Você está na página 1de 13

Post Graduate School

Indian Agricultural Research Institute, New Delhi


Examination for Admission to Ph.D. Programme 2013-2014

Discipline : Computer Application


Discipline Code : 09 Roll No.

Please Note:

(i) This question paper contains 13 pages. Please check whether all the pages are
printed in this set. Report discrepancy, if any, immediately to the invigilator.

(ii) There shall be NEGATIVE marking for WRONG answers in the Multiple
Choice type questions (No. 1 to 130) which carry one mark each. For every
wrong answer 0.25 mark will be deducted.

5. The most important sucking pests of cotton


PART – I (General Agriculture) and rice are respectively
a) Nilaparvata lugens and Aphis gossypii
Multiple choice questions (No. 1 to 30). b) Aphis gossypii and Thrips oryzae
Choose the correct answer (a, b, c or d) c) Amrasca biguttula biguttula and Scirtothrips
and enter your choice in the circle (by dorsalis
shading with a pencil) on the OMR - d) Thrips gossypii and Orseolia oryzae
answer sheet as per the instructions
6. Which of the following microorganism causes
given on the answer sheet.
fatal poisoning in canned fruits and
vegetables?
1. Who is the present Chairman of Protection of a) Aspergillus flavus
Plant Varieties and Farmers' Right Authority b) Penicillium digitatum
(PPV&FRA)? c) Clostridium botulinum
a) Dr. R.R. Hanchinal d) Rhizoctonia solani
b) Dr. P.L. Gautam
c) Dr. S. Nagarajan 7. The cause of the great Bengal Famine was
d) Dr. Swapan K. Datta a) Blast of rice
b) Brown spot of rice
2. Which among the following is another name c) Rust of wheat
for vitamin B12? d) Karnal bunt of wheat
a) Niacin
b) Pyridoxal phosphate 8. Actinomycetes belong to
c) Cobalamin a) The fungi
d) Riboflavin b) Eukaryote
c) Mycelia sterilia
3. The largest share in India's farm export d) None of the above
earning in the year 2011-12 was from
a) Basmati rice 9. A virus-free clone from a virus infected plant
b) Non-basmati rice can be obtained by
c) Sugar a) Cotyledonary leaf culture
d) Guar gum b) Axenic culture
c) Stem culture
4. The National Bureau of Agriculturally d) Meristem tip culture
Important Insects was established by ICAR
in ________, was earlier known as _______. 10. Which of the following is not an objective of
a) Bangalore; PDBC the National Food Security Mission?
b) New Delhi; National Pusa Collection a) Sustainable increase in production of rice,
c) Ranchi; Indian Lac Research Institute wheat and pulses
d) New Delhi; NCIPM b) Restoring soil fertility and productivity at
individual farm level
c) Promoting use of bio-pesticides and organic
fertilizers
d) Creation of employment opportunities
Subject : PhD – Computer Application – 2013 2

