{"id":5166,"date":"2024-05-03T19:44:44","date_gmt":"2024-05-03T14:14:44","guid":{"rendered":"https:\/\/pravysoft.org\/eduserver\/?p=5166"},"modified":"2024-05-03T19:44:50","modified_gmt":"2024-05-03T14:14:50","slug":"hsst-computer-science-previous-year-solved-question-paper","status":"publish","type":"post","link":"https:\/\/pravysoft.org\/eduserver\/hsst-computer-science-previous-year-solved-question-paper\/","title":{"rendered":"HSST Computer Science Previous year solved question paper"},"content":{"rendered":"\n<p><strong>Question Paper Code: 98\/2011<br>Exam: HSST Computer Science<br>Category No: 111\/2010<br>Date of Test: 01-09-2011<br>Alpha code: B<\/strong><\/p>\n\n\n\n<p>1.Which of the following preposition is a tautology?<br>(A) p v q-&gt; p<br>(B) p-&gt;(q-&gt; p)<br>(C) p v (q-&gt; p)<br>(D) none of these<br>Answer: B<\/p>\n\n\n\n<p>2. p-&gt;q-&gt;r is equivalent to:<br>(A) p-&gt;q-&gt;r<br>(B) p-&gt;(q-&gt;r)<br>(C) p v (q-&gt;r)<br>(D) none of these<br>Answer: A<\/p>\n\n\n\n<p>3. Why do we go for Normalization of Data Bases?<br>(A) To avoid the repetitions (B) To prevent fragmentation<br>(C) Avoid redundancy<br>(D) To prevent replication<br>Answer: C<\/p>\n\n\n\n<p>4. Name the component carrying the ALU and Control Unit in Digital Computer:<br>(A) Microprocessors<br>(B) Nano chips<br>(C) MEMS<br>(D) Hybrid Computer<br>Answer: A<\/p>\n\n\n\n<p>Give the name of the Linear list in which elements can be added at ends but not in the middle:<br>(A) Array<br>(B) Queue<br>(C) Tree<br>(D) Circular Queue<br>Answer: X<br>Explanation:<br>Circular queue is a linear data structure. In circular queue the last node is connected back to the first node to make a circle. Circular<br>linked list follow the First In First Out principle. Elements are added at the rear end and the elements are deleted at front end of the<br>queue.<br>Queue is an abstract data structure. Queue is opened at both ends. One end is always used to insert data and the other is used to<br>remove data. Queue follows First-In-First-Out methodology, i.e., the data item stored first will be accessed first.<br>A double-ended queue is an abstract data type similar to a simple queue, it allows you to insert and delete from both sides.<\/p>\n\n\n\n<p>5, The switching devices used in First Generation computer\u2019s were:<br>(A) Transistors<br>(B) SSI chips<br>(C) VLSI chips<br>(D) Vacuum Tubes<br>Answer: D<\/p>\n\n\n\n<p>6. The Automation accepting the regular expression of any number of a\u2019s is:<br>(A) a*<br>(B) ab*<br>(C) (a\/b)*<br>(D) a*b*c<br>Answer: A<br>7. Flip-flop is the basic structure of the device:<br>(A) Hard disk (B) Memory<br>(C) Cells<br>(D) Speakers<br>Answer: B<\/p>\n\n\n\n<p>8. In C language data type of \u201c3\u201d is:<br>(A) an integer<br>(B) a word<br>(C) a character<br>(D) a digit<br>Answer: String<\/p>\n\n\n\n<p>9. If every node \u201ca\u201d in a graph G is adjacent to every node \u201cb\u201d in G, then the graph is:<br>(A) Isolated graph<br>(B) Connected graph<br>(C) Eulerian graph<br>(D) Complete graph<br>Answer: D<\/p>\n\n\n\n<p>1O.In C language an user defined header is identified by the inclusion:<br>(A) #include &#8220;test.h&#8221;<br>(B) #include<br>(C) include &#8220;test.h&#8221;<br>(D) none of these<br>Answer: A<\/p>\n\n\n\n<p>11.Number of locations that could be addressed by a microprocessor