0% found this document useful (0 votes)
105 views

Ceriificate in Computing (Cic) Tbrn-End Examination: .Fune, 2008

(1) John Von Neumann is considered the grandfather of modern computers. (2) Super computers are the largest, fastest, and most expensive type of computer. (3) Second generation computers were based on integrated circuits (ICs).

Uploaded by

Amman Jakhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views

Ceriificate in Computing (Cic) Tbrn-End Examination: .Fune, 2008

(1) John Von Neumann is considered the grandfather of modern computers. (2) Super computers are the largest, fastest, and most expensive type of computer. (3) Second generation computers were based on integrated circuits (ICs).

Uploaded by

Amman Jakhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

CIC-!

(E+H)

CERIIFICATE IN COMPUTING (CIC)


l

Tbrn-End Examination
'
.fune,2008
E---

CIC-2 : THE TECHNOLOGY

Tlme : 2 hours Ma.ximum Marh^s: 700

Note:
(t) Do rwt stort enswering untit thz invillatur ashsyou to storrt..
fti) Qucsti.onpaper contd,its 100 quzstions. Studznt is requircd to dnswer dl! tha questin B.
T'lwre is no chnice.
(iii) Nl questions carry equal narha
i . .
v -. . . ('iul. Eoxh quastion tnwt he given .w ansunr op$". If .mon thta otu cnsurr is mdrhcd or
given, zem marh will be awdrdpd forthat quastion.
:

, . A Multiple Choice (Gluestlohe nunber I to 6O)

'
Note : Four choices are giuen fur a qunstinn, out of which oro cli'zl.icemq be correct. Marh
'
con?ct answer in relcuant colunn of thz answer sheet giwn n you. In care you feel tltat
'
.' norc of tlw choices given in a qrnstion is mrrect, ma,rh in column 'A.

l. Who is called grandfather of moilern comput€rs ?


, (1) Bill G'ates (2) John Von Neumann \
. \: , (3) , Charles Babbage (4) Howard Aiken

, ,./., The largeet, faetest and most expensive type of computer is


, I
' (1) Personal comput€r (2) Server

, ,' (3) Super computef (4) Mini computer

3. Second Generation Courputers were based on


(1) Discrete components
(2) ICe
(3) Vasuumtubes

,' ir cle'2(E+H) (1) . P.T.o.


4., . -PG.Astnnds for
(1) Particle Gas Analyser
Pin Grid Array
(3) Particle Grid.Analyser
(4) Pin Grid Analyser
, ,
8088is a bit chip.
(1) 8.bit (2)' 16rbit
(3), .,Both (t) and (2) , (4) None of tbese

6. NEC is an example :J:i_-j-,:,:- computer.,. I ..,. ; .,,


"f
(l) Micro (2) Mini
.
(3) Mainfrmro ' - (4) Super

7, Followidg is not a valid pmgram interupt :


.. .' Jl) , Division b.yzero,
(2) Aritfimetic.overflow
(3) Hard tlisk crash
(4) Attempt of executihg an illegal inetruc,tion r-r . . i , : ! . a i i a i + r . 1i , \

E, Which is a eequential access technologr ?


(1) Mag;netic disk
(2) Magnetic tape
(3) Compact diek
(4) Semiconductor memory

Writing time is in the order of hours for


(r) RoM (S) FROM
(3) EPROM (4) EEPROM

10, Which of the following is a pointing device?


(1) Iftyboard ' (2) Lieht p'en
(3) LCD (4) Printe,r

11. DMA stendsfor


(1) Dire4 Memory Access
(2) Dynamic Memory Accees
(3) Dynamic Memory Analysis
(4) Direct Memory Analysis

clO-2 (E+H) '(2


)
L2, The speeil of ilot matrix printer is measured in
(1) characters per second (2) lines per second

(3) Iines per rninute (4) pages per minute

grven by
18. The classi.fication of parallel computer is
(1) Atexz (2) FlYnn

(3) (4) John


RotYm

L4.Thekindofresourceswhichneedtobeprotectedfromgimultaneousaccessofmorethanone
processes are called
(1) Mutua] Exclusion
(2) Critical Section
(3) Fair Scheduling
(4) None of these

antl pipelined floating Pointe arithmetic


18, The conmercial computer with vector instruction
operation refers to comPuter'
(1) Micro (2) Mini

(B) Mainframe (4) Super

16. dBASEis an examPleof


' (1) UtilitY
' (2) SystemProgramminglanguage
L
| (3) Database
(4) OPerating sYstem

1r7, Following is a example of a logical operator :


(2) NOT

(3) - (4) None of these

f8. Graphical Device Interface (GDI) supports


(1) Vector graphics (2) Raster graphics

(3) Both (1) and (2) (4) None of these

introduced
19. The seconil era of comput'er systein evolution
(1) Distributed system
(2) Object-oriented sYstem
(3) Batch Processing
(4) MultiProgrammrng

(3) P'T'o'
c t c - 2( E + H )
20. Casetools are related with
(1) SDLC /tt arDTr
(3) Rrsc (4) Assembly language
21. Following is nof a valid type
of language tool which falls into 4GL
category :
( I ) Aseembler
(2) ApplicationGenerator
(3) Report Generator
(4) Decision Support System

22, Number of bits used for data communication


in ASCII Stanilard is
( 1 ) 8
Q ) 7
(3) 16
(4) 32
?.A. High level Data link ie
_ protocol.
(l) bit oriented
(2) byte driented r"
(3) character control
(4) word control
' t';ri -i 1
24' sinplex mode of communication
channer a'owe the data tranefer
(l) in one direction
(2) in one direction at a Ume
(3) in both directione at the eame
time
(4) None of theee

26, In which topologr are a number


of nodes commonly direoted to a central
node ?
(1) star (z) Bus
(3) ,Ring
(4) Mesh
26. Which of the following ie no, a valial step
for cirvuit switching ?
(1) Circuit termination
(2) Data transfer
(3) Cirsuit establishment
(4) Network accesspassword

27. Which of ttre following is tJ:e part ofa


cipher eyetem?
(l) TYansposition
(2) Substitution
(3) Both (t) and (Z)
(4) None of these

Glc-2 (E+H)
(4)
*self replicating" program ?
,t8. Who frrst gave the concept
of

(1) Ronald Rivest


(2) Adi Shamir
(3) Leonard Adleman
(4) John Von Neumann

of
Porper ON self-test is a Part
(1) Booting
(2) CryPtograPhy
(3) Networking
(4) DisasterManagement

which file ?
30, System infector virus afiects
(1) Command'com
(2) Autoexesbat
(3) IBMDOS'com
(4) Index'bat
in
can be incorporated
t'he CHKDSK command
31' For Ptevention of vrrus
(1) Autoexec'bat
(2) Command'com
(3) Config'sys
(4) IBMDOS'com
ph"t"'
of
alternatives is a part
32. Identifying risk of various
(2) Design
(I ) Defrnition
(4) ImPlementation
(3) Requirement

33. LAN stands for


(1) Long ArraY Network
(2) Local Area Network
(3) Line Area Network
(4) None of the above
files ?
intreases the size of 'EXE and 'COM
34. Which of the following viruses
(2) RaindroPs
(1) Marijuana
(4) Brain
. (3) Jerusalem
P.T.O
(5)
clc-2 (E+H)
(1) Assembly
(2) c
(3) coBOL
(4I Pascal
- used in the caseof computer networks ?
Which of the following is not

(t) Briilge
(2) HighwaY
(3) Gateway
(4) Router
a task is calleil
wti tten in any language to achieve
A sequence of instructions
(1) Flow chari
(2) Algorithm
(3) Program
(4) Project
byt€s.
' 47. One MegabYteis equal to
(2) 1000
(1) 100
(4) 1024 x 1024
(3) 1024

a printer.
4E. DaisY wheel Printer is '
(2) Iine
. (1) char
(4) file
(3) Page

'49. developed by
Macintosh computers were
(1) APPIe
(4) Intel
(3) IBM
and
level
written in any high
ri^ reads the program
error'
Produces s)rntactical
(1) Compiler
(2) Interpret€r
(3) Assembler
(4) Linker

(7)
CIC-2(E+H)
------:-

B State whether Tlue


or l,ak n (QuestioDs
number'61 to 100)
. Note: In thc fohouing SO qucstion
s' mark 1, if thz ctabnvnt given
giuen is false. is true and o if tfu statemznt

61, Supercomputereare ueed


in weather forecasting.

52. Arithmetic calculation


ie done b;r registers,

EB. Hard copy ie tle output


taken by printer.

84. Accessis programhing


language.

5b, RAM is the eranpJe of


volatile memory.

66. if-then-eiseis a conditional gtatement

67. JAVA is a object_oriented


language.

69.. Coiuputem couJd


be connectedusing MESH
topolog,.
69' Fibre optice cable is clieaper
than the coaxial cabre.
60. Telnet is used for remote
login_

Gr. WORJ|Icreates a eopy (.


of itsel-f,

62. Joyetick is a pointiag


device.

6Il. Dot matiir printer is a pa€ie


printer,
:
64, COBOL ie uged for mathematical
formulation in seientiEc
application
66. Ihe raw facts al€ csled
commande.
' 66. EXpEL ia use{ to breate
a table and graph.

a7' UNH iB a murtiuser system


that supp6rts multi-tasking.
plotters Ere
nore euitable for tcit
output.

C[C-A(E+H)
.(6)

-:--- -
60, Compilet i8 a system software'

7O. SPIOOLING is used with the CD drive'

industry'
71, MS-WORD is used to create presentations in t'he

organizatrons'
7i-, IJND( is an operating system suitable for very big

7g. DVDs have less storage than CDs'

71. DELNET is the national network by NIC'


't : ' i,o
services using digital t'ransmissiotii
76. ISBN is the int€gration of voice, data and viileo

?6. Data is more meaningful in comparison to information'

77. Intel developed OSi2, ihe operating system'

Operating System'
7E. l}ansparency is the main advantage of Distributcd

75, A word on PC-386 is equal to one byte'

80, ROM is the erample of sequential memory accesa'

storage devices'
81. Secondary storage devices are slower than primary

S2t, Encryption is related to network security'

8:1. Modern is an inPut devrce'

g4. Every operating system contains FAT'

86. Conments lines are igrrored by the compiler'

E6, OCR is used for playing games on comput€r'

87, ENIAC i8 the example of cornputer virus'

88. GatewaY is ueed in I"AN'

: P.T.O.
CIC-2(E+H) (s)
t9, Scannerb an input dwice.

90, Numeric keys are also called Special keys


in caaeof keyboard.

91. Dot matrir printer ie normally slowrr


than laecr printer,

S2. Java ig used for designing web eitee.

9& Linking i.s tlre prucessof writing computer


instructions.

54, IJPS is an exanple of storage device.

e6. CPU.is tlrc nair p€riphersl devioe. .. I

0G Ttojans are also callod WORJT{S.

Vr. Picturee ar€ likety to be storett in.bmp


or.gif file,

S6. One byte containr l0 bite.


i ,: . j rI r r Ll.rl i1l

99. Tlvi€tad wire is the tyae of tran$rdssion


media.

lfl). Assembly language is the example of .low


level.language,

.T':
.'

tt,

CIC-2(E+H) ( 1 0)
fsG.ffi@l
sffiAtd il{ ts.sr$.rft.)
TITTKIqSan

qr{,2008
: cts\m
<ft.slr$.S.'z
efqndsei6 :1oo

cle : 6{+ * ftlg a a'AI


tn sqit6r rat tusq dqdqgt{ar a +t qq aa;frttrq g(t
l'e ;-fg,'#i #'a ,
(ii) * * i roowq t t ffidta) s'r?Yr+wt wAar
(iii) flv? yflA * sr6 €{r+ d I
31ful.ru-r}rr frw dtts' Tg d cI
- Iw) rd+ v+q w *-qa {+ d rar f r cR (d t qrY
*{ Eq 4s Fi # ss xw 6t W aia Rsr t

6 .e5fuee (c{q {rf,I r i ro ra)


ffif@dYrt f t-+d rrr +Bi Elr tr-6-f,t?s rs d';ffi A qE rd ai s+-ar
tE : 'iir# #-i qA +ld d' r* d 'adl
d r sd' s-arql sat crt w ddf'n m"i i'
d, a oY W rotii i'itud6t I
:.
1. 3flgtrdsqrii qr irql +tq i z
1
(l)
c- 5-
16lC| 'l4.tl rzl d-q dq qqi
(4) d'{d t}c
tsl qrd ++c
t
,. Fl[i{dq, Saneft ntq orftr+cfrnrrs a16qn t
rD qf+s q'qd{ tzl v*
(4) firft 6q.t
iB; gq{ 6qei
s. q-fr + 6qc{ 3nqltuA
Wfr
11; eninaqeeitc{
(2) IC tR
(3) firqtaq[e c{
t+r qif,weitqc
F.T.O.'
( 1 3)
clc-2 (E+H)
- ---. -------T

4. PGA4r q4 i.
(1) Particle Gas Analyser
(2) Pin Grid Array
(3) Particle Grid Analyser '
i4). Pin Grid Analyser

o. 8088=_--- G-efrc i r
(I) s frs (2) 16fre
tsi +if tu €ihrzl (4) F{i + +$ Tfr
*.-Fqatflrffd{uriI
(r) q|{fi (2) fofr
13yffiq (4) gs{
ffidfud qrq Fqtt$ sirtrq at? d :
(l) E4 ERIfuffi{
12; fufrffiq srFTs-{E
(s) Erdfss *{r
(4) qqrq 3qfu + frqrq +r rqrs
qJsfrs i{ft{c x1dffi
*T-{sT * ?
(r) gq-fiq frE;
(z) Eq+tq 2q
(B) {'Ffi bs
. (4) 3Tsqrffi qfr
s. +s{ 6rd qfrrsR*Aeq=lilmrt r
(1) ROM
(2) PROM
(3) EPROM
(4) EEPROM
ro. fr"ry + + sffi ri+drgtu
- t ?
(1) $frTrfi
' e) r6pr ffi-
(3) LcD
@) fi*
lL DMA 6r aI{ d
(l) Direct Memory Access
(2) Dynamic Memory Access
,
(3) Dynamic Memory Analysis ,
(4) Direct Memory Analysis

( 1 4)
rz. tr€ itrfi fi'ansfiqfr crfrcRfrt
ru rirat+np6fr-6trsii tz) 'ifr cfutqE-st
rsl rifr xfd F-{c ii t+l Ye cft ft-i-J it
ls. grrc-(6!411 6I Efi*ltrl t<qr tcl t
ru qffirog gm tzl fime anr
rat tEq eRI (4) fr EEI
t {qr+d effi{6-dl+fr
sIFTrrc
+-
t.
14. {erlii 6r q6 *5RmScd + olnrdctfr{itt gqc-(
i, .r6-dTA
t
111 qqg{ 3{T{+{
<zl ntfr-*aqun
tal scEsFr+ff
r+l {ciin +i Tfi
rtfirrd-q{frqT qifd qTqqrtr{ +,qn 6I sq-q
rs. qRfl q-itfl sfu {iqffigd +e f*g
_6,q]{s€,
tD ql{fr rzl fi-fi
rF (s) +{hc (4) s
16. dBASE sqr6{oTt
tri scdFrf,T6r
tzr xqrd ficRrri qTsr6I
tai slisgr-{qc 6l
(al rqre-qir +t

l?. fiTqfufufiT${nrd{slc+ fl scr6{olt '


(2) NOT
(3) - rai {cCi eid c'fr
\
lE. 3IrAfTs gfu sid{rg€ (cDI) s6l-{f,I 6'{dTE
(1) qR{T rzl Mic ardf€d
(B) qtfi rrlq\ tzl t+l {ci n +$ =rfr
rg. 6rqn qrnfr ft"{rv + frfrc g'r cr r+da f++
rrt ffia x"Trfrt
rzl eIffi cqtm i
(3) Fqqtsrrrq t
tnl qgmqrtvni
( 1 5)
P.T.O.
CIC-2(E+H)
zo. *v qffi sqd t
(u sll,c t (?l cPut
(gt nrsct (4) +siilrul qM +
zr. ftqfdfud qm qFtq;il qrer {6rr ldt ql
^. r{ \ '
t +cr,*ufrd erdrt ,
o) +sirfs
rzl str-+r qtfi
rsl R'+Jqfr-t
(4, |coh VUq cunei
_4r,
'ti
rrFrdr
zz. ASCrr n sri+Erri+qurg feq rfm ffii +1{igt
(r)
t
I (2) 7
(3) 16 (4) 32
2a. sq Hr srisg te-dr rjtvnqnd r
o) frc ffiS
rzl qrE-edqfi
tsl drfrs f+iTur
(4) rrE fr.itur
24. dqrqcure'* STdbila(ful+w).frqr+ qirgr sif,rrT ',-,
6r d n# t il
rrl q+ Rvnfr ' "': '
(2)q{srqdqsRflt
(3) gds6 q{q i *+ ns,Tsild
r+r r+it+ +$ TS , .,...
25. fu€HiRqFdEfr
'' e*t-s+d d {rs*o*qrqs ++c #s
(1) dI|S
vcfr?fr,ofu* qrdrt ?
(z)
(3) ScH "Gf
t+l srflfu
zn. ffidfud t i 6iTsrcRccfuqc * feq q,q
+crq ?a? t ?
rri qRqq iria-o
tzl sri6-gtirid{ur ,t{.
(B) qftqE TErqfl
(4) qcEfig 3ftqq qgur-$E
27. Frqfdfuan + +ffr {Fq( nqTf,l6r,inr
???+ ? r:i
rrl xqqfr+dq
tzt qfr{Elq{
(B)s)it<ueft (z)
r+rFcitn+f Tfr
CIC-2(E+H)
( 1 6)
)
28, s-qt rdA fq,st {
"sd' xftEfdl dtclt{r 61 enen-{qr
(1) iir€ fi+s
12y{P vtfrt
rsl m sffia
(4) fi d{ qfc

ss. .{Et oN€-cftsq slrtTe


(1) Sdrfr 6I
121tgoo+ er
(3) qlei5{M E5I
1ay efrTrffimitn qt
z
a0. d? ri*lqq qT{tsfrs dfr-6ld nrn*a +ctr t
(1) Command'com
' tZ) Autoexec'bat
(3) IBMDOS'com
(4) Index.bat

qqif{s mqr s; E4-dJ€


sl. srfls FrsRur* frq cr*osrqHiYr
(l) Autoexec.batit
(2) Commantl'comit
li
(3) Config.sYs
(4) IsMDoS'com lt

6I qFTt I
az. Efr{ f{+Ftii + ificc fr rr{qn Erttr -cFftql
(1) cRqNI (2) Ff,r{4
t(a) o{rg{qfi-at . (4) B=t"*

83. LAN6I 3Tq €


(1) Long AraY Network
(2) Local Area Network
' (3) Line Arba Network
r+r sq'sst t 6t{ Tfi
a \: \ \a ---6r

3{6R {€rfrl t ?
:X. firqfofi*a li + +tfir qscT 'ExE$t corvr{ff*reit 6T
(r; it{.rnr (2) t{-ff
(3) +ssfrc (4) +{
P.T.O.
( 1 7)
CIC-2(E+H)
$5. or6fus dqn qT'rt : lt f:
(u frERqsqnit+r
rzt arJTfuolwnit
+r
(s) qsnfls sqrritqr
r+r {qitn +$ i-fi
qliq qr sdqq i
rrr iElqR'Vt6-e il feq{
rz) qffi t#r er mrh
te; q$ trfw{f, t*a +r egww+
(4) gflEf,"r{*-a *r mqsa *+o t sqfarq
8?, Trq6'Tc{ tffiql s*-s BS w+ t
ru d) Ti{dq+ fds
(2) cuIII
(3) f+snfr
(4) =c{s q i + { r f f
,3E. EqF*t{ gfu t r
(rl friw
<a)+ii tu ethrsl
89, neu t

4r. d*a rtsrq m Rhrq frqEd c,{+qld qpffrtst qr ,


ta eEdrdr$
rrl geiftq (2) ISO
(B) {isrsR (4) TF+€q . i . . . . ', : . ,
. . . r ..
42. qrm#cEwr t qqf*rd fir ti z
t r l fffi
fi (2) RSA
f+t ds F+f
r+f
rr8. +{qr frfrffi q.ft +r sq6{urTdl, * I
(1) ROM
: (2) Wfi
ol erdBw
?5+t4t q l ,
Clc-2 (E+H)
(18)
\
qrqr ql 3ilI8rd E I
(1) 6lsifr{
(2) c
(3) *+f, (coBol)
I (4) qtFt-f, (Pascal)

qrmt ?
lr. fiiqfefu-ct t +t{ff 6qt{ qmfic n ryfi rl7 aqr
rrr tt -'J

(2) IrdrcH
(3) ERqE
(4) qFl6

+-eerar
46. qrdcrq 6d + rds ffi fi rnqri Fsd.rq a-ga{im ergm+ i
11y YqrdsrJ
'
tzl qeiRcq
rsl xqtvt
ral qR-frqcl

17. tF t{rer{c -------_-@ + q{FR ErdIE I


(1) 100 e) 1o0o
(3) 1024 (4) lO24x rO24

48. ,3.fr6f, fi'{r --ra< €rmt i


(1) chir (2) E{rfl
-:G+
(3) (4) Hlqq'l
9€

,[9, tHrT +qer ffit'fre'Ts t


(1) qc.m dt{ tzl qrtfrde snr
(3) IBMERT 1ayile em
ffifrsqwt qrqrii eq+enfsd 'TSxqrtsr q6-drt aqr qrmqf,3e
t{srtrdrt I
(1) sllqFrs
(2) t{+{s
tal *sirt+.
(4) Tstrfr

( 1 e) P,T,O.
CIC-z(E+H)
;ie: s?+sows Rs rS d t 4E ftqxTrqT
6{4 sA d al t dfud d, sHEr ss €rH
qR qw
w o eiihd 6t, qaa al t

61. tsr6%r +*" g-+g* + fds rgs fqq qri t r


62. sioqFrfrqqRq-fl{qffi Enrfrqt qnr t r
68. rffiq iTftfre trgr rRr fuqrrrqrf+tq t r
ficrtflq qrqrt r
64. .srFT'rc

66. nAMttc) s-qt6rsqfr cr s{F{or € r

'66. if-ttren-else
XF*iqfg+ $q{ t I

67, stFfr(JAVA)qFreqf qrsr t r


''''''.
68. +.qrt q+ qrdGr
,,,...1. qiftqfrqi F+'r
.rr_r 6{+
ir\y, €q€ tqrqt qr
a _ ,.. .,,,._,.,*, Ilerrgr f6qr qt v+m
t|ent tF Jr
E s . r u r { . r r s r y = w k e s q l q { * f f i * e f t r f i g r f i s R T t' i - ' . : l '
' "'' r"

60. fufe qcq snrq (e,{'r-{c)* fdc ryr.fu<r q|dr* r


or. wonuwi d FfrffiRg++ +rert r
Bz. sil'4-s-+ffi(fr+k6) \i+fi gfu i |
;
6s. 6g +qw trar p fi-art r
u. qt#e tconorrtr{s Br-g+q t'ffiq q1ur+ fmSygfi fr4 wl i r
66. q{ffi aq wkr (q,qru-s)
\r- \rar\il wsrfr * r
\Yr.tlv€,, qtQfll(l
Q
I
66. q+*s qr r+,T drfffir S{ *rs * gff *,r} + fqs Fiq qnr i r
ort. qF-wcnrxrns s-gf,ctfir
qundt + Eg.+rqwr
d Wr+crornrt r
es.. effdfud(drt) cr{+Rrt{,h + fdS qfud ecEs t r

OlC,2 (E+H) ( 2 0|
09, tr{qrr6 iifl (R{a) xffi+t d t

70. qfri tsroolwc) cD Fr{+ n rgm fr qrtr i t

71, sdtT ii xKfrd gq{ qlt + fms r5fr fuqr cRTt r


Ms-woRD

72,. {Frcs GrNxla-ga4g ffi * tdq scTs r-qffiaiir t t

73. DVgsii cDs d srEqr qq riequTdar i r

74. tttc iFI nS+ q-65q PBIPBT I t

grh
75. rsBNsifrq {qrtr q n+q 6{A gq qr{, qi-+-Er *ffi n-qrcitfl q+t+tq A

76. qa-+ d gc+ t 3li+-9r3TFr6w*+ i t

77. gfu | ss72,xmra iir ffia f+q t

i r
za. r+thn rqrcq dr or 5w enT crGftTfrT

7s. pc-ssoit qs {rq qd qr{e * ew{ i t

80. norvr(tq) eq-ifrFffiqfd srEnTcor ssr€{olt r

81. ttrfr{s qsnq gFszfiHqEq $isn"r 3|+.{ii m orisfl slfqs dE t I

Bs. 'ga,frc-tvrrmr (H) g{c{r i {tiFrd t I

8s. fr*q s-4frnvrgtu i t


84. rd+ rqrcc iir it rar tlar i t

sE. stqrrfr ERIffi qffr{ii d sifrr +t qrfi t t

sB. ocREqfi qr fu ffi + fds l-gs fu.qrsrdl I r

82. ENIAc trqgr qrflq url ssr6{ol d r

s8. r,eNt enqqrgm f++r srdl i r

( 2 1) P.T.O.
crc-2(E+H)
89, nr{v+ f+*wgtu t r
90, {qis dfqcf1idrtr + cwd + ffis
$M S a.rnfr t I
91. fu€ {trw frzt qgrqtrqr+frr fr€r +1irh{r ifim t( + I
92, qsr +s s6e bse{ 6{i + lds rSs frlr qnr
t r
s3. {e-m +q'a €rjeTTfs{c++1cb.qr€ r
94. upsqerqrgfu +r r+rrqt r
95. cPUEeTsqitrcEfut r
96. fr++ wonusS +reri t r
97, fqt .b"'pur.gir{fu6ri d{ +1qr qsfi S r
98. qs ilFs d roft-adfr t r
99, qqfrd il{ {s{Er qtq.q 6r ysq
t I
100, +sidror qrer €ErRRr rttqrqr rqFtor
I r

CIC-2(E+H) ( 2 2)

You might also like