Search Here

Computer Science Question Answers

Computer Science Question Answers Practice Test.

Computer Science MCQ Questions Answers for all kind of competitive exams: This mock test having 300 question each, with four choices. On each click on answers system will tell you where the answers is correct or incorrect. You can view this  test question details at the end of the quiz.

Computer Science Question Answers

This Computer Science questions answers are applicable for any kind of  Entrance and Job related exam 2016. You can practice as much as you can to gather knowledge of how to answers Computer Science Objective question are critical type papers in short time and this can be a big factor for cracking entrance level exam.



Computer Science Mock Test 300 MCQS

Congratulations - you have completed Computer Science Mock Test 300 MCQS.You scored %%SCORE%% out of %%TOTAL%%.Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Question 1
The Principles of the relational model were first outlined by Dr E.F. Codd in
A
Sept. 1972
B
Dec. 1975
C
June 1970
D
Dec. 1980
Question 2
Abstraction is
A
The act of representing the essential features of something without including much details
B
The act of representing the features of something including much detail
C
A tree structure
D
None of these
Question 3
Which of the following structure is FIFO (First In First Out) ?
A
Stack
B
Array
C
Queue
D
Graph
Question 4
……………………… performs relocation function ?
A
Absolute loader
B
Direct linking loader
C
Relocating loader
D
Linkage editor
Question 5
A software process model is choosen based on the
A
Nature of the project and application
B
The methods and tools to be used
C
The controls and deliverables that are required
D
All of the above
Question 6
Which of the following is a software metrics ?
A
Size-Oriented
B
Function-oriented
C
Extended function point
D
All of the above
Question 7
Which of the following term is related to the Stack ?
A
TOP
B
PUSH
C
POP
D
All of these
Question 8
Which of the following is the correct simplification of Boolean expression    A’BC + AC ?
A
BC + AC
B
BC + C
C
BC
D
A’C
Question 9
The………………….. contains information on the date stored in the database and is consulted by the  DBMS  before any data manipulation operation.
A
Data dictionary
B
Data table
C
View
D
Network catalog
Question 10
ASCII code for alphabetic requires ……………………..bits.
A
16
B
15
C
8
D
7
E
Question 11
What is the drawback of infrared and millimetre waves ?
A
They are directional
B
They cannot pass through solid objects
C
License is needed
D
Can be u7sed outdoor
Question 12
In C++, we can use the same function name to create functions that               perform a variety of different tasks. This is know as
A
Global function
B
Function overloading
C
Inheritance
D
All of the above
Question 13
Which of the following is not type of JOIN in SQL ?
A
EQUIJOIN
B
NON EQUIJOIN
C
INNER JOIN
D
OUTER JOIN
Question 14
 The relative position of the file marker can be changed via the—
A
Marker call
B
Fence Register
C
LSEEK call
D
EXEC Command
Question 15
Creating a ……… eliminate the need to qualify the object name with the schema and provides you with an alternative name for a table, view sequence, procedure or other object.
A
Alias
B
Synonym
C
Antonym
D
Column
Question 16
Priority Queue can be
A
Ascending
B
Descending
C
Both ( A ) and ( B )
D
None of these
Question 17
The default data format in SQL * is
A
DD – MON –YY
B
DD –MM – YY
C
DD – MM – YYYY
D
MM – DD – YY
Question 18
Which of the following UNIX command is used for pattern matching ?
A
awk
B
pattern
C
grep
D
join
Question 19
Which of the following statement managers the changes made by DML statement ?
A
SELECT
B
UPADATE
C
DELETE
D
COMMIT
Question 20
Pictorial arrangement of the truth table
 
A
K-Map
B
Sequential circuit
C
Combinational gate
D
None of these
Question 21
In WWW,  when hypertext pages are mixed with other media, the result is called  
A
Mediamix
B
Hypermedia
C
External viewer
D
Helper application
Question 22
Which of the following function perform by two pass assembler in pass II ?
A
Separate the symbols, mnemonic op-code and operational fields
B
Generation of object code
C
Build the symbol table
D
Determination of the storage requirement for every assembly language statement
Question 23
Which of the following SQL statement is used to deleted a Column from a table 
A
DELTE column-name from table name
B
ALTER TABLE table name DROP COLUMN column name
C
P column name FROM table name
D
None of these
Question 24
………………….. is preferable in systems requiring low power consumption.
A
Emitter Coupled Logic (ECL)
B
Metal Oxide Semiconductor (MOS)
C
Complementary Metal Oxide Semiconductor (CMOS)
D
Transistor Transistor Logic (TTL)
Question 25
A software development strategy that organizes software as a collection of objects that contain both data structure and behaviour
A
Software engineering
B
Object oriented
C
Data structure
D
Program development
Question 26
 A template can be used to create a family of
A
Classes
B
Functions
C
Class and function
D
None of these
Question 27
Chaining and Indexing are the strategies of
A
Contiguous allocation
B
Non-contiguous allocation
C
Partition allocation
D
Static allocation
Question 28
Which of the following  is a type of tree ?
A
AVL
B
NVL
C
Forest
D
Preorder
Question 29
Function-oriented metrics were first proposed by—
A
John
B
Gaffney
C
Albrecht
D
Basili
Question 30
Which of the following is not a header file of C ?
A
ctype. h
B
string. h
C
stdlib. h
D
type. h
Question 31
Which of the following statement is not true regarding twisted pair ?
A
It consists of two insulated copper wries, typically about 1 mm thick
B
The purpose of twisting of the wires is to reduce electric Interference from similar pairs
C
High cost
D
It can run several kilometers without amplification
Question 32
Which of the following is/are application(s) of flip-flop ?
A
Bounce elimination switch
B
Latch
C
Counters
D
All of the above
Question 33
Which of the following feature belongs to E-R diagrams ?
A
AN entity set is shown as a rectangle
B
The attributes, shown as ovals are connected to the entities or relationships by lines
C
A diamond represents the relationship among a number of entities which are connected to the diamond by lines
D
All of the above
Question 34
The basic logic operation is−
A
AND
B
NOR
C
NAND
D
XOR
Question 35
Which of the following statement is false in context of constructors in C++ ?
A
A constructor is a special member function whose task is to initialize the objects of its class
B
Its name is the same as the class name
C
The constructor is invoked whenever an object of its associated class is created
D
It is also used to destroy the objects
Question 36
Which of the following is a type of Intrusion Detection System (IDS) ?
