Search Here

Computer Science Question Answers

Computer Science Question Answers Practice Test.

Computer Science MCQ Questions Answers for all kind of competitive exams: This mock test having 300 question each, with four choices. On each click on answers system will tell you where the answers is correct or incorrect. You can view this  test question details at the end of the quiz.

Computer Science Question Answers

This Computer Science questions answers are applicable for any kind of  Entrance and Job related exam 2016. You can practice as much as you can to gather knowledge of how to answers Computer Science Objective question are critical type papers in short time and this can be a big factor for cracking entrance level exam.



Computer Science Mock Test 300 MCQS

Congratulations - you have completed Computer Science Mock Test 300 MCQS.You scored %%SCORE%% out of %%TOTAL%%.Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Question 1
………………….  uses a standard called Distributed Queue Dual Bus (DQDB) or refer to as 802.6 (IEEE standard).
A
LAN
B
WAN
C
MAN
D
Internet
Question 2
Which of the following protocol is related to message format in Electronic mail or e-mail ?
A
RFC 821
B
RFC 822
C
Both (A) and (B)
D
None of these
Question 3
OXFFF refers to a …………………….constant.
A
Hexadecimal
B
Octal
C
BCD
D
Graycode
Question 4
Which of the following is a type of inheritance ?
A
Multiple
B
Multi level
C
Hierarchical
D
All of these
Question 5
Inter has disclosed its sillcin technology for high definition, large screen TVs. The new technology, code named Cayley is based on 
A
Liquid Crystal Display (LCD)
B
Least Chip Silicon (LCS)
C
Liquid Crystal on Silicon (LCOS)
D
Liquid Crystal Micro Display (LCMD)
Question 6
In K-map, the adjacent squares represent minterms that differ by
A
One variable
B
Two variable
C
Three variable
D
None of these
Question 7
An oracle server index
A
Is a schema object
B
Is used to speed up the retrieval of rows by using a pointer
C
Is independent of the table it indexes
D
All of the above
Question 8
Mobile IP (Internet Protocol) uses
A
A fixed home address
B
A care of address
C
Both (A) and (B)
D
None of these
Question 9
The usual method of………………………. mapping is by some arithmetical manipulation of the key value, in direct file organization.
A
Random
B
Serial
C
Direct
D
One to many
Question 10
 ‘Person’ is
A
Object
B
Class
C
Attribute
D
Structure
Question 11
Which of the following is/are application(s) of flip-flop ?
A
Bounce elimination switch
B
Latch
C
Counters
D
All of the above
Question 12
The basic logic operation is−
A
AND
B
NOR
C
NAND
D
XOR
Question 13
Which is a method of implementation of IDS (Intrusion Detection System) ?
A
Signature Identification
B
Recognition and Statistical Anomaly Detection
C
Both (A) and (B)
D
None of these
Question 14
Abstraction is
A
The act of representing the essential features of something without including much details
B
The act of representing the features of something including much detail
C
A tree structure
D
None of these
Question 15
Once a sequence is created, it is documented in the
A
Database
B
Data table
C
Data dictionary
D
Data document
Question 16
Which of the following is a layer of object oriented design pyramid ?
A
Subsystem layer
B
Class and object layer
C
Message layer
D
All of the above
Question 17
The intersection of a context free language with a regular Language is a 
A
Context free language
B
Kleene star
C
Regular language
D
Reducing
Question 18
Once object oriented programming has been accomplished, unit testing is applied for each class. Class tests include
A
Fault-based testing
B
Random testing
C
Partition testing
D
All of the above
Question 19
In E-R diagrams, the term cardinality is a synonym for the term
 
A
Attribute
B
Degree
C
Entities
D
Cartesian
Question 20
A program that places programs into main memory and prepares them for execution
A
Linker
B
Assembler
C
Loader
D
Absolute entity
Question 21
A relation scheme is said to be in……………… form if the values in the domain of each attribute of the relation are atomic.
A
Unnormalized
B
First Normal
C
Boyce Codd
D
Nome of these
Question 22
Which of the following software tool is a parser generator
A
Lex
B
Yacc
C
Both (A) and (B)
D
None of these
Question 23
Software reengineering encompasses a series of activities that include
A
Inventory analysis
B
Document restructuring
C
Reverse engineering
D
All of the above
Question 24
STACK is……………………. Structure.
A
Last In First Out (LIFO)
B
First In First Out (FIFO)
C
First In Last Out (FILO)
D
First Come First Served (FCFS)
Question 25
Which of the following statement is false in context of constructors in C++ ?
A
A constructor is a special member function whose task is to initialize the objects of its class
B
Its name is the same as the class name
C
The constructor is invoked whenever an object of its associated class is created
D
It is also used to destroy the objects
Question 26
A network, spans a large geographical area, often a country or continent
A
LAN
B
WAN
C
MAN
D
None of these
Question 27
The goal of study of data structure is to
A
Identify and develop useful mathematical entities and operations and to determine what classes of problems can be solved by using these entities
B
Determine representations for those abstract entities and to implement the abstract operations on these concrete representations
C
Both (A) and (B)
D
None of these
Question 28
Which of the following is not an assembly language program entity ?
A
Absolute
B
Relative
C
Object Program
D
Linker
Question 29
The………………….. logic family was an evaluation of a previous technology that used diodes and transistors for the basic NAND gate.
A
TTL (Transistors Transistor Logic)
B
DTL (Diode Transistor Logic)
C
PMOS (P channe Metal Oxide Semiconductor)
D
CMOS (Complementary Metal Oxide Semiconductor)
Question 30
Which of the following UNIX command is used for pattern matching ?
A
awk
B
pattern
C
grep
D
join
Question 31
 5 NF is related to
A
Functional dependency
B
Multivalued dependency
C
Join dependency
D
None of these
Question 32
Banker’s Algorithm is used as—
A
Deadlock occurrence method
B
Deadlock avoidence method
C
Deadlock detection method
D
Deadlock recovery method
Question 33
The default data format in SQL * is
A
DD – MON –YY
B
DD –MM – YY
C
DD – MM – YYYY
D
MM – DD – YY
Question 34
Master slave flip-flop is also referred to as the
A
Level triggered flip-flop
B
Pulse triggered flip-flop
C
Edge triggered flip-flop
D
None of these
Question 35
Valid bit in each cache is associated with—
A
Each memory byte in cache
B
Each memory word in cache
C
One bit with the all memory words
D
None of the above
Question 36
Which of the following statement is not true ?
