2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
28th November 2014, 11:58 AM
Super Moderator
 
Join Date: Apr 2013
Re: Computer Science Question Paper HAL

Below I am listing some of the questions from the question paper of HAL in computer science engineering

6. A graph with ”n” vertices and n-1 edges that is not a tree, is
a) Connected
b) Disconnected
c) Euler
d) A circuit
Ans.
7. If a graph requires k different colours for its proper colouring,
then the chromatic number of the graph is
a) 1
b) k
c) k-1
d) k/2
Ans.
8. A read bit can be read
a) and written by CPU
b) and written by peripheral
c) by pheripheral and written by CPU
d) by CPU and written by the peripheral
Ans.
10. The term “aging” refers to
a) booting up the priority of a process in multi-level of queue without feedback.
b) gradually increasing the priority of jobs that wait in the system for a long time
to remedy infinite blocking.
c) keeping track of the following a page has been in memory for the
LRU replacement
d) letting job reside in memory for a certain amount of time so that the number of
pages required can be estimated accurately.
Ans.
11. Consider a set of n tasks with known runtimes r1, r2 ....... r to be run on a
unlprocessor machine. Which of the following processor scheduling algorithms
will result in the maximum throughput?
a) Round Robin
b) Shortest job first
c) Highest response ratio next
d) first cum first served
Ans.
14. The principal of locality of reference justifies the use of
a) virtual memory
b) interrupts
c) main memory
d) cache memory
Ans.
15. What is the value of I at the end of the pseudocode?
a) 4
b) 5
c) 6
d) 7
Ans.
16. The five items: A, B, C, D, and E are pushed in a stack, one after the other
starting from A. The stack is popped four times and each element Is inserted in a
queue. Then two elements are deleted from the queue and pushed back on the
stack. Now one item is popped from the stack. The popped item is
(a) A
(b) B
(c) C
(d) D
Ans.
17. Round Robin scheduling is essentially the pre-emptive version of
a) FIFO
b) Shortest Job First
c) shortest remaining time
d) Longest remaining time
Ans.
18. The number of digit I present in the binary representation of
3 x 512 +7 x 64 + 5 x 8 +3 is
(a) 8
(b) 9
(c) 1O
(d) 12
Ans.
19. Assume that each character code consists of 8 bits. The number of
characters that can be transmitted per second through an synchronous serial
line at 2400 baud rate, and with two stop bits is
(a)109
(b)216
(c) 218
(d)219
Ans.
20. If the bandwidth of a signal is 5 kHz and the lowest frequency is 52 kHz,
what is the highest frequency?
(a) 5 kHz
(b) 10 kHz
(C) 47 kHz
(d) 57 kHz
Ans.
21. An Ethernet hub
(a) functions as a repeater
(b) connects to a digital PBX
(c) connects to a token-ring network
(d) functions as a gateway
Ans.
22. Phase transition for each bit are used in
(a) Amplitude modulation
(b) Carrier modulation
(C) Manchester encoding
(d) NRZ encoding
Ans.
23. Which of the following is printed as a result of the call demo (1234)?
a) 1441
b) 3443
C) 12344321
d) 43211234
Ans.
24. Bit stuffing refers to
(a) inserting a ‘0’ in user stream to differentiate it with a flag
(b) inserting a ‘0’ in flag stream to avoid ambiguity
(C) appending a nibble to the flag sequence
(d ) appending a nibble to the use data stream
Ans.
25. What is the name of the technique in which the operating system of a
computer executes several programs concurrently by switching back and forth
between them?
(a) Partitioning
(b) Multi tasking
(C) Windowing
(d) Paging
Ans.
26. If there are five routers and six networks in an intranet using link state
routing, how many routing tables are there?
(a) 1
(b) 5
(c) 6
(d) 11
Ans.
27. Virtual memory is
a) Part of Main Memory only used for swapping
b) A technique to allow a program, of size more than the size of the main
memory, town
C) Part of secondary storage used in program execution
d) None of these
Ans.
28. The level of aggregation of information required for operational control is
(a) Detailed
(b) Aggregate
(C) Qualitative
(d) None of the above
Ans.
30. 0.75 in decimal system is equivalent to _______ in octal system
a) 0.60
b) 0.52
C) 0.54
d) 0.50
Ans.
31. In an SR latch made by cross coupling two NAND gates, if both S and R inputs
are set to 0, then it will result in
a) Q= 0, QO = 1
b) Q= 1,Q0 = 0
c) Q= 1,Q0 = 1
d) Indeterminate states
Ans.
33. Company X shipped 5 computer chips, I of which was defective, and
Company Y shipped 4 computer chips, 2 of which were defective. One computer
chip is to be chosen uniformly at random from the 9 chips shipped by the
companies. If the chosen chip is found to be defective, what is the probability
that the chip came from Company Y?
a) 2/9
b) 4/9
c) 2/3
d) 1/2
Ans.
34. Ring counter is analogous to
(a) Toggle Switch
(b) Latch
(C) Stepping Switch
(d) S-R flip flop
Ans.
35. The output 0 and I level for TTL Logic family is approximately
a) 0.1 and5 V
b) 0.6 and 3.5 V
C) 0.9 and 1.75 V
d) —i.75 and O.9 V
Ans.
37. In comparison with static RAM memory, the dynamic RAM memory has
a) lower bit density and higher power consumption
b) higher bit density and higher power consumption
C) lower bit density and lower power consumption
d) higher bit density and lower power consumption.
Ans.
38 The Hexadecimal equivalent of 01111100110111100011 is
(a) CD73E
(b) ABD3F
(c) 7CDE3
(d) FA4CD
Ans.
39. Disk requests are received by a disk drive for cylinder 5, 25, 18, 3, 39, 8 and
35 in that order. A seek takes 5 msec per cylinder moved. How much seek time
is needed to serve these requests for a Shortest Seek First (SSF) algorithm?
Assume that the arm is at cylinder ?,0 when the last of these requests is made
with none of the requests yet served
a) 125 msec
b) 295 msec
c) 575 msec
d) 750 msec
Ans.
40. Consider a system having ‘m’ resources of the same type. The resources are
shared by 3 processes A,B,C which have peak time demands of 3,4,6
respectively. The minimum value of ‘m’ that ensures that deadlock will never
occur is
(a) 11
(b) 12
(c) 13
(d) 14
Ans.
41. A task in a blocked state
a) is executable
b) is running
C) must still be placed in the run queues
d) Is waiting for some temporarily unavailable resources.
Ans.
42. Semaphores
a) synchronize critical resources to prevent deadlock
b) synchronize critical resources to prevent contention
C) are used to do I/O
d) are used for memory management.
Ans.
43. On a system using non-preemptive scheduling, processes with expected run
times of 5, 18, 9 and 12 are in the ready queue. In what order should they be
run to minimize wait time?
(a) 5, 12, 9, 18
(b) 5, 9, 12,18
(C )12,18, 9, 5
(d) 9, 12, 18, 5
Ans.
44. The number of page frames that must be allocated to a running process in a
virtual memory environment is determined by
a) the instruction set architecture
b) page size
c) number of processes in memory
d) physical memory size
Ans.
46 Consider a small 2-way set-associative cache memory, consisting of four
blocks. For choosing the block to be replaced, use the least recently (LRU)
scheme. The number of cache misses for the following sequence of block
addresses is 8,12,0,12,8
a) 2
b) 3
c) 4
d) 5
Ans.
47. Which commands are used to control access over objects in relational
database?
a) CASCADE & MVD
b) GRANT & REVOKE
c) QUE & QUIST
d) None of these
Ans.
48. Which of the following is aggregate function in SQL?
a) Avg
b) Select
c) Ordered by
d) distinct
Ans.
49. One approach to handling fuzzy logic data might be to design a computer
using ternary (base..3) logic so that data could be stored as “true,” “false,” and
“unknown.” if each ternary logic element is called a flit, how many flits are
required to represent at least 256 different values?
a) 4
b) 5
c) 6
d) 7
Ans.
50. A view of a database that appears to an application program is known as
a) Schema
b) Subschema
c) Virtual table
d) None of these
Ans.
51 Armstrong’s inference rule doesn’t determine
a) Reflexivity
b) Augmentation
C) Transitivity
d) Mutual dependency
Ans.
52. Which operation is used to extract specified columns from a table?
a) Project
b) Join
C) Extract
d) Substitute
Ans.
53. In the Big- Endian system, the computer stores
a) MSB of data in the lowest memory address of data unit
b) LSB of data in the lowest memory address of data unit
C) MSB of data in the highest memory address of data unit
d) LSB of data in the highest memory address of data unit
Ans.
54. BCNF is not used for cases where a relation has
a) Two (or more) candidate keys
b) Two candidate keys and composite
c) The candidate key overlap
d) Two mutually exclusive foreign keys
Ans.
55. Selection sort algorithm design technique Is an example of
a) Greedy method
b) Divide-and-conquer
C) Dynamic Programming
d) Backtracking
Ans.
56. Which of the following RAID level provides the highest Data Transfer Rate
(Read / Write)
a) RAID 1
b) RAID 3
C) RAID 4
d) RAID 5
Ans.
57. Which of the following programming language(s) provides garbage
collection automatically
a) Lisp
b) C++
c) Fortran
d) C
Ans.
60. Which of the following is correct with respect to Two phase commit
protocol?
(a) Ensures serializability
(b) Prevents Deadlock
(C) Detects Deadlock
(d) Recover from Deadlock
Ans.
61 The Fibonacci sequence is the sequence of integers
a) 1,3,5,7,9,11,13
b) 0,1,1,2,3,5,8,13,21,54
c) 0, 1, 3, 4, 7, 11, 18, 29, 47
d) 0,1,3,7,15
Ans.
62 Let X be the adjacency matrix of a graph G with no self loops. The entries
along the principal diagonal of X are
(a) all zeros
(b) all ones
(C) both zeros and ones
(d) different
Ans.
63 Which of these is not a feature of WAP 2.0
(a) Push & Pull Model
(b) Interface to a storage device
(c) Multimedia messaging
(d) Hashing
Ans.
64 Feedback queues
(a) are very simple to implement
(b) dispatch tasks according to execution characteristics
(C) are used to favour real time tasks
(d) require manual intervention to implement properly
Ans.
65 Which of the following is not a UML DIAGRAM?
(a) Use Case
(b) Class Diagram
(c) Analysis Diagram
(d) Swimlane Diagram
Ans.
66 Silly Window Syndrome is related to
(a) Error during transmission
(b) File transfer protocol
(c) Degrade in TCP performance
(d) Interlace problem
Ans.
67 To execute all loops at their boundaries and within their operational bounds
is
an example of
(a) Black Box Testing
(b) Alpha Testing
(c) Recovery Testing
(d) White Box Testing
Ans.
68 SSL is not responsible for
(a) Mutual authentication of client & server
(b) Secret communication
(C) Data Integrity protection
(d) Error detection & correction
Ans.
69 A rule in a limited entry decision table is a
(a) row of the table consisting of condition entries
(b) row of the table consisting of action entries
(C) column of the table consisting of condition entries and the corresponding
action entries
(d) columns of the table consisting of conditions of the stub
Ans.
70 The standard for certificates used on internet is
a) X.25
b) X.301
c) X.409
d) X.509
Ans.
71 Hashed message is signed by a sender using
a) his public key
b) his private key
C) receivers public key
d) receivers private key
Ans.
72 An email contains a textual birthday greeting, a picture of a cake, and a song.
The order is not important. What is the content-type?
a) Multipart / mixed
b) Multipart / parallel
c) Multipart / digest
d) Multipart / alternative
Ans.
73 Range of IP Address from 224.0.0.0 to 239.255.256.255 are
a) Reserved for Loopback
b) Reserved for broadcast
C) Used for muticast packets
d) Reserved for future addressing
Ans.
74 IEEE 802.11 is standard for
a) Ethernet
b) Bluetooth
C) Broadband Wireless
d) Wireless LANs
Ans.
75 When a host on network A sends a message to a host on network B, which
address does the router look at?
a) Port
b) IP
C) Physical
d) Subnet mask
Ans.
76 Which of the following is not an approach to Software Process Assessment?
a) SPICE (ISO/IECI 5504)
b) Standard CMMI Assessment Method for process improvement
C) ISO 9001 : 2000
d) IEEE 2000:2001
Ans.
77 A physical DFD specifies
a) what processes will be used
b) who generates data and who processes it
c) what each person in an organization does
d) which data will be generated
Ans.
78 In UML diagram of a class
a) state of object cannot be represented
b) state is irrelevant
c) state is represented as an attribute
d) state is represented as a result of an operation
Ans.
79 Which of the following models is used for software reliability?
a) Waterfall
b) Musa
c) COCOMO
d) Rayleigh
Ans.
80 Djikstra’s algorithm is used to
a) Create LSAs
b) Flood an internet with information
C) Calculate the routing tables
d) Create a link state database
Ans.
  #3  
29th May 2015, 10:12 AM
Unregistered
Guest
 
Re: Computer Science Question Paper HAL

I am preparing for the HAL exam. Will you please share the question paper of HAL (Computer science)?
  #4  
29th May 2015, 10:13 AM
Super Moderator
 
Join Date: Apr 2013
Re: Computer Science Question Paper HAL

As per your request, I am sharing with you’re the question paper of the HAL management trainee exam for computer science students.

1. A computer derives its basic strength from

(a) speed

(b) accuracy

(c) memory

(d) all of the above (Ans)

(e) None of the above.



2. Modern computers compared to earlier computers are

(a) faster and larger

(b) less reliable

(c) larger and stronger

(d) slower but more reliable

(e) faster and smaller (Ans)



3. The use of computer for business applications is attractive because of its

(a) accuracy

(b) reliability

(c) speed

(d) secret code facility

(e) All of the above (Ans)



4. A computer is capable of performing almost any task, provided that it can be

(a) coded

(b) memorized

(c) analyzed

(d) reduced to a series of logical steps (Ans)

(e) changed top mathematics equation



5. A BIT represents a

(a) decimal digit

(b) octal digit

(c) binary digit (Ans)

(d) hexa decimal digit



6. A computer has very high speed, accuracy and reliability. Its intelligence quotient could be of the order of

(a) 100

(b) 0 (Ans)

(c) 50

(d) 200

(e) 99.99



7. Computer can not do anything without a

(a) chip

(b) memory

(c) output device

(d) program (Ans)

(e) None of the above



8. A computer possesses information

(a) as directed by the operator

(b) automatically (Ans)

(c) at once

(d) gradually and eventually

(e) by truncating



9. Pick up the false statement

(a) computer can manipulate both numeric and non-numeric symbols

(b) computer errors can usually be traced to faulty programs or inaccurate input data

(c) the facts or informational raw materials represented by numeric and non-numeric symbols are called information (Ans)

(d) the space in the primary storage section is divided into four areas: input, working, storage, output and program storage.

(e) Information is the relevant knowledge that results from the processing and arranging of data in an ordered and useful form.



10. Processors of all computers, whether micro, mini or mainframe must have

(a) ALU

(b) primary storage

(c) control Unit

(d) all of the above (Ans)

(e) None of the above.



11. Pick up the correct statement about computers

(a) computers process data with human intervention after the program has been fed

(b) all comparisons are made in the control section

(c) the arithmetic-logic section of the CPU selects, interprets and executes the program steps.

(d) the secondary storage devices are usually connected on line to the CPU but for accepting data from them or returning data to them, human intervention is required

(e) computers have the built-in ability to obey different types of instructions. (Ans)



12. Real time computing is possible because of the following characteristic of computer

(a) storage capability

(b) high speed (Ans)

(c) accuracy

(d) versatility

(e) automatic in execution



13. Pick out the wrong statement about modern computer systems

(a) these are simple and easy to take care of

(b) even beginners, untrained persons can safely handle them (Ans)

(c) they require a highly disciplined approach

(d) it is important to understand the proper overall procedures must be followed

(e) the negligent use of a computer system will almost always introduce time bombs into the system.



14. A collection of eight bits is called:

(a) byte (Ans)

(b) word

(c) record

(d) file

(e) None of the above



15. Choose the incorrect statement about micro computers, mini-computers, etc.

(a) a microcomputer can be placed on a single silicon chip

(b) a minicomputer can have more processing capability than a mainframe model

(c) a microcomputer chip performs the arithmetic-logic and control functions of a microcomputer

(d) ROM chips may be used in micros ;to permanently store program instruction

(e) most micros use rigid disk storage devices rather than floppy disk drives. (Ans)



16. Control Unit of a digital computer is often called the

(a) lock

(b) nerve center (Ans)

(c) ICs

(d) all of the above

(e) None of the above



17. Pick up the correct statement

(a) most mainframes are 48-bit machines

(b) thousands of super computers are currently being built

(c) super-computers are usually designed to process accounting applications

(d) mainframes may have multi-processor components that permit several tasks to be processed at the same instant in time (Ans)

(e) minicomputers can not use high speed buffer storage components and are thus always slower than mainframe models.



18. The following acronym recognizes the fact that "computer errors" can usually be traced to incorrect input data or unreliable programs

(a) IGO (Ans)

(b) FIFO

(c) LIFO

(d) DASD

(e) ROM



19. Group of instructions that directs a computer is called

(a) storage

(b) memory (Ans)

(c) logic

(d) program

(e) None of the above



20. Which of the following does not describe one or more characteristics of a computer?

(a) electronic

(b) external storage

(c) stored program

(d) program modification at execution (Ans)

(e) All of the above are characteristics.



21. Which of the following statements is true?

(a) the smart approach to using computers is to write programs

(b) knowledge of the system development life cycle is not important to operators who use computers without programming

(c) hands-on exposure to the computer is not helpful to those who write programs

(d) personal computer have been an important contributing factor in the movement towards using computers without programming (Ans)

(e) None of the above is true



22. Which can read data and convert them to a form that a computer can use?

(a) logic

(b) storage

(c) control

(d) input device (Ans)

(e) output device



23. Software instruction intended to satisfy a user's specific processing needs are called

(a) system software

(b) a microcomputer

(c) documentation

(d) applications software (Ans)

(e) All of the above



24. Which kind of hardware is used the most in the input phase of a computer based information system?

(a) keyboard (Ans)

(b) printer

(c) monitor

(d) hard disk

(e) floppy disk



25. Which of the following is not a factor when categorizing a computer

(a) amount of main memory the CPU can use

(b) capacity of the storage devices

(c) cost of the system

(d) where it was purchased (Ans)

(e) speed of the output device



26. Which of the following is the most powerful type of computer?

(a) super micro

(b) super conductor

(c) microcomputer

(d) super computer (Ans)

(e) megaframe



27. Which of the following people probably has the least amount of technical knowledge ?

(a) programmer

(b) user (Ans)

(c) system analyst

(d) computer operator

(e) computer professional



28. Which kind of storage device cab be carried around?

(a) floppy disk (Ans)

(b) hard disk

(c) system cabinet

(d) hard disk drive

(e) floppy disk drive



29. Which of the following terms applies to communication between separate computer systems?

(a) computer literacy

(b) power supply

(c) applications software

(d) connectivity (Ans)

(e) None of the above



30. The Central Processing Unit (CPU) consists of:

(a) input, output and processing

(b) control unit, primary storage & secondary storage

(c) control unit, arithmetic-logic unit, primary storage (Ans)

(d) control unit, processing, primary storage

(e) None of the above



31. People typically interface with a computer based system when:

(a) information must be output

(b) data must be input

(c) information must be reviewed the computer needs a direction (or instruction) in order to process data

(d) All of the above

(Ans : e)

32. The principle advantage of the centralized approach to organizing a computer facility is :

(a) cost-effectiveness

(b) processing activities are easier to coordinate

(c) Processing activities are easier to control

(d) processing statements can be enforced

(e) All of the above (Ans)



33. The fifth generation digital computer will be

(a) extremely low cost

(b) very expensive

(c) versatility

(d) artificial intelligence (Ans)

(e) None of the above



34. To be information, data must be

(a) factual

(b) relevant

(c) news

(d) all of the above (Ans)

(e) None of the above



35. A data system for calculating measures used in statistical inference is an example of a

(a) teleprocessing system

(b) data management system

(c) computing system (Ans)

(d) All of the above

(e) None of the above



36. For the purposes of defining data needs, a responsibility area is

(a) marketing

(b) administration

(c) personal (Ans)

(d) all of the above

(e) None of the above



37. Which is widely used in academic testing?

(a) MICR

(b) POS

(c) OCR

(d) OMR (Ans)

(e) None of the above



38. Coded entries which are used to gain access to a computer system are called:

(a) entry codes

(b) passwords (Ans)

(c) security commands

(d) code words



39. A factor which might cause an individual to consider using a computer in criminal activities is :

(a) the computer's access to large sums to money

(b) the speed with which the crime can be accomplished

(c) EFTS (Electronic Funds Transfer System)

(d) All of the above (Ans)



40. EBCDIC can code up to how may different characters ?

(a) 816

(b) 32

(c) 64

(d) 256

(Ans : e)



41. Which of the following statements is true?

(a) the installation of a computer is favorably received by all employees

(b) some form of training is necessary for employees who will work with computers (Ans)

(c) computers are portrayed solely as society's benefactor

(d) a business person is only interested in the computer's accuracy.





42. Which is considered a direct entry input device?

(a) optical scanner

(b) mouse

(c) light pen

(d) digitizer

(e) All of the above (Ans)



43. The daily processing of corrections to customer accounts best exemplifies the processing mode of :

(a) batch processing (Ans)

(b) real-time processing

(c) interactive processing

(d) All of the above



44. The data processing job expected to further decreases in the 1990s is that of :

(a) keypuncher (Ans)

(b) data entry clerk

(c) computer operator

(d) programmer



45. Which is a unit of measurement used with computer systems?

(a) byte

(b) kilobyte

(c) megabyte

(d) gigabyte

(e) All of the above (Ans)



46. Which of the following statements is true?

(a) analysts usually work alone and sometimes as part of a team

(b) most systems projects are completed in 6 12 weeks

(c) an analyst's primary concern is the development of software

(d) analysts evaluate data flow through an organization (Ans)



47. In computer terminology, information means

(a) raw data

(b) data in more useful or intelligible form (Ans)

(c) alphanumeric data

(d) program



48. A computer programmer

(a) does all the thinking for a computer (Ans)

(b) can enter input data quickly

(c) can operate all types of computer equipment

(d) can draw only flowchart



49. A character is represented in EBCDIC by:

(a) one bit

(b) four bits

(c) eight bits (Ans)

(d) sixteen bits

(e) None of the above



50. Most of the errors blamed on computers are actually due to

(a) programming errors

(b) hardware fatique

(c) defects in floppy disks

(d) data entry errors (Ans)



51. Which is a secondary memory device ?

(a) CPU

(b) ALU

(c) Floppy disk (Ans)

(d) Mouse

(e) None of the above



52. Which is the most significant difference between a simple desk calculator and computer? Choose from the following (note that some of the following may not even be true).

(a) the computer is an electronic machine while the desk calculator may or may not be electronic

(b) the computer is useful in business applications while the desk calculator is not

(c) the computer can print its results, while the desk calculator can only show it on a display

(d) the computer is controlled by a program stored in its memory while calculator require step-by-step manual control (Ans)

(e) One has to know the method of calculation while using a calculator but a computer user can depend upon the computer to choose the method automatically.



53. A term associated with the comparison of processing speeds of different computer systems is :

(a) EFTS

(b) MPG

(c) MIPS (Ans)

(d) CPS



54. RAM is used as a short memory beacuse it

(a) is volatile (Ans)

(b) is very expensive

(c) has small capacity

(d) is programmable

(e) None of the above



55. General purpose computes are those that can be adopted to countless uses simply by changing its.

(a) keyboard

(b) printer

(c) program (Ans)

(d) display screen

(e) None of the above



56. Which is the computer memory that does not forget?

(a) ROM (Ans)

(b) RAM

(c) PROM

(d) All of the above

(e) None of the above



57. The Senta Clara Valley near Palo Alto, California is popularly known as Silicon Valley of America because

(a) huge deposits of silicon are found there

(b) many silicon chip manufacturing firms are located there (Ans)

(c) Santa Claus visits it every Christmas

(d) it is full of large grain sand



58. Computers are incapable of emotional feelings. However, some people attribute humanlike emotions to imitate objects including computers. What is it called?

(a) anthropogenesis

(b) anthropomorphism (Ans)

(c) anthroolatory

(d) cybernetics



59. According to you, which of the following statements is incorrect?

(a) generally, computers don't make mistakes

(b) computers eliminate jobs

(c) computers can think (Ans)

(d) maths is necessary to understand computers


60. The most common binary code in use today is the 8 bit ASCII code. What do the letters ASCII stand for?

(a) American Standard Code for International Interchange

(b) American Standard Code for Information Interchange (Ans)

(c) American Standard Code for Intelligence interchange

(d) American Scientific Code for Information Interchange

(e) None of the above


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 03:34 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4