Escolar Documentos
Profissional Documentos
Cultura Documentos
4su
cce
ss.c
om
IT OFFICER MCQs
1.
5) None of these
2.
The XYZ bank Gujarat branch has all Cisco routers connected in the network. The network
administrator Robert had replaced one of the routers with a nonCisco router. He then
configured PPP encapsulation on a Cisco router to enable communication between them.
Now, he wants to set HDLC back as the default protocol on the Cisco router. Which of the
following combinations will he use?
I. Interface serial [module_0/1] port_l and encapsulation hdlc.
II. Interface type [slot_2] port_l and encapsulation PPP.
III. Interface type [slot_2] port_l and encapsulation ppp and ppp pap sent-username jack
password system
1) III
2) II
3) I
4) I and II
5) None of these
3.
FDDI is
1) Ring Network
4) Bus based Network
4.
5.
2) Star Network
5) None of these
3) Mesh Network
Time sharing
1) Round Robin scheduling
3) First come First served
5) None of these
2) Priority scheduling
4) Non preemptive scheduling
6.
Which of the following communications lines is best suited to interactive processing applications?
1) narrow band channel
2) simplex lines
3) full duplex lines
4) mixed band channels
5) None of these
7.
Which of the logic family has the lowest power delay product
1) ECL
2) TTL
3) IIL
4) MOS
8.
5) None of these
3) 32 32 32 32 32
bsc
4su
cce
ss.c
om
9.
10. Applet
1) It is an application that run inside a rectangular region on the web page
2) It can display animation, sound, games and general utilities
3) Its application is calculator and search engine
4) all of the above
5) None of these
11.
5) None of these
12. What error are you likely to get when you run the following program?
main ( )
{
struct emp;
{
char name [20];
float sal;
}
struct emp e[10];
int i;
for(i = 0; i < =9; i++)
scanf(%s%f,e[i].name & e[i].sal));
}
1) Suspicious pointer conversion
2) floating Point formats not linked
3) Cannot use scanf () structures
4) Strings cannot be nested inside structures
5) None of these
13. The Bankers algorithm is used
1) To prevent deadlock in operating systems
2) To detect deadlock in operating systems
3) To rectify a deadlock state
4) All of the above
5) None of these
bsc
4su
cce
ss.c
om
16. Which of the following is not an operating system call for process management?
1) CREATE
2) DELETE
3) FORK/JOIN
4) PCB
5) None of these
17. ER diagram is example of which data Model ?
1) Generic Data Model
2) Semantic Data Model
3) Relational Data Model
4) Special Data Model
5) None of these
18. An array can be passed in a function in C language through1) Call by value only
2) Call by reference only
3) Both call by value and call by reference
4) Tuple
5) None of these
19. What is the output of the following C program?
main ()
{
extern, int a;
printf(\n%d,a)
}
int a = 20
1) 0
2) 20
3) Error
5) None of these
21. The range of the numbers that can be stored in 8 bits, if negative number are stored in 2s
complement form, is
1) 128 to + 128
2) 128 to 127
3) 127 to +128
4) 127 to + 127
5) None of these
22. Choose the most appropriate definition of plane graph
1) A graph drawn in a plane in such a way that any pair of edges meet only at their end vertices
2) A graph drawn in a plane in such a way that if the vertex set of graph can be partitioned into
two non-empty disjoint subsets X and Y in such a way that each edge of G has one end in
X and one end in Y
3) A simple graph which is isomorphic to a Hamiltonian graph
4) All of the above
5) None of these
23. Boolean algebra
1) An algebraic system defined by Boolean lattice is known as a boolean algebra
2) For boolean lagebra (x + y)= x. y
3) For boolean algebra (x . y)= x + y
4) All of the above
5) None of these
............ is a function that is expanded in line when it is invoked. That is, the compiler replaces
the function call with the corresponding function code.
1) Memory allocation function
2) Member function
3) Inline function
4) Default function
5) None of these
bsc
4su
cce
ss.c
om
24
25. A demand paging system with page table held in registers, takes 5 ms to service a page fault,
if empty page is available or if the page is to replaced is not dirty. It takes 15 ms if the replaced
page is dirty. Memory access time is 1,s. Assume we want an effective access time 23,s
and that the page to be replaced is dirty 60% of the time. What is the approximate page fault
rate to meet this access time requirement?
