Sie sind auf Seite 1von 13

CET (PG)2013

Question Booklet Series : A/B/C/D Sr. No. :


Important : Please consult your Admit Card / Roll No. Slip before filling your Roll Number on the Test Booklet
and Answer Sheet.
Roll No. In Figures In Words In Words

O.M.R. Answer Sheet Serial No.


Signature of the Candidate :
Subject : M.Sc.(Hons. School)Computer Science
Time : 90 minutes Number of Questions : 75 Maximum Marks : 75

DO NOT OPEN THE SEAL ON THE BOOKLET UNTIL ASKED TO DO SO


INSTRUCTIONS
1. Write your Roll No. on the Question Booklet and also on the OMR Answer Sheet in the space provided
and nowhere else.
2. Enter the Subject and Series Code of Question Booklet on the OMR Answer Sheet. Darken the corresponding
bubble with Black Ball Point /Black Gel pen.
3. Do not make any identification mark on the Answer Sheet or Question Booklet.
4. To open the Question Booklet remove the paper seal (s) gently when asked to do so.
5. Please check that this Question Booklet contains 75 questions. In case of any discrepancy, inform the
Assistant Superintendent within 10 minutes of the start of test.
6. Each question has four alternative answers (A, B, C, D) of which only one is correct. For each question,
darken only one bubble (A or B or C or D), whichever you think is the correct answer, on the Answer Sheet
with Black Ball Point / Black Gel pen.
7. If you do not want to answer a question, leave all the bubbles corresponding to that question blank in the
Answer Sheet. No marks will be deducted in such cases.
8. Darken the bubbles in the OMR Answer Sheet according to the Serial No. of the questions given in the
Question Booklet.
9. Negative marking will be adopted for evaluation i.e., 1/4th of the marks of the question will be deducted for each
wrong answer. A wrong answer means incorrect answer or wrong filling of bubble.
10. For calculations, use of simple log tables is permitted. Borrowing of log tables and any other material is not allowed.
11. For rough work only the sheets marked Rough Work at the end of the Question Booklet be used.
12. The Answer Sheet is designed for computer evaluation. Therefore, if you do not follow the instructions
given on the Answer Sheet, it may make evaluation by the computer difficult. Any resultant loss to the
candidate on the above account, i.e., not following the instructions completely, shall be of the
candidate only.
13. After the test, hand over the Question Booklet and the Answer Sheet to the Assistant Superintendent on duty.
14. In no case the Answer Sheet, the Question Booklet, or its part or any material copied/noted from this
Booklet is to be taken out of the examination hall. Any candidate found doing so, would be expelled from
the examination.
15. A candidate who creates disturbance of any kind or changes his/her seat or is found in possession of any
paper possibly of any assistance or found giving or receiving assistance or found using any other unfair
means during the examination will be expelled from the examination by the Centre Superintendent /
Observer whose decision shall be final.
16. Telecommunication equipment such as pager, cellular phone, wireless, scanner, etc., is not
permitted inside the examination hall. Use of calculators is not allowed.
M.Sc. (Hons. School)Computer Science/BZL/48988-A 2
M.Sc. (Hons. School)Computer Science/A
1. The binary addition of 1+1+1+1 is :
(A) 111 (B) 100
(C) 101 (D) 110
2. The binary equivalent of the decimal number 25 is :
(A) 00011001 (B) 00011010
(C) 00110110 (D) 01101010
3. The decimal number 15.6782 can be represented in the floating point notation as :
(A) 0.156782E-02 (B) -0.156782E02
(C) -0.156782E-02 (D) 0.156782E02
4. The speed of CPU in personal computers today is about :
(A) 2 GHz (B) 2 KHz
(C) 10 MHz (D) 500 Hz
5. What is the Hamming distance among the following code words ?
0011 1100 1111 0000
(A) 3 (B) 1
(C) 2 (D) 4
6. Which of the following is a positive number represented in the signed magnitude
notation ?
(A) 1000 0110 (B) 1111 0011
(C) 0100 0000 (D) 1110 0000
7. RAID is :
(A) Virtualization of hard disks (B) An operating system
(C) A programming language (D) A processor
8. The time complexity to find a specific element in a linked list with n nodes is :
(A) O(1) (B) O(n2)
(C) O(log n) (D) O(n)
9. Which of the following statements is true ?
(A) Records stored in a random access file must be the same size
(B) The data on a tape can be accessed with sequential and random access
(C) In a hash table the cost for each look up is dependent on the number of elements stored in the
table
(D) Indexes are not used in relational databases
M.Sc. (Hons. School)Computer Science/BZL/48988-A 3 [Turn over
10. A hash table associates keys to values using :
(A) Constant function (B) Algorithm
(C) Predefined table values (D) Randomly generated values
11. Which of the following is an intelligent peripheral interface standard ?
(A) AGP (B) SCSI
(C) RS-232 (D) RJ25
12. Latency is measured in :
(A) Mbps (B) Gigabyte
(C) GHz (D) Milliseconds
13. IEEE 802.11 standard is used for :
(A) Wireless local area network (B) Mobile broadband wireless access
(C) Ethernet (D) Broadband wireless access
14. The protocol used to retrieve email from a remote server is :
(A) FTP (B) UDP
(C) POP3 (D) HTTP
15. Which of the following is not a part of software maintenance ?
(A) Improving the performance of the software (B) Correcting errors
(C) Validating the software (D) Enhancing the software
16. In MS-PowerPoint presentation software, the slide sorter view allows to :
(A) view slides (B) delete slides
(C) interchange slides (D) all or any of view, cut, copy and paste slides
17. A circle if scaled in only one dimension becomes :
(A) Parabola (B) Ellipse
(C) Hyperbola (D) Sphere
18. Which of the following is the largest in size ?
(A) Petabyte (B) Terabyte
(C) Gigabyte (D) Megabyte
19. What is the full form of USB ?
(A) Universal server bus (B) Universal service bus
(C) Universal serial bus (D) Unlimited serial bus

