s-87-13-ii (computer science & applications)

8
Number of Pages in this Booklet : 8 Number of Questions in this Booklet : 50 S-87-13 1 P.T.O. [Maximum Marks : 100 PAPER-II COMPUTER SCIENCE AND APPLICATIONS (To be filled by the Candidate) Signature and Name of Invigilator OMR Sheet No. : ............................................... Roll No. (In words) 1. (Signature) __________________________ (Name) ____________________________ 2. (Signature) __________________________ (Name) ____________________________ Roll No.________________________________ (In figures as per admission card) Time : 1 1 / 4 hours] 87 S 1 3 1. Write your roll number in the space provided on the top of this page. 2. This paper consists of fifty multiple-choice type of questions. 3. At the commencement of examination, the question booklet will be given to you. In the first 5 minutes, you are requested to open the booklet and compulsorily examine it as below : (i) To have access to the Question Booklet, tear off the paper seal / polythene bag on the booklet. Do not accept a booklet without sticker-seal / without polythene bag and do not accept an open booklet. (ii) Tally the number of pages and number of questions in the booklet with the information printed on the cover page. Faulty booklets due to pages/questions missing or duplicate or not in serial order or any other discrepancy should be got replaced immediately by a correct booklet from the invigilator within the period of 5 minutes. Afterwards, neither the Question Booklet will be replaced nor any extra time will be given. (iii) After this verification is over, the OMR Sheet Number should be entered on this Test Booklet. 4. Each item has four alternative responses marked (A), (B), (C) and (D). You have to darken the circle as indicated below on the correct response against each item. Example : where (C) is the correct response. 5. Your responses to the items are to be indicated in the OMR Sheet given inside the Paper I Booklet only. If you mark at any place other than in the circle in the OMR Sheet, it will not be evaluated. 6. Read instructions given inside carefully. 7. Rough Work is to be done in the end of this booklet. 8. If you write your Name, Roll Number, Phone Number or put any mark on any part of the OMR Sheet, except for the space allotted for the relevant entries, which may disclose your identity, or use abusive language or employ any other unfair means, you will render yourself liable to disqualification. 9. You have to return the original OMR Sheet to the invigilators at the end of the examination compulsorily and must not carry it with you outside the Examination Hall. You are however, allowed to carry duplicate copy of OMR Sheet on conclusion of examination. 10. Use only Blue/Black Ball point pen. 11. Use of any calculator or log table etc., is prohibited. 12. There is no negative marks for incorrect answers. Instructions for the Candidates ¯Ö¸ßõÖÖÙ£ÖμÖÖë Ûê ×»Ö‹ ×®Ö¤ì¿Ö 1. ¯ÖÆ»Öê ¯Öéš Ûê ‰ ¯Ö¸ ×®ÖμÖŸÖ Ã£ÖÖ®Ö ¯Ö¸ †¯Ö®ÖÖ ¸Öê»Ö ®Ö´²Ö¸ ×»Ö×ÜÖ‹ … 2. ‡ÃÖ ¯ÖÏ¿®Ö-¯Ö¡Ö ´Öë ¯Ö“ÖÖÃÖ ²ÖÆã×¾ÖÛ »¯ÖßμÖ ¯ÖÏ¿®Ö Æï … 3. ¯Ö¸ßõÖÖ ¯ÖÏÖ¸´³Ö ÆÖê®Öê ¯Ö¸, ¯ÖÏ¿®Ö-¯Öã×ßÖÛ Ö †Ö¯ÖÛ Öê ¤ê ¤ß •ÖÖμÖêÝÖß … ¯ÖÆ»Öê ¯ÖÖÑ“Ö ×´Ö®Ö™ †Ö¯ÖÛ Öê ¯ÖÏ¿®Ö-¯Öã×ßÖÛ Ö ÜÖÖê»Ö®Öê ŸÖ£ÖÖ ˆÃÖÛ ß ×®Ö´®Ö×»Ö×ÜÖŸÖ •ÖÖÑ“Ö Ûê ×»Ö‹ פ μÖê •ÖÖμÖëÝÖê, וÖÃÖÛ ß •ÖÖÑ“Ö †Ö¯ÖÛ Öê †¾Ö¿μÖ Û ¸®Öß Æî : (i) ¯ÖÏ¿®Ö-¯Öã×ßÖÛ Ö ÜÖÖê»Ö®Öê Ûê ×»Ö‹ ¯Öã×ßÖÛ Ö ¯Ö¸ »ÖÝÖß Û ÖÝÖ•Ö Û ß ÃÖᯙ / ¯ÖÖê×»Ö£Öß®Ö ²ÖîÝÖ Û Öê ± Ö›Ì »Öë … ÜÖã»Öß Æã‡Ô μÖÖ ×²Ö®ÖÖ Ã™ßÛ ¸-ÃÖᯙ / ײ֮ÖÖ ¯ÖÖê×»Ö£Öß®Ö ²ÖîÝÖ Û ß ¯Öã×ßÖÛ Ö Ã¾ÖßÛ Ö¸ ®Ö Û ¸ë … (ii) Û ¾Ö¸ ¯Öéš ¯Ö¸ ”¯Öê ×®Ö¤ì¿ÖÖ®ÖãÃÖÖ¸ ¯ÖÏ¿®Ö-¯Öã×ßÖÛ Ö Ûê ¯Öéš ŸÖ£ÖÖ ¯ÖÏ¿®ÖÖë Û ß ÃÖÓÜμÖÖ Û Öê †“”ß ŸÖ¸Æ “ÖîÛ Û ¸ »Öë ×Û μÖê ¯Öæ¸ê Æï … ¤Öê ÂÖ¯Öæ ÞÖÔ ¯Öã ×ßÖÛ Ö ×•Ö®Ö´Öë ¯Öé š/¯ÖÏ ¿®Ö Û ´Ö ÆÖë μÖÖ ¤ã²ÖÖ¸Ö †Ö ÝÖμÖê ÆÖë μÖÖ ÃÖß׸ μÖ»Ö ´Öë ®Ö ÆÖë †£ÖÖÔŸÖË ×Û ÃÖß ³Öß ¯ÖÏÛ Ö¸ Û ß ¡Öã×™¯ÖæÞÖÔ ¯Öã×ßÖÛ Ö Ã¾ÖßÛ Ö¸ ®Ö Û ¸ë ŸÖ£ÖÖ ˆÃÖß ÃÖ´Ö μ Ö ˆÃÖê »ÖÖî™ÖÛ ¸ ˆÃÖÛê ãÖÖ®Ö ¯Ö¸ ¤æÃÖ¸ß ÃÖÆß ¯ÖÏ¿®Ö-¯Öã×ßÖÛ Ö »Öê »Öë … ‡ÃÖÛê ×»Ö‹ †Ö¯ÖÛ Öê ¯ÖÖÑ“Ö ×´Ö®Ö™ פ μÖê •ÖÖμÖëÝÖê … ˆÃÖÛê ²ÖÖ¤ ®Ö ŸÖÖê †Ö¯ÖÛ ß ¯ÖÏ ¿®Ö-¯Öã ×ßÖÛ Ö ¾ÖÖ¯ÖÃÖ »Öß •ÖÖμÖê ÝÖß †Öî ¸ ®Ö Æß †Ö¯ÖÛ Öê †×ŸÖ׸ŒŸÖ ÃÖ´ÖμÖ ×¤μÖÖ •ÖÖμÖê ÝÖÖ … (iii) ‡ÃÖ •ÖÖÑ“Ö Ûê ²ÖÖ¤ OMR ¯Ö¡ÖÛ Û ß ÛÎ ´Ö ÃÖÓÜμÖÖ ‡ÃÖ ¯ÖÏ¿®Ö-¯Öã×ßÖÛ Ö ¯Ö¸ †Ó×Û ŸÖ Û ¸ ¤ë … 4. ¯ÖÏŸμÖêÛ ¯ÖÏ¿®Ö Ûê ×»Ö‹ “ÖÖ¸ ˆ¢Ö¸ ×¾ÖÛ »¯Ö (A), (B), (C) ŸÖ£ÖÖ (D) פ μÖê ÝÖμÖê Æï … †Ö¯ÖÛ Öê ÃÖÆß ˆ¢Ö¸ Ûê ¾Öé¢Ö Û Öê ¯Öê®Ö ÃÖê ³Ö¸Û ¸ Û Ö»ÖÖ Û ¸®ÖÖ Æî •ÖîÃÖÖ ×Û ®Öß“Öê פÜÖÖμÖÖ ÝÖμÖÖ Æî … ˆ¤ÖƸÞÖ : •Ö²Ö×Û (C) ÃÖÆß ˆ¢Ö¸ Æî … 5. ¯ÖÏ¿®ÖÖë Ûê ˆ¢Ö¸ Ûê ¾Ö»Ö ¯ÖÏ¿®Ö ¯Ö¡Ö I Ûê †®¤¸ פ μÖê ÝÖμÖê OMR ¯Ö¡ÖÛ ¯Ö¸ Æß †Ó×Û ŸÖ Û ¸®Öê Æï … μÖפ †Ö¯Ö OMR ¯Ö¡ÖÛ ¯Ö¸ פ μÖê ÝÖμÖê ¾Öé¢Ö Ûê †»ÖÖ¾ÖÖ ×Û ÃÖß †®μÖ Ã£ÖÖ®Ö ¯Ö¸ ˆ¢Ö¸ דÖÅ®ÖÖÓ×Û ŸÖ Û ¸ŸÖê Æï, ŸÖÖê ˆÃÖÛ Ö ´Öæ»μÖÖÓÛ ®Ö ®ÖÆà ÆÖêÝÖÖ … 6. †®¤¸ פ μÖê ÝÖμÖê ×®Ö¤ì¿ÖÖë Û Öê ¬μÖÖ®Ö¯Öæ¾ÖÔÛ ¯ÖœÌë … 7. Û ““ÖÖ Û Ö´Ö (Rough Work) ‡ÃÖ ¯Öã×ßÖÛ Ö Ûê †×®ŸÖ´Ö ¯Öéš ¯Ö¸ Û ¸ë … 8. μÖפ †Ö¯Ö OMR ¯Ö¡ÖÛ ¯Ö¸ ×®ÖμÖŸÖ Ã£ÖÖ®Ö Ûê †»ÖÖ¾ÖÖ †¯Ö®ÖÖ ®ÖÖ´Ö, ¸Öê»Ö ®Ö´²Ö¸, ± Öê®Ö ®Ö´²Ö¸ μÖÖ Û Öê‡Ô ³Öß ‹êÃÖÖ ×“ÖÅ®Ö ×•ÖÃÖÃÖê †Ö¯ÖÛ ß ¯ÖÆ“ÖÖ®Ö ÆÖê ÃÖÛê , †Ó×Û ŸÖ Û ¸ŸÖê Æï †£Ö¾ÖÖ †³Ö¦ ³ÖÖÂÖÖ Û Ö ¯ÖÏ μÖÖêÝÖ Û ¸ŸÖê Æï, μÖÖ Û Öê‡Ô †®μÖ †®Öã×“ÖŸÖ ÃÖÖ¬Ö®Ö Û Ö ¯ÖÏ μÖÖêÝÖ Û ¸ŸÖê Æï, ŸÖÖê ¯Ö¸ßõÖÖ Ûê ×»ÖμÖê †μÖÖêÝμÖ ‘ÖÖê×ÂÖŸÖ ×Û μÖê •ÖÖ ÃÖÛ ŸÖê Æï … 9. †Ö¯ÖÛ Öê ¯Ö¸ßõÖÖ ÃÖ´ÖÖ¯ŸÖ ÆÖê®Öê ¯Ö¸ ´Öæ»Ö OMR ¯Ö¡ÖÛ ×®Ö¸ßõÖÛ ´ÖÆÖê¤ μÖ Û Öê »ÖÖî™Ö®ÖÖ †Ö¾Ö¿μÖÛ Æî †Öî¸ ¯Ö¸ßõÖÖ ÃÖ´ÖÖׯŸÖ Ûê ²ÖÖ¤ ˆÃÖê †¯Ö®Öê ÃÖÖ£Ö ¯Ö¸ßõÖÖ ³Ö¾Ö®Ö ÃÖê ²ÖÖƸ ®Ö »ÖêÛ ¸ •ÖÖμÖë … ÆÖ»ÖÖÓ×Û †Ö¯Ö ¯Ö¸ßõÖÖ ÃÖ´ÖÖׯŸÖ ¯Ö¸ OMR ¯Ö¡ÖÛ Û ß ›ã¯»ÖßÛê ™ ¯ÖÏ×ŸÖ †¯Ö®Öê ÃÖÖ£Ö »Öê •ÖÖ ÃÖÛ ŸÖê Æï … 10. Ûê ¾Ö»Ö ®Öß»Öê/Û Ö»Öê ²ÖÖ»Ö ¯¾ÖÖ‡Õ™ ¯Öê®Ö Û Ö Æß ‡ÃŸÖê´ÖÖ»Ö Û ¸ë … 11. ×Û ÃÖß ³Öß ¯ÖÏÛ Ö¸ Û Ö ÃÖÓÝÖÞÖÛ (Ûî »ÖÛã »Öꙸ) μÖÖ »ÖÖÝÖ ™ê²Ö»Ö †Öפ Û Ö ¯ÖÏ μÖÖêÝÖ ¾ÖÙ•ÖŸÖ Æî … 12. ÝÖ»ÖŸÖ ˆ¢Ö¸Öë Ûê ×»Ö‹ Û Öê‡Ô †ÓÛ Û Ö™ê ®ÖÆà •ÖÖ‹ÑÝÖê …

Upload: tanyagoswami11

Post on 08-Feb-2016

30 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: S-87-13-II (Computer Science & Applications)

Number of Pages in this Booklet : 8 Number of Questions in this Booklet : 50

S-87-13 1 P.T.O.

[Maximum Marks : 100

PAPER-IICOMPUTER SCIENCE AND APPLICATIONS

(To be filled by the Candidate)

Signature and Name of InvigilatorOMR Sheet No. : ...............................................

Roll No.

(In words)

1. (Signature) __________________________(Name) ____________________________

2. (Signature) __________________________(Name) ____________________________

Roll No.________________________________(In figures as per admission card)

Time : 1 1/4 hours]8 7S 1 3

1. Write your roll number in the space provided on the top ofthis page.

2. This paper consists of fifty multiple-choice type ofquestions.

3. At the commencement of examination, the question bookletwill be given to you. In the first 5 minutes, you are requestedto open the booklet and compulsorily examine it as below :(i) To have access to the Question Booklet, tear off

the paper seal / polythene bag on the booklet. Do notaccept a booklet without sticker-seal / withoutpolythene bag and do not accept an open booklet.

(ii) Tally the number of pages and number of questionsin the booklet with the information printed on thecover page. Faulty booklets due to pages/questionsmissing or duplicate or not in serial order or anyother discrepancy should be got replaced immediatelyby a correct booklet from the invigilator within theperiod of 5 minutes. Afterwards, neither theQuestion Booklet will be replaced nor any extratime will be given.

(iii) After this verification is over, the OMR Sheet Numbershould be entered on this Test Booklet.

