Go Back   StudyChaCha 2024 2025 > StudyChaCha Discussion Forum > General Topics

  #2  
Old June 6th, 2014, 03:49 PM
Sashwat's Avatar
Super Moderator
 
Join Date: Jun 2011
Default Re: HAL Management Trainee Computer Science Questions

As per your request here I am sharing the Computer Science Question paper of HAL Management Trainee Exam


FSA can be used to add two Integers ————-
a)TRUE b) may be TRUE c)FALSE d ) may be FALSE

context sensitive languages are ———–
a) accepted by push down automata b) accepted by non-deterministic pushdown automata
c) accepted by 2- way linear bounded automata d) a& c

The difference between the Moor and Mealay machines is
a) the former one depends on the present state and present inputs
b) the former one depends on the present state only
c) the later depends on the present state and present inputs
d) the later depends on the present input only

An FSA can be stated as ———–
A Turing machine with finite tape, unidirectional moment
A Turing machine with finite tape and bidirectional moment
A Turing machine with finite tape , unidirectional and no repetitions
A Turing machine with infinite tape , unidirectional and no repetitions

Recursive Languages are ————
a) super set of all languages
b) type -8 grammar languages
c) accepted by Turing machine
d) we cant say anything about acceptance

which of the following statement is wrong about regular expressions
a) there exists a FSM to accept regular expression
b) there exists a N-FSM to accept regular expression
c) there are no ? symbols in regular expression
d) none

Regular expression cannot be used in which of the following
a) construction of text editors
b) design of serial circuits
c) design of compilers
d) finding text patterns
Questions related to hardware and OS

the term “memory” is related to
a) input and output b) storage c) ALU d) none

which of the following is not a Operating system
a)AIX b)PROLOG c) WINDOWS d) UNIX

The CPU or MPU consists of
a) input and output b) memory c) ALU d) All of the above

In a multiprogramming system
a) there are more than one processor
b) program are executed faster than actual
c) used in case of large programs only
d) more programs executed than actual in given time

the front side bus (FSB) also called as
a) control bus b) the processor bus c) PCI bus and processor bus d) none

which language is used Artificial Intelligence SYSTEMS
a) Java b) c# c) prolog d) Lisp

what is the capacity of Hollerith card when it is in extended state
a) 32kb b) 120 kb c) 240 kb d) 20 kb

how many slots are there for UTM device
a)1 b) 2 c) 3 d) 4

which part of the computer has the capability to acces memory and manipulate the memory
contents a) input/output b) cpu d) ALU d) none

the register which is used to locate the address of the operands and restore the contents is
a) memory address register b) memory data register c) instruction register d) none

the opcode ————–
a) tells the address of operands b) instructs the processor c) stores the values d) specifies the operation

the language first executed by microprocessor is
a) BASIC b) FORTRAN c) PASCAL d) MODULA

which language most suitable for mathematical calculations
a) FORTRAN b) PASCAL c ) C++ d) NONE
Questions related to C++ and OOPs they asked around 20 qs on this (5+ related to friend function)

the protected members are ————-
a) accessible within the class only b) accessible within the class and derived class c)cannot be accessed
outside the class d)can be accessed anywhere

By default the access specifier is ————– a)private b)public c)protected d)none

A class is a —————–
a) a abstract data type b) way of encapsulating data and code c) structure d)………….

which function can access the private members of a class ————
a) any function b) member function of derived class c) friend function of that class d) friend function
of derived class

In order to access the private members of four classes that function has to be declared as friend of
———————–
a) any one class b) all four classes c)any three classes d) any two classes

when a class is derived from another derived class then that inheritance is called ———-
a) multiple b) multipath c) hybrid d) multilevel

which of the following are correct about A static member function
a) it has only one copy for all instances and it can access constant variables
b) it has separate copy for each instances
c) it cannot operate on constant variable
d)……………………………..

you are hiding the data when you are writing
a) a class b) cryptic code c) static function d) ADT

In order to declare a member function of one class as a friend of another class we need to use
a) the key word Friend b) the key word friend and scope resolution c) only scope resolution d) nothing

. there are 100 nodes in a graph . if two nodes i ,j are said to be adjacent then |i-j|=12 or 8. How many connected components in the above graph
a)4 b) 8 c) 12 d) 25

in case of a binary tree all parent nodes are having degree 2 and in the child level the child are associated to left . what is the name of the tree
a) full binary tree b) complete binary tree c) threaded binary tree d) none
b)
what is the worst case complexity of bubble sort
a) O(n) b) O(logn) c) O(nlogn) d) O(n2)

which of the following sorting technique performs well when the element are in reverse order
a) bubble sort b) insertion sort b) mergesort d) heap sort

in which type of searching we can search the element in O(1) time averagely
a) linear search b) radix search c) hash based search d) binary search
__________________
Answered By StudyChaCha Member
Reply With Quote
Reply


Tags
trainee



All times are GMT +6. The time now is 05:31 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2

1 2 3 4 5 6 7 8