M. SC Computer SC (BHU)
M. SC Computer SC (BHU)
540
Question Booklet No ...................................... .
Roll No.
Roll No.
(To be filled up by the candidate by bluelblack bail-point pen)
I I I I I I I
(Write the digits in words) .............................................................................................................. .
Serial No. of Answer Sheet ..................................... .
Day and Date ............................. . (Signature of Invigilator)
INSTRUCTIONS TO CANDIDATES
(Use only bluelblack balt-poirrt pen in the space above and on both sides of the Answer Sheet)
1. Within 10 minutes of the issue of the Question Booklet, check the Question Booklet to
ensure that it contains all the pages in correct sequence and that no page/question is
missing. In case of faulty Question Booklet bring it to the notice of the
Superintendent/Invigilators immediately to obtain a fresh Question Booklet.
2. Do not bring any loose paper, written Of blank, inside the Examination Hall except the
Admit Card without its envelope.
3. A separate Answer Sheet is given. It should not be folded or mutilated. A second Answer
Sheet shall not be provided. Only the Answer Sheet will be evaluated.
4. Write your RaIl Number and Serial Number of the Answer Sheet by pen in the space
provided above.
5. On the front page of the Answer Sheet, write by pen your Roll Number in the space
provided at the top, and by darkening the circles at the bottom. Also, wherever applicable,
write the Question Booklet Number and the Set Number in appropriate places. -
6. No overwriting is allowed in the entries of Roll No., Question Booklet No. and Set No.
(if any) on 01.1R sheet and Roll No. and OMR sheet No. on the Question Booklet.
7. Any changes in the aforesaid entries is to be verified by the invigilator, otherwise it will be
taken as unfairmeans.
8. Each question in this Booklet is followed by four alternative answers. For each question,
you are to record the correct option on the Answer Sheet by darkening the appropfiate
circle in the corresponding row of the Answer Sheet, by pen as mentioned in the guidelines
given on the first page of the Answer Sheet.
9. For each question, darken' only one circle on the Answer Sheet. If you darken more than
one circle or darken a circle partially, the answer will be treated as incorrect.
10. Note that the answer once filled in ink cannot be changed. If you do not wish to attempt a
question, leave all the circles in the corresponding row blank (such question will be
awarded zero marks).
11. For rough work, use the inner back page of the title cover and the blank page at the end of
this Booklet.
12. Deposit only the OMRAnswer Sheet at the end of the Test.
13. You are not permitted to leave the Exarrrination Hall until the end of the Test.
14. If a candidate attempts to use any form of unfair means, he/she shall be liable to such
punishment as the University may determine and impose on him/her.
~ f.Rlr ~ if 3lf.<r>! 3lf'RUf-'f'! 'f{ 'lit t I I
Total No. of Printed Pages: 22
12P/208/29
No. of Questions : 150
Time " 2 Hours J
[ Full Marks: 450
Note: (1) Attempt as many questions as you can. Each question carries 3 (three)
marks. One mark will be deducted for each incorrect answer. Zero mark will
be awarded for each unattempted question.
(2) If more than one alternative answers seem to be approximate to the correct
answer, choose the closest one.
1. Which of the following number system incorporates english Alphabets also?
(1) Binary (2) Hexadecimal (3) Octal (4) Decimal
2. RAM and ROM are:
(1) Part of primary memory
(3) Part of cache memory
3. Logic gates are :
(1) route finder in a circuit
(3) route destructor in a circuit
(2) Part of secondary memory
(4) Part of registers
(2) route blockers in a circuit
(4) route stoper in a circuit
4. The exchange of information occurs in a computer system through:
(1) Decimal codes (2) Binary codes
(3) Hexadecimal codes (4) Octal codes
5. Flip - Flop assumes which of the following codes?
(1) 0 & 1 (2) 100 & 110 (3) 1000 & 1110 (4) 1010 & 1100
6. If (111h in binary then (?ho in decimal:
(1) 4 (2) 5 (3) 6 (4) 7
P.T.O.
