Opportunities are usually disguised as hard work, so most people don't recognize them.
1. Consider the polynomial p(x) = a0 + a1x + a2x2 + a3x2 , where ai≠0, ∀i
The minimum number of multiplications needed to evaluate p on an input x is:
(A) 3
(B) 4
(C) 6
(D) 9
View/Hide Ans
Correct Answer is A
2. Let X,Y,Z be sets of sizes x, y and z respectively. Let W = X × Y and E be the set
of all subsets of W.
The number of functions from Z to E is:
(A) Z2xy
(B) Z*2xy
(C) Z2x+y
(D) 2xyz
View/Hide Ans
Correct Answer is D
3. The set {1,2,3,5,7,8,9} under multiplication modulo 10 is not a group. Given
below are four plausible reasons.
Which one of them is false?
(A) It is not closed
(B) 2 does not have an inverse
(C) 3 does not have an inverse
(D) 8 does not have an inverse
View/Hide Ans
Correct Answer is C
4. A relation R is defined on ordered pairs of integers as follows:
(x,y) R(u,v) if x<u and y>v. Then R is:
(A) Neither a Partial Order nor an Equivalence Relation
(B) A Partial Order but not a Total Order
(C) A Total Order
(D) An Equivalence Relation
View/Hide Ans
Correct Answer is A
5. For which one of the following reasons does Internet Protocol(IP) use the time-to-live(TTL) field in the IP datagram header?
(A) Ensure packets reach destination within that time
(B) Discard packets that reach later than that time
(C) Prevent packets from looping indefinitely
(D) Limit the time for which a packet gets queued in intermediate routers.
View/Hide Ans
Correct Answer is C
6. Consider three CPU-intensive processes, which require 10, 20 and 30 time units
and arrive at times 0, 2 and 6, respectively. How many context switches are needed if the operating system implements a shortest remaining time first
scheduling algorithm? Do not count the context switches at time zero and at the
end.
(A) 1
(B) 2
(C) 3
(D) 4
View/Hide Ans
Correct Answer is B
7. Consider the following grammar.
S→S * E
S→E
E→F+E
E→F
F→id
Consider the following LR(0) items corresponding to the grammar above.
(i) S→S*.E
(ii) E→F.+E
(iii) E→F+.E
Given the items above, which two of them will appear in the same set in the
canonical sets-of-items for the grammar?
(A) (i) and (ii)
(B) (ii) and (iii)
(C) (i) and (iii)
(D) None of the above
View/Hide Ans
Correct Answer is D
8. You are given a free running clock with a duty cycle of 50% and a digital
waveform f which changes only at the negative edge of the clock. Which one of
the following circuits (using clocked D flip-flops) will delay the phase of f by
180'?
View/Hide Ans
Correct Answer is C
9. A CPU has 24-bit instructions. A program starts at address 300 (in decimal).
Which one of the following is a legal program counter (all values in decimal)?
(A) 400
(B) 500
(C) 600
(D) 700
View/Hide Ans
Correct Answer is C
10. In a binary max heap containing n numbers, the smallest element can be found
in time
(A) θ(n)
(B) θ(logn)
(C) θ(loglogn)
(D) θ(1)
View/Hide Ans
Correct Answer is A
11. Consider a weighted complete graph G on the vertex set { v1 v2 , ,...., vn} such that
the weight of the edge (vi , vj) is 2|i-j| The weight of a minimum spanning tree
of G is:
(A) n - 1
(B) 2n - 2
(C) nC2
(D) n2
View/Hide Ans
Correct Answer is B
12. To implement Dijkstra’s shortest path algorithm on unweighted graphs so that it
runs in linear time, the data structure to be used is:
(A) Queue
(B) Stack
(C) Heap
(D) B-Tree
View/Hide Ans
Correct Answer is A
13. A scheme for storing binary trees in an array X is as follows. Indexing of X starts
at 1 instead of 0. the root is stored at X[1]. For a node stored at X[i], the left
child, if any, is stored in X[2i] and the right child, if any, in X[2i+1]. To be able to
store any binary tree on n vertices the minimum size of X should be
(A) log2n
(B) n
(C) 2n + 1
(D) 2n-1
View/Hide Ans
Correct Answer is D
14. Which one of the following in place sorting algorithms needs the minimum
number of swaps?
(A) Quick sort
(B) Insertion sort
(C) Selection sort
(D) Heap sort
View/Hide Ans
Correct Answer is C
15. Consider the following C-program fragment in which i, j and n are integer
variables.
for (i = n, j = 0; i > 0; i /= 2, j +=i);
Let val(j) denote the value stored in the variable j after termination of the
for loop. Which one of the following is true?
(A) val(j)=θ(logn)
(B) val(j)=θ(√n)
(C) val(j)=θ(n)
(D) val(j)=θ(nlogn)
View/Hide Ans
Correct Answer is C
16. Let S be an NP-complete problem and Q and R be two other problems not known
to be in NP. Q is polynomial time reducible to S and S is polynomial-time
reducible to R.
Which one of the following statements is true?
(A) R is NP-complete
(B) R is NP-hard
(C) Q is NP-complete
(D) Q is NP-hard
View/Hide Ans
Correct Answer is B
17. An element in an array X is called a leader if it is greater than all elements to the
right of it in X.
The best algorithm to find all leaders in an array
(A) Solves it in linear time using a left to right pass of the array
(B) Solves it in linear time using a right to left pass of the array
(C) Solves it using divide and conquer in time θ(n log n)
(D) Solves it in time θ(n2)
View/Hide Ans
Correct Answer is B
18. We are given a set { x1,......xn} where x1=2i .
A sample S ⊆ X is drawn by
selecting each xi independently with probability pi=1/2.
The expected value of the smallest number in sample S is:
(A) 1/n
(B) 2
(C) √n
(D) n
View/Hide Ans
Correct Answer is D
19. Let L1={0n+m1n0m | n,m≥0}
L2={0n+m1n+m0m | n,m≥0}
L3={0n+m1n+m0n+m | n,m≥0}
Which of these languages are NOT context free?
(A) L1 only
(B) L3 only
(C) L1 and L2
(D) L2 and L3
View/Hide Ans
Correct Answer is D
20. Consider the following log sequence of two transactions on a bank account, with
initial balance 12000, that transfer 2000 to a mortgage payment and then apply
a 5% interest.
1. T1 start
2. T1 B old=1200 new=10000
3. T1 M old=0 new=2000
4. T1 commit
5. T2 start
6. T2 B old=10000 new=10500
7. T2 commit
Suppose the database system crashes just before log record 7 is written. When
the system is restarted, which one statement is true of the recovery procedure?
(A) We must redo log record 6 to set B to 10500
(B) We must undo log record 6 to set B to 10000 and then redo log records 2
and 3
(C) We need not redo log records 2 and 3 because transaction T1 has committed
(D) We can apply redo and undo operations in arbitrary order because they are
idempotent.
View/Hide Ans
Correct Answer is B
21. For each element in a set of size 2n, an unbiased coin is tossed. The 2n coin
tosses are independent. An element is chosen if the corresponding coin toss were
head.
The probability that exactly n elements are chosen is:
(A) (2nCn)/(4n)
(B) (2nCn)/(2n)
(C) 1/(2nCn)
(D) 1/2
View/Hide Ans
Correct Answer is A
22. Let E, F and G be finite sets.
Let X=(E∩F)-(F∩G) and Y=(E-(E∩G))-(E-F).
Which one of the following is true?
(A) X ⊆ Y
(B) X ⊇ Y
(C) X=Y
(D) X -Y=∅ and Y -X≠∅
View/Hide Ans
Correct Answer is C
23. F is an n×n real matrix. b is an n×1 real vector. Suppose there are two
n×1 vectors, u and n such that u≠n , and Fu = b, Fn = b.
Which one of the
following statements is false?
(A) Determinant of F is zero
(B) There are an infinite number of solutions to Fx = b
(C) There is an x ¹ 0 such that Fx = 0
(D) F must have two identical rows
View/Hide Ans
Correct Answer is D
24. Given a set of elements N = {1,2,.....,n} and two arbitrary subsets
A⊆N and B⊆N, how many of the n! permutations π from N to N satisfy
min(π(A)) = min(π(B)), where min(S) is the smallest integer in the set of
integers S, and π(S) is the set of integers obtained by applying permutation π to
each element of S ?
(A) (n - |A ∪ B|) |A| |B|
(B) (|A|2+|B|2)n2
(C) n! |A∩B| / |A∪B|
(D) |A∩B|2/ nC|A∪B|
View/Hide Ans
Correct Answer is C
25. Let S = {1,2,3,........,m},m>3. Let X1...... Xn be subsets of S each of size 3.
Define a function f from S to the set of natural numbers as, f(i) is the number of
sets Xj that contain the element i. That is f(i)=|{j|i∈Xj }|
(A) 3m
(B) 3n
(C) 2m+1
(D) 2n+1
View/Hide Ans
Correct Answer is B
26. Which one of the first order predicate calculus statements given below correctly
expresses the following English statement?
"Tigers and lions attack if they are hungry or threatened."
(A) ∀x[(tiger(x) ∧ lion(x)) → {(hungry(x) ∨ threatened(x)) → attacks(x)}
(B) ∀x[(tiger(x) ∨ lion(x)) → {(hungry(x) ∨ threatened(x)) ∧ attacks(x)}
(C) ∀x[(tiger(x) ∨ lion(x)) → {(hungry(x) → threatened(x)) ∨ attacks(x)}
(D) ∀x[(tiger(x) ∨ lion(x)) → {(hungry(x) ∨ threatened(x)) →
attacks(x)}
View/Hide Ans
Correct Answer is D
27. Consider the following propositional statements:
P1:((A∧B)→)=((A→C)∧(B→C))
P2:((A∨B→))=((A→C)∨(B→C))
Which one of the following is true?
(A) P1 is a tautology, but not P2
(B) P2 is a tautology, but not P1
(C) P1 and P2 are both tautologies
(D) Both P1 and P2 are not tautologies
View/Hide Ans
Correct Answer is D
28. A logical binary relation Θ, is defined as follows:
29. If s is a string over (0+1)* then
let n0(s) denote the number of 0’s in s and
n1(s) denote the number of 1’s in s.
Which one of the following languages is not regular?
(A) L={s∈(1+0)*| n0(s) is a 3 digit prime number}
(B) L={s∈(1+0)*| for every prefix s' of s,|n0(s)-n1(s)|≤2}
(C) L={s∈(1+0)*| n0(s)-n1(s)|≤4}
(D) L={s∈(1+0)*| n0(s)mod7 = n1(s)mod5=0}
View/Hide Ans
Correct Answer is C
30. For S ∈ (0+1)* let d(s) denote the decimal value of s(e.g. d(101)=5).
Let L={s ∈(0+1)* | d(s)mod 5=2 and d(s)mod 7≠4
Which one of the following statements is true?
(A) L is recursively enumerable, but not recursive
(B) L is recursive, but not context-free
(C) L is context-free, but not regular
(D) L is regular
View/Hide Ans
Correct Answer is D
31. Let SHAM3 be the problem of finding a Hamiltonian cycle in a graph
G = (V,E) with |V| divisible by 3 and DHAM3 be the problem of determining if a
Hamiltonian cycle exists in such graphs.
Which one of the following is true?
(A) Both DHAM3 and SHAM3 are NP-hard
(B) SHAM3 is NP-hard, but DHAM3 is not
(C) DHAM3 is NP-hard, but SHAM3 is not
(D) Neither DHAM3 nor SHAM3 is NP-hard
View/Hide Ans
Correct Answer is A
32. Consider the following statements about the context free grammar
G = {S→SS, S→ab, S→ba, S→ε}
I. G is ambiguous
II. G produces all strings with equal number of a’s and b’s
III. G can be accepted by a deterministic PDA.
Which combination below expresses all the true statements about G?
(A) I only
(B) I and III only
(C) II and III only
(D) I, II and III
View/Hide Ans
Correct Answer is B
33. Let L1 be a regular language, L2 be a deterministic context-free language and L3 a
recursively enumerable, but not recursive, language.
Which one of the following
statements is false?
(A) L1 ∩ L2 is a deterministic CFL
(B) L3 ∩ L1 is recursive
(C) L1 ∪ L2 is context free
(D) L1 ∩ L2 ∩ L3 is recursively enumerable
View/Hide Ans
Correct Answer is B
34. Consider the regular language L = (111+11111)*. The minimum number of
states in any DFA accepting this languages is:
(A) 3
(B) 5
(C) 8
(D) 9
View/Hide Ans
Correct Answer is D
35. Consider the circuit below.
36. Given two three bit numbers a2a1a0 and b2b1b0 and c, the carry in, the function
that represents the carry generate function when these two numbers are added
is:
(A) a2b2 +
a2a1b1 +
a2a1a0b0 +
a2a0b1b0+
a1b2b1+
a1a0b2b0+
a0b2b1b0
(B) a2b2 +
a2a1b1 +
a2a1a1b0 +
a1a0b2b1+
a1b0b2+
a1a0b2b0+
a2b0b1b0
(C) a2+b2+
(a2⊕b2)(a1+b1+(a1⊕b1)(a1+b1))
(D) a2b2+
a'2a1b1
(a2a1)'a0b0+
a'2a0b'1b0+
a1b;2b1+
a'1a0b'2b0+
a0(b2b1)'b0
View/Hide Ans
Correct Answer is A
37. Consider the circuit in the diagram. The ⊕ operator represents Ex-OR. The D flipflops
are initialized to zeroes (cleared).
38. Consider a Boolean function f(w,x,y,z). suppose that exactly one of its inputs is
allowed to change at a time. If the function happens to be true for two input
vectors
i1=w1,x1,y1,z1 and i2=w2,x2,y2,z2,
we would like the function to
remain true as the input changes from i1 to i2 (i1 and i2 differ in exactly one bit position) ,without becoming false
momentarily.
Let f(w,x,y,z)= ∑(5,7,11,12,13,15).
Which of the following cube
covers of f will ensure that the required property is satisfied?
(A) w'xz, wxy', xy'z, xyz, wyz
(B) wxy, w'xz,wyz
(C) wx(yz)', xz, wx'yz
(D) wzy, wyz, wxz, w'xz, xy'z, xyz
View/Hide Ans
Correct Answer is A
39. We consider the addition of two 2’s complement numbers bn-1, bn-1.... b0 and
an-1, an-1....a0
A binary adder for adding unsigned binary numbers is used to add
the two numbers. The sum is denoted by cn-1, cn-1.... c0 and the carry-out by cout.
Which one of the following options correctly identifies the overflow condition?
View/Hide Ans
Correct Answer is C
40. Consider numbers represented in 4-bit gray code.
Let h3 h2 h1 h0 be the gray code
representation of a number n and let g3 g2 g1 g0 be the gray code of
(n + 1) (modulo 16) value of the number.
Which one of the following functions is correct?
(A) g0(h3 h2 h1 h0) =∑(1,2,3,6,10,13,14,15)
(B) g1(h3 h2 h1 h0) =∑(4,9,10,11,12,13,14,15)
(C) g2(h3 h2 h1 h0) =∑(2,4,5,6,7,12,13,15)
(D) g3(h3 h2
h1 h0) =∑(0,1,6,7,10,11,12,13)
View/Hide Ans
Correct Answer is C
41. A CPU has a cache with block size 64 bytes. The main memory has k banks, each
bank being c bytes wide. Consecutive c-byte chunks are mapped on
consecutive banks with wrap-around. All the k banks can be accessed in parallel,
but two accesses to the same bank must be serialized. A cache block access may
involve multiple iterations of parallel bank accesses depending on the amount of
data obtained by accessing all the k banks in parallel. Each iteration requires
decoding the bank numbers to be accessed in parallel and this takes k/2 ns. The
latency of one bank access is 80 ns.
