Thursday 14 September 2017

HSST CS QP 144/2013 - Part 5

Question41:-In the spiral model 'risk analysis' is performed
A:-in every loop
B:-in the first and second loop
C:-before using spiral model
D:-in the first loop

Correct Answer:- Option-A

Question42:-The technique of improving the priority of process waiting in queue for CPU allocation is called _________________
A:-Starvation
B:-Ageing
C:-Revocation
D:-Relocation

Correct Answer:- Option-B

Question43:-PSW is saved in stack when there is a
A:-interrupt recognized
B:-execution of CALL instruction
C:-execution of RST instruction
D:-all of these

Correct Answer:- Option-A

Question44:-The default subnet mask for a Class C network is
A:-127.0.0.1
B:-255.0.0.0
C:-255.255.0.0
D:-255.255.255.0

Correct Answer:- Option-D

Question45:-Which one of the following is NOT an advantage of Distributed System?
A:-Reliability
B:-Incremental growth
C:-Resource sharing
D:-None of the above

Correct Answer:- Option-A

Question46:-Cache memory is based
A:-on the property of locality of reference
B:-on the fact that references generally tend to cluster
C:-on the heuristic 90-10 rule
D:-all of the above

Correct Answer:- Option-A

Question47:-The language component of DBMS which can be embedded in a program is
A:-the database administrator (DBA)
B:-the data manipulation language (DML)
C:-the data definition language (DDL)
D:-a query language

Correct Answer:- Option-B

Question48:-A computer system that permits multiple users to run programs at same time is _______
A:-Real time system
B:-Time sharing system
C:-Multiprogramming system
D:-Multi tasking system

Correct Answer:- Option-D

Question49:-What is the ouput of the following code segment?
void test()
{
char c;
cin.get(c);
if (c!='\n'){
test();
cout.put(c);
}}
A:-It will print an empty line
B:-The string entered is printed as it is
C:-It will go into an infinite loop
D:-The string entered is printed in reverse order

Correct Answer:- Option-D

Question50:-Which of the following statement is the negation of the statement, "10 is even and -5 is negative"
A:-10 is even and -5 is not negative
B:-10 is odd and -5 is not negative
C:-10 is even or -5 is not negative
D:-10 is odd or -5 is not negative

Correct Answer:- Option-D

HSST CS QP 144/2013 - Part 4

Question31:-DNS is a
A:-Distributed hierarchical naming system
B:-Vertical naming system
C:-Horizontal naming system
D:-Client Server system

Correct Answer:- Option-C

Question32:-E-commerce is not suitable for
A:-Online job searching
B:-Sale/Purchase of expensive jewellery and antiques
C:-Sale/Purchase of branded clothes
D:-Sale/Purchase of mobile phones

Correct Answer:- Option-A

Question33:-Several factors exist that affect the efficiency of lookup operations in a hash table. Which among the following is NOT one of those factors ?
A:-Size of elements stored in the hash table.
B:-Number of elements stored in the hash table.
C:-Quality of the hash function.
D:-Number of buckets in the hash table.

Correct Answer:- Option-A

Question34:-A DBMS query language is designed to
A:-specify the structure of a database
B:-support end users with English-like commands
C:-support the development of complex applications software
D:-all of the above

Correct Answer:- Option-D

Question35:-Let r be a resource. There are 3 user processes each requiring 2 units of R. Then the minimum number of units of R such that no deadlocks will occur is
A:-4
B:-3
C:-5
D:-6

Correct Answer:- Option-A

Question36:-Assume a cache memory with associative mapping. If the main memory is of 8K bytes and the cache memory is of 2K words, then each word of cache memory is
A:-21 bits
B:-11 bits
C:-16 bits
D:-20 bits

Correct Answer:- Option-C

Question37:-Which of the following is true ?
A:-Stream cipher technique is an encryption technique
B:-Block cipher technique is an encryption technique
C:-Both (A) and (B)
D:-Neither of (A) and (B)

Correct Answer:- Option-C

Question38:-Given a linked list with n elements. Then the time taken to insert an element after an element pointed to by some pointer is
A:-O(n log2 n)
B:-O(1)
C:-O(log2 n)
D:-O(n)

Correct Answer:- Option-B

Question39:-Let h be a hashing function and is used to hash n keys into a table of size m (given n<=m). Then the expected number of collisions involving a particular key x is
A:-less than 1
B:-less than m
C:-less than n
D:-less than n/2

Correct Answer:- Option-A

Question40:-If L is a lattice, then for every a and b in L which among the following is correct?
A:-a ν (b Λ c) =a
B:-a ν (b ν c) = (a ν b) ν c
C:-a ν b = a Λ b
D:-a ν (b ν c) = b

Correct Answer:- Option-B

HSST CS QP 144/2013 - Part 3

Question21:-The expansion of nested macro calls follows _________ rule
A:-LILO
B:-LIFO
C:-FIFO
D:-priority

Correct Answer:- Option-B

Question22:-Von Neumann architecture is
A:-SISD
B:-SIMD
C:-MIMD
D:-MISD

Correct Answer:- Option-A

Question23:-The device that is used to forward data packets from one network to another is called a _________
A:-Bridge
B:-Hub
C:-Switch
D:-Gateway

Correct Answer:- Option-C

Question24:-Which among the following is the most general phrase structured grammar ?
A:-Context - Sensitive
B:-Context - Free
C:-Regular
D:-None of the above

Correct Answer:- Option-A

Question25:-When the following instructions have been executed, what will be the contents of register AL ?
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
A:-0A and carry flag is reset
B:-0A and carry flag is set
C:-6A and carry flag is reset
D:-6A and carry flag is set

Correct Answer:- Option-B

Question26:-The first modern computer was called __________
A:-UNIVAC-I
B:-FLOW-MATIC
C:-ENIAC
D:-INTEL

Correct Answer:- Option-C

Question27:-In which of the language paradigms is the addition of two values expressed as (+ 10 20)?
A:-procedural
B:-functional
C:-logic
D:-object-oriented

Correct Answer:- Option-C

Question28:-What is the purpose of this bit of code
void init()
{
...
}
A:-A place to declare variables
B:-A required method in an applet
C:-A class that initializes the applet
D:-Interacting with the user

Correct Answer:- Option-B

Question29:-In Relational Algebra the query that finds customers who have a balance of over 800 is
A:-∏customer_name(σ balance >800(Deposit))
B:-σcustomer_name(∏balance>800(Deposit))
C:-∏customer_name(σbalance>800(Borrow))
D:-σcustomer_name(∏balance>500(Borrow))

Correct Answer:- Option-A

Question30:-Secret-key encryption is also known as
A:-Secret-encryption
B:-Asymmetric encryption
C:-Symmetric encryption
D:-Private encryption

Correct Answer:- Option-D

HSST CS QP 144/2013 - Part 2

Question11:-DML is used for
A:-Addition of new structures in the database system
B:-Manipulation and processing of database
C:-Definition of physical structure of database system
D:-Description of logical structure of database

Correct Answer:- Option-B

Question12:-Suppose that N = {1, 2, 3, ...} be ordered by divisibility, which one of the following subset is totally ordered?
A:-(2, 6, 24)
B:-(4, 15, 30)
C:-(3,5,15)
D:-(2,9,16)

Correct Answer:- Option-A

Question13:-Which among the following searching technique takes O(1) time to locate a data ?
A:-Binary Search
B:-Tree Search
C:-Hashing
D:-Linear Search

Correct Answer:- Option-C

Question14:-The cause for poor response time is
A:-High I/O rates
B:-High paging rates
C:-Process busy
D:-Any of the above

Correct Answer:- Option-D

Question15:-Which among the following statements is false ?
A:-The data dictionary contains the name and description of each data element
B:-Data elements in the database can be modified by changing the data dictionary
C:-The data dictionary is a tool used exclusively by the database administrator
D:-Database administrator normally maintains the data dictionary