11. Agmarknet, a portal for the dissemination of 19. The term 'Heterosis' was coined by
agricultural marketing information, is a joint a) G.H. Shull
endeavour of b) W. Bateson
a) DMI and NIC c) T.H. Morgan
b) DMI and Ministry of Agriculture d) E.M. East
c) NIC and Ministry of Agriculture
d) DMI and Directorate of Economics and 20. When a transgenic plant is crossed with a
Statistics non-transgenic, what would be the zygosity
status of the F1 plant?
12. The share of agriculture and allied activities a) Homozygous
in India's GDP at constant prices in 2011-12 b) Heterozygous
was c) Hemizygous
a) 14.1% d) Nullizygous
b) 14.7%
c) 15.6% 21. The highest per capita consumption of
d) 17.0% flowers in the world is in
a) The USA
13. The average size of land holding in India b) India
according to Agricultural Census 2005-06 is c) Switzerland
a) 0.38 ha d) The Netherlands
b) 1.23 ha
c) 1.49 ha 22. Which of the following is a very rich source of
d) 1.70 ha betalain pigment?
a) Radish
14. 'Farmers First' concept was proposed by b) Beet root
a) Paul Leagans c) Carrot
b) Neils Rolling d) Red cabbage
c) Robert Chamber
d) Indira Gandhi 23. Dog ridge is
a) Salt tolerant rootstocks of mango
15. In the year 2012, GM crops were cultivated b) Salt tolerant rootstocks of guava
in an area of c) Salt tolerant rootstocks of grape
a) 150 million hectare in 18 countries d) Salt tolerant rootstocks of citrus
b) 170 million hectare in 28 countries
c) 200 million hectare in 18 countries 24. Which of the following micronutrients are
d) 1.70 million hectare in 28 countries most widely deficient in Indian soils?
a) Zinc and boron
16. The broad-spectrum systematic herbicide b) Zinc and iron
glyphosate kills the weeds by inhibiting the c) Zinc and manganese
biosynthesis of d) Zinc and copper
a) Phenylalanine
b) Alanine 25. Which of the following fertilizers is not
c) Glutamine produced in India?
d) Cysteine a) DAP
b) Urea
17. At harvest, the above ground straw (leaf, c) Muriate of potash
sheath and stem) weight and grain weight of d) TSP
paddy crop are 5.5 and 4.5 tonnes per
hectare, respectively. What is the harvest 26. What is the estimated extent of salt affected
index of paddy? soils in India?
a) 45% a) 5.42 mha
b) 50% b) 7.42 mha
c) 55% c) 11.42 mha
d) 100% d) 17.42 mha

18. Crossing over between non-sister 27. Which of the following is not a feature of
chromatids of homologous chromosomes watershed?
takes place during a) Hydrological unit
a) Leptotene b) Biophysical unit
b) Pachytene c) Socio-economic unit
c) Diplotene d) Production unit
d) Zygotene
Subject : PhD – Computer Application – 2013 3

28. Correlation coefficient 'r' lies between 35. Which of the following statements is correct?
a) 0 and 1 a) Base class pointer can not point to derived
b) -1 and 1 class
c) -1 and 0 b) Pointer to base class can not be created
d) 0 and  c) Pointer to derived class can not be created
d) Derived class pointer can not point to base
29. For the data 1, -2, 4, geometric mean is class
a) 2
b) 4 36. Which of the following concept means
7 determining at runtime what method to
c) -  invoke?
3
a) Data hiding
d) -2 b) Dynamic binding
c) Dynamic typing
30. The relationship between Arithmetic mean d) Dynamic loading
(A), Harmonic mean (H) and Geometric
mean (G) is 37. Which of the following is not member of the
2
a) G =AH class?
b) G= A+H a) Static function
2
c) H =GA b) Friend function
2
d) A =GH c) Constant function
d) Virtual function

PART – II (Subject Paper) 38. Which of the following are available only in
the class of hierarchy chain?
Multiple choice questions (No. 31 to 130). a) Public data members
Choose the correct answer (a, b, c or d) b) Private data members
and enter your choice in the circle (by c) Protected data members
shading with a pencil) on the OMR - d) Member functions
answer sheet as per the instructions
39. The parameter list in function overloading
given on the answer sheet. must differ by
a) Number of arguments
31. What is needed to assemble a logic network b) Number or data type of arguments
for adding three digits? c) Function name
a) OR gate d) Function size
b) AND and NOT gates
c) Two half adders 40. Link URL in HTML is specified using
d) Both a) and c) _________ attribute.
a) src
32. What is the decimal equivalent of binary b) href
number 111110? c) link
6
a) 2 -1 d) rel
b) 26
c) 26-2 41. Default attribute value of “target” is _______
6
d) 2 +2 in HTML.
a) _blank
33. What is the function of Control Unit in the b) _self
Central Processing Unit? c) _parent
a) To perform logical operations d) _top
b) To store program instructions
c) To transfer data to primary storage 42. The complete graph K has _______ different
d) To decode program instructions spaming trees.
a) nn-2
34. The index register in a digital computer is
b) nn
used for n
c) n
a) Address modification 2
d) n
b) Indirect addressing
c) Keeping tract of number of times a loop is
executed
d) Pointing to stack address
Subject : PhD – Computer Application – 2013 4