If c = 2 and k = 24, the latency of retrieving
a cache block starting at address zero from main memory is:
(A) 92 ns
(B) 104 ns
(C) 172 ns
(D) 184 ns
View/Hide Ans
Correct Answer is D
42. A CPU has a five-stage pipeline and runs at 1 GHz frequency. Instruction fetch
happens in the first stage of the pipeline. A conditional branch instruction
computes the target address and evaluates the condition in the third stage of the
pipeline. The processor stops fetching new instructions following a conditional
branch until the branch outcome is known. A program executes 109 instructions
out of which 20% are conditional branches.
If each instruction takes one cycle to
complete on average, the total execution time of the program is:
(A) 1.0 second
(B) 1.2 seconds
(C) 1.4 seconds
(D) 1.6 seconds
View/Hide Ans
Correct Answer is C
43. Consider a new instruction named branch-on-bit-set (mnemonic bbs). The
instruction "bbs reg, pos, label" jumps to label if bit in position pos of register
operand reg is one. A register is 32 bits wide and the bits are numbered 0 to 31,
bit in position 0 being the least significant. Consider the following emulation of
this instruction on a processor that does not have bbs implemented.
temp ← reg & mask
Branch to label if temp is non-zero.
The variable temp is a temporary register. For correct emulation, the variable
mask must be generated by
(A) mask ← 0×1 << pos
(B) mask ← 0×ffffffff >>pos
(C) mask ← pos
(D) mask ← 0×f
View/Hide Ans
Correct Answer is A
44. Station A uses 32 byte packets to transmit messages to Station B using a sliding
window protocol. The round trip delay between A and B is 80 milliseconds and
the bottleneck bandwidth on the path between A and B is 128 kbps.
What is the
optimal window size that A should use?
(A) 20
(B) 40
(C) 160
(D) 320
View/Hide Ans
Correct Answer is B
45. Two computers C1 and C2 are configured as follows.
C1 has IP address
203.197.2.53 and netmask 255.255.128.0.
C2 has IP address 203.197.75.201
and netmask 255.255.192.0.
Which one of the following statements is true?
(A) C1 and C2 both assume they are on the same network
(B) C2 assumes C1 is on same network, but C1 assumes C2 is on a different
network
(C) C1 assumes C2 is on same network, but C2 assumes C1 is on a different
network
(D) C1 and C2 both assume they are on different networks.
View/Hide Ans
Correct Answer is C
46. Station A needs to send a message consisting of 9 packets to Station B using a
sliding window (window size 3) and go-back-n error control strategy. All packets
are ready and immediately available for transmission. If every 5th packet that A
transmits gets lost (but no acks from B ever get lost), then what is the number of
packets that A will transmit for sending the message to B?
(A) 12
(B) 14
(C) 16
(D) 18
View/Hide Ans
Correct Answer is C
47. Consider the following graph:
48. Let T be a depth first search tree in an undirected graph G. Vertices u and n are
leaves of this tree T. The degrees of both u and n in G are at least 2.
Which one of the following statements is true?
(A) There must exist a vertex w adjacent to both u and n in G
(B) There must exist a vertex w whose removal disconnects u and n in G
(C) There must exist a cycle in G containing u and n
(D) There must exist a cycle in G containing u and all its neighbours in G.
View/Hide Ans
Correct Answer is B
49. An implementation of a queue Q, using two stacks S1 and S2, is given below:
void insert (Q, x) {
push (S1, x);
}
void delete (Q) {
if (stack-empty(S2)) then
if (stack-empty(S1)) then {
print("Q is empty");
return;
}
else while (!(stack-empty(S1))){
x=pop(S1);
push(S2,x);
}
x=pop(S2);
}
Let n insert and m(≤n) delete operations be performed in an arbitrary order
on an empty queue Q. Let x and y be the number of push and pop operations
performed respectively in the process. Which one of the following is true for all
m and n?
(A) n+m≤x<2n and 2m≤y≤n+m
(B) n+m≤x<2n and 2m ≤ y≤2n
(C) 2m≤x<2n and 2m≤y≤n+m
(D) 2m≤x<2n and 2m≤y≤2n
View/Hide Ans
Correct Answer is A
50. A set X can be represented by an array x[n] as follows:
Consider the following algorithm in which x,y and z are Boolean arrays of size n:
algorithm zzz(x[ ], y[ ], z [ ] ) {
int i;
for(i=0;i<n;++i)
z[i] = (x[i] ∧ ~y[i]) ∨ (~x[i] ∧ y[i])
}
The set Z computed by the algorithm is:
(A) (X∩Y)
(B) (X∪Y)
(C) (X-Y)∩(Y-X)
(D) (X-Y)∪(Y-X)
View/Hide Ans
Correct Answer is D
51. Consider the following recurrence:
T(n)=2T(⌈√n⌉)+1,T(1)=1
Which one of the following is true?