Correct Answer:- Option-B

Question16:-The infix expression for the postfix expression x 12 + z 17 y + 42 * / + is :-
A:-x + 12 + z / 17 + y * 42
B:-x + 12 + z / (17 + y)*42
C:-(x + 12 + z)/(17 + y * 42)
D:-x + 12 + z / ((17 + y) * 42)

Correct Answer:- Option-D

Question17:-The basic types of programmable arrays are made of ________________
A:-AND gates
B:-AND gates and OR gates
C:-OR gates
D:-NAND and NOR gates

Correct Answer:- Option-B

Question18:-A COCOMO model is
A:-Complete Cost Estimation Model
B:-Constructive Cost Estimation Model
C:-Common Cost Estimation Model
D:-Comprehensive Cost Estimation Model

Correct Answer:- Option-B

Question19:-The interval between the time of submission and completion of a job is called as ___________
A:-Turnaround time
B:-Waiting time
C:-Response time
D:-Throughput

Correct Answer:- Option-A

Question20:-An assembler is
A:-data dependent
B:-programming language dependent
C:-machine dependent
D:-syntax dependent

Correct Answer:- Option-C

HSST CS QP 144/2013 - Part 1

Question1:-In a BST, the traversal type which would print the values in the nodes in sorted order is :-
A:-Preorder
B:-Inorder
C:-Postorder
D:-None of the above

Correct Answer:- Option-B

Question2:-The contrapositive of the statement, "You win the game if you know the rules but are not overconfident" is :
A:-If you lose the game then you don't know the rules or you are overconfident.
B:-If you know the rules and are overconfident then you win the game.
C:-A necessary condition that you know the rules or you are not overconfident is that you win the game.
D:-If you don’t know the rules or are overconfident you lose the game.

Correct Answer:- Option-A

Question3:-If L1 be the class of languages accepted by finite state machines and L2 be the class of languages represented by regular expressions then,
A:-L1 ∩ L2 = Φ
B:-L2 ⊆ L1
C:-L1 ⊂ L2
D:-L1 = L2

Correct Answer:- Option-D

Question4:-In which one of the following models can requirements be redefined
A:-Spiral Model
B:-Prototyping Model
C:-Waterfall Model
D:-Evolutionary Model

Correct Answer:- Option-B

Question5:-The method adopted by the memory management module of an OS of a computer to periodically collect all the free memory space to form contiguous block of free space is called
A:-Dynamic Memory Allocation
B:-Garbage Collection
C:-Concatenation
D:-Collision

Correct Answer:- Option-B

Question6:-Among the following statements about binary trees which one is NOT true ?
A:-Every non-empty tree has exactly one root node.
B:-Every non-root node has exactly one parent.
C:-Every binary tree has at least one node.
D:-Every node has at most two children.

Correct Answer:- Option-C

Question7:-DRAM is used as main memory in a computer system because it
A:-needs refreshing circuitary
B:-consumes less power
C:-has higher speed
D:-has lower cell density

Correct Answer:- Option-C

Question8:-8251 is a
A:-UART
B:-USART
C:-Programmable interval timer/counter
D:-Programmable Interrupt Controller

Correct Answer:- Option-B

Question9:-A public key encryption system
A:-Allows only the correct receiver to decode the data
B:-Does not encode the data before transmitting it
C:-Allows only the correct sender to decode the data
D:-Allows only one to decode the transmission

Correct Answer:- Option-A

Question10:-Environment variables can be accessed by
A:-System programs
B:-C programs
C:-Shell scripts
D:-All of these

Correct Answer:- Option-D

Wednesday 13 September 2017

Computer Networks Questions

1. Ping is a command used for
a) Checking MAC address
b) Checking Networking functionality and validity of IP address
c) Checking cabling performance
d) Checking cable connectivity only

2. DSL is an example of a____________ connection.
A. network
B. wireless
C. slow
D. broadband

3. Internet is
A. a local computer network
B. a world wide network of computers
C. an interconnected network of computers
D. a world wide interconnected network of computers which use a common
protocol to communicate with one another.