4. Each item has four alternative responses marked (A), (B),(C) and (D). You have to darken the circle as indicated belowon the correct response against each item.Example :where (C) is the correct response.

5. Your responses to the items are to be indicated in the OMRSheet given inside the Paper I Booklet only. If you markat any place other than in the circle in the OMR Sheet, it willnot be evaluated.

6. Read instructions given inside carefully.7. Rough Work is to be done in the end of this booklet.8. If you write your Name, Roll Number, Phone Number or

put any mark on any part of the OMR Sheet, except for thespace allotted for the relevant entries, which may discloseyour identity, or use abusive language or employ any otherunfair means, you will render yourself liable todisqualification.

9. You have to return the original OMR Sheet to the invigilatorsat the end of the examination compulsorily and must notcarry it with you outside the Examination Hall. You arehowever, allowed to carry duplicate copy of OMR Sheet onconclusion of examination.

10. Use only Blue/Black Ball point pen.11. Use of any calculator or log table etc., is prohibited.12. There is no negative marks for incorrect answers.

Instructions for the Candidates ¯Ö¸üßõÖÖÙ£ÖμÖÖë Ûêú ×»Ö‹ ×®Ö¤ìü¿Ö1. ¯ÖÆü»Öê ¯Öéšü Ûêú ‰ú¯Ö¸ü ×®ÖμÖŸÖ Ã£ÖÖ®Ö ¯Ö¸ü †¯Ö®ÖÖ ¸üÖê»Ö ®Ö´²Ö¸ü ×»Ö×ÜÖ‹ …2. ‡ÃÖ ¯ÖÏ¿®Ö-¯Ö¡Ö ´Öë ¯Ö“ÖÖÃÖ ²ÖÆãü×¾ÖÛú»¯ÖßμÖ ¯ÖÏ¿®Ö Æïü …3. ¯Ö¸üßõÖÖ ¯ÖÏÖ¸ü´³Ö ÆüÖê®Öê ¯Ö¸ü, ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ †Ö¯ÖÛúÖê ¤êü ¤üß •ÖÖμÖêÝÖß … ¯ÖÆü»Öê

¯ÖÖÑ“Ö ×´Ö®Ö™ü †Ö¯ÖÛúÖê ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ÜÖÖê»Ö®Öê ŸÖ£ÖÖ ˆÃÖÛúß ×®Ö´®Ö×»Ö×ÜÖŸÖ•ÖÖÑ“Ö Ûêú ×»Ö‹ פüμÖê •ÖÖμÖëÝÖê, וÖÃÖÛúß •ÖÖÑ“Ö †Ö¯ÖÛúÖê †¾Ö¿μÖ Ûú¸ü®Öß Æîü :(i) ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ÜÖÖê»Ö®Öê Ûêú ×»Ö‹ ¯Öã×ßÖÛúÖ ¯Ö¸ü »ÖÝÖß ÛúÖÝÖ•Ö Ûúß ÃÖᯙ /

¯ÖÖê×»Ö£Öß®Ö ²ÖîÝÖ ÛúÖê ±úÖ›Ìü »Öë … ÜÖã»Öß Æãü‡Ô μÖÖ ×²Ö®ÖÖ Ã™üßÛú¸ü-ÃÖᯙ /ײ֮ÖÖ ¯ÖÖê×»Ö£Öß®Ö ²ÖîÝÖ Ûúß ¯Öã×ßÖÛúÖ Ã¾ÖßÛúÖ¸ü ®Ö Ûú¸ëü …

(ii) Ûú¾Ö¸ü ¯Öéšü ¯Ö¸ü ”û¯Öê ×®Ö¤ìü¿ÖÖ®ÖãÃÖÖ¸ü ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ Ûêú ¯Öéšü ŸÖ£ÖÖ¯ÖÏ¿®ÖÖë Ûúß ÃÖÓÜμÖÖ ÛúÖê †“”ûß ŸÖ¸üÆü “ÖîÛú Ûú¸ü »Öë ×Ûú μÖê ¯Öæ¸êüÆïü … ¤üÖêÂÖ¯ÖæÞÖÔ ¯Öã×ßÖÛúÖ ×•Ö®Ö´Öë ¯Öéšü/¯ÖÏ¿®Ö Ûú´Ö ÆüÖë μÖÖ ¤ãü²ÖÖ üÖ †ÖÝÖμÖê ÆüÖë μÖÖ ÃÖß׸üμÖ»Ö ´Öë ®Ö ÆüÖë †£ÖÖÔŸÖË ×ÛúÃÖß ³Öß ¯ÖÏÛúÖ¸ü Ûúß¡Öã×™ü¯ÖæÞÖÔ ¯Öã×ßÖÛúÖ Ã¾ÖßÛúÖ¸ü ®Ö Ûú¸ëü ŸÖ£ÖÖ ˆÃÖß ÃÖ´ÖμÖ ˆÃÖê»ÖÖî™üÖÛú¸ü ˆÃÖÛêú ãÖÖ®Ö ¯Ö¸ü ¤æüÃÖ¸üß ÃÖÆüß ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ »Öê »Öë …‡ÃÖÛêú ×»Ö‹ †Ö¯ÖÛúÖê ¯ÖÖÑ“Ö ×´Ö®Ö™ü פüμÖê •ÖÖμÖëÝÖê … ˆÃÖÛêú ²ÖÖ¤ü ®ÖŸÖÖê †Ö¯ÖÛúß ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ¾ÖÖ¯ÖÃÖ »Öß •ÖÖμÖêÝÖß †Öî ü ®Ö Æüß †Ö¯ÖÛúÖê†×ŸÖ׸üŒŸÖ ÃÖ´ÖμÖ ×¤üμÖÖ •ÖÖμÖêÝÖÖ …