1) 0.1%
2) 1.0%
3) 2.5%
4) 0.01%
5) None of these
26. Packets are related to which layer
1) Data link layer
2) Physical layer
4) Presentation layer
5) None of these
3) Network layer
29. Rohan has an e-card that he uses to access different parts of his companys R&D offices.
What type of card is he using?
1) Credit card
2) Purchase card
3) Smart card
4) Contact card
5) None of these
30. Which of the following might be output as result of using a CASE tool?
1) Programmable Code
2) Flowcharts and data flow diagrams
3) Prototypes and Cost/benefit analysis
4) All of the above
5) None of these
31. Which TTL sub-family has maximum speed
1) Standard TTL
2) Schottky-clamped TTL
4) Low power TTL
5) None of these
bsc
4su
cce
ss.c
om
3) Classification
36. The correct hierarchical relationship among context-free, right-linear, and context-sensitive
language is given by
1) context-free < right-linear < context-sensitive
2) context-free < context-sensitive < right-linear
3) context-sensitive < right-linear < context-free
4) right-linear < context free < context-sensitive
5) None of these
37. Which of the following fields in a student file can be used as a Primary Key?
1) Class
2) Social Security Number
3) GPA
4) Major
5) None of these
38. The ......... device provides a digital interface for connecting routers and digital circuits ?
1) Channel service unit
2) Modem
3) Adapter
4) Router
5) None of these
39. Handshaking is
1) synchronous type
4) All of these
2) asynchronous
5) None of these
3) sequential
3) repeated concatenation
41. The process of macro-expanion is completely segregated from the process of assembly program.
The translator which performs macro-expansions is called
1) Macro Interpreter
2) Macro Pre-Processor
3) Macro Table
4) All of the above
5) None of these
bsc
4su
cce
ss.c
om
3) XRA
3) 3 2 2
4) OVI
5) None of these
4) 4 bit
5) None of these
47. Let A = {l, 2, 3}, B = {a, b} and R= {(1, a), (1, b), (3, a), (2, b)} be a relation from A to B.
The inverse relation R is
1) R1 = {(a, l), (b, l), (a, 3), (b, 2)]}
2) R1 = {(2, b), (3, a), (l, b), (l, a)}
3) R1 = {(b, 2), (a, 3), (b, l), (a, l)}
4) All of the above
5) None of these
48. Yacc source program has 3 parts. Which of the following are Yacc source program parts?
1) Terminal symbol, non-terminal symbol, production rule
2) Declaration, translation rules, user routines
3) Declaration, Translation rules, C programs
4) All of the above
5) None of these
49. A loading scheme in which loading and linking of external and references are postponed until
execution time
1) Direct linking loader
2) Dynamic loading
3) Dynamic linking
4) Relocating loader
5) None of these
50. Back tracking problem is seen in
1) predirective parser
2) LR parsar
3) recursive-descent parsar
5) None of these
bsc
4su
cce
ss.c
om
52. Which of the following is the correct simplification of Boolean expression A`BC + AC?
1) BC+AC
2) BC+C
3) BC
4) A`C
5) None of these
53. Scope of macro definition
1) cannot be beyond the file in which it is defined
2) may be part of a file
3) is in the entire program
4) a, b, d
5) None of these
54. Cisco switches supports two different trunking protocols ................... and ................. both
providing basic trunking.
1) VLAN1 and VLAN2
2) Cisco 2950 and Cisco 1900
3) ISL and 802.1Q
4) Client and Transparent
5) None of these
55. Which of the following language differ the case of alphabets?
1) FORTRAN
2) BASIC
4) All of the above
5) All of the above
3) C
3) Ken Thompson
3) Credit cards
5) None of these
bsc
4su
cce
ss.c
om
4).
List-II
(a) Unipolar
(b) PMOS connected in a complementary fashion
(c) 5 volts
(d) High Speed
(v)
d
c
b
b
5) None of these
3) difference engine
3) network layer
4) 2n1
5) None of these
68. Which of the following do you think is used to separate the base classes in a base class list?
1) Comma (,)
2) Colon (:)
3) Semi-colon (;)
4) Tilde (~)
5) None of these
69. Spatial locality refers to the problem that once a location is referenced
1) a nearby location will be referenced soon
2) it will not be referenced again.
3) it will be referenced again
4) All of the above
5) None of these
70. What is the minimum number of wires needed to send data over a serial communication link
layer ?
