Saturday, May 20, 2017

TNSET 2016 COMPUTER SCIENCE QUESTIONS WITH ANSWER KEY


1.      The NOR function is the dual of
A.    AND function
B.     OR function
C.     XOR function
D.    NAND function
2.      The NOT operation is obtained by using one input
A.    AND gate
B.     OR gate
C.     NAND gate
D.    NOR gate
3.      The instruction, MOV AX,[BX] is an example of
Direct addressing mode
Register addressing mode
Register relative addressing mode
Register indirect addressing mode
4.      To address a memory location out of N memory locations, the number of address lines required is
Log N (to the base 2)
Log N (to the base 10)
Log N (to the base e)
Log (2N) (to the base 2)
5.      In 8086 microprocessor the following has the highest priority among all type interrupts
A.    NMI
B.     DIV 0
C.     TYPE 255
D.    OVER FLOW
6.      …………………. Is set if there is any carry out from lower nibble to higher nibble
A.    Auxiliary carry
B.     Carry flag
C.     Carry Auxiliary flag
D.    Parity flag

7.      How many flip – flop circuits are needed to divide by 16?
A.    2
B.     4
C.     8
D.    16
8.      A decimal counter has …………….. states
A.    5
B.     10
C.     15
D.    20
9.      In PL/SQL, which part contains the condition section?
A.    Executable commands
B.     Exception handling
C.     Declaration
D.    Result part
10.  In magnetic disk the surface of the platter is divided into ………………..
A.    Sectors
B.     Cylinders
C.     Tracks
D.    Blocks
11.  In shadow database, which will help to point out the current consistent copy of the database?
A.    Pointer
B.     Db-pointer
C.     Dp-pointer
D.    Bd-pointer
12.  ………………… property will check whether all the operation of a transaction completed or none
A.    Atomicity
B.     Consistency
C.     Isolation
D.    Durability
13.  In a ……………….. index, an index entry appears for every search – key value in the file
A.    Dense
B.     Sparse
C.     Hash
D.    Ordered
14.  Which one of the following is used to define the structure of the relation, deleting relations and relating schema?
A.    DML (Data Manipulation Language)
B.     DDL (Data Definition Language)
C.     Query
D.    Relational Schema
15.  The EXIST keyword will be true if
A.    Any row in the sub query meets the condition only
B.     All rows in the sub query fail the condition only
C.     Both of these two conditions are meeting
D.    Neither of these two conditions is met
16.  Which system table contains information on constraints on all the tables created?
A.    USER_CONSTRAINTS
B.     CLIENT_CONSTRAINTS
C.     DOMAIN_CONSTRAINTS
D.    KEY_CONSTRAINTS
17.  Which of the following Is the 1’s Complement of 10?
A.    01
B.     110
C.     11
D.    10
18.  Fractals deals with curves that are
A.    Irregularly irregular
B.     Regularly irregular
C.     Irregularly regular
D.    Regularly regular
19.  Aspect ratio means
A.    Number of pixels
B.     Ratio of vertical points to horizontal points
C.     Ratio of horizontal points to vertical points
D.    Both (B) and (C)
20.  One of a class storage device devices that can access storage location in any order is
A.    DTE
B.     DASD
C.     DDE
D.    DSE
21.  A technique used by codes to convert an analog signal into a digital bit stream is known as
A.    Pulse code modulation
B.     Pulse stretcher
C.     Query processing
D.    Queue management
22.  The octal equivalence of 111010 is
A.    81
B.     72
C.     71
D.    None of these
23.  Which of the following registers is loaded with the contents of the memory location pointed by the PC?
A.    Memory address register
B.     Memory data register
C.     Instruction registers
D.    Program Counter
24.  The rectangle portion of the interface window that defines where the image will actually appear are called
A.    Transformation viewing
B.     View port
C.     Clipping window
D.    Screen coordinate system
25.  The …………………… algorithm divides a 2D space into 9 regions, of which only the middle part (View part) is visible
A.    Cohen – Sutherland
B.     Laing Barsky
C.     Sutherland Hodegeman
D.    N-L-N
26.  Which of the following type of class allows only one object of its type to be created?
A.    Virtual class
B.     Abstract class
C.     Singleton class