(iii) ‡ÃÖ •ÖÖÑ“Ö Ûêú ²ÖÖ¤ü OMR ¯Ö¡ÖÛú Ûúß ÛÎú´Ö ÃÖÓÜμÖÖ ‡ÃÖ ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ¯Ö¸ü †Ó×ÛúŸÖ Ûú¸ü ¤ëü …

4. ¯ÖÏŸμÖêÛú ¯ÖÏ¿®Ö Ûêú ×»Ö‹ “ÖÖ¸ü ˆ¢Ö¸ü ×¾ÖÛú»¯Ö (A), (B), (C) ŸÖ£ÖÖ (D) פüμÖêÝÖμÖê Æïü … †Ö¯ÖÛúÖê ÃÖÆüß ˆ¢Ö¸ü Ûêú ¾Öé¢Ö ÛúÖê ¯Öê®Ö ÃÖê ³Ö¸üÛú¸ü ÛúÖ»ÖÖ Ûú¸ü®ÖÖ Æîü•ÖîÃÖÖ ×Ûú ®Öß“Öê פüÜÖÖμÖÖ ÝÖμÖÖ Æîü …ˆ¤üÖÆü¸üÞÖ : •Ö²Ö×Ûú (C) ÃÖÆüß ˆ¢Ö¸ü Æîü …

5. ¯ÖÏ¿®ÖÖë Ûêú ¢Ö¸ü Ûêú¾Ö»Ö ÖÏ¿®Ö Ö¡Ö I Ûêú †®¤ü¸ü פüμÖê ÝÖμÖê OMR Ö¡ÖÛú Ö¸ü Æü߆Ó×ÛúŸÖ Ûú¸ü®Öê Æïü … μÖפü †Ö¯Ö OMR ¯Ö¡ÖÛú ¯Ö¸ü פüμÖê ÝÖμÖê ¾Öé¢Ö Ûêú †»ÖÖ¾ÖÖ×ÛúÃÖß †®μÖ Ã£ÖÖ®Ö ¯Ö¸ü ˆ¢Ö¸ü דÖÅ®ÖÖÓ×ÛúŸÖ Ûú¸üŸÖê Æïü, ŸÖÖê ˆÃÖÛúÖ ´Öæ»μÖÖÓÛú®Ö®ÖÆüà ÆüÖêÝÖÖ …

6. †®¤ü¸ü פüμÖê ÝÖμÖê ×®Ö¤ìü¿ÖÖë ÛúÖê ¬μÖÖ®Ö¯Öæ¾ÖÔÛú ¯ÖœÌëü …7. Ûú““ÖÖ ÛúÖ´Ö (Rough Work) ‡ÃÖ ¯Öã×ßÖÛúÖ Ûêú †×®ŸÖ´Ö ¯Öéšü ¯Ö¸ü Ûú¸ëü …8. μÖפü †Ö¯Ö OMR ¯Ö¡ÖÛú ¯Ö¸ü ×®ÖμÖŸÖ Ã£ÖÖ®Ö Ûêú †»ÖÖ¾ÖÖ †¯Ö®ÖÖ ®ÖÖ´Ö, ¸üÖê»Ö

®Ö´²Ö¸ü, ±úÖê®Ö ®Ö´²Ö¸ü μÖÖ ÛúÖê‡Ô ³Öß ‹êÃÖÖ ×“ÖÅ®Ö ×•ÖÃÖÃÖê †Ö¯ÖÛúß ¯ÖÆü“ÖÖ®Ö ÆüÖêÃÖÛêú, †Ó×ÛúŸÖ Ûú¸üŸÖê Æïü †£Ö¾ÖÖ †³Ö¦ü ³ÖÖÂÖÖ ÛúÖ ¯ÖÏμÖÖêÝÖ Ûú¸üŸÖê Æïü, μÖÖ ÛúÖê‡Ô†®μÖ †®Öã×“ÖŸÖ ÃÖÖ¬Ö®Ö ÛúÖ ¯ÖÏμÖÖêÝÖ Ûú¸üŸÖê Æïü, ŸÖÖê ¯Ö¸üßõÖÖ Ûêú ×»ÖμÖê †μÖÖêÝμÖ‘ÖÖê×ÂÖŸÖ ×ÛúμÖê •ÖÖ ÃÖÛúŸÖê Æïü …

