A hero is an ordinary individual who finds the strength to persevere and endure in spite of overwhelming obstacles.
1. The simplified SOP(Sum of Product) form of the Boolean expression
(P + Q' + R').(P + Q' + R).(P + Q + R') is
(A) (P'Q + R')
(B) (P + Q'R')
(C) (P'Q + R)
(D) (PQ + R)
View/Hide Ans
Correct Answer is B
2. Which one of the following circuits is NOT equivalent to a 2-input XNOR(exclusive NOR) gate?
3. The minimum number of D flip-flops needed to design a mod-258 counter is
(A) 9
(B) 8
(C) 512
(D) 258
View/Hide Ans
Correct Answer is A
4. A thread is usually defined as a 'light weight process' because an operating
system(OS) maintains smaller data structures for a thread than for a process.
In relation to this, which of the followings is TRUE?
(A) On per-thread basis, the OS maintains only CPU register state
(B) The OS does not maintain a separate stack for each thread
(C) On per-thread basis, the OS does not maintain virtual memory state
(D) On per thread basis, the OS maintains only scheduling and accounting
information
View/Hide Ans
Correct Answer is c
5. K4 and Q3 are graphs with the following structures
6. If the difference between the expectation of the square of random variable
(E[X2]) and the square of the expectation of the random variable (E[X2]) is
denoted by R then
(A) R = 0
(B) R < 0
(C) R ≥ 0
(D) R > 0
View/Hide Ans
Correct Answer is C
7. The lexical analysis for a modern computer language such as Java needs the
power of which one of the following machine models in a necessary and sufficient
sense?
(A) Finite state automata
(B) Deterministic pushdown automata
(C) Non-Deterministic pushdown automata
(D) Turing machine
View/Hide Ans
Correct Answer is A
8. Let the page fault service time be 10 ms in a computer with average memory
access time being 20 ns.
If one page fault is generated for every 106 memory
accesses, what is the effective access time for the memory?
(A) 21 ns
(B) 30 ns
(C) 23 ns
(D) 35 ns
View/Hide Ans
Correct Answer is B
9. Consider a hypothetical processor with an instruction of type LW R1, 20(R2),
which during execution reads a 32-bit word from memory and stores it in a 32-bit
register R1. The effective address of the memory location is obtained by the
addition of constant 20 and the contents of register R2.
Which of the following
best reflects the addressing mode implemented by this instruction for the
operand in memory?
(A) Immediate Addressing
(B) Register Addressing
(C) Register Indirect Scaled Addressing
(D) Base Indexed Addressing
View/Hide Ans
Correct Answer is D
10. What does the following fragment of C-program print?
char c[] = "GATE2011";
char *p = c;
printf ("%s", p+p[3]-p[1]);
(A) GATE2011
(B) E2011
(C) 2011
(D) 011
View/Hide Ans
Correct Answer is C
11. A max-heap is a heap where the value of each parent is greater than or equal to
the value of its children.
Which of the following is a max-heap?
View/Hide Ans
Correct Answer is B
12. An algorithm to find the length of the longest monotonically increasing sequence
of numbers in an array A[0:n-1] is given below.
Let Li denote the length of the longest monotonically increasing sequence starting
at index i in the array
Which of the following statements is TRUE?
(A) The algorithm uses dynamic programming paradigm
(B) The algorithm has a linear complexity and uses branch and bound paradigm
(C) The algorithm has a non-linear polynomial complexity and uses branch and
bound paradigm
(D) The algorithm uses divide and conquer paradigm
View/Hide Ans
Correct Answer is A
13. Let P be a regular language and Q be a context free language such that Q ⊆ P.
For example, let P be the language represented by the regular expression p*q*
and Q be { pnqn | n ∈N }.
Then which of the following is ALWAYS regular?
(A) P ∩ Q
(B) P - Q
(C) ∑* - P
(D) ∑* - Q
View/Hide Ans
Correct Answer is C
14. In a compiler, keywords of a language are recognized during
(A) parsing of the program
(B) the code generation
(C) the lexical analysis of the program
(D) dataflow analysis
View/Hide Ans
Correct Answer is C
15. A layer-4 firewall (a device that can look at all protocol headers up to the
transport layer) CANNOT
(A) block entire HTTP traffic during 9:00PM and 5:00AM
(B) block all ICMP traffic
(C) stop incoming traffic from a specific IP address but allow outgoing traffic to
the same IP address
(D) block TCP traffic from a specific user on a multi-user system during 9:00PM
and 5:00AM
View/Hide Ans
Correct Answer is D
16. If two fair coins are flipped and at least one of the outcomes is known to be a
head, what is the probability that both outcomes are heads?
(A) 1/3
(B) 1/4
(C) 1/2
(D) 2/3
View/Hide Ans
Correct Answer is A
17. Consider different activities related to email.
m1: Send an email from a mail client to a mail server
m2: Download an email from mailbox server to a mail client
m3: Checking email in a web browser
Which is the application level protocol used in each activity?
(A) m1:HTTP m2:SMTP m3:POP
(B) m1:SMTP m2:FTP m3:HTTP
(C) m1:SMTP m2:POP m3:HTTP
(D) m1:POP m2:SMTP m3:IMAP
View/Hide Ans
Correct Answer is C
18. A company needs to develop a strategy for software product development for
which it has a choice of two programming languages L1 and L2. The number of
lines of code (LOC) developed using L2 is estimated to be twice the LOC
developed with L1. the product will have to be maintained for five years. Various
parameters for the company are given in the table below.
19. Let the time taken to switch between user and kernel modes of execution be t1
while the time taken to switch between two processes be t2.
Which of the
following is TRUE?
(A) t1 > t2
(B) t1 = t2
(C) t1 < t2
(D) Nothing can be said about the relation between t1 and t2
View/Hide Ans
Correct Answer is C
20. A company needs to develop digital signal processing software for one of its
newest inventions. The software is expected to have 40000 lines of code. The
company needs to determine the effort in person-months needed to develop this
software using the basic COCOMO model. The multiplicative factor for this model
is given as 2.8 for the software development on embedded systems, while the
exponentiation factor is given as 1.20.
What is the estimated effort in personmonths?
(A) 234.25
(B) 932.50
(C) 287.80
(D) 122.40
View/Hide Ans
Correct Answer is A
21. Which of the following pairs have DIFFERENT expressive power?
(A) Deterministic finite automata(DFA) and Non-deterministic finite automata(NFA)
(B) Deterministic push down automata(DPDA) and Non-deterministic push down
automata(NPDA)
(C) Deterministic single-tape Turing machine and Non-deterministic single tape
Turing machine
(D) Single-tape Turing machine and multi-tape Turing machine
View/Hide Ans
Correct Answer is B
22. HTML(Hyper Text Markup Language) has language elements which permit
certain actions other than describing the structure of the web document.
Which
one of the following actions is NOT supported by pure HTML (without any server
or client side scripting) pages?
(A) Embed web objects from different sites into the same page
(B) Refresh the page automatically after a specified interval
(C) Automatically redirect to another page upon download
(D) Display the client time as part of the page
View/Hide Ans
Correct Answer is D
23. Which of the following is NOT desired in a good Software Requirement
Specifications(SRS) document?
(A) Functional Requirements
(B) Non Functional Requirements
(C) Goals of Implementation
(D) Algorithms for Software Implementation
View/Hide Ans
Correct Answer is D
24. A computer handles several interrupt sources of which the following are relevant
for this question.
1. Interrupt from CPU temperature sensor
2. Interrupt from Mouse
3. Interrupt from Keyboard
4. Interrupt from Hard Disk
(A) Interrupt from Hard Disk
(B) Interrupt from Mouse
(C) Interrupt from Keyboard
(D) Interrupt from CPU temperature sensor
View/Hide Ans
Correct Answer is D
25. Consider a relational table with a single record for each registered student with
the following attributes.
1. Registration_Number: Unique registration number for each registered student
2. UID: Unique Identity number, unique at the national level for each citizen
3. BankAccount_Number: Unique account number at the bank. A student can
have multiple accounts or joint accounts. This attributes stores the primary
account number
4. Name: Name of the Student
5. Hostel_Room: Room number of the hostel
Which of the following options is INCORRECT?
(A) BankAccount_Number is a candidate key
(B) Registration_Number can be a primary key
(C) UID is a candidate key if all students are from the same country
(D) If S is a superkey such that S∩UID is NULL then S∪UID is also a superkey
View/Hide Ans
Correct Answer is A
26. Which of the given options provides the increasing order of asymptotic
complexity of functions ?
f1(n) = 2n
f2(n) = n(3/2)
f3(n) = nLogn
f4(n) = n(Logn)
(A) f3, f2, f4, f1
(B) f3, f2, f1, f4
(C) f2, f3, f1, f4
(D) f2, f3, f4, f1
View/Hide Ans
Correct Answer is A
27. Four matrices M1, M2, M3 and M4
are dimensions p*q, q*r, r*s and s*t
respectively can be multiplied in several ways with different number of total
scalar multiplications.
