CST paper – CST sample paper – CST Last Year Exam paper – Previous Year CST Paper – Paper GA, CO , Ds, Computer network, Database etc

Here is a sample paper of CST  Click Below And Se The Quation paper of GA, CO , Ds, Computer network, Database etc

Sample Questions for General Aptitude (GA)
Five example questions are given below to apprise candidates of the type of questions they may expect in the exam. Give yourself on an average two and a half minutes to answer each question.
1) Stock options for employees are the latest step in progression from management ownership to employee ownership. Employee ownership can save loss-making companies.
From the following statements, choose that one, which if true, does NOT provide support for the claim above.
(a)     Employee owned companies generally have higher productivity
(b)     Employee participation in management raises morale
(c)     Employee ownership tends to drive up salaries
(d)     Employee ownership enables workers to share in company profits

2) If  log8 3 = 0.5283 and  log8 5 = 0.7740,   then what is the value of log8 45 ?
(a) 1.6553   (b) 1.8306    (c) 3.8066   (d) 0.8178

3) The following represents the summation of two numbers where X, Y and Z represent distinct digits among 0, 1, 2, …, 9.
             X Y Z
             Z Y X
        _________
          Y Y Z Y
What does X represent?
(a) 6      (b) 7      (c) 8      (d) 9

4) Four places A, B, C and D are situated in a city as follows:
B is situated due east of A at a distance of 6 km.
C can be reached from B by travelling 2 km due east and then 4 km due north.
D is situated due west of C and is at equal distance from A and B.
What is the distance between A and D?
(a) 3.5 km     (b) 4 km    (c) 4.5 km     (d) 5 km

5) Any government officer who allows bribery to flourish must be subject to ________ .
(a) stringency (b) stricture (c) vagary (d) mockery
Answers to Sample Questions:
1)  (c)   2)  (b)   3)  (c)   4)  (d)   5)  (b)

Sample Questions for Computer Organization and Operating Systems (CO)

1) Which of the following fields must occur explicitly as a part of machine instruction?
(a)     Operation Code
(b)     Source operand reference
(c)     Result operand reference
(d)     Next instruction reference
2) Which of the following is not a feature of RISC architecture?
(a)     Large number of registers
(b)     Pipelining
(c)     Instruction set close to a high-level language
(d)     Simple instruction format
3) Which of the following services is least likely to be provided by an Operating System?
(a)     Accounting of resource usage
(b)     Database Management System
(c)     Memory allocation
(d)     Protection modes for files
4) The advantage of Round Robin (RR) CPU scheduling over Shortest Job First (SJF) scheduling is:
(a)     better average turnaround time
(b)     better average response time
(c)     both (a) and (b)
(d)     neither (a) nor (b)
5) Which of the following is an advantage of interrupt-driven I/O over programmed I/O?
(a)     Faster completion of the data transfer
(b)     Higher bandwidth availability
(c)     Better CPU utilization
(d)     Smaller memory requirement
Answers to Sample Questions
1) (a)     2) (c)     3) (b)     4) (b)     5) (c)

Sample Questions for Data Structures and Algorithms (DS)


1) In an algorithm, the first few steps are of complexity O (N), the next few steps are of complexity O(N4) and the last few steps are of complexity O(N2). What is the complexity of the algorithm as a whole?
(a)O(N2)     (b) O(N3)    (c) O(N4)    (d) O(N7)
2) Consider generating binary search trees using a given set of numbers in the given order. The tree is to be constructed by inserting the numbers into the current partial tree such that at any node, the following condition is satisfied: value of left child < value of node < value of right child. Which of the following sequence of numbers will result in a tree that is strictly binary, i.e., every node has either two children or no children?
            (a) 4 5 2 1 3                   (b) 4 6 5 7 3 2                (c) 4 6 2 1 3 5                (d) 4 5 3 2 6
3) Which of the following represents the minimum order of time required to interchange the mth and nth elements of a singly linked list? Assume m and n are very large so that the time for pointer manipulations may be ignored compared to the traversal time.
(a) max(m,n)        (b) min(m,n)  
(c) m+n                (d) m+min(m,n)

4) Which of the following is TRUE in the context of comparing breadth first search (BFS) and depth first search (DFS) of a graph?
(a)BFS does not generate a minimum spanning tree.
(b)BFS uses less space compared to DFS
(c)BFS as well as DFS generates spanning tree of the graph.
(d)BFS takes O(log N) time compared to O(N) for DFS, where N is the number of nodes
5) Construct a min-heap from the following sequence of integer elements.
            120 140 40 50 80 70 60 90 20 100
After deleting the root element from the heap, what will be the post order traversal of the heap?
a) 140 100 90 80 50 120 70 60 40
b) 140 100 90 80 120 70 50 60 40
c) 140 100 80 90 120 70 50 60 40
d) 140 90 100 50 80 40 120 60 70
Answers to Sample Questions

1) (c)     2) (a)     3) (a)     4) (c)     5) (a)

 
Sample Questions for Computer Networks

1)       Error detection at the data link level is achieved by?
a)       Bit stuffing   (b) Cyclic redundancy codes   (c) Hamming codes   (d) Equalization
2)       A subnet mask is used to
a)       Identif
y different subnets within an intranet
b)       Identify different subnets within an internet
c)       Identify the number of bits to be used as the network portion in the IP address
d)       Mask the IP address of a machine from hackers
3)       Which of the following uniquely identifies a connection (when viewed from Network)?
a)       Sender IP, Receiver  IP
b)       Sender Port, Receiver Port
c)       Sender IP, Sender Port, Receiver IP, Receiver Port
d)       Sender IP, Sender MAC, Receiver IP, Receiver MAC
4)       Assuming that, for a given network layer implementation, connection establishment overheads are 100 bytes and disconnection overheads are 28 bytes, what would be the minimum size of a packet the transport layer needs to keep if it wishes to implement a datagram service above the network layer and needs to keep its overhead to a maximum of 12.5%. Ignore transport layer overheads.
a)       512 bytes   (b)  768 bytes   (c)  1152 bytes   (d)  1024 bytes
5)       End-to-end connectivity is provided from host-to-host in:
a)       the network layer
b)       the transport layer
c)       the session layer
d)       it is a combined functionality of the network and the data link layers
Answers to Sample Questions
1) (b)     2 (c)      3 (c)      4 (d)      5 (b)

 

Sample Questions for Database Management


1) With respect to the three classical data models namely, hierarchical, network and relational, select the statement that is most appropriate:
a)       It can be observed that hierarchical model is most restrictive in data abstraction primitives while relational model is least restrictive.
b)       Hierarchical model is based on sequential access to the storage device, while relational and network models are not based on such a model for the physical storage device.
c)       Recursive relationships cannot be expressed in the network model using sets and records.
d)       In the traditional hierarchical model, it is impossible to represent m:n relationships. This limitation can be overcome by providing virtual records.
2) Choose the most appropriate statement with respect to data independence
a)       Data independence means data is defined separately and not included in programs
b)       Hierarchical and network DBMS’s do not support any kind of data independence as no arbitrary changes in the structure are supported.
c)       Data independence means that the application programs are resilient to changes in data – its structure and storage organization.
d)       In RDBMS, both physical and logical data independence is guaranteed.
3) Checkpointing when used in conjunction with incremental log reduces the actual recovery time.
    However, for proper recovery the system must ensure that (choose the correct one) :
a)       At the time of checkpointing there is no incomplete transaction.
b)       If the updates are deferred, at the time of checkpointing there is no incomplete transaction.
c)       If updates are immediate, at the time of checkpointing there is no incomplete transaction
d)       None of the above
4) Given the functional dependencies:
    X → W  , X → Y , Y → Z and Z → PQ
Which one of the following does not hold?
a)   X → Z     b)   W → Z     c)   Z → Q     d)   X→ WY

