Questions Search

This website covers previous years question papers of various universities and colleges in India. Moreover, the information on admission to various courses from various universities/institutes/colleges are also available. Research paper questions are also updated from time to time. Also the latest teaching faculty plus teachers jobs, Government jobs, Banking Jobs, and other jobs are regularly updated to help jobless candidates. Admit cards of various recruitment of Govt organisation are updated. Search your terms using the search box provided.

Follow by Email

Saturday, December 10, 2016

Punjab University OCET M.Sc Computer Science 2012 Question Paper

OCET-2012- Punjab University Question Paper M.Sc Computer Science
Question Booklet Series : A/B/C/D Sr. No. :
Important : Please consult your Admit Card / Roll No. Slip before filling your Roll Number on the Test Booklet and Answer Sheet.
Roll No.
O.M.R. Answer Sheet Serial No.
Signature of the Candidate :
Subject : M.Sc. (Hons. School)-Computer Science
Time : 90 minutes Number of Questions : 75 Maximum Marks : 75
1. Write your Roll No. on the Question Booklet and also on the OMR Answer Sheet in the space provided and nowhere else.
2. Enter the Subject and Series Code of Question Booklet on the OMR Answer Sheet. Darken the corresponding bubble with Black Ball Point /Black Gel pen.
3. Do not make any identification mark on the Answer Sheet or Question Booklet.
4. To open the Question Booklet remove the paper seal (s) gently when asked to do so.
5. Please check that this Question Booklet contains 75 questions. In case of any discrepancy, inform the Assistant Superintendent within 10 minutes of the start of test.
6. Each question has four alternative answers (A, B, C, D) of which only one is correct. For each question, darken only one bubble (A or B or C or D), whichever you think is the correct answer, on the Answer Sheet with Black Ball Point / Black Gel pen.
7. If you do not want to answer a question, leave all the bubbles corresponding to that question blank in the Answer Sheet. No marks will be deducted in such cases.
8. Darken the bubbles in the OMR Answer Sheet according to the Serial No. of the questions given in the Question Booklet.
9. Negative marking will be adopted for evaluation i.e., 1/4th of the marks of the question will be deducted for each wrong answer. A wrong answer means incorrect answer or wrong filling of bubble.
10. For calculations, use of simple log tables is permitted. Borrowing of log tables and any other material is not allowed.
11. For rough work only the sheets marked “Rough Work” at the end of the Question Booklet be used.
12. The Answer Sheet is designed for computer evaluation. Therefore, if you do not follow the instructions given on the Answer Sheet, it may make evaluation by the computer difficult. Any resultant loss to the candidate on the above account, i.e., not following the instructions completely, shall be of the candidate only.
13. After the test, hand over the Question Booklet and the Answer Sheet to the Assistant Superintendent on duty.
14. In no case the Answer Sheet, the Question Booklet, or its part or any material copied/noted from this Booklet is to be taken out of the examination hall. Any candidate found doing so, would be expelled from the examination.
15. A candidate who creates disturbance of any kind or changes his/her seat or is found in possession of any paper possibly of any assistance or found giving or receiving assistance or found using any other unfair means during the examination will be expelled from the examination by the Centre Superintendent / Observer whose decision shall be final.
16. Telecommunication equipment such as pager, cellular phone, wireless, scanner, etc., is not
permitted inside the examination hall. Use of calculators is not allowed.

M.Sc.(Hons. School)-Computer Science/A

1. Which of the following statements comes closer to describing the discipline of Computer
Science ? Computer Science is the study of :
(A) how to design programming languages (B) how to program computers
(C) how to build computers (D) algorithms and their properties
2. The key feature of the von Neumann computer architecture is :
(A) Storing an unbounded number of bits
(B) Using 2's complement notation to represent integers
(C) Storing data and code in the same area of memory
(D) The use of punched card
3. Which name is associated with computer software ?
(A) Bill Clinton (B) William Gates
(C) Bill Gates (D) Rajiv Gandhi
4. Let A[10] be an integer array in C-programming language. Let A[i] = 2i for 0 ≤i ≤9.
After the assignment j = A[A[4]]is executed, the value of A[ j] is equal to :
(A) Undefined (B) 1
(C) 5 (D) 10
5. Consider the following C-program fragment :
k = x * y;
while (k > m) k = k – m;
p = k;
The above fragment will compute the value of p as :
(A) (x * y) mod m (B) (x * y) div m
(C) (x * y)/m (D) (x * y) – m
6. In C-programming, to access a structure element using a pointer, __________ operator
is used.
(A) dot (.) (B) address (&)
(C) pointer (*) (D) arrow (→)
7. In structured programming, a program is divided into modules. Coupling and cohesion
describe the characteristics of modules. A good decomposition should attempt to :
(A) Maximize coupling and Minimize cohesion (B) Minimize coupling and Maximize cohesion
(C) Maximize coupling and Maximize cohesion (D) Minimize coupling and Minimize cohesion
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 4
8. The major goal of object-oriented programming is :
(A) Speed (B) User-interfaces
(C) Reuse (D) Top-down program development
9. The feature of object oriented program in which a specific class of objects receives the
features of a more general class describes :
(A) Inheritance (B) Assignment
(C) Encapsulation (D) Attribute
10. Halstead's source code metrics are based on the number of :
(A) Modules in the program (B) Operands in the program
(C) Operators in the program (D) Both (B) and (C)
11. What activity was added in the spiral model that was not present in the waterfall model of
software development ?
(A) System Analysis (B) System Design
(C) Risk Analysis (D) Testing
12. In UNIX OS, the umask value that will cause directories to be created with permissions
rwxr-x–x is :
(A) 751 (B) 046
(C) 026 (D) 021
13. Which of the following UNIX command will count the lines of all the .c and .h files in the
current working directory ?
(A) cat *.ch | wc – I (B) cat *.[c-h] | wc – I
(C) cat *.[ch] | Is – I (D) cat *.[ch] | wc - I
14. Which UNIX system call is used to create a new process ?
(A) create() (B) new()
(C) open() (D) fork()
15. In UNIX shell script programming, if the terms $1 $2 $3 are used inside a script, to what
do they refer ?
(A) The last three commands submitted to the shell
(B) The three highest priority process IDs (PIDs)
(C) The current time, day of the month and year, respectively
(D) The command line arguments submitted to the script
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 5 [Turn over
16. In UNIX, the command to search the location of a file is :
(A) where (B) search
(C) grep (D) find
17. It is known that UNIX OS has an inode-based file system. The file system has 512 byte
blocks. Each inode has 10 direct, 1 single indirect, 1 double indirect block, and 1 triple
indirect block pointer. Block pointers are 4 bytes each. Assume the inode and any block
free list is always in memory. Blocks are not cached. What is the maximum file size that
can be stored before the double indirect pointer needed ?
(A) 5 K (B) 25 K
(C) 69 K (D) 8261 K
18. A measure of the number of processes completed per time unit is called :
(A) Throughput (B) Waiting time
(C) Response time (D) CPU utilization
19. This concept means that the programs currently being executed are stored on disk and
portions of these programs are brought into memory as needed :
(A) Multiprocessing (B) Virtual Storage
(C) Spooling (D) Resource allocation
20. A thread is also called :
(A) A virtual process (B) A heavyweight process
(C) A lightweight process (D) A scheduler
21. Which of the following C-declarations can be used to construct a linked list data
structure ?
(A) struct node {int element; node * next;}; (B) struct node {int element; node next;};
(C) struct node {int element; *node next;}; (D) struct node {int element; int *next;};
22. The solution to the Towers of Hanoi problem with n disks requires :
(A) 2n moves (B) 2n – 1 moves
(C) 2n – 2 moves (D) 2n + 1 moves
23. What is the number of nodes in a full binary tree with eight levels ?
(A) 127 (B) 128
(C) 255 (D) 256
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 6
24. The maximum number of searches for a particular record among 32 records through
Binary search method will be :
(A) 16 (B) 8
(C) 5 (D) 2
25. Which of the following Boolean function is equivalent to X ?
(A) (X + Y) (X + Y') (X + Z) (X + Z')
(B) (X + Y + Z') (X + Z) (X + Y)
(C) (X + YZ) (Y + Z) (Y + Z') (Y' + Z)
(D) WXYZ + W'XY'Z'
26. The Hamming distance is :
(A) Calculated by taking the number of ones in the XOR of two binary strings
(B) Calculated by taking the number of ones in the OR of two binary strings
(C) Calculated by taking the number of ones in the NOT of two binary strings
(D) Calculated by taking the number of ones in the AND of two binary strings
27. Three of the following numbers are same. Which one is different ?
(A) (110100100.01)2 (B) (12210.1)4
(C) (644.1)8 (D) (1A4.4)16
28. The value 10 in decimal number system will be equal to the value _______ in base-9
number system.
(A) 13 (B) 10
(C) 11 (D) 12
29. The addition of 4-bit, 2's compliment binary numbers 1101 and 0100 results in :
(A) 0001 and an overflow (B) 1001 and no overflow
(C) 0001 and no overflow (D) 1001 and an overflow
30. The largest integer decimal value that can be stored in a 16-bit word with the leftmost bit
being used for the algebraic sign is :
(A) 16383 (B) 32767
(C) 65535 (D) 4096
31. What is the correct order of the operations in the instruction cycle ?
(A) Fetch, Execute, Decode, Update (B) Fetch, Decode, Update, Execute
(C) Fetch, Update, Decode, Execute (D) Fetch, Decode, Execute, Update
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 7 [Turn over
32. Floating point numbers in a computer are represented using a 10-bit mantissa (including
a sign bit) and a 7-bit exponent (including a sign bit). What is the approximate value of
the maximum number, which can be represented ? Assume that the mantissa is stored in
the normalized from, that is, without leading zeroes.
(A) 2128 (B) 2127
(C) 264 (D) 263
33. Which of the following is an example of a client-server model ?
(C) TELNET (D) All of the above
34. Communication between a computer and a keyboard involves _______ transmission.
(A) Simplex (B) Half-duplex
(C) Full-duplex (D) Automatic
35. Which type of connector does a 10BaseT Ethernet cable use ?
(A) BNC (B) RJ-45
(C) RJ-11 (D) MSAU
36. Which of the following is the topology offering the highest level of redundancy, is easy to
troubleshoot but is expensive to install ? It is also the topology of the Internet.
(A) Ring (B) Star
(C) Mesh (D) Bus
37. A _________ is the standard or set of rules that two computers use to communicate with
each other.
(A) Modem (B) Protocol
(C) Prototype (D) Link
38. In data communications, ATM is an acronym for :
(A) Automated Teller Machine (B) Automatic Transmission Model
(C) Asynchronous Telecommunication Method (D) Asynchronous Transfer Mode
39. Java is :
(A) a programming language (B) a runtime environment
(C) a class library (D) all of the above
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 8
40. What is the purpose of the keyword this in java ?
(A) To allow client programs to reference an object's fields
(B) To allow public objects to reference private objects
(C) To allow methods in other class to reference an object's fields
(D) To allow non-static object methods to reference their host object
41. Which one of the following uses the correct syntax to include an applet called ButtonText
in an HTML page ?
(A) <P><APPLET="" WIDTH=300 HEIGHT=250></P>
(B) <P><APPLET CODE="" WIDTH=300 HEIGHT=250></P>
(C) <P><APPLET CODE="ButtonText.class" WIDTH=300 HEIGHT=250></P>
(D) <P><APPLET="ButtonText.class" WIDTH=300 HEIGHT=250></P>
42. What will be printed output if this java code is run with the following command line ?
Command Line : java myprog good morning
Java code : public class myprog
public static void main (String argv[])
{ System.out.println (argv[2]); }
(A) myprog
(B) good
(C) morning
(D) Exception raised : "java.lang.ArrayIndexOutOfBoundsException : 2"
43. The value of arithmetic expression P : 12, 7, 3, -, /, 2, 1, 5, +, *, +, written in postfix
notation is :
(A) 14 (B) 15
(C) 16 (D) 18
44. Which of the following is a phase of a compilation process ?
(A) Lexical Analysis (B) Code Generation
(C) Static Analysis (D) Both (A) and (B) above
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 9 [Turn over
45. What is AVI ?
(A) Movie (B) Audio Visual Interleave
(C) Windows Media Player (D) A type of computer
46. What is stated in Moore's law ?
(A) Technology will advance to a certain point and then decline
(B) The processing powers of computers will double every 18 months
(C) Computers will one day become more intelligent than people and take over the world
(D) Humans are capable of performing the same tasks as computers but at a much slower pace
47. What is a typical screen refresh rate ?
(A) 10 MHz (B) 75 MHz
(C) 750 Hz (D) 75 Hz
48. A display is configured to show 65,536 colors. How many bytes are needed to store the
color information for one pixel ?
(A) 1 (B) 2
(C) 3 (D) 8
49. Pick up wrongly matched pair :
(A) Internet Explorer – Microsoft
(B) Random access – Magnetic Disk
(C) Vacuum Tubes – First Generation Computers
(D) Artificial Intelligence – Third Generation Computers
50. The order of convergence of Newton-Raphson iterative algorithm is :
(A) first order (B) second order
(C) third order (D) none of the above
51. Events A and B are mutually exclusive and have non-zero probabilities. Which of the
following statements is true ?
(A) P(A ∪B) = P(A) + P(B) (B) P(B) ≥P(A)
(C) P(A ∩B) = P(A)•P(B) (D) P(B) ≤P(A)
52. A square matrix is singular whenever :