A
NIDS (Network Intrusion Detection System)
B
SIV (System Integrity Verifier)
C
LFM (Log File Monitor)
D
All of the above
Question 37
Which of the following flip-flop is different, in context of their outputs ?
A
SR flip-flop
B
D flip-flop
C
JK flip-flop
D
None of these
Question 38
In  UNIX systems the user can change the access right of the file to different users by using 
A
PID
B
Chimed
C
Head
D
tail
Question 39
Which of the following  is a loader schemes ?
A
Direct linking loader
B
Dynamic loading
C
Dynamic linking
D
All of the above
Question 40
An oracle server index
A
Is a schema object
B
Is used to speed up the retrieval of rows by using a pointer
C
Is independent of the table it indexes
D
All of the above
Question 41
Classical problem in concurrent programming
A
The producer/consumer
B
The reader/writer
C
Both (A) and (B)
D
None of these
Question 42
Full adder is used to
A
2 bit addition
B
3 bit addition
C
4 bit addition
D
Addition of unlimited number of bits
Question 43
Entities having Primary key are called
A
Primary entities
B
Strong entities
C
Weak entities
D
Primary key
Question 44
To overcome the difficulty of Race around condition which of the following  flip-flop  is used ?
A
JK flip-flop
B
SR flip-flop
C
D flip-flop
D
Master-salve flip-flop
Question 45
Which of the following is an important component of semantic analysis ?
A
Symbol table
B
Type checking
C
Lex
D
Yacc
Question 46
Which of the following is not an assembly language program entity ?
A
Absolute
B
Relative
C
Object Program
D
Linker
Question 47
To represent a function in a truth table we need a list of the……………… combinations of the n binary variables.
A
n × n
B
2n
C
D
nᴺ
Question 48
 5 NF is related to
A
Functional dependency
B
Multivalued dependency
C
Join dependency
D
None of these
Question 49
In J-K flip-flop the function K = J is used to realize—
A
D-flip-flop
B
S-R flip-flop
C
T-flip-flop
D
Master-slave flip-flop
Question 50
T flip-flop means
A
Timed flip-flop
B
Toggele flip-flop
C
Tackle flip-flop
D
Test flip-flop
Question 51
RAD is a linear sequential software development process model. RAD is an acronym for 
A
Rapid Application Develpment
B
Rapid Action Development
C
Rough Application Development
D
Rough Action Development
Question 52
Which of the following is not a combinational circuit ?
A
Encoders
B
Decoders
C
Registers
D
Multiplexers
Question 53
Tracking and recording of page modifications is usually performed in hardware by adding a written-into bit to each entry of the page map table. This bit is sometimes called
A
Buddy bits
B
Protection bits
C
Priority bits
D
Dirty bits
Question 54
Which of the following statement is not true ?
A
Conversion of a number 25.25 into its binary equivalent is 11001.01
B
There are 4 Boolean combinations of two Boolean variables
C
Microprogrammed control unit and Hardwired control unit logically similar and have the same execution speed
D
none of the above
Question 55
Which of the following operator is used to access the value of structure pointer ?
A
B
&
C
*
D
Question 56
To find the shortest-path in a weighted graph or network, which of  the following algorithm is not used ?
A
Warshall’s algorithm
B
Dijkastra algorithm
C
Kruskal algorithm
D
None of the above
Question 57
In a JK flip-flop, it J = K, the resulting flip-flop is referred to as a
A
D flip-flop
B
T flip-flop
C
S-R flip-flop
D
None of these
Question 58
Which of the following is a feature of DCMS ?
A
Track the activities performed in a distribution centre
B
It ensures accurate and timely shipping of goods to the customer
C
The package streamlines the flow of inventory in a systematic each manner— recording and tracking each activity for effective control and review
D
All of the above
Question 59
In K-map, the adjacent squares represent minterms that differ by
A
One variable
B
Two variable
C
Three variable
D
None of these
Question 60
Virtual machine are
A
Lack of machine
B
IIIusion of rela machine
C
Physical machine
D
None of these
Question 61
In SQL, sequence
A
Automatically generates unique numbers
B
Is a sharable object
C
Is typically used to create a primary key value
D
All of the above
Question 62
What box testing , a software testing technique is sometimes called—
A
Basis path
B
Graph testing
C
Data flow
D
Glass box testing
Question 63
Which of the following is not included in DML (Data Manipulation Language) ?
A
INSERT
B
UPDATE
C
DELETE
D
CREATE
Question 64
Which of the following is the feature of distributed operation system ?
A
Real time
B
Single tasking
C
Transparency
D
All of these
Question 65
A…………………… circuit is an interconnection of flip-flops and gates.
A
Combinational
B
Digital
C
Sequential
D
None of these
Question 66
Intrinsic Parallel computers are those that execute programs in
A
Single Instruction stream over single Data stream (SISD)
B
Single Instruction stream over Multiple Data stream (SIMD)
C
Multiple Instruction stream and Single Data stream (MISD)
D
Multiple Instruction stream over Multiple Data stream (MIMD)
Question 67
 When you drop a…………………. corresponding indexes are also dropped.
A
Column
B
Sequence
C
View
D
Table
Question 68
Which of the following is true ?
A
Duplicate values are allowed in a primary key
B
Primary keys generally can be changed
C
Foreign keys are based on data values and are purely logical, not physical, pointers
D
You can define foreign keys without existing primary key
Question 69
What does the following program segment print?Main ( ) int i                         int iarray   [ 4 ] = { 1,2,3,4 }                         # define SIZE (size of (iarray)/size of (int))                  For (i = 0; i ˂ SIZE ; + + i)                       iarray [i] + = 2;                   printf (“value is % d\n”, iarray [3];                  
A
3
B
6
C
Compilation error because of # define with in main module
D
None of the above
Question 70
The drawbacks of the binary tree sort are remedied by the—
A
Linear sort
B
Quick sort
C
Heap sort
D
Insertion sort
Question 71
As a result of the execution of FORK, the calling process is
A
Split into two related but separate process
B
Terminated
C
Linked with another process
D
Executed
Question 72
Which of the following statement is false regarding SQL statement ?
A
SQL statement are not case sensitive
B
SQL statement can be on one or more lines
C
Keywords can be abbreviated or split across lines
D
Clauses are usually placed on separate lines
Question 73
Which of the following statement is used to end a macro in assembly language ?
