing the likelihood and consequences of identified risks is called
Risk Identification
Risk analysis
Risk Planning
Risk Monitoring

24/06/2016 College Lecturer Exam ComputerScienceI
10/44
........ ........ ... ...... ...... .. ....... ........ ....... .. ......... ... ........ .. .........
...... ..
N... ...'Õ.......
N... ........
N... ...ó...
N... ..ó..N...
Ques :34
COCOMO model stands for
Common Cost Model
Constructive Cost Model
Cost Constructive Comprehensive Model
Comprehensive Cost Model
COCOMO .... ..
.... .... ....
...A. .. .... ....
.... ...A. .. ........... ....
........... .... ....
Ques :35
In context of software testing, which of the following is not a type of user testing
Performance Testing
Alpha Testing
Beta Testing
Acceptance Testing
........ ........ .. ....... ... ...... ... .. ..... .... ........ .. .. ..... ..... ..
......'. .......
.... .......
!... .......
. ....'. .......
Ques :36
Which model in system modeling indicate " how software will respond to external event"
Context Model
Data Model
Behavior Model
Object Model
....... ........ ... ..... .... .. ..... .. ... ........ .... ...... .... .. ........... .....
..... .. ....
.... ....
!....... ....
.... . ....
Ques :37

24/06/2016 College Lecturer Exam ComputerScienceI
11/44
Which of the following is a functional requirement
Maintainability
Portability
Robustness
None of these
...... ... .. ... .. ....... ........ ..
.......!..I.I
...N....I
........
.... .. ... ..I.
Ques :38
Which of these is not an element of requirement model
Behavior element
Usage based element
Flow oriented element
All of these
...... ... .. ..... ........ .... .. ...... ..... ..
!....... ....
..... ...N.. ....
... .N...... ....
.... .. ...
Ques :39
Which model of software development is best suited if requirements are frequently changing
Incremental Model
Spiral Model
Prototype Model
RAD Model
........ ......... .. ..... .... ...... ..... .... ........ ...... ... .... ..
..üg.'.. ....
...... ....
........ ....
... ....
Ques :40
Which of the following is not a category of maintenance
Corrective
Effective
Adaptive
Perfective
...... ... .. ... .. ... ......... .. ..... ..
.... ..
.... ..

24/06/2016 College Lecturer Exam ComputerScienceI
12/44
...Õ..
..... ..
Ques :41
Which of the following is the method of black box testing
Boundary value analysis
Basic path testing
Code path testing
None of these
...... ... .. ... .. .... ..... ........ .. ...... ..
...... ..... ........
..... ... .......
... ... .......
.... .. ... ..I.
Ques :42
RAD Model is not suitable when
Technical risks are high
Testing is not needed
Technical risks are high and testing is not needed
None of these
RAD .... ...... ..... .. ..
... ... N... ..... ..
....... .g .ä.. .. ..
... ... N... ..... .. .. ....... .g .ä.. .. ..
.... .. ... ..I.
Ques :43
Which of the following is fault base technique?
Unit Testing
Beta Testing
Stress Testing
Mutation Testing
...... ... .. ... .. ..... ... ........ ..... ..
..ó.. .......
.... .......
.A.. .......
....... .......
Ques :44
Which one is not a system testing
Deployment testing
Stress testing
Safety Testing

24/06/2016 College Lecturer Exam ComputerScienceI
13/44
Security Testing
...... ... .. ..... .. ....... ........ ..... ..
........'. .......
.A.. .......
....I .......
.. ..N..I .......
Ques :45
Project Objective
Responsibilities
Schedule
All of these
.... . ..... ..
....Ï......I.
.. ...
.... .. ...
Ques :46
Defect removal efficiency is




...... ....... ........... DRE) ..



Ques :47
Which of the following is not a decomposition method of software project estimation
COCOMO model estimation
LOC estimation
FP estimation
All of these
...... ... .. ..... ........ ........ .......... .. .......... ...... ..... ..
COCOMO .... ...I....
LOC ...I....
FP ...I....

24/06/2016 College Lecturer Exam ComputerScienceI
14/44
.... .. ...
Ques :48
Which one is not a part of software quality attribute FURPS developed by HewlettPackard

Functionality
Portability
Reliability
Supportability
...... ... .. ... .. .. ........ .......... ....... FURPS .. ... ..... .. .. .. ...........
.. ...... .....
... ..
.. .....I
...N....I
N........I
....N....I
Ques :49
Which of the following activities is not involved in configuration management of a software system product
Change Management
Version Management
Release Management
Quality Management
...... ... .. ..... ...... ........ ....... ....... .. .............. ......... ... ...... ..... ..
......'.
... ......'.
N..I. ......'.
.....I ......'.
Ques :50
UML stands for
Uniform Modeling Language
Unified Modeling Language
Universal Modeling Language
None of these
UML .. ........ ..
..ó.... ....... .È ...
..ó..... ....... .È ...
..ó.... ....... .È ...
.... .. ... ..I.
Ques :51
A data store in DFD represents
Sequential file
Disk store
Repository of data
Random access memory