with 12 address lines is:<br>(A) 1024<br>(B) 64K<br>(C) 4096<br>(D) 2048<br>Answer: C<\/p>\n\n\n\n<p>12.Number of bit width of any memory chip is:<br>(A) 16<br>(B) 64<br>(C) 32<br>(D) 8<br>Answer: D<\/p>\n\n\n\n<p>13.The command that lists the last few lines from a file named \u201cfile\u201d:<br>(A) tail file<br>(B) end file<br>(C) grep file<br>(D) cat file -last25<br>Answer: A<\/p>\n\n\n\n<p>14.The percentage of time that a computer system is not available for use is:<br>(A) down time<br>(B) seek time<br>(C) delay time<br>(D) access time<br>Answer: A<\/p>\n\n\n\n<p>15.By the thread of the same process, sharing is not allowed in:<br>(A) queue<br>(B) message<br>(C) stack<br>(D) address space<br>Answer: C<\/p>\n\n\n\n<p>How to declare an interface class in C++?<br>(A) by declare all methods pure virtual in a class<br>(B) make all methods abstract in a class<br>(C) declare the class as interface<br>(D) none of the above three<br>Answer: D<\/p>\n\n\n\n<p>Which device translates between data formats?<br>(A) Hub<br>(B) Switch<br>(C) Bridge<br>(D) Gateways<br>Answer: D<\/p>\n\n\n\n<p>if a relation is in BCNF then it is in:<br>(A) 2 NF<br>(B) 3 NF<br>(C) 1 NF<br>(D) 1 NF and 2 NF<br>Answer: B<br>Minimum Hamming distance method is used for correction of:<br>(A) syntactic errors<br>(B) semantic errors<br>(C) algorithmic errors<br>(D) programming errors<br>Answer: A<\/p>\n\n\n\n<p>Full Binary tree with n leaves contain:<br>(A) n nodes<br>(B) 2n-1 nodes<br>(C) n-1 nodes<br>(D) log n nodes<br>Answer: B<\/p>\n\n\n\n<p>Which is not possible in a thread?<br>(A) Ready<br>(B) Wait<br>(C) Suspended<br>(D) Running<br>Answer: B<\/p>\n\n\n\n<p>Explanation:<br>Thread exists in several states. A thread can be running .It can be ready to run as soon as it gets CPU time. A running state can<br>be suspended.<br>The margin of a word document can be displayed on the horizontal or vertical ruler with the mouse and the:<br>(A) FONT SIZE Button<br>(B) ALT key<br>(C) DELETE key<br>(D) CTRL key<br>Answer: B<\/p>\n\n\n\n<p>The 2\u2019s complement of the binary value 10 is:<br>(A) 10<br>(B) 11<br>(C) 01<br>(D) 110<br>Answer: A<\/p>\n\n\n\n<p>The property that the OOPs will permit the same operation to be carried out differently, based on the object is:<br>(A) inheritance<br>(B) polymorphism<br>(C) function overloading<br>(D) data abstraction<br>Answer: B<\/p>\n\n\n\n<p>The IP address 127.0.0.1 is named as:<br>(A) Loop back address<br>(B) IP address in a standard network<br>(C) LAN server address<br>(D) Default router address<br>Answer: A<\/p>\n\n\n\n<p>The Virtual Memory is located logically:<br>(A) in the CPU<br>(B) in main memory<br>(C) in between CPU and primary memory<br>(D) in the Hard disk<br>Answer: D<br>The Banker\u2019s algorithm in resource allocation deals with:<br>(A) Dead lock prevention<br>(B) Dead lock recovery<br>(C) Deadlock avoidance<br>(D) Mutual exclusion<br>Answer: C<\/p>\n\n\n\n<p>Thrashing occurs in:<br>(A) large computers<br>(B) a natural consequence of the virtual memory system<br>(C) can always be avoided by swapping<br>(D) poor paging algorithm<br>Answer: D<br>Explanation:<br>A process that is spending more time paging than executing is said to be thrashing. (i.e., page fault occurs frequently). In other<br>words, that the process doesn&#8217;t have enough frames to hold all the pages for its execution, so it is swapping pages in and ou t very<br>frequently to keep executing. As poor paging algorithm is used page fault occurs frequently. So, poor paging algorithms can quickly<br>lead to thrashing.<br>Compilers can identify:<br>(A) syntax errors<br>(B) semantic errors<br>(C) logical errors<br>(D) mathematical errors<br>Answer: A<\/p>\n\n\n\n<p>What was the first Scientific Computer Programming Language?<br>(A) COBOL<br>(B) LISP<br>(C) ADA<br>(D) FORTRAN<br>Answer: D<\/p>\n\n\n\n<p>Which is the first Object Oriented Language?<br>(A) ADA<br>(B) COBOL<br>(C) LISP<br>(D) FORTRAN<br>Answer: A<\/p>\n\n\n\n<p>Producer consumer problem is example for application of:<br>(A) Monitors<br>(B) For Monitors, Semaphores and Event counters<br>(C) Semaphores<br>(D) Event counters<br>Answer: B<\/p>\n\n\n\n<p>What was the data transmission method in which bi-directional data flow is allowed?<br>(A) Simplex<br>(B) Duplex<br>(C) Analog<br>(D) Single side mode<br>Answer: B<\/p>\n\n\n\n<p>Yahoo was developed by:<br>(A) Dennis Ritchie and Ken Thompson<br>(B) Vint Cerf and Robert Kahn<br>(C) David Filo and Jerry Yang<br>(D) Steve Case and Jeff Bezos<br>Answer: C<\/p>\n\n\n\n<p>Resolution of Video display unit does not depend on:<br>(A) Raster scan rate<br>(B) Band width<br>(C) Vertical and Horizontal scans (D) Screen size<br>Answer: D<\/p>\n\n\n\n<p>Resolution of Video display unit does not depend on:<br>(A) Raster scan rate<br>(B) Band width<br>(C) Vertical and Horizontal scans (D) Screen size<br>Answer: D<\/p>\n\n\n\n<p>The true statement for parallel transmission is:<br>(A) simultaneous transmission of all bits<br>(B) speed is specified in bps<br>(C) slower than serial<br>(D) micro computers use this<br>Answer: A<\/p>\n\n\n\n<p>Gray code for the decimal number 7 is:<br>(A) 0111<br>(B) 0100<br>(C) 0101<br>(D) 1011<br>Answer: B<\/p>\n\n\n\n<p>Evaluate the pre-fix expression -*63-41 will result in:<br>(A) 25<br>(B) 23<br>(C) 15<br>(D) 12<br>Answer: C<\/p>\n\n\n\n<p>Error correction in the data link layer is achieved by:<br>(A) Equalization<br>(B) Cyclic redundancy codes<br>(C) Hamming codes (D) Bit stuffing<br>Answer: C<br>Explanation:<br>Cyclic Redundancy Code is an error detection code only. Hamming Code is an error correcting code used in Data link layer.<br>The system program that set up executable program in RAM, ready for execution is:<br>(A) Loader<br>(B) Linker<br>(C) Linkage Editor<br>(D) Compiler<br>Answer: A<\/p>\n\n\n\n<p>File transfer protocol that uses UDP is:<br>(A) FTP<br>(B) TFTP<br>(C) TELNET<br>(D) NFS<br>Answer: B<\/p>\n\n\n\n<p>To check the presence of a computer in the network, use the command:<br>(A) ping<br>(B) cmd<br>(C) check<br>(D) ipconfig<br>Answer: A<\/p>\n\n\n\n<p>In cryptology the code STUDYING is written as RUTEXJMH, then the code for OTHER is:<br>(A) TOHRE<br>(B) ROHTE<br>(C) NUGFQ<br>(D) MOTHR<br>Answer: C<br>The Number of equivalent relations of the set {1,2,3,4} is:<br>(A) 4<br>(B) 15<br>(C) 16<br>(D) 24<br>Answer: B<br>Which of the sets are empty?<br>(A) {x:x=\/x}<br>(B) {x:x=x}<br>(C) {x:x=\/x2}<br>(D) {x:x=\/xx}<br>Answer: A<br>In any undirected graph, the sum of the degrees of all nodes is:<br>(A) must be even<br>(B) is always ODD<br>(C) need not be even<br>(D) is twice number of edges<br>Answer: A &amp; D<br>Explanation:<br>Option D is true. But it also implies that option A is true. Because twice of any number must be even.