HSST Computer Science
HSST Computer Science
HSST Computer Science
(a)Ken Thompson (b) Dennis Ritchie (c) Von Neumann (d) Edsger Dijkstra
7. The new generation Intel processor with the IA-64 architecture is called :
(a) Triggered update (b) Source tracing (c) Split-horizon (d) Path vector
12. A compiler which runs on one machine and produces target code for
another is called a :
16. Which among the following is not a real time operating system ?
23. Which of the following disk scheduling algorithms may result instarvation?
(a) Name of the file does not reveal any hint of its physical storage location
(b) Name of the file does not need to be changed when the storage location
changes
(c) The storage location can be understood from the name of the file
(d) Name of the file will change if the storage location changes
26. The BSD version of UNIX was developed by :
(a)Bell Labs (b)MIT (c)University of Berkeley (d) Sun Microsystems
27. An example of a file system whose contents are not actually stored
anywhere, but are computed on demand is :
29. If r and s are regular expressions denoting languages L(r) and L(s), then
(r)|(s) is a regular expression denoting :
(a)Equal
(b)Not Equal
(c) Equal
Not equal
(d) The program doesn’t compile= = can’t be used with references
31. A grammar with the property that no production right side has two
adjacent non-terminals is called:
32. Yacc is a :
36. Which among the following is a set of ANSI parallel interfaces that allow
personal computers to communicate with peripheral hardware?
(a)A relation scheme can be in Third Normal Form but not in Boyce-Codd
Normal Form (BCNF)
(b)Every BCNF relation scheme is in Third Normal Form.
38. A foreign key imposes a specific kind of integrity to related tables. What is
the name of this integrity?
41. An attribute that is used as a linkage from records in one table to a record
in another table is specified as the----------
42. Data is stored on computer systems in files. The two basic file types are :
43. Which of the following statements in not true with respect to the
characeristics of the Master and the Transaction files ?
(a)A transaction files contain records that hold the details of daily events
affecting an attribute of the master file
(b)A master file should only contain data that are of a permanent or semi-
permanent nature
(c) A transaction file is similar to a ledger in a manual accounting system
(d) Records in the transaction file are used to update some of the data in the
master file.
45. Every DBMS provides for the three basic functions of creating, modifying
and querying the database. Sets of commands (languages) exist to perform
each of the three functions. Select the option that matches the order of the
languages to the order of the functions: querying, creating and modifying the
database.
47. A plug-and –play interface that allows you to add a new device such as a
scanner or printer to your computer without having to add an adapter card or
even having turn the computer off is :
48. The microchip that controls a computer’s interface to its attached serial
devices is :
49. Anomalies can occur in a poorly designed database. One type of anomaly
occurs when the removal of a record in the customer table inadvertently
removes information about sales. What is the name of this anomaly ?
50. “Get me the date attribute of the third tuple in the sales order relation”.
What is being requested ?
(a)The person wants the value in the date field of the third table that is related
to sales order
(b)The person wants the value in the date field in the third row of the sales
order item table.
(c)The person wants the value in the date field of the third record inthe sales
order table.
(d)The person wants the value in the date field of the third sales order that is
related to the sales order item table.
51. The file-oriented approach to data storage creates a set of files for each
application program. The database approach combines all of the files in a
database and lets the application programs get the data that they needs
through a DBMS. Which of the following statements is correct?
(a) The database approach separates the logical view of data from the
physical view
53. Which protocol is used to carry error messages from the metwork to an IP
source ?
54. In which cache mapping method is it possible to load each main memory
block to any line of the cache ?
(a) A default sends execution immediately to the end of the switch statement
(b) A break sends execution immediately to the end of the switch statement
(c) A case sends execution immediately to the end of the switch statement
(d) A break sends execution immediately to the end of the next case.
(a) the list of all of the fields and methods of the class
(b) the list of all of the public fields and public methods of the class
(c) the list of all of the private fields and public methods of the class
(d) the list of all of the private fields and private methods of the class
After the above code is executed, what are the colors of r1 and r2 (in this
order) ?
65. What is the type and value of the following Java expression?
-4+1/2+2*-3+5.0
(a) int -5 (b)double -4.5 (c)int -4 (d)double -5.0
What is printed?
67. Using De Morgan’s law, how would you rewrite the following:
Conditional statement? (i.e. rewrite the statement using && instead of || )
(c!=’n’ && z+2<=5)
69. Which of the following protocols is used to share the same IP address
among different computers (as long as they are not simultaneously active)?
The method setValue assigns the value of i to the instances field value. What
could you write for the implementation of setValue?
72. Consider the following truth table for a logical operator “implies”:
P Q P implies Q
TTT
TFF
FTT
FFT
73. Which among the following involves modifying your computer so that the
microprocessor runs faster than the manufacturer-specified speed ?
74. Which was the first processor to be shipped with a 1 gigahertz clock
speed ?
75. Which among the following involve the continuous and somewhat
overlapped movement of instructions to the processor?
80. A term for technologies in which human neural activity or states would
effectively be an input peripheral for a computer is :
93. In linux, the daemon which runs user programs at periodic scheduled
times is :
95. The designation for an electronics standard for connecting devices to your
personal computer is :
96. In a Java program, you read the following statement that compiles and
executes:
Cookie cookie=new Cookie(“chocolate chips”);
What can you conclude?
(c) The Cookie class must have a constructor that has one formal parameter
of type String
97. You are programming a game of dice in Java. You need to generate a
random integer that can be 1,2,3,4,5 or 6.