A
Abstraction is the simplification mechanism used to hide superfluous details of a set of objects, it allows one to concentrate on the properties that are of interest to the application
B
Generalization is the abstracting process of viewing sets of objects as a single general class by concentrating on the general characteristics of the constituent sets while suppressing or ignoring their differences
C
Specialization is the abstracting process of introducing new characteristics to an existing class of objects to create one or more new classes of objects
D
Aggregation is the process of collecting the details of an objects
Question 37
What will be the output of the following programs ?  main ( )                {                Static char a [ ] = “BOMBAY”;                 Char * b = “BOMBAY”;                 Printf (“\n%d %d”, sizeof (a), sizeof (b));                        }
A
a = 7, b = 7
B
a = 7, b = 2
C
a = 2, b = 7
D
a = 7, b = 0
Question 38
   Consider the following program segment :main ( )        int counter = 40;        for ( ; counter; )            counter………………..;       printf ( “ %d” , counter);What is the output ?
A
40
B
– 40
C
0
D
None of these
Question 39
What box testing , a software testing technique is sometimes called—
A
Basis path
B
Graph testing
C
Data flow
D
Glass box testing
Question 40
A relation scheme is in ………………………. If it is in the 1 NF and if all non-prime attributes are fully functionally dependent on the relation key(s).
A
First Normal Form
B
Second Normal Form
C
Boyce Codd Normal Form
D
Fourth Normal Form
Question 41
Parsing can be
A
Top-down
B
Bottom up
C
Both (A) and (B)
D
None of these
Question 42
Which of the following statement is not true in context of strings in C language ?
A
It is array of character
B
Last character of character array is always ‘\o’
C
C inserts the null character automatically
D
Any string in C can be read by the function getchar ()
Question 43
Which of the following statement is false regarding SQL statement ?
A
SQL statement are not case sensitive
B
SQL statement can be on one or more lines
C
Keywords can be abbreviated or split across lines
D
Clauses are usually placed on separate lines
Question 44
Virtual machine are
A
Lack of machine
B
IIIusion of rela machine
C
Physical machine
D
None of these
Question 45
Which of the following is not an evolutionary software process Model ?
A
Incremental Model
B
Spiral Model
C
Component Assemble Model
D
Prototyping Model
Question 46
What is the data function in SQL ?
A
DATA
B
SYSTEM DATA
C
SYSDATA
D
None of these
Question 47
Which of the following is a function of e-mail system ?
A
Composition
B
Transfer
C
Reporting
D
All of these
Question 48
Which of the following operator is used to access the value of structure pointer ?
A
B
&
C
*
D
Question 49
Which of the following UNIX command is used to verify integrity of the file system ?
A
mount
B
dump
C
dcheck
D
fsck
Question 50
The mechanism by which the data and functions are bound together with an object definition 
A
Inheritance
B
Encapsulation
C
Abstraction
D
Polymorphism
Question 51
Which of the following is a type of inheritance ?
A
Multiple
B
Multi level
C
Hierarchical
D
All of these
Question 52
HTTP refers to
A
Hyper Text Transmission Protocol
B
Hyper Text Transfer Protocol
C
Hyper Text Tie Protocol
D
None of these
Question 53
………………………… developed a set of software quality factors that ha been given the acronym FURPSFunctionality, Usability, Reliability, Performance and Supportability 
A
Hewlett—Packard
B
Rambaugh
C
Brooch
D
Jacobson
Question 54
Number of arcs incident to a node is called its
A
Level
B
Predecessor
C
Degree
D
Successor
Question 55
Which of the following is a statement of Assembly program ?
A
MACRO
B
SUBROUTINE
C
WHILE
D
FORMAT
Question 56
Which syntax is more accurate for creating SYNONYM ?
A
CREATE [ PUBLIC ] SYNONYM synonym for object
B
CREATE SYNONYM synonym for object from table name
C
CREATE [ PUBLIC ] SYNONYM synonym for column name
D
None of these
Question 57
Which of the following is a type of system testing ?
A
Recovery testing
B
Security testing
C
Stress testing
D
All of the above
Question 58
Which is not included in the UNIX file system ?
A
Bin
B
usr
C
dev
D
All of these
Question 59
Choose the right sequence of SDLC (Software development life cycle) steps—
A
Design, Requirement Analysis, Coding, Testing
B
Requirement Analysis, Design, Coding, Testing
C
Requirement Analysis, Design, Testing, Coding
D
Requirement Analysis, Coding, Design, Testing
Question 60
Which of the following  operators can  be   overloaded  in C++ ?
A
Scope resolution operator
B
Size of operator
C
Conditional operator
D
Arithmetic operator
Question 61
Which of the following properties is/are true in context of of will formed formula (WFF) ? 
A
Each letter is a term
B
If x and y are terms, then x = y is a formula
C
If P is a formula, then 7P is a formula
D
All of the above
Question 62
Which of the following is an operating system call ?
A
CREATE
B
LINK
C
SYSTEM
D
All of these
Question 63
Which of the following term is related to top down parsing ?
A
Shift
B
Reducing
C
Left recursion
D
Precedence relation
Question 64
The exponent part, in floating point number is represented by
A
Signed magnitude
B
Signed 2’ѕ complement or signed 1’ѕ complement
C
Biased exponent
D
All of the above
Question 65
What is the first activity of the prototype model ?
A
Designing of a test model
B
Requirement gathering
C
Testing of model
D
None of these
Question 66
In J-K flip-flop the function K = J is used to realize—
A
D-flip-flop
B
S-R flip-flop
C
T-flip-flop
D
Master-slave flip-flop
Question 67
An array can be passed in a functions in C language through
A
‘Call by value’ only
B
‘Call by reference’ only
C
Both ‘call by value’ and ‘call by reference’
D
None of these
Question 68
Which of the following term is related to the Stack ?
A
TOP
B
PUSH
C
POP
D
All of these
Question 69
A…………………… circuit is an interconnection of flip-flops and gates.
A
Combinational
B
Digital
C
Sequential
D
None of these
Question 70
“It is a test model. It can serve as ‘the first system’. Users get a feel for the actual system”. ‘It refers to 
A
RAD Model
B
Incremental Model
C
Prototyping Model
D
Waterfall Mode
Question 71
If every record of a file contains pairs for  the seme set of attributes, the file is said to contain 
A
Identical file
B
Homogeneous records
C
Homogeneous file
D
None of these
Question 72
What is the output of the following program segment ? main ( )      {               Float a, b, c, X,  Y,  Z;                a = 9; b = 12; c = 3;                X = a – b/ 3 + c * 2 – 1;                Y = a – b/ (3 + c) * (2 – 1)                Z = a – (b/ (3 + c) * 2) – 1             Printf ( “ X = % f\n Y = % f\n Z                                                           = % Y” , X, Y, Z);                 }
A
X = 10.000000, Y = 7.000000, Z = 4.000000
B
X = 10.000000, Y = 10.000000 Z = 10.000000
C
X = 3.000000, Y = 0.500000,, Z = 7.333334
D
None of these
Question 73
The smallest element of an array’ s index is called its
A
Smallest bound
B
Lower bound
C
First bound
D
Higher bound
Question 74
The 3-bit operation code for ADD operation is 001 and indirect memory address is 23 then 16-bit instruction code can be written as
A
00001000000010111
B
1001000000010111
C
10001000000010111
D
None of the above
Question 75
Half adder is an example of
A
Combinational circuit
B
Sequential circuit
C
Asynchronous circuit
D
None of these
Question 76
Which of the following is not an editor ?
A
Vi
B
Pico
C
Sed
D
Lint
Question 77
Each item in a linked list is called
A
Element
B
Information
C
Data
D
Node
Question 78
Which of the following is not a text editor ?
A
Vi
B
Note Pad
C
Edit Window in Dos
D
Word 97
Question 79
In Queues, the items deleted at one end is called
A
Rear
B
Front
C
Top
D
Base
Question 80
Which of the following is the feature of distributed operation system ?
A
Real time
B
Single tasking
C
Transparency
D
All of these
Question 81
Yacc is available as a command (utility) on the
A
MINIX
B
UNIX
C
DOS
D
None of these
Question 82
Mobile IP change with the adoption of IP version 6 (IPV6). What are the following features of IPV 6 are different from IPV 4 ?
A
Stateless Address Auto configuration
B
Neighbor discoveries
C
Nodes are expected to implement strong authentication and encryption Features to improve Internet security
D
All of the above
Question 83
A balanced order-n mult ’way search tree in which each non-root node contains atleast ………………. Keys is called a B-tree of order n ?
A
n – 1
B
(n – 1 )/2
C
n/2
D
(n – 1 )2
Question 84
The list with no nodes on it is called
A
Empty list
B
Null list
C
Both (A) and (B)
D
None of these
Question 85
Implementation of an inverted list to maintain the record list for each value for a given attribute can be done by
A
Sequential file
B
Direct file
C
Indexed file
D
Indexed sequential
Question 86
Which of the following is not a valid date type in SQL ?
A
CHAR
B
FLOAT
C
CLOB
D
DATE
Question 87
The compiled from of the definitions is known as
A
Data dictionary
B
Directory
C
System catalog
D
All of these
Question 88
Through linked list one can implement
A
Stack
B
Queue
C
Graph
D
All of these
Question 89
Which of the following is a threat for electronic payment system ? 
A
Trojan horse
B
Computer virus
C
Computer worms
D
All of the above
Question 90
MS SUS is a quick and inexpensive way to ensure that your network is protected from ……………………. and hacks targeting your window installation.
A
Trojans
B
Worms
C
Both (A) and (B)
D
None of these
Question 91
Which of the following statement managers the changes made by DML statement ?
A
SELECT
B
UPADATE
C
DELETE
D
COMMIT
Question 92
One-way authentication is based on—
A
Possession of a secret (Password)
B
Possession of an artifact
C
Unique physiological or behavioural characteristics of the user
D
All of the above
Question 93
 Lorenz and Kidd suggest some project metrics, which of the following belongs to that metrics ?
A
Number of scenario script
B
Number of key classes
C
Both (A) and (B)
D
None of these
Question 94
Which of the following statement is not true ?
A
FIFO replacement policy suffer from the problem Belady’s Anomaly
B
FIFO is not the first choice of operating system designers for page replacement
C
FIFO is first choice of operating system designers for page replacement
D
The FIFO also replaces the resident page that has spent the longest time in memory
Question 95
TRUNCHATE statement in SQL is a—
A
DML statement
B
DDL statement
C
DCL statement
D
None of these
Question 96
RAD is a linear sequential software development process model. RAD is an acronym for 
A
Rapid Application Develpment
B
Rapid Action Development
C
Rough Application Development
D
Rough Action Development
Question 97
An normalized relation contains vaules
A
Atomic
B
Non-atomic
C
Classified
D
Non of these
Question 98
Which of the following is a major component of the telephone system ?
A
Local loop
B
Trunks
C
Switching office
D
All of these
Question 99
The………………….. contains information on the date stored in the database and is consulted by the  DBMS  before any data manipulation operation.
A
Data dictionary
B
Data table
C
View
D
Network catalog
Question 100
Which of the following is a type of translator ?
A
Assembler
B
Compiler
C
Interpreter
D
All of these
Question 101
Which of the following is a phase of RAD model ?
A
Business modeling
B
Data modeling
C
Application generation
D
All of the above
Question 102
Which of the following is the disadvantage of Linear Sequential model ?
A
Changes can cause confusion
B
Time consuming
C
Both (A) and (B)
D
None of these
Question 103
ASCII code for alphabetic requires ……………………..bits.
A
16
B
15
C
8
D
7
E
Question 104
Which of the following feature is related to bottom up parsing ?
A
Shift
B
Reduce
C
Precedence relation
D
All of the above
Question 105
Which of the following is not type of JOIN in SQL ?
A
EQUIJOIN
B
NON EQUIJOIN
C
INNER JOIN
D
OUTER JOIN
Question 106
Round Robin scheduling algorithm falls under the category of—
A
Preemptive scheduling
B
Non-preemptive scheduling
C
Sometime preemptive sometimes non-preemptive
D
None of these
Question 107
Entities having Primary key are called
A
Primary entities
B
Strong entities
C
Weak entities
D
Primary key
Question 108
Which of the following is not a context free grammar component ?
A
Terminal symbols
B
Non-terminal symbols
C
Production rule
D
List
Question 109
McCall proposed which of the following quality factors ?