For example when multiplied as ((M1*M2)*(M3*M4))
the
total number of scalar multiplications is pqr+rst+prt.
When multiplied as
(((M1*M2)*M3)*M4) ,
the total number of scalar multiplications is pqr+prs+pst.
If p=10, q=100, r=20, s=5 and t=80, then the minimum number of scalar
multiplications needed is
(A) 248000
(B) 44000
(C) 19000
(D) 25000
View/Hide Ans
Correct Answer is C
28. Consider a relational table r with sufficient number of records, having attributes
A1, A2,..., An and let 1 ≤ p ≤ n.
Two queries Q1 and Q2 are given below.
The database can be configured to do ordered indexing on Ap or hashing on Ap.
Which of the following statements is TRUE?
(A) Ordered indexing will always outperform hashing for both queries
(B) Hashing will always outperform ordered indexing for both queries
(C) Hashing will outperform ordered indexing on Q1, but not on Q2
(D) Hashing will outperform ordered indexing on Q2, but not on Q1
View/Hide Ans
Correct Answer is C
29. Consider the matrix as given below.
Which one of the following provides the CORRECT values of eigenvalues of the
matrix?
(A) 1,4,3
(B) 3,7,3
(C) 7,3,2
(D) 1,2,3
View/Hide Ans
Correct Answer is A
30. Consider an instruction pipeline with four stages (S1, S2, S3 and S4) each with
combinational circuit only. The pipeline registers are required between each stage
and at the end of the last stage. Delays for the stages and for the pipeline
registers are as given in the figure.
31. Definition of a language L with alphabet {a} is given as following
L ={ank | k > 0, and n is a positive integer constant}
What is the minimum number of states needed in a DFA to recognize L?
(A) k+1
(B) n+1
(C) 2n+1
(D) 2k+1
View/Hide Ans
Correct Answer is B
32. An 8 KB direct mapped write-back cache is organized as multiple blocks, each of
size 32-bytes. The processor generates 32-bit addresses. The cache controller
maintains the tag information for each cache block comprising of the following: 1 Valid bit and
1 modified bit.
As many bits as the minimum needed to identify the memory block mapped in
the cache.
What is the total size of memory needed at the cache controller to store metadata
(tags) for the cache?
(A) 4864 bits
(B) 6144 bits
(C) 6656 bits
(D) 5376 bits
View/Hide Ans
Correct Answer is D
33. An application loads 100 libraries at startup. Loading each library requires exactly
one disk access. The seek time of the disk to a random location is given as 10 ms.
Rotational speed of disk is 6000 rpm.
If all 100 libraries are loaded from random
locations on the disk, how long does it take to load all libraries?
(Note: The time to
transfer data from the disk block once the head has been positioned at the start
of the block may be neglected)
(A) 0.50 s
(B) 1.50 s
(C) 1.25 s
(D) 1.00 s
View/Hide Ans
Correct Answer is B
34. A deterministic finite automation (DFA)D with alphabet ∑ = {a,b} is given below
35. The following is comment written for a C function
A software test engineer is assigned the job of doing black box testing. He comes
up with the following test cases, many of which are redundant.
Which one of the following options provide the set of non-redundant tests using
equivalence class partitioning approach from input perspective for black box
testing?
(A) T1, T2, T3, T6
(B) T1, T3, T4, T5
(C) T2, T4, T5, T6
(D) T2, T3, T4, T5
View/Hide Ans
Correct Answer is C
36. Database table by name Loan_Records is given below.
What is the output of the following SQL query?
(A) 3
(B) 9
(C) 5
(D) 6
View/Hide Ans
Correct Answer is C
37. Consider two binary operators '↑' and '↓ ' with the precedence of operator ↓
being lower than that of the operator ↑ . Operator ↑ is right associative while
operator ↓, is left associative.
Which one of the following represents the parse
tree for expression (7 ↓ 3 ↑ 4↑ 3↓ 2)?
View/Hide Ans
Correct Answer is B
38. Consider the languages L1, L2 and L3 as given below
L1={0p1q | p,q ∈ N}
L2={0p1q | p,q ∈ N and p=q} and
L3={0p1q 0r | p,q,r ∈ N and p=q=r}
Which of the following statements is NOT TRUE?
(A) Push Down Automata(PDA) can be used to recognize L1 and L2
(B) L1 is a regular language
(C) All the three languages are context free
(D) Turing machines can be used to recognize all the languages
View/Hide Ans
Correct Answer is C
39. On a non-pipelined sequential processor, a program segment, which is a part of
the interrupt service routine, is given to transfer 500 bytes from an I/O device to
memory.
