Thursday, 24 January 2019

Previous year paper CS(computer science) solved : Analyst cum programmer RPSC



Section 1

Question 1.
Series-1000,200,40,____

1. 20
2. 15

3. 8
4. 80
Question id : 2.
664, 332, 340, 170, ____, 89

1. 85

2. 178
3. 170
4. 166
Question id : 3    
Fact 1: All dogs like to run, Fact 2: Some dogs like to swim, Fact 3: Some dogs look like their owners. In the first three statements are facts, which of the following statements must also be a fact: A. All dogs who like to swim look like their owners, B. Dogs who like to swim also like to run, C. Dogs who like to run do not look like their owners.

1. Only A

2. Only B
3. B and C
4. A and C
Question id : 4    
Series - 11, 12, 16, 25, 41, 66, ____

1. 87
2. 100
3. 108

4. 102
Question id : 5     



1. 14
2. 13
3. 15
4. 16
Question id : 8
Four friends of Tenth grade were sharing a pizza. They decided that the oldest among them would get  the extra piece. Suresh is two months older than Gagan, who is three months younger than Nand Kumar. Kishore is one month older than Gagan. Who should get the extra piece of pizza?

1. Suresh
2. Nand Kumar
3. Gagan
4. Kishor
Question id : 9     
Shrikant is shorter than Nilima. Pratima is tallen than Shrikant. Subhash is taller then Nilima but shorter than Meera. Nilima is tallen than Pratima. Who will be in the middle if they stand in a row according to height?

1. Shrikant

2. Nilima
3. Subhash
4. Meera
Question id : 10     



1. A
2. B
3. C

4. D
Question id : 11     



1. 0.81
2. 0.405

3. 0.225
4. 0.25
Question id :12     
Car : Garage :: Aero plane : ?????

1. Port

2. Hanger
3. Depot
4. Harbor
Question id : 13     
Vishwanath Anand won the world chess title for how many times

1. 4
2. 3

3. 5
4. 2
Question id : 14     
Who was captain of IPL winner team 2012

1. Virat Kohli

2. Gautam Gambhir
3. M.S. Dhoni
4. Harbhajan Singh
Question id : 15     
Who won Santosh Trophy Football in 2012

1. Goa
2. Services
3. West Bengal
4. Tamil Nadu
Question id : 16     
The idea of India' is written by

1. Dilip D'Souza
2. Ram Chandra Guha

3. Sunil Khilnani
4. Santosh Desai
Question id : 17     
India's Foreign Secretary presently is

1. Veena Sikri
2. Huder Ali
3. Ranjan Mathai
4. S.K. Sharma
Question id : 18     
Chief Election Commissioner of India

1. V.S. Sampath
2. S.Y. Qureshi
3. B.K. Jutshi
4. Sudhir Verma
Question id : 19     
The Governor of Uttarakhand is

1. Ram Naresh Yadav
2. V. Manchoo
3. B.L. Joshi
4. Aziz Qureshi
Question id : 20     
IMF present Chief is

1. Christina Lagrade
2. Camilla Gutt
3. Ivar Rooth
4. Rodrigo Rato
Question id : 21     
In May 2011, India and Russia conducted a joint armed exercise, in which more than 15,000 armedmen participated. The name of the joint exercise was

1. Shakti Sambandh
2. Jai Ho
3. Vijay exercise
4. Vijayi Bhav
Question id : 22     
India's Cabinet Secretary is

1. Ajit Seth
2. Surendra Singh
3. Prabhat Kumar
4. B.K. Chaturvedi
Question id : 23     
What is big size of IPv6 addresses?

1. 16 bits
2. 32 bits
3. 64 bits
4. 128 bits
Question id : 24     
Which protocol does DHCP uses at the Transport Layer

1. UDP
2. IP
3. TCP
4. TRP
Question id : 25     
In a Network with 10 switches, how many root bridge(s) would be there?

1. One
2. Three
3. Five
4. Ten

(You should have only one root bridge per network )
Question id : 26     
CSMA/CD is a set of rules determining -

1. How two network devices are performing
2. How two network devices communicates with each other in a wireless network

3. How network devices respond when two devices attempt to use a data channel simultaneously
4. How network devices respond when two devices attempt to use a data channel separately
Question id : 27     
The dialogue control and token management are responsiblity of, in OSI network architecture -

1. Network layer
2. Physical layer

3. Session layer
4. Data-link layer
Question id : 28     
What is (are) an advantage(s) of using Fibre optics data transmission?

