If you don't like something, change it. If you can't change it, change your attitude.
1.Consider a set A = {1, 2, 3, ...., 1000}. How many members of A shall be divisible by 3 or by 5 or by both 3 and 5 ?
(A) 533
(B) 599
(C) 467
(D) 66
View/Hide Ans
Correct Answer is C
2. A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of degree 2. If the other vertices have degree 1, how many vertices are there in the graph?
(A) 5
(B) n - 3
(C) 20
(D) 11
View/Hide Ans
Correct Answer is D
3. Consider the Graph shown below :
4. A computer program selects an integer in the set {k : 1 = k = 10,00,000} at random and prints out the result. This process is repeated 1 million times. What is the probability that the value k = 1 appears in the printout atleast once ?
(A) 0.5
(B) 0.704
(C) 0.632121
(D) 0.68
View/Hide Ans
Correct Answer is C
5. If we define the functions f, g and h that map R into R by :
f(x)=x4, g(x)=√(x2+1), h(x)=x2 +72, then the value of the composite functions ho(gof) and (hog)of are given as
(A) x8-71 and x8-71
(B) x8-73 and x8-73
(C) x8+71 and x8+71
(D) x8+73 and x8+73
View/Hide Ans
Correct Answer is D
6. . The BCD adder to add two decimal digits needs minimum of
(A) 6 full adders and 2 half adders
(B) 5 full adders and 3 half adders
(C) 4 full adders and 3 half adders
(D) 5 full adders and 2 half adders
View/Hide Ans
Correct Answer is D
7. The Excess-3 decimal code is a self-complementing code because
(A) The binary sum of a code and its 9’s complement is equal to 9.
(B) It is a weighted code.
(C) Complement can be generated by inverting each bit pattern.
(D) The binary sum of a code and its 10’s complement is equal to 9.
View/Hide Ans
Correct Answer is A,C
8. How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine (A * B) + (C * D/E) ?
(A) 4 PUSH and 3 POP instructions
(B) 5 PUSH and 4 POP instructions
(C) 6 PUSH and 2 POP instructions
(D) 5 PUSH and 3 POP instructions
View/Hide Ans
Correct Answer is B
9. The range of representable normalized numbers in the floating point binary fractional representation in a 32-bit word with 1-bit sign, 8-bit excess 128 biased exponent and 23 bit mantissa is
(A) 2-128 to (1 - 2-23) × 2127
(B) (1 - 2-23) × 2-127 to 2128
(C) (1 - 2-23) × 2-127 to 223
(D) 2-129 to (1 - 2-23) × 2127
View/Hide Ans
Correct Answer is D
10. The size of the ROM required to build an 8-bit adder/subtractor with mode control, carry input, carry output and two’s complement overflow output is given as
(A) 216 × 8
(B) 218 × 10
(C) 216 × 10
(D) 218 × 8
View/Hide Ans
Correct Answer is B
11. What will be the output of the following ‘C’ code ?
main ( )
{ int x = 128;
printf (“\n%d”, 1 + x++);
}
(A) 128
(B) 129
(C) 130
(D) 131
View/Hide Ans
Correct Answer is B
12. What does the following expression means ?
char *(*(* a[N]) ( )) ( );
(A) a pointer to a function returning array of n pointers to function returning character pointers.
(B) a function return array of N pointers to functions returning pointers to characters
(C) an array of n pointers to function returning pointers to characters
(D) an array of n pointers to function returning pointers to functions returning pointers to characters
View/Hide Ans
Correct Answer is A, B, C & D
13. Which of the following is not a member of class ?
(A) Static function
(B) Friend function
(C) Const function
(D) Virtual function
View/Hide Ans
Correct Answer is B
14. When an array is passed as parameter to a function, which of the following statements is correct ?
(A) The function can change values in the original array.
(B) In C, parameters are passed by value, the function cannot change the original value in the array.
(C) It results in compilation error when the function tries to access the elements in the array.
(D) Results in a run time error when the function tries to access the elements in the array.
View/Hide Ans
Correct Answer is A
15. Which of the following differentiates between overloaded functions and overridden functions ?
(A) Overloading is a dynamic or runtime binding and overridden is a static or compile time binding.
(B) Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
(C) Redefining a function in a friend class is called overloading, while redefining a function in a derived class is called as overridden function.
(D) Redefining a function in a derived class is called function overloading, while redefining a function in a friend class is called function overriding.
View/Hide Ans
Correct Answer is B
16. Division operation is ideally suited to handle queries of the type :
(A) customers who have no account in any of the branches in Delhi.
(B) customers who have an account at all branches in Delhi.
(C) customers who have an account in atleast one branch in Delhi.
(D) customers who have only joint account in any one branch in Delhi
View/Hide Ans
Correct Answer is B
17. Which of the following is true ?
I. Implementation of self-join is possible in SQL with table alias.
II. Outer-join operation is basic operation in relational algebra.
III. Natural join and outer join operations are equivalent.
(A) I and II are correct.