9. †Ö¯ÖÛúÖê ¯Ö¸üßõÖÖ ÃÖ´ÖÖ¯ŸÖ ÆüÖê®Öê ¯Ö¸ü ´Öæ»Ö OMR ¯Ö¡ÖÛú ×®Ö¸üßõÖÛú ´ÖÆüÖê¤üμÖ ÛúÖê»ÖÖî™üÖ®ÖÖ †Ö¾Ö¿μÖÛú Æîü †Öî¸ü ¯Ö¸üßõÖÖ ÃÖ´ÖÖׯŸÖ Ûêú ²ÖÖ¤ü ˆÃÖê †¯Ö®Öê ÃÖÖ£Ö¯Ö¸üßõÖÖ ³Ö¾Ö®Ö ÃÖê ²ÖÖÆü¸ü ®Ö »ÖêÛú¸ü •ÖÖμÖë … ÆüÖ»ÖÖÓ×Ûú †Ö¯Ö ¯Ö¸üßõÖÖ ÃÖ´ÖÖׯŸÖ ¯Ö¸üOMR ¯Ö¡ÖÛú Ûúß ›ãü¯»ÖßÛêú™ü ¯ÖÏ×ŸÖ †¯Ö®Öê ÃÖÖ£Ö »Öê •ÖÖ ÃÖÛúŸÖê Æïü …

10. Ûêú¾Ö»Ö ®Öß»Öê/ÛúÖ»Öê ²ÖÖ»Ö ¯¾ÖÖ‡Õ™ü ¯Öê®Ö ÛúÖ Æüß ‡ÃŸÖê ÖÖ»Ö Ûú ëü …11. ×ÛúÃÖß ³Öß ¯ÖÏÛúÖ¸ü ÛúÖ ÃÖÓÝÖÞÖÛú (Ûîú»ÖÛãú»Öê™ü¸ü) μÖÖ »ÖÖÝÖ ™êü²Ö»Ö †Öפü ÛúÖ

¯ÖÏμÖÖêÝÖ ¾ÖÙ•ÖŸÖ Æîü …12. ÝÖ»ÖŸÖ ˆ¢Ö¸üÖë Ûêú ×»Ö‹ ÛúÖê‡Ô †ÓÛú ÛúÖ™êü ®ÖÆüà •ÖÖ‹ÑÝÖê …

Page 2: S-87-13-II (Computer Science & Applications)

Paper-II 2 S-87-13

1. A file is downloaded in a home

computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded ?

(A) 112 Mbits (B) 6.72 Mbits (C) 67.20 Mbits (D) 672 Mbits

2. In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.

(A) Non-persistent (B) 0-persistent (C) 1-persistent (D) p-persistent

3. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many ?

(A) Monoalphabetic (B) Polyalphabetic (C) Transpositional (D) None of the above

4. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network ?

(A) 100 meters (B) 200 meters (C) 1000 meters (D) 2000 meters

5. The ______ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.

(A) Hyper Text Markup Language (B) File Transfer Protocol (C) Hyper Text Transfer Protocol (D) Common Gateway Interface

6. The count-to-infinity problem is

associated with (A) Flooding algorithm (B) Hierarchical routing algorithm (C) Distance vector routing

algorithm (D) Link state routing algorithm 7. The IEEE single-precision and

double-precision format to represent floating-point numbers, has a length of ______ and ______ respectively.

(A) 8 bits and 16 bits (B) 16 bits and 32 bits (C) 32 bits and 64 bits (D) 64 bits and 128 bits 8. Consider an undirected graph G with

100 nodes. The maximum number of edges to be included in G so that the graph is not connected is

(A) 2451 (B) 4950 (C) 4851 (D) 9900

9. The amortized time complexity to perform ______ operation(s) in Splay trees is O(Ig n).

(A) Search (B) Search and Insert (C) Search and Delete (D) Search, Insert and Delete

10. Suppose that the splits at every level of Quicksort are in proportion 1-β to β, where 0 < β ≤ 0.5 is a constant. The number of elements in an array is n. The maximum depth is approximately

(A) 0.5 β Ig n (B) 0.5 (1 – β) Ig n (C) – (Ig n)/(Ig β) (D) – (Ig n)/Ig (1 – β)

COMPUTER SCIENCE AND APPLICATIONS Paper – II

Note : This paper contains fifty (50) objective type questions of two (2) marks each. The candidates are required to select the most appropriate answer for each question. All questions are compulsory.

Page 3: S-87-13-II (Computer Science & Applications)

S-87-13 3 Paper-II

11. The minimum number of nodes in a binary tree of depth d (root is at level 0) is

(A) 2d – 1 (B) 2d + 1 – 1 (C) d + 1 (D) d 12. The efficient data structure to

insert/delete a number in a stored set of numbers is

(A) Queue (B) Linked list (C) Doubly linked list (D) Binary tree 13. The number of states in a minimal

deterministic finite automaton corresponding to the language L = { an | n≥4 } is

(A) 3 (B) 4 (C) 5 (D) 6 14. Regular expression for the language

L = { w ∈ {0, 1}* | w has no pair of consecutive zeros} is

(A) (1 + 010)* (B) (01 + 10)* (C) (1 + 010)* (0 + λ) (D) (1 + 01)* (0 + λ) 15. Consider the following two

languages : L1 = {an bl ak | n + l +k>5 }

L2 = {an bl ak |n>5, l >3, k≤ l } Which of the following is true ? (A) L1 is regular language and L2 is

not regular language. (B) Both L1 and L2 are regular

languages. (C) Both L1 and L2 are not regular

languages. (D) L1 is not regular language and

L2 is regular language.