A
Correctness, Reliability, Usability, Integrity, Efficiency
B
Maintainability, Flexibility, Testability,
C
Portability, Reusability, Interoperability
D
All of the above
Question 110
A loading scheme in which loading and linking of external references are postponed until execution time 
A
Direct linking loader
B
Dynamic loading
C
Dynamic linking
D
Relocating loader
Question 111
Race around condition can be eliminated using
A
False triggering
B
Master-slave flip-flop
C
Two clock pulses
D
None of these
Question 112
Which of the following is not a combinational circuit ?
A
Encoders
B
Decoders
C
Registers
D
Multiplexers
Question 113
Which of the following is not a type of database ?
A
Hierarchical
B
Network
C
Relational
D
Transition
Question 114
Which of the following is a step of software design model ?
A
Data design
B
Architecture design
C
Interface design
D
All of the above
Question 115
Full adder is used to
A
2 bit addition
B
3 bit addition
C
4 bit addition
D
Addition of unlimited number of bits
Question 116
A floating point number is said to be normalized if the most significant digit of the mantissa is
A
Zero
B
Non-zero
C
Negative
D
Positive
Question 117
Which of the following belongs to the logic families of integrated circuits ?
A
Transistor Transistor Logic (TTL)
B
Metal Oxide Semiconductor (MOS)
C
Complementary Metal Oxide Semiconductor (CMOS)
D
All of the above
Question 118
UNIX operating system is based on
A
Language structure
B
Kernel approach
C
Virtual machine
D
Time sharing
Question 119
Which of the following table helps in representing the previous and next state of the sequential circuit prior to and after the clock pulse respectively ?
A
Truth table
B
Characteristic table
C
Excitation table
D
None of the above
Question 120
When two numbers of n digits each are added and the sum occupies n  + 1 digits, the situation is called
A
Overflow
B
Underflow
C
Normal condition
D
None of these
Question 121
A type of inheritance that permist a class to have more than one super class and to inherit features from all ancestors 
A
Inheritance
B
Multiple inheritance
C
Subclasses
D
Super classes
Question 122
Which of the following is not a type of assembler ?
A
One-Pass
B
Two-Pass
C
Three-Pass
D
Load and Go
Question 123
What is the output of following C statement 7.5%3 ?
A
1.5
B
1
C
None output
D
2
Question 124
In digital computer, ……………………. Is used to represent negative numbers.
A
1’s complement
B
2’s complement
C
Both (A) and (B)
D
None of these
Question 125
Which of the following is the correct simplification of Boolean expression    A’BC + AC ?
A
BC + AC
B
BC + C
C
BC
D
A’C
Question 126
When a cracker attempts to misuse or steal data from a system, it Is called 
A
Stealing
B
Intrusion
C
Virus
D
None of these
Question 127
A ……………………. In C language is also known as record.
A
Array
B
Structure
C
Pointer
D
Enum
Question 128
There are occasion when it does not matter if the function produces 0 or 1 for a given minterm. Minterms that may produce either 0 or 1 for the function are said to be
A
Careless conditions
B
Don’t care condition
C
Minterm condition
D
Maxterm condition
Question 129
A number  243  is represented as  F3 in a number system. Which number system is used to represent  243  as F3 ?
A
Binary
B
Gray code
C
Octal
D
Hexadecimal
Question 130
Which of the following statement is/are true regarding flip-flop ?
A
A flip-flop is a binary cell
B
Capable of storing one bit of information
C
It has two outputs
D
All of the above
Question 131
Representation of two dimensional array in memory is
A
Row-major
B
Column-major
C
Both (A) and (B)
D
None of these
Question 132
The maintenance step in linear sequential mode comes after
A
Testing
B
Coding
C
Design
D
Analysis
Question 133
Which layer is not present in TCP/IP Model ?
A
Internet layer
B
Application layer
C
Session layer
D
Transport layer
Question 134
To find the shortest-path in a weighted graph or network, which of  the following algorithm is not used ?
A
Warshall’s algorithm
B
Dijkastra algorithm
C
Kruskal algorithm
D
None of the above
Question 135
The drawbacks of the binary tree sort are remedied by the—
A
Linear sort
B
Quick sort
C
Heap sort
D
Insertion sort
Question 136
Leaf class is
A
A class with one subclass
B
A class with on subclass
C
A class having more than one subclasses
D
A class having exactly two subclasses
Question 137
What does the following program segment print?Main ( ) int i                         int iarray   [ 4 ] = { 1,2,3,4 }                         # define SIZE (size of (iarray)/size of (int))                  For (i = 0; i ˂ SIZE ; + + i)                       iarray [i] + = 2;                   printf (“value is % d\n”, iarray [3];                  
A
3
B
6
C
Compilation error because of # define with in main module
D
None of the above
Question 138
A …………………………. is used to capture some specific property of the  object.
A
Field
B
Object
C
Entity
D
Class
Question 139
The objects are…………….. if all their attribute values are identical.
A
Identical
B
Distinct
C
Same
D
None
Question 140
Which of the following statement is true ?
A
Generalization tree is composed of object instances that are all part of a composite object
B
Generalization tree is composed of classes that describe an object
C
Both (A) and (B)
D
None of these
Question 141
In WWW,  when hypertext pages are mixed with other media, the result is called  
A
Mediamix
B
Hypermedia
C
External viewer
D
Helper application
Question 142
Recently which operating system launched its Hindi version ?
A
MINIX
B
LINUX
C
DOS
D
All of these
Question 143
In context free grammar, terminal symbols refers to
A
Tokens
B
Keywords for a programming language
C
Productions rule
D
Start symbol
Question 144
Semaphores are used to solve—
A
Deadlock
B
Mutual exclusion
C
Inter-process communication
D
Messaging
Question 145
A software development strategy that organizes software as a collection of objects that contain both data structure and behaviour
A
Software engineering
B
Object oriented
C
Data structure
D
Program development
Question 146
Which of the following is a task region of spiral model ?
A
Planning
B
Risk Analysis
C
Engineering
D
All of these
Question 147
  Wasting of memory within a partition, due to a difference in size of a partition and of the object resident within it, is called
A
External fragmentation
B
Internal fragmentation
C
Compaction
D
Coalescing
Question 148
Which of the following is not a measure of software quality ?
A
Correctness
B
Maintainability
C
Accessibility
D
Integrity
Question 149
Which of the following is not included in DML (Data Manipulation Language) ?
A
INSERT
B
UPDATE
C
DELETE
D
CREATE
Question 150
The messages are formatted strings composed of
A
A receiver object
B
A message selector
C
A sequence of zero or more arguments
D
All of the above
Question 151
Oen can interface with operating system by means of
A
Operating system call in a program
B
Operating system commands
C
Operating system process
D
Both by operating system call and operating system commands
Question 152
The object design focuses on the—
A
Description of data structure
B
Algorithms
C
Messages
D
All of the above
Question 153
……………………… performs relocation function ?
A
Absolute loader
B
Direct linking loader
C
Relocating loader
D
Linkage editor
Question 154
Which of the following method is used to simplify the Boolean function ?
A
Karnaugh Map Technique
B
Variable Entered Mapping (VEM) Technique
C
Quine-McCluskey Method
D
All of the above
Question 155
The linker produces a…………………. which contains the binary codes for all compound modules
A
Bit file
B
Object program
C
Load file
D
Link file
Question 156
C++ was developed by
A
Dennis Ritchie
B
Bjarne Stroustrup
C
Tannenbaum
D
Milan Melkovinec
Question 157
 When you drop a…………………. corresponding indexes are also dropped.
A
Column
B
Sequence
C
View
D
Table
Question 158
Which of the following is not used as a data structure ?
A
Array
B
Linked list
C
Graph
D
Directory
Question 159
Which of the following is not SQL function ?
A
STDDEV
B
DEV
C
VARIANCE
D
COUNT
Question 160
With current technology, it is unwise to have satellites spaced much closer than 2 degrees in the 360 degree equatorial plane, to avoid interference. With a spacing of 2 degrees, there can only be…………………………… geosynchronous communication  satellites in the sky at once.
A
360
B
360* 2
C
360/2
D
2
Question 161
Which of the following is not a type of processing ?
A
Serial
B
Network
C
Batch
D
Multiprogramming
Question 162
Which of the following statement is not true regarding twisted pair ?
A
It consists of two insulated copper wries, typically about 1 mm thick
B
The purpose of twisting of the wires is to reduce electric Interference from similar pairs
C
High cost
D
It can run several kilometers without amplification
Question 163
A simple protocol used for fetching e-mail from a remote mailbox is……………………… which is defined in RFC 1064 ?
A
Interactive Mail Access Protocol (IMAP)
B
Distributed Mail System Protocol (DMSP)
C
Post Ofice Protocol (POP3)
D
Pretty Good Protocol (PrGP)
Question 164
A video editing system for Linux
A
DVDL
B
LIVES
C
VSL
D
LVS
Question 165
Linear sequential model for software engineering is also known as
A
Prototype
B
RAD
C
Spiral
D
Waterfall
Question 166
Which of the following is not a type of SQL statement ?
A
Data Manipulation Language (DML)
B
Data Definition Language (DDL)
C
Data Control Language (DCL)
D
Data Standard Language (DSL)
Question 167
SQL * Plus ignores blank spaces before and after the—
A
Arithmetic operator
B
Relational operator
C
Logical operator
D
Binary operator
Question 168
Each object is said to be……………….. of its class.
A
Attribute
B
Instance
C
Classification
D
Operations
Question 169
In a JK flip-flop, it J = K, the resulting flip-flop is referred to as a
A
D flip-flop
B
T flip-flop
C
S-R flip-flop
D
None of these
Question 170
Which of the following flip-flop is different, in context of their outputs ?
A
SR flip-flop
B
D flip-flop
C
JK flip-flop
D
None of these
Question 171
Pictorial arrangement of the truth table
 
A
K-Map
B
Sequential circuit
C
Combinational gate
D
None of these
Question 172
A ……………………… is said to occur when two distinct key values are mapped to the same storage location.
A
Clashing
B
Collision
C
Chaining
D
Probing
Question 173
Which of the following is a type of fragmentation ?
A
Transparent
B
Non-transparent
C
Both (A) and (B)
D
None of these
Question 174
Which of the following layers is not in OSI Model ?
A
Physical layer
B
Internet layer
C
Network layer
D
Transport layer
Question 175
 The relative position of the file marker can be changed via the—
A
Marker call
B
Fence Register
C
LSEEK call
D
EXEC Command
Question 176
GSM stands for
A
General System for Mobile Communication
B
Global System for Mobile Communication
C
Guided System For Mobile Communication
D
Growing System For Mobile Communication
Question 177
To represent a function in a truth table we need a list of the……………… combinations of the n binary variables.
A
n × n
B
2n
C
D
nᴺ
Question 178
Which of the following is a type of Intrusion Detection System (IDS) ?
A
NIDS (Network Intrusion Detection System)
B
SIV (System Integrity Verifier)
C
LFM (Log File Monitor)
D
All of the above
Question 179
Consider an operation of addition. For two numbers, the operation will generate a sum. If the operands are strings, and the same operation would produce a third string by concatenation. This feature is called
A
Inheritance
B
Encapsulation
C
Polymorphism
D
Binding
Question 180
The collection of communication line and routers form the—
A
Router
B
Bridge
C
Subnet
D
Packet
Question 181
Which of the following structure is FIFO (First In First Out) ?
A
Stack
B
Array
C
Queue
D
Graph
Question 182
Which of the following is a property of a parse tree
A
Root is Iabelled by the start symbol
B
Each leaf is labelled by a token or terminal symbol
C
Each interior mode is labelled by a nonterminal
D
All of the above
Question 183
Linkage Edittor is also called
A
Loader
B
Binder
C
Assembler
D
Macroprocessor
Question 184
Which of the following is not a number system  ?
A
Hexadecimal
B
Octal
C
Radix
D
Binary
Question 185
A strictly binary tree with n leaves always contains……………… nodes.
A
n * n
B
2n
C
2n – 1
D
n²− 1
Question 186
Which of the following circuit type is based upon time or clock pulse ?
A
Combinational circuit
B
Sequential circuit
C
Full adder
D
None of these
Question 187
Assembly language is a
A
Low Level Language
B
Middle Level Language
C
High Level Language
D
None of these
Question 188
In C++, setw is—
A
Initialization operator
B
Conditional operator
C
Memory allocation operator
D
Field width operator
Question 189
Which of the following SQL statement is used to deleted a Column from a table 
A
DELTE column-name from table name
B
ALTER TABLE table name DROP COLUMN column name
C
P column name FROM table name
D
None of these
Question 190
The process of macro-expansion is completely segregated from the process of assembly program. The translator which performs macro-expansions is called
A
Macro Interpreter
B
Macro Pre-Processor
C
Macro Table
D
None of these
Question 191
………………….. is preferable in systems requiring low power consumption.
