The complete set of questions appeared in the Computer Science Lecturer Examination held on August 2007 conducted by Kerala Public Service Commission. Please note that the answers are not provided here. I haven't included the answers, if you are confident about the answers please add them as comments.
Examination date : 25th August 2007
Category Number: 207/2007
Post: Lecturer in Computer Science
Basic Qualification: B.Tech (Computer Science)
Department: Department of Technical Education.
- Which of the following is a protocol for exchanging files over internet
- FTP
- SMTP
- HTTP
- NNTP
- How dfast can CAT5 cable transfer data ?
- 2 Mbps
- 10 Mbps
- 100 Mbps
- 1000 Mbps
- Into which of the class of address does the IP address 10.0.0.1 belong?
- Class A
- Class B
- Class C
- Class D
- A protocol that allows non-ASCII messages to be sent through e-mails in the Internet is
- MIME
- SMS
- SOAP
- SMTP
- What sort of network runs with all nodes equal in terms of sharing space and power ?
- Star
- Bus
- Equinet
- P2P
- What us DHCP an acronym for ?
- Dynamic Hypertext Configuration Protocol
- Dynamic Host Configuration Protocol
- Dynamic Host Control Protocol
- Dynamic Home Configuration Protocol
- One of the following is a false statement about fiber-optic cable. It is:
- fiber-optic cable is considerably faster, lighter and more durable than wire media
- fiber-optic cable is well suited to systens requiring transfers of large volumes of data
- fiber-optic is easier to work with and less expensive than coaxial cable
- fiber-optic cable has data transfers rates from 500 kilobits to several billion bits per second
- The part of a network that handles the major traffic and provides the primary path for traffic flowing to or from other networks is called the :
- information bus
- gateway
- frontside bus
- backbone
- The transmission medium with the fastest speed among the following is:
- twisted pair
- microwave
- fiber-optics
- coaxial cable
- A change in signal from positive to negative or vice versa that is used as a measure of transmission speed defines:
- baud
- bit rate
- frequency
- phase
- Which of the following is not normally used as a server-side scripting paradigm?
- PHP
- Java Applets
- ASP
- PERL
- An organized listing of all data elements that are pertinent to the system, with precise, definitions so that both user and system analyst will have a common understanding of inputs, outputs, components of stores and intermediate calclations is known as :
- documentation system
- software requirements specification
- data dictionary
- user interface specification
- Which of the following is not a user design principle?
- should be traceable to the analysis model
- should not reinvent the wheel
- should exhibit uniformity and integration
- should not be structured to accomodate change
- Which of the following is a benefit of MVC pattern?
- The MVC pattern minimizes coupling
- The MVC pattern provides abstraction
- The MVC pattern provides reusability
- The MVC pattern provides extensibility
- Approximately one trillion bytes is a
- kilobyte
- megabyte
- terabyte
- gigabyte
- The father of computer graphics is :
- Blaise Pascal
- Gourard
- Dennis Ritchie
- Ivan Sutherland
- The DDA algorithm is used for:
- polygon clipping
- line cliping
- polygon filling
- line drawing
- Which of the following algorithms is used for line clipping?
- 8-way symmetry
- DDA
- Cohen-Sutherland
- Bresenham
- The Bresenham's (Midpoint) line algorithm in whcih d = 2 ∗ dy - dx works correctly only for lines with slopes
- -1 ≤ m ≤ 1
- 0 ≤ m ≤ 1
- -1 ≤ m ≤ 0
- 0 < m < 1
- The transformation matrix [1 0 0 0; 0 1 0 0; 0 0 -1 0; 0 0 0 1](raw major form) represents
- scaling by unit x and y direction
- reflection at z
- rotation by unit in x and y about origin
- shearing by unit in x and y
- Viewing co-ordinates in Computer Graphics terminology are also known as :
- object co-ordinates
- world co-ordinates
- camera co-ordinates
- screen co-ordinates
- OpenGL is:
- a library
- an application programming interface
- a programming language
- a computing platform
- Which red, green and blue values makes the colour cyan?
