Wednesday, May 17, 2017

TNSET 2016 COMPUTER SCIENCE PAPER 2 QUESTIONS WITH ANSWER KEY

1.      Let R be a symmetric and transitive relation on a Set A. then
A.    R is reflective and hence a partial order
B.     R is reflective and hence an equivalence relation
C.     R is not reflective and hence not an equivalence relation
D.    None of the Above
2.      Pigeonhole principle states that A→B and |A|>|B| then
A.    F is not onto
B.     F is not one to one
C.     F is neither one – one nor onto
D.    F may be one – one
3.      If a pair of dice is thrown then the probability of getting a total of 5 or 11 is
A.    1/18
B.     1/9
C.     1/6
D.    1/5
4.      Which of the following conversion is not possible (Algorithmically)?
A.    Regular grammar to context – free grammar
B.     Non deterministic FSA to Deterministic FSA
C.     Non deterministic PDA to Deterministic PDA
D.    Non deterministic TM to Deterministic TM
5.      Recursively enumerable language are not closed under
A.    Union
B.     Intersection
C.     Complementation
D.    Concatenation
6.     
TNSET 2016
7.      Interval between the time of submission and completion of the job is called
A.    Waiting time
B.     Turnaround Time
C.     Throughput
D.    Response Time
8.      Consider the statement, either -2≤x≤-1 or 1≤x≤2*. The negation of the statement is
A.    x<-2 or 2<x or -1<x<1
B.     x<-z or 2<x
C.     -1<x<1
D.    -2<x<2
9.      Which of the following statements is FALSE?
TNSET 2016 COMPUTER SCIENCE QUESTION