12P/208/29
7. If (6)10 in decimal then what is in binary (?)z ?
(1) 110 (2) 111 (3) 101 (4) 1111
8. Basic role of Encoder is :
(1) To create codes for information
(3) To shortlist information
(2) To provide path to information
(4) To block the route of information
9. An electronic switch as elementary component of a digital circuit is best called
as:
(1) Gate (2) Logic gate (3) Circuit (4) Board
10. The Hexadecimal digits are 1 to 0 and A to :
(1) E (2) F (3) G (4) D
11. In binary system decimal 0.875 is represented by :
(1). 0.001 (2) 0.0101 (3) 0.011 (4) 0.111
12. The commonly used character codes for transmission is/are:
(2) ASCII (1) EBCDIC
(3) Both (4) None of the above
13. The maximum count which a 6-bit binary word can is :
(1) 36 (2) 64 (3) 63 (4) 65
14. What is binary equivalent of decimal 269 ?
(1) 100001100 (2) 10001010 (3) 101001011 (4) 10001101
15. The Hexadecimal number A23F is represented in binary by :
(1) 1010001000111110 (2) 1010010000111111
(3) 1010001000111111 (4) lll1001100101010
16. A gate is a logic circuit with one or more input signals but:
(1) two output signals (2) double output signals
(3) one output signals (4) three output signals
( 2 )
12P/208/29
17. In Boolean Algebra, the overbar stands for the NOT Operation and Plus sign
stand for:
(1) AND operatjon
(3) NAND operation
(2) OR operation
(4) NOR operation
18. An AND gate has 7 inputs. How many input words are in truth table?
(1) 64 (2) 32 (3) 16 (4) 128
19. The 2-input XOR gate has high output only when the input bits are:
(1) even (2) different (3) low (4) high
20. Which of the following has most widely used bipolar family?
(1) DTL (2) TIL (3) EeL (4) MOS
21. A device can sink up to 16 rnA and can source up to 400 rnA. The device is :
(1) low power TIL (2) high power TIL
(3) standard TIL (4) schottky TIL
22. Digital design often starts by constructing a :
(1) standard table (2) two stage table
(3) truth table (4) two dimension table
23. A combinatorial logic circuit which is used to send data coming from a single
source to two or more separate destinations is called:
(1) Decoder (2) Encoder (3) Multiplexer (4) De-multiplexer
24. A positive AND gate is also a negative:
(1) NAND gate (2) NOR gate (3) AND gate (4) OR gate
25. A shift register can be used for :
(1) Parallel to serial conversion
(3) Digital delay line
( 3 )
(2) Serial to parallel conversion
(4) All of the above
P.T.O.
12P/208/29
26. Which of the following is first integrated logic family?
(1) RTL (2) DTL (3) TTL (4) MOS
27. Which of the following is not functionally a complete set?
(1) AND, OR (2) NAND (3) NOR (4) AND;OR,NOl
28. Which of the following Boolean Algebra rule is wrong?
(1) 0 + A = A (2) 1 + A = 1 (3) A + A'= A (4) 1. x = 1
29. A + B + C + D represents a :
(1) NAND gate (2) OR gate (3) EX-OR gate (4) AND gate
30. Reduced form of Boolean expression (A + B) ( A + C) is :
(1) AB + AC (2) A + B + C (3) AC + B (4) A + BC
31. The most frequently used function in C language is :
(1) printf () (2). scanf ()
(3) main ()
32. The function scanf () reads:
(1) single character
(3) all types variables
33. The single character input/ output are:
(1) scanf ( ) and printf ( )
(3) getchar ( ) and putchar ( )
(4) # include <stdio.h>
(2) single string
(4) only flat type variables
(2) getchar ( ) and printf ( )
(4) scanf ( ) and putchar ( )
34. The math library is set up for the user by file :
(1) float.h (2) math include (3) math.h (4) iomath.h
35. ~ two operators 44 and 11 are:
(1) Arithmetic operator
(3) Logical operator
( 4 )
(2) Equality operator
(4) Bit-wise operators
12P/208/29
36. The comma operator is primarily used in conjunction with:
(1) 'for'statement (2) 'if-else'statement
(3) 'do-while' statement (4) All of the above
37. The most common usc of one-dimension array in C is the:
(1) String (2) Character (3) Data (4) Functions
38. In the library of standard 110 function definition, data structure of a file is :
39.