1) 1
2) 2
3) 4
4) 6
5) 7
bsc
4su
cce
ss.c
om
3) SAVEPOINT
72. When two numbers of n digits each are added and the sum occupies n + 1 digits, the situation
is called
1) Overflow
2) Underflow
3) Normal condition
4) All of the above
5) None of these
73. An assembler is a
1) Program
2) Person who assembles the parts
3) Symbol
4) language
5) None of these
5) None of these
76. Whick of the following statements are true about doubly linked list?
(i) It may be either linear or circular
(ii) it must contain a header node
(iii) it will occupy same memory space as that of linear linked list, both having same number of
nodes.
1) only (i)
2) (ii) and (iii)
3) (i), (ii) and (iii)
4) (i) and (iii)
5) None of these
77. Which one is false
1) shift registers operate in serial fashion one bit at a time
2) parallel processing techniques are economically feasible
3) register with parallel load operate with all the bits of the word simultaneously
4) all of the above are true
5) None of these
78
.......... uses the Diffusing Update Algorithm to update the routing table.
1) RIP
2) OSPF
3) IGRP
4) EIGR
5) None of these
79. A computer system having 64 K memory will have its last address as
1) 65536 2) 64000
3) 65535
4) 65530
5) none of the above
Downloaded From: http://bsc4success.com
3) both 1) and 2)
bsc
4su
cce
ss.c
om
3) First bound
83. Which of the following file name extension suggests that the file is Backup copy of an other
file?
1) TXT
2) COM
3) BAS
4) BAK
5) None of these
84. McCall proposed which of the following quality factors?
1) Correctness, Reliability, Usability, Integrity, Efficiency
2) Maintainability, Flexibility, Testability
3) Portability, Reusability, Interoperability
4) All of the above
5) None of these
85. A communications device that combines transmissions from several I/O devices into one
line is a:
1) concentrator
2) modifier
3) multiplexer 4) full-duplex line
5) None of these
86. Which of the following commands can be used to get information about all users who are
currently logged into the system?
1) which
2) who
3) who am i
4) All of the above 5) None of these
87. A pilot can fly three types of planes and a plane can be piloted by any qualified pilot. The pilotplane type relationship is
1) N : 3
2) 3 : N
3) 1 : 3
4) 3 : 1
5) None of these
88. DES
1) Data Encryption standard was widely adopted by the industry for use in security products
2) It is no longer secure in its original form, but in a modified form it is still useful
3) Plain text is encrypted in blocks of 64 bits
4) All of the above
5) None of these
89. How many transistor is LSI
1) more than 100
4) more than 10
bsc
4su
cce
ss.c
om
List-II
(a) Strobe Control Method
(b) Booth Algorithm
(c) Flip-flop
(d) Cache
(i) (ii)
1) a
b
2) d
c
3) c
a
4) c
d
5) None of these
(iii)
c
b
d
a
(iv)
d
a
b
b
91. At the business or enterprise level, the techniques associated with object oriented Analysis can
be coupled with an information engineering approach. This technique is often called
1) Requirement Analysis
2) Domain Analysis
3) Entity Analysis
4) Relationship Analysis
5) None of these
92. Which is the correct statement regarding debit/smart card ?
1) Banks are generally extending this facility to saving account with liquidity features.
2) These cards facility are not extended to cash and loan account.
3) Both 1) and 2).
4) Debit card can be issued to PMRY beneficiaries.
5) None of the above.
93. The network administrator Paul requires configuring a primary rate interface for the XYZ bank
Hyderabad branch. He needs to specify the switch type for ISDN while configuring PRI.
Which command will he use?
1) isdn switch-type basic-ni
2) isdn switch basic-ni
3) isdn switch-type pri-4ess
4) isdn switch pri-4ess
5) None of these
94. Which of the following is not a type of graph?
1) Euler
2) Hamiltonian
3) Tree
4) Path
5) None of these
4) LVS
5 ) None of these
3) VSL
bsc
4su
cce
ss.c
om
else
printf (a is not zero);
1) a is zero
2) prints nothing
3) a is not zero
4) Garbage value
5) None of these
97. A system program that separately compiles modules of a program into a form suitable for
execution is
1) Assembler
2) Linking loader
3) Cross compiler
4) Load and go
5) None of these
98. Which of the following is not characteristic of a relational database model?
1) Tables
2) treelike structure
3) complex logical relationship
4) records
5) None of these
99. concept of developing a compiler for a language by using subsets of the same language
1) Bootstrap 2) Lex
3) Yacc
4) Analyzer
5) None of these
100. Which of the following software tool is a parser generator?
1) Lex
2) Yacc
3) Both 1 and 2 4) Either 1) or 2) 5) None of these
101. You are writing classes that will bypass the operating system which directly access several
system resources, such as memory and disk drives. Which language is probably the best?