24/06/2016 College Lecturer Exam ComputerScienceI
15/44
DFD ... .... ..... ....... ..
.. .'.... ....
.... ....
N........I .. ....
.È.. . ... .....I
Ques :52
Data flow in DFD must have A An arrow showing direction of flow of data. B A meaningful name. C A
label such as xyz D no arrow as they are confusing
A and B
A and C
B and D
C and D
DFD ... .... .... .. ... .... ...... .. ... .. .... .... .. ..... ..... ... .. .. ......... ...
.. .... .... xyz ... ... ..... ........ .. ........ .... ..
A ... B
A ... C
B ... D
C ... D
Ques :53
Statement 1 Corrective maintenance is universally used to refer to maintenance for fault repair. Statement 2
Perfective Maintenance sometimes means perfecting the software by implementing new requirement. Which
of the following is correct
Statement 1 is true and Statement 2 is false
Statement 1 is false and Statement 2 is true
Statement 1 is true and Statement 2 is true
Statement 1 is false and Statement 2 is false
... 1 .......... ......, ........... ... .. .... .. ...... .... .. .... ....... ..... .... .. ...
2 .......... ...... .. .... ... ... ... ........ .. .... .. ........ .. ..... .... .. .. ....
.. ... .. .... ..
... 1 ..I .. .. ... 2 ... ..
... 1 ... .. .. ... 2 ..I ..
... 1 ..I .. .. ... 2 ..I ..
... 1 ... .. .. ... 2 ... ..
Ques :54
Software feasibility study is based on
Business and resource constraint only
Scope business constraint only
Scope, technology, time constraint only
Technology, finance, time resource constraint only
........ ........... ..... ....... ..
.... !..... ... N.... ...A...
.... ....,!..... ...A...

24/06/2016 College Lecturer Exam ComputerScienceI
16/44
.... ...., .. ......, .... ...A...
.... .. ......, ....'., .... N.... ...A...
Ques :55
The degree of interaction between two modules is known as
Cohesion
Coupling
Strength
All of these
.. ....... .. .... .... .. ......... ...... ..
......
......
.
.... .. ...
Ques :56
According to Brooks, if n is the number of programmers in a project team then number of communication
path are




...... .. ...... .... ........ .... ... n ........ .. .. ............ ... .....



Ques :57
Which is not a size metric
Program Length
Cyclomatic Complexity
LOC Line of Code
FP Function Point
...... ... .. ..... .... ..... ..... ..
..O.. .
... ....ÕA. ....... ..I
LOC .... .. ...
FP .. .. .....
Ques :58

24/06/2016 College Lecturer Exam ComputerScienceI
17/44
Effort is measured in terms of
Personmonths
Persons
Rupees
Months
..... .... .... ..
.......
....
ä...
....
Ques :59
What is prototype in Prototype Model
Minimodel
of existing system
Minimodel
of proposed system
Working model of existing system
None of these
......... .... ... ......... .... ..
...... ..... .. .... ....
....... ..... .. .... ....
...... ..... .. ...Ü. ....
.... .. ... ..I.
Ques :60
SRS stands for
Software Requirement Specification
Software Requirement Standard
System Requirement Standard
Software Requirement Set
SRS .. ........
....... N. ........ ...........
....... N. ........ ......
..... N. ........ ......
....... N. ........ ...
Ques :61
Cryptanalysis is
Process of break to cipher text message to obtain plain text message
Process of increase the speed
Process of encrypt the data
None of these
.................. ..
..... .. .. ..... .. ... .. .... .. .. ..... .... .... .. ..I..
.... .... .. ..I..
.... .. ...ü.. .... .. ..I..
4

24/06/2016 College Lecturer Exam ComputerScienceI
18/44
...' .. ... ..I.
Ques :62
DES stands for In reference to cryptography
Digital Encryption Standard
Digital Encryption Set
Data Encoding Scheme
Data Encryption Standard
DES .. ........ .. ............. .. ....... ...
...... ...ü... ......
.... ...ü... ...
.... ........ ..g.
.... ...ü... ......
Ques :63
" Man in the middle attack " is also known as In reference of DiffieHellman
key exchange algorithm
Brute Force attack
Bucket bridge attack
Plaint text attack
None of these
" ... .. . ... .. .... " ...... ... .. .... ... .. .. .... .... .. .... ..... ...
.......
.......... .. ....... ...
... ... ....
.... !.. ....
.... .. .. ....
.... .. ... ..I.
Ques :64
Vernam cipher is also called
Rail fence technique
Casear Cipher
One Time pad
Homophonic cipher
..... ..... ...... ... .. .... ... .. .. .... .... ..
... ... ..
...... .....
.. .... ...
......ó.. .....
Ques :65
In IDEA algorithm the key size is
64 bit
128 bit
256 bit

24/06/2016 College Lecturer Exam ComputerScienceI
19/44
56 bit
IDEA .......... ... ......
.... ..
64 !..
128 !..
256 !..
56 !..
Ques :66
Who will increase the redundancy of plain text
Confusion
Diffusion
Both confusion and diffusion
None of these
...... ... .. ... ..... ....... .. .......... .. ..... ..
.......
.......
....... . ....... ...Ï
.... .. ... ..I.
Ques :67
To verify a digital signature, we need the
Sender's private key
Sender's publickey
Receiver's private key
Receiver's publickey
..... ......... .. ........ .... .. .... .... ..... ....
.'.. .g .......g
.'.. .g ......g
N..... .g .......g
N..... .g ......g
Ques :68
In RSA algorithm, P 7 and Q 17, What is the value of E (Public D (Private Key) respectively
119 3 77
119 3 67
129 5 ,77
119 5 77
RSA .......... ... P 7 ... Q 17 .. .. E ......
. ... D ........
. .. ...... ..... ....
119 3 77
119 3 67
129 5 ,77
119 5 77
Ques :69
Which of the following service is supported by PGP Pretty Good Privacy