16. LL grammar for the language L = {an bm cn+m | m≥0, n≥0} is

(A) S → aSc | S1 ; S1 → bS1c | λ

(B) S → aSc | S1| λ ; S1 → bS1c

(C) S → aSc | S1| λ ; S1 → bS1c| λ

(D) S → aSc | λ ; S1 → bS1c| λ

17. Assume the statements S1 and S2

given as : S1 : Given a context free grammar

G, there exists an algorithm for determining whether L(G) is infinite.

S2 : There exists an algorithm to determine whether two context free grammars generate the same language.

Which of the following is true ? (A) S1 is correct and S2 is not

correct. (B) Both S1 and S2 are correct.

(C) Both S1 and S2 are not correct.

(D) S1 is not correct and S2 is correct.

18. The number of eight-bit strings

beginning with either 111 or 101 is ______.

(A) 64 (B) 128 (C) 265 (D) None of the above 19. Find the number of ways to paint 12

offices so that 3 of them will be green, 2 of them pink, 2 of them yellow and the rest ones white.

(A) 55,440 (B) 1,66,320 (C) 4.790E+08 (D) 39,91,680

Page 4: S-87-13-II (Computer Science & Applications)

Paper-II 4 S-87-13

20. Consider the following statements : (i) A graph in which there is a

unique path between every pair of vertices is a tree.

(ii) A connected graph with e = v – 1 is a tree.

(iii) A graph with e = v – 1 that has no circuit is a tree.

Which of the above statements is/are true ?

(A) (i) & (iii) (B) (ii) & (iii) (C) (i) & (ii) (D) All of the above 21. Consider the In-order and Post-order

traversals of a tree as given below : In-order : j e n k o p b f a c l g m d h i Post-order : j n o p k e f b c l m g h i d a The Pre-order traversal of the tree

shall be (A) a b f e j k n o p c d g l m h i (B) a b c d e f j k n o p g l m h i (C) a b e j k n o p f c d g l m h i (D) j e n o p k f b c l m g h i d a 22. A simple graph G with n-vertices is

connected if the graph has (A) (n – 1) (n – 2)/2 edges (B) more than (n – 1) (n – 2)/2

edges (C) less than (n – 1) (n – 2)/2 edges (D) ∑k

i=1 C(ni, 2) edges

23. Which one of the following set of

gates is best suited for ‘parity’ checking and ‘parity’ generation ?

(A) AND, OR, NOT (B) NAND, NOR (C) EX-OR, EX-NOR (D) None of the above

24. The quantification ∃!x P(x) denotes the proposition “There exists a unique x such that P(x) is true”, express the quantification using universal and existential quantifications and logical operators :

(A) ∃x P(x) ∨ ∀x∀y ((P(x) ∨ P(y)) → x = y)

(B) ∀ x P(x) ∧ ∀x∀y ((P(x) ∨ P(y)) → x = y)

(C) ∃x P(x) ∧ ∀x∀y ((P(x) ∧ P(y)) → x = y)

(D) ∃x P(x) ∧ ∃x∃y ((P(x) ∨ P(y)) → x = y)

25. If F and G are Boolean functions of

degree n. Then, which of the following is true ?

(A) F ≤ F + G and F G ≤ F (B) G ≤ F + G and F G ≥ G (C) F ≥ F + G and F G ≤ F (D) G ≥ F + G and F G ≤ F 26. Match the following identities/laws

to their corresponding name : (a) x + x = x x • x = x

i. Dominance

(b) x + 0 = x x • 1 = x

ii. Absorption

(c) x + 1 = 1 x • 0 = 0

iii. Idempotent

(d) x • (x + y) = x iv. Identity Codes : (a) (b) (c) (d) (A) iii iv i ii (B) iv iii i ii (C) iv iii ii i (D) iii iv ii i 27. In which one of the following,

continuous process improvement is done ?

(A) ISO9001 (B) RMMM (C) CMM (D) None of the above

Page 5: S-87-13-II (Computer Science & Applications)

S-87-13 5 Paper-II

28. The ______ of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of these components, and the relationship among them.

(A) E-R diagram (B) Data flow diagram (C) Software architecture (D) Software design 29. Working software is not available

until late in the process in (A) Waterfall model (B) Prototyping model (C) Incremental model (D) Evolutionary Development

model 30. Equivalence partitioning is a ______

testing method that divides the input domain of a program into classes of data from which test cases can be derived.