A
Emitter Coupled Logic (ECL)
B
Metal Oxide Semiconductor (MOS)
C
Complementary Metal Oxide Semiconductor (CMOS)
D
Transistor Transistor Logic (TTL)
Question 192
An encoder has 2ᴺ input lines and…………………… output lines.
A
2
B
n
C
2 x n
D
n x n
Question 193
A Second Normal Form does not permit………..  dependency between a non-prime attribute and the relation key.
A
Partial
B
Multi
C
Functional
D
Valued
Question 194
Which of the following is a method of Wireless Transmission ?
A
Electromagnetic spectrum
B
Infrared and millimeter waves
C
Light wave transmission
D
All of the above
Question 195
In  UNIX systems the user can change the access right of the file to different users by using 
A
PID
B
Chimed
C
Head
D
tail
Question 196
A generalization of the Boyce Codd  Normal From to relation schemeswhich includes the multivalued dependencies is called
A
Second Normal Form
B
Third Normal Form
C
Fourth Normal Form
D
Fifth Normal Form
Question 197
Which of the following is an object-oriented programming (OOP) ?
A
Real time system
B
AI and expert system programming
C
Neural networks and parallel
D
All of the above
Question 198
Stack is sometimes called a
A
Push down list
B
Pushdown array
C
Pop down list
D
Pop up array
Question 199
As a result of the execution of FORK, the calling process is
A
Split into two related but separate process
B
Terminated
C
Linked with another process
D
Executed
Question 200
Input of Lex is
A
Set of regular expression
B
Statement
C
Numeric data
D
ASCII code
Question 201
In SQL, sequence
A
Automatically generates unique numbers
B
Is a sharable object
C
Is typically used to create a primary key value
D
All of the above
Question 202
A transition between two memory resident process in a multiprogramming system is called 
A
Process switch
B
Mode switch
C
Transition switch
D
None of these
Question 203
.………………………. modifies source code and/or data in an effort to make it amenable to future changes.
A
Reverse engineering
B
Software restructuring
C
Forward engineering
D
Software maintenance
Question 204
Which of the following is different from the group ?
A
Private
B
Protected
C
Public
D
Friend
Question 205
Which of the following is a Lex operator ?
A
*(asterisk)
B
! (OR)
C
+
D
All of these
Question 206
E-Commerce refers to—
A
Electrical Commerce
B
Electronic Commerce
C
Evolutionary Commerce
D
Effective Commerce
Question 207
MAN refers to
A
Mega Area Network
B
Metropolitan Area Network
C
Mini Area Network
D
Medium Area Network
Question 208
The series of 60 from Nokia is based on
A
Symbian operating system
B
Windows
C
Linux
D
None of these
Question 209
A tree having a main node, which has no predecessor is—
A
Spanning tree
B
Rooted tree
C
Weighted tree
D
None of these
Question 210
Which of the following is an important component of semantic analysis ?
A
Symbol table
B
Type checking
C
Lex
D
Yacc
Question 211
  Consider the following program :        Main ( )            int I, j, r;            i = 100; j, = 5; r = 20;printf (“value of i + j r is %  0\n”, I + j – r); What is the output ?
A
55
B
85
C
125
D
None of these
Question 212
 A…………….. is an ordered collection of items from which items may be deleted at one end and into which items may be inserted at the other end.
A
Stack
B
Array
C
Queue
D
Graph
Question 213
Encapsulation is also known as—
A
Information hiding
B
Data abstraction
C
Data about data
D
None of these
Question 214
Which of the following is a way of Electronic Payment ?
A
Digital token
B
Credit card
C
Smart card
D
All of these
Question 215
ATM  (Asynchronous Transfer Mode) is fundamentally a …………………………. Technology.
A
Circuit Switching
B
Packet Switching
C
Narrow band
D
None of these
Question 216
Which of the following feature belongs to E-R diagrams ?
A
AN entity set is shown as a rectangle
B
The attributes, shown as ovals are connected to the entities or relationships by lines
C
A diamond represents the relationship among a number of entities which are connected to the diamond by lines
D
All of the above
Question 217
Which of the following is a functionally complete gate ?
A
AND
B
OR
C
NAND
D
NOT
Question 218
Fixed head disks usually have
A
a separate read/write head
B
a common read/write head
C
Sometimes separate, sometimes common read or write head
D
Nome of these
Question 219
PAN refers to
A
Peer Area Network
B
Personnel Area Network
C
Personal Area Network
D
Payment Application Network
Question 220
Which of the following identities belongs to DeMorgan’s theorems ?
A
x + x = 1
B
xy = yx
C
(xy)’ = x’ + y’
D
x. 0 = 0
Question 221
Consider the following statement :                                  WHO ! SORT                   In above UNIX statement SORT is a—
A
Script
B
Filter
C
Process
D
Tool
Question 222
Which of the following is not a header file of C ?
A
ctype. h
B
string. h
C
stdlib. h
D
type. h
Question 223
Which of the following is not a feature of a compiler ?
A
Scans the entire program first and then translates it into machine code
B
When all the syntax errors are removed execution takes place
C
Slow for debugging
D
Execution time is more
Question 224
Method of graph traversal—
A
Depth first search
B
Breadth first search
C
Both (A) and (B)
D
None of these
Question 225
Collection of interconnected networks sometimes called
A
Internet
B
Wireless network
C
Mobile network
D
None of these
Question 226
Which of the following  is a type of tree ?
A
AVL
B
NVL
C
Forest
D
Preorder
Question 227
Linked lists can be
A
Single
B
Double
C
Circular
D
All of these
Question 228
The …………………….. model remains operative until the software is retired.
A
Waterfall
B
Incremental
C
Spiral
D
None of these
Question 229
The objective of testing is
A
Debugging
B
To uncover errors
C
To gain modularity
D
To analyze system
Question 230
The Metal Oxide Semiconductor (MOS) is a……………….transistor that depends on the flow of only one type of carrier, which may be electrons or holes ?
A
Unipolar
B
Bipolar
C
n-polar
D
None of these
Question 231
If the called telephone is attached to another end office, a procedure is used that each end office has a number of outgoing lines to one or more nearby switching centres, called toll offices. These lines are called 
A
Loop
B
End office
C
Toll connecting trunks
D
Switching office
Question 232
Which of the following statement is not true ?