(A) the rows are linearly independent (B) the columns are linearly independent
(C) the rows are linearly dependent (D) None of the above
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 10
53. Which of the following formulae is most accurate for numerical integration ?
(A) Simpson's Rule (B) Trapezoidal Rule
(C) Weddle's Rule (D) Gauss's Quadrature formula
54. Indexing is more efficient than sorting because :
(A) It uses more storage space but a quicker searching algorithm
(B) It saves computational time after a new record is added
(C) It keeps track of record number and thus make it faster
(D) It does random searching of record
55. Data Independence in DBMS is :
(A) A feature which ensures that application programs do not use data independently
(B) An idea which indicates that the data organization and application programs are not dependent
(C) A method by which two independent data sets can be processed separately
(D) A process by which we ensure that no two data sets interact with each other
56. If a database relation schema is in BCNF, then it is also in :
(A) First normal form (B) Second normal form
(C) Third normal form (D) Multiple normal forms
57. The unit of signal modulation is :
(A) Decibel (B) Mega Hertz
(C) Cycles per second (D) GB
58. A method of ensuring transaction integrity :
(A) Firewell (B) SSL
(C) Authentication (D) Digital Signature
59. Cookies were designed as a response to which problem in the original design of HTML
and HTTP ?
(A) Lack of privacy and confidentiality in viewing web-pages
(B) Inequality if information between clients and servers
(C) The open and distributed nature of the Internet
(D) Persistence of state between web-sessions
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 11 [Turn over
60. Nanosecond is :
(A) Thousandth of a second (B) Millionth of a second
(C) Billionth of a second (D) 300 Giga Byte of storage
61. Consider the following logic circuit :
Which of the following best describes the circuit ?
(A) Exclusive OR (a XOR b) (B) Equivalence (a = b)
(C) The carry bit of a + b (D) The sum bit of a + b
62. What is the difference between a Virus and a Worm ?
(A) A worm is bigger in size
(B) A virus attaches itself to another file, while a worm exists independently
(C) A virus can replicate, a worm can't
(D) A virus can damage data, a worm can't
63. The minimum number of bits required to represent any one character from ASCII code
set is :
(A) 2 (B) 5
(C) 7 (D) 8
64. Who is original developer of Linux, the free Unix clone on the PC ?
(A) Bill Gates (B) Linus Torvalds
(C) Dennis Ritchie (D) Richard Stallman
65. ISDN stands for :
(A) Integral Service Dynamic Network (B) International Subscriber Dialup Network
(C) International Service Digital Network (D) Integrated Service Digital Network
66. Which of the following is responsible for the management and coordination of activities
and the sharing of the resources of the computer ?
(A) Application Software (B) Motherboard
(C) Operating System (D) RAM
67. A software is termed an open source software if :
(A) the developer company is open 24 hours
(B) its source code is available to share, study and modify
(C) it can be downloaded from the Internet
(D) it is available free of cost
68. What is a specialized software program that allows input and output devices to
communicate with the rest of the computer system ?
(A) Utility driver (B) Utility program
(C) Device driver (D) Data compression utility
69. What results will be produced by the following SQL query ?
Select sum(standard_price) as total_price
from product_v
where product_type = 'WOOD';
(A) The total price of all products that are of type wood
(B) The total price of all products
(C) The standard_price of the first wood product in the table
(D) The standard_price of any wood product in the table
70. To eliminate duplicate rows in a SQL query, the _______ qualifier is used in the SQL
Select command.
(A) alter (B) distinct
(C) check (D) specific
M.Sc.(Hons.School)-Computer Science-A/FRH-41358 12
71. What result set is returned from the following SQL query ?
Select customer_name, telephone
from customers
where city in ('Jaipur', 'New Delhi', 'Agra');
(A) The customer_name and telephone of all customers
(B) The customer_name and telephone of all customers living in either Jaipur, New Delhi or Agra
(C) The customer_name and telephone of all customers living in Jaipur and New Delhi and Agra
(D) The customer_name of all customers living in Jaipur, New Delhi or Agra
72. Programs such as Internet Explorer that serve as navigable windows into the Web are
called :
(A) Hypertext (B) Networks
(C) Internet (D) Web browsers
73. printf("%d", printf ("time")); statement in C language :
(A) results in a syntax error (B) outputs time4
(C) outputs garbage (D) outputs time and terminates abruptly
74. What would be output of the following program ?
# define SQR(X) (X*X)
int a, b = 3;
a = SQR(b + 2);
printf("\n%d", a);
(A) 25 (B) 11
(C) Error (D) Garbage value
75. In the context of web pages, The "C" in CSS stands for :
(A) "Concatenating" (B) "Cascading"
(C) "Centering" (D) "Controlling"

No comments:

Post a Comment

Pen down your valuable important comments below