D.    Friend class
27.  Which of the following statements is correct?
A.    Base class pointer cannot point to derived class
B.     Derived class point cannot point to base class
C.     Pointer to derived class cannot be created
D.    Point to base class cannot be created
28.  Point to base class cannot be created A ……………… is a data structure containing a record for each identifier, with fields for the attribute for the identifier
A.    Table
B.     Open file table
C.     Symbol table
D.    Lexical analyzer
29.  Which are the analyses that are not grouped into one pass?
A.    Lexical
B.     Syntax
C.     Semantic
D.    Code optimizer
30.  The symbol that denotes an empty string is ………………
A.    {ε}
B.     E
C.     {θ}
D.    {}
31.  The output form YACC is
A.    LALR parser
B.     LLLR parser
C.     LLAR parser
D.    LRLR parser
32.  Which of these is most frequently accessed table?
A.    OPTAB
B.     SYMTAB
C.     LITTAB
D.    None of the above
33.  Each entity in linked list organization contains a …………… pointer field
A.    Single
B.     Double
C.     Triple
D.    Quadruple
34.  Which of the following is not a digital to analog conversion?
A.    ASK
B.     PSK
C.     FSK
D.    AM
35.  If QAL, both ………………… of a carrier frequency are varied
A.    Frequency and amplitude
B.     Phase and frequency
C.     Amplitude and phase
D.    None of these
36.  Which layer of OSI reference mode uses the ICMP (Internet Control Message Protocol)?
A.    Transport layer
B.     Data link layer
C.     Network layer
D.    Application layer
37.  Which of the following IP address class is a multicast address?
A.    Class A
B.     Class B
C.     Class C
D.    Class D
38.  Analog to analog conversion is needed if the available bandwidth is
A.    Low-pass
B.     Band-pass
C.     Either (A) or (B)
D.    None of these
39.  IP version 6 has …………………. Addresses
A.    32 bit
B.     64 bit
C.     128 bit
D.    256 bit
40.  Error control is needed at the transport layer because of potential errors occurring
A.    From transmission line noise
B.     In routine
C.     From out of sequence delivery
D.    From packet losses
41.  Number of binary trees formed with 5 nodes are
A.    32
B.     36
C.     120
D.    42
42.  Which of the following data structure data structure is non-linear type?
A.    Strings
B.     Lists
C.     Stack
D.    None of these
43.  The depth of a complete binary tree is given by
A.    Dn=n log 2n
B.     Dn=n log 2n+1
C.     Dn=log 2 n
D.    Dn = log2n+1
44.  The post traversal of a binary tree is DEBFCA. Find out the pre order traversal.
A.    ABFCDE
B.     ADBFEC
ABDECF
ABDCEF
45.  The data structure required for breadth first traversal on a graph is
A.    Queue
B.     Stack
C.     Array
D.    Tree
46.  Which of the following algorithm can be used efficiently calculate single source a shortest paths in a directed acyclic graph?
A.    Dijkstra
B.     Bellman-ford
C.     Topological sort
D.    Strongly connected component
47.  Let G be the non – planner graph with minimum possible number of edged. The G has
A.    9 edges and 5 vertices
B.     9 edges and 6 vertices
C.     10 edges and 5 vertices
D.    10 edges and 6 vertices
48.  Which of the following are java reserved words?
Run
Import
Default
Implement
A.    (1)and (2)
B.     (2)and (3)
C.     (3)and (4)
D.    (2)and (4)
49.  Choose the correct HTML tag for the largest heading
A.    <h1>
B.     <heading>
C.     <head>
D.    <h1>
50.  Which is a perfect example of runtime polymorphism?
A.    Method overloading
B.     Method overriding
C.     Constructor overloading
D.    None of the above
51.  <INPUT> is
A.    Formatting tag
B.     Empty tag
C.     Both (A) and (B)
D.    None of these
52.  The tags elements in XML are
A.    Case –insensitive
B.     Case – sensitive
C.     Browser dependent
D.    None of these
53.  Which of the following is the most commonly used http methods?
A.    PRE and POST
B.     GET and SET
C.     ASK and REPLY
D.    GET and POST
54.  The error distribution in the case of coding is
A.    10%
B.     20%
C.     40%
D.    50%
55.  The model which estimates the total effort in terms of person, months of the technical project staff is
A.    Spiral
B.     Waterfall model
C.     Prototyping