1. Fast data transmission
2. Resistance to data theft
3. Low noise level

4. All the above
Question id : 29     
Which mode is operating when communication circuits allow transmit data in both directions but not at the same time?

1. A Half-Duplex Mode
2. A Simplex Mode
3. A Full-Duplex Mode
4. An Asynchronous Mode
Question id : 30     
Full form of MAC Address?
1. Machine Access Coding Address
2. Mode Access Control Address
3. Master Access Code Address
4. Media Access Control Address
Question id : 31     
How many layers does OSI network architecture has?

1. Five
2. Eight

3. Seven
4. Six
Question id : 32     
Class of IP address which provides a maximum of only 254 unique host addresses per network ID?

1. Class D
2. Class C

3. Class A
4. Class B
Question id : 33     
DNS is the abbreviation of -

1. Dynamic Name System
2. Domain Network Service

3. Domain Name System
4. Dynamic Network Service
Question id : 34     
Primary function of the network layer is?

1. Error detection

2. Routing
3. Setup a session
4. Encryption
Question id : 35     
The loss in signal power as light travels down the fibre is called?

1. Prorogation

2. Attenuation
3. Scattering
4. Interruption
Question id : 36     
Which of the following communications lines is best suited to interactive processing applications?

1. Narrow Band Lines
2. Simplex Lines

3. Full Duplex Lines
4. Mixed Band Lines
Question id : 37     
Layer-1 of the OSI model is?

1. Link Layer

2. Physical Layer
3. Presentation Layer
4. Session Layer
Question id : 38     
What is a Firewall in the Computer Network?

1. The Operating System of Computer Network
2. The Physical boundary of the Network

3. A system designed to prevent unauthorised access
4. A web browsing Software
Question id : 39     
IPv4 address is?

1. 8 bits
2. 16 bits

3. 32 bits
4. 64 bits
Question id : 40     
DHCP is the abbreviation of -

1. Dynamic Host Control Protocol

2. Dynamic Hyper Configuration Protocol
3. Dynamic Hyper Control Protocol
4. Dynamic Host Configuration Protocol
Question id : 41     
TCP / IP is?

1. One Protocol

2. Suite of Protocols
3. Application Package
4. Communication medium
Question id : 42     
For every IP address, Subnet Mask is?

1. Always required
2. Sometimes required
3. Not required
4. None of the above
Question id : 43     
With the class-A address of 10.0.0.0 and a subnet mask of 255.255.224.0, how many subnets can be created?

1. 2048
2. 2046
3. 4096
4. 4092
Question id : 44     
HOSTS file contains -

1. IP addresses followed by comma and name to resolve
2. Name to resolve followed by tab/space and IP addresses
3. IP addresses followed by tab/space and name to resolve
4. Name to resolve followed by comma and IP addresses
Question id : 45     
Data Moved across the network in manageable chunks of data is called?

1. Headers

2. Packets
3. Records
4. Packages
Question id : 46     
What is the standard subnet mask for a class A address?

1. 255.255.0.0

2. 255.255.255.0
3. 255.255.255.255
4. 255.0.0.0
Question id : 47     
Host(s) for which a network administrator should consider using manually assigning IP address -

1. Server
2. Printers
3. Routers
4. All the above
Question id : 48     
What does WINS stand for?

1. Windows Internet Name Standard
2. Windows Internal Name Service
3. Windows Internet Name Service
4. Windows Internal Name Standard
Question id : 49     
What does OSI stands for?

1. Open Standards Interconnection
2. Open Standards Internet
3. Open Standards Interdependence
4. Open Standards Interface
Question id : 50     
Can a Server be both an FTP Server and a Web Server?

1. No, it cannot be
2. Yes, it can be
3. Yes it can be, but technically it will work as either FTP or Web Server at a time
4. None of the above
Question id : 51     
What is the Standard HTTP port?

1. 80
2. 161
3. 21
4. 1024
Question id : 52     
Router is a device?

1. that generates protocols
2. that interconnects networks
3. that control the traffic on a network
4. that manages switches
Question id : 53     
IP address basically made up of which two parts?