<br>An undirected graph is Eulerian if and only if all vertices of G are of the sum of the degrees of all nodes is:<br>(A) Same degree<br>(B) ODD degree<br>(C) Need not be ODD<br>(D) is twice number of edges<br>Answer: B<br>An undirected graph G has n vertices and n-1 edges then G is:<br>(A) Cyclic<br>(B) Addition of edge will make it cyclic<br>(C) Eulerian<br>(D) Is a Tree<br>Answer: D<\/p>\n\n\n\n<p>Graph having every pair of vertices connected is called:<br>(A) Cycle graph<br>(B) Complete graph<br>(C) Peterson graph (D) Is a Tree<br>Answer: B<\/p>\n\n\n\n<p>The Eigen vectors of a real symmetric matrix corresponding to different Eigen values are:<br>(A) Orthogonal matrix<br>(B) Singular matrix<br>(C) Non-singular matrix<br>(D) Inverse matrix<br>Answer: A<\/p>\n\n\n\n<p>The system of equations 4x+6y=8, 3x+2y=1, 7x+8y=9 has:<br>(A) only one solution<br>(B) infinite solutions<br>(C) two solutions<br>(D) none of these<br>Answer: C<\/p>\n\n\n\n<p>The Eigen values of the square matrix are:<br>(A) positive<br>(B) imaginary<br>(C) real<br>(D) negative<br>Answer: C<\/p>\n\n\n\n<p>The Equations will have:<br>(A) no unique solution<br>(B) only one solution<br>(C) has only two solutions (D) has infinite<br>Answer: Question not complete.<br>Which is fastest?<br>(A) DTL<br>(B) TTL<br>(C) ECL<br>(D) CMOS<br>Answer: C<br>Which is commutative but not associative?<br>(A) NOT<br>(B) NOR<br>(C) XOR<br>(D) NAND<br>Answer: B, D<\/p>\n\n\n\n<p>Explanation:<br>NAND and NOR operations are commutative, but not associative.<br>(x\u2193y)\u2193z \u2260 x\u2193(y\u2193z)<br>(\u2193 = NOR operation)<br>(x\u2191y)\u2191z \u2260 x\u2191(y\u2191z)<br>(\u2191 = NAND operation)<br>Which is Universal gate?<br>(A) AND<br>(B) NOR<br>(C) XOR<br>(D) NOT<br>Answer: B<br>Explanation:<br>A universal gate is one from which all other basic gates can be formed. NAND and NOR are Universal gates.<\/p>\n\n\n\n<p>How many NAND gates are needed to perform X.Y?<br>(A) 3<br>(B) 4<br>(C) 2<br>(D) 1<br>Answer: B<br>Which is non-volatile?<br>(A) RAM<br>(B) PROM<br>(C) EPROM<br>(D) ROM<br>Answer: D61.<\/p>\n\n\n\n<p>&nbsp;Which is the access method to take data from tape memory?<br>(A) Direct<br>(B) Sequential<br>(C) Parallel<br>(D) Serial<br>Answer: B<\/p>\n\n\n\n<p>The cycle time for a memory system is:<br>(A) access time<br>(B) longer than access time<br>(C) less than access time<br>(D) sub multiple of access time<br>Answer: B<\/p>\n\n\n\n<p>How many RAM chips are needed to generate the (256K X 1 bit)?<br>(A) 8<br>(B) 12<br>(C) 32<br>(D) 64<br>Answer: C<\/p>\n\n\n\n<p>T flip-flops are generally used for:<br>(A) counter<br>(B) delay switch<br>(C) counter and frequency divider (D) decoder<br>Answer: C<\/p>\n\n\n\n<p>Register used as working area in CPU is:<br>(A) Program counter<br>(B) Stack<br>(C) Instruction register<br>(D) Accumulator<br>Answer: D<\/p>\n\n\n\n<p>A microprocessor can be:<br>(A) Programmable<br>(B) Non Programmable<br>(C) Micro programmable<br>(D) All of the above<br>Answer: D<\/p>\n\n\n\n<p>Which is 16 bit microprocessor?<br>(A) Z 80<br>(B) Motorola 6800<br>(C) Intel 8086<br>(D) Intel 80486<br>Answer: C<\/p>\n\n\n\n<p>\u201cn\u201d flip-flops will divide the frequency into a factor of:<br>(A) n<br>(B) 1\/n<br>(C) 2 to the power of &#8216;n&#8217;<br>(D) log(n)<br>Answer: C<\/p>\n\n\n\n<p>8 2 4 1 is the:<br>(A) BCD code<br>(B) Gray code<br>(C) Excess -3 code<br>(D) ASCII code<br>Answer: 8421 is BCD code.