PAPER-II
COMPUTER SCIENCE AND APPLICATIONS
1. COCOMO stands for
(A) COmposite COst MOdel
(B) COnstructive COst MOdel
(C) COnstructive COmposite
MOdel
(D) COmprehensive COnstruction
MOdel
Answer:(B)
2. Match the following :
a. Good quality i. Program does
not fail for a
specified time in
a given
environment
b. Correctness ii. Meets the
functional
requirements
c. Predictable iii. Meets both
functional and
non-functional
requirements
d. Reliable iv. Process is under
statistical
control
Codes :
a b c d
(A) iii ii iv i
(B) ii iii iv i
(C) i ii iv iii
(D) i ii iii iv
Answer:(A)
3. While estimating the cost of
software, Lines Of Code (LOC) and
Function Points (FP) are used to
measure which one of the following ?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Answer:(B)
4. A good software design must have
(A) High module coupling, High
module cohesion
(B) High module coupling, Low
module cohesion
(C) Low module coupling, High
module cohesion
(D) Low module coupling, Low
module cohesion
Answer:(C)
5. Cyclometric complexity of a flow
graph G with n vertices and e edges
is
(A) V(G) = e+n–2
(B) V(G) = e–n+2
(C) V(G) = e+n+2
(D) V(G) = e–n–2
Answer:(B)
6. When the following code is executed
what will be the value of x and y ?
int x = 1, y = 0;
y = x++;
(A) 2,1
(B) 2,2
(C) 1,1
(D) 1,2
Answer:(A)
Answer:(D)
8. What is the result of the expression
(1&2)+(3/4) ?
(A) 1
(B) 2
(C) 3
(D) 0
Answer:(D)
Answer:(D)
10. Which of the following is not a type
of Database Management System ?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Answer:(D)
11. Manager’s salary details are to be
hidden from Employee Table. This
Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Answer:(C)
12. A Network Schema
(A) restricts to one to many
relationship
(B) permits many to many
relationship
(C) stores Data in a Database
(D) stores Data in a Relation
Answer:(B)
13. Which normal form is considered as
adequate for usual database design ?
(A) 2NF
(B) 3NF
(C) 4NF
(D) 5NF
Answer:(B)
Answer:(B)
15. Which of the following addresses is
used to deliver a message to the
correct application program running
on a host ?
(A) Port
(B) IP
(C) Logical
(D) Physical
Answer:(A)
16. In ________ substitution, a character
in the plaintext is always changed to
the same character in the ciphertext,
regardless of its position in the text.
(A) polyalphabetic
(B) monoalphabetic
(C) transpositional
(D) multialphabetic
Answer:(B)
17. In classful addressing, the IP address
190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Answer:(B)
18. In hierarchical routing with 4800
routers, what region and cluster sizes
should be chosen to minimize the
size of the routing table for a three-
layer hierarchy ?
(A) 10 clusters, 24 regions and 20
routers
(B) 12 clusters, 20 regions and 20
routers
(C) 16 clusters, 12 regions and 25
routers
(D) 15 clusters, 16 regions and 20
routers
Answer:(D)
19. In IPv4 header, the ______ field is
needed to allow the destination host
to determine which datagram a newly
arrived fragments belongs to.
(A) identification
(B) fragment offset
(C) time to live
(D) header checksum
Answer:(A)
20. Given L1=L(a*baa*) and L2=L(ab*).
The regular expression corresponding
to language L3 = L1/L2 (right
quotient) is given by
(A) a*b
(B) a*baa*
(C) a*ba*
(D) None of the above
Answer:(C)
Answer:(B)

Answer:(D)

Answer:(D)

Answer:(C)
(A) Both statements S1 and S2 are
incorrect.
(B) S1 is incorrect and S2 is
correct.
(C) S1 is correct and S2 is
incorrect.
(D) Both statements S1 and S2 are
correct
Answer:(D)
Answer:(B)

Answer:(D)

Answer:(B)
29. The value of postfix expression :
8 3 4 + – 3 8 2 / + * 2 $ 3 + is
(A) 17
(B) 131
(C) 64
(D) 52
Answer:(D)
30. Consider the following statements for
priority queue :
S1 : It is a data structure in which
the intrinsic ordering of the
elements does determine the
result of its basic operations.