4. By an intranet we mean
A. a LAN of an organization
B. a Wide Area Network connecting all branches of an organization
C. a corporate computer network
D. a network connecting all computers of an organization and using the internet
protocol

5. Which layer is closer to the user?
(A) Network layer.
(B) Physical Layer
(C) Data Link Layer
(D) Application Layer

6. What is the port number of DNS?
(A) 21
(B) 23
(C) 43
(D) 53

7. You have one IP: 192.168.10.29. In which layer this IP works?
(A) Network layer.
(B) Physical Layer
(C) Data Link Layer
(D) Application Layer

8. What is the port number of Telnet ?
(A) 21
(B) 23
(C) 43
(D) 53

9. Flow control in TCP/IP is handled using:
(A) Urgent pointer
(B) Acknowledgement number
(C) Checksum
(D) Variable-size sliding window

10. Which among the following is a protocol 'of Wireless LAN?
(A) 802.2
(B)802.3
(C) 802.5
(D) 802.11

11. Which is the protocol among the following that is used for translating from physical address
to Internet address?
(A) ICMP
(B) ARP
(C) IGRP
(D)RARP

12. Which property among the ones given below is not possessed by the HTTP protocol?
(A) Non-cached (B) Lightweight
(C) Stateless (D) Application level

13. The port number assigned to FTP protocol is:
(A) 23
(B) 22
(C) 69
(D) 21

14. The protocol used in TCPIIP for dynamic address assignment is :
(A) ARP (B) RARP
(C) DHCP (D) ICMP

15. Normal Switch operates on which layer of OSI model?
(A) Network layer.
(B) Physical Layer
(C) Data Link Layer
(D) Application Layer


16. What is the upper layer name of OSI layer?
(A) Network layer.
(B) Physical Layer
(C) Data Link Layer
(D) Application Layer.

17.  ARP sends the request in broadcast, response is unicast Error control is down in which layer?
(A) Layer 4
(B) Layer 5
(C) Layer 1
(D) Layer 3

Sunday 10 September 2017

Detailed Syllabus of Kerala PSC HSST Computer Science

1. Discrete Structures

Sets, Relations, Functions. Pigeonhole Principle, Inclusion-Exclusion principle, Equivalence and
Partial Orderings. Elementary Counting Techniques.

Computability : Models of computation - Finite Automata, Pushdown Automata, Non –determinism and NFA, DPDA and PDA s and Languages accepted by these structures.

Grammars - types of grammars - type 0 , type I, type 2 and type 3. The relationship between types of grammars,Languages, Non-computability, Non-computable problems.

Groups : Finite fields and Error correcting / detecting codes.
Propositional logic. Predicate logic. Well-formed formulae (WFF). Satisfiability and Tautology.

2. Computer Arithmetic

Logic families : TTL, ECL and C-MOS gates. Boolean algebra and Minimization of Boolean functions, Flip-flops- types, race condition and comparison, Design of combinational and sequential circuits.

Representation of Integers : Octal. Hex. Decimal and Binary 2's complement and 1's complement arithmetic. Floating point representation.

3 . Programming in C and C++

Programming in C : Elements of C - Tokens, identifiers, data types in C, Control constructs in C, Sequence, selection and iteration. Structured data types in C - arrays, structs, unions, strings and pointers.

Object-Oriented programming Concepts : Class - object, instantiation, Inheritance –polymorphism and overloading, aggregation, abstract classes, generalization as extension and restriction. Object oriented design. Multiple inheritance

C++ - programming : Elements of C++ - Tokens, Identifiers, Variables and constants. Data types, Operators. Control statements, Functions, parameter passing, Class and objects, Constructors and destructors, Overloading, Inheritance, Templates, Exception handling.