<br>Explanation:<br>BCD Code is 8421 (not 8241). Excess-3 and gray code are non-weighted codes.<br>(1001000010011001) base 2; equivalent in base 16 is:<br>(A) 9899<br>(B) 9989<br>(C) 8999<br>(D) 9999<br>Answer: Correct answer is 9099<\/p>\n\n\n\n<p>Explanation:<br>An easy way to convert from binary to hexadecimal is to group binary digits into sets of four, starting with the least significant<br>(rightmost) digits. Pad the most significant digits with zeros if necessary to complete a group of four. Here 1001000010011001 is<br>grouped as 1001, 0000, 1001, 1001. Decimal equivalent of each group is 9 0 9 9. Hence 9099 base 16 is the answer.<br>Which is a programmable interval timer?<br>(A) 8253<br>(B) NE 555<br>(C) 8275<br>(D) 8251<br>Answer: A<\/p>\n\n\n\n<p>Negative number cannot be represented in:<br>(A) Signed magnitude form (B) 1&#8217;s complement form<br>(C) 2&#8217;s complement form<br>(D) None of the above forms<br>Answer: D<\/p>\n\n\n\n<p>Which of the following interrupt is both level and edge sensitive?<br>(A) RST 5.5<br>(B) INTER<br>(C) TRAP<br>(D) RST 7.5<br>Answer: C<\/p>\n\n\n\n<p>What is a BUFFER?<br>(A) Convert input data to output<br>(B) CPU stores program counter<br>(C) An Interphase between CPU and peripheral<br>(D) Convert program to EXE form<br>Answer: C<\/p>\n\n\n\n<p>By default any real number in C is represented as:<br>(A) a float<br>(B) a double<br>(C) a long double<br>(D) long float<br>Answer: B<\/p>\n\n\n\n<p>Integer division in \u201cC\u201d program results in:<br>(A) Truncation<br>(B) Rounding (C) Overflow<br>(D) None of the above<br>Answer: A<\/p>\n\n\n\n<p>The function sprintf() works like printf(), but operates on:<br>(A) data in a file<br>(B) stderr<br>(C) stdin<br>(D) string<br>Answer: D<\/p>\n\n\n\n<p>The function exit() causes an exit from:<br>(A) from loop<br>(B) from the block<br>(C) from the function (D) from program<br>Answer: D<\/p>\n\n\n\n<p>The complexity of linear search algorithm of an array of n elements is:<br>(A) O log(n)<br>(B) O (n)<br>(C) O nlog(n)<br>(D) O(nXn)<br>Answer: B<\/p>\n\n\n\n<p>How many elements can array A(-1&#8230;m, 1&#8230;m) have?<br>(A) mXm<br>(B) (m+1)(m+1)<br>(C) mX(m-1)<br>(D) (m-n)Xn<br>Answer: A<\/p>\n\n\n\n<p>Which is useful to implement quick sort?<br>(A) List<br>(B) Set<br>(C) Stack<br>(D) Queue<br>Answer: C<\/p>\n\n\n\n<p>Recursively enumerable languages are closed under:<br>(A) Union<br>(B) Intersection<br>(C) Complementation<br>(D) Concatenation<br>Answer: A, B &amp; D<\/p>\n\n\n\n<p>Explanation:<br>Recursively enumerable languages are closed under union, intersection, concatenation and Kleene star operations.<br>The Grammar that produce more than one Parse tree for same sentence is:<br>(A) Ambiguous<br>(B) Unambiguous<br>(C) Complementation<br>(D) Concatenation Intersection<br>Answer: A<\/p>\n\n\n\n<p>The number of the external states of a Turing Machine should be at least:<br>(A) 1<br>(B) 2<br>(C) 3<br>(D) 4<br>Answer: B<\/p>\n\n\n\n<p>Give name of the database in the general model of a compiler:<br>(A) Literal table<br>(B) Terminal table<br>(C) SYMTAB<br>(D) Productions<br>Answer: B<\/p>\n\n\n\n<p>A file is:<br>(A) an abstract data type<br>(B) logical storage unit<br>(C) usually non volatile<br>(D) volatile<br>Answer: A, B, C<\/p>\n\n\n\n<p>What property of the files prevents sharing of files and directories?