M.Sc. (Hons. School)Computer Science/BZL/48988-A 4


20. Which of the following statements is false ?
(A) A single sided, single-layer, 12 cm diameter DVD disc typically holds 4.7 GB of data
(B) A smart card contains a chip and other circuitry into which data can be stored
(C) A computer with a C drive and a D drive must have two physical hard drives
(D) External hard drives can be connected using USB port
21. Which display technology is more commonly used in portable computers ?
(A) Touch screen (B) CRT
(C) LED (D) LCD
22. Which of the following is a pen based input device ?
(A) Keyboard (B) Stylus
(C) Joystick (D) Mouse
23. Which of the following is incorrect ?
(A) Linux can be used on PCs, mainframe and supercomputers
(B) Operating system is a software that manages the resources of a computer
(C) UNIX cannot be used for networking computers
(D) Grep command in UNIX is used to find the matching text in a file
24. A widely used communications protocol for local area networks is :
(A) SMTP (B) Ethernet
(C) IMAP (D) TCP/IP
25. Internet service that transmits data over standard telephone network is :
(A) DSL (B) ISDN
(C) Cable (D) Satellite
26. (5, 8) is a point on the circle with centre at the origin. Which of the following points is also
on the circle ?
(A) (8, 5) (B) (8, 5)
(C) (5, 8) (D) (10, 16)
27. The clarity of an image displayed on a monitor depends on :
(A) Aspect ratio (B) Frame buffer size
(C) Input image (D) Resolution

M.Sc. (Hons. School)Computer Science/BZL/48988-A 5 [Turn over


28. Let r be the radius of a circle. The angle made by an arc of length r at the centre of the
circle is :
(A) 30 degrees (B) 45 degrees
(C) one radian (D) one degree
29. Given three non collinear points, which of the following can be drawn touching the three
points ?
(A) Straight line (B) Circle and triangle
(C) Only circle (D) Only triangle
30. The column of a table is referred to as :
(A) Attribute (B) Tuple
(C) Entity (D) Relation
31. Which of the following relationships is true for employees and manager ?
(A) One to one (B) One to many
(C) Many to many (D) Many to one
32. The data-flow diagram depicts :
(A) Only flow of data (B) Only processing aspects
(C) Only storage aspects (D) Both processing aspects and flow of data
33. Which of the following is not a compressed file format ?
(A) JPG (B) MP3
(C) WAV (D) GIF
34. If integer needs two bytes of storage, the maximum value of an unsigned integer is :
(A) 216 (B) 216 1
(C) 215 1 (D) 215
35. If A is an integer type, then the expression 2 * (A 7) / 9 and (A 7) / 9 * 2 results in :
(A) same value (B) different value
(C) may or may not be the same (D) error
36. The statement printf ( %f , 9/5); prints :
(A) 1.0 (B) 1.8
(C) 2.0 (D) garbage