D.    COCOMO model
56.  A program P calls two sub programs P1 and P2. P1 can fail 50% times and P2 can fail 40% times. Then P can fail
A.    50%
B.     60%
C.     10%
D.    70%
57.  …………. Coupling is the worst type of coupling
A.    Data
B.     Content
C.     Control
D.    Stamp
58.  The map definition file is generally stored in
A.    RECYCLE BIN
B.     BIN
C.     CGI – BIN
D.    None of the above
59.  Cyclomatic complexity method comes under in ………… testing method
A.    White box
B.     Black box
C.     Green box
D.    Yellow box
60.  What is noise in terms of software development?
A.    Adding contradictory requirements in SRS document
B.     Writing over-specific requirements
C.     Writing irrelevant statement to the software development in the SRS document
D.    None of the above
61.  Let an instruction takes I ms and page fault takes an additional j ms. If the average page fault occurs after K instructions the effective instruction effective instruction execution time will be
A.    (i+j*k)ms
B.     ((i+j)/k)ms
C.     (i+j/k)ms
D.    (i+2*j/l)ms
62.  Given n processes to be scheduled on one processor, how many possible different schedules are there?
A.    n-1
B.     n
C.     n2
D.    n!
63.  Spin lock is
A.    The time wasted by the context switching
B.     The cycle wasted by the while statement in wait operation of a semaphore
C.     The time wasted by the process in the ready queue
D.    None of these
64.  Which of the following operating system does not implement the multitasking?
Windows 98
Windows NT
MSDOS
Windows XP
65.  When device A has a cable that plugs into device B, and device B has a cable that plugs into device C and device C plugs into a port on the computer, this arrangement is called
A.    Bus
B.     Cable
C.     Port
D.    Daisy chain
66.  With a single resource, deadlock occurs
A.    If there are more than two processes competing for that resource
B.     If there are only two processes competing for that resource
C.     If there is a single process competing for that resource
D.    None of these
67.  What are the limitations of the semantics network?
A.    Intractability
B.     Incomplete
C.     Lack in expressing some of the properties
D.    Both (A) and (C)
68.  General algorithm applied on game tree for making decision of win/lose is
A.    DFS/BFS search algorithms
B.     Heuristic search algorithms
C.     Greedy search algorithms
D.    MIN/MAX algorithms
69.  Recursive transition network (RTN) is used to represent the rules of
A.    Context free grammar
B.     Regular grammar
C.     Recursive grammar
D.    Both (B) and (c)
70.  Internet like networks between a company and its business partners is called
A.    Intranet
B.     Extranet
C.     Fishnet
D.    Internetworks
71.  A* search uses
A.    A heuristic do decide what is the “best” way to go
B.     The sum of the path do far and the heuristic to estimate the path left
C.     The difference of the path so far and the heuristic to estimate the path left
D.    Both (A) and (B)
72.  Which of the following algorithm is online search algorithm?
A.    Breadth – first search algorithm
B.     Depth – first search algorithm
C.     Hill – climbing search algorithm
D.    None of the mentioned
73.  The first AI programming language is
A.    BASIC
B.     FORTRAN
C.     IPL
D.    LISP
74.  …………………… is one of the brute force search technique
A.    Depth first search
B.     Heuristic search
C.     Best first search
D.    Beam search
75.  Computer chess playing programs have to deal with a major problem called
A.    Horizon effect
B.     Corner effect
C.     Vertical effect
D.    Effect


ANSWER KEY :-

Q.No

Ans

Q.No

Ans

Q.No

Ans

Q.No

Ans

Q.No

Ans

1

D

16

A

31

A

46

C

61

C

2

C

17

A

32

B

47

B

62

D

3

D

18

B

33

A

48

B

63

B

4

A

19

D

34

D

49

D

64

C

5

A

20

B

35

C

50

B

65

D

6

A

21

A

36

C

51

B

66

D

7

B

22

B

37

D

52

B

67

C

8

B

23

C

38

B

53

D

68

D

9

A

24

B

39

C

54

B

69

A

10

C

25

A

40

B

55

D

70

B

11

B

26

C

41

D

56

D

71

D

12

A

27

B

42

D

57

B

72

C

13

A

28

C

43

D

58

C

73

D

14

B

29

D

44

C

59

A

74

A

15

A

30

A

45

A

60

C

75

A

 


No comments: