PHD PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 53

KALASALINGAM ACADEMY OF RESEARCH AND EDUCATION

(Kalasalingam University)
Anand Nagar, Krishnankoil: 626 126

TEMPLATE FOR Ph.(d) ENTRANCE EXAMINATION QUESTIONS

Department: Computer Science and Engineering

Total Number of Questions Required: More than 300

Questions required per subheading: Minimum 30

1. TCP/UDP and sockets / Computer Networks / Networks (Minimum 30 Questions)


Questions
1. Which of the following assertions is false about the internet Protocol (IP)?
(a) It is possible for a computer to have multiple IP addresses
(b) IP packets from the same source to the same destination can take
different routes in the network
(c) IP ensures that a packet is forwarded if it is unable to reach its
destination within a given number of hopes
(d) The packet source cannot set the route of an outgoing packets;
the route is determined only by the routing tables in the routers
on the way.
2. Which of the following functionalities must be implemented by a transport protocol over and
above the network protocol ?
(a) Recovery from packet losses
(b) Detection of duplicate packets
(c) Packet delivery in the correct order
(d) End to end connectivity
3. The subnet mask for a particular network is 255.255.31.0 Which of the following pairs of IP
addresses could belong to this network?
(a) 172.57.88.62 and 172.56.87.23.2
(b) 10.35.28.2 and 10.35.29.4
(c) 191.203.31.87 and 191.234.31.88
(d) 128.8.129.43 and 128.8.161.55
4. A 2 km long broadcast LAN has 107 bps bandwidth and uses CSMA/C(d) The signal travels
along the wire at 2 ×108 m/s. What is the minimum packet size that can be used on this
network ?
(a) 50 bytes (b) 100 bytes (c) 200 bytes (d) None of the above
5. Host A is sending data to host B over a full duplex link. A and B are using the sliding window
protocol for flow control. The send and receive window sizes are 5 packets each. Data packets
(sent only from A to B) are all 1000 bytes long and the transmission time for such a packet is
50 μs . Acknowledgment packets (sent only from B to A), are very small and require negligible
transmission time. The propagation delay over the link is 200 μs. What is the maximum
achievable throughput in this communication?
(a) 7.69 ×106 bps (b) 11.11× 106 bps (c) 12.33×106 bps (d) 15.00 106 bps
6. Which of the following is NOT true with respective to a transparent bridge and a router ?
(a) Both bridge and router selectively forward data packets
(b) A bridge uses IP addresses while a router uses MAC addresses
(c) A bridge builds up its routing table by inspecting incoming packets
(d) A router can connect between a LAN and a WAN.
7. How many 8-bit characters can be transmitted per second over a 9600 baud serial
communication link using asynchronous mode of transmission with one start bit, eight data
bits, and one parity bit ?
(a) 600 (b) 800 (c) 876 (d) 1200
8. A and B are the only two stations on an Ethernet. Each has a steady queue of frames to send.
Both A and B attempt to transmit a frame, collide, and A wins the first backoff race, At the end
of this successful transmission by A, both A and B attempt to transmit and collide. The
probability that A wins the second backoff race is
(a) 0.5 (b) 0.625 (c) 0.75 (d) 1.0
9. Packets of the same session may be routed through different paths in
(a) TCP, but not UDP (b) TCP and UDP (c) UDP but not TCP (d) Neither TCP, nor UDP
10. The address resolution protoc0l (ARP) is used for
(a) Finding the IP address from the DNS
(b) Finding the IP address of the default gateway
(c) Finding the IP address that corresponds to a MAC address
(d) Finding the MAC address that corresponds to an IP address
11. The maximum window size for data transmission using the selective reject protocol with n-bit
frame sequence numbers is
(a) 2n (b) 2n−1 (c) 2n − 1 (d) 2n−2
12. In a network of LANs connected by bridges, packets are set from one LAN to another through
intermediate bridges. Since more than one path may exist between two LANs, packets may
have to be routed through multiple bridges. Why is the spanning tree algorithm used for
bridge-routing ?
(a) For shortest path routing between LANs
(b) For avoiding loops in the routing paths
(c) For fault tolerance
(d) For minimizing collisions
13. An organization has a class B network and wishes to form subnets for 64 departments. The
subnet mask would be
(a) 255.255.0.0 (b) 255.255.64.0 (c) 255.255.128.0 (d) 255.255.255.0
14. In a packet switching network, packets are routed from source to destination along a single
path having two intermediate node. If the message size is 24 bytes and each packet contains a
header of 3 bytes, then the optimum packet size is
(a) 4 (b) 6 (c) 7 (d) 9
15. In Ehernet when manchester encoding is used, the bit rate is
(a) Half the baud rate (b) Twice the baud rate (c) Same as the baud rate (d) None of these
16. Which one of the following uses UDP as the transport protocol?
(a) HTTP (b) Telnet (c) DNS (d) SMTP
17. In the slow start phase of TCP congesting control algorithm, the size of the congestion window
(a) Does not increase (b) Increases linearly
(c) Increases quadratically (d) Increases exponentially
18. One of the header fields in an IP datagram is the Time-to-Live (TTL) field. Which of the
following statements best explains the need for this field ?
(a) It can be used to prioritize packets
(b) It can be used to reduce delays
(c) It can be used to optimize throughput
(d) It can be used to prevent packet looping
19. Which one of the following is not a client-server application ?
(a) Internet chat (b) Web browsing
(c) E-mail (d) Ping
20. What is the other types of OLAP apart from ROLAP?
(a) HOLAP (b) MOLAP (c) DOLAP (d) Both a and b above
21. A network router joins two _________ together?
(a) Computers (b) Switches (c) Networks (d) Gateway
22. Which of the following below is a loop back IP address?
(a) 127.0.0.0 (b) 127.0.1.1 (c) 127.0.1.0 (d) 127.0.0.1
23. Transport layer of OSI model lies between Network and ___________ layer
(a) Application (b) Data link (c) Session (d) Presentation
24. Which of the following protocols below work in application layer?
(a) POP (b) PPP (c) FTP (d) Both a and d above
25. From the options below
(a) a device that modulates an analog carrier signal to encode digital information
(b) a device that modulates a digital carrier signal to encode analog information
(c) a device that modulates an analog carrier signal to decode digital information
(d) a device that modulates a digital carrier signal to decode analog information
26. WHat is the size of an IP address?
(a)64 bit (b) 128 bit (c) 16 bit (d) 32 bit
27. MAC addresses are also known as?
(a) Hardware address (b) Physical address
(c) both and b above (d) IP address
28. Token Ring is a data link technology for ?
(a) WAN (b) MAN (c) LAN (d) both a and b above
29. The process of assigning IP address for specific times to the various ho
(a) Lend (b) sublease (c) let (d) Lease
30. What is the full form of CAN?
(a) Campus Area Network (b) Cluster Area Network
(c) Control Area network (d) both A and B
Answer Keys
1 (d) 2 (d) 3 (d) 4 (c) 5 (b) 6 (b)
7 (b) 8 (c) 9 (d) 10 (d) 11 (b) 12 (b)
13 (d) 14 (d) 15 (b) 16 (c) 17 (d) 18 (d)
19 (d) 20 (b) 21 (c) 22 (d) 23 (c) 24 (d)
25 (a) 26 (d) 27 (c) 28 (c) 29 (d) 30 (d)
2. Security / Computer Networks / Networks (Minimum 30 Questions)
Questions
1. Using public key cryptography, X adds a digital signature to message M, encrypts < M, >, and
sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for
the operations?
(a) Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed
by Y’s public key
(b) Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed
by Y’s private key
(c) Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed
by X’s private key
(d) Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed
by X’s public key
2. Which of the following are used to generate a message digest by the network security
protocols?
(a) RSA (b) SHA-1 (c) DES (d) MD5
3. A sender is a employing public key Cryptography to send a secret message to a receiver.
Which one of the following statement is true?
(a) Sender encrypts using receiver’s public key.
(b) Sender encrypts using his own public key.
(c) Receiver decrypts using sender’s public key.
(d) Receiver decrypts using his own public key.
4. Consider the following two statements:
i. A hash function (these are often used for computing digital signatures) is an injective
function.
ii. Encryption technique such as DES performs a permutation on the elements of its input
alphabet.
Which one of the following options is valid for the above two statements?
(a) Both are false
(b) Statement (i) is true and the other is false
(c) Statement (ii) is true and the other is false
(d) Both are true
5. The minimum positive integer p such that 3p modulo 17 = 1 is
(a) 5
(b) 8
(c) 12
(d) 16
6. A layer-4 firewall (a device that can look at all protocol headers up to the transport layer)
CANNOT
(a) block entire HTTP traffic during 9:00 PM and 5:00 AM
(b) block all ICMP traffic
(c) stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP
address
(d) block TCP traffic from a specific user on a multi-user system during 9:00 PM and 5:00 AM
7. Using public key cryptography, X adds a digital signature σ to message M, encrypts, and sends
it to Y, where it is decrypted. Which one of the following sequences of keys is used for the
operations?
(a) Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed
by Y’s public key
(b) Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed
by Y’s private key
(c) Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed
by X’s private key
(d) Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed
by X’s public key
8. Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim
requires
(a) Anarkali’s public key
(b) Salim’s public key
(c) Salim’s private key
(d) Anarkali’s private key
9. Confidentiality with asymmetric-key cryptosystem has its own
(a) Entities
(b) Data
(c) Problems
(d) Translator
10. SHA-l has a message digest of
(a) 160 bits
(b) 512 bits
(c) 628 bits
(d) 820 bits
11. Message authentication is a service beyond
(a) Message Confidentiality
(b) Message Integrity
(c) Message Splashing
(d) Message Sending
12. In Message Confidentiality, transmitted message must make sense to only intended
(a) Receiver
(b) Sender
(c) Modulor
(d) Translator
13. A hash function guarantees integrity of a message. It guarantees that message has not be
(a) Replaced
(b) Over view
(c) Changed
(d) Violated
14. Which of the following is true regarding access lists applied to an interface?
(a) You can place as many access lists as you want on any interface until you run out of
memory.
(b) You can apply only one access list on any interface.
(c) One access list may be configured, per direction, for each layer 3 protocol configured on an
interface.
(d) You can apply two access lists to any interface.
15. Which command would you use to apply an access list to a router interface?
(a) ip access-list 101 out
(b) access-list ip 101 in
(c) ip access-group 101 in
(d) access-group ip 101 in
16. Which of the following is an example of a standard IP access list?
(a) access-list 110 permit host 1.1.1.1
(b) access-list 1 deny 172.16.10.1 0.0.0.0
(c) access-list 1 permit 172.16.10.1 255.255.0.0
(d) access-list standard 1.1.1.1
17. You need to create an access list that will prevent hosts in the network range of 192.168.160.0
to 192.168.191.0. Which of the following lists will you use?
(a) access-list 10 deny 192.168.160.0 255.255.224.0
(b) access-list 10 deny 192.168.160.0 0.0.191.255
(c) access-list 10 deny 192.168.160.0 0.0.31.255
(d) access-list 10 deny 192.168.0.0 0.0.31.255
18. You are working on a router that has established privilege levels that restrict access to certain
functions. You discover that you are not able to execute the command show running-
configuration. How can you view and confirm the access lists that have been applied to the
Ethernet 0 interface on your router?
(a) show access-lists
(b) show interface Ethernet 0
(c) show ip access-lists
(d) show ip interface Ethernet 0
19. What command will permit SMTP mail to only host 1.1.1.1?
(a) access-list 10 permit smtp host 1.1.1.1
(b) access-list 110 permit ip smtp host 1.1.1.1
(c) access-list 10 permit tcp any host 1.1.1.1 eq smtp
(d) access-list 110 permit tcp any host 1.1.1.1 eq smtp
20. You want to create a standard access list that denies the subnet of the following host:
172.16.50.172/20. Which of the following would you start your list with?
(a) access-list 10 deny 172.16.48.0 255.255.240.0
(b) access-list 10 deny 172.16.0.0 0.0.255.255
(c) access-list 10 deny 172.16.64.0 0.0.31.255
(d) access-list 10 deny 172.16.48.0 0.0.15.255
21. What router command allows you to determine whether an IP access list is enabled on a
particular interface?
(a) show ip port
(b) show access-lists
(c) show ip interface
(d) show access-lists interface
22. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
23. ElGamal encryption system is
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
24. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
25. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
26. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
27. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
28. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
29. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
30. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
1 Answer
(d) Keys2 (c) 3 (a) 4 (c) 5 (d) 6 (a)
7 (d) 8 (a) 9 (c) 10 (a) 11 (b) 12 (a)
13 (c) 14 (c) 15 (c) 16 (b) 17 (c) 18 (d)
19 (d) 20 (c) 21 (c) 22 (a) 23 (b) 24 (a)
25 (b) 26 (a) 27 (a) 28 (a) 29 (c) 30 (b)