24/06/2016 College Lecturer Exam ComputerScienceI
20/44
Confidentiality
eMail
Compatibility
Compression
All of these
...... ... .. ..... .... .. PGP ....... ... ........ ...... .... ..
......'......I
.... ....Õ.....I
......
.... .. ...
Ques :70
Which one of the following is not a Denial of Service atatck
Tear drop attack
Smurf attack
SYNFlood Attack
Code Red
.. ... .. ... .. ..... .. ....... .... ..... ..
Õ... ... ....
... ....
SYN... ....
... ...
Ques :71
In tunnel mode, IP Sec protect
Entire packet
IP header
IP Payload
None of these
... ... ... ...... ... ...... .... ..
.... .....
... ... ....
... ... .....
.... .. ... ..I.
Ques :72
When one entity pretend to be a another entity, the attack is known as
Replay attack
Modification
Denial of Service
Masquerade
.. .... .... ...... .. ..... .. ........ .... .. .. .... ........ .... .. .... .... ..
.I... ....
..........
...... .. ....
.......

24/06/2016 College Lecturer Exam ComputerScienceI
21/44
Ques :73
Baud is
Number of bits transmitted per unit time
Number of bytes transmitted per unit time
Number of signal changes per second
None of these
... ..
.... .. !.£. A........ .. ..ó.. ....
.... .. ..... A........ .. ..ó.. ....
.... .. .. .. .'.. .. .....
.... .. ... ..I.
Ques :74
Network uses star topology if
All computer are arranged in local loop
All computers are attached to a central point
All computers are attached to a single long cable
All computers are attached to multiple hierarchical cable
....... ..... ........ .. ..... .... .. ....
... ....... .... ... ....... ..
... ....... .. .'A. ..... .. .... ..
... ....... .. .... .... .. .... ..
... ....... ...I.. .."... .... .. .... ..
Ques :75
CIDR stands for
Classified Internet Domain Routing
Classless Inter Domain Routing
Classless Internet Domain Routing
Classified Inter Domain Routing
CIDR .. ........ ..
........ ....... ..... ...Õ...
...... .... ..... ...Õ...
...... ....... ..... ...Õ...
........ .... ..... ...Õ...
Ques :76
In cycle redundancy check, CRC is
Divisor
Quotient
Dividend
Remainder
....... .......... ....... ... ......... ..

24/06/2016 College Lecturer Exam ComputerScienceI
22/44
...... (.......)
..... (......)
....
..... (N......)
Ques :77
Loss in signal power as light travel down the fiber is called
Attenuation
Propagation
Scattering
Interruption
..... .. ..... .. ...... .. .. ....... .. .... ... ..... .. ... .... ..
..I......
........
....N...
.......
Ques :78
Six channel, each with a 100 KHz bandwidth are to be multiplexed together what is the minimum bandwidth
of the link if there is need for a guard band of 10 KHz between to channels to prevent interference
600 KHz
610 KHz
650 KHz
590 KHz
100 KHz .......... .... .. .... .. .............. .... .. .... ..... .. ....... .......... .... .... ...
..... .. ... ........ ..... .... 10 KHz .. ..... .... .. ........ ..
600 KHz
610 KHz
650 KHz
590 KHz
Ques :79
20 byte
24 byte
32 byte
64 byte
20 ....
24 ....
32 ....
64 ....
Ques :80

24/06/2016 College Lecturer Exam ComputerScienceI
23/44
Four 1 KbPS connections are multiplexed together if unit is 1 bit find the duration of a frame



1 KbPS .. ... ....... .. ... .............. ..... .. .. .... ...... 1 .... .. .. ........ .. ..... ....
....




Ques :81
In OSI Model match the following Physical Layer Dialog control synchronization Data Link layer
Synchronization of bits and transmission mode Session layer Translation and Compression
Presentation Layer Error Control and Framing
A2
B4
C1
D3
A1
B3
C2
D4
A3
B1
C4
D2
A4
B2
C3
D1
OSI .... ... ...... .. .... ..... ....... .... ...... ..... ... .............. .... .....
.... .............. .. ......, ........ ... .... .... ....... ... ........ ..........
.... ... ..... ... ........
A2
B4
C1
D3
A1
B3
C2
D4
A3
B1
C4
D2
A4
B2
C3
D1
Ques :82
From which network device, the frame from one LAN can be transmitted to another LAN
Modem
Router
Bridge
Repeater
.... ....... ..... ...... ..... .... .. .. ... .. ..... ... ... .... .... ..
.....
.....
!..
N.....
Ques :83
What is the address size of IPv6
32 bit
128 bit
256 bit
512 bit

24/06/2016 College Lecturer Exam ComputerScienceI
24/44
IPv6 ... .... .. .... .... .... ..
32 !..
128 !..
256 !..
512 !..
Ques :84
In which layer of OSI model does the repeater work
Physical Layer
Data Link Layer
Network layer
Transport Layer
....... OSI .... .. .... ... .. ... .... ..
...... ...
.... .... ...
..... ...
A...... ...
Ques :85
In which switching each packet of a message follow the same path from sender to receiver
Circuit Switching
Message switching
Virtual approach to packet switch
Datagram approach to packet switching
.... ......... ....... ..., ..... ..... .. .. ..... .. ..... .. ....... .. .... .. .... .... .. .. .....
..... .... ..
.... .......
..... .......
..... .... .. ..... .......
....O.. .... .. ..... .......
Ques :86
"Count to infinity " problem occurs in
Distance Vector Routing
Link State routing
Multicast routing
Hierarchical Routing
" ..... .. ........... " ...... ... ..
....'. .. .. ...Õ...
.... .... ...Õ...
...I.... ...Õ...
Õ...N... ...Õ...
Ques :87

24/06/2016 College Lecturer Exam ComputerScienceI
25/44
In distance vector routing algorithm each router maintain a separate routing table with a following entries
Preferred input line, estimated time
Preferred input line, estimated distance
Preferred output line, estimated time
Preferred output line estimated distance
....... ...... ........ .......... ... ....... ..... .. ... ........ .... ..... .... .. ..... ......
............ .... ..
.....ó.. ..... ...., .....ó.. ....
.....ó.. ..... ...., .....ó.. ....'.
.....ó.. ...... ...., .....ó.. ....
.....ó.. ...... ...., .....ó.. ....'.
Ques :88
Which of following field in IPv4 datagram is not related with fragmentation
Flag
Offset
TOS
Identifier
...... ... .. ..... IPv4 ........ .. ....., ........... .. ......... ..... ..
....
.þ...
.I . ..
...'Õ.....
Ques :89
DNS Client is also known as
DNS Updater
DNS resolver
DNS handler
None of these
DNS ....... .. .. ...... ..
DNS ......
DNS N......
DNS .È...
.... .. ... ..I.
Ques :90
The header length of IPv6 datagram is
10 byte
20 byte
40 byte
60 byte
IPv6 ........ .. .... .. ...... .... ..
10 ....
20 ....

24/06/2016 College Lecturer Exam ComputerScienceI
26/44
40 ....
60 ....
Ques :91
Choose a false statement about Von Newmann's stored program computer architecture:
Program and data are stored in same address space in main memory
Allow self modifying programs
Programs and data are stored in secondary memory
Set of control signal is same for instruction and data fetch.
........
.. " ....... ....... ............ " .. .... ... ..... ... ......
..O.. . .... ... .....I .. .. .I .... .... .... .... .... .... ..
.... ......... ..O.. ..... ..
..O.. . .... ...... .....I .... .... .... ..
...A .. . .... ... .. ... .... ..A.. .. .. .. ... .... ..
Ques :92
Let a computer has 512 KB of main memory having one byte per word . If all the words of memory are
operational then there are minimum bits in .
18 Data bus
19 Data bus
18 Address bus
19 Address bus
.... .. ........ ... ... ....... 512 KB .. ... ....... .... 1 .... .. .. . .... ....... .. ... .... ......... ..
.. ........ ... ....... .... .. .. .
18, .... ..
19, .... ..
18, .... ..
19, .... ..
Ques :93
What is the value of IEEE 754 single precision floating point number represent by binary bit string given
below: 0100 0000 0110 0000 0000 0000 0000 0000
3.5
3.5
4.8
4.8
... ... ....... .... ..... ...... ......... IEEE 754 ... ......... ......... ..... ...... .. ... .. 0100
0000 0110 0000 0000 0000 0000 0000
3.5
3.5
4.8
4.8
Ques :94
An n bit binary number represented in signmagnitude
representation has a range



24/06/2016 College Lecturer Exam ComputerScienceI
27/44


.... .......... ... ... ......... .. n .... .. ....... .... .. .... .... ..




Ques :95
In 4 bit two's complement notation addition of and 4
result into
1001
1010
1100
1111
4 .... ............. ... ... ... 4
.. ... .... .. ....... ...... .... ..
1001
1010
1100
1111
Ques :96
In 5 bit signmagnitude
representation result of 11111 00111 will be
100110
00111
11000
10110
5 .... .... .......... ... ... 11111 00111 .. ....... ....
100110
00111
11000
10110
Ques :97







24/06/2016 College Lecturer Exam ComputerScienceI
28/44


Ques :98








Ques :99
0 1 0
1 0 0
0 1 1
1 0 1
0 1 0
1 0 0
0 1 1
1 0 1
Ques :100
if are input variables of full adderoutput
sum and carry are given by




.... ... ... .. ..... .. .. .. ...... .. ... ..... ............ .....




Ques :101
Consider the following properties for combinational digital circuit and sequential digital circuit I

24/06/2016 College Lecturer Exam ComputerScienceI
29/44
Output is entirely dependent on current input. II Implemented
using flipflop
III Output
is determined by
sequence of inputs . Which of the following is valid match
C
II and S III
C III
and S I
C II,
III and S I
C I
and S II,
III
............ ..... ....... ... ............. ..... ........ . S .. ...... ....... .. ...... ...
I ......
....... ....... ..... .. ....... .. II .
.... ..... .. ..... .. ..... .... .. III ......
..... .. ..... .. ....... .. ...... ... .. ... .. .... .... ..
C
II ... S III
C III
... S I
C II,
III ... S I
C I
... S II,
III
Ques :102
Which of the following statement is not true about JK
flip flop
It behaves like SR
flip flop when both J K are not 1 simultaneously
It behaves like T Flip flop when J K 1
It behaves like D Flip flop when J K 1
When J K 0 the state remain unchanged on a clock signal
JK
..... ..... .. .... ... ..... ... .... ..... ..
.. SR
.... .... .g ... ... .... .. .. J . K ...Ï ... 1 .. ..
.. T .... .... .g ... ... .... .. .. J K 1 ..
.. D .... .... .g ... ... .... .. .. J K 1 ..
.. J K 0 .. .. ... .. .. .. ...g .... ..N..ó.. .... ..
Ques :103
The minimum number of D flip flop needed to design a mod264
counter is
8
9
264
265
.. ...264
...... ..... .... .. .... ...... D ..... ..... .. ........ ....
8
9
264
265
Ques :104
In addressing mode the operands are specified within the definition of instruction such as "
complement accumulator " while in addressing mode operands are explicitly specified within
the address field of instruction itself.
Implied Immediate
Direct Immediate
Immediate Direct
Direct, Indirect
........ ... ... ........, ........ .. ........ .... .. " ............. ........... " ...