5) Choose the most appropriate choice with respect to conceptual design.
a)       Conceptual design is a documentation technique. Once the relation schemes are defined one can draw E-R diagrams from the relation schemes for documentation.
b)       Conceptual design needs data volume and processing frequencies to determine the size of the database.
c)       Output of any conceptual design is an E-R diagram.
d)       Conceptual design involves modelling the data requirements independent of the DBMS, OS and the hardware.
Answers to Sample Questions
1) (d)     2) (c)     3) (d)     4) (b)     5) (d)

Sample Questions  for  Java Technologies

1) java.lang.Long class is needed in spite of long primitive data type because
a)       It can handle infinite precision numbers
b)       It can be passed by reference
c)       It can handle large arrays of numbers
d)       It can convert base of number
2) Which of the following gives Java its platform independence?
a)       same language across all platforms
b)       byte code
c)       compilers on all platforms
d)       object-oriented programming language
3) Which of the following technologies is used by java to allow an application to access a database?
a)       jdbc
b)       odbc
c)       servlets
d)       java.db package
4) The size of the long data type is guaranteed to be:
a)       32 bits
b)       64 bits
c)       96 bits
d)       128 bits
5) Which of the following keywords has to be used by a subclass constructor to invoke a superclass
    constructor
a)       super
b)       superclass
c)       construct
d)       init
Answers to Sample Questions
1) (b)     2) (b)     3) (a)     4) (b)     5) (a)

Sample Questions  for  Object-Oriented Programming and C++

1)       Consider the following interface for a C++ class Stack:
typedef char Item;
const int MAXSIZE=100;
class Stack {
private:
Item sArray[MAXSIZE];
Item *sTop=sArray-1;
public:
int isEmpty();
void
push(Item);
Item pop();
Item &peek() {return *sTop;}
};
Given that the variable s and sp are of types Stack and Stack* respectively, which of the following statements will lead to compile time errors due to access violation?
a)       s.push(‘a’)             
b)       sp->push(‘a’)
c)       s.peek() = ‘a’    
d)       sp->sArray[0] = ‘a’
2)       Inheritance is often used to model
a)       the commonality among a number of objects.
b)       the commonality among a number of object classes.
c)       the commonality among a number of functions.
d)       the commonality among a number of programs
3)       In C++,
a)       dynamic binding is used for all methods.
b)       dynamic binding is used for public methods only.
c)       dynamic binding is used for virtual methods only.
d)       static binding is used for all methods.
4)       The default copy semantics for objects of a class for which no copy constructor is defined, is
a)       member-wise memory copy
b)       deep copy
c)       undefined
d)       none of the above.

5)       Choose the correct statement regarding the overloading of the selection operator -> in C++.
a)       It is overloaded as a non-member function.
b)       While it looks like a binary operator, it cannot be overloaded as a member function with one argument.
c)       Once overloaded in a class C, the operator can be used on any pointer variable pointing to the object of type C.
d)       none of the above.
Answers to Sample Questions
1) (d)   2 (b)   3 (c)   4 (a)   5 (b)

Sample Questions  for  Software  Engineering

1)       Data Flow Model of an application mainly shows
a)       The underlying data and the relationships among them.
b)       Processing requirements and the flow of data.
c)       Decision and control information.
d)       Communication network structure.
2)       Configuration management is not concerned with:
a)       controlling changes to the source code.
b)       choice of hardware configuration for an application.
c)       controlling documentation changes.
d)       maintaining versions of software.
3)       The Railway Reservation System currently operational in India is best classified as a:
a)       Batch system   (b) Real-time system   (c) Online system   (d) Expert system
4)       Which of the following testing methods is normally used as the acceptance test for a software system?
a)       Functional testing   (b) Unit testing   (c) Integration testing   (d) Regression testing
5)       Which of the following types of maintenance takes the maximum chunk of the total maintenance effort in typical commercial application environment?
a)       Adaptive maintenance (b) Corrective maintenance (c) Preventive maintenance (d) Perfective maintenance
Answers to Sample Questions
1) (b)   2) (b)   3) (c)   4) (a)   5) (d)

Sample Questions for  Web  Technology

1) With respect to the security implementation in applets, which of the following statements is FALSE?
(a)     Applets cannot load libraries or define native methods.
(b)     Applets cannot read or write files in the host machine.
(c)     Applets cannot make network connections other than to the server from which it came.
(d)     Applets cannot call public methods of the other applets in the same page.
2) What function does HTTP Keep-Alive perform?
(a)     Reduce the bandwidth requirements needed by caching (keeping alive) commonly used scripts and web pages in the web server’s memory.
(b)     Maintain a connection to the browser so the web server can more quickly respond to multiple requests
(c)     Keep the Active Server Pages alive in the server’s memory so they don’t have to be retrieved from disk
(d)     Reduce the amount of memory needed on the server by keeping alive the Scripting engine on the web browser

3) Which of the following cannot be configured for a web server?
(a)     The port number where the web server listens.
(b)     IP address on which request for a virtual host name will be received.
(c)     Acceptable content types.
(d)     System model (like single-thread model, cascade model, pool model, etc.) in which web server will run.
4) Which of the following statement is TRUE?
(a)     GET request passes all its data, of unlimited length, directly over the socket connection as part of its HTTP request body.
(b)     Every servlet must directly implement the javax.servlet.Servlet interface.
(c)     An HTTPServlet is required to override the service() method of the HTTPServlet class.
(d)     An HTTPServlet which implements the doGet() method does not support HEAD requests.
5) Write a one-line code for refreshing the same page dynamically after every 10 seconds.
(a)     <META HTTP-EQUIV="Refresh" CONTENT="10;URL= sameurl.html">
(b)     <LINK HTTP-EQUIV="Reload" SRC="10;URL= sameurl.html">
(c)     <META HTTP-EQUIV="Refresh" TIME=10 HREF="URL= sameurl.html">
(d)     <META HTTP-EQUIV = ”Refresh” COUNT = ”10; URL = sameurl.html”>
Answers to Sample Questions
1) (a)     2) (b)     3) (d)     4) (b)     5) (a)

 

 

Sample Questions for Computer Programming in C (CP)

1) What will be the output of the following program segment? (Given that ASCII codes are used and that the codes for the lowercase letters are greater than that of the uppercase letters).
char c;
c =
‘C’ + ‘a’ – ‘A’ + 1;
printf("%c", c);
(a)     a     (b) p    (c) d      (d) r
2)  The following code segment is supposed to print out letters from ‘a’ to ‘z’. What is the smallest piece of code possible to substitute for XXX so that the program does this?
char c = ‘a';
while(c++ <= ‘z’) putchar(XXX);
   (a) c–      (b) c            (c) c – 1          (d) c++
3) The following program segment is supposed to find the number of lowercase letters in the input. There is a bug in one of the lines in the program.
lower = 0;
while ((c = getchar()) != EOF){
     if((c >= ‘a’) || (c <= ‘z’))
     lower++;
}

     Which of the choices below is the correct version of the line?
     (a) lower = 1;      (b) if((c >= ‘a’) && (c < ‘z’))
     (c) ++lower;        (d) if((c >= ‘a’) && (c <= ‘z’))
4)  In the following segment of ‘C’ code, which of the lines has a syntax error?
   char *a, *b, c[100], d[100];
   a = b;  (1)
   b = d;  (2)
   c = a;  (3)
   a = c;  (4)
     (a) 1   (b) 2   (c) 3   (d) 4
5)  What does the following program print?
void max(int x, int y, int m)
{
      if (x > y) m = x;
     else m = y;
}
int main(void)
{
     int i, j, k;
     i = 20; j = 5; k = 0;
     max(i, j, k);
     printf("%d\n", k);
}

(a) 5     (b) 20     (c) 0     (d) None of these

B.3.4. Answers to Sample Questions
1) (c)    2) (c)     3) (d)     4) (c)     5) (c)

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>