Assume that each statement in this program is equivalent to a machine
instruction which takes one clock cycle to execute if it is a non-load/store
instruction. The load-store instructions take two clock cycles to execute.
The designer of the system also has an alternate approach of using the DMA
controller to implement the same transfer. The DMA controller requires 20 clock
cycles for initialization and other overheads. Each DMA transfer cycle takes two
clock cycles to transfer one byte of data from the device to the memory.
What is the approximate speedup when the DMA controller based design is used
in place of the interrupt driven program based input-output?
(A) 3.4
(B) 4.4
(C) 5.1
(D) 6.7
View/Hide Ans
Correct Answer is A
40. We are given a set of n distinct elements and an unlabeled binary tree with n
nodes. In how many ways can we populate the tree with the given set so that it
becomes a binary search tree?
(A) 0
(B) 1
(C) n!
(D) 1/(n+1). 2nCn
View/Hide Ans
Correct Answer is B
41. Which one of the following options is CORRECT given three positive integers x, y
and z, and a predicate
P (x) = ~(x = 1) ∧ ∀(∃z (x = y * z) ⇒ (y = x) ∨ (y = 1))
(A) P(x) being true means that x is a prime number
(B) P(x) being true means that x is a number other than 1
(C) P(x) is always true irrespective of the value of x
(D) P(x) being true means that x has exactly two factors other than 1 and x
View/Hide Ans
Correct Answer is A
42. Given i = √-1, what will be the evaluation of the definite integral
(A) 0
(B) 2
(C) -i
(D) i
View/Hide Ans
Correct Answer is D
43. Consider a database table T containing two columns X and Y each of type integer.
After the creation of the table, one record (X= 1, Y=l) is inserted in the table.
Let MX and MY denote the respective maximum values of X and Y among all
records in the table at any point in time. Using MX and MY, new records are
inserted in the table 128 times with X and Y values being MX+1, 2*MY+1
respectively. It may be noted that each time after the insertion, values of MX and
MY change.
What will be the output of the following SQL query after the steps mentioned
above are carried out?
SELECT Y FROM T WHERE X=7;
(A) 127
(B) 255
(C) 129
(D) 257
View/Hide Ans
Correct Answer is A
44. Consider a finite sequence of random values X = [x1,x2,...xn] . Let μx be the mean
and σx be the standard deviation of X. Let another finite sequence Y of equal
length be derived from this as yi = a*xi + b, where a and b are positive
constants. Let μy be the mean and σy be the standard deviation of this
sequence.
Which one of the following statements is INCORRECT?
(A) Index position of mode of X in X is the same as the index position of mode of Y
in Y.
(B) Index position of median of X in X is the same as the index position of median
of Y in Y.
(C) μy = aμx + b
(D) σy = aσx + b
View/Hide Ans
Correct Answer is D
45. A deck of 5 cards (each carrying a distinct number from 1 to 5) is shuffled
thoroughly. Two cards are then removed one at a time from the deck.
What is
the probability that the two cards are selected with the number on the first card
being one higher than the number on the second card?
(A) 1/5
(B) 4/25
(C) 1/4
(D) 2/5
View/Hide Ans
Correct Answer is A
46. Consider the following table of arrival time and burst time for three processes P0,
P1 and P2.
Process Arrival Time Burst Time P0 0 ms 9 ms P1 1 ms 4 ms P2 2 ms 9 ms
The pre-emptive shortest job first scheduling algorithm is used. Scheduling is
carried out only at arrival or completion of processes.
What is the average
waiting time for the three processes?
(A) 5.0 ms
(B) 4.33 ms
(C) 6.33 ms
(D) 7.33 ms
View/Hide Ans
Correct Answer is A
47. Consider evaluating the following expression tree on a machine with load-store
architecture in which memory can be accessed only through load and store
instructions. The variables a, b, c, d and e are initially stored in memory. The
binary operators used in this expression tree can be evaluated by the machine
only when the operands are in registers. The instructions produce result only in a
register. If no intermediate results can be stored in memory, what is the
minimum number of registers needed to evaluate this expression?
48. Consider the following recursive C function that takes two arguments
unsigned int foo(unsigned int n, unsigned int r) {
if (n > 0) return (n%r + foo (n/r, r ));
else return 0;
}
What is the return value of the function foo when it is called as foo(513, 2)?