A
Conversion of a number 25.25 into its binary equivalent is 11001.01
B
There are 4 Boolean combinations of two Boolean variables
C
Microprogrammed control unit and Hardwired control unit logically similar and have the same execution speed
D
none of the above
Question 233
Which of the following  is a loader schemes ?
A
Direct linking loader
B
Dynamic loading
C
Dynamic linking
D
All of the above
Question 234
Kernel is
A
A part of operating system
B
An operating system
C
A hardware
D
A register
Question 235
Function-oriented metrics were first proposed by—
A
John
B
Gaffney
C
Albrecht
D
Basili
Question 236
In C++, we can use the same function name to create functions that               perform a variety of different tasks. This is know as
A
Global function
B
Function overloading
C
Inheritance
D
All of the above
Question 237
To overcome the difficulty of Race around condition which of the following  flip-flop  is used ?
A
JK flip-flop
B
SR flip-flop
C
D flip-flop
D
Master-salve flip-flop
Question 238
Which of the following function perform by two pass assembler in pass II ?
A
Separate the symbols, mnemonic op-code and operational fields
B
Generation of object code
C
Build the symbol table
D
Determination of the storage requirement for every assembly language statement
Question 239
The spiral model originally proposed by
A
Winston Royce
B
Racoon
C
Boehm
D
Davis
Question 240
A……………………. variable provides an alias for a previously defined variable.
A
Global
B
Local
C
Reference
D
Dynamic
Question 241
The address of the first element of array is called
A
First address
B
Base address
C
Initial address
D
Location address
Question 242
Which of the following is a browser to view a web page ?
A
Mosaic
B
Netscape
C
Internet Explorer
D
All of the above
Question 243
Which of the following is not a page replacement algorithm ?
A
LIFO
B
FIFO
C
LRU
D
Optimal
Question 244
T flip-flop means
A
Timed flip-flop
B
Toggele flip-flop
C
Tackle flip-flop
D
Test flip-flop
Question 245
Which of the following is a feature of DCMS ?
A
Track the activities performed in a distribution centre
B
It ensures accurate and timely shipping of goods to the customer
C
The package streamlines the flow of inventory in a systematic each manner— recording and tracking each activity for effective control and review
D
All of the above
Question 246
Which of the following Network Security aspect ?
A
Patch management
B
Firewalls
C
Intrusion Detection System (IDS)
D
All of above
Question 247
The process of creating instances from classes
A
Integrity
B
Instantiation
C
Inheritance
D
Generalization
Question 248
…………..is a pointer to the current object. It passed implicitly to an overloaded operator ?
A
This
B
New
C
Scope
D
Private
Question 249
What is the drawback of infrared and millimetre waves ?
A
They are directional
B
They cannot pass through solid objects
C
License is needed
D
Can be u7sed outdoor
Question 250
By representing the value of voltage or current as a single-valued function of time f(t), we can model the behaviour of the signal and analyze it matically. Method(s) is/are
A
Fourier analysis
B
Bandwidth limited signals
C
Maximum data rate of a channel
D
All of the above
Question 251
Collection of fields is caled—
A
Information
B
Object
C
Record
D
Data type
Question 252
Which of the following feature does not belong to the frame relay ?
A
Connection Oriented
B
Normal Speed 1̇͘͘͘•5 Mbps.
C
Maximum payload is 1600
D
Multicasting
Question 253
Which of the following is a feature of computer virus ?
A
Propagation
B
Triggering
C
Damage
D
All of these
Question 254
In recent years……………………. has been deployed to give IP connectivity to GSM users.
A
LANs (Local Area Network)
B
ATM (Asynchronous Transfer Mode)
C
GPRs (General Packet Radio Service)
D
None of these
Question 255
Privately owned networks within a single building or campus of upto a few kilometers   in size.
A
LAN
B
WAN
C
MAN
D
None of these
Question 256
Intrinsic Parallel computers are those that execute programs in
A
Single Instruction stream over single Data stream (SISD)
B
Single Instruction stream over Multiple Data stream (SIMD)
C
Multiple Instruction stream and Single Data stream (MISD)
D
Multiple Instruction stream over Multiple Data stream (MIMD)
Question 257
Fetch and decode cycle is not required in
A
Direct addressing
B
Immediate addressing
C
Indirect addressing
D
None of the above
Question 258
C function returns………………… value by default.
A
Character
B
No
C
Integer
D
Float
Question 259
One can display all columns of data in table by following the SELECT keyword with 
A
+
B
*
C
D
?
Question 260
Priority Queue can be
A
Ascending
B
Descending
C
Both ( A ) and ( B )
D
None of these
Question 261
All the vertices of a walk except very first and very last vertex, is called
A
Internal vertices
B
External vertices
C
Intermediate vertices
D
Adjacent vertices
Question 262
In C++, by  default, the members of a class are
A
Public
B
Private
C
Both public and private
D
None of these
Question 263
Which of the following is not a C function ?
A
Printf
B
Fprintf
C
Sprint
D
Tprintf
Question 264
Which of the following is true ?
A
Duplicate values are allowed in a primary key
B
Primary keys generally can be changed
C
Foreign keys are based on data values and are purely logical, not physical, pointers
D
You can define foreign keys without existing primary key
Question 265
Which of the following operations cannot be perform on pointers in C ?
A
Addition of two pointers
B
Subtraction of a number from a pointer
C
Subtraction of one pointer from another
D
Addition of a number to a pointer
Question 266
The Principles of the relational model were first outlined by Dr E.F. Codd in
A
Sept. 1972
B
Dec. 1975
C
June 1970
D
Dec. 1980
Question 267
To access the database, one execute a structured query language (SQL) statement which is ……………………. Language for operating upon relational databases ?
A
American National Standards Institute (ANSI)
B
American Standards Code of InformatioInterchange (ASCII)n
C
EBCDIC
D
Gray
Question 268
ATM is both a technology and a service. Sometimes the service is called—
A
Segmentation
B
Reassembly
C
Cell relay
D
Transmission convergence
Question 269
Which of the following statement is not true regarding graph ?
A
A graph consists of a set of nodes and a set of arcs
B
A graph is a tree
C
A tree is a graph
D
Graphs can be directed
Question 270
Which of the following is a type of file organization ?
