Escolar Documentos
Profissional Documentos
Cultura Documentos
2.
______________ allows that a section of a program is compiled only if the defined constant that is
specified as the parameter has been defined, independently of its value.
a.
b.
c.
d.
3.
'\0'
'!=0'
'\a'
'\!'
The arguments that are given during the function call are known as:a.
b.
c.
d.
5.
#if
#define
#typedef
#ifdef
4.
0 to 101
0 to 99
1 to 100
1 to 101
Actual parameters
Manipulators
Default parameters
Formal parameters
Page 1
4414070771526328
AWES PGT Computer Science Informatics-1
6.
a.
b.
c.
d.
7.
U
N
O
M
8.
-1,-2
-1,2
0,-2
0,2
Which of the following formulas can be used to generate random numbers in the range 0-10?
(including 0 and 10)
a.
b.
c.
d.
1 + rand(%) (10 - 1 + 1)
random(10)+1
rand()%10+1-1
1 + (10 - 1 + 1) % random()
Page 2
4414070771526328
AWES PGT Computer Science Informatics-1
9.
a.
b.
c.
d.
Infinite
7
5
6
10. A member function can be declared static if does not access _________ members.
a.
b.
c.
d.
Global
Private
Non static
Public
Which of the following function calls is illegal? (Assume m and n are declared as integers.)
a.
b.
c.
d.
The function accesses the argument's original value in the calling program
The function cannot access the argument's value
The function copies the value of argument to its own variable
Arguments reference is used in function definition
Page 3
4414070771526328
AWES PGT Computer Science Informatics-1
In C++ classes & structures may contain data members that are pointers to their own type
In C++, a pointer to a base class can point to objects of a derived class
The contents of two pointers that point to adjacent variables of type float differ by 4 bytes
A pointer to void cannot hold pointers to any data type
conio.h
stdlib.h
stdio.h
string.h
16. If function with same name exists in both the derived class and base class, the compiler decides the
function call as:a.
b.
c.
d.
The function in the base class is executed, if it is called by an object of the base class
The function in the base class is executed, if it is called by an object of the derived class
The function in the derived class is executed, if it is called by an object of the base class
None of the above
Delete
Undo
New
Release
18. Which of the following function is used to check invalid I/O operations and unrecoverable errors that
may occur during file input/output operations?
a.
b.
c.
d.
clear()
rdstate()
bad()
fail()
Page 4
4414070771526328
AWES PGT Computer Science Informatics-1
a.
b.
c.
d.
20.5
4
8
Error, I undefined
A long double
Private
Public
Depends upon memory model that you are using
21. Given an array A[0:20]. If the address of A[10]=2075 and address of A[15]=2090, then calculate the
address of A[6].
a.
b.
c.
d.
2055
2059
2049
2035
22. A linear list in which elements can be added or removed at either end but not in middle, is known
as:a.
b.
c.
d.
deque
priority queue
linked queue
queue
23. In C++ programming language, which of the following operators has the lowest precedence?
a.
b.
c.
d.
||
&&
,
! equals
Page 5
4414070771526328
AWES PGT Computer Science Informatics-1
(n+2)/2
n
log2
(n+1)/2
n(n+2)/2
Laplace
Karl Pearson
Gosset
Fisher
27. The way a particular application views the data from the database that application uses is a:a.
b.
c.
d.
Subschema
Schema
Relational model
Module
Over-defined
Referential constraint
Integrity constraint
External constraint
Subtotals
Columnar totals
Calculations
All of the above
Page 6
4414070771526328
AWES PGT Computer Science Informatics-1
30. Which of the following is the correct statement to create an object of Data class?
a.
b.
c.
d.
31. Which of the following commands permanently delete the record marked for deletion from the
database filed?
a.
b.
c.
d.
SEEK
PACK
SKIP
ZAP
Check
Index
Primary key
Alias name
35. The _________ allows for automatic deletion of child records when a parent record is deleted.
a.
b.
c.
d.
On erase cascade
On delete cascade
On demand delete
On priority delete
Page 7
4414070771526328
AWES PGT Computer Science Informatics-1
36. What was the name of network architecture that was developed by IBM?
a.
b.
c.
d.
XNS
Novell
DECNET
SNA
CCITT
AT and T
Hayes
BELL
Token bus
CSMA/CD
Token ring
Broad band
Full-duplex
Simplex
Half- duplex
All of the above
Ring
Mesh
Bus
Star
41. Frequency range at which the land coaxial cables are used, is:a.
b.
c.
d.
16
10 to 10 Hz
6
8
100 to 100 Hz
6
18
10 to 10 Hz
6
8
10 to 10 Hz
Page 8
4414070771526328
AWES PGT Computer Science Informatics-1
42. Which of the following program is used to copy files to and from another using timesharing system
over a single link?
a.
b.
c.
d.
UART
TFTP
VMTP
UUCP
44. Poll / select line discipline requires what to identify the packet recipient?
a.
b.
c.
d.
Address
Dedicated
Buffer
Timer
45. A packet switching network (highly loaded) has the following characteristics:-
At what time the last bit of the last packet will reach the receiver?
a.
b.
c.
d.
1038.7 sec
1024.5 sec
2048.5 sec
512.5 sec
XML
HTML 5.0
HTML 4.0
SGML
Page 9
4414070771526328
AWES PGT Computer Science Informatics-1
c. RECYCLE BIN
d. All of the above
22 characters
12 characters
18 characters
24 characters
THM extension
HTML extension
HMT extension
None of the above
51. _____ tag defines how to divide the window into frames.
a.
b.
c.
d.
<iframe>
<frameset>
<frame>
<frame src>
SMTP
SMIP
PPP
POP
53. What is the correct HTML code for adding a background color?
a.
b.
c.
d.
<body bgcolor=yellow>
<background> yellow </background>
< body color=yellow>
<body backcolor=yellow>
Page 10
4414070771526328
AWES PGT Computer Science Informatics-1
54. Which of the following objects can be used in expressions and scriplets in JSP without explicitly
declaring them?
a.
b.
c.
d.
55. Any part of the graphic that is not included in another hot zone is considered to be part of:a.
b.
c.
d.
Rect
Default
Point
Polygon
About a second
A few milliseconds
About a hundredth of a second
A few billionth of second
57. What logic function is produced by adding an inverter to the output of an AND gate?
a.
b.
c.
d.
XOR
OR
NAND
NOR
Multilevel
Multiple
Hierarchical
Single
AND gate
OR gate
NOR gate
XOR gate
Page 11
4414070771526328
AWES PGT Computer Science Informatics-1
60. A logic circuit which is used to change a BCD number into an equivalent decimal number is:a.
b.
c.
d.
Code converter
Decoder
Multiplexer
Encoder
61. The expression for sum of A, B in the half adder is given by:a.
b.
c.
d.
A eXclusive B
AB
A+B
None of the above
62. In 2's compliment representation, a certain negative number -N is 1011. The representation of +N
is:a.
b.
c.
d.
0011
0110
0100
0101
0.4375
0.0625
0.4222
0.375
64. A decimal number has 30 digits. Approximately how many digits would the binary representation
have?
a.
b.
c.
d.
60
120
30
90
-0.1101
0.0110
0.1010
1.0010
Page 12
4414070771526328
AWES PGT Computer Science Informatics-1
66. A system program that set-up an executable program in main memory ready for execution is:a.
b.
c.
d.
Linker
Text editor
Assembler
Loader
SLR
Canonical LR
Operator-precedence
LALR
Allocation
Loading
Linking
Reallocation
Allocation
Loading
Linking
Reallocation
70. At a particular time, the value of a counting semaphore is 10. It will become 7 after:a.
b.
c.
d.
3 V operations
5 V operations and 2 P operations
13 P operations and 10 V operations
3 P operations
71. A system has 3 processors sharing 4 resources. If each process needs a maximum of 2 units, then:a.
b.
c.
d.
Page 13
4414070771526328
AWES PGT Computer Science Informatics-1
Branches off to the interrupt service routine after completion of the current instruction
Halts it for a predetermined time
Branches off to the interrupt service routine immediately
Hands over control of address bus and data bus to the interrupting device
8
256
132
16
76. In MS-DOS, relocatable object files and load modules have extensions:a.
b.
c.
d.
Page 14
4414070771526328
AWES PGT Computer Science Informatics-1
78. In a modem using dibit phase, encoding has the bit rate:a.
b.
c.
d.
80. A class implements an interface but does not override all the methods of interface then _____.
a.
b.
c.
d.
81. ____________ mode is used whenever either end of a security association is gateway.
a.
b.
c.
d.
Encapsulating
Transport
Tunnel
Gateway
83. ____________ is used to carry traffic of one protocol over network that does not support that
protocol directly.
a.
b.
c.
d.
Transferring
Switching
Tunneling
Trafficking
Page 15
4414070771526328
AWES PGT Computer Science Informatics-1
84. Which collection class associates values with keys and orders the keys according to their natural
order?
a.
b.
c.
d.
java.util.HashSet
java.util.SortedSet
java.util.LinkedList
java.util.TreeMap
85. ___________ are used in denial of service attacks, typically against targeted web sites.
a.
b.
c.
d.
Virus
Worm
Trojan horse
Zombie
86. The ______________ method is used when we simply want to retrieve data from a table without
modifying the contents of the table.
a.
b.
c.
d.
execute()
queryexecute()
query()
executeQuery()
87. To execute SQL statements, you need to instantiate a _______ object using the _______ object.
a.
b.
c.
d.
88. Suppose a class has public visibility. In this class we define a protected method. Which of the
following statements is correct?
a. In a class, you can not declare methods with a lower visibility than the visibility of the class in
which it is defined.
b. From within protected methods you do not have access to public methods.
c. This method is accessible from within the class itself and from within all classes defined in the
same package as the class itself
d. This method is only accessible from inside the class itself and from inside all subclasses.
Page 16
4414070771526328
AWES PGT Computer Science Informatics-1
d. DEFAULAT_PRIORITY
06 Feedback
91. How was the overall experience while giving the test?
a.
b.
c.
d.
Excellent
Very Good
Good
Average
Page 17