- 0,255,0
- 0,255,255
- 255,255,255
- 255,0,255
- In terms of font size how many points are equivalent to one inch?
- 1
- 32
- 72
- 100
- The shading model that computes the intensities for each vertex and then interpolates the compounded intensities across the polygons is:
- Flat Shading
- Gourard Shading
- Phong Shading
- Whitted Shading
- Which of the following is not a relational DBMS
- SIBAS
- UNIFY
- ORACLE
- INGRES
- Which among the following is an Open Source DBMS?
- ORACLE
- DB2
- System R
- Postgres
- The number of attributes in a relation schema is its:
- schema
- plan
- arity
- subschema
- QUEL is a :
- tuple calculus query language
- domain calculus query language
- a DDL
- a subschema DLL
- If X → Y then XZ → YZ is the ______________ rule of Functional Dependencies.
- psuedotransitivity
- augmentation
- union
- transitivity
- Table derived from Entity Relationship Diagrams:
- are unnormalized
- are in 1st normal form
- are in 2nd normal form
- None of these
- A table with atleast one candidate key is assured to be in ______ normal form.
- 1st
- 2nd
- 3rd
- 4th
- A subordinate entity is also termed as a :
- inferior entity
- weak entity
- dominant entity
- peer entity
- All candidate keys excluding the primary key are known as :
- super key
- auxiliary key
- foreign key
- alternate key
- Which of the following query languages is of domain calculus type
- QBE
- SQL
- QUEL
- SEQUEL
- When n, k and T represent the number of tasks, number of pipeline stages and the clock period of linear pipeline, the pipeline efficiency is given by:
- n/(k ∗ (n+1))
- n/(k + (n-1))
- n/((k-1) ∗ (n-1))
- n*k/(n-1)
- When the simultaneous instructions are of store type, which of the following hazards can occur?
- WAR
- RAW
- WAW
- None of these
- How many bits are needed tos tore the value 32768 in 2's complement form?
- 14
- 15
- 16
- 17
- Which of the following is a sequential device?
- Floppy Disk
- Magnetic Tape
- Magnetic Drum
- Hard Disk
- One statement among the following set is true. Which one?
- An instruction cycle consists of many machine cycles
- Machine cycle consists of amny instruction cycles
- Machine and instruction cycle are equivalent in time quanta
- Machine cycle is always occuring in union with an instruction cycle during start
- A patch table in a one pass assembler holds:
- symbol table
- address offsets of subroutines
- address of instructions with unresolved references
- address of functions in a different module
- Which among the following is not a function of the loader
- relocates the code
- fetches code from disk to memory
- resolves symbols to libraries
- resoves symbols across modules
- In an activation record, you can never find one of the following.
- return value
- space for global variables
- return addresses
- arguments to function
- In some programming langauge, an identifier is defined to be a letter followed by any number of letters or digits. If L and D denote the sets of letters and digits respectively, them which of the following regular expressions define the identifier.
- (L ∪ D)*
- L . (L ∪ D)*
- (L . D)*
- L . (L . D)*
- One among the following is a top-down parsing method.
- LALR
- SLR
- LR(1)
- LL(1)
- FORTRAN implementations do not permit recursion because:
- they use static allocation for variables
- they use dynamic allocation for variables
- stacks are not available on all machines
- it is not possible to implement recursion on all machines
- Type checking is normally done during:
- lexical analysis
- syntax analysis
- syntax durected translation
- code optimizations
- The number of tokens in the C statement print("i=%d,&i=%x",i,&i); is:
- 3
- 21
- 10
- 26
- In bottom up evaluation of a syntax directed definition, inherited attributes can:
- be evaluated only if the definition is L-attributed
- always be evaluated
- be evaluated only if the definition has synthesised attributes
- never be evaluated
- Which of the following derivatives does a top-down parser use while parsing an input string? The input is assumed to be scanned from left to right.
- leftmost derivation
- leftmost derivation traced out in reverse
- rightmost derivation
- rightmost derivation traced out in reverse
- Which of the following ivolves a context switch?
- system call
- privileged instruction
- all of the above
- None of these
- Semaphores are used for:
- synchronization
- deadlock prevention
- deadlock avoidance
- None of these
- Every file and directory in the UNIX system has a unique ______ assigned to it, used to keep track of information about the file
- sector
- block
- cluster
- inode
- In a batch system the time defined as the time from which a job is submitted until the job is returned to the user is called the _____ time.
- Run time
- Burst time
- Idle Time
- Turnaround time
- P, V, and initialize are the only operations permitted on
- Condition Variables
- Semaphores
- Signals
- Critical regions
- The process-scheduling algorithm used in UNIX systems is:
- Shortest Job First
- Round Robin
- Multi-level queues with feedback
- Just-In-Time Scheduling
- Paged virtual memory systems free us from the problem of ________ fragmentation.
- Internal
- External
- Table
- None of these
- The principle of locality of reference justifies the use of :
- Interrupts
- DMA
- Polling
- Cache Memory
- In a virtual memory computer system, when a virtual address is translated which is not currently mapped to real storage , we call this a :
- page fault
- segmentation violation
- out of bounds memory access violation
- bus error
- The simplest form of pre-emptive procesor scheduling is :
- Shortest Job First
- Shortest Remaining Time First
- First Come First Served
- Multi-level Queues with Feedback
- Which of the following is a network topology that links a number of computers by a single circuit with all messages broadcast to the entire network ?
- ring
- bus
- hierarchical
- star
- Which of the following is a system for digitizing a spoken message and transmitting it over a network ?
- frame relay
- groupware
- computer conferencing
- voicemail
- A communication processor that connects dissimilar networks by providing the translation from one set of protocols to another defines :
- bridge
- router
- gateway
- modem
- Which HTTP Connection method transacts the connection to the connected state?
- openInputStream
- setRequestMethod
- setContentType
- None of these
- Which method of JApplet is called after destroy ?
- predestroy
- finalize
- quit
- stop
- Which among the following protocols is ised for translating from Internet address to physical address
- ICMP
- IGRP
- RARP
- ARP
- One among the following protocols is not conected with e-mail. It is:
- SMTP
- MIME
- NNTP
- POP
- A hostile applet is one that is:
- a downloadable applet that can cause some damage on a client
- an applet generated by another one
- a downloadable applet that attached itself onto an existing one
- an applet that resides on a virus infected system
- SNMP is a protocol used for
- File Transfer
- Network Management
- E-mail
- Messaging
- A dedicated telephone connection comprising 24 cahnnels that can support a data transamission rate of 1.544 megabits per second defines:
- T1 line
- Cable modem
- Digital Subscriber line
- ISDN
- A lattice is a poset in which
- there may be elements not related by the ≤ relation
- any two elements have an infimum and a supremum
- all pairs of elements have unique infimum and supremum
- None of these
- In an lattice, the meet of two elements a and b is defined as :
- if a∧b≤a, a∨b≤b and if c≤a and c≤b, then c≤a∧
- if a∨b≤a, a∧b≤b and if c≤a and c≤b, then c≤a∨
- if a∨b≤a∧b and if c≤a and c≤b, then c≤a∨
- if a∧b≤a∧b and if c≤a and c≤b, then c≤a∧
- The set E = {..., -6, -4, -2, 0, 2, 4, 6, ...} is the set of even numbers. It has all the properties of a ring except :
- It does not have the * operator
- Does not have the identity element for *
- It does not have the + operator
- Does not have the identity element for +
- A binary relation between two sets X and Y in which for all y in Y there exists an x in X such that xRy :
- is a functional relation
- is an injective relation
- is a surhective relation
- is a bijective relation
- A partial ordering relation divides a set into :
- a set of equivalence classes
- a set of non-empty sets once contained within the other in a sequence
- a finite set of non-empty non-disjunct sets
- lattice
- One among the following data structures cannot be stored effciently using arrays. Which one is it?
