0% found this document useful (0 votes)
48 views

RPSC Programmer 2013 Peper

The document is a question booklet for an exam containing 120 questions over 16 pages. It provides instructions that candidates must answer all questions, which are multiple choice, and details rules around marking and time limits for the exam.

Uploaded by

Root Red
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

RPSC Programmer 2013 Peper

The document is a question booklet for an exam containing 120 questions over 16 pages. It provides instructions that candidates must answer all questions, which are multiple choice, and details rules around marking and time limits for the exam.

Uploaded by

Root Red
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

/QUESTION BOOKLET

- Pap;er-II

/Code: 02
gfulqi1 "G' ctr /
Number of Pages in Booklet : 16

gffili:hl q W tf&TT /
Number of Questions in Booklet : 120

B"IflJ / Time : 2 tiz / Hours I Ma"imum Marks : 100


INSTRUCTIONS
1. Answer all questions.
2. All questions carry equal marks.
3. Only one answer is to be given for each question.
4, II more than one answers are marked. it would be tre11ted as wrong answer.
5. Each question has tour alternative responses marked serially as 1, 2, 3, 4. You have to darken only one
circle or bubble indicating the correct answer on the Answer Sheet using BLUE BALL POINT PEN.
6. 1/3 part of the mark(s) of each qoestion will be deducted for each wrong answer. (A wro g answer
means an incorrect answer or morfa than ono answers for any question. Leaving ;ill the relevant circles or
bubbles of any question blank wVI not be considered as wrong answer.)
7. The candidate should ensure Iha/ Series Code ol the Oullstion Paper Booklet and Answer Sheet must be
same after opening the enveloiis In case they are different. a candidate musl obtain another Question

.,
Paper of the same series. Cati'didate himself shall be responsible tor ensuring this
8. Mobile Phone or any other elc • tronic gadget in the examination hall is strictly prohibited. A cand:date found
with any of such object1onab material with him/her will be strictly dealt as per rules.
9. Please correclly fill your A I Number in O.M.R. Sheet. 5 marks will be deducted for tilling wrong or
incomplete Roll Number.
l Warning : It a candidate I found copying or if any unauthorised material i8 found in his/her possession,
F.I.R. would be odged against him/her in the Police Station and he/she would liable to be

l prosecuted under Sectio 3 of the R.P.E. (Prevention of Unfairmeans) Act, 1992. Commission
may also debar him/he permanently from all future examinations ol the Commission.

l. 1-fl ,n.ri if; ;,m l


2. "61\"l 1t atl; lfllR °t I
3. >f "Cf <!,T if '3TI"( I
4. m "if l;l "Cf \ITIT 'i5I YJ\iIB l ;;nr:i:rTT I
5. iji' i:lTT
>fH l) 1ril t A' T: J' 2. ], .f fui-ar 1TTll i I -:11VP.li t-01 <@
<!>ta·s it-1- 'J'fQU 9>T1l i- I

r•
i{ H Q;"c!J "'lffi l'..<l cfl cfi1 q-{ ,ml'
6. M 1TR"fl ,r ;fil l/3 "fill ,mt I lf"cl"d -tTT U 0l9J,s i3n\ 0l fu;m '\'l -;:c 1$
{;qi' tr t I fu;t!) '4'l ,i -;, -a <TT cir Ts!@! r§l -ir 7ri'0 iITll: "fi,1 'WIT I
7. ,r -;,-tr,1 • in- q',J qi: trfrmi11 -qi, l-1>( \0. fu; -;rifc1, >f "! tr,1
cn: er rft;,;r fui'a t ;;rr lBl<li qi: i- 1 i'i <fir{ fl.r;.,ar irm ci't ii ,r 'l-"CBI ,;rr it tfrft;,r <1w1T
'\'I '!' 1:j""",I <nT lC!i'l mqi qi"{' Fl'I (rm -;i m q"( fs; 3,u_iicjj cfiT 1,PTII
-cihr$ ti,)-;, tfcfT efl«<.l ib ti3f q)] 1TT1m ?J· '\'l'1TT1T qTTj@ t'1 fui.n J! tlt t;; m, <.ifura
mi:rtl) fl:!ffi'l t &fCT rr;rnTT <.oTttc/T(,1' <El (

!
cf[

9. T@ 'Tl<TT oTI. .\lTTT. tf3lcp 1fi: fficjc


'3 B' <iilZ I
'fl'Ji Bil 'lftl 7l<'m (l,tJ<Tl 'U('i m 1P: 5 J1'-IJ ¥'!

8.

'3'11« lfcb 'l m 02/COMP-2_A J


ri'i;rr
3 <Iii ;,nir\'t I m
m
<!>< Wnm %1
<IT ffl 1:fffi if <!i'lt '3l-ITW!>o HflPft qi{ 'illBT t, <IT ,iri:qm in
ITT ,:-,m_ qr_ t ( w<R!'<li'r ) ,,Tfti I.T'1. 1992
1)i! <}!'Q!m <lll' i,•m cf@t 0lT<ff11 <1>1 wmi wm0li

1 {Contd...
1 The possibility of errors is maximum in which of the following phase of
SDLC?
(!) Design (2) Coding
(3) Specification (4) Installation and Maintenance

2 Cardinality in an Entity-Relationship diagram


( l) refers to the number of higher level entities that are used in the ER
model
(2) is used to show the ratio of one entity in relationship to another entity
(3) is used to show the order of the relationships between two entities
(4) gives the count of the number of entities involved in a single relationship

3 The ISO Quality Assurance Standard that applies to Software Engineering is


(I) ISO 9000 (2) ISO 900 l
(3) ISO 9002 (4) ISO 9003

4 Software engineering primarily aims on


(1) reliable software
(2) cost effective software
(3) reliable and· cost effective software
(4) none of the above

S Software feasibility is based on which of the following


(1) Business and marketing concerns
(2) Scope, constraints, market
(3) Technology, finan,ce, time, resources
(4) Technical process of the developers

6 The division of system into components, processes and sub system is called
(1) System Analysis (2) System Design
(3) Programming (4) Functional Decomposition

7 A turnkey project includes


(1) Hardware (2) Software
(3) Training (4) All the above

8 The worst type of coupling is


(1) Control coupling (2) Data coupling
(3) Content coupling (4) Stamp coupling

9 CASE Tool is
(I) Computer Aided Software Engineering
(2) Component Aided Software Engineering
(3) Constrnctive Aided Software Engineering
(4) Computer Analysis Software Engineering

02 / COMP-2_A J 2 [Contd ...


10 Pseudocode can replace
(1) Flowcharts
(2) Structure charts
(3) Cause-effect graphs Decision tables
(4) None of these

11 Project Indicator enables a software project manager to


( l) Assess the status of ongoing project
(2) Track potential risks
(3) Uncover potential areas before they go critical
(4) All the above

12 Site for Alpha testing is


(1) Software Company (2) Installation Place
(3) Anywhere (4) None of the above

13 Cohesion and Coupling can be represented using


(I) Cause Effect Graph (2) Dependence Matrix
(3) SRS (4) Structure Cha1is

14 Black box testing is some time called ')


(1) Data Flow Testing (2) Behavioral testing
(3) Loop testing (4) Graph based testing

15 The most important feature of spiral model is


(l) Requirement analysis (2) Risk management
(3) QuaJity management (4) Configuration management

16 A COCOMO model is
(1) Common Cost Estimation Model
(2) Constructive Cost Estimation Model
(3) Complete Cost Estimation Model
(4) Comprehensive Cost Estimation Model

17 The term HTPO is


(1) Hierarchical Tnput Process Output
(2) System Analysis and Design Aid
(3) Documentation Technique
(4) All of the above

18 Key process areas of CMM level 4 are also classified by a process


which is
(1) CM:M level 2 (2) CMM level 3
(3) CMM !eve] 5 (4) All of the above
02 I COMP-2_A I 3 [Contd...
19 Which is not a Software Life Cycle Model ?
(1) Spiral model (2) Waterfall model
(3) Prototyping model (4) Capability maturity model

20 By metadata we mean
(1) very large data (2) data about data
(3) data dictionary (4) meaningful data

21 A data dictionary has information about


(I) every data element in a data flow
(2) only key data element, in a data flow
(3) only. important data elements in a data flow
(4) only numeric data elements in a data flow

22 The term parallel run refers to


(1) The same job n on two computers to test their speeds
(2) The processing of two different jobs initiated from two terminals
(3) The concurrent operations of existing system and the new system
(4) None of the above

23 Tracing of any input record or process chronologically that has been performed
on a system is an
()) Audit trail (2) Report generation
(3) Batch processing (4) Conversion

24 Good system design prevents data entry errors by


(i) Designing good forms with plenty of space to write in block capitals
(ii) By giving clear instructions to a user on how to fill a form
(iii) Reducing keystrokes of an operator
(iv) Designing good keyboard
(1) (i) (2) (i), (ii), (iV)
(3) (i), (ii) (4) (iii) and (iv)

25 ln interactive data input a menu is used to


( l) enter new data
(2) add/delete data
(3) select one out of many alternatives often by a mouse click
(4) detect errors in data input

26 In a system flowchart, the manual data input is expressed by symbol of


(1) Online storage (2) Keyboard symbol for input
(3) Rectangle (4) None of the above

02 / COMP-2_A l 4 [Contd...
27 Decision tree uses
(1) Pictorial depiction of alternate conditions
(2) Nodes and branches
(3) Consequences of various depicted alternatives
(4) AJl the above

28 In interactive data input terminal commands are normally used to


( l) enter new data
(2) add/delete data
(3) select one out of many alternatives often by a mouse click
(4) detect errors in data input

29 A code is useful to represent a key field because


(l) it is a concise representation of the field
(2) it is usually done by all
(3) it is generally a good idea
(4) it is needed in database design

30 Modularity
(1) is a feature of all programming languages
(2) helps make large programmes more understandable
(3) both (1) and (2)
(4) none of these

31 Which of the following is a tool in design phase ?


(I) Abstraction (2) Refinement
(3) Information hiding (4) Al! of these

32 Top-down design does not require


(1) step wise refinement (2) loop invariants
(3) flow charting (4) modularity

33 [n a decision table if there are 3 variables and 3 rules, it implies


(1) specifications may not be complet'e
(2) design could be faulty
(3) coding will be incorrect
(4) all of these

34 A structured program
(1) can be reduced to control structures
(2) _is generally more complicated than nonstructured program
(3) can only be modified by the person who wrote it
(4) all of these
02 / COMP-2_A J 5 fContd ...
. -

35 Use of recursion
(I) enhances logical clarity and reduces code size
(2) makes debugging easier
(3) reduces execution time
(4) makes software bug free

36 A desirable property of module is


(l) independency (2) low cohesiveness
(3) high coupling (4) multi-functional

37 The graph theoretic concept will be useful in software testing is


( l) Cyclomatic number (2) Hamiltonian circuit
(3) Euclidean cycle, (4) None of these

38 When the ERASE command is used


(!) the file content is erased
(2) the file name is deleted from the directories on the disk
(3) both (I) and (2)
(4) none of these

39 Control structures include


(1) iteration (2) rendezvous statements
(3) exception statements (4) all of these

40 All programming languages


(1) are compatible with each other
(2) can be supported by any operating system
(3) have the same syntax
(4) none of these

41 TCP/IP is a :
(1) Network Hardware (2) Network Software
(3) Protocol (4) None of these

42 Which is the lowest layer of TCP/IP model ?


(1) Host to Host Layer (2) Network Access Layers
(3) Internet Layer (4) Application Layer

43 Which IEEE standard is developed for CSMAJCD ?


(I) IEEE 802. l (2) IEEE 802.2
(3) IEEE 802.3 (4) lEEE 802.4

44 HTTP stands for


( l) Hyper Test Transfer Protocol
(2) High Tension Transmission Protocol
(3) Hyper-text Transfer Protocol
(4) Hyper Top Text Protocol

02 / COMP-2_A I 6 [Contd...
45 What loads and executes at client side in Internet ·,
(1) Object (2) Class
(3) JSP (4) Applet

46 Keyword used for dynamic method resolution ?


(1) abstract (2) dynamic
(J) virtual (4) typeid

47 Class is
(1) Collection of objects
(2) Return type
(3) A parameter
(4) A template of object to be created

48 Which is the fastest port for data transfer ?


(1) USB (2) Serial
(3) Parallel (4) FireWire

49 Which IP address is reserved for loop back or local host ?


(l) 192.168.0.0 (2) 127.0.0.0
(3) 127.0.0.I (4) None of these

50 The size of the JPv4 is :


(1) 16 Bits (2) 32 Bits
(3) 64 Bits (4) 128 Bits

51 Object oriented programming tends to achieve


(I) High coupling, Low cohesion
(2) High coupling, High cohesion
(3) Low coupling, High cohesion
(4) Low coupling, Low cohesion

52 Signature of a method specifies


(l) Authentication process
(2) Return type, name and number of arguments
(3) Inheritance
(4) About method body

53 Polymorphism is achieved using


( l) Method overloading (2) Method passing
(3) Aliasing (4) AJI of the above

54 A condition that is caused by run-time error in program is known as


(1) Syntax Error (2) Semantic Error
(3) Fault . (4) Exception

02 I COMP-2 A l 7 (Contd ...


55 Java applets are used to create applications.
(I) Graphical (2) User interactive
(3) Both (1) and (2) (4) None of these

56 Which of the following is not a primitive data type?


(1) Boolean (2) byte
(3) string (4) double

57 Tool used to compile java code is


(1) Java (2) Javac
(3) Jar (4) javadoc

58 Superclass of all classes in java


(l) Instance class (2) Super
(3) Object (4) Power

59 What common technique attempts to save time and energy by reducing


redundant work in object-oriented programming ?
(I) Reduce lines of programming
(2) Reuse of code
(3) Reduce size of systems being developed
(4) Merging different systems together

60 What term is used to describe the internal representation of an object that


is hidden from view outside the object's definition')
(I) Encapsulation (2) Expandable
(3) Polymorphism (4) Inheritance

61 What part of object-oriented technology defines superclass and subclass


relationships?
(I) Inheritance (2) Scalability
(3) Encapsulation (4) Polymorphism

62 _JVM is able to access class having main method without creating any
object because
(I) main method is the first n1ethod to be declared
(2) that is its inherent property
(3) it makes explicit call to main method
(4) main method is declared as public and static

63 Unicode character set in java contains


(1) 20 bits (2) 32 bits
(3) 64 bits (4) 16 bits
02 / COMP-2_A l 8 fContd...
64 Which of the statements is true in a protected derivation of a derived class
from a base class ?
(1) Private members of the base class become protected members of the
derived class
(2) Protected members of the base class become public members of the
• derived class
(3) Public members of the base class become protected members of the
derived class
(4) Protected derivation does not affect private and protected members of
the derived class

65 The keyword friend does not appear in


(l) The class allowing access to another class
(2) The class desiring access to another class
(3) The private section of a class
(4) The public section of a class

66- In which case is it mandatory to provide a destructor in a class ?


(1) Almost in every class
(2) Class for which two or more than two objects will be created
(3) Class for which copy constructor is defined
(4) Class whose ·objects will be created dynamically

67 Match the appropriate columns :


Columns I Columns ll
a Check style I declarations and documentation parser
b .JVM II debugger for java
C Javadoc m coding standard
d Jdb IV abstract computer for java programs
a b C d
(1) I II ill IV
(2) m II I IV
(3) IV m Il I
(4) m IV I II

68 In a switch block, each case statement is termin,ated by


(I) goto (2) continue
(3) exit() (4) break

69 Maximum number of template arguments in a function template is


(1) One (2) Two
(3) . Three (4) Many

70 Which of the following is example of encapsulation ?


(1) Steering wheel of the car ' (2) Car
(3) Color of the car .(4) Music system of the car

02 / COMP-2_A] 9 [Contd...
71 What is the difference between virtual functions and pure virtual functions ?
(l) A virtual function must have a definition in the class in which it is
declared. A pure virtual function does not provide a definition.
(2) A vinual function does not provide a definition. A pure virtual function
must have a definition in the class in which it is declared.
(3) Both are same
(4) None of these

72 An unconditional control structure is


(1) do-while (2) if
(3) goto (4) switch-case

73 What is NOT true about interfaces ?


( l) Interfaces can be instantiated
(2) There are no method bodies in interfaces
(3) An interface is a reference type
(4) Interfaces can be extended by other interfaces

74 Which statements about the C# language are true ?


( l) ·C# supports both procedural and object-oriented programming.
(2) C# is only a procedural language.
(3) C# is only an object-oriented.
(4) None of the above

75 is a blueprint or prototype that defines the variables and the methods


common to all objects of a cenain kind.
Select the best word .to complete this sentence.
(1) . Class (2) Inheritance
(3) Polymorphism (4) Aggregation

76 Given
class A
{ int a;
int subtract(int a) {
\\a?
Which ke· word is used to address the conflict occurring b tween instance
variable ' 1 and parameter( l) ?
(I) supt:· (2) that
(3) inline (4) this

i7 In Java, 1new1 keyword is used to


(1) Allocate memory corresponding t_o object
(2) Create a new class variable
(3) Create a new instance variable
(4) Calling default constructor

02 / COMP-2_A] 10 [Contd...
-

78 What is garbage collection in the context of Java?


(1) The operating system periodically deletes all of the java files available
on the system.
(2) Any package imported in a program and not used is automatically
deleted.
(3) When all references to an object are gone, the memory used by the
object is automatically reclaimed.
(4) The JVM checks the output of any Java program and deletes anything
that doesn't make sense.

79 Everything needs to be incorporated in classes in Java. So primitive variables


(int, float) can be directly defined because
(l) it is explicit 1
(2) of Wrap_per Classes
(3) of Inner classes :t (4) All of these

80 int occupies bytes in java.


(I) 2 (2) 4
(3) 8 (4) 10

81 Whi h of these field declarations are legal within the body of an interface?
( l) private final static int answer = 42
(2) public static int answer = 42
(3) final static answer = 42
(4) int answer

82 A package is a collection of
(l) Classes (2) Interfaces
(3) Classes and interfaces (4) Editing tools and interfaces

83 << is a
(1) Special operator (2) Arithmetic operator
(3) Bitwise operator (4) Conditional operator

84 Which of the following variable declarations would NOT compile in a java


program ?
(1) int var; (2) int VAR;
(3) int l_var;. (4) int var 1

85 All exception types are subclasses of the built-in class


(1) Exception (2) RuntimeException
(3) Throwable (4) None of the above

86 Autoboxing is the term used for


(l) Automatic conversion of primitive value to wrapper object
, (2) Automatic conversion of wrapper object to primitive value
(3) • Wrapping a variable in class
(4) Packing a class in package
02 / COMP-2 A ] 11 [Contd ...
87 Which of these classes provide methods for writing binary representations
of Java primitive values
(1) DataOutputStream (2) FileOutputStream
(3) ObjectOutputStream (4) PrintStrearn

88 How many methods are defined in the Serializable interface ?


(1) One (2) Two
(3) None (4) Four

89 What is byte code in the context of Java?


(I) The type of code generated by a Java compiler.
(2) The type of code generated by a Java Virtual Machine.
(3) It is another name for a Java source file.
(4) It is the code written within the instance methods of a class.

90 Which of the following JSP variables are not available within a JSP
expression ?
Select the one correct answer.
(1) out (2) session
(3) request (4) httpsession

91 Which of the following is incorrect ?


(I) Private variable will only be accessible in class
(2) Protected can be accessible in non sub-class of another package
(3) Protected member is accessible in sub-class of another package
(4) Default can be used in another class of same package

92 Which expression wilt extract the substring "cde" given the following
declaration String str = "abcdef"
(l) str.substring{2,2) (2) str.substring(2,3)
(3) str.substring(2,4) (4) str.substring(2, 5)

93 Which of the following is not true about Applet class ?


(1) Package java.awt contains some superclass of applet
(2) It can be viewed in browser
(3) Using applet we cannot process graphics
(4) Event handling can be used in applet

94 Which of the following statements about Generics is correct ?


(l) Generics are typed subclasses of the classes from the Collections
framework.
(2) Generics are used to parameterize the collections in order to allow for
static type checking.
(3) Generics can be used to perform type checking of the objects in a
collection at runtime.
(4) Generics can be used to iterate over a complete collection jn an easy
way, using the 'enhanced for' loop.
02 / COMP-2_A] 12 (Contd...
95 Which of the following define the rules for Net Languages?
(1) GAC (2) CLS
(3) CLI (4) CLR

96 To get an object of the Print Writer class, we use the get Writer( ) method
of the class.
( l) Htt pServletRequest (2) HttpServletResponse
(3) SessionContext (4) HupSession

97 Which of the following is faster and consume lesser memory?


(I) SQLDataRcader (2) Data Set
(3) Both (I) and (2) (4) None

98 Which of the following authentications is best suited for a corporate network ?


(I) Windows (2) Form
(3) User (4) All

99 An example of a Network layer is


(l) Internet Protocol (fP) - ARPANET
(2) X.25 Packet Level Protocol (PLP) - ISO
(3) Source routing and domain naming - USENET
(4) AJl of these

100 ICl'vfP (Internet Control Massage Protocol) is :


(I) A Protocol that handles error and control messages
(2) A Protocol used to monitor computers
(3) Both (l) and (2)
(4) None of these

101 Which is a Leserved word in the Java programming language?


(1) method (2) native
(3) subedar (4) reference

102 Which is valid declaration of a float ?


(1) float f = 1F; (2) float f = 1.0;
(3) float f ='T'; (4) float f = 1.0d;

103 What is numerical range of char ?


(l) 0 to 32767 (2) 0 to 65535
.(3) -256 to 255 (4) -32768 to 32767

104 Functions and procedures are :


(1) not useful in designing computer systems
(2) old fashioned and they are not useful
(3) useful in designing computer systems
(4) have side effects which require special care if they are used as
subsystems
02 / COMP-2 A] 13 [Contd...
-

105 By polymorphism of a subsystem we mean


(1) it should be reusable
(2) it should have polymorphic data types
(3) it should accept generic commands and interpret appropriately
(4) it should morph polygons

106 In UML diagram of a class


(1) state of object can not be represented
(2) state is irrelant
(3) state is represented as an attribute
(4) state is represented as a result of an operation

107 A query operation on a object


( l) has side effects (2) has no side effects
(3) changes the state of an object (4) is not allowed

108 An exception thrown from outside try block will


(I) • call function return (2) be ignored
(3) hang the machine (4) call function terminate

109 An exception is caused by


(1) A hardware problem
(2) A problem 1n the operating system
(3) A run time error
(4) A syntax error

110 In object oriented design


(1) operations and methods are identical
(2) methods specify algorithm whereas operations only state what is to
be done
(3) methods do not•chai:ige,:values ·of attribut s
(4) methods and constructor;are SaIJ1e

111 By encapsulation in object oriented modeling we mean


( l) encapsulating data and programs
(2) hiding attributes of an objict from users
(J) hiding. operations on object from users
(4) hiding implementation details of methods from users of objects
' .

112 Inheritance in object oriented modeling can b used to


(1) generalize classes J •• (!l. spec! lize cla ses
(3) generalize and specialize classes (4) cr'eate new c!.tsses

02 / COMP-2_A] 14 [Contd...
113 By polymorphism in object oriented modeling we mean
(1) the ability to manipulate objects of different distinct classes
(2) the ability to manipulate objects of different distinct classes knowing
only their common properties
(3) use of polymorphic operations
(4) use of similar operations to do similar things

114 Which is not an attribute of cookie property ?


(l) path (2) host
(3) secure (4) domain

115 Overloading the function operator


( l) requires a class with an overloaded operator
(2) requires a class with an overloaded( ) operator
(3) allow you to create objects that act syntactically like functions
(4) usually make use of a constructor that takes arguments

116 Run time polymorphism is achieved by .


(I) friend function (2) virtual function
(3) operator overloading (4) function overloading

117 The members of a class, by default are


(1) public (2) protected
(3) private (4) mandatory to specify

118 A copy constru(?tor takes


(1) no argument (2) one argument
(3) two arguments (4) arbitrary no. of arguments

119 A pointer is
( l ) A key1.vord used to create variables
(2) • A variable that stores address of an instruction
(3) A variable that stores address of other variable
(4) All of the above

120 In visual programming, the icons are the • image of


an object.
(1) physical (2) logical
(3) both(!) and (2) (4) none of these

02 / COMP-2 A ] 15 [Contd...
SPACE FOR ROUGH WORK

C,

C
l
(

02 / COMP-2_A] • 16 ■

You might also like