S2 : The elements of a priority
queue may be complex
structures that are ordered on
one or several fields.
Which of the following is correct ?
(A) Both S1 and S2 are incorrect.
(B) S1 is correct and S2 is
incorrect.
(C) S1 is incorrect and S2 is
correct.
(D) Both S1 and S2 are correct.
Answer:(D)
31. Repository of information gathered
from multiple sources, storing under
unified scheme at a single site is
called as
(A) Data mining
(B) Meta data
(C) Data warehousing
(D) Database
Answer:(C)
32. The task of correcting and pre
processing data is called as
(A) Data streaming
(B) Data cleaning
(C) Data mining
(D) Data storming
Answer:(B)
33. Using data p=3, q=11, n=pq, d=7 in
RSA algorithm find the cipher text of
the given plain text SUZANNE
(A) BUTAEEZ
(B) SUZANNE
(C) XYZABCD
(D) ABCDXYZ
Answer:(A)
34. The relation “divides” on a set of
positive integers is ________.
(A) Symmetric and transitive
(B) Anti symmetric and transitive
(C) Symmetric only
(D) Transitive only
Answer:(B)
Answer:(C)
Answer:(D)
37. Which of the following connected
simple graph has exactly one
spanning tree ?
(A) Complete graph
(B) Hamiltonian graph
(C) Euler graph
(D) None of the above
Answer:(D)
38. How many edges must be removed to
produce the spanning forest of a
graph with N vertices, M edges and
C connected components ?
(A) M+N–C
(B) M–N–C
(C) M–N+C
(D) M+N+C
Answer:(C)
39. Which of the following shall be a
compound proposition involving the
propositions p, q and r, that is true
when exactly two of the p, q and r are
true and is false otherwise ?
Answer:(C)
(A) True and False
(B) False and True
(C) False and False
(D) True and True
Answer:(D)
Answer:(D)
(A) Always false
(B) Always true
(C) Sometimes true
(D) True when x, y, z are all true
Answer:(B)
43. Which one of the following is
decimal value of a signed binary
number 1101010, if it is in 2’s
complement form ?
(A) – 42
(B) – 22
(C) – 21
(D) – 106
Answer:(B)
Answer:(A)
45. When a mobile telephone physically
moves from one to another cell, the
base station transfers ownership to
the cell getting strongest signal. This
process is known as _______.
(A) handoff
(B) mobile switching
(C) mobile routing
(D) cell switching
Answer:(A)
46. A virtual memory based memory
management algorithm partially
swaps out a process. This is an
example of
(A) short term scheduling
(B) long term scheduling
Answer:(C)
47. Assuming that the disk head is
located initially at 32, find the
number of disk moves required with
FCFS if the disk queue of I/O block
requests are 98, 37, 14, 124, 65, 67 :
(A) 310
(B) 324
(C) 320
(D) 321
Answer:(D)
(A) 21 ns
(B) 23 ns
(C) 30 ns
(D) 35 ns
Answer:(C)
49. Consider the following UNIX
command :
sort <in> temp; head – 30 <temp; rm temp
Which of the following functions
shall be performed by this command ?
(A) Sort, taking the input from
“temp”, prints 30 lines from
temp and delete the file temp
(B) Sort the file “temp”, removes
30 lines from temp and delete
the file temp
(C) Sort, taking the input from “in”
and writing the output to
“temp” then prints 30 lines
from temp on terminal. Finally
“temp” is removed.
(D) Sort, taking the input from
“temp” and then prints 30 lines
from “temp” on terminal.
Finally “temp” is removed.