10.  Which logic family combines the advantage of CMOS and TTL?

A.    BiCMOS
B.     TTL/CMOS
C.     ECL
D.    TTL/MOS
11.  Null Character needs a space of
A.    Zero bytes
B.     One byte
C.     Three byte
D.    Four byte
12.  What is the result of the expression (1and 2)+(3/4)?
A.    1
B.     2
C.     3
D.    0
13.  The correct way to round off a floating number x to an integer value is
A.    y=(int)(x+0.5)
B.     y=int(x+0.5)
C.     y=(int)x+0.5)
D.    y=(int)((int)x+0.5)
14.  A pointer to the base class can hold address of
A.    Only base class object
B.     Only derived class object
C.     Base class objects as well as derived class object
D.    None of these
15.  Which feature in OOP allows reusing code?
A.    Polymorphism
B.     Network Schema
C.     Relational Schema
D.    Database Schema
16.  A top-to-bottom relationship among the items in a database is established by a
A.    Hierarchical Schema
B.     Network Schema
C.     Relational Schema
D.    Database Schema
17.  The weak entities and their identifying relationship in the ER diagram are represented by
A.    Oval Shape with double line
B.     Rectangle shape with double line
C.     Square shape with double line
D.    Diamond shape with double line
18.  In ODBC, a data source that is local to a single computer is called a
A.    System data source
B.     File data source
C.     User data source
D.    SQL text file
19.  The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is
A.    B-Tree file
B.     Hashed file
C.     Indexed file
D.    Sequential file
20.  In SQL, Which of the following is not a data definition language commands?
A.    RENAME
B.     REVOKE
C.     GRANT
D.    UPDATE
21.  Which of the sorting algorithm has the worst complexity of n log n?
A.    Heap sort
B.     Quick sort
C.     Insertion sort
D.    Selection sort
22.  The postfix equivalent of the prefix *+ab-cd is
A.    ab-cd-*
B.     abcd+-*
C.     ab+cd*-
D.    ab+-cd*
23.  The depth of a complete binary tree with ‘n’ nodes is (log is to the base two)
A.    Log(n+1)-1
B.     Log(n)
C.     Lon(n-1)+1
D.    Log(n)+1
24.  The complexity of merge sort algorithm is
A.    O(n)
B.     O(n2)
C.     O(log n) D
D.    O(n log n)
25.  Let G be a graph with 100 vertices numbered 1 to 100. Two vertices I and j are adjacent If |i-j|=8 or |i-j|-12. The number of connected components in G is
A.    4
B.     8
C.     12
D.    25
26.  Class B IP address has ………………. Network addresses and …………….. Host addresses
A.    214,216-2
B.     216,214-2
C.     27-2,224-2
D.    224,27-2
27.  In a fiber optical cable, the transmitted power is 400MW and the receiver power is 200MW then the attenuation of the signal is
A.    2dB
B.     3 dB
C.     6 dB
D.    8 Db
28.  The wavelength of 1000MHz waves are
A.    0.3 Meter
B.     3.0 Meter
C.     30 Meter
D.    300 Meter
29.  The key size which is not applicable in AES algorithm is
A.    64
B.     128
C.     192
D.    256
30.  TCP port 79 is for
A.    Telnet
B.     Finger protocol
C.     SNA gateway
D.    DNS
31.  Assembly language programs are written using
A.    Hex code
B.     Mnemonics
C.     ASCII code
D.    Binary language
32.  How many memory locations are required to store the instructions LXIH,800H in an 8085 Assembly language program?
A.    1
B.     2
C.     3
D.    4
33.  Which one of the following is not a type of Assembler?
A.    One pass
B.     Two pass
C.     Three pass
D.    Load and Go
34.  The output from YACC is
A.    LALR Parser
B.     LLLR Parser
C.     LLAR Parser
D.    LRLR Parser
35.  Predictive parsers can be?
A.    Recursive
B.     Constructive
C.     Non Recursive
D.    Non Constructive
36.  Which one of the following is not true?
A.    Kernel is the program that constitutes the central core of the operating system
B.     Kernel is the first part of operating system to load into memory during booting
kernel is made of various modules which cannot be loaded in running operating system
C.     Kernel remain in the memory during the entire computer session
37.  By operating system, the resource management can be done via
A.    Time division Multiplexing
B.     Space division Multiplexing
C.     Both (A) and (B)
D.    None of the above
38.  In Unix, which system call creates the new process?
A.    Fork
B.     Create
C.     New
D.    None of the mentioned
39.  What is the ready state of a process?
A.    When process is scheduled to run after some execution
B.     When process is unable to run until some task has been completed
C.     When process is using the CPU
D.    None of the mentioned
40.  The banker’s algorithm is used
A.    To rectify deadlock
B.     To detect deadlock
C.     To prevent deadlock
D.    To solve deadlock
41.  Which of the following software lifecycle model is characterized by sequential execution of project phases?
A.    Waterfall model
B.     Spiral Model
C.     Rapid Application Development (RAD) Model
D.    Agile Model
42.  What is the final outcome of the requirement analysis and specification phase?
A.    Drawing the data flow diagram
B.     The SRS Diagram
C.     Coding the project
D.    The user manual
43.  Which of the following is the drawback of Linear Sequential Model?
A.    Time Consuming
B.     Changes can cause confusion
C.     Both (A) and (B)
D.    None of the above
44.  Which of the following model put much more emphasis on testing?
A.    Waterfall Model
B.     Agile Model
C.     Rapid Application development model
D.    V-V model
45.  In V Model, why test cases are created before code?
A.    To gain the confidence in the system
B.     To find defects during dynamic testing
C.     To meet Project deadline
D.    TO prevent propagation of defect in next level
46.      E-Commerce infrastructure
A.    Web Servers
B.     E-Catalogs
C.     Network
D.    All of these
47.      Which one of the following authentication method is used by SSH?
A.    Public key
B.     Host based
C.     Password
D.    All of the above
48.      FDDI is a
A.    Ring Network
B.     Star Network
C.     Mesh Network
D.    All of these
49.      Network cable lies on …………. Layer
A.    Application
B.     Network
C.     Physical
D.    Data Link
50.      Which is the method is used for classification in data mining?
A.    Descriptive pattern
B.     Associations
C.     Decision Tree Classifiers
D.    Regression



ANSWER KEY:-

Q.No

Ans

Q.No

Ans

Q.No

Ans

Q.No

Ans

Q.No

Ans

1

D

11

B

21

A

31

B

41

A

2

B

12

D

22

A

32

B

42

B

3

C

13

A

23

A

33

C

43

A

4

C

14

C

24

D

34

A

44

D

5

C

15

B

25

A

35

A

45

D

6

A

16

A

26

A

36

C

46

D

7

B

17

D

27

B

37

C

47

D

8

A

18

A

28

A

38

A

48

A

9

A

19

B

29

A

39

A

49

C

10

A

20

D

30

B

40

C

50

C

 



No comments: