RPSC Programmer 2013 Peper
RPSC Programmer 2013 Peper
- Pap;er-II
/Code: 02
gfulqi1 "G' ctr /
Number of Pages in Booklet : 16
gffili:hl q W tf&TT /
Number of Questions in Booklet : 120
.,
Paper of the same series. Cati'didate himself shall be responsible tor ensuring this
8. Mobile Phone or any other elc • tronic gadget in the examination hall is strictly prohibited. A cand:date found
with any of such object1onab material with him/her will be strictly dealt as per rules.
9. Please correclly fill your A I Number in O.M.R. Sheet. 5 marks will be deducted for tilling wrong or
incomplete Roll Number.
l Warning : It a candidate I found copying or if any unauthorised material i8 found in his/her possession,
F.I.R. would be odged against him/her in the Police Station and he/she would liable to be
l prosecuted under Sectio 3 of the R.P.E. (Prevention of Unfairmeans) Act, 1992. Commission
may also debar him/he permanently from all future examinations ol the Commission.
r•
i{ H Q;"c!J "'lffi l'..<l cfl cfi1 q-{ ,ml'
6. M 1TR"fl ,r ;fil l/3 "fill ,mt I lf"cl"d -tTT U 0l9J,s i3n\ 0l fu;m '\'l -;:c 1$
{;qi' tr t I fu;t!) '4'l ,i -;, -a <TT cir Ts!@! r§l -ir 7ri'0 iITll: "fi,1 'WIT I
7. ,r -;,-tr,1 • in- q',J qi: trfrmi11 -qi, l-1>( \0. fu; -;rifc1, >f "! tr,1
cn: er rft;,;r fui'a t ;;rr lBl<li qi: i- 1 i'i <fir{ fl.r;.,ar irm ci't ii ,r 'l-"CBI ,;rr it tfrft;,r <1w1T
'\'I '!' 1:j""",I <nT lC!i'l mqi qi"{' Fl'I (rm -;i m q"( fs; 3,u_iicjj cfiT 1,PTII
-cihr$ ti,)-;, tfcfT efl«<.l ib ti3f q)] 1TT1m ?J· '\'l'1TT1T qTTj@ t'1 fui.n J! tlt t;; m, <.ifura
mi:rtl) fl:!ffi'l t &fCT rr;rnTT <.oTttc/T(,1' <El (
!
cf[
8.
1 {Contd...
1 The possibility of errors is maximum in which of the following phase of
SDLC?
(!) Design (2) Coding
(3) Specification (4) Installation and Maintenance
6 The division of system into components, processes and sub system is called
(1) System Analysis (2) System Design
(3) Programming (4) Functional Decomposition
9 CASE Tool is
(I) Computer Aided Software Engineering
(2) Component Aided Software Engineering
(3) Constrnctive Aided Software Engineering
(4) Computer Analysis Software Engineering
16 A COCOMO model is
(1) Common Cost Estimation Model
(2) Constructive Cost Estimation Model
(3) Complete Cost Estimation Model
(4) Comprehensive Cost Estimation Model
20 By metadata we mean
(1) very large data (2) data about data
(3) data dictionary (4) meaningful data
23 Tracing of any input record or process chronologically that has been performed
on a system is an
()) Audit trail (2) Report generation
(3) Batch processing (4) Conversion
02 / COMP-2_A l 4 [Contd...
27 Decision tree uses
(1) Pictorial depiction of alternate conditions
(2) Nodes and branches
(3) Consequences of various depicted alternatives
(4) AJl the above
30 Modularity
(1) is a feature of all programming languages
(2) helps make large programmes more understandable
(3) both (1) and (2)
(4) none of these
34 A structured program
(1) can be reduced to control structures
(2) _is generally more complicated than nonstructured program
(3) can only be modified by the person who wrote it
(4) all of these
02 / COMP-2_A J 5 fContd ...
. -
35 Use of recursion
(I) enhances logical clarity and reduces code size
(2) makes debugging easier
(3) reduces execution time
(4) makes software bug free
41 TCP/IP is a :
(1) Network Hardware (2) Network Software
(3) Protocol (4) None of these
02 / COMP-2_A I 6 [Contd...
45 What loads and executes at client side in Internet ·,
(1) Object (2) Class
(3) JSP (4) Applet
47 Class is
(1) Collection of objects
(2) Return type
(3) A parameter
(4) A template of object to be created
62 _JVM is able to access class having main method without creating any
object because
(I) main method is the first n1ethod to be declared
(2) that is its inherent property
(3) it makes explicit call to main method
(4) main method is declared as public and static
02 / COMP-2_A] 9 [Contd...
71 What is the difference between virtual functions and pure virtual functions ?
(l) A virtual function must have a definition in the class in which it is
declared. A pure virtual function does not provide a definition.
(2) A vinual function does not provide a definition. A pure virtual function
must have a definition in the class in which it is declared.
(3) Both are same
(4) None of these
76 Given
class A
{ int a;
int subtract(int a) {
\\a?
Which ke· word is used to address the conflict occurring b tween instance
variable ' 1 and parameter( l) ?
(I) supt:· (2) that
(3) inline (4) this
02 / COMP-2_A] 10 [Contd...
-
81 Whi h of these field declarations are legal within the body of an interface?
( l) private final static int answer = 42
(2) public static int answer = 42
(3) final static answer = 42
(4) int answer
82 A package is a collection of
(l) Classes (2) Interfaces
(3) Classes and interfaces (4) Editing tools and interfaces
83 << is a
(1) Special operator (2) Arithmetic operator
(3) Bitwise operator (4) Conditional operator
90 Which of the following JSP variables are not available within a JSP
expression ?
Select the one correct answer.
(1) out (2) session
(3) request (4) httpsession
92 Which expression wilt extract the substring "cde" given the following
declaration String str = "abcdef"
(l) str.substring{2,2) (2) str.substring(2,3)
(3) str.substring(2,4) (4) str.substring(2, 5)
96 To get an object of the Print Writer class, we use the get Writer( ) method
of the class.
( l) Htt pServletRequest (2) HttpServletResponse
(3) SessionContext (4) HupSession
02 / COMP-2_A] 14 [Contd...
113 By polymorphism in object oriented modeling we mean
(1) the ability to manipulate objects of different distinct classes
(2) the ability to manipulate objects of different distinct classes knowing
only their common properties
(3) use of polymorphic operations
(4) use of similar operations to do similar things
119 A pointer is
( l ) A key1.vord used to create variables
(2) • A variable that stores address of an instruction
(3) A variable that stores address of other variable
(4) All of the above
02 / COMP-2 A ] 15 [Contd...
SPACE FOR ROUGH WORK
C,
C
l
(
02 / COMP-2_A] • 16 ■