A
Serial
B
Direct
C
Index sequential
D
All of these
Question 271
Which of the following statement is used to end a macro in assembly language ?
A
END MACRO
B
MAVRO END
C
ENDM
D
Macroname END.
Question 272
Stack is
A
Dynamic data structure
B
Constantly changing object
C
An ordered collection of items
D
All of the above
Question 273
A software process model is choosen based on the
A
Nature of the project and application
B
The methods and tools to be used
C
The controls and deliverables that are required
D
All of the above
Question 274
The major drawback of B-tree is the difficulty of traversing the keys sequentially. The ……………………. tree retains the rapid random access property of the B-tree while  also allowing papid  sequential access.
A
AVL
B
B+
C
Binary
D
Height Balanced
Question 275
Tracking and recording of page modifications is usually performed in hardware by adding a written-into bit to each entry of the page map table. This bit is sometimes called
A
Buddy bits
B
Protection bits
C
Priority bits
D
Dirty bits
Question 276
Which of the following is a software metrics ?
A
Size-Oriented
B
Function-oriented
C
Extended function point
D
All of the above
Question 277
The values for an attribute or a column are drawn from a set of values known as a—
A
Tulles
B
Attributes
C
Domain
D
None of these
Question 278
Classical problem in concurrent programming
A
The producer/consumer
B
The reader/writer
C
Both (A) and (B)
D
None of these
Question 279
Which of the following is a style of internet working ?
A
Concatenated Virtual Circuit
B
Datagram Model
C
Both (A) and (B)
D
None of these
Question 280
Chaining and Indexing are the strategies of
A
Contiguous allocation
B
Non-contiguous allocation
C
Partition allocation
D
Static allocation
Question 281
Software metrics domain can be divided into process, project and product metrics. Product metrics are……………….. to an individual are often combined to develop project metrics.
A
Private
B
Public
C
Both (A) and (B)
D
None of these
Question 282
The output of parsing is—
A
A representation of the syntactic structure of a statement in the from of parse tree
B
Group of tokens in the form of parse tree
C
Collection of identifiers and build a parse tree
D
None of these
Question 283
The relational model includes two general integrity rules. Integrity rule 1 is concerned with……………. And integrity rule 2 is concerned with……………..
A
Primary key, Foreign key
B
Composite key, Primary ke
C
Foreign key, Primary key
D
Transaction key, Foreign key
Question 284
Yacc semantic is a sequence of
A
Tokens
B
Expression
C
C Statements
D
Rules
Question 285
Creating a ……… eliminate the need to qualify the object name with the schema and provides you with an alternative name for a table, view sequence, procedure or other object.
A
Alias
B
Synonym
C
Antonym
D
Column
Question 286
Mobile computers and Personal Digital Assistants (PDAs) are the examples of
A
Radio broadcasting
B
Wireless Network
C
Geosynchronous
D
LAN
Question 287
 A template can be used to create a family of
A
Classes
B
Functions
C
Class and function
D
None of these
Question 288
To analyze an atomic statement, a logic called …………………. logic is used.
A
Boolean
B
Predicate
C
Propositional
D
None of these
Question 289
The first version of UNIX was written by
A
Dennis Ritchie
B
Andrew S.
C
Ken Thompson
D
None of these
Question 290
In a Third Normal Form relation, every…………       attribute is non-transitively and fully dependent on the every candidate key.
A
Prime
B
Non-prime
C
Unique
D
None of these
Question 291
………………….. are deployed for mobile Internet solutions.
A
Transfer Control Protocol (TCP)
B
Code Division Multiple Access (CDMA)
C
Cell Variation Delay Tolerance (CVDT)
D
Classless Inter Domain Routing (CIDR)
Question 292
An overflow condition can be detected by observing the carry into the sign bit position and the carry out of the sign bit position. It these two carries are ………………………, an overflow condition is produced.
A
Equal
B
None equal
C
Negative
D
Positive
Question 293
Project join normal from is also referred to as
A
Second Normal Form
B
Third Normal Form
C
Fourth Normal Form
D
Fifth Normal Form
Question 294
Consider a program written in high level language like C. Such a program may contain calls on certain input/output functions like printf (),  scanf (), etc., which are not written by the programmer himself. During  program execution, those standard functions must reside into the main memory. Furthermore, everytime an input/output function is called by a C language program, control should get transferred to the appropriate function. The process is known as 
A
Linking
B
) Loading
C
Relocation
D
None of these
Question 295
A descending heap is also called
A
Max heap
B
Min heap
C
Priority heap
D
Priority ordered tree
Question 296
Yacc source program has 3 parts. Which of the following are Yacc source program parts ? 
A
Terminal symbol, non-terminal symbol, production rule
B
Declaration, Translation rules, user routines
C
Declaration, Translation rules, C-Programs
D
None of these
Question 297
Object is
A
A concept
B
Abstraction
C
Thing
D
All of these
Question 298
 For a person to be………………….. means that he/she is notonly always connected, but is also connected through the best available device and access technology at all times.
A
Always Networked (AN)
B
Always Best Connected (ABC)
C
Always Mobile Connected (AMC)
D
Wireless Connection (WC)
Question 299
“Sam participates in the meeting from the subway , using his PDA, which is connected to his corporate network over 3G and a conferencing tool.” What is the meaning of PDA ?
A
Personal Digital Area
B
Personal Digital Assistant
C
Personal Division Area
D
Personal Division Assistant
Question 300
Black Box testing sometimes called
A
Data flow testing
B
Loop testing
C
Behavioural testing
D
Graph based testing
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 300 questions to complete.
List
Return
Shaded items are complete.
12345
678910
1112131415
1617181920
2122232425
2627282930
3132333435
3637383940
4142434445
4647484950
5152535455
5657585960
6162636465
6667686970
7172737475
7677787980
8182838485
8687888990
9192939495
96979899100
101102103104105
106107108109110
111112113114115
116117118119120
121122123124125
126127128129130
131132133134135
136137138139140
141142143144145
146147148149150
151152153154155
156157158159160
161162163164165
166167168169170
171172173174175
176177178179180
181182183184185
186187188189190
191192193194195
196197198199200
201202203204205
206207208209210
211212213214215
216217218219220
221222223224225
226227228229230
231232233234235
236237238239240
241242243244245
246247248249250
251252253254255
256257258259260
261262263264265
266267268269270
271272273274275
276277278279280
281282283284285
286287288289290
291292293294295
296297298299300
End
Return