3. Computer Organization / Advanced Architecture / Computer architecture (Minimum 30


Questions)
Questions
1. More than one word are put in one cache block to
(a) Exploit the temporal locality of reference in a program
(b) Exploit the spatial locality of reference in a program
(c) Reduce the miss penalty
(d) None of the above
2. Suppose a processor does not have any stack pointer register. Which of the following
statements is true ?
(a) It cannot have subroutine call instruction
(b) It can have subroutine call instruction, but no nested subroutine calls.
(c) Nested subroutine calls are possible, but interrupts are not.
(d) All sequences of subroutine calls and also interrupts are possible
3. A processor needs software interrupt to
(a) Test the interrupt system of the processor.
(b) Implement co-routines.
(c) Obtain system services which need execution of privileged instructions.
(d) Return from subroutine.
4. The process of assigning load addresses to the various parts of the program and adjusting the
code and date in the program to reflect the assigned addresses is called
(a) Assembly (b) Parsing
(c) Relocation (d) Symbol resolution
5. Which of the following requires a device driver?
(a) Register (b) Cache
(c) Main memory (d) Disk
6. Which is the most appropriate match for the items in the first column with the items in the
second column
(X.) Indirect Addressing (I.) Array implementation
(Y.) Indexed Addressing (II.) Writing re-locatable code
(Z.) Base Register Addressing (III.) Passing array as parameter
(a) (X, III) (Y, I) (Z, II) (b) (X, II) (Y, III) (Z, I)
(c) (X, III) (Y, II) (Z, I) (d) (X, I) (Y, III) (Z, II)
7. Which of the following does not interrupt a running process?
(a) A device (b) Timer
(c) Scheduler process (d) Power failure
8. In 8085 which of the following modifies the program counter?
(a) Only PCHL instruction (b) Only ADD instructions
(c) Only JMP and CALL instructions (d) All instructions
9. In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or
two ‘1’s at the end of byte because
(a) Receiver is to be synchronized for byte reception
(b) Receiver recovers lost ‘0’s and ‘1’ from these padded bits
(c) Padded bits are useful in parity computation.
(d) None of the above
10. Which of the following is not a form of memory?
(a) Instruction cache (b) Instruction register
(c) Instruction opcode (d) Translation-a-side buffer
11. In the absolute the addressing mode
(a) The operand is inside the instruction
(b) The address of the operand is inside the instruction
(c) The register containing the address of the operand is specified inside the instruction
(d) The location of the operand is implicit
12. The performance of a pipelined processor suffers if
(a) The pipelined stages have different delays
(b) Consecutive instructions are dependent on each other
(c) The pipeline stages share hardware resources
(d) All the above
13. Horizontal microprogramming
(a) Does not require use of signal decoders
(b) Results in larger sized microinstructions than vertical microprogramming
(c) Uses one bit for each control signal
(d) All of the above
14. If the initial value of register A is A0, the value of register B after the program execution will
be
(a) the number of 0 bits in A0 (b) the number of 1 bits in A0
(c) A0 (d) 8
15. Which of the following addressing modes are suitable for program relocation at run time?
1. Absolute addressing
2. Based addressing
3. Relative addressing
4. Indirect addressing
(a) 1 and 4 (b) 1 and 2
(c) 2 and 3 (d) 1,2 and 4
16. Consider a multiplexer with X and Y as data inputs and Z as control input.Z = 0 selects input X,
and Z=1 selects input Y . What are the connection required to realize the 2-variable Boolean
function f = T + R, without using any additional hardware?
(a) R to X, 1 to Y, T to Z (b) T to X, R to Y, T to Z
(c) T to X, R to Y, 0 to Z (d) R to X, 0 to Y, T to Z
17. Consider that the memory is byte addressable with size 32 bits, and the program has been
loaded starting from memory location 1000 (decimal). If an interrupt occurs while the CPU has
been halted after executing the HALT instruction, the return address (in decimal) saved in the
stack will be
(a) 1007 (b) 1020 (c) 1024 (d) 1028
18. Let the clock cycles required for various operations be as follows:
Register to/from memory transfer: 3 clock cycles
ADD with both operands in register: 1 clock cycle
Instruction fetch and decode: 2 clock cycles per word
The total number of clock cycles required to execute the program is
(a) 29 (b) 24
(c) 23 (d) 20
19. Consider a small two-way set-associative cache memory, consisting of four blocks. For
choosing the block to be replaced, use the least recently used (LRU) scheme. The number of
cache misses for the following sequence of block addresses is 8, 12,0, 12,8
(a) 2 (b) 3
(c) 4 (d) 5
20. A hard disk with a transfer rate of 10 M bytes/second is constantly transferring data to
memory using DM(a) The processor runs at 600 MHz. and takes 300 and 900 clock cycles to
initiate and complete DMA transfer respectively. If the size of the transfer is 20 Kbytes, what
is the percentage of processor time consumed for the transfer operation?
(a) 5.0% (b) 1.0%
(c) 0.5% (d) 0.1%
21. A 4-stage pipeline has the stage delays as 150, 120, 160 and 140 nanoseconds respectively.
Registers that are used between the stages have a delay of 5 nanoseconds each. Assuming
constant clocking rate, the total time taken to process 1000 data items on this pipeline will
be
(a) 120.4 microseconds (b) 160.5 microseconds
(c) 165.5 microseconds (d) 590.0 microseconds
22. Which one of the following is true for a CPU having a single interrupt request line and a single
interrupt grant line?
(a) Neither vectored interrupt nor multiple interrupting devices are possible
(b) Vectored interrupts are not possible but multiple interrupting devices are possible
(c) vectored interrupts and multiple interrupting devices are both
possible
(d) vectored interrupt is possible but multiple interrupting devices are not possible
23. Normally user programs are prevented from handing I/O directly by I/O instructions in them.
For CPUs having explicit I/O instructions, such I/O protection is ensured by having the I/O
instructions privileged. In a CPU with memory mapped I/O, there is no explicit I/O
instruction. Which one of the following is true for a CPU with memory mapped I/O?
(a) I/O protection is ensured by operating system routine(s)
(b) I/O protection is ensured by a hardware trap
(c) I/O protection is ensured during system configuration
(d) I/O protection is not possible
24. What is the swap apace in the disk used for?
(a) Saving temporary html pages
(b) Saving process data
(c) Storing the super-block
(d) Storing device drivers
25. Increasing the RAM of a computer typically improves performance because
(a) Virtual memory increases
(b) Larger RAMs are faster
(c) Fewer page faults occur
(d) Fewer segmentation faults occur
26. Consider a direct mapped cache of size 32 KB with block size 32 bytes. The CPU generates 32
bit addresses. The number of bits needed for cache indexing and the number of tag bits are
respectively
(a) 10,17 (b) 10,22
(c) 15,17 (d) 5,17
27. Consider a disk drive with the following specification 16 surfaces, 512 tracks/surface, 512
sectors/track, 1 KB/sector, rotation speed 3000 rpm. The disk is operated in cycle stealing
mode whereby whenever one byte word is ready it is sent to memory; similarly, for writing,
the disk interface reads a 4 byte word from the memory in each DMA cycle. Memory cycle
time is 40 nsec. The maximum percentage of time that the CPU gets blocked during DMA
operation is
(a) 10 (b) 25
(c) 40 (d) 50
28. The instruction “add R0,R1” has the register transfer interpretation R0 <= R0 + R1. The
minimum number of clock cycles needed for execution cycle of this instruction is
(a) 2 (b) 3 (c) 4 (d) 5
29. A CPU has a cache with block size 64 bytes. The main memory has k banks, each bank being c
bytes wide. Consecutive c-bute chunks are mapped on consecutive banks with warp-around.
All the k banks can be accessed in parallel, but two accesses to the same bank must be
serialized. A cache block access may involve multiple iterations of parallel bank accesses
depending on the amount of data obtained by accessing all the k banks in parallel. Each
iteration requires decoding the bank numbers to be accessed in parallel and this takes k/2 ns
. The latency of one bank access is 80 ns . If c = 2 and k=24, then latency of retrieving a cache
block starting at address zero from main memory is
(a) 92 ns (b) 104 ns
(c) 172 ns (d) 184 ns
30. A CPU has five-stages pipeline and runs at 1GHz frequency. Instruction fetch happens in the
first stage of the pipeline. A conditional branch instruction computes the target address and
evaluates the condition in the third stage of the pipeline. The processor stops fetching new
instructions following a conditional branch until the branch outcome is known. A program
executes 109 instructions out of which 20% are conditional branches. If each instruction
takes one cycle to complete on average, then total execution time of the program is
(a) 1.0 second (b) 1.2 seconds
(c) 1.4 seconds (d) 11.6 seconds
1 Answer
(a) Keys
2 (a) 3 (c) 4 (c) 5 (d) 6 (a)
7 (c) 8 (d) 9 (a) 10 (c) 11 (d) 12 (d)
13 (c) 14 (b) 15 (c) 16 (a) 17 (d) 18 (b)
19 (b) 20 (d) 21 (c) 22 (b) 23 (a) 24 (b)
25 (c) 26 (a) 27 (b) 28 (d) 29 (d) 30 (b)

4. Life cycles and development / Software development / Software Engineering (Minimum 30


Questions)
Questions
1. What is a DFD?
(a)The modern version of flowchart
(b)Mainly used at systems specification stage
(c) The primary output of the system design phase
(d)All of the above