(A) T(n)=θ(log log n)
(B) T(n)=θ(log n)
(C) T(n)=θ(√n)
(D) T(n)=θ(n)
View/Hide Ans
Correct Answer is B
52. The median of n elements can be found in O(n) time. Which one of the following
is correct about the complexity of quick sort, in which median is selected as
pivot?
(A) θ(n)
(B) θ(n log n)
(C) θ(n2)
(D) θ(n3)
View/Hide Ans
Correct Answer is D
53. Consider the following C-function in which a[n] and b[m] are two sorted integer
arrays and c[n+m]be another integer array.
void xyz(int a[], int b [], int c []){
int i,j,k;
i=j=k=0;
while ((i
else c[k++] = b[j++];
}
Which of the following condition(s) hold(s) after the termination of the while
loop?
(i) j<m,k=n+j-1, and a[n-1]≤b[j] if i = n
(ii) i<n,k=m+i-1, and b[m-1]≤ a[i] if j=m
(A) only (i)
(B) only (ii)
(C) either (i) or (ii) but not both
(D) neither (i) nor (ii)
View/Hide Ans
Correct Answer is C
54. Given two arrays of numbers a1 ,...,an and b1 ,...,bn where each number is 0 or 1,
the fastest algorithm to find the largest span (i, j ) such that
ai+ai+1+ ,...,aj=bi+bi+1+ ,...,bj or report that there is not such span.
(A) Takes O(n3) and Ω(2n) time if hashing is permitted
(B) Takes O(n3) and Ω(n2.5) time in the key comparison model
(C) Takes θ(n) time and space
(D) Takes O(√n)
time only if the sum of the 2n elements is an even number
View/Hide Ans
Correct Answer is C
55. Consider these two functions and two statements S1 and S2 about them.
int work1(int *a, int i, int j)
int work2(int *a, int i, int j)
{
{
int x = a[i+2];
int t1 = i+2;
a[j] = x+1;
int t2 = a[t1];
return a[i+2] - 3;
a[j] = t2+1;
return t2 - 3;
}
}
S1: The transformation form work1 to work2 is valid, i.e., for any program state
and input arguments, work2 will compute the same output and have the same
effect on program state as work1
S2: All the transformations applied to work1 to get work2 will always improve the
performance (i.e reduce CPU time) of work2 compared to work1
(A) S1 is false and S2 is false
(B) S1 is false and S2 is true
(C) S1 is true and S2 is false
(D) S1 is true and S2 is true
View/Hide Ans
Correct Answer is C
56. Consider the following code written in a pass-by-reference language like
FORTRAN and these statements about the code.
subroutine swap(ix,iy)
it = ix
L1 : ix = iy
L2 : iy = it
end
ia = 3
ib = 8
call swap (ia, 1b+5)
print *, ia, ib
end
S1: The compiler will generate code to allocate a temporary nameless cell,
initialize it to 13, and pass the address of the cell to swap
S2: On execution the code will generate a runtime error on line L1
S3: On execution the code will generate a runtime error on line L2
S4: The program will print 13 and 8
S5: The program will print 13 and -2
Exactly the following set of statement(s) is correct:
(A) S1 and S2
(B) S1 and S4
(C) S3
(D) S1 and S5
View/Hide Ans
Correct Answer is A
57. Consider this C code to swap two integers and these five statements: the code
void swap (int *px, int *py) {
*px = *px - *py;
*py = *px + *py;
*px = *py - *px;
}
S1: will generate a compilation error
S2: may generate a segmentation fault at runtime depending on the arguments
passed
S3: correctly implements the swap procedure for all input pointers referring to
integers stored in memory locations accessible to the process
S4: implements the swap procedure correctly for some but not all valid input
pointers
S5: may add or subtract integers and pointers.
(A) S1
(B) S2 and S3
(C) S2 and S4
(D) S2 and S5
View/Hide Ans
Correct Answer is C
58. Consider the following grammar:
S→FR
R→*S/ε
F→id
In the predictive parser table, M, of the grammar the entries
M[S,id] and M[R,$] respectively.
(A) {S→FR} and {R→ε }
(B) {S→FR} and { }
(C) {S→FR} and {R→*S}
(D) {F→id} and {R→ε}
View/Hide Ans
Correct Answer is A
59. Consider the following translation scheme.
S→ER
R→*E {print('*');} R|ε
E→F+E {print('+');}|F;
F→(S)|id {print(id.value);}
Here id is a token that represents an integer and id.value represents the
corresponding integer value. For an input '2 * 3 + 4', this translation scheme
prints
(A) 2 * 3 + 4
(B) 2 * + 3 4
(C) 2 3 * 4 +
(D) 2 3 4 + *
View/Hide Ans
Correct Answer is D
60. Consider the following C code segment.
for(i=0,i<n;i++) {
for(j=0;j<n;j++) {
if(i%2) {
x+=(4*j+5*i);
y+=(7+4*j);
}
}
}
Which one of the following is false?
(A) The code contains loop invariant computation
(B) There is scope of common sub-expression elimination in this code
(C) There is scope of strength reduction in this code
(D) There is scope of dead code elimination in this code
View/Hide Ans
Correct Answer is D
61. The atomic fetch-and-set x, y instruction unconditionally sets the memory
location x to 1 and fetches the old value of x n y without allowing any intervening
access to the memory location x. Consider the following implementation of P and
V functions on a binary semaphore S.
void P (binary_semaphore *s) {
unsigned y;
unsigned *x = &(s->value);
do {
fetch-and-set x, y;
} while (y);
}
void V (binary_semaphore *s) {
S->value = 0;
}
Which one of the following is true?