1. Host and Server portion
2. Host andNetwork portion
3. Network and Server Portion
4. Network and address portion
Question id : 54     
If you use supernet mask 255.255.248.0, how many bits is IP is going to examine?

1. 7
2. 21
3. 14
4. 255
Question id : 55     
What does SMTP stands for?

1. Simplwe Mail Transaction Protocol
2. Simple Mail Toggle Protocol
3. Simple Mail Traffic Protocol
4. Simple Mail Transfer Protocol
Question id : 56     
Convert the following IPv4 address to an IPv6 address : 10.25.135.123

1. 0A15:877B
2. 1015:877A
3. 0A15:877A
4. 1015:877B
Question id : 57     
NAT application -

1. Translate the IP address of the sending host to another IP address
2. Does Encrypt of data stream
3. Does Network Administration
4. Does Decryption of data stream
Question id : 58     
ISDN Stands for -

1. Internet Digital Service Network
2. Integrated Service Digital Network
3. Integrated Systems Digital Network
4. Integrated Service Digital Naming
Question id : 59     
What is the name of the process that TCP uses to setup a connection -

1. Three-way handshake
2. Two-way handshake
3. Mono directional connection
4. None of the above
Question id : 60     
Which of the following statements is true for fibre optic cable?

1. Fibre optic cable transfers data in a mesh
2. Fibre optic cable transfers data in light form
3. Fibre optic cable are similar to coaxial cables
4. None of the above
Question id : 61     
How many characters does the hardware address contain?

1. 12 hexadecimal characters
2. 32 hexadecimal characters
3. 16 hexadecimal characters
4. 64 hexadecimal characters
Question id : 62     
What is the purpose of checksum?

1. It verifies the speed of data transfer
2. It verifies that the packet was received correctly
3. It verifies that the connection is stable
4. It verifies that right protocol is used
Question id : 63     
What are way(s) to assign IP addresses to hosts?

1. Manually
2. Automatically
3. Both above
4. IP cannot be assigned to host
Question id : 64     
When does a DHCP client renew the lease of an address?

1. After 25 percent of the lease has expired
2. After 50 percent of the lease has expired
3. After 75 percent of the lease has expired
4. It never renew the lease
Question id : 65     
Which of these is responsible for the connection of Local Area Networks with Wide Area Networks?

1. Hub
2. Bridge
3. Switch
4. Gateway
Question id : 66     
Headers of the packet includes -

1. Addressing and routing details
2. Network Name
3. Packet Name
4. Packet data contains
Question id : 67     
In Circuit-switched network -

1. All data in communication takes separate path
2. All data in communication takes same path
3. All data in communication uses different medium to travel
4. None of the above
Question id : 68     
What is function of router?

1. Packet filtering
2. Path Selection
3. Packet switching
4. All the above
Question id : 69     
Which of the these can used for Broadband communication channel?

1. Coaxial Cable
2. Fibre Optics Cable
3. Microwave circuits
4. All the above
Question id : 70     
Ping is -

1. Packet InterNet Graber
2. Packet InterNet Groper
3. Packet InterNet Google
4. Packet InterNet Gateway
Question id : 71     
What type of query does the client send to the DNS server?

1. A recursive query
2. An iterative query
3. A Simple query
4. None of these
Question id : 72     
Which application level Protocol run on the top of TCP/IP?

1. TELNET
2. FTP
3. SMTP
4. All the above
Question id : 73     
The relational model consists of:

1. Data redundancy
2. Unorganised data
3. Data in the form of tables
4. Operations using non-SQL languages
Question id : 74     
What is overall responsibility of DBA

1. Development Operation and maintenance of the database and its applications
2. Create and populate tables
3. Facilitate development of use of database
4. Both 1 and 3
Question id : 75     
Which advantages does a Distributed database has over a Centralised database?

1. Slow Response
2. Overall complexity
3. Modular Growth
4. Software Cost
Question id : 76     
Which of the following objects make up a relation?

1. Data types
2. Tuples
3. Attributes
4. Both 2 and 3
Question id : 77     
When user create views, they are part of which schema?

1. Virtual
2. Conceptual
3. External
4. Internal
Question id : 78     
A Key -

1. Can only be one column
2. Identifies a row
3. Must always composed of two or more column
4. Identifies a column
Question id : 79     
A stored program that is attached to a table or a view is called?