24/06/2016 College Lecturer Exam ComputerScienceI
30/44
....... .... .. ..... ........ ... ... ........ .... ... ........ .. .... ... ... ... ....
.... .... .. .
....... ........
..... ........
........ ..... .
..... . ....... .
Ques :105
" Effective Address address part of instruction content of CPU register " is applicable for which pair of
addressing modes given below
Register Indirect, Relative
Direct, Relative
Indirect Indexed
Relative, Indexed
" ........ .... ........ .. .... ... ......... ....... .. ... " ...... ... .. .... ........ ... .....
.. .... .... ..
...... ....... . N...Õ..
..... N...Õ..
....... . .... ..
N...Õ.., .... ..
Ques :106
Consider single accumulator general register and stack is type of CPU organization. Which of
the following specifies valid number of address fields in a computational type of instruction of each
organization
SA1
GR 2
or 3 S 0
SA2
or 3 GR 1
S 0
SA2
or 3 GR 1
S 1
SA0
GR 1
S 2
or 3
CPU ........... .. ......... ....... .... ...... ......... .... ....... ... ..... ..
...... ... . ...... ... .. ... ....... ........... .. .. .... ........ ........ ... .... ..... .. .....
...... ....... ..
SA1
GR 2
.. 3 S 0
SA2
.. 3 GR 1
S 0
SA2
.. 3 GR 1
S 1
SA0
GR 1
S 2
.. 3
Ques :107
Which of the following is not a characteristics of reduced instruction set RISC
Hardwired control
Relatively few addressing modes
Memory access limited to load and store
Variable length instruction formats
...... ... .. ..... " .......... ........ ... ........ (RISC) " .. ....... ..... ..
....... ..A..


24/06/2016 College Lecturer Exam ComputerScienceI
31/44
........ è. .. ....... .. . .g .. ..t..
.... ... .. .... .. ..... .....I . ...
.. ..... .. ...A .. ...N.
Ques :108
Fetch Operands Fetch Instruction Execute calculate effective address Decode Instruction
and Store result are steps taken by CPU control to execute an instruction . Which of the following
specifies a valid sequence of these steps




CPU ..... ...... .. ........ .. .......... .... .. .... ...... ..... ..... .... .. ... ......
... ........ .......... ........ .... .. .... .... ........ ... ..... .......
. ...... ... .. ..... .. ..... .. ..... ... .. ....... ..




Ques :109
Considering equal processing time for each segment, speed up
S achieved by a K segment instruction pipeline
operating on a straight sequence of N instruction is given by




.. K ....... ........ ........ .. N ........ .. .... ..... .. ....... .. . .... ...... ...... .....
.. S .... ....... ........ .. .......... .... .... .. .. ..... .. .... ..




Ques :110
Which of the following type of Data Hazard in pipelined processor is harmless hazard?
Read after Write
Read after Read
Write after Write
Write after Read

24/06/2016 College Lecturer Exam ComputerScienceI
32/44
...... ... .. ... .. .... ...... ....... ... .... ...... .. .. ... .. .. ......... ..... ..
.I. .... ....
.I. .... .I.
.... .... ....
.... .... .I.
Ques :111
Choose a true statement for memorymapped
I/O system
It uses two separate buses for memory and I/O .
It uses one common bus for memory and I/O but have separate control line of each .
It uses common bus for memory and I/O with common control lines.
It uses distinct instruction for I/O transfer and memory transfer operations.
....... ..... I/O ...... .. .... .... ... ....
...' .....I ... I/O .. ... .. ... ... ..Ï .. .... .... ..
...' .....I ... I/O .. ... .. .I .. ..... ... ... ..A.. .... .. .... .... ..
...' .....I ... I/O .. ... .. .I .. ... .. .... ..A.. .... .. .... .... ..
...' I/O A..... ... .....I A..... .. ... .... .... ...A .. .. .... .... ..
Ques :112
In processor P non preemptive priority interrupts 4 7 1 3 0 2 6 arrive sequentially (low number high
priority) . If when one interrupt is being handled exactly two more interrupts arrive. What is order of these
interrupts handled by P
4 7 1 3 0 2 6
4 1 3 0 2 6 7
0 1 2 3 4 6 7
4 1 0 2 3 6 7
.. ....... P ... ... ............ ........... ....... 4 3,0 6 ... .. ... .. (.... .... ... ...........
.... .. ....... .. ......... .. ..... .... .. ....... .. ... .. .. ....... P ...... .. ....... .. ..... ....
.. ... ....
4 7 1 3 0 2 6
4 1 3 0 2 6 7
0 1 2 3 4 6 7
4 1 0 2 3 6 7
Ques :113





24/06/2016 College Lecturer Exam ComputerScienceI
33/44




Ques :114
Which of the following is not a valid bus arbitration policy used to decide which device may use the bus at a
given point of time
Daisy chain method
Independent request and grant method
Polling Method
DMA control method
...... ... .. ..... .. .... ... ... .. ..... ..... .. .. ..... ..... .. ......... .... ..... ..
......... ....... ..... ..
.... ... ....
.....'.'. N. .... ... O... ....
...... ....
........ ..A.. ....
Ques :115
In a memory hierarchy access time hit ratio pairs for cache, main and virtual memory are given by 80
(100 ns 99.5 and (10ms 100 respectively. The closest value of average access time of hiearchy is