1) C++
2) Cobol
3) Java
4) Small talk
5) None of these
102. Which of the following performs modulation and demodulation?
1) Fiber optic
2) satellite
4) modem
5) none of the above
3) coaxial cable
3) attenuation
3) OR Gate
bsc
4su
cce
ss.c
om
109. The ............ command enables you to switch from the user mode to privileged mode.
1) enable
2) disable
3) config
4) switch
5) None of these
110. Railway reservation is example of
1) On line system
2) Off line system
4) time sharing
5) None of these
3) batch processing
111. A relation schema is said to be in ............ form if the values in the domain of each attribute of
the relation are atomic.
1) Unnormalized
2) First Normal
3) Boyce Codd
4) All of these
5) None of these
112. Which kind of lock includes a keypad that can be used to control access into areas ?
1) Cipher
2) Warded
3) Device
4) Tumbler
5) Typelock
113. Which gate is known as Universal gate?
1) NOT gate
2) AND gate
4) XOR gate
5) None of these
3) NAND gate
2) Kernel approach
5) None of these
3) Virtual machine
117. How many NAND gates are needed to perform the logic function X.Y?
Downloaded From: http://bsc4success.com
1) 1
2) 2
3) 3
4) 4
5) None of these
bsc
4su
cce
ss.c
om
122. The............. command enables you to change the name for the router.
1) hostname
2) name
3) banner
4) router
5) None of these
5) None of these
124. When ray passes through fused silica to air, the ray is refracted, then light trapped by
1) refraction
2) reflection
3) total internal reflection
4) All of the above
5) None of these
125. Which one is input device
1) DVD
2) Trackball
3) Digitizers
3) a business form
4) Network
5) None of these
bsc
4su
cce
ss.c
om
128. Which of the following consists of an array of gates which can be used to patch an error in a
ROM or alter the meaning of instruction
1) RAM
2) EAPROM
3) PLA
4) PSW
5) None of these
129. The ........ comand enables you to set encrypted passwords for the privileged mode.
1) line console
2) line vty
3) enable password
4) enable secret
5) None of these
130. Actions are performed in an object oriented systems by sending ....... to an object.
1) Statements 2) Messages
3) Control
4) All of these
5) None of these
131. In K-map, the adjacent squares represent minterms that differ by
1) One variable
2) Two variable
3) Three variable
4) All of these
5) None of these
132. Data transfer rate of a double density floppy disk is about
1) 5K bits/sec
2) 50K bits/sec
4) 5000K bits/sec
5) None of these
3) 500K bits/sec
133. How many bits are required to encode all 26 letters, 10 symbols and 10 numerals
1) 5
2) 6
3) 7
4) 46
5) None of these
134. Which of the following operator is used to access the value of structure pointer?
1)
2) &
3) *
4) .
5) None of these
135. If initialization is a part of declaration of a structure, then the storage class can be
1) automatic
2) register
3) static
4) anything
5) None of these
136. The ................ model remains operative until the software is retired.
1) Waterfall
2) Incremental
3) Spiral
4) All of these
5) None of these
137. When a cracker attempts to misuse or steal data from a system, it is called
1) Stealing
2) Intrusion
3) Virus
4) All of these
5) None of these
138. Which of the following does not allow multiple users or devices to share one communication
line?
1) double-plexer 2) multiplexer 3) concentrator 4) controller
5) None of these
139. One can display all columns of data in a table by following the SELECT keyword with
1) +
2) *
3)
4) ?
5) None of these
140. Raid configuration of disks are used to provide
1) Fault tolerance
2) High speed
4) All of the above
5) None of these
141. 8085 memory is
1) 1 M byte
2) 64 Kbte
3) 64 K bit
4) 64 byte
5) None of these
bsc
4su
cce
ss.c
om
2) Code transparent
5) None of these
3) Code dependent
144. What is the name of the printer which print all the As in a line before all the Bs?
1) Thermal printer
2) Electrostatic printer
3) Line printer
4) Ink-jet printer
5) None of these
145. Fiber optics frequency have
1) 105 to 107
4) 1014 to 1015
2) 106 to 109
5) None of these
3) 109 to 1011
3) encoder
147. Seeta has an e-card that she uses to purchase office supplies for the company she works for.
What type of smart card is she using?