(A) The implementation may not work if context switching is disabled in P
(B) Instead of using fetch-and -set, a pair of normal load/store can be used
(C) The implementation of V is wrong
(D) The code does not implement a binary semaphore
View/Hide Ans
Correct Answer is A
62. A CPU generates 32-bit virtual addresses. The page size is 4 KB. The processor
has a translation look-aside buffer (TLB) which can hold a total of 128 page table
entries and is 4-way set associative.
The minimum size of the TLB tag is:
(A) 11 bits
(B) 13 bits
(C) 15 bits
(D) 20 bits
View/Hide Ans
Correct Answer is C
63. A computer system supports 32-bit virtual addresses as well as 32-bit physical
addresses. Since the virtual address space is of the same size as the physical
address space, the operating system designers decide to get rid of the virtual
memory entirely.
Which one of the following is true?
(A) Efficient implementation of multi-user support is no longer possible
(B) The processor cache organization can be made more efficient now
(C) Hardware support for memory management is no longer needed
(D) CPU scheduling can be made more efficient now
View/Hide Ans
Correct Answer is C
64. Consider three processes (process id 0, 1, 2 respectively) with compute time
bursts 2, 4 and 8 time units. All processes arrive at time zero. Consider the
longest remaining time first (LRTF) scheduling algorithm. In LRTF ties are broken
by giving priority to the process with the lowest process id.
The average turn
around time is:
(A) 13 units
(B) 14 units
(C) 15 units
(D) 16 units
View/Hide Ans
Correct Answer is A
65. Consider three processes, all arriving at time zero, with total execution time of
10, 20 and 30 units, respectively. Each process spends the first 20% of execution
time doing I/O, the next 70% of time doing computation, and the last 10% of
time doing I/O again. The operating system uses a shortest remaining compute
time first scheduling algorithm and schedules a new process either when the
running process gets blocked on I/O or when the running process finishes its
compute burst. Assume that all I/O operations can be overlapped as much as
possible.
For what percentage of time does the CPU remain idle?
(A) 0%
(B) 10.6%
(C) 30.0%
(D) 89.4%
View/Hide Ans
Correct Answer is B
66. Consider the following snapshot of a system running n processes. Process i is
holding xi instances of a resource R, 1≤i≤n. currently, all instances of R are
occupied. Further, for all i, process i has placed a request for an additional
yi instances while holding the xi instances it already has. There are exactly two
processes p and q such that yp=yq=0.
Which one of the following can serve as
a necessary condition to guarantee that the system is not approaching a
deadlock?
(A) min(xp,xq) < max k≠p,q yk
(B) xp+xq ≥ min k≠p,q yk
(C) max(xp,xq ) > 1
(D) min(xp,xq ) > 1
View/Hide Ans
Correct Answer is B
67. Consider the relation account (customer, balance) where customer is a primary
key and there are no null values. We would like to rank customers according to
decreasing balance. The customer with the largest balance gets rank 1. ties are not broke but ranks are skipped: if exactly two customers have the largest
balance they each get rank 1 and rank 2 is not assigned.
Query1: select A.customer, count(B.customer)
from account A, account B
where A.balance <=B.balance
group by A.customer
Query2: select A.customer, 1+count(B.customer)
from account A, account B
where A.balance < B.balance
group by A.customer
Consider these statements about Query1 and Query2.
1. Query1 will produce the same row set as Query2 for some but not all
databases.
2. Both Query1 and Query2 are correct implementation of the specification
3. Query1 is a correct implementation of the specification but Query2 is not
4. Neither Query1 nor Query2 is a correct implementation of the specification
5. Assigning rank with a pure relational query takes less time than scanning in
decreasing balance order assigning ranks using ODBC.
Which two of the above statements are correct?
(A) 2 and 5
(B) 1 and 3
(C) 1 and 4
(D) 3 and 5
View/Hide Ans
Correct Answer is C
68. Consider the relation enrolled (student, course) in which (student, course) is the
primary key, and the relation paid (student, amount) where student is the
primary key. Assume no null values and no foreign keys or integrity constraints.
Given the following four queries:
Query1: select student from enrolled where student in (select student from paid)
Query2: select student from paid where student in (select student from enrolled)
Query3: select E.student from enrolled E, paid P where E.student = P.student
Query4: select student from paid where exists
(select * from enrolled where enrolled.student = paid.student)
Which one of the following statements is correct?
(A) All queries return identical row sets for any database
(B) Query2 and Query4 return identical row sets for all databases but there exist
databases for which Query1 and Query2 return different row sets.
(C) There exist databases for which Query3 returns strictly fewer rows than
Query2
(D) There exist databases for which Query4 will encounter an integrity violation
at runtime.
View/Hide Ans
Correct Answer is A
69. Consider the relation enrolled (student, course) in which (student, course) is the
primary key, and the relation paid (student, amount) where student is the
primary key. Assume no null values and no foreign keys or integrity constraints.