(B) II and III are correct.
(C) Only III is correct.
(D) Only I is correct.
View/Hide Ans
Correct Answer is D
18. What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-relationship diagram ?
(A) Generalization
(B) Aggregation
(C) Specialization
(D) Adding suitable attributes
View/Hide Ans
Correct Answer is D
19. The best normal form of relation scheme R(A, B, C, D) along with the set of functional dependencies
F = {AB→C, AB→D, C→A, D→B} is
(A) Boyce-Codd Normal form
(B) Third Normal form
(C) Second Normal form
(D) First Normal form
View/Hide Ans
Correct Answer is B
20. Identify the minimal key for relational scheme R(A, B, C, D, E) with functional dependencies
F = {A→B, B→C, AC→D}
(A) A
(B) AE
(C) BE
(D) CE
View/Hide Ans
Correct Answer is A
21. Convert the following infix expression into its equivalent post fix expression
(A + B^ D) / (E - F) + G
(A) ABD^ + EF - / G+
(B) ABD + ^EF - / G+
(C) ABD + ^EF / - G+
(D) ABD^ + EF / - G+
View/Hide Ans
Correct Answer is A
22. You have to sort a list L, consisting of a sorted list followed by a few ‘random’ elements. Which of the following sorting method would be most suitable for such a task ?
(A) Bubble sort
(B) Selection sort
(C) Quick sort
(D) Insertion sort
View/Hide Ans
Correct Answer is D
23. The directory can be viewed as .................... that translates filenames into their directory entries.
(A) Symbol table
(B) Partition
(C) Swap space
(D) Cache
View/Hide Ans
Correct Answer is A
24. Consider an array A[20, 10], assume 4 words per memory cell and the base address of array A is 100. What is the address of A[11, 5] ? Assume row major storage.
(A) 560
(B) 565
(C) 570
(D) 575
View/Hide Ans
Correct Answer is A
25. A full binary tree with n leaves contains
(A) n nodes
(B) log2 n nodes
(C) 2n -1 nodes
(D) 2n nodes
View/Hide Ans
Correct Answer is C
26. The period of a signal is 10 ms. What is its frequency in Hertz?
(A) 10
(B) 100
(C) 1000
(D) 10000
View/Hide Ans
Correct Answer is B
27. In a classful addressing, first four bits in Class A IP address is
(A) 1010
(B) 1100
(C) 1011
(D) 1110
View/Hide Ans
Correct Answer is A,B,C & D
28. Which of the following algorithms is not a broadcast routing algorithm ?
(A) Flooding
(B) Multidestination routing
(C) Reverse path forwarding
(D) All of the above
View/Hide Ans
Correct Answer is D
29. An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element ?
(A) 0.336 bits/baud
(B) 3 bits/baud
(C) 120,00,000 bits/baud
(D) None of the above
View/Hide Ans
Correct Answer is B
30. How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key ?
(A) 16
(B) 17
(C) 18
(D) 19
View/Hide Ans
Correct Answer is D
31. Shift-Reduce parsers perform the following :
(A) Shift step that advances in the input stream by K(K>1) symbols and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
(B) Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
(C) Shift step that advances in the input stream by K(K = 2) symbols and Reduce step that applies a completed grammar rule to form a single tree.
(D) Shift step that does not advance in the input stream and Reduce step that applies a completed grammar rule to form a single tree.
View/Hide Ans
Correct Answer is B
32. Which of the following is true ?
(A) Canonical LR parser is LR(1) parser with single look ahead terminal
(B) All LR(K) parsers with K>1 can be transformed into LR(1) parsers.
(C) Both (A) and (B)
(D) None of the above
View/Hide Ans
Correct Answer is C
33. In a two-pass assembler, symbol table is
(A) Generated in first pass
(B) Generated in second pass
(C) Not generated at all
(D) Generated and used only in second pass
View/Hide Ans
Correct Answer is A
34. Debugger is a program that
(A) allows to examine and modify the contents of registers
(B) does not allow execution of a segment of program
(C) allows to set breakpoints, execute a segment of program and display contents of register
(D) All of the above
View/Hide Ans
Correct Answer is A
35. The following Context-Free Grammar (CFG) :
S→aB | bA
A→a | as | bAA
B→b | bs | aBB
will generate
(A) odd numbers of a’s and odd numbers of b’s
(B) even numbers of a’s and even numbers of b’s
(C) equal numbers of a’s and b’s
(D) different numbers of a’s and b’s
View/Hide Ans
Correct Answer is A,B,C & D
36. Consider the following justifications for commonly using the two-level CPU scheduling :
I. It is used when memory is too small to hold all the ready processes.
II. Because its performance is same as that of the FIFO.
III. Because it facilitates putting some set of processes into memory and a choice is made from that.
IV. Because it does not allow to adjust the set of in-core processes.
Which of the following is true ?
(A) I, III and IV
(B) I and II
(C) III and IV
(D) I and III
View/Hide Ans
Correct Answer is D
37. A specific editor has 200 K of program text, 15 K of initial stack, 50 K of initialized data, and 70 K of bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared text is used ?
(A) 1135 K
(B) 335 K
(C) 1065 K
(D) 320 K
View/Hide Ans
Correct Answer is B
38. Which of the following conditions does not hold good for a solution to a critical section problem ?
(A) No assumptions may be made about speeds or the number of CPUs.
(B) No two processes may be simultaneously inside their critical sections.
(C) Processes running outside its critical section may block other processes.
(D) Processes do not wait forever to enter its critical section.
View/Hide Ans
Correct Answer is C
39. For the implementation of a paging scheme, suppose the average process size be x bytes, the page size be y bytes, and each page entry requires z bytes. The optimum page size that minimizes the total overhead due to the page table and the internal fragmentation loss is given by
(A) x/2
(B) xz/2
(C) √2xz
(D) (√xz)/2
View/Hide Ans
Correct Answer is C
40. In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced page is modified. What is the average access time to service a page fault assuming that the page to be replaced is modified 70% of the time ?
(A) 11.6 m.sec.
(B) 16.4 m.sec.
(C) 28 m.sec.
(D) 14 m.sec.
View/Hide Ans
Correct Answer is B
41. . ................... are applied throughout the software process.
(A) Framework activities
(B) Umbrella activities
(C) Planning activities
(D) Construction activities
View/Hide Ans
Correct Answer is B
42. Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level
(A) Performed
(B) Managed
(C) Defined
(D) Optimized
View/Hide Ans
Correct Answer is C
43. The software ................. of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them.
(A) Design
(B) Architecture
(C) Process
(D) Requirement
View/Hide Ans
Correct Answer is B
44. Which one of the following set of attributes should not be encompassed by effective software metrics ?
(A) Simple and computable
(B) Consistent and objective
(C) Consistent in the use of units and dimensions
(D) Programming language dependent
View/Hide Ans
Correct Answer is D
45. Which one of the following is used to compute cyclomatic complexity ?
(A) The number of regions - 1
(B) E - N + 1, where E is the number of flow graph edges and N is the number of flow graph nodes.
(C) P - 1, where P is the number of predicate nodes in the flow graph G.
(D) P + 1, where P is the number of predicate nodes in the flow graph G.
View/Hide Ans
Correct Answer is D
46. Consider the following statements S1 and S2 :
S1 : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell.
S2 : A soft handover is one in which the channel in the source cell is released and only then the channel in the target cell is engaged.
(A) S1 is true and S2 is not true.
(B) S1 is not true and S2 is true.
(C) Both S1 and S2 are true.
(D) Both S1 and S2 are not true.
View/Hide Ans
Correct Answer is D
47. Fact-less fact table in a data warehouse contains
(A) only measures
(B) only dimensions
(C) keys and measures
(D) only surrogate keys
View/Hide Ans
Correct Answer is D
48. Which e-business model allows consumers to name their own price for products and services ?
(A) B2B
(B)B2G
(C) C2C
(D) C2B
View/Hide Ans
Correct Answer is D
49. ............... model is designed to bring prices down by increasing the number of customers who buy a particular product at once
(A) Economic Order Quantity
(B) Inventory
(C) Data Mining
(D) Demand-Sensitive Pricing
View/Hide Ans
Correct Answer is D
50. Match the following :
Codes :
List I
List II
a. Call control protocol
i. Interface between Base Transceiver Station (BTS) and Base Station Controller (BSC)
b. A-bis
ii. Spread spectrum
c. BSMAP
iii. Connection management
d. CDMA
iv. Works between Mobile Switching Centre (MSC) and Base Station Subsystem (BSS)
(A) a-iii b-iv c-i d-ii
(B) a-iii b-i c-iv d-ii
(C) a-i b-ii c-iii d-iv
(D) a-iv b-iii c-ii d-i
View/Hide Ans
Correct Answer is B
1. A hierarchical memory system that uses cache memory has cache access time of 50 nano seconds, main memory access time of 300 nano seconds, 75% of memory requests are for read, hit ratio of 0.8 for read access and the write-through scheme is used. What will be the average access time of the system both for read and write requests ?
(A) 157.5 ns
(B) 110 ns
(C) 75 ns
(D) 82.5 ns
View/Hide Ans
Correct Answer is A
2. For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate
(A) Internal interrupts
(B) External interrupts
(C) Software interrupts
(D) None of the above
View/Hide Ans
Correct Answer is C
3. In a dot matrix printer the time to print a character is 6 m.sec., time to space in between characters is 2 m.sec., and the number of characters in a line are 200. The printing speed of the dot matrix printer in characters per second and the time to print a character line are given by which of the following options ?
