#1
| |||
| |||
![]()
Will you please share the Computer Science Question paper of HAL Management Trainee Exam???
|
#2
| ||||
| ||||
![]()
As per your request here I am sharing the Computer Science Question paper of HAL Management Trainee Exam FSA can be used to add two Integers ————- a)TRUE b) may be TRUE c)FALSE d ) may be FALSE context sensitive languages are ———– a) accepted by push down automata b) accepted by non-deterministic pushdown automata c) accepted by 2- way linear bounded automata d) a& c The difference between the Moor and Mealay machines is a) the former one depends on the present state and present inputs b) the former one depends on the present state only c) the later depends on the present state and present inputs d) the later depends on the present input only An FSA can be stated as ———– A Turing machine with finite tape, unidirectional moment A Turing machine with finite tape and bidirectional moment A Turing machine with finite tape , unidirectional and no repetitions A Turing machine with infinite tape , unidirectional and no repetitions Recursive Languages are ———— a) super set of all languages b) type -8 grammar languages c) accepted by Turing machine d) we cant say anything about acceptance which of the following statement is wrong about regular expressions a) there exists a FSM to accept regular expression b) there exists a N-FSM to accept regular expression c) there are no ? symbols in regular expression d) none Regular expression cannot be used in which of the following a) construction of text editors b) design of serial circuits c) design of compilers d) finding text patterns Questions related to hardware and OS the term “memory” is related to a) input and output b) storage c) ALU d) none which of the following is not a Operating system a)AIX b)PROLOG c) WINDOWS d) UNIX The CPU or MPU consists of a) input and output b) memory c) ALU d) All of the above In a multiprogramming system a) there are more than one processor b) program are executed faster than actual c) used in case of large programs only d) more programs executed than actual in given time the front side bus (FSB) also called as a) control bus b) the processor bus c) PCI bus and processor bus d) none which language is used Artificial Intelligence SYSTEMS a) Java b) c# c) prolog d) Lisp what is the capacity of Hollerith card when it is in extended state a) 32kb b) 120 kb c) 240 kb d) 20 kb how many slots are there for UTM device a)1 b) 2 c) 3 d) 4 which part of the computer has the capability to acces memory and manipulate the memory contents a) input/output b) cpu d) ALU d) none the register which is used to locate the address of the operands and restore the contents is a) memory address register b) memory data register c) instruction register d) none the opcode ————– a) tells the address of operands b) instructs the processor c) stores the values d) specifies the operation the language first executed by microprocessor is a) BASIC b) FORTRAN c) PASCAL d) MODULA which language most suitable for mathematical calculations a) FORTRAN b) PASCAL c ) C++ d) NONE Questions related to C++ and OOPs they asked around 20 qs on this (5+ related to friend function) the protected members are ————- a) accessible within the class only b) accessible within the class and derived class c)cannot be accessed outside the class d)can be accessed anywhere By default the access specifier is ————– a)private b)public c)protected d)none A class is a —————– a) a abstract data type b) way of encapsulating data and code c) structure d)…………. which function can access the private members of a class ———— a) any function b) member function of derived class c) friend function of that class d) friend function of derived class In order to access the private members of four classes that function has to be declared as friend of ———————– a) any one class b) all four classes c)any three classes d) any two classes when a class is derived from another derived class then that inheritance is called ———- a) multiple b) multipath c) hybrid d) multilevel which of the following are correct about A static member function a) it has only one copy for all instances and it can access constant variables b) it has separate copy for each instances c) it cannot operate on constant variable d)…………………………….. you are hiding the data when you are writing a) a class b) cryptic code c) static function d) ADT In order to declare a member function of one class as a friend of another class we need to use a) the key word Friend b) the key word friend and scope resolution c) only scope resolution d) nothing . there are 100 nodes in a graph . if two nodes i ,j are said to be adjacent then |i-j|=12 or 8. How many connected components in the above graph a)4 b) 8 c) 12 d) 25 in case of a binary tree all parent nodes are having degree 2 and in the child level the child are associated to left . what is the name of the tree a) full binary tree b) complete binary tree c) threaded binary tree d) none b) what is the worst case complexity of bubble sort a) O(n) b) O(logn) c) O(nlogn) d) O(n2) which of the following sorting technique performs well when the element are in reverse order a) bubble sort b) insertion sort b) mergesort d) heap sort in which type of searching we can search the element in O(1) time averagely a) linear search b) radix search c) hash based search d) binary search
__________________ Answered By StudyChaCha Member |