2. Checking quality of software in both simulated and live environments is known as


(a)Checking
(b)Usability
(c) Vaidity
(d)Validation

3. The system should provide which thing, to avoid error in transcription and transposition,
during data entry?
(a)A check digit
(b)A hand totals
(c) Batch totals
(d)All of these

4. HIPO is
(a)A forms driven technique in which standard forms are used to documents the information
(b)Consists of a hierarchy chart and an associate set of input/process/output charts
(c) Captures essence of top down decomposition
(d)All of these

5. DFD shows
(a) The flow of data
(b)The processes
(c) The areas where they are stored
(d)All of the above

6. The time lag, between initiating a query and receiving a response is called
(a)Response time
(b)Waiting time
(c) Processing time
(d)Turn around time

7. How are information system and capability related to each other ?


(a)Improved processing speed
(b)Increased volumed processing speed
(c) Faster retrieval of information
(d)All of the above

8. The mistakes, committed by intercharging two digits in a numeic ield, during data enty, is called
(a)Transposition error
(b)Transcription error
(c) Beta testing error
(d)Alpha testing error

9. Which of the following is not considered a tool at system design phase ?


(a)Data flow diagram
(b)Decision table
(c) Pie chart
(d)System flow chart

10. The best file organization in which one has to process all data records in a file called
(a)Indexed
(b)Sequential
(c) Direct access
(d) Random access

11. Controls must be established in a system on order to


(a) Prohibit tampering with information by unauthorized person
(b)Verify that all data have been processed
(c) The concurrent operation of an existing system and a new system
(d)All of the above

12. Coding and testing is done in following manner :


(a) Adhoc
(b)Cross sectional
(c) Bottom-up
(d)Top-clown

13. What is done during maintenance phase ?


(a)System requirements are established
(b)Programs are tested
(c) System analysis is carried out
(d)None of the above

14. The largest percentage of total life cycle cost of software is:
(a) Design cost
(b)Maintenance cost
(c) Coding cost
(d)Testing cost

15. In a system design project hardware design starts from.


(a) Identification of size and capacity requirements of hardware
(b)Cataloging price from hardware vendors
(c) Finding compatibility between hardware and software
(d)None of the above

16. Which of the following is not a major design consideration of the system.
(a) Response time required
(b)Frequency of record updates
(c) Availability of technically qualified personal to carry out design and development
(d)Data integrity constant.

17. Software maintenance includes


(a) Bug fixing
(b)Setting preventing maintenance policy for servers
(c) installation of software at site
(d)Designing of sotware for maintenance purposes.

18. Main diference between program testing and system testing is


(a) Program testing is more comprehensive than system testing
(b)System testing focuses on testing the interfaces between programs, program testing focuses on
individual programs
(c) System testing is tough and program testing is easy
(d)None of the above

19. The role of an integrated CASE tool in system analysis and design project is
(a) Proving a CASE study for software development
(b)To provide an environment that automate key tasks throughout sotware development process
(c) To provide tool for reacting a word file
(d)None of the above

20. Cross reference checking w.r.t. data dictionary refers to.


(a) Linking of documents through hypertext, in case system deals with document imaging
(b)Finding, that there is no inconsistency is quoted in a text fle, and therefore reference is listed in
reference file
(c) Determination of where data are used in the system
(d)None of the above
21. One demerit of functional model is
(a)It is complex to built
(b)If we change data structure we must modify all functions related to it
(c) It is difficult to implement
(d)None of the above

22. The most creative and challenging phase of system life cycle is
(a)Feasibility study
(b)Maintenance
(c) Design
(d)None of the above

23. The advantages of creating a prototype are.


(a)It allows developers to experiment with number of diferent design options
(b)It can serve as means of communication between developers and customers
(c) Both (a) and (b)
(d)None of the above

24. The database design activity deals with the design of


(a)Logical database
(b)Physical database
(c) Both (a) and (b)
(d)None of the above

25. Delta requirement stands for


(a)The SRS document prepared in delta from
(b)Where specification of desired changes is sent to earlier version of a system
(c) The delta version of a system
(d)None of the above

26. The static system model exploit which type of relationship


(a) Time cost
(b)Activity cost
(c) Quality cost
(d)None of the above

27. System development is a


(a)Process of successive changes of system from new and changed requirement
(b)It is a development of SRS of a system
(c) Both (a) and (b)
(d)None of the above
28. In parallel run of s/w testing
(a)Both physical system and computerized system work simulataneously
(b)Only physical system runs
(c) Only computerized runs
(d)None of the above

29. Which of the following is not a component of object oriented software engg.
(a)Process
(b)Method
(c) Architecture
(d)None of the above

30. Coupling is a measure of


(a)Relative functional strength
(b)Interdependence among module
(c) Both of the above
(d)None of the above

1 Answer
(c) Keys
2 (d) 3 (d) 4 (b) 5 (d) 6 (a)
7 (c) 8 (a) 9 (c) 10 (b) 11 (d) 12 (b)
13 (d) 14 (b) 15 (a) 16 (c) 17 (a) 18 (b)
19 (b) 20 (b) 21 (b) 22 (c) 23 (c) 24 (c)
25 (b) 26 (c) 27 (c) 28 (a) 29 (c) 30 (b)
5. Life cycles and development / Software development / Compiler design (Minimum 30
Questions)
Questions
1. In an absolute loading scheme, which loader function is accomplished by programmer?

A.Allocation
B.Linking
C.Reallocation
D.both (A) and (B)

2. A compiler program written in a high level language is called


A.source program
B.object program
C.machine language program
D.none of these

3. Advantage of using assembly language rather than machine language is that


A.it is mneomonic and easy to read
B.addresses any symbolic not absolute
C.introduction of data to program is easier
D.All of these

4. Advantage of incorporating the macro-processor into pass 1 is that


A.many functions have to be implemented twice
B.functions are combined and it is not necessary to create intermediate files as output from the macro-
processor and input to the assembler.
C.more flexibility is available to the programmer in that he may use all the features of the assembler in
conjunction with macros.
D.all of these

5. Terminal table
A.contains all constants in the program.
B.is a permanent table of decision rules in the form of patterns for matching with the uniform symbol
table to discover syntactic structure.
C.consist of a full or partial list of the token is as they appear in the program created by lexical analysis
and used for syntax analysis and interpretation.
D.is a permanent table which lists all keywords and special symbols of the language in symbolic form

6. Language which have many types, but the type of every name and expression must be calculated at
compile time are
A.strongly-type languages
B.weakly typed languages
C.loosely typed languages
D.none of these
7. An interpreter is a program that
A.places programs into memory and prepares them for execution
B.automates the translation of assembly language into machine language.
C.accesses a program written in a high level language and produces an object program.
D.appears to execute a source program as if it were machine language.

8. Which of the following is a phase of a compilation process ?


A.Lexical analysis
B.Code generation
C.Both (a) and (b)
D.None of these

9. System program such a s compiler are designed so that they are


A.re-enterable
B.non-reusable
C.serially usable
D.None of these

10. A series of statements explaining how the data is to be processed is called


A.assembly
B.machine
C.COBOL
D.program

11. A loader is a program that


A.program that places programs into memory and prepares them for execution.
B.program that automates the translation of assembly language into machine language.
C.program that accepts a program written in a high level language and produces as object program
D.None of these

12. A system program that setup an executable program in main memory ready for execution is
A.assembler
B.linker
C.loader
D.load and go

13. Which of the following system program forgoes the production of object code to
generate absolute machine code and load it into the physical main storage location
from which it will be executed immediately upon completion of the assembly ?
A.Two pass assembler
B.Load-and-go-assembler
C.Macroprocessor
D.Linker

14. Uniform symbol table


A.contains all constants in the program
B.is a permanent table of decision rules in the form of patterns for matching with the uniform symbol
table to discover syntactic structure.
C.consists of full or partial list of the token's as they appear in the program created by Lexical analysis
and used for syntax analysis and interpretation.
D.a permanent table which lists all key words and special symbols of the language in symbolic form.

15. Assembler is a program that


A.places programs into memory and prepares them for execution
B.automates the translation of assembly language into machine language
C.accepts a program written in a high level language and produces an object program.
D.None of these
16. Compiler can diagnose
A.grammatical errors only
B.logical errors only
C.grammatical as well as logical errors
D.None of these

17. A simple two-pass assembler does which of the following in the first pass ?
A.It allocates space for the literals
B.It computes the total length of the program
C.It builds the symbol table for the symbols and their values.
D.All of these

18. A system program that set-up an executable program in main memory ready for execution is
A.assembler
B.linker
C.loader
D.text editor

19. A compiler is a program that


A.places programs into memory and prepares them for execution.
B.automates the translation of assembly language into machine language.
C.accepts a program written in a high level language and produces an object program.
D.None of these

20. A programmer, by mistake, writes an instruction to divide, instead of a multiply, such error can be
detected by a/an
A.Compiler
B.Interpreter
C.compiler or interpreter test
D.None of these

21. The computer language generally translated to pseudocode is


A.assembly
B.machine
C.pascal
D.FORTRAN

22. A system program that combines separately compiled modules of a program into a form suitable for
execution is
A.Assembler
B.linking loader
C.cross compiler
D.None of these

23. In which way a macro processor for assembly language can be implemented?
A.Independent two-pass processor
B.Independent one-pass processor
C.Processor incorporated into pass 1 of a standard two pass assembler
D.All of these

24. Resolution of externally defined symbols is performed by


A.Linker
B.Loader
C.Compiler
D.Interpreter

25. A shift reduce parser carries out the actions specified within braces immediately after reducing with
the corresponding rule of grammer
S----> xxW ( PRINT "1")
S----> y { print " 2 " }
S----> Sz { print " 3 " )
What is the translation of xxxxyzz using the syntax directed translation scheme described by the above rules
?
A.23131
B.11233
C.11231
D.33211

26. The symbol table implementation is based on the property of locality of reference is
A.linear list
B.search tree
C.hash table
D.self-organization list

27. In operator precedence parsing, precedence relations are defined


A.for all pair of non-terminals
B.for all pair of terminals
C.to delimit the handle
D.none of these

28. LR parsers are attractive because


A.it can be constructed to recognize CFG corresponding to almost all programming constructs
B.it doesnot backtrack
C.both (a) and (b)
D.none of these

29. The most powerful parser is


A.SLR
B.LALR
C.Canonical LR
D.Operator-precedence

30. YACC builds up


A.SLR parsing table
B.canonical LR parsing table
C.LALR parsing table
D.none of these

1 Answer
(d) Keys
2 (a) 3 (d) 4 (d) 5 (d) 6 (a)
7 (d) 8 (c) 9 (a) 10 (d) 11 (a) 12 (c)
13 (b) 14 (c) 15 (b) 16 (a) 17 (d) 18 (c)
19 (c) 20 (d) 21 (a) 22 (b) 23 (d) 24 (a)
25 (a) 26 (c) 27 (a) 28 (c) 29 (c) 30 (c)