(A) 125 chars/second and 0.8 seconds
(B) 250 chars/second and 0.6 seconds
(C) 166 chars/second and 0.8 seconds
(D) 250 chars/second and 0.4 seconds
View/Hide Ans
Correct Answer is A
4. Match the following 8085 instructions with the flags :
Codes :
List I
List II
a. XCHG
i. only carry flag is affected.
b. SUB
ii. no flags are affected.
c. STC
iii. all flags other than carry flag are affected.
d. DCR
iv. all flags are affected.
(A) a-iv b-i c-iii d-ii
(B) a-iii b-ii c-i d-iv
(C) a-ii b-iii c-i d-iv
(D) a-ii b-iv c-i d-iii
View/Hide Ans
Correct Answer is D
5. How many times will the following loop be executed ?
LXI B, 0007 H
LOP : DCX B
MOV A, B
ORA C
JNZ LOP
(A) 05
(B) 07
(C) 09
(D) 00
View/Hide Ans
Correct Answer is B
6. Specify the contents of the accumulator and the status of the S, Z and CY flags when 8085 microprocessor performs addition of 87 H and 79 H.
(A) 11, 1, 1, 1
(B) 10, 0, 1, 0
(C) 01, 1, 0, 0
(D) 00, 0, 1, 1
View/Hide Ans
Correct Answer is D
7. Location transparency allows :
I. Users to treat the data as if it is done at one location.
II. Programmers to treat the data as if it is at one location.
III. Managers to treat the data as if it is at one location.
Which one of the following is correct ?
(A) I, II and III
(B) I and II only
(C) II and III only
(D) II only
View/Hide Ans
Correct Answer is A
8. Which of the following is correct ?
I. Two phase locking is an optimistic protocol.
II. Two phase locking is pessimistic protocol
III. Time stamping is an optimistic protocol.
IV. Time stamping is pessimistic protocol.
(A) I and III
(B) II and IV
(C) I and IV
(D) II and III
View/Hide Ans
Correct Answer is D
9. ............... rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information.
(A) Write-ahead log
(B) Check-pointing
(C) Log buffer
(D) Thomas
View/Hide Ans
Correct Answer is D
10. Let R = ABCDE is a relational scheme with functional dependency set F = {A→B, B→C, AC→D}.
The attribute closures of A and E are
(A) ABCD, ∅
(B) ABCD, E
(C) ∅
(D) ABC, E
View/Hide Ans
Correct Answer is B
11. Consider the following statements :
I. Re-construction operation used in mixed fragmentation satisfies commutative rule.
II. Re-construction operation used in vertical fragmentation satisfies commutative rule
Which of the following is correct ?
(A) I
(B) II
(C) Both are correct
(D) None of the statements are correct.
View/Hide Ans
Correct Answer is D
12. Which of the following is false ?
(A) Every binary relation is never be in BCNF.
(B) Every BCNF relation is in 3NF.
(C) 1NF, 2NF, 3NF and BCNF are based on functional dependencies.
(D) Multivalued Dependency(MVD) is a special case of Join Dependency(JD).
View/Hide Ans
Correct Answer is A
13. Which of the following categories of languages do not refer to animation languages ?
(A) Graphical languages
(B) General-purpose languages
(C) Linear-list notations
(D) None of the above
View/Hide Ans
Correct Answer is D
14. Match the following :
Codes :
List I
List II
a. Tablet, Joystick
i. Continuous devices
b. Light Pen, Touch Screen
ii. Direct devices
c. Locator, Keyboard
iii. Logical devices
d. Data Globe, Sonic Pen
iv. 3D interaction devices
(A) a-ii b-i c-iv d-iii
(B) a-i b-iv c-iii d-ii
(C) a-i b-ii c-iii d-iv
(D) a-iv b-iii c-ii d-i
View/Hide Ans
Correct Answer is C
15. A technique used to approximate halftones without reducing spatial resolution is known as .................
(A) Halftoning
(B) Dithering
(C) Error diffusion
(D) None of the above
View/Hide Ans
Correct Answer is B
16. Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated by 45 degrees about a point P(–1, –1). The co-ordinates of the new triangle obtained after rotation shall be ..................
View/Hide Ans
Correct Answer is A
17. In Cyrus-Beck algorithm for line clipping the value of t parameter is computed by the relation :
(Here P1 and P2 are the two end points of the line, f is a point on the boundary, n1 is inner normal)
View/Hide Ans
Correct Answer is B
18. Match the following :
Codes :
List I
List II
a. Cavalier Projection
i. The direction of projection is chosen so that there is no foreshortening of lines perpendicular to the xy plane.
b. Cabinet Projection
ii. The direction of projection is chosen so that lines perpendicular to the xy planes are foreshortened by half their lengths.
c. Isometric Projection
iii. The direction of projection makes equal angles with all of the principal axis.
d. Orthographic Projection
iv. Projections are characterized by the fact that the direction of projection is perpendicular to the view plane.
(A) a-i b-iii c-iv d-ii
(B) a-ii b-iii c-i d-iv
(C) a-iv b-ii c-iii d-i
(D) a-i b-ii c-iii d-iv
View/Hide Ans
Correct Answer is D
19. Consider the following statements S1, S2 and S3 :
S1 : In call-by-value, anything that is passed into a function call is unchanged in the
caller’s scope when the function returns.
S2 : In call-by-reference, a function receives implicit reference to a variable used as
argument.
S3 : In call-by-reference, caller is unable to see the modified variable used as argument.
(A) S3 and S2 are true.
(B) S3 and S1 are true.
(C) S2 and S1 are true.
(D) S1, S2, S3 are true.
View/Hide Ans
Correct Answer is C
20. How many tokens will be generated by the scanner for the following statement ?
x = x * (a + b) - 5;
(A) 12
(B) 11
(C) 10
(D) 07
View/Hide Ans
Correct Answer is A
21. Which of the following statements is not true ?
(A) MPI_Isend and MPI_Irecv are non-blocking message passing routines of MPI.
(B) MPI_Issend and MPI_Ibsend are non-blocking message passing routines of MPI.
(C) MPI_Send and MPI_Recv are non-blocking message passing routines of MPI.
(D) MPI_Ssend and MPI_Bsend are blocking message passing routines of MPI.
View/Hide Ans
Correct Answer is C
22. The pushdown automation M = ({q0, q1, q2}, {a, b}, {0, 1}, δ, q0, 0, {q0}) with
δ(q0, a, 0) = {(q1, 10)}
δ(q1, a, 1) = {(q1, 11)}
δ(q1, b, 1) = {(q2, λ)}
δ(q2, b, 1) = {(q2, λ)}
δ(q2, λ, 0) = {(q0, λ)}
Accepts the language
(A) L = {an bm | n, m ≥ 0}
(B) L = {an bn | n ≥ 0}
(C) L = {an bm | n, m ≥ 0}
(D) L = {an bn | n ≥ 0}
View/Hide Ans
Correct Answer is B
23. Given two languages :
L1 = {(ab)n ak | n > k, k ≥ 0}
L2 = {an bm | n ≠ m}
Using pumping lemma for regular language, it can be shown that
(A) L1 is regular and L2 is not regular.
(B) L1 is not regular and L2 is regular.
(C) L1 is regular and L2 is regular.
(D) L1 is not regular and L2 is not regular.
View/Hide Ans
Correct Answer is D
24. Regular expression for the complement of language L = {an bm | n ≥ 4, m ≤ 3} is
(A) (a + b)* ba(a + b)*
(B) a*bbbbb*
(C) (λ + a + aa + aaa)b* + (a + b)*ba(a + b)*
(D) None of the above
View/Hide Ans
Correct Answer is D
25. For n devices in a network, .............. number of duplex-mode links are required for a mesh topology
(A) n(n + 1)
(B) n (n - 1)
(C) n(n + 1)/2
(D) n(n - 1)/2
View/Hide Ans
Correct Answer is D
26. How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous ? (Assuming 1 start bit and 1 stop bit)
(A) 300
(B) 320
(C) 360
(D) 400
View/Hide Ans
Correct Answer is B
27. Which of the following is not a field in TCP header ?
(A) Sequence number
(B) Fragment offset
(C) Checksum
(D) Window size
View/Hide Ans
Correct Answer is B
28. What is the propagation time if the distance between the two points is 48,000 ? Assume the propagation speed to be 2.4 × 108 metre/second in cable.
(A) 0.5 ms
(B) 20 ms
(C) 50 ms
(D) 200 ms
View/Hide Ans
Correct Answer is X
29. .............. is a bit-oriented protocol for communication over point-to-point and multipoint links
(A) Stop-and-wait
(B) HDLC
(C) Sliding window
(D) Go-back-N
View/Hide Ans
Correct Answer is B
30. Which one of the following is true for asymmetric-key cryptography ?
(A) Private key is kept by the receiver and public key is announced to the public.
(B) Public key is kept by the receiver and private key is announced to the public.
(C) Both private key and public key are kept by the receiver.
(D) Both private key and public key are announced to the public.
View/Hide Ans
Correct Answer is A
31. Any decision tree that sorts n elements has height
(A) Ω(n)
(B) Ω(lgn)
(C) Ω(nlgn)
(D) Ω(n2)
View/Hide Ans
Correct Answer is C
32. Match the following :
Codes :
List I
List II
a. Bucket sort
i. O(n3lgn)
b. Matrix chain multiplication
ii. O(n3)
c. Huffman codes
iii. O(nlgn)
d. All pairs shortest paths
iv. O(n)
(A) a-iv b-ii c-i d-iii
(B) a-ii b-iv c-i d-iii
(C) a-iv b-ii c-iii d-i
(D) a-iii b-ii c-iv d-i
View/Hide Ans
Correct Answer is C
33. We can show that the clique problem is NP-hard by proving that
(A) CLIQUE ≤ P 3-CNF_SAT
(B) CLIQUE ≤ P VERTEX_COVER
(C) CLIQUE ≤ P SUBSET_SUM
(D) None of the above
View/Hide Ans
Correct Answer is D
34. . Dijkstra algorithm, which solves the single-source shortest--paths problem, is a ................, and the Floyd-Warshall algorithm, which finds shortest paths between all pairs of vertices, is a ...............
(A) Greedy algorithm, Divide-conquer algorithm
(B) Divide-conquer algorithm, Greedy algorithm
(C) Greedy algorithm, Dynamic programming algorithm
(D) Dynamic programming algorithm, Greedy algorithm
View/Hide Ans
Correct Answer is C
35. Consider the problem of a chain <A1, A2, A3> of three matrices.
Suppose that the dimensions of the matrices are 10 × 100, 100 × 5 and 5 × 50 respectively. There are two different ways of parenthesization :
(i) ((A1 A2)A3) and (ii) (A1(A2 A3)).
Computing the product according to the first parenthesization is .................. times faster in comparison to the second parenthesization
(A) 5
(B) 10
(C) 20
(D) 100
View/Hide Ans
Correct Answer is B
36. Suppose that we have numbers between 1 and 1000 in a binary search tree and we want to search for the number 365. Which of the following sequences could not be the sequence of nodes examined ?
(A) 4, 254, 403, 400, 332, 346, 399, 365
(B) 926, 222, 913, 246, 900, 260, 364, 365
(C) 927, 204,913, 242, 914, 247, 365
(D) 4, 401, 389, 221, 268, 384, 383, 280, 365
View/Hide Ans
Correct Answer is C
37. Which methods are utilized to control the access to an object in multi-threaded programming ?
(A) Asynchronized methods
(B) Synchronized methods
(C) Serialized methods
(D) None of the above
View/Hide Ans
Correct Answer is B
38. How to express that some person keeps animals as pets ?
View/Hide Ans
Correct Answer is A
39. Converting a primitive type data into its corresponding wrapper class object instance is called
(A) Boxing
(B) Wrapping
(C) Instantiation
(D) Autoboxing
View/Hide Ans
Correct Answer is D
40. The behaviour of the document elements in XML can be defined by
(A) Using document object
(B) Registering appropriate event handlers
(C) Using element object
(D) All of the above
View/Hide Ans
Correct Answer is A
41. What is true about UML stereotypes ?
(A) Stereotype is used for extending the UML language.
(B) Stereotyped class must be abstract
(C) The stereotype indicates that the UML element cannot be changed
(D) UML profiles can be stereotyped for backward compatibility
View/Hide Ans
Correct Answer is A
42. Which method is called first by an applet program ?
(A) start( )
(B) run( )
(C) init( )
(D) begin( )
View/Hide Ans
Correct Answer is C
43. Which one of the following is not a source code metric ?
(A) Halstead metric
(B) Function point metric
(C) Complexity metric
(D) Length metric
View/Hide Ans
Correct Answer is B
44. To compute function points (FP), the following relationship is used
FP = Count - total × (0.65 + 0.01 × ∑ (Fi)) where Fi (i = 1 to n) are value adjustment factors(VAF) based on n questions. The value of n is
(A) 12
(B) 14
(C) 16
(D) 18
View/Hide Ans
Correct Answer is B
45. Assume that the software team defines a project risk with 80% probability of occurrence of risk in the following manner :
Only 70 percent of the software components scheduled for reuse will be integrated into the application and the remaining functionality will have to be custom developed. If 60 reusable components were planned with average component size as 100 LOC and software engineering cost for each LOC as $ 14, then the risk exposure would be
(A) $ 25,200
(B) $ 20,160
(C) $ 17,640
(D) $ 15,120
View/Hide Ans
Correct Answer is B
46. Maximum possible value of reliability is
(A) 100
(B) 10
(C) 1
(D) 0
View/Hide Ans
Correct Answer is C
47. ‘FAN IN’ of a component A is defined as
(A) Count of the number of components that can call, or pass control, to a component A
(B) Number of components related to component A
(C) Number of components dependent on component A
(D) None of the above
View/Hide Ans
Correct Answer is A
48. Temporal cohesion means
(A) Coincidental cohesion
(B) Cohesion between temporary variables
(C) Cohesion between local variables
(D) Cohesion with respect to time
View/Hide Ans
Correct Answer is D
49. Various storage devices used by an operating system can be arranged as follows in increasing order of accessing speed :
(A) Magnetic tapes → magnetic disks → optical disks → electronic disks → main memory → cache → registers
(B) Magnetic tapes → magnetic disks → electronic disks → optical disks → main memory → cache → registers
(C) Magnetic tapes → electronic disks → magnetic disks → optical disks → main memory → cache → registers
(D) Magnetic tapes → optical disks → magnetic disks → electronic disks → main memory → cache → registers
View/Hide Ans
Correct Answer is D
50. How many disk blocks are required to keep list of free disk blocks in a 16 GB hard disk with 1 KB block size using linked list of free disk blocks ? Assume that the disk block number is stored in 32 bits.
(A) 1024 blocks
(B) 16794 blocks
(C) 20000 blocks
(D) 1048576 blocks
View/Hide Ans
Correct Answer is X
51. Consider an imaginary disk with 40 cylinders. A request come to read a block on cylinder 11. While the seek to cylinder 11 is in progress, new requests come in for cylinders 1, 36, 16, 34, 9 and 12 in that order. The number of arm motions using shortest seek first algorithm is
(A) 111
(B) 112
(C) 60
(D) 61
View/Hide Ans
Correct Answer is D
52. An operating system has 13 tape drives. There are three processes P1, P2 & P3. Maximum requirement of P1 is 11 tape drives, P2 is 5 tape drives and P3 is 8 tape drives. Currently, P1 is allocated 6 tape drives, P2 is allocated 3 tape drives and P3 is allocated 2 tape drives. Which of the following sequences represent a safe state ?
(A) P2 P1 P3
(B) P2 P3 P1
(C) P1 P2 P3
(D) P1 P3 P2
View/Hide Ans
Correct Answer is A
53. Monitor is an Interprocess Communication (IPC) technique which can be described as
(A) It is higher level synchronization primitive and is a collection of procedures, variables, and data structures grouped together in a special package.
(B) It is a non-negative integer which apart from initialization can be acted upon by wait and signal operations.
(C) It uses two primitives, send and receive which are system calls rather than language constructs.
(D) It consists of the IPC primitives implemented as system calls to block the process when they are not allowed to enter critical region to save CPU time.
View/Hide Ans
Correct Answer is A
54. In a distributed computing environment, distributed shared memory is used which is
(A) Logical combination of virtual memories on the nodes.
(B) Logical combination of physical memories on the nodes.
(C) Logical combination of the secondary memories on all the nodes.
(D) All of the above
View/Hide Ans
Correct Answer is B
55. Equivalent logical expression for the Well Formed Formula (WFF),
~(∀x) F[x]
is
(A) ∀x (~F[x])
(B) ~(∃x) F[x]
(C) ∃x (~F[x])
(D) ∀x F[x]
View/Hide Ans
Correct Answer is C
56. An A* algorithm is a heuristic search technique which
(A) is like a depth-first search where most promising child is selected for expansion
(B) generates all successor nodes and computes an estimate of distance (cost) from start node to a goal node through each of the successors. It then chooses the successor with shortest cost.
(C) saves all path lengths (costs) from start node to all generated nodes and chooses shortest path for further expansion.
(D) none of the above
View/Hide Ans
Correct Answer is B
57. The resolvent of the set of clauses
(A ∨ B, ~A ∨ D, C ∨ ~B) is
(A) A ∨ B
(B) C ∨ D
(C) A ∨ C
(D) A ∨ D
View/Hide Ans
Correct Answer is B
58. . Match the following :
Codes :
List I
List II
a. Script
i. Directed graph with labelled nodes for graphical representation of knowledge
b. Conceptual Dependencies
ii. Knowledge about objects and events is stored in record-like structures consisting of slots and slot values.
c. Frames
iii. Primitive concepts and rules to represent natural language statements
d. Associative Network
iv. Frame like structures used to represent stereotypical patterns for commonly occurring events in terms of actors, roles, props and scenes
(A) a-iv b-ii c-i d-iii
(B) a-iv b-iii c-ii d-i
(C) a-ii b-iii c-iv d-i
(D) a-i b-iii c-iv d-ii
View/Hide Ans
Correct Answer is B
59. . Match the following components of an expert system :
Codes :
List I
List II
a. I/O interface
i. Accepts user’s queries and responds to question through I/O interface
b. Explanation module
ii. Contains facts and rules about the domain
c. Inference engine
iii. Gives the user, the ability to follow inferencing steps at any time during consultation
d. Knowledge base
iv. Permits the user to communicate with the system in a natural way
(A) a-i b-iii c-iv d-ii
(B) a-iv b-iii c-i d-ii
(C) a-i b-iii c-ii d-iv
(D) a-iv b-i c-iii d-ii
View/Hide Ans
Correct Answer is B
60. A computer based information system is needed :
I. as it is difficult for administrative staff to process data.
II. due to rapid growth of information and communication technology.
III. due to growing size of organizations which need to process large volume of data.
IV. as timely and accurate decisions are to be taken.
Which of the above statement(s) is/are true ?
(A) I and II
(B) III and IV
(C) II and III
(D) II and IV
View/Hide Ans
Correct Answer is B
61. . Given the recursively enumerable language (LRE), the context sensitive language (LCS), the recursive language (LREC), the context free language (LCF) and deterministic context free language (LDCF). The relationship between these families is given by
(A) LCF ⊆ LDCF ⊆ LCS ⊆ LRE ⊆ LREC
(B) LCF⊆ LDCF ⊆ LCS ⊆ LREC ⊆ LRE
(C) LDCF ⊆ LCF ⊆ LCS ⊆ LRE ⊆ LREC
(D) LDCF ⊆ LCF ⊆ LCS ⊆ LREC ⊆ LRE
View/Hide Ans
Correct Answer is D
62. Match the following :
Codes :
List I
List II
a. Context free grammar
i. Linear bounded automaton
b. Regular grammar
ii. Pushdown automaton
c. Context sensitive grammar
iii. Turing machine
d. Unrestricted grammar
iv. Deterministic finite automaton
(A) a-ii b-iv c-iii d-i
(B) a-ii b-iv c-i d-iii
(C) a-iv b-i c-ii d-iii
(D) a-i b-iv c-iii d-ii
View/Hide Ans
Correct Answer is B
63. According to pumping lemma for context free languages :
Let L be an infinite context free language, then there exists some positive integer m such that any w ∈ L with |w|≥m can be decomposed as w = u v x y z
(A) with | vxy | ≤ m such that uvi xyi z∈L for all i = 0, 1, 2
(B) with | vxy | ≤ m, and | vy | ≥ 1, such that uvi xyi z∈L for all i = 0, 1, 2, ...
(C) with | vxy | ≥ m, and | vy | ≤ 1, such that uvi xyi z∈L for all i = 0, 1, 2, ...
(D) with | vxy | ≥ m, and | vy | ≥ 1, such that uvi xyi z∈L for all i = 0, 1, 2, ...
View/Hide Ans
Correct Answer is B
64. Given two spatial masks
65. Given a simple image of size 10 × 10 whose histogram models the symbol probabilities and is given by
66. A Butterworth lowpass filter of order n, with a cutoff frequency at distance D0 from the origin, has the transfer function H(u, v) given by
View/Hide Ans
Correct Answer is A
67. If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is
(A) Optimum
(B) Infeasible
(C) Unbounded
(D) Degenerate
View/Hide Ans
Correct Answer is B
68. The occurrence of degeneracy while solving a transportation problem means that
(A) total supply equals total demand
(B) total supply does not equal total demand
(C) the solution so obtained is not feasible
(D) none of these
View/Hide Ans
Correct Answer is C
69. . Five men are available to do five different jobs. From past records, the time (in hours) that each man takes to do each job is known and is given in the following table :
70. Consider the following statements about a perception :
I. Feature detector can be any function of the input parameters.
II. Learning procedure only adjusts the connection weights to the output layer.
Identify the correct statement out of the following :
(A) I is false and II is false.
(B) I is true and II is false.
(C) I is false and II is true.
(D) I is true and II is true.
View/Hide Ans
Correct Answer is D
71. A ............... point of a fuzzy set A is a point x∈X at which μA(x) = 0.5
(A) core
(B) support
(C) crossover
(D) ∝-cut
View/Hide Ans
Correct Answer is C
72. Match the following learning modes w.r.t. characteristics of available information for learning :
Codes :
List I
List II
a. Supervised
i. Instructive information on desired responses, explicitly specified by a teacher.
b. Recording
ii. A priori design information for memory storing
c. Reinforcement
iii. Partial information about desired responses, or only “right” or “wrong” evaluative information
d. Unsupervised
iv. No information about desired responses
(A) a-i b-ii c-iii d-iv
(B) a-i b-iii c-ii d-iv
(C) a-ii b-iv c-iii d-i
(D) a-ii b-iii c-iv d-i
View/Hide Ans
Correct Answer is A
73. Which of the following versions of Windows O.S. contain built-in partition manager which allows us to shrink and expand pre-defined drives ?
(A) Windows Vista
(B) Windows 2000
(C) Windows NT
(D) Windows 98
View/Hide Ans
Correct Answer is A
74. A Trojan horse is
(A) A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation.
(B) A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred.
(C) A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
(D) All of the above
View/Hide Ans
Correct Answer is A
75. Which of the following computing models is not an example of distributed computing environment ?
(A) Cloud computing
(B) Parallel computing
(C) Cluster computing
(D) Peer-to-peer computing
View/Hide Ans
Correct Answer is B
© 2022. All Rights Reserved | Copyright | Terms of Use & Privacy Policy