X-12 Ins. Page (Paper-II).p65

Tài liệu tương tự
Signature and Name of Invigilator 1. (Signature) (Name) 2. (Signature) (Name) Time : 1 1 / 4 hou

Signature and Name of Invigilator 1. (Signature) (Name) 2. (Signature) (Name) 4 2 J 1 4 PAPER-III PERSIAN Time : 2 1 / 2 hours] [Maximum Marks : 150 N

Signature and Name of Invigilator 1. (Signature) (Name) 2. (Signature) (Name) Time : 1 1 / 4 hou

D Persian (Paper-II).p65

PAPER-II JAPANESE Signature and Name of Invigilator 1. (Signature) OMR Sheet No. :... (To be filled by the Candidate) (Name) Roll No. 2. (Signature) (

X-12 Ins. Page (Paper-II).p65

X-12 Ins. Page (Paper-II).p65

FAQs Những câu hỏi thường gặp 1. What is the Spend Based Rewards program for Visa Vietnam? The Spend Based Rewards program for Visa Vietnam is a servi

Signature and Name of Invigilator 1. (Signature) (Name) 2. (Signature) (Name) 4 2 J 1 6 PAPER-II PERSIAN OMR Sheet No. :... (To be filled by the Candi

J II (Persian) Inst.p65

Hệ điều hành Bài tập tuần 6 1 Quản lý bộ nhớ Bài tập 1 : Xem thông tin bộ nhớ 1. Sử dụng top, ps đọc thông tin về kích thước vùng nhớ của 1 tiến trình

Chöông 1 (tt.)

MD Paper-Based Test ELA Vietnamese Script for Administrating PARCC TAM

Kyõ Thuaät Truyeàn Soá Lieäu

2018 Vietnamese FL Written examination

Screen Test (Placement)

Hướng dẫn cụ thể từng bước để đăng ký sử dụng Đơn đăng ký không tín chỉ sau đó ghi danh vào các lớp không tín chỉ. 1 tháng Sáu, 2018 Các sinh viên dự

Chapter 1

Nội dung chương 3 IT1110 Tin học đại cương Phần I: Tin học căn bản Chương 3: Hệ thống máy tính 3.1. Giới thiệu 3.2. Chức năng và các thành phần của má

说明书 86x191mm

Microsoft Word - thuat-ngu-thuong-mai-dien-tu.docx

D II (Computer Science) Inst.p65

UBND TỈNH ĐỒNG THÁP SỞ GIÁO DỤC VÀ ĐÀO TẠO Số: 1284/SGDĐT-GDTrH-TX&CN V/v hướng dẫn tổ chức dạy học bộ môn tiếng Anh cấp trung học năm học C

Blood pool and Hemangioma - Khoang chứa máu và U máu gan Hoàng Văn Trung Normally when we look at lesions filling with contrast, the density of these

TrÝch yÕu luËn ¸n

HEADING 1: PHẦN 1: QUẢN LÝ VÀ DUY TRÌ HỆ ĐIỀU HÀNH

Tóm tắt ngữ pháp tiếng Anh Tổng hợp và biên soạn: Thầy Tâm - Anh Văn ( TÓM TẮT NGỮ PHÁP TIẾNG ANH Mục lục Tóm tắt

Computer Architecture

Kiến trúc tập lệnh1

Signature and Name of Invigilator 1. (Signature) (Name) 2. (Signature) (Name) 8 9 D 1 4 PAPER-II ENVIRONMENTAL SCIENCE OMR Sheet No. :... (To be fille

PHẦN III. NỘI DUNG CHƯƠNG TRÌNH ĐÀO TẠO 1. Tóm tắt yêu cầu chương trình đào tạo Tổng số tín chỉ của chương trình đào tạo: Khối kiến thức chung 158 tín