6. Process Management/ Process/Operating System (30 Questions)


Questions
1. Which of the following statement is false

(a)virtual memory implements the translation of a program's address space into physical memory
address space
(b) virtual memory allows each program to exceed the size of the primary memory
(c) Virtual memory increases the degree of multi programming

(d)virtual memory reduces the context switching overhead


2. Consider three processes, all arriving at time zero, with total execution time of 10, 20 and 30
units, respectively. Each process spends the first 20% of execution time doing I/O, the next
70% of time doing computation, and the last 10% of time doing I/O again. The operating
system uses a shortest remaining compute time first scheduling algorithm and schedules a
new process either when the running process gets blocked on I/O or when the running
process finishes its compute burst. Assume that all I/O operations can be overlapped as much
as possible. For what percentage of time does the CPU remain idle?
(a) 0% (b)10.6% (c)30.0% (d)89.4%
3. Which of the following process scheduling algorithm may lead to starvation
(a)FIFO (b)Round Robin (c)Shortest job first (d)None of the above
4. Consider the following table of arrival time and burst time for three processes P0, P1 and P2.
Process Arrival time Burst Time
P0 0 ms 9 ms
P1 1 ms 4 ms
P2 2 ms 9 ms
The pre-emptive shortest job first scheduling algorithm is used. Scheduling is carried out only
at arrival or completion of processes. What is the average waiting time for the three
processes?
(a) 5.0ms (b)4.33ms (c)6.33ms (d)7.33ms
5. In the following process state transition diagram for a uniprocessor system, assume that there
are always some processes in the ready state: Now consider the following statements:

(a) If a process makes a transition D, it would result in another process making transition A
immediately.
(b) A process P2 in blocked state can make transition E
while another process P1 is in running state.
(c) The OS uses preemptive scheduling.
(d) The OS uses non-preemptive scheduling.
6. The atomic fetch-and-set x, y instruction unconditionally sets the memory location x to 1 and
fetches the old value of x in y without allowing any intervening access to the memory location
x. consider the following implementation of P and V functions on a binary semaphore .
void P (binary_semaphore *s) {
unsigned y;
unsigned *x = &(s->value);
do {
fetch-and-set x, y;
} while (y);
}

void V (binary_semaphore *s) {


S->value = 0;
}
(a) The implementation may not work if context switching is disabled in P.
(b)Instead of using fetch-and-set, a pair of normal load/store can be used
(c)The implementation of V is wrong
(d)The code does not implement a binary semaphore

7. Three concurrent processes X, Y, and Z execute three different code segments that access and
update certain shared variables. Process X executes the P operation (i.e., wait) on semaphores
a, b and c; process Y executes the P operation on semaphores b, c and d; process Z executes
the P operation on semaphores c, d, and a before entering the respective code segments.
After completing the execution of its code segment, each process invokes the V operation
(i.e., signal) on its three semaphores. All semaphores are binary semaphores initialized to one.
Which one of the following represents a deadlockfree order of invoking the P operations by
the processes?
(a) X: P(a)P(b)P(c) Y:P(b)P(c)P(d) Z:P(c)P(d)P(a)
(b) X: P(b)P(a)P(c) Y:P(b)P(c)P(d) Z:P(a)P(c)P(d)

(c)X: P(b)P(a)P(c) Y:P(c)P(b)P(d) Z:P(a)P(c)P(d)


(d)X: P(a)P(b)P(c) Y:P(c)P(b)P(d) Z:P(c)P(d)P(a)

8. Consider an OS capable of loading and executing a single sequential user process at a time.
The disk head scheduling algorithm used is FCFS. If FCFS is replaced by shortest seek time first
(SSTF), claimed by the vendor to give 50% better benchmark results, what is the expected
improvement in the IN/OUT performance of user programs?

(a) 50% (b)40% (c)35% (d)0%


9. A system uses FIFO policy for page replacement. It has 4 pages frames with no pages loaded to
begin with. The system first access 100 distinct pages in some order and then access the same
100 pages but now in reverse order. How many page faults will occur ?

(a) 192 (b)198 (c)197 (d)196


10. A computer handles several interrupt sources of which of the following are relevant for
this question ?

(a) Interrupt from hard disk


(b)Interrupt from mouse
(c) Interrupt from keyboard
(d) Interrupt from CPU temp sensor
11. Which of the following page replacement algorithms suffers from Belady’s anomaly?
(a)FIFO (b)LRU (c)Optimal page replacement (d)Both LRU and FIFO
12. What is the swap space in the disk used for?
(a)Saving temporary html page
(b) Saving Process data
(c) Storing the super-block
(d) Storing device drivers
13. Increasing the RAM of a computer typically improves performance because
(a)Virtual memory increases
(b)Larger RAMs are faster
(c) Fewer page faults occur
(d)Fewer segmentation faults occur
14. A computer system supports 32-bit virtual addresses as well as 32-bit physical addresses.
Since the virtual address space is of the same size as the physical address space, the operating
system designers decide to get rid of the virtual memory entirely. Which one of the following
is true?
(a) Efficient implementation of multi-user support is no longer possible
(b)The processor cache organization can be made more efficient now
(c) Hardware support for memory management is no longer needed
(d) CPU scheduling can be made more efficient now
15. The minimum number of page frames that must be allocated to a running process in a virtual
memory environment is determined by

(a) The instruction set architecture


(b) Page Size
(c)Physical Memory Size
(d) The number of process in memory
16. Where does the swap space reside?
(a) RAM (b) Disk (c)ROM (d)on chip cache
17. consider a set of n tasks with known runtimes r1,r2, .... rn to be run on a uni
processor machine. Which of the following processor scheduling algorithms will result in the
maximum throughput ?
(a) Round robin
(b)Shortest job first
(c) First come first ratio
(d) Highest response ratio next
18. List I contains some CPU scheduling algorithms and List II contains some applications. Match
entries in List I to entries in List II using the codes given below the list
List I List II

P Gang scheduling 1. Guaranteed scheduling

Q Rate monotonic scheduling 2. Real time scheduling

R fair share scheduling 3. Thread scheduling

(a) P-3, Q-2, R-1 (b)P-1, Q-3, R-2(c)P-2, Q-3, R-1(d) P-1, Q-3, R-2
19. A CPU generates 32-bit virtual addresses. The page size is 4 KB. The processor has a translation
look-aside buffer (TLB) which can hold a total of 128 page table entries and is 4-way set
associative. The minimum size of the TLB tag is:
(a)11 bits (b)13 bits (c)15 bits (d)20 bits
20. Thrashing occurs when
(a) When a page fault occurs
(b)Processes on system frequently access pages not memory
(c) Processes on system are in running state
(d)Processes on system are in waiting state

21. A computer uses 46–bit virtual address, 32–bit physical address, and a three–level paged page
table organization. The page table base register stores the base address of the first–level table
(T1), which occupies exactly one page. Each entry of T1 stores the base address of a page of
the second–level table (T2). Each entry of T2 stores the base address of a page of the
third–level table (T3). Each entry of T3 stores a page table entry (PTE). The PTE is 32 bits in
size. The processor used in the computer has a 1 MB 16 way set associative virtually indexed
physically tagged cache. The cache block size is 64 bytes. What is the size of a page in KB in
this computer?
(a) 2 (b)4 (c)8 (d)16
22. A computer uses 46–bit virtual address, 32–bit physical address, and a three–level paged page
table organization. The page table base register stores the base address of the first–level table
(T1), which occupies exactly one page. Each entry of T1 stores the base address of a page of
the second–level table (T2). Each entry of T2 stores the base address of a page of the
third–level table (T3). Each entry of T3 stores a page table entry (PTE). The PTE is 32 bits in
size. The processor used in the computer has a 1 MB 16 way set associative virtually indexed
physically tagged cache. The cache block size is 64 bytes. What is the minimum number of
page colours needed to guarantee that no two synonyms map to different sets in the
processor cache of this computer?
(a) 2 (b)4 (c)8 (d)16
23. Let the page fault service time be 10ms in a computer with average memory access time being
20ns. If one page fault is generated for every 10^6 memory accesses, what is the effective
access time for the memory?
(a) 21ns (b)30ns(c)23ns (d)35ns
24. A processor uses 36 bit physical addresses and 32 bit virtual addresses, with a page frame size
of 4 Kbytes. Each page table entry is of size 4 bytes. A three level page table is used for virtual
to physical address translation, where the virtual address is used as follows • Bits 30-31 are
used to index into the first level page table • Bits 21-29 are used to index into the second level
page table • Bits 12-20 are used to index into the third level page table, and • Bits 0-11 are
used as offset within the page The number of bits required for addressing the next level page
table (or page frame) in the page table entry of the first, second and third level page tables are
respectively.
(a)20,20,20 (b)24,24,24 (c)24,24,20 (d)25,25,24
25. A virtual memory system uses First In First Out (FIFO) page replacement policy and allocates a
fixed number of frames to a process. Consider the following statements:

P: Increasing the number of page frames allocated to a process sometimes increases the page
fault rate.
Q: Some programs do not exhibit locality of reference.
Which one of the following is TRUE?
(a) Both P and Q are true, and Q is the reason for P (b)Both P and Q are true, but Q is not the
reason for P(c) P is false, but Q is true(d)Both P and Q are false
26. Suppose n processes, P1, …. Pn share m identical resource units, which can be reserved and
released one at a time. The maximum resource requirement of process Pi is Si, where Si > 0.
Which one of the following is a sufficient condition for ensuring that deadlock does not occur?
(a) a (b)b (c)c (d)d
27. A system has n resources R0,...,Rn-1,and k processes P0,....Pk-1.The implementation of the
resource request logic of each process Pi is as follows:
if (i % 2 == 0) {
if (i < n) request Ri
if (i+2 < n) request Ri+2
}
else {
if (i < n) request Rn-i
if (i+2 < n) request Rn-i-2
}
In which one of the following situations is a deadlock possible?
(a) n=40, k=26 (b)n=21,k=12 (c)n=20, k=10 (d)n=41,k=19
28. Consider a system with 4 types of resources R1 (3 units), R2 (2 units), R3 (3 units), R4 (2 units).
A non-preemptive resource allocation policy is used. At any given instance, a request is not
entertained if it cannot be completely satisfied. Three processes P1, P2, P3 request the
sources as follows if executed independently.
Process P1:
t=0: requests 2 units of R2
t=1: requests 1 unit of R3
t=3: requests 2 units of R1
t=5: releases 1 unit of R2
and 1 unit of R1.
t=7: releases 1 unit of R3
t=8: requests 2 units of R4
t=10: Finishes

Process P2:
t=0: requests 2 units of R3
t=2: requests 1 unit of R4
t=4: requests 1 unit of R1
t=6: releases 1 unit of R3
t=8: Finishes

Process P3:
t=0: requests 1 unit of R4
t=2: requests 2 units of R1
t=5: releases 2 units of R1
t=7: requests 1 unit of R2
t=8: requests 1 unit of R3
t=9: Finishes
Which one of the following statements is TRUE if all three processes run concurrently starting
at time t=0?
(a) All processes will finish without any deadlock(b) Only P1 and P2 will be in deadlock
(c) Only P1 and P3 will be in a deadlock. (d) All three processes will be in
deadlock
29. A system contains three programs and each requires three tape units for its operation. The
minimum number of tape units which the system must have such that deadlocks never arise is
_________.
(a)6 (b)7 (c)8 (d)9
30. An operating system uses the Banker’s algorithm for deadlock avoidance when managing the
allocation of three resource types X, Y, and Z to three processes P0, P1, and P2. The table
given below presents the current system state. Here, the Allocation matrix shows the current
number of resources of each type allocated to each process and the Max matrix shows the
maximum number of resources of each type required by each process during its execution.