40.
41.
42.
43.
(1) file (2) File (3) FILE (4) file * a
Function in a multiple program are:
(1) Automatic or register (2) External or static
(3) Static or register (4) Void
The purpose of declaring a structure is :
(1) To specify a list of structure element
(2) To define a new data type
(3) To set appropriate amount of memory
(4) All of the above
The Command used to list a program is :
(1) DIR (2) LIST (3) ENLIST (4) ROWLIST
In IF statement values may be :
(1) Actual numbers (2) Expressions
(3) Variables (4) All of the above
The Oval is used in flow chart is :
(1) represent the logical beginning and end point of a program
(2) to show inputloutput operations
(3) to show connection
(4) to show execution
( 5 )
P.T.o.
12P/208/29
44. The circle is used to
(1) represent a logical beginning of program
(2) Input/output operations
(3) Decision rule display
(4) One portion of program connection to other
45. The stepwise refinement is:
(1) Successive filteration
(3) Fast growth
(2) Successive increment
(4) Use of goto statement
46. The modular approach of program design is related to :
(1) Breaking of program into sub-programs
(2) Defining variables separately
(3) . Use only one scan statement
(4) Splitting of program into functions
47. If memory has a unit which is collection of similar data-type then it called:
(1) File (2) Pointer (3) Register (4) Array
48. If a variable assumes address of stored value then it is called:
(1) float (2) static
49. Polymorphism in OOP is :
(1) Having more than one meaning
(3) Having more than one libraries
50. Parameter passing is used in :
(1) class
(3) input statement
(3) pointer (4) array
(2) Having more than one variables
(4) Having more than one class
(2) function
(4) arrays
51. Which is the first step developing any software program ?
(1) System design (2) System study (3) Coding (4) Thinking
( 6 )
12P/208/29
52. What is the maximum number of nodes in a tree that has N levels (when root is
zero level) ?
53. How many different binary trees can be made from the three nodes that contain
the key value 1, 2 and 3 ?
(1) 30 (2) 20 (3) 10 (4) 5
54. A list is ordered from smallest to largest while sorting. Which of the following
would take the shortest time to execute?
(1) Heap sort (2) Bubble sort (3) Quick sort (4) Selection sort
55. The average number of comparisons in sequential search is :
(1) n
2
(2) n(n - 1)/2 (3) n(n + 1)/2 (4) (n + 1)/2
56. Which data structure is needed to convert infix notations into postfix relations?
(1) Stack (2) Queue (3) Tree (4) Graph
57. How many ancestors does a node in the Nth level (root level = 0) of a binary
search tree have?
(1) N (2) N + 1
(4) 2N + 1
58. Pop and Push operations are used in :
(1) Tree (2) Stack (3) List (4) Linked List
59. 'Rear' and 'front' operations are used in :
(1) Queue (2) Tree (3) Stack (4) Arrays
60. Example(s) of O(N) algorithm is/ are:
(1) Initializing all of the elements in a one-dimensional array to zero
(2) Incrementing all the elements in a one-dimensional array
(3) Multiplying two numbers by performing, successive addition operations
(4) All of the above
( 7 ) P.T.O.