10032 ns
10024 ns
10008 ns
10064 ns
.. ....... ....... ... ..., ... ... ....... ....... .. .... ...... .... ... .... ....... .. ..... .........
5ns, 80 (100 ns ,99.5 ... 10 ms 100 .. . ....... ....... .. ..... ...... .... .. ......
... ..
10032 ns
10024 ns
10008 ns
10064 ns
Ques :116
Choose a true statement
SRAM bit cell uses a capacitor and a transistor
DRAM bit cell uses two inverters and two transistors
SRAMs are faster than DRAMs
DRAM bit cell uses two capacitors and one transistor.
.... ... ....
SRAM !.. ... .. ........ .. .. A....... .. ..... .... ..
DRAM !.. ... .. ....... ... .. A......... .. ..... .... ..
SRAMs DRAMs .g ..... ... .... ..
DRAM !.. ... .. ........ ... .. A....... .. ..... .... ..

24/06/2016 College Lecturer Exam ComputerScienceI
34/44
Ques :117
If FD denotes hardware that fetches and decode instructions then, which of the following best defines data
path of processor?
FD Secondary Memory Primary Memory
FD ALU Register File
FD ALU CU
FD ALU CU Register File
.... .. ......... .. ........ .. ... . .... .... .. FD ...... ....... .... .. ...... ... .. ... .. .......
.. .... ... .. ........ ........ ..
FD ...... .....I .....I .....I
FD ALU ...... ....
FD ALU CU
FD ALU CU ...... ....
Ques :118
is not included in an instruction cycle of computer processor.
Fetch and decode instruction
Handle an interrupt
Calculate effective address and fetch data
Execute instruction and store results
........ ....... .. ........ ....... .. ... ..... ..
...A .. .. ... . ..... ....
...... .. .È.. ....
.... .. .... .g .... .... . .... ... ....
...A .. .. . .. ... .... . .N....Ï .. .... ....
Ques :119
A 4 bit combinational circuit " shifter " to implement left and right shift operations on 4 bit number may be
designed using
Four 2 to
4
decoders
Two 3 to
8
decoders
Four 2 to
1
multiplexers
Two 4 to
1 multiplexers
.. 4 .... .... .. ..... . .... ...... ...... .... .... 4 .... ........... ....... " ....... " ...... ..
..... .. ..... .... ..
... 2 ..
4
........
.. 3 ..
8
........
... 2 ..
1
...I... ....
.. 4 ..
1
...I... ....
Ques :120
In context of computer system architecture a stack is
Reserved RAM address space
Reserved ROM address space
Reserved I/O address space
A list of instruction

24/06/2016 College Lecturer Exam ComputerScienceI
35/44
........ ....... ............ .. ....... ... ..... ..
... .... .... ...u. ....
... .... .... ...u. ....
I/O .... .... ...u. ....
...A .. .g .. ....
Ques :121
30 26
15 38
18 26
8 38
30 26
15 38
18 26
8 38
Ques :122

24/06/2016 College Lecturer Exam ComputerScienceI
36/44
Let are positive integer such that X B Y C Z . If preorder traversal of a binary
search tree T is given by Y X A B Z C then its post order traversal will be
A B C X Z Y
A B X C Z Y
A B Z Y C X
A B Y Z C X
.... ...... ........ .. ... X B Y C Z .. . .... .. ....... .. T .. ... .....
..... Y X A B Z C .. .. .... ..... ..... ..... ....
A B C X Z Y
A B X C Z Y
A B Z Y C X
A B Y Z C X
Ques :123
Let A 4 B C 6 and D 2 . What is value of postfix expression
21
13
22
10
.... A 4 B C 6 and D 2 .. .. ........... ......... .. ... ....
21
13
22
10
Ques :124
Valid C statement to allocate 20 bytes to an integer pointer P is
P (int malloc
(int malloc
P (int malloc) 20;
&P (int malloc
.. ....... ...... P .. 20 .... ...... .... .. .... ....... C ......... ..
P (int malloc
(int malloc
P (int malloc) 20;
&P (int malloc
Ques :125
Choose a valid statement to insert a node PTR into a queue pointed by FRONT and REAR pointers




...... FRONT . REAR .. ....... .. .... ... ... ... PTR ....... .... .. .... ....... ......... ..





24/06/2016 College Lecturer Exam ComputerScienceI
37/44
Ques :126
30 20 52 25 ,24 18 ,28
30 ,52 ,25 ,20 ,22 ,24 ,18 ,28
30 ,20 ,52 ,25 ,22 ,18 ,24 ,28
30 ,25 ,28 ,22 ,25 ,18 ,24 ,20
30 20 52 25 ,24 18 ,28
30 ,52 ,25 ,20 ,22 ,24 ,18 ,28
30 ,20 ,52 ,25 ,22 ,18 ,24 ,28
30 ,25 ,28 ,22 ,25 ,18 ,24 ,20
Ques :127
Let a number X denote a Push operation and P denotes operation on stack. What will be sum of
elements of stack after applying following sequence of operations on empty stack 2 ,22 ,12 ,15 P 17 18
P 23
44
2
25
24
.... .. ...... X ..... .. Push ... P ...... .. ....... .. . .. ..... ..... .. ...... ..
...... ..... ..... .. ...... ..... .. ..... .. ... .... .... 2 ,22 ,12 ,15 P 17 18 P 23
44
2
25
24

24/06/2016 College Lecturer Exam ComputerScienceI
38/44
Ques :128
Number of edges in an undirected complete graph of 7 vertices is
20
21
14
28
7 ... .. .. ........... ........ .... ... ... ...... .... ....
20
21
14
28
Ques :129
A singly circular linked list without header node is maintaining pointer to first made (START) and last node
(END). If first node is to be deleted valid statements are




..... .... ... .. .. ........ ....... ....... ...... .... .... ... (START) ... ...... ... ..
...... ....... .... .. .... .... ... ..... ..... .... .. .. ....... ......... .....




Ques :130
An AVL tree is called to be in unbalanced stage and requires proper rotation for balancing whenever
Any of its node has balance factor 1
or 1
Root has balance factor 1
or 1
Any of its node has balance factor 2
or 2
Root has balance factor zero
.. AVL .. ........ ..... ... ...... .. ... ... ...... .... .. .... ....... ...... .. ........ .... ..
.. ..
.... .. ... .. ...'. .. .. 1
.... 1 .. ....
è. ... .. ...'. .. .. 1
.... 1 .. ....
.... .. ... .. ...'. .. .. 2
.... 2 .. ....
è. ... .. ...'. .. .. .... .. ....
Ques :131
Consider following C code segment int y=5 while

if continue printf( "India");
if
break How many times India will be displayed
4
10
5
6
...... C ... ....... .. ...... ... int while

if continue printf(

24/06/2016 College Lecturer Exam ComputerScienceI
39/44
"India"); if
break India ...... ... ....... ....
4
10
5
6
Ques :132
What will be output of if (printf("%d",printf("Hello"))) printf("India"); else printf("BYE");
Hello India
Hello5India
Hello BYE
BYE
...... .. ...... .... .... if (printf("%d",printf("Hello"))) printf("India"); else printf("BYE");
Hello India
Hello5India
Hello BYE
BYE
Ques :133
Consider the following C code segment void main {int y=10 F printf("%d
void F(int int 20 y 20 return Output of program will be
20 20
20 10
10 20
10 10
...... C ... ....... .. ...... ... void main {int y=10 F printf("%d
void F(int int 20 y 20 return ....... .. ...... .... ....
20 20
20 10
10 20
10 10
Ques :134
Which of the following file is not generated by C compiler when a program xyz.c is compiled
xyz.bid
xyz.bak
xyz.obj
xyz.exe
.. .. ....... xyz.c .. ....... ..... .... .. .. ...... ... .. ... .. .... C ........ ...... ..... ......
....
xyz.bid
xyz.bak
xyz.obj
xyz.exe
Ques :135
Consider following C statement: int y x=10 5/9
Value of x will be
10
45
32

24/06/2016 College Lecturer Exam ComputerScienceI
40/44
0
...... C ......... .. ...... ... int y x=10 5/9
x .. ... .... ....
10
45
32
0
Ques :136
Consider following declaration in C program I void x II void Choose true statement about I and II
I Compilation
Error II Valid
I Valid
II Compilation
Error
I Valid
II Valid
I Compilation
Error II Compilation
Error
C ....... ... ...... .. ......... .. ...... ... I void x II void I ... II .. .... .... ... ......
I .........
... II ..
...
I ..
... II .........
...
I ..
... II ..
...
I .........
... II .........
...
Ques :137
Consider following array declaration in C int a1[ int a2[ int int float a5[3.5]
The valid declaration are
a1, a4
a1, a3 ,a4
a1, a4, a5
a1, a2, a3
C ... ...... ... ......... .. ...... ... int a1[ int a2[ int int float
a5[3.5] ..... ......... ..
a1, a4
a1, a3 ,a4
a1, a4, a5
a1, a2, a3
Ques :138
In context of command line arguments in C program, argv is
Array of characters
Array of character pointers
Pointer to character array
An integer variable
C ....... .. ..... .... ......... .. ....... ... argv ..
... .. ... ...
... .. ... ... ......
...... .. ... .. ...
.. ...... ..N....
Ques :139
The inbuilt C string function " strcmpi"

24/06/2016 College Lecturer Exam ComputerScienceI
41/44
Compare two string with case sensitivity
Compare two string without case sensitivity
Return longer string from two input string
Return one if two input strings are equal
C .. ........ ...... " strcmpi "
.. ..A.. .g ... .'..Õ....I .. ... ..... .... ..
.. ..A.. .g ... .'..Õ....I .. !... ..... .... ..
.. ..... ..A.. .. ... ..A.. .. N... .... ..
.. ..... ..A.. ..... .È .. 1 N... .... .È
Ques :140
Valid sequence of moves to solve tower of Hanoi problem with 3 disks if disks are required from stand A to
stand C using stand B




... .... .. .... .. .... ...... .. ...... .. .... .... ......... .. .... ... .... .... .... ......
.. ...... A .. ...... C .. ...... B .. ...... .. ........... .... ..




