Professional Documents
Culture Documents
NVS 2017 Question Paper
NVS 2017 Question Paper
NVS 2017 Question Paper
com
1. Which of the following symbol is used to create a link A. Names can start with a number or punctuation
to a named anchor in HTML? character.
A. & B. Names can contain letters, numbers, hyphens,
B. @ underscores and periods.
C. # C. Names cannot contain spaces
D. $ D. Names must not start with the letters.
2. Which of the following CSS tag is best suited to 6. Choose the compulsory attribute of the XML
change the appearnce of an entire section of the web declaration statement from th followingattributes :
page? A. Version
A. <H1> B. Encoding
B. <DIV> C. Standalone
C. <SPAN> D. Doctype
D. <P>
7. The element content model of a DTD uses the '+'
3. Observe the HTML code given below and indentify symbol to indicate that the element.
the line that will be ignored and not displayed by the A. Occurs one or multiple times
browers: B. Occurs zero or multiple times
<HTML> C. Occurs one or not at all
<TITLE>Browers Test</TITLE> D. Occurs only once
<BODY>
<I>Test</I> 8. Observe the given DTD:
<!--testing --> <?XML version ="1.0"?>
<B>Website</B> <!DOCTPYE SITES[
</BODY> <!ELEMENT SITES (SITES +)>
</HTML> <!ELEMENT SITE (ADDRESS UTILITY)>
<!ELEMENT ADDRESS (#PCDATA)>
A. <TITLE>Browers Test</TITLE> ]>
B. <B>Website</B> Chosse the statement that is true about the above DTD.
C. <!--testing --> A. The SITE element is optional.
D. <I>Test</I> B. Element ADDRESS and UTILITY both are to be present
in specified order.
4. An element in an XML DTD having no content is C. Root element is SITE which in turn contains two sub-
known as. elements.
A. unrestricted element D. ADDRESS AND UTILITY elements are empty element.
B. Container element
C. Empty element 9. Identify which of the following is not a predefined
D. Null element internal entity in XML specification :
A. ' (to display the 'symbol)
5. Pick out the invalid element naming rule for an XML B. & (to display the & symbol)
element from the following rules : C. (to display the 'symbol)
D. " (to display the "symbol)
1 7048972696 www.ptech.net.in
S P SHARMA CLASSES NVS 2017 Question Paper www.spsharmag.com
14. Observe the two statement given below and then 17. Study the code given below:
answer the following question : <HTML>
ItemName=new Array (" Chromebook", IPad", <HEAD>
"Mobile";) <SCRIPT LANGUAGE = "JavaScript">
Which of the following statement is true about the two function start ()
given statements? {
A. Both statements have exactly the same effect. alert ("Event Occured")
B. Both statements are different as they declare }
different types of variables. </SCRIPT></HEAD>
C. Both statements are different as one is only declaring </BODY onLoad = "Start()">
while other is declaring and initializing . <h1> Guess the event </H1>
</BODY></HTML>
2 7048972696 www.ptech.net.in
S P SHARMA CLASSES NVS 2017 Question Paper www.spsharmag.com
3 7048972696 www.ptech.net.in
S P SHARMA CLASSES NVS 2017 Question Paper www.spsharmag.com
C. In shape tweening, a blank key frame is inserted in 32. Error detecting at datalink layer is achieved by.
last frame because content is completely different from A. Equalization
previous key frame. B. Bit stuffing
D. Shape hints create uneven and rough morphs. C. Hamming codes
D. Cyclic Redundancy code.
27. Which of the following is N_O_T an advantage of
star topology compare to other standard topology ? 33. Which data communication method is used to
A. Easy to connect new nodes or devices transmit the data over a serial communication link in
B. Require less cable length both directions at same time ?'
C. All nodes are directly connected to the server. A. Simplex
D. Isolation of faulty node is easy. B. Half-duplex
C. Full -duplex
28. Distribution of flash movies may either be through D. Four fire circuit
_________ for viewing on the internet or it may be
_______ into another fike format. 34. A Firewall is
A. Publishing, Exporting A. Only a software
B. Exporting, Publishing B. only a hardware
C. Previewing, Exporting C. necessarily both software and hardware
D. Exporting, Previewing D. a software with or without hardware
29. In this switching technique entire data is sent as a 35. 1. It bas much greater bandwidth' than other
complete unit from the sender Ni=ode and delievered transmission media.
to the recipient Node via a number of intermediate 2. It allows for longer transmission distance.
Nodes: 3. It is immune to electromagnetic interference.
A. Message switching 4. It is much thinner and lighter than the other cable
B. Packet switching media.
C. Circuit switching All above characteristics are attached to
D. Data switching A. Optical fiber .
B. Twisted pair cable
30. Referential integrity controls relationship between C. Co-axial cable
A. Operations indatabase D. CAT 5/CAT 6 cable
B. Instances of a class
C. tables in database 36. Binary Equivalent of (BAD)16 is
D Attributes in a table. A. 1111 1010 1101
B. 1011 1010 1101
31. An electronic device used to connect different types C. 1011 1010 1111
of topologies having same protocol. D. 1011 1110 1101
A. Repeater
B. Router 37. Which of the following is used to execute CPU
C. Bridge instruction ?
D. Switch A. Personal Computer
B. Program Counter
4 7048972696 www.ptech.net.in
S P SHARMA CLASSES NVS 2017 Question Paper www.spsharmag.com
5 7048972696 www.ptech.net.in
S P SHARMA CLASSES NVS 2017 Question Paper www.spsharmag.com
49. Which of the following Boolean Expression is 53. Given two sorted lists of size m and n respectively.
illustrated in the truth table's column F? The number, of comparisons needed in the worst case
X Y F by the merge algorithm will be.