Assume that amounts 6000, 7000, 8000, 9000 and 10000 were each paid by
20% of the students. Consider these query plans (Plan 1 on left, Plan 2 on right)
to "list all courses taken by students who have paid more than x".
70. The following functional dependencies are given:
AB → CD, AF → D, DE → F,C → G, F → E, G → A.
Which one of the following options is false?
(A) {CF}+={ACDEFG}
(B) {BG}+={ABCDG}
(C) {AF}+={ACDEFG}
(D) {AB}+={ABCDFG}
View/Hide Ans
Correct Answer is C
71. The 2n vertices of a graph G corresponds to all subsets of a set of size n,
for n≥6 . Two vertices of G are adjacent if and only if the corresponding sets intersect in exactly two
elements.
The number of vertices of degree zero in G is:
(A) 1
(B) n
(C) n + 1
(D) 2n
View/Hide Ans
Correct Answer is C
72. The 2n vertices of a graph G corresponds to all subsets of a set of size n,
for n≥6 . Two vertices of G are adjacent if and only if the corresponding sets intersect in exactly two
elements.
The maximum degree of a vertex in G is:
(A) (n/2)C2.nn/2
(B) 2n-2
(C) 2n-3*3
(D) 2n-1
View/Hide Ans
Correct Answer is A
73. The 2n vertices of a graph G corresponds to all subsets of a set of size n,
for n≥6 . Two vertices of G are adjacent if and only if the corresponding sets intersect in exactly two
elements.
The number of connected components in G is:
(A) n
(B) n+2
(C) 2n/2
(D) 2n/n
View/Hide Ans
Correct Answer is B
74. Consider two cache organizations: The first one is 32 KB 2-way set associative with 32-
byte block size. The second one is of the same size but direct mapped. The size of an
address is 32 bits in both cases. A 2-to-1 multiplexer has a latency of 0.6 ns while a k-bit
comparator has a latency of k/10 ns. The hit latency of the set associative
organization is h1 while that of the direct mapped one is h2 .
The value of h1 is:
(A) 2.4 ns
(B) 2.3 ns
(C) 1.8 ns
(D) 1.7 ns
View/Hide Ans
Correct Answer is A
75. Consider two cache organizations: The first one is 32 KB 2-way set associative with 32-
byte block size. The second one is of the same size but direct mapped. The size of an
address is 32 bits in both cases. A 2-to-1 multiplexer has a latency of 0.6 ns while a k-bit
comparator has a latency of k/10 ns. The hit latency of the set associative
organization is h1 while that of the direct mapped one is h2 .
The value of h2 is:
(A) 2.4 ns
(B) 2.3 ns
(C) 1.8 ns
(D) 1.7 ns
View/Hide Ans
Correct Answer is D
76. A 3-ary max heap is like a binary max heap, but instead of 2 children, nodes have 3
children. A 3-ary heap can be represented by an array as follows: The root is stored in
the first location, a[0], nodes in the next level, from left to right, is stored from a[1] to
a[3]. The nodes from the second level of the tree from left to right are stored from a[4]
location onward. An item x can be inserted into a 3-ary heap containing n items by
placing x in the location a[n] and pushing it up the tree to satisfy the heap property.
Which one of the following is a valid sequence of elements in an array
representing 3-ary max heap?
(A) 1, 3, 5, 6, 8, 9
(B) 9, 6, 3, 1, 8, 5
(C) 9, 3, 6, 8, 5, 1
(D) 9, 5, 6, 8, 3, 1
View/Hide Ans
Correct Answer is D
77. A 3-ary max heap is like a binary max heap, but instead of 2 children, nodes have 3
children. A 3-ary heap can be represented by an array as follows: The root is stored in
the first location, a[0], nodes in the next level, from left to right, is stored from a[1] to
a[3]. The nodes from the second level of the tree from left to right are stored from a[4]
location onward. An item x can be inserted into a 3-ary heap containing n items by
placing x in the location a[n] and pushing it up the tree to satisfy the heap property.
Suppose the elements 7, 2, 10 and 4 are inserted, in that order, into the valid 3-
ary max heap found in the above question, Q.76. Which one of the following is
the sequence of items in the array representing the resultant heap?
(A) 10, 7, 9, 8, 3, 1, 5, 2, 6, 4
(B) 10, 9, 8, 7, 6, 5, 4, 3, 2, 1
(C) 10, 9, 4, 5, 7, 6, 8, 2, 1, 3
(D) 10, 8, 6, 9, 7, 2, 3, 4, 1, 5
View/Hide Ans
Correct Answer is A
78. Barrier is a synchronization construct where a set of processes synchronizes globally i.e.
each process in the set arrives at the barrier and waits for all others to arrive and then
all processes leave the barrier. Let the number of processes in the set be three and S be
a binary semaphore with the usual P and V functions. Consider the following C
implementation of a barrier with line numbers shown on left.
void barrier (void) {
1: P(S);
2: process_arrived++;
3. V(S);
4: while (process_arrived !=3);
5: P(S);
6: process_left++;
7: if (process_left==3) {
8: process_arrived = 0;
9: process_left = 0;
10: }
11: V(S);
}
The variables process_arrived and process_left are shared among all processes and are
initialized to zero. In a concurrent program all the three processes call the barrier
function when they need to synchronize globally.}
The above implementation of barrier is incorrect. Which one of the following is
true?