12P/208/29
61. An example of a hierarchial data structure is :
(1) Array (2) Link List (3) Tree (4) Queue
62. A file containing multiple indices to the data is called:
(1) Indexed file (2) Sequential file
(3) Indexed-sequential file (4) Inverted file
63. An indexed file offers the facility of a random file and the access method of a :
(1) Sequential file (2) Indexed file
(3) Direct access file (4) Random access file
64. Data structuring is redefined through a process called :
(1) Structuring process (2) Hierarchical structure
(3) Normalization (4) Relation structure
65. A file is:
(1) An abstract data type (2) Logical storage unit
(3) It is usually non-volatile (4) All of the above
66. How many are there methods for allocatin'g disk?
(1) Contiguous (2) Linked (3) Indexed (4) All of these
67. System supports two types of files, which are those:
(1) text files (2) executable binary files
(3) both (1) and (2)
68. File access methods are:
, (1) Sequential access
(3) Power access
69. File access time is highest in case of :
(1) Floppy disk
(3) Swapping devices
( 8 )
(4) None of these
(2) Direct access,
(4) Both (1) and (2)
(2) Cache
(4) Magnetic disks
70. File record length :
(1) Should always be fixed
(2) Should always be variable
(3) Depends upon the size of file
(4) Should be chosen to match the data characteristic
71. Gauss - Siedel method is used for:
(1) to find root of two equations
(2) to find square root of one equation
(3) to calculate maximum value of a function
(4) to generate coefficients of equations
72. The matrix invasion method is used in :
(1) Obtaining missing values
(2) Obtaining eigen values
(3) Solution of single equation
(4) Solution of simultaneous equations
73. Total number of starting values required in bisection method are:
(1) one (2) two (3) three (4) four
12P/208/29
74. Which of the following method i.s based on concept of tangent to a curve?
(1) Jacobi method
(3) Secant method
75. A tree with n vertices has:
(1) n -1 edges (2) n edges
( 9 )
(2) Bisection method
(4) Newton method
(3) n + 1 edges (4) n + 2 edges
P.T.O.
12P/208/29
76. Spanning tree is :
(1) subset of a binary tree
(2) subset of any tree
(3) sub-graph of a tree joining all vertices
(4) sub-graph of binary tree only joining all vertices
77. A circuit is a :
(1) Loop (2) Path (3) Edge
78. If a finite set S has n elements, then the power of set S has:
(4) Directed graph
(1) 2n+l (2) 2
n
(3) 2
n
-
1
(4) 2
n
-
2
79. If A = {1, 2, 3, 4}, B = {2, 4, 6, 8}, C = {3, 4, 5, 6}, then (A n B) n C is :
(1) {2,4} (2) {cp} (3) {1, 2, 3, 4, 5, 6, 8} (4) {4}
80. Let A = {- 2, - 1, 0, 1, 2}. If the function J: A R be defined by the formula
J(x)= (x
2
+ 1), then range ofJis ':
(1) {-2,2} (2) {I, 2, 4} (3) {O, 1, 4} (4) {1, 2, 5}
81. If A and B are two sets then A u (A n B) equals:
(1) A (2) B (3) Au B (4) An B
82. The truth table of -(p /\ q) is :
(1) 1110 (2) 0101 (3) 0001 (4) 1001
83. The truth table of p/\ (-q) is :
(1) 1110 (2) 0010 (3) 0001 (4) None of above
84. The function fix) = - 2x on R, the set of real number is :
(1) Injective (2) Subjective (3) Bijective (4) Negative
85. How many maximum edges excluding self loop, does a simple undirected
graph of eight vertices have?
(1) 7 (2) 8 (3) 28 (4) 14
( 10 )
86. The recurrence relation and initial condition is:
S(k) - 10 S(k) + 9S(k - 2) = 0
S(O) = 3, S(l) = 11.
The solution of this:
(1) 1 + 2k + 9
k
-
i
87. Form the conjuction of p and q for following:
p: I am rich
Which one is correct answer?
(1) I am rich or I am happy (2) I am rich and I am happy
q: I am happy p:Iamrich
(3) I am neither rich nor happy (4) None of above
q: I am happy
12.P/208/29
88. Which of the following statements is in terms of p, q, r and logical connectives? '
I am awake implies that I work hard
(1) - r --+ p (2) q --+ P (3) r --+ p (4) p--+q
89. Let A = {1, 2, 3, 4}, R = {(1, 2), (1, 3), (1, 4), (2,3), (2,4), (3, 4)}. Find which type of
relation it is :
(1) Reflexive (2) Symmetric
(3) Asymmetric (4) None of the above
90. Write recurrence formula for the sequence:
2, 5, 8, 11, 14, 17, ......