A
END MACRO
B
MAVRO END
C
ENDM
D
Macroname END.
Question 74
Which of the following table helps in representing the previous and next state of the sequential circuit prior to and after the clock pulse respectively ?
A
Truth table
B
Characteristic table
C
Excitation table
D
None of the above
Question 75
A video editing system for Linux
A
DVDL
B
LIVES
C
VSL
D
LVS
Question 76
Which of the following statement is/are true regarding flip-flop ?
A
A flip-flop is a binary cell
B
Capable of storing one bit of information
C
It has two outputs
D
All of the above
Question 77
Master slave flip-flop is also referred to as the
A
Level triggered flip-flop
B
Pulse triggered flip-flop
C
Edge triggered flip-flop
D
None of these
Question 78
Mobile IP change with the adoption of IP version 6 (IPV6). What are the following features of IPV 6 are different from IPV 4 ?
A
Stateless Address Auto configuration
B
Neighbor discoveries
C
Nodes are expected to implement strong authentication and encryption Features to improve Internet security
D
All of the above
Question 79
Which of the following statement is not true in context of strings in C language ?
A
It is array of character
B
Last character of character array is always ‘\o’
C
C inserts the null character automatically
D
Any string in C can be read by the function getchar ()
Question 80
What is the output of following C statement 7.5%3 ?
A
1.5
B
1
C
None output
D
2
Question 81
Which of the following is not a number system  ?
A
Hexadecimal
B
Octal
C
Radix
D
Binary
Question 82
Race around condition can be eliminated using
A
False triggering
B
Master-slave flip-flop
C
Two clock pulses
D
None of these
Question 83
A balanced order-n mult ’way search tree in which each non-root node contains atleast ………………. Keys is called a B-tree of order n ?
A
n – 1
B
(n – 1 )/2
C
n/2
D
(n – 1 )2
Question 84
By representing the value of voltage or current as a single-valued function of time f(t), we can model the behaviour of the signal and analyze it matically. Method(s) is/are
A
Fourier analysis
B
Bandwidth limited signals
C
Maximum data rate of a channel
D
All of the above
Question 85
Which of the following is a Lex operator ?
A
*(asterisk)
B
! (OR)
C
+
D
All of these
Question 86
The address of the first element of array is called
A
First address
B
Base address
C
Initial address
D
Location address
Question 87
A tree having a main node, which has no predecessor is—
A
Spanning tree
B
Rooted tree
C
Weighted tree
D
None of these
Question 88
Which of the following term is related to top down parsing ?
A
Shift
B
Reducing
C
Left recursion
D
Precedence relation
Question 89
Mobile IP (Internet Protocol) uses
A
A fixed home address
B
A care of address
C
Both (A) and (B)
D
None of these
Question 90
Fetch and decode cycle is not required in
A
Direct addressing
B
Immediate addressing
C
Indirect addressing
D
None of the above
Question 91
Which of the following is not a page replacement algorithm ?
A
LIFO
B
FIFO
C
LRU
D
Optimal
Question 92
In recent years……………………. has been deployed to give IP connectivity to GSM users.
A
LANs (Local Area Network)
B
ATM (Asynchronous Transfer Mode)
C
GPRs (General Packet Radio Service)
D
None of these
Question 93
What is the output of the following program segment ? main ( )      {               Float a, b, c, X,  Y,  Z;                a = 9; b = 12; c = 3;                X = a – b/ 3 + c * 2 – 1;                Y = a – b/ (3 + c) * (2 – 1)                Z = a – (b/ (3 + c) * 2) – 1             Printf ( “ X = % f\n Y = % f\n Z                                                           = % Y” , X, Y, Z);                 }
A
X = 10.000000, Y = 7.000000, Z = 4.000000
B
X = 10.000000, Y = 10.000000 Z = 10.000000
C
X = 3.000000, Y = 0.500000,, Z = 7.333334
D
None of these
Question 94
Which of the following is a layer of object oriented design pyramid ?
A
Subsystem layer
B
Class and object layer
C
Message layer
D
All of the above
Question 95
The usual method of………………………. mapping is by some arithmetical manipulation of the key value, in direct file organization.
A
Random
B
Serial
C
Direct
D
One to many
Question 96
To analyze an atomic statement, a logic called …………………. logic is used.
A
Boolean
B
Predicate
C
Propositional
D
None of these
Question 97
Which of the following is the disadvantage of Linear Sequential model ?
A
Changes can cause confusion
B
Time consuming
C
Both (A) and (B)
D
None of these
Question 98
Which of the following is not SQL function ?
A
STDDEV
B
DEV
C
VARIANCE
D
COUNT
Question 99
The 3-bit operation code for ADD operation is 001 and indirect memory address is 23 then 16-bit instruction code can be written as
A
00001000000010111
B
1001000000010111
C
10001000000010111
D
None of the above
Question 100
Leaf class is
A
A class with one subclass
B
A class with on subclass
C
A class having more than one subclasses
D
A class having exactly two subclasses
Question 101
The mechanism by which the data and functions are bound together with an object definition 
A
Inheritance
B
Encapsulation
C
Abstraction
D
Polymorphism
Question 102
STACK is……………………. Structure.
A
Last In First Out (LIFO)
B
First In First Out (FIFO)
C
First In Last Out (FILO)
D
First Come First Served (FCFS)
Question 103
Object is
A
A concept
B
Abstraction
C
Thing
D
All of these
Question 104
The………………….. logic family was an evaluation of a previous technology that used diodes and transistors for the basic NAND gate.
A
TTL (Transistors Transistor Logic)
B
DTL (Diode Transistor Logic)
C
PMOS (P channe Metal Oxide Semiconductor)
D
CMOS (Complementary Metal Oxide Semiconductor)
Question 105
To access the database, one execute a structured query language (SQL) statement which is ……………………. Language for operating upon relational databases ?
A
American National Standards Institute (ANSI)
B
American Standards Code of InformatioInterchange (ASCII)n
C
EBCDIC
D
Gray
Question 106
In digital computer, ……………………. Is used to represent negative numbers.
A
1’s complement
B
2’s complement
C
Both (A) and (B)
D
None of these
Question 107
Which of the following UNIX command is used to verify integrity of the file system ?
A
mount
B
dump
C
dcheck
D
fsck
Question 108
A descending heap is also called
A
Max heap
B
Min heap
C
Priority heap
D
Priority ordered tree
Question 109
………………….. are deployed for mobile Internet solutions.