- Linked lists
- Stacks
- Graphs
- Queues
- In a left skewed binary of depth n, how many modes can be found?
- n
- n-1
- 2n
- 2n
- The mathematical fucntion computed by thr definition ƒ(1)=1, ƒ(n)=n2+ƒ(n-1) is :
- n2>
- 2n
- n(n+1)(2n+1)/6
- 2n-n
- A hashing fucntion which stores colliding items together in linked lists is :
- linear hashing
- linear hashing with collission detection
- universal hashing
- separate chaining
- The binary tree representation of an arithmetic infix expression is available. A postorder traversal of the expression produces its:
- postfix equivalent
- prefix equivalent
- infix equivalent
- None of these
- The number of ditinct binary trees that can be constructed used in n nodes is :
- 2n
- n2
- n2+n
- 2n-n
- Kruskal's algorithm on a graph finds out:
- A Eulerian path
- A Hamilton path
- A Minimum cost spanning tree
- The degree of each vertex
- The worst case complexity of the heap sort algorithm is
- Ο(n)
- Ο(n log n)
- Ο(n2)
- Ο(n2 log n)
- The breadth first traversal of a binary tree for the arithmetic infix expression a+b*c+d produces the sequence :
- ++da*bc
- ++a*bcd
- a+b*c+d
- abc*+d+
- If two functions ƒ(n) and g(n) are related by the relation |g(n)|≤C|fnof;(n), for all n≥n0 where C and n0 are postive interger constants , we can say:
- ƒ= Ο(g)
- g = Ο(ƒ)
- ƒ= Θ(g)
- g = Θ(ƒ)
- Adjacency matrix representation of a graph of n edges required space of :
- Ο(n)
- Ο(log n)
- Ο(n2)
- Ο(2n)
- Which of the following relations about time complexity functions is true?
- Ο(n2) < Ο(n log n)
- Ο(n2) < Ο(log n)
- Ο(n2) < Ο(n2 log n)
- Ο(n log n) < Ο(log n)
- A language L is NP-complete if L ε NP and L is :
- Recursively enumerable
- Recursive
- NP-hard
- in Co-NP
- The data structure ideally suited for solving the Keonigsberg problem is
- Arrays
- Queues
- Linked LIsts
- Graphs
- Compaction of storage for efficiency is required when data is stored in
- Stacks
- Arrays
- Circularly Queue
- Linear Queue
- Hit ratio is a charecteristic of
- Primary Memory
- Secondary Memory
- Cache Memory
- None of these
- which among the following addressing methids require the largest number of memry accesses ?
- Memory Indirect
- Relative addressing
- Register Direct
- Register Indirect
- The virtual memory management scheme among the following that is most common in current operating systems is:
- Paging
- Segmentation
- Paged Segmentation
- Segmented Paging
- LRU is an algorithm used for:
- Memory Scheduling
- Disk Scheduling
- Processor Scheduling
- None of these
- DMA cucles are used by the external devices for:
- Requesting CPU's attention
- Shutting down the interface
- Interrupting data transfer
- Doing data transfer
- An array processor is an example of:
- SISD
- SIMD
- MISD
- MIMD
- One of the following is not a property of the Cray-1 supercomputer, Which one?
- has 64-bit word length
- use 2's complement arithmetic
- has 12.5 ns clock period
- has 256 instruction codes
- MM2I networks have ________ architecture
- SISD
- SIMD
- MISD
- MIMD
- A component not found in associative memories is:
- Comparand register
- Indicator
- Index register
- Masking register
- OCCAM is :
- A Parallel processing language
- A Transputer
- A Parallel Architecture
- A Parallel processing machine