(1) a
n
=(n+1)
(3) an = 2 + 3(n -1)
91. An operating system manages:
(1) Memory
(3) Disk and 1/ 0 devices
( 11 )
(2) an = (n + 1)/ 2
(4) an = 2+3(n -1)
(2) Processor
(4) All of the above
P.T.O.
12P/208/29
92. Round Robin Scheduling is essentially the preemptive version of:
(1) FIFO (2) FCFS
(3) FILO (4) Longest time first
93. A translator is best described as a :
(1) Application software (2) System software
(3) Component of hardware (4) None of the above
94. Swapping:
(1) works best with many small partitions
(2) allows many programs to use memory simultaneously
(3) allows each program in turn to use the memory
(4) does not work with overlaying
95. The initial value of the semaphore that allow.s only one of the many processors
to enter their critical section, is:
(1) 8 (2) 1 (3) 16 (4) 0
96. Which of the following statement is not true?
(1) time sharing is an example of multiprogramming
(2) JCL is used only to communicate between system programmers
(3) a batch file contains a series of OS commands
(4) primary function of operating system is to make the computer hardware
easily usable
97. Real time systems are:
(1) primarily used on mainframe computers
(2) used for monitoring events as they occur
(3) used for program analysis
(4) used for real time interactive users
98. Virtual memory is :
(1) simple to implement
(2) used in all major commercial operating systems
(3) less efficient in utilization of memory
(4) useful when fast I/O devices are not available
99. The LRU algorithm:
(1) Pages out pages that have been used recently
(2) Pages.out pages that have not been used recently
(3) Pages out pages that have been least used recently
(4) Pages out the first page in a given area
100. Which of the following is characteristic of an operating Syi
(1) Resource management (2) Error Recove
(3) Memory management (4) All of the abo
101. Scheduling is :
(1) allowing jobs to use the processor
(2) unrelated to performance consideration
(3) not require in uniprocessor system
(4) strictly the FIFO
102. Poor response times are caused:
(1) Processor Busy
(3) High Paging rate
( 13 )
(2) High I/O rate
(4) All of the above
12P/208/29
P.T.D.
12P1208l29
103. The memory allocation scheme subject to "external" fragmentation is :
(1) Segmentation
(2) Swapping
(3) Pure demand paging
(4) Multiple contiguous fixed partitions
104. The meaning of throughout of an operating system is :
(1) Number of jobs entered in queue per unit .time
(2) Number of jobs processed per unit time
(3) 'Number of jobs blocked per unit time
(4) Number of jobs waiting in system
105. Paging is :
(1) process which transfers pages and data between primary storage and direct
access storage devices
(2) process which manages program pages
(3) process which manages data memory allocation
(4) process related to management of jobs
106. Which SQL command is used for permanent removal of all the rows of data
from table and reduce storage space?
(1) DROP (2) ALTER (3) DELETE (4) TRUNCATE
107.' Which OEM tool is used to alter initialization parameters?
(1) Data Manager (2) Schema Manager
(3) Storage Manager (4) Instance Manager
108. Which of the following SQL Commands would you use to query the data ?
(1) DROP (2) SELECT (3) ALTER (4) INSERT
( 14 )
12PI208I29
109. Which of the following SQL Commands is used to add up new records?
(1) SELECT (2) INSERT (3) UPDATE (4) DELETE
110. 'Ihe Managemeryt Information System (MIS) structure with one main Computer
System is called a :
(1) I lierarchicaI MIS structure
(3) Centralized MIS structure
111. 1\ form can be used to :
(1) modify records
(3) formatted print out
112. 1\ list in alphabetical order:
(1) is in decending order
(3) is result of sort operation
(2) Distributed MIS structure
(4) Decentralized MIS structure
(2) delete records
(4) All of the above
(2) is in ascending order
(4) both (2) and (3)
113. Which of the following is a type of M S software?
(1) database manipulation language (2) query language
(3) utilities (4) report writer
114. I Iighest level in the hierarchy of data organization is called:
(1) data bank (2) database (3) data file (4) data record
115. The data dictionary fells the DBMS:
(1) What files are in the database?
(2) What attributes are procees by data?
(3) What these files contains?
(4) All of the above
( 15 )
P.T.O.
12P/208/29
116. Data integrity control:
(1) is used to set upper and lower limit of numeric data
(2) requires the use of passwords to prohibit unauthorized access to the file
(3) has data dictionary keep the date and time of last access, last backup and
most recent modifications for files
(4) All of the above
117. Which of the following is a database administrator's function?
(1) database design (2) backing up the database
(3) performance monitoring (4) user coordination
118. The relational model uses some unfamiliar terminology, A type is equivalent
to:
(1) Record (2) Field (3) File (-t) Database
119. The logical data structure with one-to-many relationship is a :
(1) Network (2) Tree (3) Chain (-t) Relationship
120. If a relation scheme is in BeNF, then it is also in :
(1) 1 NF (2) 2 NF (3) 3 NF (-t) None of these
121. Coaxial cable has conductors with:
(1) a common axis (2) equal resistance
(3) same diameter (4) None of these
122. Which data communication method is used to send data over a serial
communication link?
(1) simplex (2) half duplex (3) full duplex (4) All of these
( 16 )
12P/208/29
123. ;\ protocol is a set of rules governing sequence of events that must take place:
(1) between peers (2) accross an interface
(3) between non-peers (4) None of these
124. Ilow many OSllayers are covered in the X.2S standard?
(1) Three (2) Four (3) Two (4) Seven
125. C()mmunication protocols always have a :
(1 ) set of symbols (2) start of header
(3) special flag symbqls (4) BCC
126. ;\ router operates at :
(1) Data link layer (2) Application layer
(3) Network layer (4) Physical layer
127. In u Synchronous modem, the received equlizer is called:
(1) adapti ve equalizer
(3) statistical equalizer
(2) impairment equalizer
(4) compromise equalizer
128. Whi,ch of the following features is possible in token passing bus network?
(1) unlimited numbers of stations
(3) multiple time division
(2) unlimited distances
(4) in-service expansion
129. A modem is connected in between a telephone line and a :
(1) Network
(3) Communication adapter
(2) Computer
(4) Serial port
130. Which of the following TCP lIP protocol is used for transfering electronic mail
messages from one machine to another?
(1) FTP (2) SNMP (3) SMTP (4) RPC
( 17 ) P.T.O.
12P/208/29
131. Which of the following items is not used in Local Area Network (LAN) ?
(1) Computer (2) Modem (3) Printer (4) Cable
132. Identify the odd term amongst the following group: .
(1) Coaxial cable (2) Optical fibre
(3) Twisted pair wire (4) Microwave
133. Most data communications involving telegraph lines use:
(1) Simplex lines (2) Wideband channels
(3) Narrowband channels (4) Dialed service
134. Which of the following is (are) required to communicate between two
Computers?
(1) Communications software (2) Protocol
(3) Communication hardware (4) All of the above
135. Which of the following network access standard is used for connecting stations
to a packet switched network?
(1) X.3 (2) X.21 (3) X.25 (-t) X.75
136. The transistorized computer circuits were introduced in the:
(1) First generation (2) Second generation
(3) Third generation (4) Fourth generation
137. Which is used for manufacturing chips?
(1)' Bus (2) Control Unit
(3) Semiconductors (4) Cables
( 18 )