(A) 9
(B) 8
(C) 5
(D) 2
View/Hide Ans
Correct Answer is D
49. Consider the following recursive C function that takes two arguments
unsigned int foo(unsigned int n, unsigned int r) {
if (n > 0) return (n%r + foo (n/r, r ));
else return 0;
}
What is the return value of the function foo when it is called as foo(345, 10) ?
(A) 345
(B) 12
(C) 5
(D) 3
View/Hide Ans
Correct Answer is B
50. Consider the following circuit involving three D-type flip-flops used in a certain
type of counter configuration.
51. Consider the following circuit involving three D-type flip-flops used in a certain
type of counter configuration.
52. An undirected graph G(V,E) contains n(n>2 ) nodes named v1 , v2 ,….vn.
Two nodes vi, vj are connected if and only if 0 < |i – j| ≤ 2.
Each edge (vi, vj ) is assigned a weight i+j.
A sample graph with n = 4 is shown below.
53. An undirected graph G(V,E) contains n(n>2 ) nodes named v1 , v2 ,….vn.
Two nodes vi, vj are connected if and only if 0 < |i – j| ≤ 2.
Each edge (vi, vj ) is assigned a weight i+j.
A sample graph with n = 4 is shown below.
54. Consider a network with five nodes, N1 to N5, as shown below
55.Consider a network with five nodes, N1 to N5, as shown below
56. If Log(P) = (1/2)Log(Q) = (1/3)Log(R), then which of the following options is
TRUE?
(A) P2 = Q3R2
(B) Q2 = PR
(C) Q2 = R3P
(D) R = P2Q2
View/Hide Ans
Correct Answer is B
57. Choose the most appropriate word(s) from the options given below to complete
the following sentence.
"I contemplated________Singapore for my vacation but decided against
it."
(A) To visit
(B) having to visit
(C) visiting
(D) for a visit
View/Hide Ans
Correct Answer is C
58. Choose the most appropriate word from the options given below to complete the
following sentence.
"If you are trying to make a strong impression on your audience, you
cannot do so by being understated, tentative or_____________."
(A) Hyperbolic
(B) Restrained
(C) Argumentative
(D) Indifferent
View/Hide Ans
Correct Answer is B
59. Choose the word from the options given below that is most nearly opposite in
meaning to the given word: Amalgamate
(A) Merge
(B) Split
(C) Collect
(D) Separate
View/Hide Ans
Correct Answer is B
60. Which of the following options is the closest in the meaning to the word:
Inexplicable
(A) Incomprehensible
(B) Indelible
(C) Inextricable
(D) Infallible
View/Hide Ans
Correct Answer is A
61. P, Q, R and S are four types of dangerous microbes recently found in a human
habitat. The area of each circle with its diameter printed in brackets represents
the growth of a single microbe surviving human immunity system within 24 hours
of entering the body. The danger to human beings varies proportionately with the
toxicity, potency and growth attributed to a microbe shown in the figure
below
62. The variable cost(V) of manufacturing a product varies according to the equation
V= 4q, where q is the quantity produced. The fixed cost(F) of production of same
product reduces with q according to the equation F = 100/q.
How many units
should be produced to minimize the total cost (V+F)?
(A) 5
(B) 4
(C) 7
(D) 6
View/Hide Ans
Correct Answer is A
63. A transporter receives the same number of orders each day. Currently, he has
some pending orders(backlog) to be shipped. If he uses 7 trucks, then at the
end of the 4th day he can clear all the orders. Alternatively, if he uses only 3
trucks, then all the orders are cleared at the end of the 10th day.
What is the
minimum number of trucks required so that there will be no pending order at the
end of the 5th day?
(A) 4
(B) 5
(C) 6
(D) 7
View/Hide Ans
Correct Answer is C
64. A container originally contains 10 litres of pure spirit. From this container 1 litre
of spirit is replaced with 1 litre of water. Subsequently, 1 litre of the mixture is
again replaced with 1 litre of water and this process is repeated one more time.
How much spirit is now left in the container?
(A) 7.58 litres
(B) 7.84 litres
(C) 7 litres
(D) 7.29 litres
View/Hide Ans
Correct Answer is D
65. Few school curricula include a unit on how to deal with bereavement and
grief, and yet all students at some point in their lives suffer from losses
through death and parting.
Based on the above passage which topic would not be included in a unit on
bereavement?
(A) how to write a letter of condolence
(B) what emotional stages are passed through in the healing process
(C) what the leading causes of death are
(D) how to give support to a grieving friend
View/Hide Ans
Correct Answer is C
© 2022. All Rights Reserved | Copyright | Terms of Use & Privacy Policy