Answer:(C)
50. The mv command changes
(A) the inode
(B) the inode-number
(C) the directory entry
(D) both the directory entry and the
inode
(C) medium term scheduling
(D) mutual exclusion
Answer:(C)
COMPUTER SCIENCE AND APPLICATIONS
1. COCOMO stands for
(A) COmposite COst MOdel
(B) COnstructive COst MOdel
(C) COnstructive COmposite
MOdel
(D) COmprehensive COnstruction
MOdel
Answer:(B)
2. Match the following :
a. Good quality i. Program does
not fail for a
specified time in
a given
environment
b. Correctness ii. Meets the
functional
requirements
c. Predictable iii. Meets both
functional and
non-functional
requirements
d. Reliable iv. Process is under
statistical
control
Codes :
a b c d
(A) iii ii iv i
(B) ii iii iv i
(C) i ii iv iii
(D) i ii iii iv
Answer:(A)
3. While estimating the cost of
software, Lines Of Code (LOC) and
Function Points (FP) are used to
measure which one of the following ?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Answer:(B)
4. A good software design must have
(A) High module coupling, High
module cohesion
(B) High module coupling, Low
module cohesion
(C) Low module coupling, High
module cohesion
(D) Low module coupling, Low
module cohesion
Answer:(C)
5. Cyclometric complexity of a flow
graph G with n vertices and e edges
is
(A) V(G) = e+n–2
(B) V(G) = e–n+2
(C) V(G) = e+n+2
(D) V(G) = e–n–2
Answer:(B)
6. When the following code is executed
what will be the value of x and y ?
int x = 1, y = 0;
y = x++;
(A) 2,1
(B) 2,2
(C) 1,1
(D) 1,2
Answer:(A)
Answer:(D)
8. What is the result of the expression
(1&2)+(3/4) ?
(A) 1
(B) 2
(C) 3
(D) 0
Answer:(D)
Answer:(D)
10. Which of the following is not a type
of Database Management System ?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Answer:(D)
11. Manager’s salary details are to be
hidden from Employee Table. This
Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Answer:(C)
12. A Network Schema
(A) restricts to one to many
relationship
(B) permits many to many
relationship
(C) stores Data in a Database
(D) stores Data in a Relation
Answer:(B)
13. Which normal form is considered as
adequate for usual database design ?
(A) 2NF
(B) 3NF
(C) 4NF
(D) 5NF
Answer:(B)
Answer:(B)
15. Which of the following addresses is
used to deliver a message to the
correct application program running
on a host ?
(A) Port
(B) IP
(C) Logical
(D) Physical
Answer:(A)
16. In ________ substitution, a character
in the plaintext is always changed to
the same character in the ciphertext,
regardless of its position in the text.
(A) polyalphabetic
(B) monoalphabetic
(C) transpositional
(D) multialphabetic
Answer:(B)
17. In classful addressing, the IP address
190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Answer:(B)
18. In hierarchical routing with 4800
routers, what region and cluster sizes
should be chosen to minimize the
size of the routing table for a three-
layer hierarchy ?
(A) 10 clusters, 24 regions and 20
routers
(B) 12 clusters, 20 regions and 20
routers
(C) 16 clusters, 12 regions and 25
routers
(D) 15 clusters, 16 regions and 20
routers
Answer:(D)
19. In IPv4 header, the ______ field is
needed to allow the destination host
to determine which datagram a newly
arrived fragments belongs to.
(A) identification
(B) fragment offset
(C) time to live
(D) header checksum
Answer:(A)
20. Given L1=L(a*baa*) and L2=L(ab*).
The regular expression corresponding
to language L3 = L1/L2 (right
quotient) is given by
(A) a*b
(B) a*baa*
(C) a*ba*
(D) None of the above
Answer:(C)
Answer:(B)
Answer:(D)
Answer:(D)
Answer:(C)
(A) Both statements S1 and S2 are
incorrect.
(B) S1 is incorrect and S2 is
correct.
(C) S1 is correct and S2 is
incorrect.
(D) Both statements S1 and S2 are
correct
Answer:(D)
Answer:(B)
Answer:(D)
Answer:(B)
29. The value of postfix expression :
8 3 4 + – 3 8 2 / + * 2 $ 3 + is
(A) 17
(B) 131
(C) 64
(D) 52
Answer:(D)
30. Consider the following statements for
priority queue :
S1 : It is a data structure in which
the intrinsic ordering of the
elements does determine the
result of its basic operations.