A
Transfer Control Protocol (TCP)
B
Code Division Multiple Access (CDMA)
C
Cell Variation Delay Tolerance (CVDT)
D
Classless Inter Domain Routing (CIDR)
Question 110
  Consider the following program :        Main ( )            int I, j, r;            i = 100; j, = 5; r = 20;printf (“value of i + j r is %  0\n”, I + j – r); What is the output ?
A
55
B
85
C
125
D
None of these
Question 111
Privately owned networks within a single building or campus of upto a few kilometers   in size.
A
LAN
B
WAN
C
MAN
D
None of these
Question 112
Which of the following is a property of a parse tree
A
Root is Iabelled by the start symbol
B
Each leaf is labelled by a token or terminal symbol
C
Each interior mode is labelled by a nonterminal
D
All of the above
Question 113
The objective of testing is
A
Debugging
B
To uncover errors
C
To gain modularity
D
To analyze system
Question 114
GSM stands for
A
General System for Mobile Communication
B
Global System for Mobile Communication
C
Guided System For Mobile Communication
D
Growing System For Mobile Communication
Question 115
When a cracker attempts to misuse or steal data from a system, it Is called 
A
Stealing
B
Intrusion
C
Virus
D
None of these
Question 116
Which of the following is a method of Wireless Transmission ?
A
Electromagnetic spectrum
B
Infrared and millimeter waves
C
Light wave transmission
D
All of the above
Question 117
ATM  (Asynchronous Transfer Mode) is fundamentally a …………………………. Technology.
A
Circuit Switching
B
Packet Switching
C
Narrow band
D
None of these
Question 118
Which of the following is a phase of RAD model ?
A
Business modeling
B
Data modeling
C
Application generation
D
All of the above
Question 119
OXFFF refers to a …………………….constant.
A
Hexadecimal
B
Octal
C
BCD
D
Graycode
Question 120
The smallest element of an array’ s index is called its
A
Smallest bound
B
Lower bound
C
First bound
D
Higher bound
Question 121
One-way authentication is based on—
A
Possession of a secret (Password)
B
Possession of an artifact
C
Unique physiological or behavioural characteristics of the user
D
All of the above
Question 122
A …………………………. is used to capture some specific property of the  object.
A
Field
B
Object
C
Entity
D
Class
Question 123
Inter has disclosed its sillcin technology for high definition, large screen TVs. The new technology, code named Cayley is based on 
A
Liquid Crystal Display (LCD)
B
Least Chip Silicon (LCS)
C
Liquid Crystal on Silicon (LCOS)
D
Liquid Crystal Micro Display (LCMD)
Question 124
Stack is
A
Dynamic data structure
B
Constantly changing object
C
An ordered collection of items
D
All of the above
Question 125
The collection of communication line and routers form the—
A
Router
B
Bridge
C
Subnet
D
Packet
Question 126
Which of the following statement is not true ?
A
FIFO replacement policy suffer from the problem Belady’s Anomaly
B
FIFO is not the first choice of operating system designers for page replacement
C
FIFO is first choice of operating system designers for page replacement
D
The FIFO also replaces the resident page that has spent the longest time in memory
Question 127
The output of parsing is—
A
A representation of the syntactic structure of a statement in the from of parse tree
B
Group of tokens in the form of parse tree
C
Collection of identifiers and build a parse tree
D
None of these
Question 128
Project join normal from is also referred to as
A
Second Normal Form
B
Third Normal Form
C
Fourth Normal Form
D
Fifth Normal Form
Question 129
Which of the following is not an editor ?
A
Vi
B
Pico
C
Sed
D
Lint
Question 130
What is the data function in SQL ?
A
DATA
B
SYSTEM DATA
C
SYSDATA
D
None of these
Question 131
Consider an operation of addition. For two numbers, the operation will generate a sum. If the operands are strings, and the same operation would produce a third string by concatenation. This feature is called
A
Inheritance
B
Encapsulation
C
Polymorphism
D
Binding
Question 132
Which of the following is not a feature of a compiler ?
A
Scans the entire program first and then translates it into machine code
B
When all the syntax errors are removed execution takes place
C
Slow for debugging
D
Execution time is more
Question 133
Semaphores are used to solve—
A
Deadlock
B
Mutual exclusion
C
Inter-process communication
D
Messaging
Question 134
McCall proposed which of the following quality factors ?
A
Correctness, Reliability, Usability, Integrity, Efficiency
B
Maintainability, Flexibility, Testability,
C
Portability, Reusability, Interoperability
D
All of the above
Question 135
What is the first activity of the prototype model ?
A
Designing of a test model
B
Requirement gathering
C
Testing of model
D
None of these
Question 136
………………………… developed a set of software quality factors that ha been given the acronym FURPSFunctionality, Usability, Reliability, Performance and Supportability 
A
Hewlett—Packard
B
Rambaugh
C
Brooch
D
Jacobson
Question 137
Which of the following is a type of translator ?
A
Assembler
B
Compiler
C
Interpreter
D
All of these
Question 138
The relational model includes two general integrity rules. Integrity rule 1 is concerned with……………. And integrity rule 2 is concerned with……………..
A
Primary key, Foreign key
B
Composite key, Primary ke
C
Foreign key, Primary key
D
Transaction key, Foreign key
Question 139
When two numbers of n digits each are added and the sum occupies n  + 1 digits, the situation is called
A
Overflow
B
Underflow
C
Normal condition
D
None of these
Question 140
Oen can interface with operating system by means of
A
Operating system call in a program
B
Operating system commands
C
Operating system process
D
Both by operating system call and operating system commands
Question 141
Which of the following is a threat for electronic payment system ? 
A
Trojan horse
B
Computer virus
C
Computer worms
D
All of the above
Question 142
………………….  uses a standard called Distributed Queue Dual Bus (DQDB) or refer to as 802.6 (IEEE standard).
A
LAN
B
WAN
C
MAN
D
Internet
Question 143
A floating point number is said to be normalized if the most significant digit of the mantissa is
A
Zero
B
Non-zero
C
Negative
D
Positive
Question 144
Black Box testing sometimes called
A
Data flow testing
B
Loop testing
C
Behavioural testing
D
Graph based testing
Question 145
MAN refers to
A
Mega Area Network
B
Metropolitan Area Network
C
Mini Area Network
D
Medium Area Network
Question 146
Linear sequential model for software engineering is also known as
A
Prototype
B
RAD
C
Spiral
D
Waterfall
Question 147
The messages are formatted strings composed of
A
A receiver object
B
A message selector
C
A sequence of zero or more arguments
D
All of the above
Question 148
Through linked list one can implement
A
Stack
B
Queue
C
Graph
D
All of these
Question 149
Which of the following is not a context free grammar component ?
A
Terminal symbols
B
Non-terminal symbols
C
Production rule
D
List
Question 150
Which of the following operations cannot be perform on pointers in C ?
A
Addition of two pointers
B
Subtraction of a number from a pointer
C
Subtraction of one pointer from another
D
Addition of a number to a pointer
Question 151
Which of the following is not a type of SQL statement ?
A
Data Manipulation Language (DML)
B
Data Definition Language (DDL)
C
Data Control Language (DCL)
D
Data Standard Language (DSL)
Question 152
Banker’s Algorithm is used as—
A
Deadlock occurrence method
B
Deadlock avoidence method
C
Deadlock detection method
D
Deadlock recovery method
Question 153
The intersection of a context free language with a regular Language is a 
A
Context free language
B
Kleene star
C
Regular language
D
Reducing
Question 154
Which of the following protocol is related to message format in Electronic mail or e-mail ?
A
RFC 821
B
RFC 822
C
Both (A) and (B)
D
None of these
Question 155
Linked lists can be
A
Single
B
Double
C
Circular
D
All of these
Question 156
Once a sequence is created, it is documented in the
A
Database
B
Data table
C
Data dictionary
D
Data document
Question 157
E-Commerce refers to—
A
Electrical Commerce
B
Electronic Commerce
C
Evolutionary Commerce
D
Effective Commerce
Question 158
A relation scheme is said to be in……………… form if the values in the domain of each attribute of the relation are atomic.
A
Unnormalized
B
First Normal
C
Boyce Codd
D
Nome of these
Question 159
Which of the following is a type of fragmentation ?
A
Transparent
B
Non-transparent
C
Both (A) and (B)
D
None of these
Question 160
All the vertices of a walk except very first and very last vertex, is called
A
Internal vertices
B
External vertices
C
Intermediate vertices
D
Adjacent vertices
Question 161
The major drawback of B-tree is the difficulty of traversing the keys sequentially. The ……………………. tree retains the rapid random access property of the B-tree while  also allowing papid  sequential access.
A
AVL
B
B+
C
Binary
D
Height Balanced
Question 162
What will be the output of the following programs ?  main ( )                {                Static char a [ ] = “BOMBAY”;                 Char * b = “BOMBAY”;                 Printf (“\n%d %d”, sizeof (a), sizeof (b));                        }
A
a = 7, b = 7
B
a = 7, b = 2
C
a = 2, b = 7
D
a = 7, b = 0
Question 163
Choose the right sequence of SDLC (Software development life cycle) steps—
A
Design, Requirement Analysis, Coding, Testing
B
Requirement Analysis, Design, Coding, Testing
C
Requirement Analysis, Design, Testing, Coding
D
Requirement Analysis, Coding, Design, Testing
Question 164
With current technology, it is unwise to have satellites spaced much closer than 2 degrees in the 360 degree equatorial plane, to avoid interference. With a spacing of 2 degrees, there can only be…………………………… geosynchronous communication  satellites in the sky at once.
A
360
B
360* 2
C
360/2
D
2
Question 165
Software metrics domain can be divided into process, project and product metrics. Product metrics are……………….. to an individual are often combined to develop project metrics.
A
Private
B
Public
C
Both (A) and (B)
D
None of these
Question 166
Half adder is an example of
A
Combinational circuit
B
Sequential circuit
C
Asynchronous circuit
D
None of these
Question 167
C++ was developed by
A
Dennis Ritchie
B
Bjarne Stroustrup
C
Tannenbaum
D
Milan Melkovinec
Question 168
Mobile computers and Personal Digital Assistants (PDAs) are the examples of
A
Radio broadcasting
B
Wireless Network
C
Geosynchronous
D
LAN
Question 169
A network, spans a large geographical area, often a country or continent
A
LAN
B
WAN
C
MAN
D
None of these
Question 170
A simple protocol used for fetching e-mail from a remote mailbox is……………………… which is defined in RFC 1064 ?
A
Interactive Mail Access Protocol (IMAP)
B
Distributed Mail System Protocol (DMSP)
C
Post Ofice Protocol (POP3)
D
Pretty Good Protocol (PrGP)
Question 171
A strictly binary tree with n leaves always contains……………… nodes.
A
n * n
B
2n
C
2n – 1
D
n²− 1
Question 172
UNIX operating system is based on
A
Language structure
B
Kernel approach
C
Virtual machine
D
Time sharing
Question 173
Each object is said to be……………….. of its class.
A
Attribute
B
Instance
C
Classification
D
Operations
Question 174
The goal of study of data structure is to
A
Identify and develop useful mathematical entities and operations and to determine what classes of problems can be solved by using these entities
B
Determine representations for those abstract entities and to implement the abstract operations on these concrete representations
C
Both (A) and (B)
D
None of these
Question 175
Yacc is available as a command (utility) on the
A
MINIX
B
UNIX
C
DOS
D
None of these
Question 176
Which of the following is a step of software design model ?
A
Data design
B
Architecture design
C
Interface design
D
All of the above
Question 177
In context free grammar, terminal symbols refers to
A
Tokens
B
Keywords for a programming language
C
Productions rule
D
Start symbol
Question 178
A generalization of the Boyce Codd  Normal From to relation schemeswhich includes the multivalued dependencies is called
A
Second Normal Form
B
Third Normal Form
C
Fourth Normal Form
D
Fifth Normal Form
Question 179
A……………………. variable provides an alias for a previously defined variable.
A
Global
B
Local
C
Reference
D
Dynamic
Question 180
  Wasting of memory within a partition, due to a difference in size of a partition and of the object resident within it, is called
A
External fragmentation
B
Internal fragmentation
C
Compaction
D
Coalescing
Question 181
Implementation of an inverted list to maintain the record list for each value for a given attribute can be done by
A
Sequential file
B
Direct file
C
Indexed file
D
Indexed sequential
Question 182
PAN refers to
A
Peer Area Network
B
Personnel Area Network
C
Personal Area Network
D
Payment Application Network
Question 183
The list with no nodes on it is called
A
Empty list
B
Null list
C
Both (A) and (B)
D
None of these
Question 184
Which of the following is a functionally complete gate ?
