CSS Computer Science Past Paper 2011
PAPER (Objective) 20 Marks
Multiple Choice Questions (20×1)
1. Virtual memory is a memory _____ technique that allows all memory, including main memory and mass storage devices, to be addressed as part of one large logical address space.
(A) Overlapping
(B) Extension
(C) Management
(D) Interface
(E) None of these
2. Hyper threading technologies deliver two processing threads per physical core for a total of _____ massive computational throughout.
(A) 2
(B) 8
(C) 16
(D) 32
(E) None of these
3. _____ unit is capable of mimicking the processor and taking over control of the system bus just like microprocessor.
(A) Control
(B) DMA
(C) I/O
(D) PPI
(E) None of these
4. The ascending order of a data Hierarchy is:
(A) Bit-byte-field-record-file-database
(B) Bit-byte-record-field-file-database
(C) Byte-bit-field-record-file-database
(D) Byte-bit-record-field-file-database
(E) None of these
5. _____ interrupts are initiated by an I/O drive.
(A) Internal
(B) External
(C) Software
(D) Basic
(E) None of these
6. Software testing is a critical element of software quality assurance and represents the ultimate view of _____, _____ and _____ in that order.
(A) Code, design, specification
(B) Specification, design and code generation
(C) Design, specification, code
(D) Code generation, specification, design
(E) None of these
7. _____ is an integration testing approach that is commonly used when shrinking wrapped software products are being developed.
(A) Testing
(B) Smoke testing
(C) Portability testing
(D) Both (B) and (C)
(E) None of these
8. Determine the result of attempting to compile and run the following code:
public class Tester {
public static void main(String[] args){
System.out.println(4 + ' ' +2);
}
}
(A) 42
(B) 2
(C) 6
(D) 4
(E) None of these
9. The class relationship called generalization is the same as:
(A) Inheritance
(B) Aggregation
(C) Association
(D) Abstraction
(E) None of these
10. A static partitioned memory management system has a total of six partitions. If one is allocated to the operating system, this will allow a total of:
(A) Five user jobs
(B) Six user jobs
(C) Thirty-two user jobs
(D) Thirty-six user jobs
(E) Sixty-four user jobs
11. A transaction required to be ACID means it should be:
(A) Access, Control, Integration and Dependency
(B) Atomic, Consistency, Isolation and Durability
(C) Acquire, consistency, Inter-linked and Dependency
(D) Both (A) and (B)
(E) None of these
12. If we reprocess the transaction then the database can be made to come to a state where the database is consistent and so reprocessing the log can _____ the database.
(A) Recover
(B) Rollback
(C) Lock
(D) Append
(E) None of these
13. What is the major role of the DDCMP?
(A) DDCMP does not need special hardware to find the beginning of a message
(B) DDCMP has a message header
(C) DDCMP has an IP Address
(D) DDCMP does not use CRC
(E) None of these
14. In a synchronous modem, the receiving equalizer is known as _____ equalizer.
(A) Adaptive
(B) Impairment
(C) Statistical
(D) Compromise
(E) None of these
15. The maximum transfer speed of 10 Base 5 is:
(A) 100 Mbps
(B) 2 Mbps
(C) 1 Gbps
(D) 10 Mbps
(E) None of these
16. Which of the following is a layer 2 device?
(A) Bridge
(B) Router
(C) Repeater
(D) Hub
(E) None of these
17. Identify the type of routing protocol that maintains a topological database of the network?
(A) Topological State
(B) Shortest Path First
(C) Link State
(D) Distance Vector
(E) None of these
18. The data portion of an information unit at a given OSI layer potentially can contain headers, trailers and data from all the higher layers, known as:
(A) Compression
(B) Buffer
(C) Encapsulation
(D) Spooling
(E) None of these
19. Identify the type of routing protocol that exchanges entire routing tables at regular intervals.
(A) Link State
(B) Interior Gateway Protocols
(C) Apple Talk Routing
(D) Distance Vector
(E) None of these
20. Which environment considers memory, process and device and file management from a global viewpoint?
(A) Distributed Operating System
(B) Network Operating System
(C) Multiprogramming Operating System
(D) All of these
(E) None of these
PAPER (Subjective) 80 Marks
Attempt ONLY FOUR questions from PART-II, selecting at least ONE question from EACH SECTION. (20×4)
PART-II
SECTION-A
Q.2. (a)
(i) In how many ways DMA process may be initiated and be terminated?
(ii) The sequence of events as DMA is requested by an I/O device.
(iii) What happens when DMAC receives DMA request from another channel while it is serving one?
(b) Why Interrupts are employed in computers? Briefly describe basic types of Interrupts.
(c) Differentiate between pre-emptive and non-pre-emptive scheduling. Briefly describe round robin and shortest scheduling policies with examples for each.
A bunch of jobs is arriving in the Ready Queue as shown below using SRT and RR(Q=5). Calculate the average turnaround time. Draw the Gantt chart and describe which policy provides better results?

Q.3. (a) Consider a slotted ring of length 10 km with a data rate of 10 Mbps and 500 repeaters, each of which introduces a 1-bit delay. Each slot contains room for one source-address byte, one destination-address byte, two data bytes, and five control bits for a total length of 37 bits. How many slots are on the ring?
(b) Compare the capacity allocation schemes for IEEE 802.5 token ring and FDDI. What are the relative pros and cons?
(c) Compare the individual fields of the IPv4 header with the IPv6 header. Account for the functionality provided by each IPv4 field by showing how the same functionality is provided in IPv6.
SECTION-B
Q.4. (a) Calculate the software cost for building, reusing, buying, and contracting a software system by considering the following decision tree diagram. What decision would you like to take for this kind of software system?

(b) Software requirement analysis is unquestionably the communication intensive step in the software process. Why does the communication path frequently break down?
Q.5. (a) What is polymorphism? How can we achieve polymorphism in Java and what are its prerequisites?
(b) Write exception hierarchy in Java. Enlist the methods of Arithmetic Exception, I/O Exception, Array Index Out of Bounds Exception Classes.
Q.6. (a) Describe the use of Print Stack Trace Method. Consider a STACK with memory size 8. Initially, it is empty. Find out the output of the following algorithm:
step 1. Set X := 4 and Y := 6
step 2. Call PUSH(STACK, X + Y)
step 3. Call PUSH(STACK, 5)
step 4. Call PUSH(STACK, X + 4)
step 5. Call PUSH(STACK, Y – 3)
step 6. Call PUSH(STACK, Y – X)
step 7. Repeat while TOP != NULL
Call POP(STACK, ITEM)
Write: ITEM
[loop ends]
step 8. Exit
(b) Elucidate the concept of Hashing. Explain in brief the various methods used to avoid collision in Hashing.
(c) Insert Key Records: 76, 93, 40, 47, 10, 55 (in this sequence) into the Hash Table of length m = 7 with the Hash Function H(K) = K mod m. Perform linear and quadratic probing.
SECTION-C
Q.7. Write Short notes on the following:
(a) Block Structure of PL/SQL
(b) Database Security
(c) Cybertalk: A new way to communicate
(d) The promise of virtual reality
Q.8.
(a) What is normalization process? Explain the steps to normalize a relation with suitable examples.
(b) Explain the DIFFERENCE between Client-Side Technologies and Server-Side Technologies with some examples.
(c) Define the following briefly:
(i) VBscript
(ii) Servlet
(iii) CGI
(iv) UDDI
(v) SOAP