1. Embedded SELECT Statement
2. Trigger
3. System file
4. Virtual file
Question id : 80     
Which one of the following is used to limit column values of a table?

1. The CHECK constraint
2. The LIMIT constraint
3. The VALUE constraint
4. The SIZE constraint
Question id : 81     
When using cursors in embedded SQL, what is the first step you must take before you can retrieve data through that cursor?

1. Fetch the cursor
2. Declare the cursor
3. Close the cursor
4. Open the cursor
Question id : 82     
Locks which are placed by DBMS are called?

1. Shared locks
2. Exclusive locks
3. Implicit locks
4. Explicit locks
Question id : 83     
Which one is used to sort row in SQL?

1. SORT BY
2. GROUP BY
3. ALIGN BY
4. ORDER BY
Question id : 84     
Which schema objects provide the basic unit of data management in the SQL environment?

1. Views
2. Domains
3. Base Tables
4. Character sets
Question id : 85     
Which of the following is correct with respect to ODBMS?

1. They are overtaking RDBMS for all applications
2. They have the ability to store complex data types on the web
3. They are most useful for traditional database tables
4. All of the above
Question id : 86     
Maintaining a separate copy of the database at multiple locations is?

1. Horizontal Partitioning
2. Data Replication
3. Vertical Partitioning
4. Horizontal and Vertical Partitioning
Question id : 87     
Which Statement is correct for Triggers?

1. They are not created with SQL
2. They cannot cascade (cause other trigger to fire)
3. Execute against only some applications that access a database
4. They have an event, condition and action
Question id : 88     
Out of these which one applies to a Class not on Object

1. Query
2. Scope
3. Update
4. Constructor
Question id : 89     
Wildcard is used in WHERE clause when?

1. Exact match is not possible in a SELECT statement
2. Exact match is necessary in a CREATE statement
3. Exact match is not possible in a CREATE statement
4. Exact match is necessary in a SELECT statement
Question id : 90     
Hiding the internal implementation details of an object is called?

1. Polymorphism
2. Inheritance
3. Encapsulation
4. Pseudo Code
Question id : 91     
The example of embedded SQL is -

1. Hard Coded SQL statements in a procedure
2. Hard Coded SQL statements in a trigger
3. Hard Coded statement in a program language such as Java
4. The process of making an application capable of generating specific SQL code on fly
Question id : 92     
Which one of these disk array type is capable of the fastest read/write time and most efficient data storage -

1. RAID-0
2. RAID-1
3. RAID-2
4. RAID-3
Question id : 93     
Four built-in functions of SQL are -

1. COUNT, MIN, MAX, DIV
2. SUM, COUNT, MAX, MIN
3. SUM, MAX, NAME, AVG
4. COUNT, SUM, DIV, AVG
Question id : 94     
Problem arising from redundancy are addressed through the process called -

1. Data manipulation
2. Fragmentation
3. Decomposition
4. All the above
Question id : 95     
GRANT and REVOKE are -

1. Mandatory Access Control
2. Discretionary Access Control
3. Database Access Control
4. DBMS Access Control
Question id : 96     
Advantage(s) of placing computations in SQL views?

1. It save users from having to write an expression
2. It ensures results are consistent
3. Both 1 and 2
4. None of the above
Question id : 97     
In B+ tree search structure, the leaf node contains

1. Search entries
2. Data entries
3. Tree entries
4. All the above
Question id : 98     
RAID Level-1 allows -

1. Block-Interleaved Parity
2. Mirroring
3. Stripping and Mirroring
4. Bit-Interleaved Parity
Question id : 99     
In RDBMS, relationship between tables are created by using?

1. Composite keys
2. Foreign keys
3. Candidate keys
4. Local keys
Question id : 100     
Which SQL statement will terminate a transaction?

1. SAVEPOINT
2. ROLLBACK
3. COMMIT
4. Both 2 and 3
Question id : 101     
Which type of condition join should you use if you want to return only matched rows?

1. Inner Join
2. Left Outer Join
3. Right Outer Join
4. Full Outer Join
Question id : 102     
Approach(es) to distributed DBMS?

1. Client-Server System
2. Collaborating Server
3. Middle ware
4. All the above
Question id : 103     
Recovery in a distributed DBMS is achieved using?

1. Commit Protocol
2. Revoke Protocol
3. Un-Commit Protocol
4. None of the above
Question id : 104     
The discretionary access control allows -

1. Users to have privileges to access or modify objects in the database
2. Users can grant their privileges to other users
3. Users do not have control over any objects in the database
4. Both 1 and 2
Question id : 105     
A Trigger can be defined on how many tables?

1. Only One
2. One of More
3. One to Three
4. Any number of Tables
Question id : 106     
Which two operators can you use in a GROUP BY clause to return additional summary data in a query result?

1. ROLLUP
2. HAVING
3. CUBE
4. Both 1 to 3
Question id : 107     
A DBMS maintains information about the data in a special set of relations called -

1. The Catalog
2. The System Catalog
3. The data dictionary
4. All the above
Question id : 108     
SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T, CUSTOMER-ID, NAME, ORDER_ID FROM CUSTOMER_T, ORDER_T WHERE CUSTOMER_T, CUSTOMER_ID = ORDER_T. CUSTOMER_ID - Which type of join is this?

1. Nature Join
2. Outer Join
3. Equi-Join
4. Cartesian Join
Question id : 109     
Locks which are placed by command are known as?

1. Implicit locks
2. Explicit locks
3. Exclusive locks
4. Shared locks
Question id : 110     
Which qualifier is used to remove duplicate rows from the results of SELECT statement?

1. SINGLE
2. DISTINCT
3. UNIQUE
4. ONLY
Question id : 111     
Three Tier architecture consists of -

1. Two clients layer and One Server layer
2. Three Server layer
3. A client layer and two server layer
4. Three client layers and three server layer
Question id : 112     
Which one is not advantage of stored procedure -

1. Increases network traffic
2. Allows Code sharing
3. Greater security
4. Optimize DBMS
Question id : 113     
The language used in application programs to request data from the DBMS is called

1. DML
2. DDL
3. Query Language
4. None of the above
Question id : 114     
A recursive relationship is a relationship between an entity and ______

1. Itself
2. an instance entity
3. other entity
4. sub type entity
Question id : 115     
Which SQL statement below is equivalent to : SELECT NAME FROM EMPLOYEE WHERE HOMETOWN='KA';

1. SELECT NAME IN EMPLOYEE WHERE HOMETOWN IN ('KA');
2. SELECT NAME IN EMPLOYEE WHERE HOMETOWN = 'KA'
3. SELECT NAME IN EMPLOYEE WHERE HOMETOWN = 'K'
4. SELECT NAME FROM EMPLOYEE WHERE HOMETOWN IN ('KA')
Question id : 116     
Which Statement to used to add Schema in SQL environment?

1. ADD SCHEMA
2. CREATE SCHEMA
3. INSERT SCHEMA
4. None of these
Question id : 117     
Which of the following types of constrains support NOT NULL  constraints -

1. Table Constraints
2. Column Constraints
3. Domain Constraints
4. Assertions
Question id : 118     
On which types of database objects can you assign the TRIGGER privilege?

1. Tables
2. Views
3. Columns
4. Domains
Question id : 119     
Which set function should you use to add together the values in a column?

1. MAX
2. COUNT
3. SUM, MAX, NAME, AVG
4. AVG
Question id : 120     
Which type of join contains an ON clause?

1. Cross Join
2. Comma-Separated Join
3. Natural Join
4. Condition Join
Question id : 121     
Which statement can you use in embedded SQL to provide your host program with exception and warning information?

1. WHENEVER
2. INTO
3. CAST
4. WHENIT
Question id : 122     
Which statement do you use to invoke an SQL-invoked procedure?

1. RETURN
2.
CALL
3. Setup a session
4. DECLARE

Sunday, 20 January 2019

MCQ On Data Structure

 1.Two main measures for the efficiency of an algorithm are
 a. Processor and memory
 b. Complexity and capacity
 c. Time and space
 d. Data and space

   2. The time factor when determining the efficiency of algorithm is measured by
 a. Counting microseconds
 b. Counting the number of key operations
 c. Counting the number of statements
 d. Counting the kilobytes of algorithm

  3. The space factor when determining the efficiency of algorithm is measured by
 a. Counting the maximum memory needed by the algorithm
 b. Counting the minimum memory needed by the algorithm
 c. Counting the average memory needed by the algorithm
 d. Counting the maximum disk space needed by the algorithm

  4. Which of the following case does not exist in complexity theory
 a. Best case
 b. Worst case
 c. Average case
 d. Null case

   5. The Worst case occur in linear search algorithm when 
 a. Item is somewhere in the middle of the array
 b. Item is not in the array at all
 c. Item is the last element in the array
 d. Item is the last element in the array or is not there at all

   6. The Average case occur in linear search algorithm
 a. When Item is somewhere in the middle of the array
 b. When Item is not in the array at all
 c. When Item is the last element in the array
 d. When Item is the last element in the array or is not there at all

   7. The complexity of the average case of an algorithm is 
 a. Much more complicated to analyze than that of worst case
 b. Much more simpler to analyze than that of worst case
 c. Sometimes more complicated and some other times simpler than that of worst case
 d. None or above

   8. The complexity of linear search algorithm is 
 a. O(n)
 b. O(log n)
 c. O(n2)
 d. O(n log n)

   9. The complexity of Binary search algorithm is 
 a. O(n)
 b. O(log )
 c. O(n2)
 d. O(n log n)

   10. The complexity of Bubble sort algorithm is 
 a. O(n)
 b. O(log n)
 c. O(n2)
 d. O(n log n)

   11. The complexity of merge sort algorithm is
 a. O(n)
 b. O(log n)
 c. O(n2)
 d. O(n log n)

  12. The indirect change of the values of a variable in one module by another module is called 
 a. internal change
 b. inter-module change
 c. side effect
 d. side-module update

 13. Which of the following data structure is not linear data structure?
 a. Arrays
 b. Linked lists
 c. Both of above
 d. None of above

   14. Which of the following data structure is linear data structure? 
 a. Trees
 b. Graphs
 c. Arrays
 d. None of above

   15. The operation of processing each element in the list is known as 
 a. Sorting
 b. Merging
 c. Inserting
 d. Traversal

16. Finding the location of the element with a given value is:
 a. Traversal
 b. Search
 c. Sort
 d. None of above

   17. Arrays are best data structures 
 a. for relatively permanent collections of data
 b. for the size of the structure and the data in the structure are constantly changing
 c. for both of above situation
 d. for none of above situation

 18. Linked lists are best suited
 a. for relatively permanent collections of data
 b. for the size of the structure and the data in the structure are constantly changing
 c. for both of above situation
 d. for none of above situation

   19. Each array declaration need not give, implicitly or explicitly, the information about
 a. the name of array
 b. the data type of array
 c. the first data from the set to be stored
 d. the index set of the array

 20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated
 b. the architecture of computer memory does not allow arrays to store other than serially
 c. both of above
 d. none of above


ANSWERS

1. Two main measures for the efficiency of an algorithm are c. Time and space 

2. The time factor when determining the efficiency of algorithm is measured by b. Counting the number of key operations 

3. The space factor when determining the efficiency of algorithm is measured by a. Counting the maximum memory needed by the algorithm 

4. Which of the following case does not exist in complexity theory d. Null case 

5. The Worst case occur in linear search algorithm when d. Item is the last element in the array or is not there at all
6. The Average case occur in linear search algorithm a. When Item is somewhere in the middle of the array 
7. The complexity of the average case of an algorithm is a. Much more complicated to analyze than that of worst case
8. The complexity of linear search algorithm is a. O(n) 
9. The complexity of Binary search algorithm is b. O(log n)
10. The complexity of Bubble sort algorithm is c. O(n 2 ) 
11. The complexity of merge sort algorithm is d. O(n log n)
12. The indirect change of the values of a variable in one module by another module is called c. side effect 
13. Which of the following data structure is not linear data structure? d. None of above 
14. Which of the following data structure is linear data structure? c. Arrays
15. The operation of processing each element in the list is known as d. Traversal 
16. Finding the location of the element with a given value is: b. Search 
17. Arrays are best data structures a. for relatively permanent collections of data 
18. Linked lists are best suited b. for the size of the structure and the data in the structure are constantly changing 
19. Each array declaration need not give, implicitly or explicitly, the information about c. the first data from the set to be stored
20. The elements of an array are stored successively in memory cells because a. by this way computer can keep track only the address of the first element and the addresses of other