It is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change.
1. How many committees of five people can be chosen from 20 men and 12 women such that each committee contains at least three women?
(A) 75240
(B) 52492
(C) 41800
(D) 9900
View/Hide Ans
Correct Answer is B
2. Which of the following statement(s) is/are false?
(a) A connected multigraph has an Euler Circuit if and only if each of its vertices has even degree.
(b) A connected multigraph has an Euler Path but not an Euler Circuit if and only if it has exactly two vertices of odd degree.
(c) A complete graph (Kn) has a Hamilton Circuit whenever n≥3
(d) A cycle over six vertices (C6) is not a bipartite graph but a complete graph over 3 vertices is bipartite.
Codes:
(A) (a) only
(B) (b) and (c)
(C) (c) only
(D) (d) only
View/Hide Ans
Correct Answer is D
3. Which of the following is/are not true?
(a) The set of negative integers is countable.
(b) The set of integers that are multiples of 7 is countable.
(c) The set of even integers is countable.
(d) The set of real numbers between 0 and 1/2 is countable.
(A) (a) and (c)
(B) (b) and (d)
(C) (b) only
(D) (d) only
View/Hide Ans
Correct Answer is D
4. Consider the graph given below:
The two distinct sets of vertices, which make the graph bipartite are:
(A) (v1, v4, v6); (v2, v3, v5, v7, v8)
(B) (v1, v7, v8); (v2, v3, v5, v6)
(C) (v1, v4, v6, v7); (v2, v3, v5, v8)
(D) (v1, v4, v6, v7, v8); (v2, v3, v5)
View/Hide Ans
Correct Answer is C
5. A tree with n vertices is called graceful, if its vertices can be labelled with integers 1, 2, ...,n such that the absolute value of the difference of the labels of adjacent vertices are all different. Which of the following trees are graceful?
Codes:
(A) (a) and (b)
(B) (b) and (c)
(C) (a) and (c)
(D) (a), (b) and (c)
View/Hide Ans
Correct Answer is D
6. Which of the following arguments are not valid?
(a) “If Gora gets the job and works hard, then he will be promoted. If Gora gets promotion, then he will be happy. He will not be happy, therefore, either he will not get the job or he will not work hard”.
(b) “Either Puneet is not guilty or Pankaj is telling the truth. Pankaj is not telling the truth, therefore, Puneet is not guilty”.
(c) If n is a real number such that n>1, then n2>1. Suppose that n2>1, then n>1.
Codes:
(A) (a) and (c)
(B) (b) and (c)
(C) (a), (b) and (c)
(D) (a) and (b)
View/Hide Ans
Correct Answer is A
7. Let P(m,n) be the statement “m divides n” where the Universe of discourse for both the variables is the set of positive integers. Determine the truth values of the following propositions.
(a) ∃m ∀n P(m,n)
(b) ∀n P(1,n)
(c) ∀m ∀n P(m,n)
(A) (a)-True; (b)-True; (c)-False
(B) (a)-True; (b)-False; (c)-False
(C) (a)-False; (b)-False; (c)-False
(D) (a)-True; (b)-True; (c)-True
View/Hide Ans
Correct Answer is A
8. Match the following terms:
Codes:
List - I
List - II
(a) Vacuous proof
(i) A proof that the implication p→q is true based on the fact that p is false
(b) Trivial proof
(ii) A proof that the implication p→q is true based on the fact that q is true
(c) Direct proof
(iii) A proof that the implication p→q is true that proceeds by showing that q must be true when p is true.
(d) Indirect proof
(iv) A proof that the implication p→q is true that proceeds by showing that p must be false when q is false.
(A) (a-i) (b-ii) (c-iii) (d-iv)
(B) (a-ii) (b-iii) (c-i) (d-iv)
(C) (a-iii) (b-ii) (c-iv) (d-i)
(D) (a-iv) (b-iii) (c-ii) (d-i)
View/Hide Ans
Correct Answer is A
9. Consider the compound propositions given below as:
(a) p ∨ ~(p ∧ q)
(b) (p ∧ ~q) ∨ ~(p ∧ q)
(c) p ∧(q ∨ r)
Which of the above propositions are tautologies?
(A) (a) and (c)
(B) (b) and (c)
(C) (a) and (b)
(D) (a), (b) and (c)
View/Hide Ans
All options wrong! Correct Answer is only (a)
10. Which of the following property/ies a Group G must hold, in order to be an Abelian group?
(a) The distributive property
(b) The commutative property
(c) The symmetric property
Codes:
(A) (a) and (b)
(B) (b) and (c)
(C) (a) only
(D) (b) only
View/Hide Ans
Correct Answer is D
11. Consider the following program:
#include <stdio.h>
main()
{
    int i, inp;
    float x, term=1, sum=0;
    scanf(“%d %f”,&inp, &x);
    for(i=1;i<=inp;i++)
    {
          term=term*x/i;
          sum=sum+term;
    }
    printf(“Result=%f\n”,sum);
}
The program computes the sum of which of the following series?
(A) x+x2/2+x3/3+x4/4+...
(B) x+x2/2!+x3/3!+x4/4!+...
(C) 1+x2/2+x3/3+x4/4+...
(D) 1+x2/2!+x3/3!+x4/4!+...
View/Hide Ans
Correct Answer is B
12. Consider the following two statements:
(a) A publicly derived class is a subtype of its base class.
(b) Inheritance provides for code reuse.
Which of the following statements is correct?
(A) Both the statements (a) and (b) are correct
(B) Neither of the statements (a) and (b) are correct
(C) Statement (a) is correct and (b) is incorrect
(D) Statement (a) is incorrect and (b) is correct
View/Hide Ans
Correct Answer is A
13. Consider a “CUSTOMERS” database table having a column “CITY” filled with all the names of Indian cities (in capital letters). The SQL statement that finds all cities that have “GAR” somewhere in its name, is:
(A) Select * from customers where city=’%GAR%’;
(B) Select * from customers where city=’$GAR$’;
(C) Select * from customers where city like ‘%GAR%’;
(D) Select * from customers where city as ’%GAR’;
View/Hide Ans
Correct Answer is C
14. Match the following database terms to their functions:
Codes:
List-I
List-II
(a) Normalization
(i) Enforces match of primary key to foreign key
(b) Data Dictionary
(ii) Reduces data redundancy in a database
(c) Referential Integrity
(iii) Define view(s) of the database for particular user(s).
(d) External Schema
(iv) Contains metadata describing database structure.
(A) (a-iv) (b-iii) (c-i) (d-ii)
(B) (a-ii) (b-iv) (c-i) (d-iii)
(C) (a-ii) (b-iv) (c-iii) (d-i)
(D) (a-iv) (b-iii) (c-ii) (d-i)
View/Hide Ans
Correct Answer is B
15. In general, in a recursive and non-recursive implementation of a problem (program):
(A) Both time and space complexities are better in recursive than in non-recursive program
(B) Both time and space complexities are better in non-recursive than in recursive program
(C) Time complexity is better in recursive version but space complexity is better in non-recursive version of the program
(D) Space complexity is better in recursive version but time complexity is better in non-recursive version of the program
View/Hide Ans
Correct Answer is C
16. A three dimensional array in ‘C’ is declared as int A[x][y][z]. Here, the address of an item at the location A[p][q][r] can be computed as follows (where w is the word length of an integer):
(A) &A[0][0][0]+w(y*z*q+z*p+r)
(B) &A[0][0][0]+w(y*z*p+z*q+r)
(C) &A[0][0][0]+w(x*y*p+z*q+r)
(D) &A[0][0][0]+w(x*y*q+z*p+r)
View/Hide Ans
Correct Answer is B
17. In C++, which system-provided function is called when no handler is provided to deal with an exception?
(A) terminate()
(B) unexpected()
(C) abort()
(D) kill()
View/Hide Ans
Correct Answer is A
18. Which of the following provides the best description of an entity type?
(A) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes)
(B) A value given to a particular attribute (e.g. height-230 cm)
(C) A thing that we wish to collect data about zero or more, possibly real world examples of it may exist.
(D) A template for a group of things with the same set of characteristics that may exist in the real world
View/Hide Ans
Correct Answer is D
19. Data which improves the performance and accessibility of the database are called:
(A) Indexes
(B) User Data
(C) Application Metadata
(D) Data Dictionary
View/Hide Ans
Correct Answer is A
20. A relation R={A,B,C,D,E,F,G} is given with following set of functional dependencies:
F={AD→E, BE→F, B→C, AF→G}
Which of the following is a candidate key?
(A) A
(B) AB
(C) ABC
(D) ABD
View/Hide Ans
Correct Answer is D
21. Which of the following services is not provided by wireless access point in 802.11 WLAN?
(A) Association
(B) Disassociation
(C) Error Correction
(D) Integration
View/Hide Ans
Correct Answer is C
22. Which of the following fields in IPv4 datagram is not related to fragmentation?
(A) Type of service
(B) Fragment offset
(C) Flags
(D) Identification
View/Hide Ans
Correct Answer is A
23. Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is ...............
(A) 400 bps
(B) 800 bps
(C) 1600 bps
(D) 3200 bps
View/Hide Ans
Correct Answer is D
24. In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent cells. If 840 frequencies are available, how many can be used in a given cell?
(A) 280
(B) 210
(C) 140
(D) 120
View/Hide Ans
Correct Answer is A
25. Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5?
(A) 13
(B) 21
(C) 26
(D) 33
View/Hide Ans
All options wrong! Correct Answer is 8
26. A virtual memory has a page size of 1K words. There are eight pages and four blocks. The associative memory page table contains the following entries:
27. Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also doubled. Further, consider that a normal instruction takes one micro second, but if a page fault occurs, it takes 2001 micro seconds. If a program takes 60 sec to run, during which time it gets 15000 page faults, how long would it take to run if twice as much memory were available?
(A) 60 sec
(B) 30 sec
(C) 45 sec
(D) 10 sec
View/Hide Ans
Correct Answer is C
28. Consider a disk with 16384 bytes per track having a rotation time of 16 msec and average seek time of 40 msec. What is the time in msec to read a block of 1024 bytes from this disk?
(A) 57 msec
(B) 49 msec
(C) 48 msec
(D) 17 msec
View/Hide Ans
Correct Answer is B
29. A system has four processes and five allocatable resources. The current allocation and maximum needs are as follows:
30. In Unix, the login prompt can be changed by changing the contents of the file ...............
(A) contrab
(B) init
(C) gettydefs
(D) inittab
View/Hide Ans
Correct Answer is C
31. A data cube C, has n dimensions, and each dimension has exactly p distinct values in the base cuboid. Assume that there are no concept hierarchies associated with the dimensions. What is the maximum number of cells possible in the data cube, C?
(A) pn
(B) p
(C) (2n -1)p+1
(D) (p+1)n
View/Hide Ans
Correct Answer is D
32. Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the time, that the proportion of persons having meningitis is 1/50000, and that the proportion of people having stiff neck is 1/20. Then the percentage of people who had meningitis and complain about stiff neck is:
(A) 0.01%
(B) 0.02%
(C) 0.04%
(D) 0.05%
View/Hide Ans
Correct Answer is B
33. ................. system is market oriented and is used for data analysis by knowledge workers including Managers, Executives and Analysts.
(A) OLTP
(B) OLAP
(C) Data System
(D) Market System
View/Hide Ans
Correct Answer is B
34. .................. allows selection of the relevant information necessary for the data warehouse.
(A) The Top-Down View
(B) Data Warehouse View
(C) Data source View
(D) Business Query View
View/Hide Ans
Correct Answer is A
35. The hash function used in double hashing is of the form:
(A) h(k, i)=(h1(k)+h2(k)+i)mod m
(B) h(k, i)=(h1(k)+h2(k)-i)mod m
(C) h(k, i)=(h1(k)+ih2(k))mod m
(D) h(k, i)=(h1(k)-ih2(k))mod m
View/Hide Ans
Correct Answer is C
36. In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are shown as x/y where x is discovery time stamp and y is finishing time stamp.
37. The number of disk pages access in B-tree search, where h is height, n is the number of keys, and t is the minimum degree, is:
(A) θ(logn h*t)
(B) θ(logt n*h)
(C) θ(logh n)
(D) θ(logt n)
View/Hide Ans
Correct Answer is D
38. The inorder traversal of the following tree is:
39. An ideal sort is an in-place-sort whose additional space requirement is ...............
(A) O(log2n)
(B) O(nlog2n)
(C) O(1)
(D) O(n)
View/Hide Ans
Correct Answer is C
40. Which of the following is not a congestion policy at network layer?
(A) Flow Control Policy
(B) Packet Discard Policy
(C) Packet Lifetime Management Policy
(D) Routing Algorithm
View/Hide Ans
Correct Answer is A
41. Loop unrolling is a code optimization technique:
(A) that avoids tests at every iteration of the loop
(B) that improves performance by decreasing the number of instructions in a basic block.
(C) that exchanges inner loops with outer loops
(D) that reorders operations to allow multiple computations to happen in parallel.
View/Hide Ans
Correct Answer is A
42. What will be the hexadecimal value in the register ax (32-bit) after executing the following instructions?
    Mov al, 15
    Mov ah, 15
    Xor al, al
    Mov cl, 3
    Shr ax, cl
Codes:
(A) 0F00 h
(B) 0F0F h
(C) 01E0 h
(D) FFFF h
View/Hide Ans
Correct Answer is C
43. Which of the following statements is false?
(A) Top-down parsers are LL parsers where first L stands for left-to-right scan and second L stands for a leftmost derivation.
(B) (000)* is a regular expression that matches only strings containing an odd number of zeroes, including the empty string.
(C) Bottom-up parsers are in the LR family, where L stands for left-to-right scan and R stands for rightmost derivation
(D) The class of context-free languages is closed under reversal. That is, if L is any context-free language, then the language LR={WR:w∈L} is context free.
View/Hide Ans
Correct Answer is B
44. System calls are usually invoked by using:
(A) A privileged instruction
(B) An indirect jump
(C) A software interrupt
(D) Polling
View/Hide Ans
Correct Answer is C
45. The ............... transfers the executable image of a C++ program from hard disk to main memory.
(A) Compiler
(B) Linker
(C) Debugger
(D) Loader
View/Hide Ans
Correct Answer is D
46. In software testing, how the error, fault and failure are related to each other?
(A) Error leads to failure but fault is not related to error and failure
(B) Fault leads to failure but error is not related to fault and failure
(C) Error leads to fault and fault leads to failure
(D) Fault leads to error and error leads to failure
View/Hide Ans
Correct Answer is C
47. Which of the following is not a software process model?
(A) Prototyping
(B) Iterative
(C) Timeboxing
(D) Glassboxing
View/Hide Ans
Correct Answer is D
48. How many solutions are there for the equation x+y+z+u=29 subject to the constraints that x≥1, y≥2, z≥3 and u≥0?
(A) 4960
(B) 2600
(C) 23751
(D) 8855
View/Hide Ans
Correct Answer is B
49. A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contain 10 direct entries and one single, double and triple indirect entry each?