M.Sc. (Hons. School)Computer Science/BZL/48988-A 6


37. What is the result of the following program segment ?
for (i=1; i<5; i++)
if (i= =3) continue;
else printf (%d, i);
(A) 1 2 4 (B) 1 2 3 4
(C) 1 2 3 4 5 (D) 1 2 4 5
38. 5 << 3 is evaluated in C language to :
(A) 15 (B) 40
(C) 1.66 (D) 0.625
39. In object oriented programming, a class derived from more than one of the existing classes
is known as :
(A) Multilevel inheritance (B) Overloading
(C) Multiple inheritance (D) Data hiding
40. Which of the following operators cannot be overloaded in C ++ ?
(A) + = (B)
(C) * = (D) : :
41. Which of the following statements is incorrect ?
(A) A Java program is converted into class file called Byte code
(B) A Java source file must have Java extension
(C) A variable in Java can be an unsigned integer
(D) goto and const are the two reserved keywords in Java
42. Which method in Java is invoked by a thread to return to the waiting state ?
(A) yield ( ) (B) sleep ( )
(C) run ( ) (D) start ( )
43. Consider the following array declaration in C language.
int A[4][2] = {231, 67, 265, 22, 781, 288, 145, 89}
The element 288 is at location :
(A) row 2 and column 2 (B) row 2 and column 3
(C) row 2 and column 1 (D) row 3 and column 2

M.Sc. (Hons. School)Computer Science/BZL/48988-A 7 [Turn over


44. In C language, if S is an array of size 5, the address of third location is :
(A) S+3 (B) S+2
(C) S+5 (D) S+1
45. If p is a pointer variable, the expression to increment the value pointed to by p is :
(A) *p (B) (*p) ++
(C) p+1 (D) p
46. If p is pointing to a linked list with link as the link field, the address of the fourth node in
the linked list in terms of p and link is :
(A) plinklinklink (B) plink
(C) plinklink (D) plinklinklinklink
47. The initial configuration of a stack is (a, b, c, d) where a is the top element of the stack.
To get the configuration (c, a, b, d), the number of deletions and additions required
respectively are :
(A) (3, 2) (B) (2, 3)
(C) (3, 4) (D) (3, 3)
48. Suppose A is a linear array (5:60) and the base address is 500. The address of AA(20)
is :
(A) 514 (B) 525
(C) 515 (D) 516
49. Worst case complexity of quick sort algorithm to sort n numbers is :
(A) n*n (B) n*log n
(C) n (D) log n
50. Best case complexity of binary search algorithm to search for an element in N numbers
is :
(A) log n (B) 1
(C) n (D) n log n
51. Assuming root is at level 1, the number of nodes in a binary tree of depth k is :
(A) 2k (B) 2k1
(C) 2k + 1 (D) 2k 1
52. In Java which keyword is used to enable one class to inherit from another class ?
(A) Inherit (B) Extends
(C) Derived (D) Import

M.Sc. (Hons. School)Computer Science/BZL/48988-A 8


53. Which of the following operators cannot be performed on pointers in C ?
(A) Subtraction of a number from the pointer (B) Subtraction of one pointer from another
(C) Addition of two pointers (D) Addition of a number to a pointer
54. Which of the following is not a header file in C ?
(A) ctype.h (B) string.h
(C) stdlib.h (D) type.h
55. Consider the operation of addition. For two numbers the operation would produce a sum.
If the operands are strings, the same operation would produce a concatenated string.
This feature is known as :
(A) Polymorphism (B) Encapsulation
(C) Inheritance (D) Dynamic binding
56. In OSI network model, routing is done in which layer ?
(A) Session (B) Network
(C) Data link (D) Transport
57. In OSI network model, encryption and decryption are functions which layer ?
(A) Data link (B) Network
(C) Presentation (D) Transport
58. Which of the following is not a filter in UNIX ?
(A) cat (B) grep
(C) sort (D) wc
59. Which UNIX command writes arguments to the standard output of the shell ?
(A) cat (B) echo
(C) nice (D) ls
60. The purpose of time command in UNIX is :
(A) Display current date and time (B) Display current time
(C) Display execution time of a command (D) Display execution time of a C program
61. What will be the output of the following C language statement ?
printf (%c, 100);
(A) 100 (B) Garbage
(C) Hexadecimal value of 100 (D) ASCII value of 100

M.Sc. (Hons. School)Computer Science/BZL/48988-A 9 [Turn over


62. What will be the output of the following C code ?
for (i=3; i<15; i+ = 3);
printf (%d, i);
(A) 15 (B) A syntax error
(C) 3 6 9 12 (D) Execution error
63. What will be printed as a result of the following C code ?
int a =8, *b = &a;
printf (%d, a * b);
(A) 64 (B) Error message
(C) Garbage (D) 8
64. Which of the following statements is correct ?
(A) Every function is a relation
(B) Every relation is a function
(C) Function and relation are independent
(D) Function and relation are synonyms
65. Which of the following statements is false ?
(A) Prototyping is adopted if information requirements are not well defined
(B) Data dictionary contains data about data
(C) Data dictionary and data store are the same
(D) Economic feasibility is part of the feasibility study phase
66. TRUNCATE TABLE statement in SQL belongs to :
(A) DML (B) DDL
(C) DCL (D) DML and DDL
67. Which of the following is not a measure of software quality ?
(A) Reliability (B) Maintainability
(C) Security (D) Accessibility
68. While editing a document, another document is being printed. This is an example of :
(A) Multiprocessing (B) Multiprogramming
(C) Multitasking (D) Timesharing

M.Sc. (Hons. School)Computer Science/BZL/48988-A 10


69. Which of the following is a DOS internal command ?
(A) SORT (B) PRINT
(C) XCOPY (D) MEM
70. The postfix equivalent of the infix expression P*Q(R+S) is :
(A) PQ * RS + (B) PQ RS * +
(C) PQ* + RS (D) PQ* RS +
71. Let S be the standard deviation of N numbers. If each of the N numbers is multiplied by
a constant C, then the new standard deviation will be :
(A) S (B) C * S
(C) S/C (D) C*C *S
72. Suppose A is a square matrix of order N with determinant value 5. If all the elements are
multiplied by 2, its determinant value becomes 40. The value of N is :
(A) 2 (B) 4
(C) 3 (D) 5
73. The maximum degree of any vertex in a simple graph with n vertices is :
(A) n (B) n+1
(C) 2n1 (D) n1
74. Which of the following commands can be used to print a file in UNIX ?
(A) print (B) lp
(C) prn (D) pr
75. Which of the following traversal techniques lists the nodes of a binary search tree in
ascending order ?
(A) Post-order (B) Any order
(C) Pre-order (D) In-order

M.Sc. (Hons. School)Computer Science/BZL/48988-A 11


ROUGH WORK

M.Sc. (Hons. School)Computer Science/BZL/48988-A 12 248


Panjab University, Chandigarh
CET(PG)-2013
ANSWERS / KEY
Subject: MSc(HS)(Computer Science)
Booklet Series Code: A
1 2 3 4 5 6 7 8 9 10
B A B A C C A D A B

11 12 13 14 15 16 17 18 19 20
B D A C C D B A C C

21 22 23 24 25 26 27 28 29 30
D B C B A X D C B A

31 32 33 34 35 36 37 38 39 40
D D C B C D A B C D

41 42 43 44 45 46 47 48 49 50
C B C B B A D X A B

51 52 53 54 55 56 57 58 59 60
D B C D A B C A B C

61 62 63 64 65 66 67 68 69 70
D A B A C B D C D A

71 72 73 74 75
B C D B D

Note: An 'X' in the key indicates that either the question is ambiguous or it has
printing mistake. All candidates will be given credit for this question.

Page 22

Das könnte Ihnen auch gefallen