03-Routing_Protocols_Giai thua tim duong.ppt

Lkgjlfjq?etyuiiofjkfjlsfjkslddghdgertt

Một số thao tác trong windows XP Một số thao tác trong windows XP Bởi: Vien CNTT DHQG Hanoi MỘT SỐ THAO TÁC TRONG WINDOWS XP Tạo đĩa mềm khởi động DOS

J Cover Page (P-II).p65

Using a Walker - Vietnamese

Microsoft Word - bai 16 pdf

Slide 1

Consumer Behavior: People in the Marketplace

NMPED 2019 Spring ADMINISTRATOR Manual

Stored Procedures Stored Procedures Bởi: Khoa CNTT ĐHSP KT Hưng Yên Trong những bài học trước đây khi dùng Query Analyzer chúng ta có thể đặt tên và s

Signature and Name of Invigilator 1. (Signature) (Name) 2. (Signature) J (Name) Instructions for the Candidates 1. Write your roll number in the space

Chương 1. Các khái niệm cơ sở

ĐỀ CƯƠNG MÔN HỌC NHẬP MÔN TIN HỌC

Modbus RTU - Modbus TCP/IP Converter

29T-STAT.pmd

Network Security

Nghiên cứu kiến trúc hệ thống Media - LBS

Website review luanvancaohoc.com

Slide 1

MAS001 SCHOOL OF MATHEMATICS AND STATISTICS Foundation Year Mathematics I Autumn Semester hour 30 minutes ØØ ÑÔØ ÐÐ ÕÙ Ø ÓÒ º Ì ÐÐÓ Ø ÓÒ Ó Ñ

06-BGP.ppt

வ ம ன வ கண க இ ணய த த க ச ற (E - filing of income tax returns) 1. அர அ வல க ம ஆச ய க ஜ ல 31 ஆ தத வ ம ன வ கண க ன த க ச ய க க ட இ ணயதள த ச ல.

uid32355

bảng giá / rate card

Bài 3 Tựa bài

Microsoft Word - Tailieu win2003.doc

Website

ENM 19

Microsoft Word - Listen to Your Elders-2 Stories.docx

Slide 1

Microsoft Word - Huong dan su dung Mailchimp.docx

PowerPoint Presentation

XJ-UT311WN_XJ-UT351WN

Kyõ Thuaät Truyeàn Soá Lieäu

Winmeen Tnpsc Gr 1 & 2 Self Preparation Course

! LỊCH HỌC CỦA TRẺ 3-4 TUỔI/ DAILY SCHEDULE FOR PRESCHOOL 1 September Tuần 1 / Week 1 Bài học: Trường em Ngày: 5/9 9/9 Unit: My school Date: Sep 5-9 T

Microsoft Word - Huong dan cau hinh mikrotik - Viet Tuan UNIFI.vn

Điện toán đám mây của Google và ứng dụng xây dựng hệ thống quản lý dịch vụ Đỗ Thị Phương Trường Đại học Quốc gia Hà Nội; Trường Đại học Công nghệ Chuy

MCSA 2012: Distributed File System (DFS) MCSA 2012: Distributed File System (DFS) Cuongquach.com Ở bài học hôm nay, mình xin trình bày về Distributed

BỘ GIÁO DỤC VÀ ĐÀO TẠO TRƯỜNG ĐẠI HỌC MỞ THÀNH PHỐ HỒ CHÍ MINH ĐỀ CƯƠNG MÔN HỌC 1. THÔNG TIN VỀ MÔN HỌC 1.1. Tên môn học: QUẢN TRỊ HỆ CƠ SỞ DỮ LIỆU 1.