(A) 32 GB
(B) 64 GB
(C) 16 GB
(D) 1 GB
View/Hide Ans
Correct Answer is C
50. ................ uses electronic means to transfer funds directly from one account to another rather than by cheque or cash?
(A) M-Banking
(B) E-Banking
(C) O-Banking
(D) C-Banking
View/Hide Ans
Correct Answer is B
1. The three outputs x1x2x3 from the 8x3 priority encoder are used to provide a vector address of the form 101x1x2x300. What is the second highest priority vector address in hexadecimal if the vector addresses are starting from the one with the highest priority?
(A) BC
(B) A4
(C) BD
(D) AC
View/Hide Ans
Correct Answer is B
2. What will be the output at PORT1 if the following program is executed?
      MVI B, 82H
      MOV A, B
      MOV C, A
      MVI D, 37H
      OUT PORT1
      HLT
(A) 37H
(B) 82H
(C) B9H
(D) 00H
View/Hide Ans
Correct Answer is B
3. Which of the following 8085 microprocessor hardware interrupt has the lowest priority?
(A) RST 6.5
(B) RST 7.5
(C) TRAP
(D) INTR
View/Hide Ans
Correct Answer is D
4. A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 nsec and a memory cycle requires 250 nsec. What percentage of memory’s total operating time is required for refreshes?
(A) 0.64
(B) 0.96
(C) 2.00
(D) 0.32
View/Hide Ans
Correct Answer is D
5. A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average rate of one million instructions per second. By how much will the CPU be slowed down because of the DMA transfer?
(A) 0.06%
(B) 0.12%
(C) 1.2%
(D) 2.5%
View/Hide Ans
Correct Answer is B
6. A CPU handles interrupt by executing interrupt service subroutine.................
(A) by checking interrupt register after execution of each instruction
(B) by checking interrupt register at the end of the fetch cycle
(C) whenever an interrupt is registered
(D) by checking interrupt register at regular time interval
View/Hide Ans
Correct Answer is A
7. Given the following set of prolog clauses:
      father(X, Y):
      parent(X, Y),
      male(X),
      parent(Sally, Bob),
      parent(Jim, Bob),
      parent(Alice, Jane),
      parent(Thomas, Jane),
      male(Bob),
      male(Jim),
      female(Salley),
      female(Alice).
How many atoms are matched to the variable ‘X’ before the query father(X, Jane) reports a Result?
(A) 1
(B) 2
(C) 3
(D) 4
View/Hide Ans
Correct Answer is X
8. Forward chaining systems are ............. where as backward chaining systems are ................
(A) Data driven, Data driven
(B) Goal driven, Data driven
(C) Data driven, Goal driven
(D) Goal driven, Goal driven
View/Hide Ans
Correct Answer is C
9. Match the following w.r.t. programming languages:
Codes:
List - I
List – II
(a) JAVA
(i) Dynamically object oriented
(b) Python
(ii) Statically Non-object oriented
(c) Prolog
(iii) Statically object oriented
(d) ADA
(iv) Dynamically non-object oriented
(A) (a-iii) (b-i) (c-ii) (d-iv)
(B) (a-i) (b-iii) (c-ii) (d-iv)
(C) (a-i) (b-iii) (c-iv) (d-ii)
(D) (a-ii) (b-iv) (c-i) (d-iii)
View/Hide Ans
Correct Answer is X
10. The combination of an IP address and a port number is known as ...................
(A) network number
(B) socket address
(C) subnet mask number
(D) MAC address
View/Hide Ans
Correct Answer is B
11. A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this n
(A) 2 Mbps
(B) 60 Mbps
(C) 120 Mbps
(D) 10 Mbps
View/Hide Ans
Correct Answer is A
12. Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ...................
(A) 25
(B) 27
(C) 53
(D) 72
View/Hide Ans
Correct Answer is A
13. In a classful addressing, the IP addresses with 0 (zero) as network number:
(A) refers to the current network
(B) refers to broadcast on the local network
(C) refers to broadcast on a distant network
(D) refers to loopback testing
View/Hide Ans
Correct Answer is B
14. In electronic mail, which of the following protocols allows the transfer of multimedia
messages?
(A) IMAP
(B) SMTP
(C) POP3
(D) MIME
View/Hide Ans
Correct Answer is D
15. A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ?
(A) 50
(B) 200
(C) 400
(D) 800
View/Hide Ans
Correct Answer is C
16. In Activity-Selection problem, each activity i has a start time si and a finish time fi where si<=fi. Activities i and j are compatible if:
(A) si≥fj
(B) sj≥fi
(C) si≥fj or sj≥fi
(D) si≥fj and sj≥fi
View/Hide Ans
Correct Answer is C
17. Given two sequences X and Y:
X = (a, b, c, b, d, a, b)
Y = (b, d, c, a, b, a)
The longest common subsequence of X and Y is:
(A) < b, c, a >
(B) < c, a, b >
(C) < b, c, a, a >
(D) < b, c, b, a >
View/Hide Ans
Correct Answer is D
18. If there are n integers to sort, each integer has d digits and each digit is in the set {1,2, ..., k}, radix sort can sort the numbers in:
(A) O(d n k)
(B) O(d nk)
(C) O((d+n)k)
(D) O(d(n+k))
View/Hide Ans
Correct Answer is D
19. The solution of the recurrence relation
20. Floyd-Warshall algorithm utilizes ............... to solve the all-pairs shortest paths problem on a directed graph in ................ time.
(A) Greedy algorithm, θ(V3)
(B) Greedy algorithm, θ(V2 lgn)
(C) Dynamic programming, θ(V3)
(D) Dynamic programming, θ(V2 lgn)
View/Hide Ans
Correct Answer is C
21. Let n=4 and (a1, a2, a3, a4) = (do, if, int, while). Let p(1:4) = (3/8, 3/8, 1/8, 1/8) and q(1:4) = (2/8, 3/8, 1/8, 1/8, 1/8) where p(i) and q(i) denotes the probability with which we search ai and the identifier x being searched satisfy ai < x < ai+1 respectively. The optimal search tree is given by:
View/Hide Ans
Correct Answer is B
22. The family of context sensitive languages is ................. under union and ................. under reversal.
(A) closed, not closed
(B) not closed, not closed
(C) closed, closed
(D) not closed, closed
View/Hide Ans
Correct Answer is C
23. Match the following :
Codes :
List - I
List - II
(a) {an bn|n > 0} is a deterministic
(i) but not recursive language CFL
(b) The complement of {an bn an|n > 0}
(ii) but not CFL is a CFL
(c) {an bn an} is CSL
(iii) but can not be accepted by a DPDA
(d) L is a recursive language
(iv) but not regular
(A) (a-i) (b-ii) (c-iii) (d-iv)
(B) (a-i) (b-ii) (c-iv) (d-iii)
(C) (a-iv) (b-iii) (c-ii) (d-i)
(D) (a-iv) (b-iii) (c-i) (d-ii)
View/Hide Ans
Correct Answer is X
24. The language of all non-null strings of a’s can be defined by a context free grammar as
follow :
S→a S|S a| a
The word a3 can be generated by ................ different trees.
(A) Two
(B) Three
(C) Four
(D) Five
View/Hide Ans
Correct Answer is C
25. Which one of the following non-functional quality attributes is not highly affected by the
architecture of the software ?
(A) Performance
(B) Reliability
(C) Usability
(D) Portability
View/Hide Ans
Correct Answer is C
26. The context free grammar given by
S→XYX
X→aX|bX|λ
Y→bbb
generates the language which is defined by regular expression:
(A) (a+b)*bbb
(B) abbb(a+b)*
(C) (a+b)*(bbb)(a+b)*
(D) (a+b)(bbb)(a+b)*
View/Hide Ans
Correct Answer is C
27. There are exactly ................ different finite automata with three states x, y and z over the alphabet {a, b} where x is always the start state.
(A) 64
(B) 256
(C) 1024
(D) 5832
View/Hide Ans
Correct Answer is D
28. Given the following two languages :
L1={anban|n>0}
L2={anbanbn+1|n>0}
Which of the following is correct?
(A) L1 is context free language and L2 is not context free language
(B) L1 is not context free language and L2 is context free language
(C) Both L1 and L2 are context free languages
(D) Both L1 and L2 are not context free languages
View/Hide Ans
Correct Answer is A
29. Which of the following is used to make an Abstract class ?
(A) Making atleast one member function as pure virtual function
(B) Making atleast one member function as virtual function
(C) Declaring as Abstract class using virtual keyword
(D) Declaring as Abstract class using static keyword
View/Hide Ans
Correct Answer is A
30. Match the following with reference to object oriented modelling :
Codes :
List - I
List - II
(a)Polymorphism
(i)Picking both operator & attributes with operations appropriate to model an object
(b)Inheritance
(ii)Hiding implementation details of methods from users of objects
(c)Encapsulation
(iii)Using similar operations to do similar things
(d)Abstraction
(iv)Create new classes from existing class
(A) (a-iv) (b-iii) (c-i) (d-ii)
(B) (a-iii) (b-iv) (c-i) (d-ii)
(C) (a-iii) (b-i) (c-ii) (d-iv)
(D) (a-iv) (b-iii) (c-ii) (d-i)
View/Hide Ans
Correct Answer is B
31. In CRC based design, a CRC Team consists of :
(a) one or two users representatives
(b) several programmers
(c) project co-ordinators
(d) one or two system analysts
Codes :
(A) (a) and (c)
(B) (a), (b), (c) and (d)
(C) (a), (c) and (d)
(D) (a), (b) and (d)
View/Hide Ans
Correct Answer is C
32. The end points of a given line are (0, 0) and (6, 18). Compute each value of y as x steps from 0 to 3, by using equation of straight line :
(A) For x=0, y=0; x=1, y=3; x=2, y=6; x=3, y=9
(B) For x=0, y=1; x=1, y=3; x=2, y=4; x=3, y=9
(C) For x=0, y=2; x=1, y=3; x=2, y=6; x=3, y=9
(D) For x=0, y=0; x=1, y=3; x=2, y=4; x=3, y=6
View/Hide Ans
Correct Answer is A
33. Which of the following graphic primitives are considered as the basic building blocks of
computer graphics ?
(a) Points (b) Lines (c) Polylines (d) Polygons
Codes :
(A) (a) only
(B) (a) and (b)
(C) (a), (b) and (c)
(D) (a), (b), (c) and (d)
View/Hide Ans
Correct Answer is B
34. Javascript and Java has similar name because .................... is/are true.
(a) Javascripts syntax is loosely based on Java’s syntax
(b) Javascript is stripped down version of Java
(c) Java and Javascript are originated from Island of Java
Codes :
(A) (a) only
(B) (a), (b) and (c)
(C) (a) and (b)
(D) (a) and (c)
View/Hide Ans
Correct Answer is A
35. Which of the following statements are true with reference to the way of describing XML
data ?
(a) XML uses DTD to describe the data
(b) XML uses XSL to describe the data
(c) XML uses a description node to describe the data
Codes :
(A) (a) only
(B) (b) only
(C) (a) and (b)
(D) (a) and (c)
View/Hide Ans
Correct Answer is D
36. Which of the following is/are correct with reference to Abstract class & interface?
(a) A class can inherit only one Abstract class but may inherit several interfaces.
(b) Abstract class can provide complete & default code but an interface has no code.
Codes :
(A) (a) is true
(B) (b) is true
(C) Both (a) and (b) are true
(D) Neither (a) nor (b) is true
View/Hide Ans
Correct Answer is C
37. Match the following with respect to various memory management algorithms :
Codes :
List - I
List - II
(a) Demand paging
(i) degree of multiprogramming
(b) Segmentation
(ii) working set
(c) Dynamic partitions
(iii) supports user view of memory
(d) Fixed partitions
(iv) compaction
(A) (a-iii) (b-iv) (c-ii) (d-i)
(B) (a-ii) (b-iii) (c-i) (d-iv)
(C) (a-iv) (b-iii) (c-ii) (d-i)
(D) (a-ii) (b-iii) (c-iv) (d-i)
View/Hide Ans
Correct Answer is D
38. Function of memory management unit is :
(A) Address translation
(B) Memory allocation
(C) Cache management
(D) All of the above
View/Hide Ans
Correct Answer is A
39. Consider a system with twelve magnetic tape drives and three processes P1, P2 and P3. Process P1 requires maximum ten tape drives, process P2 may need as many as four tape drives and P3 may need upto nine tape drives. Suppose that at time t1, process P1 is holding five tape drives, process P2 is holding two tape drives and process P3 is holding three tape drives. At time t1, system is in:
(A) safe state
(B) unsafe state
(C) deadlocked state
(D) starvation state
View/Hide Ans
Correct Answer is B
40. In Unix operating system, special files are used to :
(A) buffer data received in its input from where a process reads
(B) provide a mechanism to map physical device to file names
(C) store list of file names plus pointers associated with i-nodes
(D) store information entered by a user application program or utility program
View/Hide Ans
Correct Answer is B
41. Match the following in Unix file system :
Codes :
List - I
List - II
(a) Boot block
(i) Information about file system
(b) Super block
(ii) Information about file
(c) Inode table
(iii) Storage space
(d) Data block
(iv) Code for making OS ready
(A) (a-iv) (b-i) (c-ii) (d-iii)
(B) (a-i) (b-iii) (c-ii) (d-iv)
(C) (a-iii) (b-i) (c-ii) (d-iv)
(D) (a-iv) (b-ii) (c-i) (d-iii)
View/Hide Ans
Correct Answer is A
42. In an operating system, indivisibility of operation means :
(A) Operation is interruptable
(B) Race - condition may occur
(C) Processor can not be pre-empted
(D) All of the above
View/Hide Ans
Correct Answer is C
43. A horn clause is ......................
(A) A clause in which no variables occur in the expression
(B) A clause that has at least one negative literal
(C) A disjunction of a number of literals
(D) A clause that has at most one positive literal
View/Hide Ans
Correct Answer is D
44. In Propositional Logic, given P and P → Q, we can infer .................
(A) ~Q
(B) Q
(C) P ∧ Q
(D) ~P ∧ Q
View/Hide Ans
Correct Answer is B
45. Reasoning strategies used in expert systems include ...............
(A) Forward chaining, backward chaining and problem reduction
(B) Forward chaining, backward chaining and boundary mutation
(C) Forward chaining, backward chaining and back propagation
(D) Backward chaining, problem reduction and boundary mutation
View/Hide Ans
Correct Answer is A
46. Language model used in LISP is .................
(A) Functional programming
(B) Logic programming
(C) Object oriented programming
(D) All of the above
View/Hide Ans
Correct Answer is A
47. In constraint satisfaction problem, constraints can be stated as ...................
(A) Arithmatic equations and inequalities that bind the values of variables
(B) Arithmatic equations and inequalities that doesn’t bind any restriction over variables
(C) Arithmatic equations that impose restrictions over variables
(D) Arithmatic equations that discard constraints over the given variables
View/Hide Ans
Correct Answer is A
48. As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has following advantage :
(A) It has high level of flexibility
(B) It doesn’t require cash up-front
(C) It is a business investment
(D) Little risk of obsolescence
View/Hide Ans
Correct Answer is C
49. Consider the conditional entropy and mutual information for the binary symmetric channel. The input source has alphabet X={0,1} and associated probabilities {1/2,1/2}. The channel matrix is
50. Which of the following is not a lossy compression technique ?
(A) JPEG
(B) MPEG
(C) FFT
(D) Arithmetic coding
View/Hide Ans
Correct Answer is D
51. Blind image deconvolution is ................
(A) Combination of blur identification and image restoration
(B) Combination of segmentation and classification
(C) Combination of blur and non-blur image
(D) None of the above
View/Hide Ans
Correct Answer is A
52. A basic feasible solution of a linear programming problem is said to be ............... if at least one of the basic variable is zero.
(A) degenerate '
(B) non-degenerate
(C) infeasible
(D) unbounded
View/Hide Ans
Correct Answer is A
53. Consider the following conditions :
(a) The solution must be feasible, i.e. it must satisfy all the supply and demand constraints.
(b) The number of positive allocations must be equal to m+n-1, where m is the number
of rows and n is the number of columns.
(c) All the positive allocations must be in independent positions.
The initial solution of a transportation problem is said to be non-degenerate basic feasible solution if it satisfies :
Codes :
(A) (a) and (b) only
(B) (a) and (c) only
(C) (b) and (c) only
(D) (a), (b) and (c)
View/Hide Ans
Correct Answer is D
54. Consider the following transportation problem :
55. The character set used in Windows 2000 operating system is ...............
(A) 8 bit ASCII
(B) Extended ASCII
(C) 16 bit UNICODE
(D) 12 bit UNICODE
View/Hide Ans
Correct Answer is C
56. In Unix, the command to enable execution permission for file “mylife” by all is .............
(A) Chmod ugo+X myfile
(B) Chmod a+X myfile
(C) Chmod +X myfile
(D) All of the above
View/Hide Ans
Correct Answer is D
57. What will be the output of the following Unix command ?
$rm chap0\[1 - 3\]
(A) Remove file chap0[1 - 3]
(B) Remove file chap01, chap02, chap03
(C) Remove file chap\[1 - 3\]
(D) None of the above
View/Hide Ans
Correct Answer is A
58. Which of the following statements regarding the features of the object-oriented approach to databases are true ?
(a) The ability to develop more realistic models of the real world.
(b) The ability to represent the world in a non-geometric way.
(c) The ability to develop databases using natural language approaches.
(d) The need to split objects into their component parts.
(e) The ability to develop database models based on location rather than state and behaviour.
Codes :
(A) (a), (b) and (c)
(B) (b), (c) and (d)
(C) (a), (d) and (e)
(D) (c), (d) and (e)
View/Hide Ans
Correct Answer is A
59. Consider the following database table :
    Create table test(
        one integer,
        two integer,
        primary key(one),
        unique(two),
        check(one=1 and =10),
        check(two=1 and =5) );
How many data records/tuples atmost can this table contain ?
(A) 5
(B) 10
(C) 15
(D) 50
View/Hide Ans
Correct Answer is A
60. Suppose ORACLE relation R(A, B) currently has tuples {(1, 2), (1, 3), (3, 4)} and relation S(B, C) currently has {(2, 5), (4, 6), (7, 8)}. Consider the following two SQL queries SQ1 and SQ2 :
SQ1 : Select *
          From R Full Join S
          On R.B=S.B;
SQ2 : Select *
          From R Inner Join S
          On R.B=S.B;
The numbers of tuples in the result of the SQL query SQ1 and the SQL query SQ2 are given by :
(A) 2 and 6 respectively
(B) 6 and 2 respectively
(C) 2 and 4 respectively
(D) 4 and 2 respectively
View/Hide Ans
Correct Answer is D
61. Consider the following three SQL queries (Assume the data in the people table) :
(a) Select Name from people where Age>21;
(b) Select Name from people where Height>180;
(c) Select Name from people where (Age>21) or (Height>180);
If the SQL queries (a) and (b) above, return 10 rows & 7 rows in the result set respectively, then what is one possible number of rows returned by SQL query (c)?