A
AND
B
OR
C
NAND
D
NOT
Question 185
Which of the following is a way of Electronic Payment ?
A
Digital token
B
Credit card
C
Smart card
D
All of these
Question 186
Which of the following is a type of inheritance ?
A
Multiple
B
Multi level
C
Hierarchical
D
All of these
Question 187
Method of graph traversal—
A
Depth first search
B
Breadth first search
C
Both (A) and (B)
D
None of these
Question 188
Collection of interconnected networks sometimes called
A
Internet
B
Wireless network
C
Mobile network
D
None of these
Question 189
Which of the following method is used to simplify the Boolean function ?
A
Karnaugh Map Technique
B
Variable Entered Mapping (VEM) Technique
C
Quine-McCluskey Method
D
All of the above
Question 190
“It is a test model. It can serve as ‘the first system’. Users get a feel for the actual system”. ‘It refers to 
A
RAD Model
B
Incremental Model
C
Prototyping Model
D
Waterfall Mode
Question 191
Which of the following is not a type of assembler ?
A
One-Pass
B
Two-Pass
C
Three-Pass
D
Load and Go
Question 192
In Queues, the items deleted at one end is called
A
Rear
B
Front
C
Top
D
Base
Question 193
An overflow condition can be detected by observing the carry into the sign bit position and the carry out of the sign bit position. It these two carries are ………………………, an overflow condition is produced.
A
Equal
B
None equal
C
Negative
D
Positive
Question 194
Collection of fields is caled—
A
Information
B
Object
C
Record
D
Data type
Question 195
Which is a method of implementation of IDS (Intrusion Detection System) ?
A
Signature Identification
B
Recognition and Statistical Anomaly Detection
C
Both (A) and (B)
D
None of these
Question 196
A loading scheme in which loading and linking of external references are postponed until execution time 
A
Direct linking loader
B
Dynamic loading
C
Dynamic linking
D
Relocating loader
Question 197
Yacc source program has 3 parts. Which of the following are Yacc source program parts ? 
A
Terminal symbol, non-terminal symbol, production rule
B
Declaration, Translation rules, user routines
C
Declaration, Translation rules, C-Programs
D
None of these
Question 198
Which of the following layers is not in OSI Model ?
A
Physical layer
B
Internet layer
C
Network layer
D
Transport layer
Question 199
The process of creating instances from classes
A
Integrity
B
Instantiation
C
Inheritance
D
Generalization
Question 200
Once object oriented programming has been accomplished, unit testing is applied for each class. Class tests include
A
Fault-based testing
B
Random testing
C
Partition testing
D
All of the above
Question 201
Stack is sometimes called a
A
Push down list
B
Pushdown array
C
Pop down list
D
Pop up array
Question 202
In C++, setw is—
A
Initialization operator
B
Conditional operator
C
Memory allocation operator
D
Field width operator
Question 203
SQL * Plus ignores blank spaces before and after the—
A
Arithmetic operator
B
Relational operator
C
Logical operator
D
Binary operator
Question 204
The maintenance step in linear sequential mode comes after
A
Testing
B
Coding
C
Design
D
Analysis
Question 205
Which of the following is a type of inheritance ?
A
Multiple
B
Multi level
C
Hierarchical
D
All of these
Question 206
 A…………….. is an ordered collection of items from which items may be deleted at one end and into which items may be inserted at the other end.
A
Stack
B
Array
C
Queue
D
Graph
Question 207
C function returns………………… value by default.
A
Character
B
No
C
Integer
D
Float
Question 208
Recently which operating system launched its Hindi version ?
A
MINIX
B
LINUX
C
DOS
D
All of these
Question 209
Linkage Edittor is also called
A
Loader
B
Binder
C
Assembler
D
Macroprocessor
Question 210
Which of the following is a function of e-mail system ?
A
Composition
B
Transfer
C
Reporting
D
All of these
Question 211
Input of Lex is
A
Set of regular expression
B
Statement
C
Numeric data
D
ASCII code
Question 212
Encapsulation is also known as—
A
Information hiding
B
Data abstraction
C
Data about data
D
None of these
Question 213
Which of the following is an operating system call ?
A
CREATE
B
LINK
C
SYSTEM
D
All of these
Question 214
The linker produces a…………………. which contains the binary codes for all compound modules
A
Bit file
B
Object program
C
Load file
D
Link file
Question 215
An encoder has 2ᴺ input lines and…………………… output lines.
A
2
B
n
C
2 x n
D
n x n
Question 216
   Consider the following program segment :main ( )        int counter = 40;        for ( ; counter; )            counter………………..;       printf ( “ %d” , counter);What is the output ?
A
40
B
– 40
C
0
D
None of these
Question 217
Software reengineering encompasses a series of activities that include
A
Inventory analysis
B
Document restructuring
C
Reverse engineering
D
All of the above
Question 218
Which of the following statement is not true ?
A
Abstraction is the simplification mechanism used to hide superfluous details of a set of objects, it allows one to concentrate on the properties that are of interest to the application
B
Generalization is the abstracting process of viewing sets of objects as a single general class by concentrating on the general characteristics of the constituent sets while suppressing or ignoring their differences
C
Specialization is the abstracting process of introducing new characteristics to an existing class of objects to create one or more new classes of objects
D
Aggregation is the process of collecting the details of an objects
Question 219
The process of macro-expansion is completely segregated from the process of assembly program. The translator which performs macro-expansions is called
A
Macro Interpreter
B
Macro Pre-Processor
C
Macro Table
D
None of these
Question 220
A ……………………. In C language is also known as record.
A
Array
B
Structure
C
Pointer
D
Enum
Question 221
The compiled from of the definitions is known as
A
Data dictionary
B
Directory
C
System catalog
D
All of these
Question 222
Which of the following is not a C function ?
A
Printf
B
Fprintf
C
Sprint
D
Tprintf
Question 223
.………………………. modifies source code and/or data in an effort to make it amenable to future changes.
A
Reverse engineering
B
Software restructuring
C
Forward engineering
D
Software maintenance
Question 224
Which is not included in the UNIX file system ?