Microsoft Word - Kiem dinh chat luong phan mem

PX870/770_EN

Khảo sát và cấu hình QoS trên Switch 2900/3500 Bước 1. Kích hoạt tính năng QoS. Switch# show mls qos QoS is disabled QoS ip packet dscp rewrite is ena

Internet Information Service - IIS Internet Information Service - IIS Bởi: Phạm Nguyễn Bảo Nguyên Chúng ta đã tìm hiểu về cách dựng một NAT Server...

mid1-f18-written-sol-master

Microsoft Word - HDSD_NVR_304&3016.docx

Gút - Knots I. Mở Ðầu - Introduction Môn gút chiếm một ví trí khá quan trọng trong chương trình hoạt động thanh niên của Gia Ðình Phật Tử. Gút có thể

Giới thiệu

09-MANET Routing-Reactive.ppt

Microsoft Word - LedCenterM_HDSD.doc

HƯỚNG DẪN SỬ DỤNG CLOUD STORAGE Trân trọng cám ơn các bạn đã sử dụng dịch vụ Cloud Storage của Viettel IDC. Tài liệu hướng dẫn sử dụng nhanh được biên

Microsoft PowerPoint - Chuong3.ppt [Compatibility Mode]

Bản ghi:

Time : 1 1 / 4 hours] PAPER-II COMPUTER SCIENCE AND APPLICATIONS Signature and Name of Invigilator 1. (Signature) (Name) 2. (Signature) (Name) 8 7 J 1 2 OMR Sheet No. :... (To be filled by the Candidate) Roll No. (In figures as per admission card) Roll No. (In words) [Maximum Marks : 100 Number of Pages in this Booklet : 8 Number of Questions in this Booklet : 50 Instructions for the Candidates Ö üßõööù ÖµÖÖë Ûêú»Ö Ö ìü Ö 1. Write your roll number in the space provided on the top of 1. ÖÆü»Öê Öéšü Ûêú ú Ö ü ÖµÖŸÖ Ã ÖÖ Ö Ö ü Ö ÖÖ üöê»ö Ö ²Ö ü»ö ÜÖ this page. 2. ÃÖ ÖÏ Ö- Ö Ö Öë Ö ÖÖÃÖ ²ÖÆãü ¾ÖÛú» ÖßµÖ ÖÏ Ö Æïü 2. This paper consists of fifty multiple-choice type of 3. Ö üßõöö ÖÏÖ ü ³Ö ÆüÖê Öê Ö ü, ÖÏ Ö- Öã ßÖÛúÖ Ö ÖÛúÖê êü üß ÖÖµÖêÝÖß ÖÆü»Öê questions. ÖÖÑ Ö Ö Ö ü Ö ÖÛúÖê ÖÏ Ö- Öã ßÖÛúÖ ÜÖÖê»Ö Öê ŸÖ ÖÖ ˆÃÖÛúß Ö Ö»Ö ÜÖŸÖ 3. At the commencement of examination, the question booklet ÖÖÑ Ö Ûêú»Ö üµöê ÖÖµÖëÝÖê, ÖÃÖÛúß ÖÖÑ Ö Ö ÖÛúÖê ¾Ö µö Ûú ü Öß Æîü : will be given to you. In the first 5 minutes, you are requested (i) ÖÏ Ö- Öã ßÖÛúÖ ÜÖÖê»Ö Öê Ûêú»Ö ˆÃÖÛêú Ûú¾Ö ü Öê Ö Ö ü»öýöß ÛúÖÝÖ Ö to open the booklet and compulsorily examine it as below : Ûúß ÃÖᯙ ÛúÖê ±úö Ìü»Öë ÜÖã»Öß Æãü Ô µöö ²Ö ÖÖ Ã üßûú ü-ãöß»ö Ûúß (i) To have access to the Question Booklet, tear off the Öã ßÖÛúÖ Ã¾ÖßÛúÖ ü Ö Ûú ëü paper seal on the edge of this cover page. Do not accept (ii) Ûú¾Ö ü Öéšü Ö ü û Öê Ö ìü ÖÖ ÖãÃÖÖ ü ÖÏ Ö- Öã ßÖÛúÖ Ûêú Öéšü ŸÖ ÖÖ a booklet without sticker-seal and do not accept an open booklet. ÖÏ ÖÖë Ûúß ÃÖÓܵÖÖ ÛúÖê ûß ŸÖ üæü ÖîÛú Ûú ü»öë Ûú µöê Öæ êü (ii) Tally the number of pages and number of questions Æïü üöêâö ÖæÞÖÔ Öã ßÖÛúÖ Ö Ö Öë Öéšü/ ÖÏ Ö Ûú Ö ÆüÖë µöö ãü²öö üö Ö in the booklet with the information printed on the ÝÖµÖê ÆüÖë µöö ÃÖß üµö»ö Öë Ö ÆüÖë ÖÖÔŸÖË ÛúÃÖß ³Öß ÖÏÛúÖ ü Ûúß cover page. Faulty booklets due to pages/questions Öã ü ÖæÞÖÔ Öã ßÖÛúÖ Ã¾ÖßÛúÖ ü Ö Ûú ëü ŸÖ ÖÖ ˆÃÖß ÃÖ ÖµÖ ˆÃÖê missing or duplicate or not in serial order or any»ööî üöûú ü ˆÃÖÛêú à ÖÖ Ö Ö ü æüãö üß ÃÖÆüß ÖÏ Ö- Öã ßÖÛúÖ»Öê»Öë other discrepancy should be got replaced immediately ÃÖÛêú»Ö Ö ÖÛúÖê ÖÖÑ Ö Ö Ö ü üµöê ÖÖµÖëÝÖê ˆÃÖÛêú ²ÖÖ ü Ö by a correct booklet from the invigilator within the ŸÖÖê Ö ÖÛúß ÖÏ Ö- Öã ßÖÛúÖ ¾ÖÖ ÖÃÖ»Öß ÖÖµÖêÝÖß Öî ü Ö Æüß Ö ÖÛúÖê period of 5 minutes. Afterwards, neither the ŸÖ üœÿö ÃÖ ÖµÖ üµöö ÖÖµÖêÝÖÖ Question Booklet will be replaced nor any extra (iii) ÃÖ ÖÖÑ Ö Ûêú ²ÖÖ ü OMR Ö ÖÛú Ûúß ÛÎú Ö ÃÖÓܵÖÖ ÃÖ ÖÏ Ö- Öã ßÖÛúÖ time will be given. Ö ü Ó ÛúŸÖ Ûú ü ëü (iii) After this verification is over, the OMR Sheet Number 4. ÖÏŸµÖêÛú ÖÏ Ö Ûêú»Ö ÖÖ ü ˆ Ö ü ¾ÖÛú» Ö (A),, ŸÖ ÖÖ (D) üµöê should be entered on this Test Booklet. ÝÖµÖê Æïü Ö ÖÛúÖê ÃÖÆüß ˆ Ö ü Ûêú ¾Öé Ö ÛúÖê Öê Ö ÃÖê ³Ö üûú ü ÛúÖ»ÖÖ Ûú ü ÖÖ Æîü 4. Each item has four alternative responses marked (A),, and (D). You have to darken the circle as indicated below ÖîÃÖÖ Ûú Öß Öê üüööµöö ÝÖµÖÖ Æîü on the correct response against each item. ˆ üöæü üþö : Example : Ö²Ö Ûúú ÃÖÆüß ˆ Ö ü Æîü where is the correct response. 