PAPER II
COMPUTER SCIENCE AND APPLICATIONS
Signature of the Invigilator
1.
Subject Code 10
ROLL No.
No. of Questions : 50
6. All entries in the common OMR response sheet for Papers I and II are to be recorded in the original copy
only.
7. Use only Blue/Black Ball point pen.
8. Rough Work is to be done on the blank pages provided at the end of this booklet.
9. If you write your Name, Roll Number, Phone Number or put any mark on any part of the OMR Sheet, except
in the spaces allotted for the relevant entries, which may disclose your identity, or use abusive language or
employ any other unfair means, you will render yourself liable to disqualification.
10. You have to return the Original OMR Sheet to the invigilators at the end of the examination compulsorily and
must not carry it with you outside the Examination Hall. You are, however, allowed to carry the test
booklet and the duplicate copy of OMR Sheet on conclusion of examination.
11. Use of any calculator, mobile phone or log table etc. is strictly prohibited.
12. There is no negative marking.
CLA-48875
10-13
1
{}
Paper-II
4.
4
The probability that A speaks truth is , while this
5
3
. The probability that they
4
contradict each other when asked to speak on a fact
is :
probability for B is
(A)
n
di = P , where di is the degree of vertex i (number
i=1
of edges incident on vertex i). Then P is equal to :
(A) 2n
(B) 2e
3
20
(C) ne
(D) 2n 1
(B)
1
5
5.
7
(C)
20
(D)
2.
DFA , then
4
5
(C)
n +1
2
can be recognized in
polynomial time
C ( n + 1)
2
(D) n
3.
NDFA, then
6.
CLA-48875
2
{}
7.
If A = {1,2,3,4,5} then the number of proper subsets 13. Data + Operations is a characterization of :
(A) Functional decomposition
of A is :
(B) Operator overloading
(A) 120
(C) (Overloaded) constructors
(B) 30
(D) (Abstract) data type
(C) 31
(D) 32
14. B is a base class of A implies :
(A) A is a superclass of B
8. Simplify the Boolean function :
(B) A is a derived class of B
(C) B is a derived class of A
(A) A
(D) A and B are inherited from a common class
(B) A + B
(C) AB + BC
15. The process of going from a set of source files to a
running program has several steps. Place the following
(D) A + B + C
in the correct order from the first step executed to the
last :
9. Which of the following is a tautology ?
I. Linking
(A) P v Q
II. Compiling
(B) P Q
III. Execution
(C) P v ~ P
IV. Processing #include directives
(D) P ~ P
Codes :
(A) II IV I
III
10. Based on current technology, ______ is the fastest
(B) II III I
IV
logic family.
(C) IV II I
III
TTL
B( A + C) + A(A)
B+ B
C+C
(D) IV I
II III
(B) MOS
16. What value is displayed by this C++ program
(C) ECL
fragment ?
(D) CMOS
int paramtest (int a, int & b) {
b = a +b;
11. The decimal equivalent of binary number 0.0111 is :
a = b;
(A) 4.375
return a;
(B) 0.4375
}
(C) 0.5375
int main ( ) {
(D) 0.4375
int x = 1;
int y = 2;
12. Which of the following is a base-10 interpretation of
int z = paramtest(x, y);
the 8-bit binary value 11010011 in twos complement
cout << x + y + z;
....
form ?
(A) 4
(A) 83
(B) 5
(B) 211
(C) 6
(C) 84
(D) 7
(D) 45
CLA-48875
3
{}
Paper-II
4
{}
Paper-II
positions ?
the keys 37, 38, 72, 48, 98 and 11 into the table
is :
11 ?
(A) 255.255.0.0
(A) 3
(B) 255.255.248.0
(B) 4
(C) 186.220.71.255
(C) 5
(D) 186.220.8.0
(D) 6
30. The term duplex refers to the ability of the data
27. Suppose an integer occupies two bytes of memory
(A) 407
(B) 207
(C) 365
(D) 702
CLA-48875
5
{}
Paper-II
is said to be :
(D) Microwaves
(B) LR(1)
(C) LL(1)
(D) Ambiguous
(A) FTP
(B) SNMP
(C) SMTP
(D) RPC
37. Which of the following IS TRUE regarding linkingloader and linkage editor ?
network
I.
network
II.
network
at any moment
Codes :
generation
CLA-48875
6
{}
Paper-II
(D) ls | wc -c
because :
(A) Software suffers from exposure to hostile
environments
(B) Defects are more likely to arise after software
has been used often over a period of time
(C) Multiple change requests introduce errors in
component interactions
(D) Software spare parts become harder to order
7
{}
Paper-II
46. Software agent is a piece of software that performs a 49. Suppose that a program runs in 100 seconds on a
computer, with multiple operations responsible for 80
given task using information gleaned from its
environment to act in a suitable manner so as to
software agent ?
(A) Proactive
(B) Modular
(C) Adaptive
(D) Personalised
50. The first four bytes of a binary file are CA, FE, BA,
BE (in Hexadecimal, of course !). What type of a file
is it ?
2012 ?
CLA-48875
8
{}
Paper-II
ROUGH WORK
CLA-48875
9
{}
Paper-II
ROUGH WORK
CLA-48875
10
{}
Paper-II
ROUGH WORK
CLA-48875
11
{}
1540