A
Bin
B
usr
C
dev
D
All of these
Question 225
If every record of a file contains pairs for  the seme set of attributes, the file is said to contain 
A
Identical file
B
Homogeneous records
C
Homogeneous file
D
None of these
Question 226
An normalized relation contains vaules
A
Atomic
B
Non-atomic
C
Classified
D
Non of these
Question 227
Which of the following is not a type of database ?
A
Hierarchical
B
Network
C
Relational
D
Transition
Question 228
Which of the following properties is/are true in context of of will formed formula (WFF) ? 
A
Each letter is a term
B
If x and y are terms, then x = y is a formula
C
If P is a formula, then 7P is a formula
D
All of the above
Question 229
An array can be passed in a functions in C language through
A
‘Call by value’ only
B
‘Call by reference’ only
C
Both ‘call by value’ and ‘call by reference’
D
None of these
Question 230
Which of the following is a statement of Assembly program ?
A
MACRO
B
SUBROUTINE
C
WHILE
D
FORMAT
Question 231
Which of the following feature does not belong to the frame relay ?
A
Connection Oriented
B
Normal Speed 1̇͘͘͘•5 Mbps.
C
Maximum payload is 1600
D
Multicasting
Question 232
Representation of two dimensional array in memory is
A
Row-major
B
Column-major
C
Both (A) and (B)
D
None of these
Question 233
The object design focuses on the—
A
Description of data structure
B
Algorithms
C
Messages
D
All of the above
Question 234
The …………………….. model remains operative until the software is retired.
A
Waterfall
B
Incremental
C
Spiral
D
None of these
Question 235
Which of the following is a major component of the telephone system ?
A
Local loop
B
Trunks
C
Switching office
D
All of these
Question 236
Which syntax is more accurate for creating SYNONYM ?
A
CREATE [ PUBLIC ] SYNONYM synonym for object
B
CREATE SYNONYM synonym for object from table name
C
CREATE [ PUBLIC ] SYNONYM synonym for column name
D
None of these
Question 237
In C++, by  default, the members of a class are
A
Public
B
Private
C
Both public and private
D
None of these
Question 238
If the called telephone is attached to another end office, a procedure is used that each end office has a number of outgoing lines to one or more nearby switching centres, called toll offices. These lines are called 
A
Loop
B
End office
C
Toll connecting trunks
D
Switching office
Question 239
Which layer is not present in TCP/IP Model ?
A
Internet layer
B
Application layer
C
Session layer
D
Transport layer
Question 240
Valid bit in each cache is associated with—
A
Each memory byte in cache
B
Each memory word in cache
C
One bit with the all memory words
D
None of the above
Question 241
Consider the following statement :                                  WHO ! SORT                   In above UNIX statement SORT is a—
A
Script
B
Filter
C
Process
D
Tool
Question 242
MS SUS is a quick and inexpensive way to ensure that your network is protected from ……………………. and hacks targeting your window installation.
A
Trojans
B
Worms
C
Both (A) and (B)
D
None of these
Question 243
Which of the following statement is not true regarding graph ?
A
A graph consists of a set of nodes and a set of arcs
B
A graph is a tree
C
A tree is a graph
D
Graphs can be directed
Question 244
Which of the following is different from the group ?
A
Private
B
Protected
C
Public
D
Friend
Question 245
A transition between two memory resident process in a multiprogramming system is called 
A
Process switch
B
Mode switch
C
Transition switch
D
None of these
Question 246
Consider a program written in high level language like C. Such a program may contain calls on certain input/output functions like printf (),  scanf (), etc., which are not written by the programmer himself. During  program execution, those standard functions must reside into the main memory. Furthermore, everytime an input/output function is called by a C language program, control should get transferred to the appropriate function. The process is known as 
A
Linking
B
) Loading
C
Relocation
D
None of these
Question 247
Number of arcs incident to a node is called its
A
Level
B
Predecessor
C
Degree
D
Successor
Question 248
A relation scheme is in ………………………. If it is in the 1 NF and if all non-prime attributes are fully functionally dependent on the relation key(s).
A
First Normal Form
B
Second Normal Form
C
Boyce Codd Normal Form
D
Fourth Normal Form
Question 249
Which of the following is a type of file organization ?
A
Serial
B
Direct
C
Index sequential
D
All of these
Question 250
…………..is a pointer to the current object. It passed implicitly to an overloaded operator ?
A
This
B
New
C
Scope
D
Private
Question 251
 ‘Person’ is
A
Object
B
Class
C
Attribute
D
Structure
Question 252
Which of the following is not used as a data structure ?
A
Array
B
Linked list
C
Graph
D
Directory
Question 253
Which of the following belongs to the logic families of integrated circuits ?
A
Transistor Transistor Logic (TTL)
B
Metal Oxide Semiconductor (MOS)
C
Complementary Metal Oxide Semiconductor (CMOS)
D
All of the above
Question 254
Which of the following is not a text editor ?
A
Vi
B
Note Pad
C
Edit Window in Dos
D
Word 97
Question 255
The first version of UNIX was written by
A
Dennis Ritchie
B
Andrew S.
C
Ken Thompson
D
None of these
Question 256
The spiral model originally proposed by
A
Winston Royce
B
Racoon
C
Boehm
D
Davis
Question 257
Which of the following is a style of internet working ?
A
Concatenated Virtual Circuit
B
Datagram Model
C
Both (A) and (B)
D
None of these
Question 258
Which of the following circuit type is based upon time or clock pulse ?
A
Combinational circuit
B
Sequential circuit
C
Full adder
D
None of these
Question 259
Each item in a linked list is called
A
Element
B
Information
C
Data
D
Node
Question 260
Which of the following identities belongs to DeMorgan’s theorems ?
A
x + x = 1
B
xy = yx
C
(xy)’ = x’ + y’
D
x. 0 = 0
Question 261
Which of the following is a feature of computer virus ?
A
Propagation
B
Triggering
C
Damage
D
All of these
Question 262
The objects are…………….. if all their attribute values are identical.
A
Identical
B
Distinct
C
Same
D
None
Question 263
There are occasion when it does not matter if the function produces 0 or 1 for a given minterm. Minterms that may produce either 0 or 1 for the function are said to be
A
Careless conditions
B
Don’t care condition
C
Minterm condition
D
Maxterm condition
Question 264
Which of the following feature is related to bottom up parsing ?
A
Shift
B
Reduce
C
Precedence relation
D
All of the above
Question 265
Which of the following is a task region of spiral model ?