5. ÖÏ ÖÖë Ûêú ˆ Ö ü Ûêú¾Ö»Ö ÖÏ Ö Ö Ö I Ûêú ü ü üµöê ÝÖµÖê OMR Ö ÖÛú Ö ü Æüß 5. Your responses to the items are to be indicated in the OMR Ó ÛúŸÖ Ûú ü Öê Æïü µö ü Ö Ö OMR Ö ÖÛú Ö ü üµöê ÝÖµÖê ¾Öé Ö Ûêú»ÖÖ¾ÖÖ Sheet given inside the Paper I Booklet only. If you mark ÛúÃÖß µö à ÖÖ Ö Ö ü ˆ Ö ü ÖÅ ÖÖÓ ÛúŸÖ Ûú üÿöê Æïü, ŸÖÖê ˆÃÖÛúÖ Ö滵ÖÖÓÛú Ö at any place other than in the circle in the OMR Sheet, it will ÖÆüà ÆüÖêÝÖÖ not be evaluated. 6. ü ü üµöê ÝÖµÖê Ö ìü ÖÖë ÛúÖê µöö Ö Öæ¾ÖÔÛú ÖœÌëü 6. Read instructions given inside carefully. 7. Ûú ÖÖ ÛúÖ Ö (Rough Work) ÃÖ Öã ßÖÛúÖ Ûêú ŸÖ Ö Öéšü Ö ü Ûú ëü 7. Rough Work is to be done in the end of this booklet. 8. µö ü Ö Ö OMR Ö ÖÛú Ö ü ÖµÖŸÖ Ã ÖÖ Ö Ûêú»ÖÖ¾ÖÖ Ö ÖÖ ÖÖ Ö, üöê»ö 8. If you write your Name, Roll Number, Phone Number or Ö ²Ö ü, ±úöê Ö Ö ²Ö ü µöö ÛúÖê Ô ³Öß êãöö ÖÅ Ö ÖÃÖÃÖê Ö ÖÛúß ÖÆü ÖÖ Ö ÆüÖê put any mark on any part of the OMR Sheet, except for the ÃÖÛêú, Ó ÛúŸÖ Ûú üÿöê Æïü Ö¾ÖÖ ³Ö ü ³ÖÖÂÖÖ ÛúÖ ÖϵÖÖêÝÖ Ûú üÿöê Æïü, µöö ÛúÖê Ô space allotted for the relevant entries, which may disclose µö Öã ÖŸÖ ÃÖÖ Ö Ö ÛúÖ ÖϵÖÖêÝÖ Ûú üÿöê Æïü, ŸÖÖê Ö üßõöö Ûêú»ÖµÖê µööêýµö your identity, or use abusive language or employ any other ÖÖê ÂÖŸÖ ÛúµÖê ÖÖ ÃÖÛúŸÖê Æïü unfair means, you will render yourself liable to 9. Ö ÖÛúÖê Ö üßõöö ÃÖ ÖÖ ŸÖ ÆüÖê Öê Ö ü ÖÏ Ö- Öã ßÖÛúÖ ¾ÖÓ Öæ»Ö OMR Ö ÖÛú disqualification. 9. You have to return the test question booklet and Original Ö üßõöûú ÖÆüÖê üµö ÛúÖê»ÖÖî üö ÖÖ Ö¾Ö µöûú Æîü Öî ü Ö üßõöö ÃÖ ÖÖ ŸÖ Ûêú ²ÖÖ ü OMR Sheet to the invigilators at the end of the examination ˆÃÖê Ö Öê ÃÖÖ Ö Ö üßõöö ³Ö¾Ö Ö ÃÖê ²ÖÖÆü ü Ö»ÖêÛú ü ÖÖµÖë ÆüÖ»ÖÖÓ Ûú Ö Ö compulsorily and must not carry it with you outside the Ö üßõöö ÃÖ ÖÖ ŸÖ Ö ü OMR Ö ÖÛú Ûúß ãü»ößûêú ü ÖÏ ŸÖ Ö Öê ÃÖÖ Ö»Öê ÖÖ Examination Hall. You are, however, allowed to carry ÃÖÛúŸÖê Æïü duplicate copy of OMR Sheet on conclusion of examination. 10. Ûêú¾Ö»Ö Öß»Öê/ÛúÖ»Öê ²ÖÖ»Ö ¾ÖÖ Õ ü Öê Ö ÛúÖ Æüß ÃŸÖê ÖÖ»Ö Ûú ëü 10. Use only Blue/Black Ball point pen. 11. ÛúÃÖß ³Öß ÖÏÛúÖ ü ÛúÖ ÃÖÓÝÖÞÖÛú (Ûîú»ÖÛãú»Öê ü ü) µöö»ööýö êü²ö»ö Ö ü ÛúÖ 11. Use of any calculator or log table etc., is prohibited. ÖϵÖÖêÝÖ ¾ÖÙ ÖŸÖ Æîü 12. There is no negative marks for incorrect answers. 12. ÝÖ»ÖŸÖ ˆ Ö üöë Ûêú»Ö ÛúÖê Ô ÓÛú ÛúÖ êü ÖÆüà ÖÖ ÑÝÖê J-87-12 1 P.T.O.