4. Relational Database Design and Query Languages

E-R diagrams, Transformation of E-R models to relational design, Normalization - INF, 2NF, 3NF, BCNF and 4NF.

SQL : Data Definition Language (DDL), Data Manipulation Language (DML), Data Control Language (CDL) Commands. Database objects like- Views, indexes, sequences, synonyms, data dictionary, Embedded SQL, QBE Query Processing and Optimisation, Centralised and Distributed Database, Security, Concurrency and Recovery in Centralised and Distributed Database Systems, Object Oriented Database Management Systems – Concepts, Composite objects, Integration with RDBMS applications.

5 . Data Structures and Algorithms

Data, Information. Definition of data structure, Arrays, stacks, queues, linked lists, trees, graphs, priority queues and heaps.

File Structures : Fields, records and files. Sequential, direct, index-sequential and relative files. Hashing, inverted list and multi-lists, B-trees and B+ trees.

Graphs : Definition, walks, paths, connected graphs, regular and bipartite graphs, cycles and circuits. Tree and rooted tree, Spanning trees, Eccentricity of a vertex radius and diameter of a graph, Hamiltonian and Eulerian graphs. Planar graphs. Sorting and Searching Algorithms, Analysis of Algorithms, Interpolation and Binary Search.

Asymptotic notations - big oh. omega and theta. Average case analysis of simple programs like finding of a maximum of n elements. Recursion. Quick sort.

Design of Algorithms (Divide and Conquer. Greedy method. Dynamic programming. Back tracking. Branch and Bound).

6 . Data Communication and Computer Networks

Data Communication : Analog and Digital transmission. Asynchronous and Synchronous transmission. Transmission media. Multiplexing and Concentration, Switching techniques. Polling. Channel capacity. Transmission media - twisted pair, coaxial cables, fibre-optic cables, wireless transmission- radio, microwave and infrared waves. Light wave transmission. Telephones - local loop, trunks, multiplexing, switching, narrow band ISDN, broadband ISDN. ATM, High speed LANs. Cellular Radio, Communication satellites, geosynchronous and low-orbit.

Reference Models : The OSI model, TCP/IP model. Topologies, Networking Devices.Protocols for - (i) Data link layer (ii) Network layer, and (iii) Transport layer, TCP/IP protocols, Networks security, Network administration. Local Area Networks (LAN), Metropolitan Area Networks (MAN), Wide Area Networks (WAN). Wireless Networks, Inter Networks.

Internetworking : Switch/Hub. Bridge. Router. Gateways. Concentrated virtual circuits. Tunnelling, Fragmentation. Firewalls.

Routing : Virtual circuits and datagrams. Routing Algorithms. Congestion control.

Network Security : Cryptography - public key, secret key, Domain Name System (DNS) – Electronic Mail and World Wide Web {WWW). The DNS, Resource Records. Name servers. E-mail architecture and E-mail Servers.

7 . System software and Compilers .

Assembly language fundamentals (8085 and 8088 based assembly language programming). Assemblers - 2-pass and single-pass. Macros and macro processors.

Loading, linking, relocation, program relocatability. Linkage editing.

Text editors, Programming Environments. Debuggers and program generators.

Compilation and Interpretation. Bootstrapping. Phases of compilation. Lexical analysis. LEX. Context free grammars. Parsing and parse trees. Representation of parse trees and rightmost and leftmost derivations, Bottom up parsers - shift-reduce. operator precedence and LR. YACC.

Top down parsers - left recursion and its removal. Recursive descent parser. Predictive parser.

Intermediate codes - Quadruples, Triples. Indirect Triples. Intermediate code generation, Code generation, Code optimization.

8 . Operating Systems

Main functions of operating systems. Multiprogramming, multiprocessing and multitasking.

Memory management : Virtual memory, paging, fragmentation.

Concurrent processing : Mutual exclusion. Critical regions, lock and unlock.

Scheduling : CPU scheduling. I/O Scheduling. Resource scheduling. Deadlock and scheduling algorithms. Banker's algorithm for deadlock handling.