0 0 1 A. min (m, n)
0 1 0 B. max (m, n)
1 0 0 C. m+n-1
1 1 1
D. mn
A. X Y'+X
54. Out Of the following, which cannot be used as an
B. X' Y+X Y'
identifier in C++ ?
C. X Y+X Y'
A. Name2
D. X Y+X'Y'
B. Total
C. Class
50. Find missing term in the following Boolean
D. Derived
Expression
X Ѳ ____= 1
55. The operator used to access member function of a
A. 1
class from its object is
B. X
A. *
C. X'
B. : :
D. 0
C. :
D. '
51. Observe the following circuit and find which
operation interprets it appropriately.
56. In this programming methodology, common
functionalities are grouped together into separate
independent units. The whole program is divided into
several units which interact through procedure calls.
A. Random Programming
B. Mudular Programming
A. XOR C. .NET Programming
B. NOR D. Object Oriented Programming
C. XNOR
D. NAND 57. The following is computing industry standard for the
consistent encoding, representation and handling of
52. Which Boolean law is represented below? text.
P + Q R = (P + Q) (P + R) A. EBCDIC
A. De Morgan's law B. Unicode
B. Associative law C. ASCII
C. Commutative law D. QRcode
D. Distributive law
58. The following is the correct interpretation of
Hierarchical Inheritance
A. one base class with one derived class
6 7048972696 www.ptech.net.in
S P SHARMA CLASSES NVS 2017 Question Paper www.spsharmag.com
B. more than one generations of classes processes should be prevented from doing so until the
C. one base class with more than one derived classes completion of the critical section This is known as•
D. more than one base classes with one derived class A. Interprocess communiclltion
B. Semaphore
59. The postfix expression for * + ab - cd is C. D,adlook
A. abed+-* D. Mutual lusion
B. ab +-cd *
C. ab +cd *- 65. We can also call a table as in a relational database.
D. ab +cd-* A. Record
B. Attribute
60. Which of the following is 11Q1 a type of inheritance C. Tuple
in C++ ? D. Relation
A. Parallel Inheritance
B. Single Level Inheritance 66. Find the output of the following : C++code:
C. Multilevel Inheritance int *P, A[ ]=(20, 90, 70, 10};
D. Multiple lnheritanc P=A; A[2]+=10; P+=2;
cout«*P«endl;
61. Which of the following is the default sibility mode A. 70
while defining a class in C++ ? B. 80
A. private C. 90
B. personal D. 10
C. protected
D. public 67. A table has more than one attributes each of which
identify a tuple uniquely. All such keys are known as :
62. Select the correct output of the following code : A. Primary keys
char * = "AMAZING" B. Alternate keys
s+=3; C. Candidate keys
cout-xsecendl; D. Foreign keys
A. DMAZING
B. D 68. Belady's anomaly occurs in_______ page
C. ZING replacement algorithm.
D. Z A. LRU
B. Optimal
63. A complete binary tree with leaf nodes can have C. Circular FIFO
______.nodes of degree 2. D. FIFO
A. log2n
B. n-1 69. Which of the following cannot be used as a front-
C. n end software alongwith a database ?
D. 2n A. Visual basic
B. Visual C++
64. Only the process executing the critical section C. Power Builder
is allowed to access die shared variable and all other D. MS PowerPoint
7 7048972696 www.ptech.net.in
S P SHARMA CLASSES NVS 2017 Question Paper www.spsharmag.com
8 7048972696 www.ptech.net.in
S P SHARMA CLASSES NVS 2017 Question Paper www.spsharmag.com
74. Based on table "CLUB", which SQL query will help us A. yes
to know the number of "MONTHLY" members, who B. No
joined club after "Ol-JAN-07" C. Auto
A. SELECT*, COUNT () FROM CLUB WHERE TYPE = D. None
"MONTHLY'' AND DOJ > = "Ol-JAN-07'';
78. Which is not the state of the process in OS?
B. SELECT FROM CLUB COUNT (*) WHERE TYPE = A. vileged
"MONTHLY" AND DOJ "Ol-JAN-07"; B. Running
C. Ready
C. SELECT COUNT (*) FROM CLUB WHERE TYPE = D. Blocked
"MONTHLY" OR DOJ = "O 1- JAN-07"•;
79. Which of the following is mandatory attribute of
D. SELEqr COUNT (*) FROM CLUB WHERE TYPE = <IMG> tag and <EMBED> tag ?
"MONTHLY" AND DOJ > "Ol-JAN-0. 7"•; A. Border
B. HEIGHT
75. Based on table CLUB, which of the following SQL c. WIDTH
command will display the output as given in the out D. SRC
putbox?
Images 80. ROWSPAN attribute cannot be used with which of
A. SELECT SUBSTR (NAME, 2,3) FROM CLUB WHERE the following tag ?
TYPE = "MONTHLY" OR TYPE= "ANNUAL"; A. <TR>
B. SELECT SUBSTR (NAME, 2,3) FROM CLUB WHERE FEE B. <'ID>
> 5000 AND DOJ > = "Ol• JAN-10"; C. <TH>
C. SELECT SUBSTR (NAME, 2,3) FROM CLUB WHERE D. <TABLE>
TYPE = "MONTIIl.,Y" AND TYPE= ''ANNUAL'';
D. SELECT SUBSTR (NAME, 2,3) FROM CLUB WHERE
FEE.> 5000 OR DOJ > = "Ol-JAN-10";
9 7048972696 www.ptech.net.in