<br>(A) Tree structure<br>(B) One level structure<br>(C) Two level structure<br>(D) Length<br>Answer: A<\/p>\n\n\n\n<p>E-R modeling technique is:<br>(A) Tree structure<br>(B) Top-down method<br>(C) Bottom-up method<br>(D) Right-left approach<br>Answer: B<\/p>\n\n\n\n<p>Data items stored as grouped items is:<br>(A) Record<br>(B) List<br>(C) Strings<br>(D) Title list<br>Answer: A<\/p>\n\n\n\n<p>Data items are fragmented, replicated and propagated in:<br>(A) DBMS<br>(B) RDBMS<br>(C) DDBMS<br>(D) DML<br>Answer: C<\/p>\n\n\n\n<p>In data manipulation the first element of T[5] is:<br>(A) T[1]<br>(B) T[0]<br>(C) T[5]<br>(D) T[3]<br>Answer: B<\/p>\n\n\n\n<p>Processed data is called:<br>(A) Data base<br>(B) File<br>(C) Information<br>(D) Sample<br>Answer: C<\/p>\n\n\n\n<p>93.Which factor of coding is most important?<br>(A) Productivity<br>(B) Cost<br>(C) Readability<br>(D) Less memory usage<br>Answer: C<\/p>\n\n\n\n<p>94. Main container for &lt;TR&gt; &lt;TD&gt; and &lt;TH&gt; is:<br>(A) &lt;TABLE&gt;<br>(B) &lt;GROUP&gt;<br>(C) &lt;DATA&gt;<br>(D) &lt;CAPTION&gt;<br>Answer: A<\/p>\n\n\n\n<p>95. Which of the following is the non-polling system?<br>(A) Stop and wait<br>(B) Daisy chain<br>(C) DMA<br>(D) TDMA<br>Answer: D<\/p>\n\n\n\n<p>96. What is the working principle of a Digital Computer?<br>(A) De Morgan&#8217;s Principle<br>(B) Len&#8217;s Principle<br>(C) Von Neumann&#8217;s Principle<br>(D) Euler&#8217;s Principle<br>Answer: C<\/p>\n\n\n\n<p>97. Give the unique name of the combination of Analog and Digital computer?<br>(A) Cray XMP 120 Computer<br>(B) Param 2000 Computer<br>(C) IBM 320 Computer<br>(D) Hybrid Computer<br>Answer: D<\/p>\n\n\n\n<p>98. Why RAM is kept near to the Processor in a Digital Computer?<br>(A) Reduce the cost<br>(B) Get maximum speed<br>(C) To minimize the memory access time<br>(D) Increase frequency<br>Answer: C<\/p>\n\n\n\n<p>99. Who designed the First Digital Computer using the Binary system?<br>(A) Blaise Pascal<br>(B) Agutha Ada<br>(C) Isaac Newton<br>(D) Dr. Dakunthala Devi<br>Answer: John Vincent Atanasoff<\/p>\n\n\n\n<p>100. Give the name of the first operating system for Personal Computers:<br>(A) Linux<br>(B) Windows 3.2<br>(C) CP\/M<br>(D) Disk operating system<br>Answer: C<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-pink-color\">For study materials, Please visit <\/mark><\/strong><a href=\"https:\/\/pravysoft.org\/eduserver\/course-category\/hsst-cs-kerala-psc\/\">https:\/\/pravysoft.org\/eduserver\/course-category\/hsst-cs-kerala-psc\/<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"726\" data-id=\"5077\" src=\"https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2023\/12\/hsst4-1024x726.png\" alt=\"hsst computer kerala psc\" class=\"wp-image-5077\" srcset=\"https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2023\/12\/hsst4-1024x726.png 1024w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2023\/12\/hsst4-300x213.png 300w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2023\/12\/hsst4-768x545.png 768w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2023\/12\/hsst4-1536x1090.png 1536w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2023\/12\/hsst4-600x426.png 