(A) White box (B) Black box (C) Regression (D) Smoke 31. Consider the following characteristics : (i) Correct and unambiguous (ii) Complete and consistent (iii) Ranked for importance and/or

stability and verifiable (iv) Modifiable and Traceable Which of the following is true for a

good SRS ? (A) (i), (ii) and (iii) (B) (i), (iii) and (iv) (C) (ii), (iii) and (iv) (D) (i), (ii), (iii) and (iv) 32. Linked Lists are not suitable for

_____. (A) Binary Search (B) Polynomial Manipulation (C) Insertion (D) Radix Sort

33. What is the size of the following Union ? Assume that the size of int = 2, size of float = 4, size of char = 1

union tag { int a; float b; char c; }; (A) 2 (B) 4 (C) 1 (D) 7 34. What is the output of the following

program segment ? sum(n) { if ( n < 1 ) return n; else return (n + sum(n–1)); } main() { printf(“%d”, sum(5)); } (A) 10 (B) 16 (C) 15 (D) 14 35. Assume that x and y are non-zero

positive integers. What does the following program segment perform ?

while (x!=0) { if (x>y) x = x-y else y=y-x; printf(“%d”,x); (A) Computes LCM of two

numbers (B) Computes GCD of two

numbers (C) Divides large number with

small number (D) Subtracts smaller number from

large number

Page 6: S-87-13-II (Computer Science & Applications)

Paper-II 6 S-87-13

36. Consider the following program segment :

d=0; for(i=1; i<31, ++i) for(j=1; j<31, ++j) for(k=1; k<31, ++k) if ((i+j+k)%3)= = 0); d = d + 1; printf(“%d”, d); The output will be (A) 9000 (B) 3000 (C) 90 (D) 2700 37. Usage of Preemption and Transaction

Rollback prevents ______. (A) Unauthorised usage of data file (B) Deadlock situation (C) Data manipulation (D) File preemption 38. The _____ language was originally

designed as the Transformation Language for Style Sheet facility.

(A) XSTL (B) XML (C) XQuery (D) XPath 39. Views are useful for _____ unwanted

information, and for collecting together information from more than one relation into a single view.

(A) Hiding (B) Deleting (C) Highlighting (D) All of the above 40. The decision tree classifier is a

widely used technique for ______. (A) Classification (B) Association (C) Partition (D) Clustering 41. Cross_tab displays permit users to

view ______ of multidimensional data at a time.

(A) One dimension (B) Two dimensions (C) Three dimensions (D) Multidimensions

42. A method to provide secure transmission of email is called ____.

(A) TLS (B) SA (C) IPSec (D) PGP 43. Thoma’s-write rule is ______. (A) Two phase locking protocol (B) Timestamp ordering protocol (C) One phase locking protocol (D) Sliding window protocol 44. Match the following :

List – I List - II Process state

transition Reason for transition

a Ready→ Running

i. Request made by the process is satisfied or an event for which it was waiting occurs.

b Blocked→ Ready

ii. Process wishes to wait for some action by another process.

c Running→ Blocked

iii. The process is dispatched.

d Running→ Ready

iv. The process is preempted.

Codes : a b c d (A) iii i ii iv (B) iv i iii ii (C) iv iii i ii (D) iii iii ii i 45. The hit ratio of a Translation Look

Aside Buffer (TLAB) is 80%. It takes 20 nanoseconds (ns) to search TLAB and 100 ns to access main memory. The effective memory access time is ______.

(A) 36 ns (B) 140 ns (C) 122 ns (D) 40 ns

Page 7: S-87-13-II (Computer Science & Applications)

S-87-13 7 Paper-II

46. Consider the input/output (I/O) requests made at different instants of time directed at a hypothetical disk having 200 tracks as given in the following table : Serial No.

1 2 3 4 5

Track No.

12 85 40 100 75

Time of arrival

65 80 110 100 175

Assume that : Current head position is at track no.

65 Direction of last movement is

towards higher numbered tracks Current clock time is 160

milliseconds Head movement time per track is

1 millisecond.

“look” is a variant of “SCAN” disk-arm scheduling algorithm. In this algorithm, if no more I/O requests are left in current direction, the disk head reverses its direction. The seek times in Shortest Seek First (SSF) and “look” disk-arm scheduling algorithms respectively are :

(A) 144 and 123 milliseconds (B) 143 and 123 milliseconds (C) 149 and 124 milliseconds (D) 256 and 186 milliseconds

47. Assume that an implementation of Unix operating system uses i-nodes to keep track of data blocks allocated to a file. It supports 12 direct block addresses, one indirect block address and one double indirect block address. The file system has 256 bytes block size and 2 bytes for disk block address. The maximum possible size of a file in this system is

(A) 16 MB (B) 16 KB (C) 70 KB (D) 71 KB

48. Which of the following set of Unix commands will always display “WELCOME” ?

(A) export title=WELCOME; Echo $title

(B) title = WELCOME; export $ title ; sh –c “echo $title”

(C) title = WELCOME; export title ; sh –c “echo $title”

(D) title = WELCOME; echo $title 49. What type of logic circuit is

represented by the figure shown below ?

(A) XOR (B) XNOR (C) XAND (D) XNAND 50. The speed up of a pipeline processing

over an equivalent non-pipeline processing is defined by the ratio :

(A) S = n tn

(k + n – 1)tp

(B) S = n tn

(k + n + 1)tp

(C) S = n tn

(k – n + 1)tp

(D) S = (k + n – 1)tp

n tn

Where n → no. of tasks tn → time of completion of

each task k → no. of segments of

pipeline tp → clock cycle time S → speed up ratio

Page 8: S-87-13-II (Computer Science & Applications)

Space For Rough Work

Paper-II 8 S-87-13