(A) 3
(B) 7
(C) 10
(D) 21
View/Hide Ans
Correct Answer is C
62. The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are :
(A) Loosely coupled hardware on tightly coupled software and disk sharing, respectively.
(B) Tightly coupled hardware on loosely coupled software and shared memory, respectively.
(C) Tightly coupled software on loosely coupled hardware and message passing,
respectively.
(D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.
View/Hide Ans
Correct Answer is C
63. Consider the following three tables R, S and T. In this question, all the join operations are natural joins (⊗). (Π) is the projection operation of a relation :
64. Consider the two class classification task that consists of the following points :
Class C1: [-1, -1], [-1, 1], [1, -1]
Class C2: [1, 1]
The decision boundary between the two classes C1 and C2 using single perceptron is given by :
(A) x1-x2-0.5=0
(B) -x1+x2-0.5=0
(C) 0.5(x1+x2)-1.5=0
(D) x1+x2-0.5=0
View/Hide Ans
Correct Answer is D
65. Consider a standard additive model consisting of rules of the form of
If x is Ai AND y is Bi THEN z is Ci.
Given crisp inputs x=x0, y=y0, the output of the model is :
View/Hide Ans
Correct Answer is C
66. A bell-shaped membership function is specified by three parameters (a, b, c) as follows:
View/Hide Ans
Correct Answer is B
67. Which of the following is/are the principle components of a memory-tube display ?
(a) Flooding gun
(b) Collector
(c) Phosphorus grains
(d) Ground
Codes :
(A) (a) and (b) (B) (c) only
(C) (d) only (D) All the above
View/Hide Ans
Correct Answer is D
68. Which of the following steps is/are not required for analog to digital conversion ?
(a) Sensing
(b) Conversion
(c) Amplification
(d) Conditioning
(e) Quantization
Codes :
(A) (a) and (b)
(B) (c) and (d)
(C) (a), (b) and (e)
(D) None of the above
View/Hide Ans
Correct Answer is D
69. Which raster locations would be chosen by Bresenham’s algorithm when scan converting a line from (1, 1) to (8, 5) ?
View/Hide Ans
Correct Answer is C
70. Consider a unit square centred at origin. The coordinates of the square are translated by a factor (1/2, 1) and rotated by an angle of 90'. What shall be the coordinates of the new
square ?
(A) (-1/2, 0), (-1/2, 1), (-3/2, 1), (-3/2, 0)
(B) (-1/2, 0), (1/2, 1), (3/2, 1), (3/2, 0)
(C) (-1/2, 0), (1/2, 0), (-3/2, 1), (-3/2, 0)
(D) (-1/2, 0), (1/2, 1), (-3/2, 1), (-3/2, 0)
View/Hide Ans
Correct Answer is A
71. Which of the following is/are the components of a CRT ?
(a) Electron Gun
(b) Control Electrode
(c) Focusing Electrode
(d) Phosphor Coated Screen
Codes :
(A) (a) and (d)
(B) (a), (b) and (d)
(C) (a), (b), (c) and (d)
(D) (a), (c) and (d)
View/Hide Ans
Correct Answer is C
72. Which one of the following statements is incorrect ?
(A) Pareto analysis is a statistical method used for analyzing causes, and is one of the
primary tools for quality management.
(B) Reliability of a software specifies the probability of failure-free operation of that software for a given time duration.
(C) The reliability of a system can also be specified as the Mean Time To Failure (MTTF).
(D) In white-box testing, the test cases are decided from the specifications or the
requirements.
View/Hide Ans
Correct Answer is D
73. Consider a language A defined over the alphabet ∑={0, 1} as A = {0[n/2] 1n: n≥0}.
The expression [n/2] means the floor of n/2, or what you get by rounding n/2 down to the nearest integer.
Which of the following is not an example of a string in A ?
(A) 011
(B) 0111
(C) 0011
(D) 001111
View/Hide Ans
Correct Answer is B
74. Which one of the following statements, related to the requirements phase in Software
Engineering, is incorrect ?
(A) “Requirement validation” is one of the activities in the requirements phase.
(B) “Prototyping” is one of the methods for requirement analysis.
(C) “Modelling-oriented approach” is one of the methods for specifying the functional
specifications.
(D) “Function points” is one of the most commonly used size metric for requirements.
View/Hide Ans
Correct Answer is C
75. ............... tag is an extension to HTML that can enclose any number of Javascript statements.
(A) <SCRIPT>
(B) <BODY>
(C) <HEAD>
(D) <TITLE>
View/Hide Ans
Correct Answer is A
© 2022. All Rights Reserved | Copyright | Terms of Use & Privacy Policy