43. A graph G is called a ________ if it is a 51. Which of the following TCP/IP protocol
connected acyclic graph? allows an application program on one
a) Cyclic graph machine to send a datagram to an
b) Regular graph application on another?
c) Tree a) X.25
d) Mixed graph b) UDP
c) VMTP
44. Use of Queue can be the efficient way to d) SMTP
implement?
a) Quick sort 52. Which of the following field contains the
b) Radix sort address of the router?
c) Depth first search a) TCP address
d) Recursion b) IP address
c) Default gateway
45. The complexity of Binary search algorithm is d) Subnet mask
a) n
b) n loge n 53. An error- detecting code inserted as a field in
c) loge n a block of data to be transmitted is known as
2
d) n a) frame check sequence
b) error detecting code
46. The average successful search time for c) flow control
sequential search on ‘n’ items is d) checksum
a) n/2
b) (n-1)/2 54. In OSI model, which of the following layer
c) log(n)+1 provides error-free delivery of data?
d) (n+2)/2 a) Transport
b) Data link
47. The largest percentage of total life cost of c) Session
software is d) Network
a) design cost
b) coding cost 55. Error detection at a data link level is
c) testing cost achieved by
d) maintenance cost a) bit stuffing
b) hamming codes
48. Software configuration management involves c) equalization
identifying the configuration of the software d) cyclic redundancy codes
a) at the end of the life cycle only
b) at the beginning of the lifecycle only 56. What is the error in the following code:
c) at the predefined points of time during the life Class t
cycle {
d) prior to the beginning of the life cycle virtual void print();
}
49. Which of the following is a protocol used to a) No error
route an email message through the b) Function print() should be declared as static
internet? c) Function print() should be defined
a) TCP/IP d) Class t should contain data numbers
b) SMTP
c) HTML 57. Which of the following is the most powerful
d) HTTP parsing method?
a) SLR
50. What is the default subnet mask for class C b) LALR
network? c) LL(1)
a) 127.0.0.1 d) Canonical LR
b) 255.0.0.0
c) 255.255.255.0 58. Regular expressions are used for defining
d) 255.255.0.0 a) syntax
b) ambiguity
c) tokens
d) code optimization
Subject : PhD – Computer Application – 2013 5

59. Type checking is normally done during 67. A thread


a) lexical analysis a) is a lightweight process where the context
b) syntax directed translation switching is high
c) syntax analysis b) is used to speed up paging
d) code optimization c) cannot execute independently
d) is a lightweight process where the context
60. Ambiguity of a grammar can be removed by switching is low
a) defining the syntax rules
b) looking at associating and precedence 68. The problem of fragmentation arises in
c) looking at the DFA rules a) static storage allocation
d) all of the above b) heap allocation
c) stack allocation with dynamic binding
61. FIRST and FOLLOW are used in which of d) stack allocation storage
the following?
a) Lexical analysis 69. The commonly used directory
b) Shift reducing parsing implementation in most operating systems is
c) Regular expression a) single level directory structure
d) Predictive parsing b) two level directory structure
c) tree directory structure
62. Handle pruning is used in which of the d) a cyclic directory structure
following parsers?
a) Predictive parsers 70. Which of the following is not a logical data
b) Shift reduce parsers structure?
c) Operator precedence parsers a) Tree
d) Simple precedence parsers b) Network
c) Chain
63. Resolution of externally defined symbols is d) Relational
performed by
a) linker 71. What type of relationship is expressed with
b) loader the phrase “students take classes”?
c) compiler a) 1:M
d) interpreter b) 1:1
c) M:1
64. To avoid race condition, the number of d) M:N
processes that may be simultaneously inside
their critical section is 72. A transitive dependency is which of the
a) 0 following?
b) 1 a) A functional dependency between two or
c) 2 more key attributes
d) 4 b) A functional dependency between two or
more non-key attributes
65. Thrashing c) A relation that is in first normal form
a) is a neutral consequence of virtual memory d) A relation that is in second normal form
systems
b) always occurs on large computers 73. If a table has been normalized so that all the
c) can be caused by paging algorithms determinants are candidate keys, then that
d) can always be avoided by swapping table is in
a) 1NF
66. Switching the CPU to another process b) 2NF
requires to save state of old process and c) 3NF
loading new process state is called d) BCNF
a) process blocking
b) context switch 74. The HAVING clause does which of the
c) time sharing following?
d) caching a) Acts like WHERE clause but is used for
columns rather than groups
b) Acts like a WHERE clause but is used for
groups rather than rows
c) Acts alike a WHERE clause but is used for
rows rather than columns
d) Acts EXACTLY like WHERE clause
Subject : PhD – Computer Application – 2013 6

75. In Newton-Raphson method to find a root of 81. Which is not a common control event?
a given linear equation, which of the a) Click
following is true? b) Single Click
a) Only one point X0 determines the interactions c) Double Click
b) Two points X0 and X1 are needed to start the d) Mouse Down
interactions
c) Converges slowly than Secant’s method 82. Which is not an integer data type?
d) Evaluation of f′(x) is not essential a) Single
b) Byte
76. A student discovers that his/her grade on a c) Short
nd
recent test was 72 percentile. If 90 students d) Long
wrote the test, then approximately how many
students received a higher grade than 83. Which sequence of char data types is listed
he/she did? from lowest to highest?
a) 25 a) a, z, A, Z
b) 65 b) A, a, Z, z
c) 71 c) A, Z, a, z
d) 72 d) z, a, Z, A

77. A scientist is weighing each of 30 fish. She 84. The proper operator precedence, from first to
obtains a mean of 300 g and a standard last, is
deviation of 20 g. After completing the a) logical, comparison, and arithmetic
weighing, she finds that the scale was b) arithmetic, comparison, and logical
misaligned, and always under reported every c) arithmetic, logical, and comparison
weight by 20 g, i.e., a fish that really weighed d) comparison, arithmetic, and logical
260 g was reported to weight 240 g. What is
the mean and standard deviation after 85. Which selection process is an example of
correcting for error in the scale? multiple branches from a single expression?
a) 280 g, 20 g a) If…Then
b) 300 g, 40 g b) Select Case
c) 320 g, 20 g c) Do…Loop
d) 320 g, 40 g d) For…Next

78. The frequency distribution of amount of 86. What happens in a Select Case construct
rainfall in December in a certain region for a when a test value matches the test
period of 30 years is given below: expression?
Rainfall Number of years a) The corresponding block of statements is run
(in cm) b) The next Case test value is checked
5.0 - 10.0 3 c) The Case Else statement is run
10.0 - 15.0 6 d) The Select Case construct is exited
15.0 - 20.0 8
20.0 - 25.0 8 87. From how many places in the code can a
25.0 - 30.0 5 procedure/function be called?
The mean amount of rainfall in cm is a) 0
a) 18.25 b) 1
b) 18.35 c) 2
c) 18.50 d) As many times as needed
d) 18.75
88. The scope of a variable refers to
79. How many records are specified in the a) the lifetime of the variable
SELECT clause? b) the name of the variable
a) 0 c) the accessibility of the variable
b) 1 d) the datatype of the variable
c) 2
d) 3 89. Which is not a valid type of JOIN?
a) LEFT JOIN
80. What does IDE stand for? b) MIDDLE JOIN
a) Integrated Development Environment c) RIGHT JOIN
b) Integrated Design Environment d) INNER JOIN
c) Interior Development Environment
d) Interior Design Environment
Subject : PhD – Computer Application – 2013 7

90. In a three-tier web architecture, which layer 99.Dirty bit is used to show
is exemplified by a web server? a) page with corrupted data
a) Application b) wrong page in the memory
b) Association c) page that is modified after being loaded into
c) Data cache memory
d) Logical d) page that is less frequently accessed

91. How will using a middle tier typically affect 100. What is a shell in Unix?
the number of connections to a database? a) It is a hardware component
a) Increase the number b) It is a command interpreter
b) Have no effect on the number c) It is a part in compiler
c) Decrease the number d) It is a tool in CPU scheduling
d) It depends on the type of client
101. A subschema expresses
92. The stateless HTTP protocol refers to web a) the logical view
pages created b) the physical view
a) on a web server c) the external view
b) without information from a database d) all of the above
c) without knowledge of previous web pages
d) before a request from a client 102. In a hierarchical model records are
organized as
93. Where do cookies store information? a) graph
a) HTML source b) list
b) Text file c) links
c) URL d) tree
d) Both a) and b)
103. What is Granularity?
94. Where does the query string store a) The size of database
information? b) The size of data item
a) HTML source c) The size of record
b) Text file d) The size of file
c) URL
d) Both a) and b) 104. NULL is
a) the same as 0 for integer
95. Methods are used to represent b) the same as blank for character
a) actions c) the same as 0 for integer and blank for
b) classes character
c) data d) not a value
d) events
105. The database administration function
96. Encapsulation makes it easier to includes
a) reuse and modify existing modules of code a) application programming
b) write and read code by sharing method b) computer operations management
names c) database access planning
c) hide and protect data from external code d) all of the above
d) both a) and b)
106. An advantage of the database management
97. Dijkestra banking algorithm in an operating approach is
system, solves the problem of a) data is dependent on programs
a) deadlock avoidance b) data redundancy increases
b) deadlock recovery c) data is integrated and can be accessed by
c) mutual exclusion multiple programs
d) context switching d) none of the above

98. The operating system that reads and reacts 107. In E-R Diagram relationship type is
in terms of actual time is represented by
a) batch system a) ellipse
b) quick response system b) dashed ellipse
c) real time system c) rectangle
d) time sharing system d) diamond
Subject : PhD – Computer Application – 2013 8

108. By means of a data flow diagram, the 117. Which is a black box testing method?
analyst can detect a) Boundary value analysis
a) task duplication b) Basic path testing
b) unnecessary delays c) Code path analysis
c) task overlapping d) Batch path analysis
d) all of the above
118. A key concept of quality control is that all
109. Indicate which of the following is not true work products
about interpreter? a) are delivered on time and under budget
a) Interpreter generates an object program b) have complete documentation
from the source program c) have measurable specification for process
b) Interpreter analyses each source statement outputs
every time it is to be executed d) are thoroughly tested before delivery to the
c) Interpreter is a kind of translator customer
d) All of the above
119. Coupling and cohesion can be represented
110. Functions of Lexical analyzer are using a
a) Removing white space a) cause-effect graph
b) Removing constants, identifiers and b) dependence matrix
keywords c) structure chart
c) Removing comments d) SRS
d) All of the above
120. Two main measures for the efficiency of an
111. Bottom up parsing involves algorithm are
a) shift reduce a) processor and memory
b) handle pruning b) complexity and capacity
c) operator check c) time and space
d) both a) and b) d) data and space

112. Which is not a software life cycle model? 121. The time factor when determining the
a) Spiral Model efficiency of algorithm is measured by
b) Waterfall Model a) counting microseconds
c) Prototyping Model b) counting the number of key operations
d) Capability maturity Model c) counting the number of statements
d) counting the kilobytes of algorithm
113. Project risk factor is considered in
a) Spiral Model 122. The Worst case occur in linear search
b) Waterfall Model algorithm when
c) Prototyping Model a) item is somewhere in the middle of the
d) Iterative enhancement Model array
b) item is not in the array at all
114. SDLC stands for c) item is the last element in the array
a) software design life cycle d) item is the last element in the array or is not
b) software development life cycle there at all
c) system design life cycle
d) system development life cycle 123. The complexity of Binary search algorithm
is
115. Waterfall model is not suitable for a) O(n)
a) small Projects b) O(log n)
b) complex Projects c) O(n2)
c) accommodating change d) O(n log n)
d) large projects
124. The complexity of merge sort algorithm is
116. Design phase includes a) O(n)
a) data, architectural and procedural design b) O(log n)
only c) O(n2)
b) architectural, procedural and interface d) O(n log n)
design only
c) data, architectural and interface design only
d) data, architectural, interface and procedural
design
Subject : PhD – Computer Application – 2013 9

125. Which of the following data structure is Matching type questions (No. 131 to 140);
linear data structure? all questions carry equal marks. Choose
a) Trees the correct answer (a, b, c, d or e) for
b) Graphs each sub-question (i, ii, iii, iv and v) and
c) Arrays
enter your choice in the circle (by
d) None of the above
shading with a pencil) on the OMR -
126. The operation of processing each element answer sheet as per the instructions
in the linked list is known as given on the answer sheet.
a) sorting
b) merging 131. Match the ASCII code for the following
c) inserting characters
d) traversal i) F a) 01001010
ii) H b) 01001000
127. How many constructors can a class have? iii) L c) 01001110
a) 0 iv) N d) 01000110
b) 1 v) J e) 01001100
c) 2
d) All of the above
132. Match the following terms to their definition
128. A constructor is a special type of i) Spam a) Software that collects
a) class information about computer
b) field usage
c) method ii) Cookies b) Often display in the form of
d) property pop-ups
iii) Adware c) Software that has a
129. An Exception is another name for a malicious intent, like a virus
a) compile error or worm
b) logic error iv) Spyware d) Small text files stored on
c) runtime error your computer to track your
d) syntax error site visits
v) Malware e) Unwanted or junk email
130. What is required to reference an element in
an array?
a) Array name 133. Match the following terms to their definition
b) Index value of the element i) Wizards a) Forms that provide
c) Element value structure for a document
d) Both a) and b) ii) Templates b) A series of commands
grouped into a single
command
iii) Macro c) A single program that
incorporates most
commonly used tools
iv) Integrated software d) Step-by-step guides in
application software
v) Software suite e) Bundled group of
software programs

134. Match the following addressing modes to


the respective commands
i) Register Addressing a) ADD R1, (1001)
Mode
ii) Immediate Addressing b) ADD R1,R2
Mode
iii) Indexed Addressing c) ADD R2,100 (R1)
Mode
iv) Displacement Address d) ADD R1,#3
Mode
v) Direct Addressing Mode e) ADD R3, (R1+R2)
Subject : PhD – Computer Application – 2013 10

135. Match the following normalization forms to 139. Match the following protocols to the
the concepts used in them respective TCP/IP layer
i) BCNF a) Atomic values i) ICMP a) Physical layer
ii) First Normal Form b) Full Functional ii) ETHERNET b) Transport layer
Dependency iii) UDP c) Network layer
iii) Second Normal c) Determinant iv) DHCP d) Data Link layer
Form v) ARP e) Application layer
iv) Third Normal Form d) Multi valued
Dependency
v) Fourth Normal Form e) Transitive Dependency 140.
i) Open source software a) one selects which
software features to
136. Match the grep command switches to their install
functionality ii) Shareware b) software that is free if
i) grep -c a) Case sensitivity ignored changes you make to
ii) grep -n b) Displays all the lines that do not the source code are
match distributed free
iii) grep -v c) Display the number of matched iii) Freeware c) software still under
lines development
iv) grep -w d) Display the number of matched iv) Beta version d) software that is free to
lines with line numbers use
v) grep -i e) Match Whole Word v) Custom installation e) software that is
distributed free with
certain condition
137. Match the following technologies to their
OEM companies
i) Java a) AT&T,Bell Labs
ii) Axis 2.0 b) Sun MicroSystems
iii) C# c) Apache
iv) 11g d) Microsoft
v) unix e) Oracle Corporation

138. Match the following operators to their types


i) % a) Logical Operator
ii) && b) Left shift Operator
iii) & c) Modulus Operator
iv) << d) Member Operator
v)  e) Reference Operator
Subject : PhD – Computer Application – 2013 11

Short questions (No. 141 to 146); each question carries FIVE marks. Write answers,
including computation / mathematical calculations if any, in the space provided for
each question on the question paper itself.
141. There were 8, 15, 13 and 14 nodes in 4 different trees. Which of them could have formed a full
binary tree? Explain briefly.

142. Explain Deadlock prevention, Avoidance and Detection.


Subject : PhD – Computer Application – 2013 12

143. Explain Functional dependency and Full functional dependency with examples.

144. Define three basic principal of design of experiments. Explain with the help of examples.
Subject : PhD – Computer Application – 2013 13

145. What is IPV6? What are its advantages over IPV4?

146. Sort 20,35,40,100,3,10,15 using insertion sort. Describe step by step.

Você também pode gostar