1) Credit card
2) Purchase card
3) Smart card
4) Contact card
5) None of these
148. Stack is sometimes called a
1) Push down list
4) Pop up array
2) Pushdown array
5) None of these
149. Periodically adding, changing and delecting file records is called file
1) Updating
2) Upgrading
3) Restructuring
4) History file
5) None of these
150. What is hamming distance code for correcting?
1) 2d + l
2) d + 1
3) 2d + 3
4) d + 3
5) None of these
4) 224.0.0.0
5) None of these
3) 255.0.0.1
152. The relational model includes two general integrity rules. Integrity rule 1 is concerned with
......... and integrity rule 2 is concerned with .........
1) Primary key, Foreign key
2) Composite key, Primary key
3) Foreign key, Primary key
4) Transaction key, Foreign key
5) None of these
bsc
4su
cce
ss.c
om
5) None of these
154. In comparison with static RAM memory, the dynamic RAM memory has
1) lower bit density and higher power consumption
2) higher bit density and higher power consumption
3) lower bit density and lower power consumption
4) higher bit density and lower power consumption
5) None of these
155. V.24
1) It is similar to multiplexer
2) It is similar to Modem
3) It is similar to Demultiplexer
4) All of the above
5) None of these
156. The ABC bank needs to decide on a routing protocol for its large enterprise networks. The
bank has a mixed vendor environment and may need to replace any of its existing routers. It
needs to follow the bank policy and requires an open standard routing protocol. Which routing
protocol will you implement for the ABC bank
1) OSPF
2) RIP
3) IGRP
4) EIGRP
5) None of these
157. Which of the following operators can be overloaded in C++?
1) Scope resolution operator
2) Size of operator
3) Conditional operator
4) Arithmetic operator
5) None of these
158. A multiplexer with a 4 bit data select input is a
1) 4 : 1 multiplexer
2) 2 : 1 multiplexer
4) 8 : 1 multiplexer
5) None of these
3) 16 : 1 multiplexer
159. Which of the following is an advantage to using fibre optics data transmission ?
1) resistance to data theft
2) fast data transmission rate
3) low noise level
4) all of these
5) None of these
5) None of these
161. Which of the following is different from the group?
1) Private
2) Protected
3) Public
4) Friend
5) None of these
bsc
4su
cce
ss.c
om
164. The ....... metric specifies the amount of data that can travel over the network segment.
1) Hops
2) Load
3) Delay
4) Bandwidth
5) None of these
165. Length of the walk of a graph is
1) The number of vertices in walk W
2) The number of edges in walk W
3) Total number of edges in a graph
4) Total number of vertices in a graph
5) None of these
166. Each item in a linked list is called
1) Element
2) Information
3) Data
4) Node
5) None of these
167. ............. is the situation in which a process is waiting on another process, which is also waiting
on another process, which is waiting on the first process. None of the processes involved in
this circular wait are making progress.
1) Deadlock
2) Starvation 3) Dormant
4) All of the above 5)None of these
168. Consider a machine with 64 MB physical memory and a 32 bit virtual address space. If the
page size is 4 KB, what is the approximate size of the page table?
1) 16 MB
2) 8 MB
3) 2 MB
4) 24 MB
5) None of these
169. The access time of magnetic bubble memory is approximately
1) 30 ns
2) 30 ms
3) 30 ms
4) 0.3 sec
5) None of these
170. Which of the following gates would output 0 if inputs are equal.
1) NAND
2) NOR
3) EX-OR
4) OR
5) None of these
5) None of these
bsc
4su
cce
ss.c
om
3) hard disk
3) Weighted tree
3) 5 : 1 relationship
4) Bandwidth
5) None of these
3) S-R flip-flop
179. The XYZ bank has all Cisco routers connected in the network. A host connects to a router
through telnet connection. Which command will the administrator Robert uses to print the
messages or the console part:
1) terminal monitor
2) terminal print
3) console print
4) console monitor
5) None of these
180. In C++ a function contained in a class is called
1) Member function
2) an operator
4) a method
5) None of these
3) a class function
181. In data transmission, the bit coding scheme used to represent a byte is typically
1) EBCDIC
2) ASCII
3) SNA
4) Hexadecimal
5) None of these
182. An unnormalized relation contains values
1) Atomic
2) Non-atomic
4) All of the above
5) None of these
3) Classified
bsc
4su
cce
ss.c
om
3) Z
4) P
5) None of these
185. When any positive integer is divided by zero, then error be catch by at
1) Compiler time 2) Intrepreter 3) Debugging
4) Run time
5) None of these
186. What is the min number of two input NAND gates used to perform the function of two input
OR gate?
1) 1
2) 2
3) 3
4) 4
5) None of these
187. An audit trail
1) is used to make back-up copies
2) is the recorded history of operations performed on a file
3) can be used to restore lost information
4) none of the above
5) None of these
188. Gopher is
1) Gopher was text only global set of linked menus and files
2) Gopher is a browser
3) Both 1 and 2
4) Either 1) or 2)
5) None of these
189. The sum of weights in self complement BCD code is
1) 8
2) 9
3) 10
4) 16
5) None of these
4) 123
5) None of these
3) 125
191. Consider two regular languages L1= (a + b) *a and L2 = b(a + b)*. The intersection of L1 and
L2 is given by
1) (a+b)*ab
2) ab(a+b)*
3) a(a+b)*b
4) b(a+b)*a
5) None of these
192. Which of the following is not functionally a complete set?
1) AND, OR
2) NOR
4) AND, OR, NOT
5) None of these
3) NAND
193. Thedesign goal refers to the ability of the routers to agree on optimal routes.
1) Robustness
2) Flexibility
3) Convergence
4) Optimal Route
5) None of these
194. Which of the following TCP/ IP protocol is used for remote terminal connection services?
1) TELNET
2) FTP
3) RARP
4) UDP
5) None of these
Downloaded From: http://bsc4success.com
bsc
4su
cce
ss.c
om
195. Which of the following TCP/ IP protocol is used for transferring electronic mail messages from
one machine to another?
1) FTP
2) SNMP
3) SMTP
4) RPC
5) None of these
196. Software design is
1) Process 2) Model
3) Both 1) and 2)
4) Either 1) or 2)
5) None of these
4) open
5) None of these
199 .................. time is expressed as turnaround time less actual execution time.
1) Response 2) Waiting
3) CPU
4) Process
5) None of these
200. Port number of SMTP is
1) 25
2) 80
3) 123
4) 243
5) None of these
ANSWERS
1. 3
6. 3
11. 4
16. 4
21. 2
26. 3
31. 2
36. 4
41. 2
46. 2
51. 3
56. 4
61. 3
66. 1
71. 2
76. 1
81. 4
86. 2
91. 2
2. 2
7. 3
12. 2
17. 2
22. 1
27. 2
32. 4
37. 2
42. 4
47. 1
52. 1
57. 3
62. 3
67. 2
72. 1
77. 4
82. 2
87. 1
92. 3
3. 1
8. 1
13. 1
18. 3
23. 4
28. 1
33. 2
38. 1
43. 4
48. 3
53. 4
58. 3
63. 1
68. 1
73. 1
78. 4
83. 4
88. 4
93. 3
4. 1
9. 3
14. 2
19. 4
24. 3
29. 3
34. 3
39. 2
44. 4
49. 3
54. 3
59. 1
64. 2
69. 1
74. 2
79. 3
84. 4
89. 2
94. 4
5. 2
10. 4
15. 1
20. 4
25. 4
30. 4
35. 2
40. 4
45. 3
50. 3
55. 3
60. 1
65. 1
70. 2
75. 2
80. 3
85. 3
90. 4
95. 2
97. 2
102. 4
107. 1
112. 1
117. 2
122. 1
127. 3
132. 3
137. 2
142. 2
147. 2
152. 1
157. 4
162. 1
167. 1
172. 1
177. 2
182. 2
187. 2
192. 1
197. 4
98. 2
103. 2
108. 3
113. 3
118. 4
123. 4
128. 3
133. 2
138. 1
143. 1
148. 1
153. 2
158. 3
163. 1
168. 3
173. 3
178. 2
183. 1
188. 3
193. 3
198. 1
99. 1
104. 1
109. 1
114. 4
119. 1
124. 3
129. 4
134. 1
139. 2
144. 3
149. 1
154. 4
159. 4
164. 4
169. 3
174. 4
179. 1
184. 1
189. 2
194. 1
199. 2
100. 2
105. 1
110. 1
115. 2
120. 3
125. 4
130. 2
135. 3
140. 1
145. 2
150. 1
155. 2
160. 3
165. 2
170. 3
175. 2
180. 1
185. 4
190. 2
195. 3
200. 1
bsc
4su
cce
ss.c
om
96. 3
101. 2
106. 4
111. 2
116. 3
121. 2
126. 4
131. 1
136. 3
141. 2
146. 4
151. 1
156. 1
161. 4
166. 4
171. 1
176. 2
181. 2
186. 3
191. 4
196. 3