A
Planning
B
Risk Analysis
C
Engineering
D
All of these
Question 266
Round Robin scheduling algorithm falls under the category of—
A
Preemptive scheduling
B
Non-preemptive scheduling
C
Sometime preemptive sometimes non-preemptive
D
None of these
Question 267
ATM is both a technology and a service. Sometimes the service is called—
A
Segmentation
B
Reassembly
C
Cell relay
D
Transmission convergence
Question 268
Yacc semantic is a sequence of
A
Tokens
B
Expression
C
C Statements
D
Rules
Question 269
Which of the following is an object-oriented programming (OOP) ?
A
Real time system
B
AI and expert system programming
C
Neural networks and parallel
D
All of the above
Question 270
HTTP refers to
A
Hyper Text Transmission Protocol
B
Hyper Text Transfer Protocol
C
Hyper Text Tie Protocol
D
None of these
Question 271
The values for an attribute or a column are drawn from a set of values known as a—
A
Tulles
B
Attributes
C
Domain
D
None of these
Question 272
Which of the following  operators can  be   overloaded  in C++ ?
A
Scope resolution operator
B
Size of operator
C
Conditional operator
D
Arithmetic operator
Question 273
A Second Normal Form does not permit………..  dependency between a non-prime attribute and the relation key.
A
Partial
B
Multi
C
Functional
D
Valued
Question 274
One can display all columns of data in table by following the SELECT keyword with 
A
+
B
*
C
D
?
Question 275
Which of the following is a browser to view a web page ?
A
Mosaic
B
Netscape
C
Internet Explorer
D
All of the above
Question 276
Parsing can be
A
Top-down
B
Bottom up
C
Both (A) and (B)
D
None of these
Question 277
A program that places programs into main memory and prepares them for execution
A
Linker
B
Assembler
C
Loader
D
Absolute entity
Question 278
Which of the following Network Security aspect ?
A
Patch management
B
Firewalls
C
Intrusion Detection System (IDS)
D
All of above
Question 279
Which of the following is not a measure of software quality ?
A
Correctness
B
Maintainability
C
Accessibility
D
Integrity
Question 280
 For a person to be………………….. means that he/she is notonly always connected, but is also connected through the best available device and access technology at all times.
A
Always Networked (AN)
B
Always Best Connected (ABC)
C
Always Mobile Connected (AMC)
D
Wireless Connection (WC)
Question 281
Which of the following software tool is a parser generator
A
Lex
B
Yacc
C
Both (A) and (B)
D
None of these
Question 282
TRUNCHATE statement in SQL is a—
A
DML statement
B
DDL statement
C
DCL statement
D
None of these
Question 283
A number  243  is represented as  F3 in a number system. Which number system is used to represent  243  as F3 ?
A
Binary
B
Gray code
C
Octal
D
Hexadecimal
Question 284
Kernel is
A
A part of operating system
B
An operating system
C
A hardware
D
A register
Question 285
The Metal Oxide Semiconductor (MOS) is a……………….transistor that depends on the flow of only one type of carrier, which may be electrons or holes ?
A
Unipolar
B
Bipolar
C
n-polar
D
None of these
Question 286
Which of the following is a type of system testing ?
A
Recovery testing
B
Security testing
C
Stress testing
D
All of the above
Question 287
Which of the following is not a valid date type in SQL ?
A
CHAR
B
FLOAT
C
CLOB
D
DATE
Question 288
A type of inheritance that permist a class to have more than one super class and to inherit features from all ancestors 
A
Inheritance
B
Multiple inheritance
C
Subclasses
D
Super classes
Question 289
The series of 60 from Nokia is based on
A
Symbian operating system
B
Windows
C
Linux
D
None of these
Question 290
“Sam participates in the meeting from the subway , using his PDA, which is connected to his corporate network over 3G and a conferencing tool.” What is the meaning of PDA ?
A
Personal Digital Area
B
Personal Digital Assistant
C
Personal Division Area
D
Personal Division Assistant
Question 291
The exponent part, in floating point number is represented by
A
Signed magnitude
B
Signed 2’ѕ complement or signed 1’ѕ complement
C
Biased exponent
D
All of the above
Question 292
Which of the following statement is true ?
A
Generalization tree is composed of object instances that are all part of a composite object
B
Generalization tree is composed of classes that describe an object
C
Both (A) and (B)
D
None of these
Question 293
Which of the following is not an evolutionary software process Model ?
A
Incremental Model
B
Spiral Model
C
Component Assemble Model
D
Prototyping Model
Question 294
A ……………………… is said to occur when two distinct key values are mapped to the same storage location.
A
Clashing
B
Collision
C
Chaining
D
Probing
Question 295
Which of the following is not a type of processing ?
A
Serial
B
Network
C
Batch
D
Multiprogramming
Question 296
Assembly language is a
A
Low Level Language
B
Middle Level Language
C
High Level Language
D
None of these
Question 297
In E-R diagrams, the term cardinality is a synonym for the term
 
A
Attribute
B
Degree
C
Entities
D
Cartesian
Question 298
In a Third Normal Form relation, every…………       attribute is non-transitively and fully dependent on the every candidate key.
A
Prime
B
Non-prime
C
Unique
D
None of these
Question 299
Fixed head disks usually have
A
a separate read/write head
B
a common read/write head
C
Sometimes separate, sometimes common read or write head
D
Nome of these
Question 300
 Lorenz and Kidd suggest some project metrics, which of the following belongs to that metrics ?
A
Number of scenario script
B
Number of key classes
C
Both (A) and (B)
D
None of these
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 300 questions to complete.
List
Return
Shaded items are complete.
12345
678910
1112131415
1617181920
2122232425
2627282930
3132333435
3637383940
4142434445
4647484950
5152535455
5657585960
6162636465
6667686970
7172737475
7677787980
8182838485
8687888990
9192939495
96979899100
101102103104105
106107108109110
111112113114115
116117118119120
121122123124125
126127128129130
131132133134135
136137138139140
141142143144145
146147148149150
151152153154155
156157158159160
161162163164165
166167168169170
171172173174175
176177178179180
181182183184185
186187188189190
191192193194195
196197198199200
201202203204205
206207208209210
211212213214215
216217218219220
221222223224225
226227228229230
231232233234235
236237238239240
241242243244245
246247248249250
251252253254255
256257258259260
261262263264265
266267268269270
271272273274275
276277278279280
281282283284285
286287288289290
291292293294295
296297298299300
End
Return