Ques :141
Choose a false statement for a static data member of class in
Initialized with zero and only once
Only one copy is created for all objects
Visible in entire program
Lifetime is entire program
.. .. ..... .. ........ .... ...... .. .... ... ..... ... ....:
.... .. ... ... .... .. .ó........ .... ..
... .... . .. ... .... .. .... .... ..
.... ..O.. ...... .... ..
.... ..O.. .... ........ .... ..
Ques :142
Choose an invalid file extension for one or another system
.cxx
.C
.cc
.out
...... ... .. ..... .. .. .... ..... .. ....... .. .... ... .... ......... ..... ..
.cxx
.C
.cc
.out

24/06/2016 College Lecturer Exam ComputerScienceI
42/44
Ques :143
Choose an invalid C statement
float a=b=20.45
x +10
Q 37 2.375
x k
.. .... C ......... ......
float a=b=20.45
x +10
Q 37 2.375
x k
Ques :144
In choose characteristics of a friend function of class which is not valid
F is within scope of class C
F is not invoked using an object of C with dot Operator
F has same meaning if it is declared in private or public part of C
F cannot access member variable of C directly, without object
... ..... C .. ..... ...... F .. ....... ...... .. .. ... ..... ..
F ... C .. .... ..
F .. C .. .... . ... ... ...... .. ... ..... ..I. .... .... ..
F .. .. ..... .... .. .Õ. ... C .. ...... .... ..... ... .. .... ...
... C .. ..... ..N.... .. !... .... . .... .I . ... ..I. .. ....
Ques :145
In Which of the following is not true about constructor of a class xyz
Name of C must be xyz
Return type of C is void
C should be declared in public section of class xyz
C is not inherited but derived class of xyz can call C
..., .. ..... xyz .. ........ C .. .... ... ..... ... .... ..... ..
C .. ... xyz .... .ó.... ..
C .. N... .... void .... ..
C .. ... xyz .. ..... .. .. .. .... .... .... ..Õ..
C ....N.. ..I. .... ..... xyz .g ....... ... C .. ... .. .... ..
Ques :146
Which of the following is not a pair of operator
new, delete

endl stew
this NULL
...... ... .. ...... .. ..... ..... ..
new, delete


24/06/2016 College Lecturer Exam ComputerScienceI
43/44
endl stew
this NULL
Ques :147
Choose false statement in context of
Virtual function must be member of some class
Virtual function can be static member of class
Virtual function of a class can be friend of another class
Virtual function are accessed using object pointers
.. ....... ... ..... ... ......
..... .. .. .... ... .. .... .... ..Õ..
..... .. .. ... .. ...Õ.. .... .. .... ..
.. ... .. ..... .. .. ... ... .. .. .... ..
..... .. .. .... . ...... .. ¨.... . ... .... .... ..
Ques :148
Let base class B is inherited in protected mode by class D. Visibility of private protected and public members
of class B in Class D is respectively
Private Protected ,Public
Private, Private, Protected
Non Inherited, Private, Protected
Non Inherited Protected, Protected
.... ..... D .. ... ..... B .. .......... ... ... ......... .... .. . ..... B .. ......., .......... ...
..... ....... .. ............ ..... D ... ..... ....
...... .... ... .....
...... ......, .... ...
....N.. ..I. ...., ......, .... ...
....N.. ..I. ...., .... ..., .... ...
Ques :149
Which of the following is not supported by
Automatic garbage Collection
Multiple Inheritance
Smart Pointer
Virtual Destructor
...... ... .. ..... ...... ..... ....
.....Õ.. ...N. ... ..
...I.. ....N..'.
.... ......
..... ...A ..
Ques :150
Choose true Statement in context of
If catch statement does not catch exception it generates error
catch . . . is not permitted
If try does not throw exception, it generates error

24/06/2016 College Lecturer Exam ComputerScienceI
44/44
One try block may have multiple catch blocks
.. ....... ... .... ... ....
.Õ. ... .....'. .. .. . ..... ... . ... .. .. ... ....
catch . . ..... ..I. ..
.Õ. A.. . ..... .. . ... .. .. ... ....
.. A.. .... .. .. ... .... .. .... ..



Other Question Papers

Subjects

  • account and business statistics
  • agri botany
  • agri chemistry
  • agricultural engineering
  • agriculture
  • agronomy
  • anaesthesiology
  • anatomy
  • athletics
  • automobile and mechanical engineering
  • biochemistry
  • biology
  • botany
  • chemical engineering
  • chemistry
  • chemsitry
  • civil engineering
  • cloth coloring and printing
  • commerce
  • community medicine
  • computer engineering
  • computer science
  • costume design and dress making
  • dentistry
  • drawing
  • drawing and painting
  • e.a.f.m
  • economics
  • electrical engineering
  • electronics and communication engineering
  • electronics engineering
  • english
  • english literature
  • entomology
  • farsi
  • football
  • forensic medicine
  • forest engineering
  • general english
  • general knowledge
  • general medicine
  • general studies
  • general surgery
  • geography
  • geology
  • gujarati
  • handball
  • hindi
  • hindi and english
  • hindi literature
  • history
  • home science
  • horticulture
  • hydrogeology
  • information technology
  • language
  • law
  • library science
  • mathematics
  • maths
  • mechanical engineering
  • microbiology
  • music
  • music instrumental
  • music vocal
  • obstetrician and gynaecology
  • ophthalmology
  • optional paper
  • orthopaedic
  • oto rhino laryngology
  • paediatrics
  • pathology
  • pharmacology
  • pharmacy
  • philosophy
  • physics
  • physiology
  • plant pathology
  • political science
  • psychology
  • public administration
  • public relation officer
  • punjabi
  • rajasthani
  • sanskrit
  • science
  • sindhi
  • social aspects of engineering
  • social science
  • sociology
  • statistics
  • textile design
  • urdu
  • volleyball
  • zoology