138. Which is the alternative name for a diskette?
(1) Floppy disk
(3) Flexible disk
(2) Hard disk
(4) Winchester disk
139. Supercomputers are primarily useful for:
(1) Input Output intensive processing
(2) Data retrieval operations
(3) Mathematical intensive scientific applications
(4) All ofthe above
140. Which of the following is used for input and output both?
12P1208129
(1) Graph plotter (2) Teletype terminal
(3) Line printer (4) All of the above
141. Which of the following require logic computer memory ?
(1 ) Imaging (2) Graphics
(3) Voice (4) All of the above
142. 1\ beam of light used to record and retrieve data on optical disk is known as :
(1) Polarized light
(3) Laser
(2) unpolarized concentric light
(4) Coloured light
143. I'he CPU chip used in a computer partially made out of :
(1) Silica (2) Carbon (3) Copper (4) Silver
144. The amount of a cheque is recorded in magnetic ink, using an :
(1) Encoder (2) Embosser (3) Inscriber
145. Which was the most popular first generation computer?
(1) IBM 1650 (2) IBM 360 (3) IBM 1130
( 19 )
(4) Imprinter
(4) IBM 2700
P.T.C.
12P/208/29
146. Network topology consisting of nodes attached In a ring without a host
computer, is known as:
(1) Star (2) Ring (3) Bus (4) Tree
147. The larger the RAM of a Computer, the faster is its speed, since its eliminates:
(1) Need for external memory (2) Need of ROM
(3) Frequent disk I/O (4) Need for wider data path
148. Which of the following is a serial printer?
(1 ) Diasywheel printer (2) Chain Printer
(3) Drum Printer (4) Line Printer
149. Which'computer company introduced the printer laserjet in 198.J ?
(1) Mitsubishi Electronics
(3) I lew lett - Packard Inc.
(2) Ashton - Tate Corporation
(4) Nippon Electronic Corporation
150. First Computer in India was manufactured by :
(1) CMC (2) ECIL (3) BEL (-!) BeL
( 20 )
q3-
cf; -qx cf; 1:R rfrcft/q;rc;f[ WC'f-rqr(c tr fffij)
. 1. cfi 10 il1;;c cfi tr x:rft J 3tR
"'1'tf I en I <;1 1SI;gm "YTir "4X d fCBl C1 cna1 f.1iTa-TCf) cnT
CfR I
2. 1=fCR /&If)/lf)/ m:.TBf rff 31RJRcm, fffi:m m CWT\il
., crrT"ti I
3. 3ffilT Tf<IT I ;:r crt # 8#y ;:r qR I Bm-TBf '7iff
G774
J
J/ I Cfkrc;r q;r l.6"4/CP'1 fit;?rr G774
J
/7 I
4. 3ll1'if 31jt/5J'i/cp Bm-TBf q;r jf;7ffq; Jlepf 81TfRUT-rpc! W q., "#
"4X fmj I
5. rff Jlepf W q., "# 3fTRT 81jiPSf/cp PiSlWfI W t&-& awr';ftT:l rnT
qff 7fT(fT qr( I \if61-Vf6T 31lq'4cp 5t m q;r jf;7ffq; alT "#c CfiT
t
.
6. 3110 3lNo tBT "4X 3l'jW+iiCb q m)
"4X 3l'j+iien 3tR 3110 3lNo tBT cBT -B \jqR&I'1Sl'1 cBT
7. \jQ1Cfd QRClct'1 cna1 6RT !OI+ilfOld 6T-=rr <:ffi
em' >r<Wr 11FIT I '
8. en I >rFf cf; 'qR en 7J<l I J[ft/q; JrFf rff Bm rff
71ft "tlh/Peid rtfcffr rff W"flFf 7ft 10 qff Bm-TBf rff Jlepf rpc! W
. 7ft rff -qry W 7fT(fT CfWfT t I
9. cfi \3'ffi cfi $rc;r tr cnT CfR I cnT
"4X em- "4X ern- l'lC1"d" 11FIT I
10. !llPf. fiI; V?ff Bm' 3ffiJ;rr Bm 'ifCfflT iJfT t I <1ft 3lTG"
em Bm -8, fi cfi 7J<l cnT $
11. cm<f cf; en I cfi j'1Sl cf; Cfl""ffi J J q)f
>r<Wr CfR I
12. wan cfi Cfkrc;r817o V110 3IRo tr wan 1=fCR \1fl1T CfR I
13. wan m- wan 1=fCR cBT "'1'tf irfr I
14. <1ft wan em >r<Wr CfffiTI t m ern- 6RT
m-r/irfr I