There are 3 units of type X, 2 units of type Y and 2 units of type Z still available. The system is
currently in a safe state. Consider the following independent requests for additional resources
in the current state:
REQ1: P0 requests 0 units of X,
0 units of Y and 2 units of Z
REQ2: P1 requests 2 units of X,
0 units of Y and 0 units of Z
Which one of the following is TRUE?
(a)Only REQ1 can be permitted
(b)Only REQ2 can be permitted
(c) Both REQ1 and REQ2 can be permitted
(d)Neither REQ1 nor REQ2 can be permitted

Answer Keys
1 (a) 2 (b) 3 (c)
4 (a) 5 (c) 6 (a)
7 (b) 8 (d) 9 (d)
10 (d) 11 (a) 12 (b)
13 (c) 14 (c) 15 (a)
16 (b) 17 (b) 18 (a)
19 (c) 20 (b) 21 (c)
22 (c) 23 (b) 24 (d)
25 (b) 26 (c) 27 (b)
28 (a) 29 (b) 30 (b)
7. SQL/Normalization/ Transaction and Concurrency control/Database(30 Questions)
Questions
1. Consider the following relational schema.
Students(rollno: integer, sname: string)
Courses(courseno: integer, cname: string)
Registration(rollno: integer, courseno: integer, percent: real)
Which of the following queries are equivalent to this query in English?
"Find the distinct names of all students who score more than 90% in the course numbered 107"

(a) I, II,III and IV (b) I, II and IV only (c) II,III and IV only (d) II and III only
2. Suppose (A, B) and (C,D) are two relation schemas. Let r1 and r2 be the corresponding relation
instances. B is a foreign key that refers to C in r2. If data in r1 and r2 satisfy referential
integrity constraints, which of the following is ALWAYS TRUE?

(a) A (b) B (c) C (d) D


3. Consider the following relations A, B, C. How many tuples does the result of the following
relational algebra expression contain? Assume that the schema of A U B is the same as that of

A.
Table A
Id Name Age
----------------
12 Arun 60
15 Shreya 24
99 Rohit 11

Table B
Id Name Age
----------------
15 Shreya 24
25 Hari 40
98 Rohit 20
99 Rohit 11

Table C
Id Phone Area
-----------------
10 2200 02
99 2100 01
(a) 7 (b) 4 (c) 5 (d)9
4. Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop
method. There are 3 buffers each of size equal to disk block size, out of which one buffer is
reserved for intermediate results. Assuming size(r(R)) < size(s(S)), the join will have fewer
number of disk block accesses if
(a) relation r(R) is in the outer loop
(b) relation s(S) is in the outer loop
(c) Join selection factor between r(R) and s(S) is more than 0.5.

(d)Join selection factor between r(R) and s(S) is less than 0.5.

5. Consider the relational schema given below, where eId of the relation dependent is a foreign
key referring to empId of the relation employee. Assume that every employee has at least one
associated dependent in the dependent relation.
employee (empId, empName, empAge)
dependent(depId, eId, depName, depAge)
Consider the following relational algebra query:

The
above query evaluates to the set of empIds of employees whose age is greater than that of
(a)Some dependent (b) all dependents (c) Some of his/her dependents (d) all of his/her
dependents
6. Let E1 and E2 be two entities in an E/R diagram with simple single-valued attributes. R1 and
R2 are two relationships between E1 and E2, where R1 is one-to-many and R2 is many-to-
many. R1 and R2 do not have any attributes of their own. What is the minimum number of
tables required to represent this situation in the relational model?
(a) 2 (b)3 (c)4 (d)5
7. A database of research articles in a journal uses the following schema.
(VOLUME, NUMBER, STARTPGE, ENDPAGE, TITLE, YEAR, PRICE)
The primary key is (VOLUME, NUMBER, STARTPAGE, ENDPAGE) and the following functional
dependencies exist in the schema.
(VOLUME, NUMBER, STARTPAGE, ENDPAGE) -> TITLE
(VOLUME, NUMBER) -> YEAR
(VOLUME, NUMBER, STARTPAGE, ENDPAGE) -> PRICE
The database is redesigned to use the following schemas.
(VOLUME, NUMBER, STARTPAGE, ENDPAGE, TITLE, PRICE)
(VOLUME, NUMBER, YEAR)
Which is the weakest normal form that the new database satisfies, but the old one does not?
(a) 1NF (b)2NF (c)3NF (d) BCNF
8. A Relation R with FD set {A->BC, B->A, A->C, A->D, D->A}. How many candidate keys will be
there in R?
(a) 1 (b)2 (c)3 (d)4
9. What is the min and max number of tables required to convert an ER diagram with 2 entities
and 1 relationship between them with partial participation constraints of both entities?
(a)Min 1 and max 2 (b) Min 1 and max 3 (c)Min 2 and max 3 (d)Min 2 and max 2
10. Consider a B+ tree in which the maximum number of keys in a node is 5. What is the minimum
number of keys in any non root node?

(a) 1 (b) 2 (c) 3 (d)4


11. Which of the following concurrency control protocols ensure both conflict serializability and
freedom from deadlock?
1. 2 phase locking
2. time stamp ordering

(a)1 only (b) 2 only (c)Both 1 and 2 (d)Neither 1 nor 2


12. Which of the following statement about the normal form is false ?
(a) BCNF is stricter than 3NF
(b) Lossless, dependency preserving decomposition into 3NF is always possible
(c) Lossless, dependency preserving decomposition into BCNF is always possible

(d) Any relation with two attributes is in BCNF

13. Relation R has eight attributes ABCDEFGH. Fields of R contain only atomic values. F = {CH -> G,
A -> BC, B -> CFH, E -> A, F -> EG} is a set of functional dependencies (FDs) so that F+ is exactly
the set of FDs that hold for R. How many candidate keys does the relation R have?
(a) 3 (b) 4 (c) 5 (d)6
14. Consider the following relational schema:
Suppliers(sid:integer, sname:string, city:string, street:string)
Parts(pid:integer, pname:string, color:string)
Catalog(sid:integer, pid:integer, cost:real)
Assume that, in the suppliers relation above, each supplier and each street within a city has a
unique name, and (sname, city) forms a candidate key. No other functional dependencies are
implied other than those implied by primary and candidate keys. Which one of the following is
TRUE about the above schema?
(a)The schema is in BCNF
(b) The schema is in 3NF but not in BCNF
(c)The schema is in 2NF but not in 3NF
(d)The schema is not in 2NF
15. Consider the relation scheme R = {E, F, G, H, I, J, K, L, M, M} and the set of functional
dependencies {{E, F} -> {G}, {F} -> {I, J}, {E, H} -> {K, L}, K -> {M}, L -> {N} on R. What is the key
for R?
(a) {E,F} (b){E,F,H} (c) {E,F,H,K,L} (d) {E}
16. Given the following two statements:
S1: Every table with two single-valued
Attributes is in 1NF, 2NF, 3NF and BCNF.
S2: AB->C, D->E, E->C is a minimal cover for
the set of functional dependencies
AB->C, D->E, AB->E, E->C.
Which one of the following is CORRECT?
(a) S1 is TRUE and S2 is FALSE
(b)Both S1 and S2 are true
(c)S1 is FALSE and S2 is TRUE
(d) Both S1 and S2 are FALSE
17. The maximum number of superkeys for the relation schema R(E,F,G,H) with E as the key is
(a)5 (b)6 (c)7 (d)8
18. Given the STUDENTS relation as shown below.

For (StudentName, StudentAge) to be the key for this instance, the value X should not be
equal to
(a) 18 (b)19 (c)20 (d)21
19. Which one of the following statements about normal forms is FALSE?
(a) BCNF is stricter than 3NF
(b)Lossless, dependency-preserving decomposition into 3NF is always possible
(c) Lossless, dependency-preserving decomposition into BCNF is always possible
(d) Any relation with two attributes is in BCNF
20. Let r be a relation instance with schema R = (A, B, C, D). We define r1 = ΠA, B, C (r) and r2 = ΠA.D (r).
Let s = r1 * r2 where * denotes natural join. Given that the decomposition of r into r1 and r2 is
lossy, which one of the following is TRUE?
(a) s ⊂ r (b) r ∪ s (c) r ⊂ s (d) r * s= s

21. Consider a relation scheme R = (A, B, C, D, E, H) on which the following functional


dependencies hold: {A–>B, BC–>D, E–>C, D–>A}. What are the candidate keys of R?
(a) AE,BE (b) AE,BE,DE (c)AEH, BEH, BCH (d) AEH, BEH, DEH
22. The relation scheme Student Performance (name, courseNo, rollNo, grade) has the following
functional dependencies:
name, courseNo → grade
rollNo, courseNo → grade
name → rollNo
rollNo → name
The highest normal form of this relation scheme is
(a) 2NF (b)3NF (c) BCNF (d)4NF
23. Consider the following transactions with data items P and Q initialized to zero:
T1: read (P) ;
read (Q) ;
if P = 0 then Q : = Q + 1 ;
write (Q) ;
T2: read (Q) ;
read (P) ;
if Q = 0 then P : = P + 1 ;
write (P) ;
Any non-serial interleaving of T1 and T2 for concurrent execution leads to
(a)A serializable schedule
(b) A schedule that is not conflict serializable
(c) A conflict serializable schedule
(d) A schedule for which a precedence graph cannot be drawn
24. Which of the following concurrency control protocols ensure both conflict serialzability and
freedom from deadlock? I. 2-phase locking II. Time-stamp ordering
(a) I only (b)II only (c) Both I and II (d) Neither I nor II
25. Consider the following schedule for transactions T1, T2 and T3:

Which one of the schedules below is the correct serialization of the above?
(a)T1->>T3->>T2 (b)T2->>T1->>T3 (c)T2->>T3->>T1 (d)T3->>T1->>T2
26. Consider the following four schedules due to three transactions (indicated by the subscript)
using read and write on a data item x, denoted by r(x) and w(x) respectively. Which one of

them is conflict serializable.


(a)A (b) B (c) C (d)D
27. Consider the following schedule S of transactions T1, T2, T3, T4:
(a) S is conflict-serializable but not recoverable
(b) S is not conflict-serializable but is recoverable
(c) S is both conflict-serializable and recoverable
(d)S is neither conflict-serializable nor is it recoverable

28. Which of the following statements are TRUE about an SQL query?
P : An SQL query can contain a HAVING clause even
if it does not have a GROUP BY clause
Q : An SQL query can contain a HAVING clause only
if it has a GROUP BY clause
R : All attributes used in the GROUP BY clause must
appear in the SELECT clause
S : Not all attributes used in the GROUP BY clause
need to appear in the SELECT clause
(a)P and R
(b) P and S
(c) Q and R
(d) Q and S
29. Consider a database table T containing two columns X and Y each of type integer. After the
creation of the table, one record (X=1, Y=1) is inserted in the table. Let MX and My denote the
respective maximum values of X and Y among all records in the table at any point in time.
Using MX and MY, new records are inserted in the table 128 times with X and Y values being
MX+1, 2*MY+1 respectively. It may be noted that each time after the insertion, values of MX
and MY change. What will be the output of the following SQL query after the steps mentioned
above are carried out?
SELECT Y FROM T WHERE X=7;
(a)127 (b)255 (c)129 (d)257
30. Database table by name Loan_Records is given below.
Borrower Bank_Manager Loan_Amount
Ramesh Sunderajan 10000.00
Suresh Ramgopal 5000.00
Mahesh Sunderajan 7000.00
What is the output of the following SQL query?
SELECT Count(*)
FROM ( (SELECT Borrower, Bank_Manager
FROM Loan_Records) AS S
NATURAL JOIN (SELECT Bank_Manager,
Loan_Amount
FROM Loan_Records) AS T );
(a) 3 (b)9 (c)5 (d)6
Answer Keys
1 (a) 2 (a) 3 (a)
4 (a) 5 (d) 6 (b)
7 (b) 8 (c) 9 (c)
10 (b) 11 (b) 12 (c)
13 (b) 14 (a) 15 (b)
16 (a) 17 (d) 18 (b)
19 (c) 20 (c) 21 (d)
22 (b) 23 (b) 24 (b)
25 (a) 26 (d) 27 (c)
28 (c) 29 (a) 30 (c)

8. C language/ Linked list/ Binary trees/Programming and Data structures(30 Questions)


Questions
1. What does the following fragment of C-program print?
char c[] = "GATE2011";
char *p =c;
printf("%s", p + p[3] - p[1]) ;
(a)GATE2011 (b) E2011 (c)2011 (d)011

2. Consider the following C program segment:


char p[20];
char *s = "string";
int length = strlen(s);
int i;
for (i = 0; i < length; i++)
p[i] = s[length — i];
printf("%s", p);
(a) gnirts (b)gnirt (c)string (d)No output is printed
3. Assume that a character takes 1 byte. Output of following program?
#include<stdio.h>
int main()
{
char str[20] = "GeeksQuiz";
printf ("%d", sizeof(str));
return 0;
}
(a) 9 (b)10 (c)20 (d)Garbage value
4. The output of following C program is
#include <stdio.h>
char str1[100];
char *fun(char str[])
{
static int i = 0;
if (*str)
{
fun(str+1);
str1[i] = *str;
i++;
}
return str1;
}

int main()
{
char str[] = "GATE CS 2015 Mock Test";
printf("%s", fun(str));
return 0;
}
(a)GATE CS 2015 Mock Tes
(b)tseT kcoM 5102 SC ETAG
(c) No output is printed
(d) Segmentation fault
5. Consider the following function written in the C programming language. The output of the
above function on input “ABCD EFGH” is
void foo (char *a)
{
if (*a && *a != ` `)
{
foo(a+1);
putchar(*a);
}
}
(a) ABCD EFGH (b)ABCD (c) HGFE DCBA (d) DCBA
6. Consider the following C program segment.
# include <stdio.h>
int main( )
{
char s1[7] = "1234", *p;
p = s1 + 2;
*p = '0' ;
printf ("%s", s1);
}
What will be printed by the program?
(a) 12 (b)120400 (c)1204 (d)1034
7. Output of following program?
#include<stdio.h>
int main()
{
int a[] = {1, 2, 3, 4, 5, 6};
int *ptr = (int*)(&a+1);
printf("%d ", *(ptr-1) );
return 0;
}
(a)1 (b)2 (c)6 (d)Runtime error
8. Consider the following declaration of a ‘two-dimensional array in C:
char a[100][100];
Assuming that the main memory is byte-addressable and that the array is stored starting from
memory address 0, the address of a[40][50] is
(a) 4040 (b)4050 (c)5040 (d)5050
9. Predict the output of the below program:
#include <stdio.h>
#define SIZE(arr) sizeof(arr) / sizeof(*arr);
void fun(int* arr, int n)
{
int i;
*arr += *(arr + n - 1) += 10;
}

void printArr(int* arr, int n)


{
int i;
for(i = 0; i < n; ++i)
printf("%d ", arr[i]);
}

int main()
{
int arr[] = {10, 20, 30};
int size = SIZE(arr);
fun(arr, size);
printArr(arr, size);
return 0;
}
(a) 20 30 40 (b)20 20 40 (c)50 20 40 (d)Compile time error
10. For a C program accessing X[i][j][k], the following intermediate code is generated by a
compiler. Assume that the size of an integer is 32 bits and the size of a character is 8 bits.
t0 = i ∗ 1024
t1 = j ∗ 32
t2 = k ∗ 4
t3 = t1 + t0
t4 = t3 + t2
t5 = X[t4]
Which one of the following statements about the source code for the C program is CORRECT?
(a) X is declared as “int X[32][32][8]”
(b)X is declared as “int X[4][1024][32]"
(c) X is declared as “char X[4][32][8]”
(d) X is declared as “char X[32][16][2]”

11. In the worst case, the number of comparisons needed to search a singly linked list of length n
for a given element is
(a) log 2 n (b) n/2 (c) log 2 n-1 (d)n
12. Suppose each set is represented as a linked list with elements in arbitrary order. Which of the
operations among union, intersection, membership, cardinality will be the slowest?
(a) Union only (b)Intersection, membership (c) Membership, cardinality
(d) Union, intersection
13. Consider the function f defined below.
struct item
{
int data;
struct item * next;
};

int f(struct item *p)


{
return (
(p == NULL) ||
(p->next == NULL) ||
(( P->data <= p->next->data) && f(p->next))
);
}
For a given linked list p, the function f returns 1 if and only if
(a) the list is empty or has exactly one element
(b) the elements in the list are sorted in non-decreasing order of data value
(c) the elements in the list are sorted in non-increasing order of data value
(d) not all elements in the list have the same data value
14. A circularly linked list is used to represent a Queue. A single variable p is used to access the
Queue. To which node should p point such that both the operations enQueue and deQueue
can be performed in constant time?

(a) rear node (b)front node (c)not possible with a single pointer (d)node next to front
15. Let P be a singly linked list. Let Q be the pointer to an intermediate node x in the list. What is
the worst-case time complexity of the best known algorithm to delete the node x from the
list?
(a) O(n) (b) O(log 2 n) (c) O( logn) (d) O(1)
16. N items are stored in a sorted doubly linked list. For a delete operation, a pointer is provided
to the record to be deleted. For a decrease-key operation, a pointer is provided to the record
on which the operation is to be performed. An algorithm performs the following operations
on the list in this order: Θ(N) delete, O(log N) insert, O(log N) find, and Θ(N) decrease-key
What is the time complexity of all these operations put together
(a)O(Log2N) (b) O(N) (c) O(N2) (d) Θ(N2 Log N)
17. The concatenation of two lists is to be performed in O(1) time. Which of the following
implementations of a list should be used?
(a)Singly linked list (b) double linked list (c)Circular doubly linked list (d)array
implementations of lists
18. A scheme for storing binary trees in an array X is as follows. Indexing of X starts at 1 instead of
0. the root is stored at X[1]. For a node stored at X[i], the left child, if any, is stored in X[2i] and
the right child, if any, in X[2i+1]. To be able to store any binary tree on n vertices the minimum
size of X should be.
(a) log2n(b)n(c)2n+1 (d)2^n — 1

19. Postorder traversal of a given binary search tree, T produces the following sequence of keys
10, 9, 23, 22, 27, 25, 15, 50, 95, 60, 40, 29 Which one of the following sequences of keys can be
the result of an in-order traversal of the tree T?
(a)9, 10, 15, 22, 23, 25, 27, 29, 40, 50, 60, 95
(b)9, 10, 15, 22, 40, 50, 60, 95, 23, 25, 27, 29
(c)29, 15, 9, 10, 25, 22, 23, 27, 40, 60, 50, 95
(d) 95, 50, 60, 40, 27, 23, 22, 25, 10, 9, 15, 29

20. In a binary tree with n nodes, every node has an odd number of descendants. Every node is
considered to be its own descendant. What is the number of nodes in the tree that have
exactly one child? (a) 0 (b) 1 (c) (n-1)/2
(d) n-1
21. The height of a binary tree is the maximum number of edges in any root to leaf path. The
maximum number of nodes in a binary tree of height h is:
(a) 2h−1
(b)2h−1 -1
(c) 2h+1-1
(d) 2h+1
22. The height of a tree is the length of the longest root-to-leaf path in it. The maximum and
minimum number of nodes in a binary tree of height 5 are
(a) 63 and 6, respectively
(b)64 and 5, respectively
(c)32 and 6, respectively
(d) 31 and 5, respectively
23. A binary tree T has 20 leaves. The number of nodes in T having two children is
(a) 18 (b)19 (c)17 (d)Any number between 10 and 20
24. Consider a complete binary tree where the left and the right subtrees of the root are max-
heaps. The lower bound for the number of operations to convert the tree to a heap is
(a) Ω(logn) (b) Ω(n) (c) Ω(nlogn) (d)Ω(n2)

25. An array of integers of size n can be converted into a heap by adjusting the heaps rooted at
each internal node of the complete binary tree starting at the node (n - 1) /2 , and doing this
adjustment up to the root node (root node is at index 0) in the order (n - 1)/2 , (n - 3)/ 2 ,
....., 0. The time required to construct a heap in this manner is
(a)O(log n) (b) O(n)(c) O (n log log n) (d) O(n log n)

26. In a binary tree, for every node the difference between the number of nodes in the left and
right subtrees is at most 2. If the height of the tree is h > 0, then the minimum number of
nodes in the tree is:
(a) 2h - 1 (b) 2h - 1 + 1

(c) 2h - 1 (d)2h

27. Breadth First Search (BFS) is started on a binary tree beginning from the root vertex. There is a
vertex t at a distance four from the root. If t is the n-th vertex in this BFS traversal, then the
maximum possible value of n is ________
(a)15 (b) 16 (c) 31 (d)32
28. In a binary tree, the number of internal nodes of degree 1 is 5, and the number of internal
nodes of degree 2 is 10. The number of leaf nodes in the binary tree is
(a) 10 (b)11 (c)12 (d)15
29. A binary tree with n > 1 nodes has n1, n2 and n3 nodes of degree one, two and three
respectively. The degree of a node is defined as the number of its neighbors.
Starting with the above tree, while there remains a node v of degree two in the tree, add an
edge between the two neighbors of v and then remove v from the tree. How many edges will
remain at the end of the process?
(a)2 * n1 - 3
(b) n2 + 2 * n1 - 2

(c) n3 - n2

(d) n2 + n1 - 2

30. Suppose we have a balanced binary search tree T holding n numbers. We are given two
numbers L and H and wish to sum up all the numbers in T that lie between L and H. Suppose
there are m such numbers in T. If the tightest upper bound on the time to compute the sum is
O(nalogb n + mc logd n), the value of a + 10b + 100c + 1000d is ____.
(a) 60 (b) 110 (c)210 (d)50
Answer Keys
1 (c) 2 (d) 3 (c)
4 (b) 5 (d) 6 (c)
7 (c) 8 (b) 9 (c)
10 (a) 11 (d) 12 (d)
13 (b) 14 (a) 15 (d)
16 (c) 17 (c) 18 (d)
19 (a) 20 (a) 21 (c)
22 (a) 23 (b) 24 (a)
25 (b) 26 (b) 27 (c)
28 (b) 29 (a) 30 (b)
9. Regular language and Finite automata/ Context free language/Theory of computation(30
Questions)
Questions
1. Consider the languages L1 = and L2 = {a}. Which one of the following represents L1 L2* U L1*

(a) A (b) B (c) C (d) D

2. Consider the DFA given. Which of the following are FALSE?

1. Complement of L(A) is context-free.


2. L(A) = L((11*0+0)(0 + 1)*0*1*)
3. For the language accepted by A, A is the minimal DFA.
4. A accepts all strings over {0, 1} of length at least 2.
(a) 1 and 3 only (b) 2 and 4 only (c) 2 and 3 only (d) 3 and 4 only
3. W hat is the complement of the language accepted by the NFA shown below?

(a) A (b) B (c) C (d)D


4. Given the language L = {ab, aa, baa}, which of the following strings are in L*?
1) abaabaaabaa
2) aaaabaaaa
3) baaaaabaaaab
4) baaaaabaa
(a) 1, 2 and 3 (b) 2,3 and 4 (c) 1, 2 and 4 (d) 1, 3 and 4
5. Consider the set of strings on {0,1} in which, every substring of 3 symbols has at most two
zeros. For example, 001110 and 011001 are in the language, but 100010 is not. All strings of
length less than 3 are also in the language. A partially completed DFA that accepts this
language is shown below.
The missing arcs in the DFA are

(a) A (b) B (c)C (d)D


6. Definition of a language L with alphabet {a} is given as following.
L={ | k>0, and n is a positive integer constant}
What is the minimum number of states needed in DFA to recognize L?
(a) k+1 (b)n+1 (c) 2^(n+1) (d) 2^(k+1)
7. A deterministic finite automation (DFA)D with alphabet {a,b} is given below

Which of the following finite state machines is a valid minimal DFA which accepts the same
language as D?
(a) A (b) B (c) C (d)D
8. Let w be any string of length n is {0,1}*. Let L be the set of all substrings of w. What is the
minimum number of states in a non-deterministic finite automaton that accepts L?
(a) n-1 (b) n (c) n+1 (d)2n-1
9. Given the following state table of an FSM with two states A and B, one input and one output:
Next Next
Present Present
Input State State Output
State A State B
A B
0 0 0 0 0 1
0 1 0 1 0 0
1 0 0 0 1 0

1 1 0 1 0 0

0 0 1 0 1 0

0 1 1 0 0 1

1 0 1 0 1 1

1 1 1 0 0 1
If the initial state is A=0, B=0, what is the minimum length of an input string which will take
the machine to the state A=0, B=1 with Output = 1?
(a) 3 (b) 4 (c) 5 (d)6
10. Given below are two finite state automata (→ indicates the start state and F indicates a final
state)Which of the following represents the product automaton Z×Y?
(a)A
(b)B (c) C (d)D
11. Consider the following languages.

Which one of the following statements is FALSE?


(a) L2 is context-free
(b) L1 intersection L2 is context-free
(c) Complement of L2 is recursive
(d) Complement of L1 is context-free but not regular
12. Which of the following pairs have DIFFERENT expressive power?
(a) Deterministic finite automata(DFA) and Non-deterministic finite automata(NFA)
(b) Deterministic push down automata(DPDA)and Non-deterministic push down
automata(NPDA)
(c) Deterministic single-tape Turing machine and Non-deterministic single-tape Turing
machine
(d) Single-tape Turing machine and multi-tape Turing machine
13. Let P be a regular language and Q be context-free language such that Q P. (For example, let
P be the language represented by the regular expression p*q* and Q be {pnqn|n N}). Then
which of the following is ALWAYS regular? (A) P Q (B) P - Q (C) * - P (D) * - Q
(a) A (b)B (c) C (d)D
14. Consider the languages L1 = {0i1j | i != j}. L2 = {0i1j | i = j}. L3 = {0i1j | i = 2j+1}. L4 = {0i1j | i != 2j}.
(a) Only L2 is context free
(b) Only L2 and L3 are context free
(c) Only L1 and L2 are context free
(d) All are context free
15. S -> aSa|bSb|a|b; The language generated by the above grammar over the alphabet {a,b} is
the set of
(a) All palindromes
(b) All odd length palindromes.
(c) Strings that begin and end with the same symbol
(d)All even length palindromes

16. Let L = L1 L2, where L1 and L2 are languages as defined below:


L1 = { | m, n >= 0 }
L2 = { | i, j, k >= 0 }
Then L is
(a) Not recursive (b)Regular (c) Context free but not regular (d) Recursively enumerable
but not context free
17. The language L= {0i21i | i≥0 } over the alphabet {0,1, 2} is:
(a) not recursive
(b) is recursive and is a deterministic CFL

(c) is a regular language

(d) is not a deterministic CFL but a CFL


18. Consider the CFG with {S,A,B) as the non-terminal alphabet, {a,b) as the terminal alphabet, S
as the start symbol and the following set of production rules
S --> aB S --> bA
B --> b A --> a
B --> bS A --> aS
B --> aBB A --> bAA
Which of the following strings is generated by the grammar?
(a) aaaabb (b) aabbbb (c) aabbab (d)abbbba

19.
Here, wr is the reverse of the string w. Which of these languages are deterministic Context-
free languages?
(a) None of the languages (b) Only L1 (c) only L1 and L2 (d) All the three languages

20.
(a) L1 only (b) L3 only (c)L1 and L2 (d) L2 and L3
21. Consider the following statements about the context free grammar
G = {S → SS, S → ab, S → ba, S → Ε}
I. G is ambiguous
II. G produces all strings with equal number of a’s and b’s
III. G can be accepted by a deterministic PDA.
Which combination below expresses all the true statements about G?
(a) I only (b) I and III only (c) II and III only (d) I, II an III
22. Which of the following statements is/are FALSE?
1. For every non-deterministic Turing machine,
there exists an equivalent deterministic Turing machine.
2. Turing recognizable languages are closed under union
and complementation.
3. Turing decidable languages are closed under intersection
and complementation.
4. Turing recognizable languages are closed under union
and intersection.
(a) 1 and 4 only (b) 1 and 3 only (c) 2 only (d) 3 only
23. Let L1 be a recursive language. Let L2 and L3 be languages that are recursively enumerable but
not recursive. Which of the following statements is not necessarily true? (A) L2 – L1 is
recursively enumerable. (B) L1 – L3 is recursively enumerable (C) L2 ∩ L1 is recursively
enumerable (D) L2 ∪ L1 is recursively enumerable
(a)A (b) B (c) C (d)D

24. Which of the following is true for the language


(a) It is not accepted by a Turing Machine
(b) It is regular but not context-free

(c) It is context-free but not regular


(d) It is neither regular nor context-free, but accepted by a Turing machine

25. Let L be a language and L' be its complement. Which one of the following is NOT a viable
possibility?
(a) Neither L nor L' is recursively enumerable (r.e.).
(b) One of L and L' is r.e. but not recursive; the other is not r.e
(c) Both L and L' are r.e. but not recursive
(d) Both L and L' are recursive
26. Let A ≤m B denotes that language A is mapping reducible (also known as many-to-one
reducible) to language B. Which one of the following is FALSE? a) If A ≤m B and B is recursive
then A is recursive. b) If A ≤m B and A is undecidable then B is undecidable. c) If A ≤m B and B is
recursively enumerable then A is recursively enumerable. d) If A ≤m B and B is not recursively
enumerable then A is not recursively enumerable.
(a)A (b) B (c)C (d)D
27. Which of the following is/are undecidable?

(a) 3 only (b) 3 and 4 only (c) 1,2 and 3 only (d) 2 and 3 only
28. Which of the following problems are decidable?

(a) 1,2,3,4 (b)1,2 (c)2,3,4 (d)3,4


29. Which of the following are decidable?
I. Whether the intersection of two regular languages is infinite
II. Whether a given context-free language is regular
III. Whether two push-down automata accept the same language
IV. Whether a given grammar is context-free
(a) I and II only (b)I and IV only (c) II and III only (d)II and IV only
30. Let <M> be the encoding of a Turing machine as a string over ∑= {0, 1}. Let L = { <M> |M is a
Turing machine that accepts a string of length 2014 }. Then, L is
(a) decidable and recursively enumerable

(b) undecidable but recursively enumerable


(c) undecidable and not recursively enumerable
(d) decidable but not recursively enumerable

Answer Keys
1 (a) 2 (d) 3 (b)
4 (c) 5 (d) 6 (b)
7 (a) 8 (c) 9 (a)
10 (a) 11 (d) 12 (b)
13 (c) 14 (d) 15 (b)
16 (c) 17 (b) 18 (c)
19 (c) 20 (d) 21 (b)
22 (c) 23 (b) 24 (d)
25 (c) 26 (d) 27 (d)
28 (d) 29 (b) 30 (b)

10. Dynamic programming/ Divide and Conquer/ Analysis of algorithm(30 Questions)


Questions
1. The recurrence relation capturing the optimal time of the Tower of Hanoi problem with n
discs is.
(a) T(n) = 2T(n – 2) + 2 (b) T(n) = 2T(n – 1) + n (c) T(n) = 2T(n/2) + 1 (d) T(n) = 2T(n – 1) + 1

2. What is the time complexity of the below function?


void fun(int n, int arr[])
{
int i = 0, j = 0;
for(; i < n; ++i)
while(j < n && arr[i] < arr[j])
j++;
}
(a) O(n) (b) O(n^2) (c) O(nlogn) (d)O(n(logn)^2)
3. In a competition, four different functions are observed. All the functions use a single for loop
and within the for loop, same set of statements are executed. Consider the following for
loops:
A) for(i = 0; i < n; i++)

B) for(i = 0; i < n; i += 2)

C) for(i = 1; i < n; i *= 2)

D) for(i = n; i > -1; i /= 2)


If n is the size of input(positive), which function is most efficient(if the task to be performed is
not an issue)?
(a) A (b) B (c) C (d)D
4. Consider the following functions