(A) The barrier implementation is wrong due to the use of binary semaphore S
(B) The barrier implementation may lead to a deadlock if two barrier in
invocations are used in immediate succession
(C) Lines 6 to 10 need not be inside a critical section
(D) The barrier implementation is correct if there are only two processes instead
of three
View/Hide Ans
Correct Answer is B
79. Barrier is a synchronization construct where a set of processes synchronizes globally i.e.
each process in the set arrives at the barrier and waits for all others to arrive and then
all processes leave the barrier. Let the number of processes in the set be three and S be
a binary semaphore with the usual P and V functions. Consider the following C
implementation of a barrier with line numbers shown on left.
void barrier (void) {
1: P(S);
2: process_arrived++;
3. V(S);
4: while (process_arrived !=3);
5: P(S);
6: process_left++;
7: if (process_left==3) {
8: process_arrived = 0;
9: process_left = 0;
10: }
11: V(S);
}
The variables process_arrived and process_left are shared among all processes and are
initialized to zero. In a concurrent program all the three processes call the barrier
function when they need to synchronize globally.}
Which one of the following rectifies the problem in the implementation?
(A) Lines 6 to 10 are simply replaced by process_arrived--
(B) At the beginning of the barrier the first process to enter the barrier waits
until process_arrived becomes zero before proceeding to execute P(S).
(C) Context switch is disabled at the beginning of the barrier and re-enabled at
the end.
(D) The variable process_left is made private instead of shared
View/Hide Ans
Correct Answer is B
80. A CPU has a 32 KB direct mapped cache with 128-byte block size. Suppose A is a twodimensional
array of size 512×512 with elements that occupy 8-bytes each. Consider the
following two C code segments, P1 and P2.
P1: for (i=0; i<512; i++) {
for (j=0; j<512; j++) {
x +=A[i] [j];
}
}
P2: for (i=0; i<512; i++) {
for (j=0; j<512; j++) {
x +=A[j] [i];
}
}
P1 and P2 are executed independently with the same initial state, namely, the array A is
not in the cache and i, j, x are in registers. Let the number of cache misses experienced
by P1 be M1 and that for P2 be M2 .
The value of M1 is:
(A) 0
(B) 2048
(C) 16384
(D) 262144
View/Hide Ans
Correct Answer is C
81. A CPU has a 32 KB direct mapped cache with 128-byte block size. Suppose A is a twodimensional
array of size 512×512 with elements that occupy 8-bytes each. Consider the
following two C code segments, P1 and P2.
P1: for (i=0; i<512; i++) {
for (j=0; j<512; j++) {
x +=A[i] [j];
}
}
P2: for (i=0; i<512; i++) {
for (j=0; j<512; j++) {
x +=A[j] [i];
}
}
P1 and P2 are executed independently with the same initial state, namely, the array A is
not in the cache and i, j, x are in registers. Let the number of cache misses experienced
by P1 be M1 and that for P2 be M2 .
The value of the ratio M1/M3 is
(A) 0
(B) 1/16
(C) 1/8
(D) 16
View/Hide Ans
Correct Answer is B
82. Consider the diagram shown below where a number of LANs are connected by
(transparent) bridges. In order to avoid packets looping through circuits in the graph,
the bridges organize themselves in a spanning tree. First, the root bridge is identified as
the bridge with the least serial number. Next, the root sends out (one or more) data
units to enable the setting up of the spanning tree of shortest paths from the root bridge
to each bridge.
Each bridge identifies a port (the root port) through which it will forward frames to the
root bridge. Port conflicts are always resolved in favour of the port with the lower index
value. When there is a possibility of multiple bridges forwarding to the same LAN (but
not through the root port), ties are broken as follows: bridges closest to the root get
preference and between such bridges, the one with the lowest serial number is
preferred
83. Consider the diagram shown below where a number of LANs are connected by
(transparent) bridges. In order to avoid packets looping through circuits in the graph,
the bridges organize themselves in a spanning tree. First, the root bridge is identified as
the bridge with the least serial number. Next, the root sends out (one or more) data
units to enable the setting up of the spanning tree of shortest paths from the root bridge
to each bridge.
Each bridge identifies a port (the root port) through which it will forward frames to the
root bridge. Port conflicts are always resolved in favour of the port with the lower index
value. When there is a possibility of multiple bridges forwarding to the same LAN (but
not through the root port), ties are broken as follows: bridges closest to the root get
preference and between such bridges, the one with the lowest serial number is
preferred
Statement for Linked Answer Questions 84 & 85:
84. Which one of the following grammars generates the language L={aibj| i≠j}?
(A) S→AC|CB
C→aCb|a|b
A→aA|ε
B→Bb|ε
(B) S→aS|Sb|a|b
(C) S→AC|CB
C→aCb|ε
A→aA|ε
B→Bb|ε
(D) S→AC|CB
C→aCb|ε
A→aA|a
B→Bb|b
View/Hide Ans
Correct Answer is D
85. In the correct grammar above, what is the length of the derivation (number of
steps starring from S) to generate the string albm with l≠m?
(A) max(l,m)+2
(B) l+m+2
(C) l+m+3
(D) max(l,m)+3
View/Hide Ans
Correct Answer is A
© 2022. All Rights Reserved | Copyright | Terms of Use & Privacy Policy