1. The postfix expression AB + CD * can be evaluated using a (A) stack tree queue (D) linked list 2. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal. (A) ABFCDE ADBFEC ABDECF 3. The branch logic that provides making capabilities in the control unit is known as (A) Controlled transfer Conditional transfer Unconditional transfer 4. The number of colours required to properly colour the vertices of every planer graph is (A) 2 3 4 (D) 5 COMPUTER SCIENCE AND APPLICATIONS Paper II Note : This paper contains fifty (50) objective type questions, each question carrying two (2) marks. Attempt all the questions. 5. Networks that use different technologies can be connected by using (A) Packets Paper-II 2 J-87-12 Switches Bridges (D) Routers 6. Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is (A) Layer 5 (Application) Layer 1 (Physical) Layer 3 (Internet) (D) Layer 2 (Network Interface) 7. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by (A) Jamming Password Documentation (D) Record lock 8. A binary search tree is a binary tree : (A) All items in the left subtree are less than root All items in the right subtree are greater than or equal to the root Each subtree is itself a binary search tree

9. What deletes the entire file except the file structure? (A) ERASE DELETE ZAP (D) PACK 10. Which command is the fastest among the following? (A) COPY TO <NEW FILE> COPY STRUCTURE TO <NEW FILE> COPY FILE <FILE 1> <FILE 2> (D) COPY TO MFILE-DAT DELIMITED 11. B+ tree are preferred to binary tree in Database because (A) Disk capacity are greater than memory capacities Disk access is much slower than memory access Disk data transfer rates are much less than memory data transfer rate (D) Disks are more reliable than memory 12. A Transaction Manager is which of the following? (A) Maintains a log of transactions Maintains before and after database images Maintains appropriate concurrency control 13. Leaves of which of the following trees are at the same level? (A) Binary tree (D) Packet J-87-12 3 Paper-II B-tree AVL-tree (D) Expression tree 14. Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server? (A) RAP RIP ARP (D) X.25 15. Decryption and encryption of data are the responsibility of which of the following layer? (A) Physical layer Data Link layer Presentation layer (D) Session layer 16. In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM? (A) Space division Time division Virtual

17. In which Routing Method do all the routers have a common database? (A) Distance vector Link state Link vector (D) Dijkestra method 18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate). (A) 2400 bauds 1200 bauds 4800 bauds (D) 9600 bauds 19. The station to hub distance in which it is 2000 metres. (A) 100 Base-T x 100 Base-F x 100 Base-T 4 (D) 100 Base-T 1 20. Main aim of software engineering is to produce (A) program software within budget (D) software within budget in the given schedule 21. Key process areas of CMM level 4 are also classified by a process which is (A) CMM level 2 CMM level 3 CMM level 5 22. Validation means (A) are we building the product right are we building the right product verification of fields 23. If a process is under statistical control, then it is (A) Maintainable Measurable Predictable (D) Verifiable 24. In a function oriented design, we (A) minimize cohesion and maximize coupling maximize cohesion and minimize coupling maximize cohesion and maximize coupling (D) minimize cohesion and minimize coupling 25. Which of the following metric does not depend on the programming language used? (A) Line of code Function count Member of token 26. A / B + tree index is to be built on the name attribute of the relation STUDENT. Assume that all students names are of length 8 bytes, disk block are of size 512 bytes and index pointers are of size 4 bytes. Given this scenario what would be the best choice of the degree (i.e. the number of pointers per node) of the B + tree? (A) 16 42 43 (D) 44 Paper-II 4 J-87-12

27. The Inorder traversal of the tree will yield a sorted listing of elements of tree in (A) Binary tree Binary search tree Heaps 28. Mobile IP provides two basic functions. (A) Route discovery and registration Agent discovery and registration IP binding and registration 29. Pre-emptive scheduling is the strategy of temporarily suspending a gunning process (A) before the CPU time slice expires to allow starving processes to run when it requests I/O (D) to avoid collision 30. In round robin CPU scheduling as time quantum is increased the average turn around time (A) increases decreases remains constant (D) varies irregularly 31. Resources are allocated to the process on non-sharable basis is (A) mutual exclusion hold and wait no pre-emption (D) circular wait 32. Cached and interleaved memories are ways of speeding up memory access between CPU s and slower RAM. Which memory models are best suited (i.e. improves the performance most) for which programs? J-87-12 5 Paper-II (i) Cached memory is best suited for small loops. (ii) Interleaved memory is best suited for small loops (iii) Interleaved memory is best suited for large sequential code. (iv) Cached memory is best suited for large sequential code. (A) (i) and (ii) are true. (i) and (iii) are true. (iv) and (ii) are true. (D) (iv) and (iii) are true. 33. Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5 Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m = 4 will be (A) 8 9 10 (D) 12 34. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of (A) Integer (D) Bits Character Real numbers

35. If an integer needs two bytes of storage, then the maximum value of a signed integer is (A) 2 16 1 2 15 1 2 16 (D) 2 15 36. Which of the following logic families is well suited for high-speed operations? (A) TTL ECL MOS (D) CMOS 37. Interrupts which are initiated by an instruction are (A) Internal External Hardware (D) Software 38. printf( %c, 100); (A) prints 100 prints ASCII equivalent of 100 prints garbage (D) none of the above 39. For the transmission of the signal, Bluetooth wireless technology uses (A) time division multiplexing frequency division multiplexing time division duplex (D) frequency division duplex 40. Consider the following statements : I. Recursive languages are closed under complementation. Paper-II 6 J-87-12 II. III. Recursively enumerable languages are closed under union. Recursively enumerable languages are closed under complementation. Which of the above statements are true? (A) I only I and II I and III (D) II and III 41. What is the routing algorithm used by RIP and IGRP? (A) OSPF Link-state Dynamic (D) Dijkestra vector 42. Identify the incorrect statement : (A) The overall strategy drives the E-Commerce data warehousing strategy. Data warehousing in an E-Commerce environment should be done in a classical manner. E-Commerce opens up an entirely new world of web server. (D) E-Commerce security threats can be grouped into three major categories.

43. Reliability of software is directly dependent on (A) quality of the design 47. Where does a computer add and compare data? (A) Hard disk number of errors present Floppy disk software engineers experience (D) user requirement 44. is not an E-Commerce application. (A) House banking Buying stocks Conducting an auction (D) Evaluating an employee 45. is a satellite based tracking system that enables the determination of person s position. (A) Bluetooth WAP Short Message Service (D) Global Positioning System 46. A complete microcomputer system consists of (A) Microprocessor Memory Peripheral equipment J-87-12 7 Paper-II CPU chip (D) Memory chip 48. Pipelining strategy is called implement (A) instruction execution instruction prefetch instruction decoding (D) instruction manipulation 49. Which of the following data structure is linear type? (A) Strings Lists Queues 50. To represent hierarchical relationship between elements, which data structure is suitable? (A) Dequeue Priority Tree

Space For Rough Work Paper-II 8 J-87-12