The Unix system : File system, process management. Bourne shell, shell variables, command line programming.

Systems Calls : Creat, open, close, read, write. Iseek, link, unlink, stat, fstat, umask, chmod, exec, fork, wait, system.

9. Software Engineering

System Development Life Cycle (SDLC) : Steps, Water fall model. Prototypes, Spiral model.

Software Metrics : Software Project Management.

Software Design : System design. detailed design. function oriented design, object-oriented design, user interface design. Design level metrics.

Coding and Testing : Testing level metrics. Software quality and reliability. Clean room approach, software engineering

10 . Computer Graphics

Display systems. Input devices, 2D Geometry - .Algorithms for drawing primitives, clipping and windowing, windows, view ports, Graphic operations for transformations , 3D Graphics. Animation, Graphics standard. Applications. Storage Devices, Input Tools. Authoring Tools, Application, Files.

11. Programming Language Theory

Programming language concepts, paradigms, models.

Data. Data types, Operators, Expressions. Assignment. Flow of Control - Control structures, I/O structures. I/O statements, User-Defined and built-in functions. Parameter passing.

Principles, classes, inheritance, class hierarchies, polymorphism, dynamic binding, reference semantics and their implementation.

Principles, functions, lists, types and polymorphism, higher order functions, lazy evaluation, equations and pattern matching.

Principles, horn clauses and their execution, logical variables, relations, data structures, controlling the search order, program development in Prolog, implementation of Prolog, example programs in Prolog.

12. Current Trends and Technologies

The topics of current interest in Computer Science and Computer Applications shall be covered.

The experts shall use their judgement from time to time to include the topics of popular interest which are expected to be known by an ardent follower of the field. Currently, they include :

Parallel computing

Parallel virtual Machine (PVM) and message passing interface (MPI) libraries and calls. Advanced architectures. Today's fastest computers.

Mobile Computing

Mobile connectivity - Cells. Framework, wireless delivery technology and switching methods, mobile information access devices, mobile data internetworking standards, cellular data communication protocols, mobile computing applications. Mobile databases - protocols, scope, tools and technology.

E-Technologies

Electronic Commerce : Framework, Media convergence of Applications, Consumer Applications, Organisation applications.

Electronic Payment Systems : Digital Token, Smart Cards, Credit Cards. Risks in Electronic Payment System, Designing Electronic Payment Systems.

Electronic Data Interchange (EDI) : Concepts, Applications, (Legal, Security and Privacy) issues. EDI and Electronic Commerce. Standardisation and EDI. EDI Software Implementation. EDI Envelope for Message Transport, internet-based EDI.

Data Warehousing : Data Warehouse environment, architecture of a data warehouse methodology, analysis, design, construction and administration.

Data Mining : Extracting models and patterns from large databases, data mining techniques, classification, regression, clustering, summarization, dependency modelling, link analysis, sequencing analysis, mining scientific and business data. Principles of parallelism, co routines, communication and execution, Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) routines and calls. Parallel programs in PVM paradigm as well as MPl paradigm for simple problems like matrix multiplication.

HSST Computer Science Syllabus

Main Topics:-
(1) Discrete Structures
(2) Computer Arithmetic
(3) Programming in C and C++
(4) Relational Database Design and Query Languages
(5) Data Structures and Algorithms
(6) Data Communication and Computer Networks
(7) Systems Software and Compilers
(8) Operating Systems
(9) Software Engineering
(10) Computer Graphics
(11) Programming Language Theory
(12) Current Trends and Technologies

Kerala PSC HSST Computer Science Exam Notification

Name of Post: HIGHER SECONDARY SCHOOL TEACHER (Junior) - COMPUTER SCIENCE / COMPUTER APPLICATION
Department: KERALA HIGHER SECONDARY EDUCATION
Category Number: 341/2017
Last Date: 4th October 2017
Scale of Pay : 32,300- 68,700/-
No. of Vacancies : Anticipated
Website: www.keralapsc.gov.in