Which of the following


is true?
(a) h(n) is 0(f(n))
(b) h(n) is 0(g(n))
(c) g(n) is not 0(f(n))
(d) f(n) is 0(g(n)) (a) A (b) B (c) C (d) D
5. Consider the following three claims I (n + k)^m = (n^m), where k and m are constants II 2^(n
+ 1) = 0(2^n) III 2^(2n + 1) = 0(2^n) Which of these claims are correct?
(a) I and II (b) I and III (c) II and III (d) I, II and III
6. Let s be a sorted array of n integers. Let t(n) denote the time taken for the most efficient
algorithm to determined if there are two elements with sum less than 1000 in s. which of the
following statements is true?
a) t (n) is 0 (1)
b) n < t (n) < n
c) n log 2 n < t (n) <
d) t (n) =
(a) a (b) b(c) c (d)d
7. Consider the following function
int unknown(int n) {
int i, j, k = 0;
for (i = n/2; i <= n; i++)
for (j = 2; j <= n; j = j * 2)
k = k + n/2;
return k;
}
What is the returned value of the above function? (GATE CS 2013)
(A)
(B)
(C)
(D)
(a) A (b) B (c) C (d)D
8. In quick sort, for sorting n elements, the (n/4)th smallest element is selected as pivot using an
O(n) time algorithm. What is the worst case time complexity of the quick sort? <pre> (A) (n)
(B) (nLogn) (C) (n^2) (D) (n^2 log n) </pre>
(a)A (b) B (c) C (d) D
9. Consider the Quicksort algorithm. Suppose there is a procedure for finding a pivot element
which splits the list into two sub-lists each of which contains at least one-fifth of the
elements. Let T(n) be the number of comparisons required to sort n elements. Then
(a) T(n) <= 2T(n/5) + n (b) T(n) <= T(n/5) + T(4n/5) + n (c) T(n) <= 2T(4n/5) + n(d)T(n) <= 2T(n/2) + n

10. Consider the following segment of C-code:


int j, n;
j = 1;
while (j <= n)
j = j*2;
The number of comparisons made in the execution of the loop for any n > 0 is: Base of Log is 2 in all
options.
(a) CEIL(logn) + 2 (b) n (c) CEIL(logn) (d)FLOOR(logn) + 2

11. Which of the following algorithms is NOT a divide & conquer algorithm by nature?
(a) Euclidean algorithm to compute the greatest common divisor
(b) Heap Sort
(c)Cooley-Tukey fast Fourier transform
(d)Quick Sort

12. Consider the following C program


int main()
{
int x, y, m, n;
scanf ("%d %d", &x, &y);
/* x > 0 and y > 0 */
m = x; n = y;
while (m != n)
{
if(m>n)
m = m - n;
else
n = n - m;
}
printf("%d", n);
} What does the program compute?
(a) x + y using repeated subtraction
(b) x mod y using repeated subtraction
(c) the greatest common divisor of x and y
(d) the least common multiple of x and y

13. The secant method is used to find the root of an equation f(x) = 0. It is started from two
distinct estimates xa and xb for the root. It is an iterative procedure involving linear
interpolation to a root. The iteration stops if f(xb) is very small and then xb is the solution. The
procedure is given below. Observe that there is an expression which is missing and is marked
by? Which is the suitable expression that is to be put in place of? So that it follows all steps of
the secant method?
Initialize: xa, xb, ε, N // ε = convergence indicator
fb = f(xb) i = 0
while (i < N and |fb| > ε) do
i=i+1 // update counter
xt = ? // missing expression for
// intermediate value
xa = xb // reset xa
xb = xt // reset xb
fb = f(xb) // function value at new xb
end while
if |fb| > ε
then // loop is terminated with i = N
write “Non-convergence”
else
write “return xb”
end if
(a) xb – (fb– f(xa)) fb/ (xb – xa)
(b) xa– (fa– f(xa)) fa/ (xb – xa)
(c) xb – (fb – xa) fb/ (xb – fb(xa)
(d) xa – (xb – xa) fa/ (fb – f(xa))

14. Suppose you are provided with the following function declaration in the C programming
language.
int partition (int a[], int n);
The function treats the first element of a[] as a pivot, and rearranges the array so that all elements
less than or equal to the pivot is in the left part of the array, and all elements greater than the pivot is
in the right part. In addition, it moves the pivot so that the pivot is the last element of the left part.
The return value is the number of elements in the left part. The following partially given function in
the C programming language is used to find the kth smallest element in an array a[ ] of size n using
the partition function. We assume k ≤ n
int kth_smallest (int a[], int n, int k)
{
int left_end = partition (a, n);
if (left_end+1==k)
{
return a [left_end];
}
if (left_end+1 > k)
{
return kth_smallest (____________________);
}
else
{
return kth_smallest (____________________);
}
}
The missing argument lists are respectively
(a) (a, left_end, k) and (a+left_end+1, n–left_end–1, k–left_end–1)
(b) (a, left_end, k) and (a, n–left_end–1, k–left_end–1)
(c) (a, left_end+1, N–left_end–1, K–left_end–1) and(a, left_end, k)
(d) (a, n–left_end–1, k–left_end–1) and (a, left_end, k)

15. Consider the problem of computing min-max in an unsorted array where min and max are
minimum and maximum elements of array. Algorithm A1 can compute min-max in a1
comparisons without divide and conquer. Algorithm A2 can compute min-max in a2
comparisons by scanning the array linearly. What could be the relation between a1 and a2
considering the worst case scenarios?
(a) a1 < a2 (b) a1 > a2 (c) a1=a2 (d) Depends on the input
16. A sub-sequence of a given sequence is just the given sequence with some elements (possibly
none or all) left out. We are given two sequences X[m] and Y[n] of lengths m and n
respectively, with indexes of X and Y starting from 0. We wish to find the length of the longest
common sub-sequence(LCS) of X[m] and Y[n] as l(m,n), where an incomplete recursive
definition for the function l(i,j) to compute the length of The LCS of X[m] and Y[n] is given
below:
l(i,j) = 0, if either i=0 or j=0
= expr1, if i,j > 0 and X[i-1] = Y[j-1]
= expr2, if i,j > 0 and X[i-1] != Y[j-1]
(a) expr1 ≡ l(i-1, j) + 1
(b) expr1 ≡ l(i, j-1)
(c) expr2 ≡ max(l(i-1, j), l(i, j-1))
(d) expr2 ≡ max(l(i-1,j-1),l(i,j))

17. Consider two strings A = "qpqrr" and B = "pqprqrp". Let x be the length of the longest
common subsequence (not necessarily contiguous) between A and B and let y be the number
of such longest common subsequences between A and B. Then x + 10y = ___.
(a) 33 (b) 23 (c) 43 (d)34
18. Let A1, A2, A3, and A4 be four matrices of dimensions 10 x 5, 5 x 20, 20 x 10, and 10 x 5,
respectively. The minimum number of scalar multiplications required to find the product
A1A2A3A4 using the basic matrix multiplication method is
(a)1500 (b)2000 (c) 500 (d)100
19. The time complexity of the following C function is (assume n > 0 )
int recursive (mt n)
{
if (n == 1)
return (1);
else
return (recursive (n-1) + recursive (n-1));
}
(a) 0(n)
(b
0(nlogn)
)
(c
0(n^2)
)
(d
0(2^n)
)

20. Which one of the following correctly determines the solution of the recurrence relation with
T(1) = 1?
T(n) = 2T(n/2) + Logn
(a) Θ(n)
(b) Θ(nLogn)
(c) Θ(n*n)
(d) Θ(log n)

21. Consider the following recurrence relation

The value of T(m2) for m ≥ 1 is


(a) (m/6) (21m - 39) + 4
(b) (m/6) (4m2 - 3m + 5)
(c) (m/2) (m2.5 - 11m + 20) - 5
(d) (m/6) (5m3 - 34m2 + 137m - 104) + (5/6)

22. The solution to the recurrence equation T(2k) = 3 T(2k-1) + 1, T (1) = 1, is:
(a) 2k
(b) (3k + 1 - 1)/2
(c) 3log2k
(d) 2log3k

23. Select the correct asymptotic complexity of an algorithm with runtime T(n, n) where
T(x, c) = Θ(x) for c <= 2,
T(c, y) = Θ(y) for c <= 2, and
T(x, y) = Θ(x+y) + T(x/2, y/2)
(a) Θ(nLogn)

(b) Θ(n2)
(c) Θ(n)

(d) Θ(n2Logn)

24. Let f(n) = n and g(n) = n(1+sin n), where n is a positive integer. Which of the following statements
is/are correct?
I. f(n) = O(g(n))
II. f(n) = Ω(g(n))
(a) Only I
(b) Only II
(c) Both I and II
(d) Neither I nor II

25. Consider a list of recursive algorithms and a list of recurrence relations as shown below. Each
recurrence relation corresponds to exactly one algorithm and is used to derive the time
complexity of the algorithm.
Recursive Recurrence
Algorithm Relation
P. Binary search I. T(n) = T(n-k) + T(k) + cn
Q. Merge sort II. T(n) = 2T(n-1) + 1
R. Quick sort III. T(n) = 2T(n/2) + cn
S. Tower of Hanoi IV. T(n) = T(n/2) + 1
P-II, Q-III, R-IV, S-
(a)
I
P-IV, Q-III, R-I, S-
(b)
II
P-III, Q-II, R-IV, S-
(c)
I
(d) P-IV, Q-II, R-I, S-II

26. Consider the recurrence relation a1 = 8, an = 6n2 + 2n + an-1. Let a99 = k x 104. The value of K is
_____ (a) 190 (b) 296 (c) 198 (d) 200
27. The given diagram shows the flowchart for a recursive function A(n). Assume that all
statements, except for the recursive calls, have O(1) time complexity. If the worst case time
complexity of this function is O(nα), then the least possible value (accurate up to two decimal
positions) of α is __________
(a) 2.2 to 2.4 (b) 3.2 to 3.4 (c) 0 to 1.8 (d)1
28. When n = 22k for some k ≥ 0, the recurrence relation
T(n) = √(2) T(n/2) + √n, T(1) = 1
evaluates to :
(a) √(n) (log n + 1)
(b) √(n) (log n )
(c) √(n) log √(n)
(d) n log √(n)

29. Consider the DAG with Consider V = {1, 2, 3, 4, 5, 6}, shown below. Which of the following is

NOT a topological ordering?


(a) 1 2 3 4 5 6
(b) 1 3 2 4 5 6
(c) 1 3 2 4 6 5
(d) 3 2 4 1 6 5

30. Let G be a graph with n vertices and m edges. What is the tightest upper bound on the running
time on Depth First Search of G? Assume that the graph is represented using adjacency
matrix.
(a) O(n)
(b) O(m+n)
(c) O(n2)
(d) O(mn)

Answer Keys
1 (d) 2 (a) 3 (c)
4 (d) 5 (a) 6 (a)
7 (b) 8 (b) 9 (b)
10 (d) 11 (b) 12 (c)
13 (d) 14 (a) 15 (b)
16 (c) 17 (d) 18 (a)
19 (d) 20 (a) 21 (b)
22 (b) 23 (c) 24 (d)
25 (b) 26 (c) 27 (a)
28 (a) 29 (d) 30 (c)

Signature of the HoD/DRC Chairman Signature of the Dean

Director (R&D)

You might also like