600w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2023\/12\/hsst4-70x50.png 70w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2023\/12\/hsst4.png 1748w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"726\" data-id=\"3755\" src=\"https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-1024x726.webp\" alt=\"\" class=\"wp-image-3755\" srcset=\"https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-1024x726.webp 1024w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-300x213.webp 300w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-768x545.webp 768w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-1536x1090.webp 1536w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-600x426.webp 600w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2.webp 1748w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"726\" data-id=\"3753\" src=\"https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-1024x726.png\" alt=\"hsst computer science good study\" class=\"wp-image-3753\" srcset=\"https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-1024x726.png 1024w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-300x213.png 300w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-768x545.png 768w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-1536x1090.png 1536w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-600x426.png 600w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2-70x50.png 70w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/10\/hsst-book-part2.png 1748w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"825\" height=\"585\" data-id=\"3580\" src=\"https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/08\/hsst-cs-cover-m1-1.webp\" alt=\"\" class=\"wp-image-3580\" srcset=\"https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/08\/hsst-cs-cover-m1-1.webp 825w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/08\/hsst-cs-cover-m1-1-300x213.webp 300w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/08\/hsst-cs-cover-m1-1-768x545.webp 768w, https:\/\/pravysoft.org\/eduserver\/wp-content\/uploads\/2022\/08\/hsst-cs-cover-m1-1-600x425.webp 600w\" sizes=\"(max-width: 825px) 100vw, 825px\" \/><\/figure>\n<\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Question Paper Code: 98\/2011Exam: HSST Computer ScienceCategory No: 111\/2010Date of Test: 01-09-2011Alpha&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[578,337,423,317,340],"class_list":["post-5166","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-free-download","tag-hsst","tag-hsst-computer-science","tag-previous-year-question-paper","tag-study-materials"],"_links":{"self":[{"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/posts\/5166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/comments?post=5166"}],"version-history":[{"count":1,"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/posts\/5166\/revisions"}],"predecessor-version":[{"id":5167,"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/posts\/5166\/revisions\/5167"}],"wp:attachment":[{"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/media?parent=5166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/categories?post=5166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pravysoft.org\/eduserver\/wp-json\/wp\/v2\/tags?post=5166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}