S2 : The elements of a priority
queue may be complex
structures that are ordered on
one or several fields.
Which of the following is correct ?
(A) Both S1 and S2 are incorrect.
(B) S1 is correct and S2 is
incorrect.
(C) S1 is incorrect and S2 is
correct.
(D) Both S1 and S2 are correct.
Answer:(D)
31. Repository of information gathered
from multiple sources, storing under
unified scheme at a single site is
called as
(A) Data mining
(B) Meta data
(C) Data warehousing
(D) Database
Answer:(C)
32. The task of correcting and pre
processing data is called as
(A) Data streaming
(B) Data cleaning
(C) Data mining
(D) Data storming
Answer:(B)
33. Using data p=3, q=11, n=pq, d=7 in
RSA algorithm find the cipher text of
the given plain text SUZANNE
(A) BUTAEEZ
(B) SUZANNE
(C) XYZABCD
(D) ABCDXYZ
Answer:(A)
34. The relation “divides” on a set of
positive integers is ________.
(A) Symmetric and transitive
(B) Anti symmetric and transitive
(C) Symmetric only
(D) Transitive only
Answer:(B)
Answer:(C)
Answer:(D)
37. Which of the following connected
simple graph has exactly one
spanning tree ?
(A) Complete graph
(B) Hamiltonian graph
(C) Euler graph
(D) None of the above
Answer:(D)
38. How many edges must be removed to
produce the spanning forest of a
graph with N vertices, M edges and
C connected components ?
(A) M+N–C
(B) M–N–C
(C) M–N+C
(D) M+N+C
Answer:(C)
39. Which of the following shall be a
compound proposition involving the
propositions p, q and r, that is true
when exactly two of the p, q and r are
true and is false otherwise ?
Answer:(C)
(A) True and False
(B) False and True
(C) False and False
(D) True and True
Answer:(D)
Answer:(D)
(A) Always false
(B) Always true
(C) Sometimes true
(D) True when x, y, z are all true
Answer:(B)
43. Which one of the following is
decimal value of a signed binary
number 1101010, if it is in 2’s
complement form ?
(A) – 42
(B) – 22
(C) – 21
(D) – 106
Answer:(B)
Answer:(A)
45. When a mobile telephone physically
moves from one to another cell, the
base station transfers ownership to
the cell getting strongest signal. This
process is known as _______.
(A) handoff
(B) mobile switching
(C) mobile routing
(D) cell switching
Answer:(A)
46. A virtual memory based memory
management algorithm partially
swaps out a process. This is an
example of
(A) short term scheduling
(B) long term scheduling
Answer:(C)
47. Assuming that the disk head is
located initially at 32, find the
number of disk moves required with
FCFS if the disk queue of I/O block
requests are 98, 37, 14, 124, 65, 67 :
(A) 310
(B) 324
(C) 320
(D) 321
Answer:(D)
(A) 21 ns
(B) 23 ns
(C) 30 ns
(D) 35 ns
Answer:(C)
49. Consider the following UNIX
command :
sort <in> temp; head – 30 <temp; rm temp
Which of the following functions
shall be performed by this command ?
(A) Sort, taking the input from
“temp”, prints 30 lines from
temp and delete the file temp
(B) Sort the file “temp”, removes
30 lines from temp and delete
the file temp
(C) Sort, taking the input from “in”
and writing the output to
“temp” then prints 30 lines
from temp on terminal. Finally
“temp” is removed.
(D) Sort, taking the input from
“temp” and then prints 30 lines
from “temp” on terminal.
Finally “temp” is removed.
Answer:(C)
50. The mv command changes
(A) the inode
(B) the inode-number
(C) the directory entry
(D) both the directory entry and the
inode
(C) medium term scheduling
(D) mutual exclusion
Answer:(C)
Computer Science 2013 June Paper II Solution
Reviewed by Australian Stock Exchange Inc
on
19:37:00
Rating: