Ugc Net Computer Science
Ugc Net Computer Science
2. The post order traversal of a binary 6. Both hosts and routers are TCP/IP
tree is DEBFCA. Find out the pre- protocol software. However, routers do
order traversal. not use protocol from all layers. The
layer for which protocol software is not
(A) ABFCDE
needed by a router is
(B) ADBFEC (A) Layer – 5 (Application)
(C) ABDECF (B) Layer – 1 (Physical)
(D) None of the above (C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)
12. A Transaction Manager is which of the 16. In which circuit switching, delivery of
following ? data is delayed because data must be
(A) Maintains a log of transactions stored and retrieved from RAM ?
(B) Maintains before and after (A) Space division
database images
(B) Time division
(C) Maintains appropriate concurrency
control (C) Virtual
(D) All of the above (D) Packet
J-87-12 3 Paper-II
17. In which Routing Method do all the 22. Validation means
routers have a common database ? (A) are we building the product right
(A) Distance vector (B) are we building the right product
(C) verification of fields
(B) Link state
(D) None of the above
(C) Link vector
(D) Dijkestra method 23. If a process is under statistical control,
then it is
(A) Maintainable
18. Page Shift Keying (PSK) Method is
(B) Measurable
used to modulate digital signal at
(C) Predictable
9600 bps using 16 level. Find the line
(D) Verifiable
signals and speed (i.e. modulation
rate).
24. In a function oriented design, we
(A) 2400 bauds (B) 1200 bauds (A) minimize cohesion and maximize
(C) 4800 bauds (D) 9600 bauds coupling
(B) maximize cohesion and minimize
19. The station to hub distance in which it coupling
is 2000 metres. (C) maximize cohesion and
maximize coupling
(A) 100 Base-Tx
(D) minimize cohesion and minimize
(B) 100 Base-Fx coupling
(C) 100 Base-T4
25. Which of the following metric does not
(D) 100 Base-T1 depend on the programming language
used ?
(A) Line of code
20. Main aim of software engineering is to (B) Function count
produce (C) Member of token
(A) program (D) All of the above
(B) software
(C) within budget 26. A / B+ tree index is to be built on the
name attribute of the relation
(D) software within budget in the
STUDENT. Assume that all students
given schedule
names are of length 8 bytes, disk block
are of size 512 bytes and index
21. Key process areas of CMM level 4 are
pointers are of size 4 bytes. Given this
also classified by a process which is
scenario what would be the best choice
(A) CMM level 2 of the degree (i.e. the number of
(B) CMM level 3 pointers per node) of the B+ tree ?
(C) CMM level 5 (A) 16 (B) 42
(D) All of the above (C) 43 (D) 44
Paper-II 4 J-87-12
27. The Inorder traversal of the tree will 32. Cached and interleaved memories are
yield a sorted listing of elements of ways of speeding up memory access
tree in between CPU’s and slower RAM.
(A) Binary tree Which memory models are best suited
(B) Binary search tree (i.e. improves the performance most)
for which programs ?
(C) Heaps
(i) Cached memory is best suited for
(D) None of the above
small loops.
(ii) Interleaved memory is best
28. Mobile IP provides two basic
suited for small loops
functions.
(iii) Interleaved memory is best
(A) Route discovery and registration
suited for large sequential code.
(B) Agent discovery and registration
(iv) Cached memory is best suited for
(C) IP binding and registration large sequential code.
(D) None of the above (A) (i) and (ii) are true.
(B) (i) and (iii) are true.
29. Pre-emptive scheduling is the strategy
(C) (iv) and (ii) are true.
of temporarily suspending a gunning
process (D) (iv) and (iii) are true.
(A) before the CPU time slice expires
(B) to allow starving processes to run 33. Consider the following page trace :
(C) when it requests I/O 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5
(D) to avoid collision Percentage of page fault that would
occur if FIFO page replacement
algorithm is used with number of
30. In round robin CPU scheduling as time
frames for the JOB m = 4 will be
quantum is increased the average turn
around time (A) 8
(A) increases (B) 9
(B) decreases (C) 10
(C) remains constant (D) 12
(D) varies irregularly
34. Check sum used along with each
31. Resources are allocated to the process packet computes the sum of the data,
on non-sharable basis is where data is treated as a sequence of
(A) mutual exclusion (A) Integer
(B) hold and wait (B) Character
(C) no pre-emption (C) Real numbers
(D) circular wait (D) Bits
J-87-12 5 Paper-II
35. If an integer needs two bytes of 40. Consider the following statements :
storage, then the maximum value of a
I. Recursive languages are closed
signed integer is
under complementation.
(A) 216 – 1
II. Recursively enumerable languages
15
(B) 2 –1 are closed under union.
(C) 216 III. Recursively enumerable languages
(D) 2 15 are closed under complementation.
Which of the above statements are true ?
36. Which of the following logic families (A) I only
is well suited for high-speed operations ?
(B) I and II
(A) TTL
(C) I and III
(B) ECL
(C) MOS (D) II and III
(D) CMOS
41. What is the routing algorithm used by
37. Interrupts which are initiated by an RIP and IGRP ?
instruction are (A) OSPF
(A) Internal (B) Link-state
(B) External
(C) Dynamic
(C) Hardware
(D) Dijkestra vector
(D) Software
J-87-12 7 Paper-II
Space For Rough Work
Paper-II 8 J-87-12
PAPER-III
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
Paper-III 10 J-87-12
71. Which one of the following options is 74. On a disk with 1000 cylinders
not a shell in UNIX system ?
(0 to 999) find the number of tracks,
(A) Bourne Shell the disk arm must move to satisfy all
(B) C Shell the requests in the disk queue. Assume
the last request service was at track
(C) Net Shell
345 and the head is moving toward
(D) Korn Shell track 0. The queue in FIFO order
contains requests for the following
tracks :
(A) 2013
(B) 1219
G1 and G2 are two graphs as shown :
(C) 1967
(A) Both G1 and G2 are planar
graphs. (D) 1507
J-87-12 11 Paper-III
Space For Rough Work
Paper-III 12 J-87-12
PAPER-II
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
1. Consider the circuit shown below. In a 5. If the disk head is located initially at
certain steady state, Y is at logical ‘l’. 32, find the number of disk moves
What are possible values of A, B, C ? required with FCFS if the disk queue
of I/O blocks requests are 98, 37, 14,
124, 65, 67.
(A) 239
(B) 310
(C) 321
(D) 325
(A) A = 0, B = 0, C = 1
6. Component level design is concerned
(B) A = 0, B = C = 1 with
(C) A = 1, B = C = 0 (A) Flow oriented analysis
(D) A = B = 1, C = 1 (B) Class based analysis
(C) Both of the above
2. The worst case time complexity of
(D) None of the above
AVL tree is better in comparison to
binary search tree for
(A) Search and Insert Operations 7. The ‘C’ language is
(B) Search and Delete Operations (A) Context free language
(C) Insert and Delete Operations
(B) Context sensitive language
(D) Search, Insert and Delete
Operations (C) Regular language
(D) None of the above
3. The GSM network is divided into the
following three major systems : 8. The Mobile Application Protocol
(A) SS, BSS, OSS (MAP) typically runs on top of which
(B) BSS, BSC, MSC protocol ?
(C) CELL, BSC, OSS
(D) SS, CELL, MSC (A) SNMP (Simple Network
Management Protocol)
4. The power set of the set {} is (B) SMTP (Simple Mail Transfer
(A) {} Protocol)
(B) {, {}} (C) SS7 (Signalling System 7)
(C) {0} (D) HTTP (Hyper Text Transfer
(D) {0, , {}} Protocol)
Paper-II 2 D-87-12
9. If a packet arrive with an M-bit value 14. Given memory partitions of 100 K,
is ‘l’ and a fragmentation offset value 500 K, 200 K, 300 K and 600 K (in
‘0’, then it is ______ fragment. order) and processes of 212 K, 417 K,
(A) First 112 K, and 426 K (in order), using the
(B) Middle first-fit algorithm, in which partition
would the process requiring 426 K be
(C) Last
placed ?
(D) All of the above (A) 500 K
(B) 200 K
10. The number of bit strings of length (C) 300 K
eight that will either start with a 1 bit (D) 600 K
or end with two bits 00 shall be
(A) 32 15. What is the size of the Unicode
(B) 64 character in Windows Operating
(C) 128 System ?
(D) 160 (A) 8-Bits
(B) 16-Bits
(C) 32-Bits
11. In compiler design ‘reducing the
strength’ refers to (D) 64-Bits
(A) reducing the range of values of
input variables. 16. In which tree, for every node the height
of its left subtree and right subtree
(B) code optimization using cheaper
differ almost by one ?
machine instructions.
(A) Binary search tree
(C) reducing efficiency of program. (B) AVL tree
(D) None of the above (C) Threaded Binary Tree
(D) Complete Binary Tree
12. In which addressing mode, the
effective address of the operand is 17. The design issue of Datalink Layer in
generated by adding a constant value to OSI Reference Model is
the contents of register ? (A) Framing
(A) Absolute (B) Representation of bits
(B) Indirect (C) Synchronization of bits
(C) Immediate (D) Connection control
(D) Index
18. Given the following expressions of a
13. Which of the following is true ? grammar
E E * F / F + E / F
(A) A relation in BCNF is always in
3NF. F F – F / id
(B) A relation in 3NF is always in Which of the following is true ?
BCNF. (A) * has higher precedence than +
(C) BCNF and 3NF are same. (B) – has higher precedence than *
(D) A relation in BCNF is not in (C) + and – have same precedence
3NF. (D) + has higher precedence than *
D-87-12 3 Paper-II
19. The maturity levels used to measure a 24. RAD stands for ______.
process are (A) Rapid and Design
(A) Initial, Repeatable, Defined,
Managed, Optimized. (B) Rapid Aided Development
(B) Primary, Secondary, Defined, (C) Rapid Application Development
Managed, Optimized. (D) Rapid Application Design
(C) Initial, Stating, Defined,
Managed, Optimized.
25. Suppose that someone starts with a
(D) None of the above
chain letter. Each person who receives
the letter is asked to send it on to 4
20. The problem of indefinite blockage of other people. Some people do this,
low-priority jobs in general priority while some do not send any letter.
scheduling algorithm can be solved How many people have seen the letter,
using : including the first person, if no one
(A) Parity bit receives more than one letter and if the
chain letter ends after there have been
(B) Aging
100 people who read it but did not send
(C) Compaction it out ? Also find how many people
(D) Timer sent out the letter ?
(A) 122 & 22
21. Which API is used to draw a circle ? (B) 111 & 11
(A) Circle ( )
(C) 133 & 33
(B) Ellipse ( )
(D) 144 & 44
(C) Round Rect ( )
(D) Pie ( )
26. A hash function f defined as f (key) =
22. In DML, RECONNCT command key mod 13, with linear probing is
cannot be used with used to insert keys 55, 58, 68, 91, 27,
145. What will be the location of 79 ?
(A) OPTIONAL Set
(B) FIXED Set (A) 1
(C) MANDATOR Set (B) 2
(D) All of the above (C) 3
(D) 4
23. Coaxial cables are categorized by
Radio Government rating are adapted
for specialized functions. Category 27. Which of the following is true while
RG-59 with impedance 75 used for converting CFG to LL(I) grammar ?
(A) Cable TV (A) Remove left recursion alone
(B) Ethernet (B) Factoring grammar alone
(C) Thin Ethernet (C) Both of the above
(D) Thick Ethernet (D) None of the above
Paper-II 4 D-87-12
28. Identify the Risk factors which are 32. The User Work Area (UWA) is a set
associated with Electronic payment of Program variables declared in the
system. host program to communicate the
contents of individual records between
(A) Fraudulent use of Credit Cards.
(A) DBMS & the Host record
(B) Sending Credit Card details over
(B) Host program and Host record
internet.
(C) Host program and DBMS
(C) Remote storage of Credit Card
(D) Host program and Host language
details.
(D) All of the above
33. Consider the tree given below :
31. Basis path testing falls under 35. Which of the following is the most
(A) system testing powerful parring method ?
(B) white box testing (A) LL(I)
(B) Canonical LR
(C) black box testing
(C) SLR
(D) unit testing (D) LALR
D-87-12 5 Paper-II
36. In UNIX, which of the following 40. Given an empty stack, after performing
command is used to set the task push (1), push (2), Pop, push (3), push
priority ? (4), Pop, Pop, push(5), Pop, what is the
(A) init value of the top of the stack ?
(B) nice (A) 4
(C) kill (B) 3
(D) PS (C) 2
(D) 1
37. AES is a round cipher based on the
Rijndal Algorithm that uses a 128-bit
41. Enumeration is a process of
block of data. AES has three different
configurations. ______ rounds with a (A) Declaring a set of numbers
key size of 128 bits, ______ rounds (B) Sorting a list of strings
with a key size of 192 bits and ______ (C) Assigning a legal values possible
rounds with a key size of 256 bits. for a variable
(A) 5, 7, 15 (D) Sequencing a list of operators
(B) 10, 12, 14
(C) 5, 6, 7 42. Which of the following mode
(D) 20, 12, 14 declaration is used in C++ to open a
file for input ?
38. Match the following IC families with (A) ios : : app
their basic circuits : (B) in : : ios
a. TTL 1. NAND (C) ios : : file
b. ECL 2. NOR
(D) ios : : in
c. CMOS 3. Inverter
Code :
a b c 43. Data Encryption Techniques are
particularly used for ______.
(A) 1 2 3
(B) 3 2 1 (A) protecting data in Data
Communication System.
(C) 2 3 1
(B) reduce Storage Space
(D) 2 1 3
Requirement.
(C) enhances Data Integrity.
39. Match the following with respect to (D) decreases Data Integrity.
C++ data types :
a. User defined type 1. Qualifier 44. Let L be a set accepted by a non-
b. Built in type 2. Union deterministic finite automaton. The
c. Derived type 3. Void number of states in non-deterministic
d. Long double 4. Pointer finite automaton is |Q|. The maximum
number of states in equivalent finite
Code :
automaton that accepts L is
a b c d
(A) |Q|
(A) 2 3 4 1
(B) 2|Q|
(B) 3 1 4 2
(C) 4 1 2 3 (C) 2|Q| – 1
(D) 3 4 1 2 (D) 2|Q|
Paper-II 6 D-87-12
45. What is the result of the following 49. Identify the operation which is
expression ? commutative but not associative ?
(1 & 2) + (3 & 4) (A) OR
(A) 1 (B) NOR
(B) 3 (C) EX-OR
(C) 2 (D) NAND
(D) 0
50. Given a Relation POSITION (Posting-
46. Back propagation is a learning No, Skill), then query to retrieve all
technique that adjusts weights in the distinct pairs of posting-nos. requiring
neural network by propagating weight skill is
changes. (A) Select p.posting-No, p.posting-
(A) Forward from source to sink No
(B) Backward from sink to source from position p
(C) Forward from source to hidden where p.skill = p.skill
nodes and p.posting-No < p.posting-No
(D) Backward from since to hidden
nodes
(B) Select p1.posting-No, p2.posting-
No
47. Match the following : from position p1, position p2
a. TTL 1. High fan out
where p1.skill = p2.skill
b. ECL 2. Low propagation delay
c. CMOS 3. High power dissipation
(C) Select p1.posting-No, p2.posting-
Code :
No
a b c
from position p1, position p2
(A) 3 2 1
(B) 1 2 3 where p1.skill = p2.skill
(C) 1 3 2 and p1.posting-No < p2.posting-
(D) 3 1 2 No
Paper-II 8 D-87-12
PAPER-III
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
Paper-III 2 D-87-12
8. Using RSA algorithm, what is the 11. The time complexities of some
value of cipher text C, if the plain text standard graph algorithms are given.
M = 5 and p = 3, q = 11 & d = 7 ? Match each algorithm with its time
(A) 33 complexity ? (n and m are no. of nodes
(B) 5 and edges respectively)
(C) 25 a. Bellman Ford 1. O (m log n)
(D) 26 algorithm
b. Kruskals algorithm 2. O (n3)
9. You are given an OR problem and a c. Floyd Warshall 3. O(mn)
XOR problem to solve. Then, which algorithm
one of the following statements is
true ? d. Topological sorting 4. O(n + m)
(A) Both OR and XOR problems Codes :
can be solved using single layer a b c d
perception. (A) 3 1 2 4
(B) OR problem can be solved using
(B) 2 4 3 1
single layer perception and XOR
problem can be solved using self (C) 3 4 1 2
organizing maps. (D) 2 1 3 4
(C) OR problem can be solved using
radial basis function and XOR
problem can be solved using 12. Let V1 = 2I – J + K and V2 = I + J – K,
single layer perception. then the angle between V1 & V2 and a
(D) OR problem can be solved using vector perpendicular to both V1 & V2
single layer perception and XOR shall be :
problem can be solved using
radial basis function. (A) 90 and (–2I + J – 3K)
(B) 60 and (2I + J + 3K)
10. Match the following : (C) 90 and (2I + J – 3K)
List – I List – II (D) 90 and (–2I – J + 3K)
a. Application 1. TCP
layer
b. Transport 2. HDLC 13. Consider a fuzzy set A defined on the
layer interval X = [0, 10] of integers by the
membership Junction
c. Network 3. HTTP
layer x
A(x) = x + 2
d. Data link 4. BGP
layer Then the cut corresponding to
Codes : = 0.5 will be
a b c d (A) {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
(A) 2 1 4 3
(B) {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
(B) 3 4 1 2
(C) {2, 3, 4, 5, 6, 7, 8, 9, 10}
(C) 3 1 4 2
(D) 2 4 1 3 (D) { }
D-87-12 3 Paper-III
14. Let T(n) be the function defined by 19. Identify the following activation
T(n) = 1 and T(n) = 2T (n/2) + n, function :
which of the following is TRUE ? 1
(V) = Z + 1 + exp (– x V + Y) ,
(A) T(n) = O( n) *
(B) T(n) = O(log2n) Z, X, Y are parameters
(C) T(n) = O(n) (A) Step function
(D) T(n) = O(n2) (B) Ramp function
(C) Sigmoid function
15. In classful addressing, an IP address (D) Gaussian function
123.23.156.4 belongs to ______ class
format. 20. The no. of ways to distribute n
(A) A distinguishable objects into k
(B) B distinguishable boxes, so that ni objects
(C) C are placed into box i, i = 1, 2, …. k
(D) D equals which of the following ?
n!
16. The Mandelbrot set used for the (A) n ! + n ! + ..... + n !
1 2 k
construction of beautiful images is
n1! + n2! + ..... + nk!
based on the following transformation : (B) n1! n2! n3! ..... nk!
xn + 1= x2n + z
Here, n!
(C) n1! n2! n3! ..... nk!
(A) Both x & z are real numbers.
(B) Both x & z are complex numbers. n1! n2! ..... nk!
(D) n1! – n2! – n3! ..... – nk!
(C) x is real & z is complex.
(D) x is complex & z is real.
21. How many solutions do the following
17. Which of the following permutations equation have
can be obtained in the output using a
x1 + x2 + x3 = 11
stack of size 3 elements assuming that
input, sequence is 1, 2, 3, 4, 5 ? where x1 1, x2 2, x3 3
(A) 3, 2, 1, 5, 4 (A) C(7, 11)
(B) 5, 4, 3, 2, 1 (B) C(11, 3)
(C) 3, 4, 5, 2, 1 (C) C(14, 11)
(D) 3, 4, 5, 1, 2 (D) C(7, 5)
26. Which are the classifications of data (B) x11 = 20, x12 = 20, x13 = 10,
used in Mobile Applications ?
x22 = 20, x23 = 20, x24 = 10,
(A) Private data, User data, Shared
data. Total cost = 180
(B) Public data, User data, Virtual
(C) x11 = 20, x13 = 10, x22 = 20,
data.
x23 = 20, x24 = 10, x32 = 10,
(C) Private data, Public data, Shared
data. Total cost = 180
(D) Public data, Virtual data, User
data. (D) None of the above
D-87-12 5 Paper-III
29. 58 lamps are to be connected to a single 33. The Z-buffer algorithm is used for
electric outlet by using an extension Hidden surface removal of objects. The
board each of which has four outlets. maximum number of objects that can
The number of extension boards needed be handled by this algorithm shall
to connect all the light is (A) Depend on the application
(A) 29 (B) be arbitrary no. of objects
(B) 28 (C) Depend on the memory
(C) 20 availability
(D) 19 (D) Depend on the processor
30. Match the following with respect to the 34. The power set of AUB, where
Mobile Computing Architecture. A = {2, 3, 5, 7} and B = {2, 5, 8, 9} is
a. Downlink 1. 100 Mbps (A) 256
control (B) 64
b. Radio 2. Residency (C) 16
communication latency (RL) (D) 4
data rate
c. The average 3. Sending data
duration of user’s from a BS to 35. In Win32, which function is used to
stay in cell MD create Windows Applications ?
d. FDDI 4. 2-Mbps (A) Win APP
bandwidth (B) Win API
Codes : (C) Win Main
a b c d (D) Win Void
(A) 2 1 4 3
(B) 3 4 2 1 36. Suppose a processor does not have any
stack pointer registers, which of the
(C) 4 1 2 1
following statements is true ?
(D) 4 3 1 2
(A) It cannot have subroutine call
instruction.
31. Which of the following flags are set (B) It cannot have nested subroutine
when ‘JMP’ instruction is executed ? calls.
(A) SF and CF (C) Interrupts are not possible.
(B) AF and CF (D) All subroutine calls and
(C) All flags interrupts are possible.
(D) No flag is set
37. Everything below the system call
32. A thread is a light weight process. In interface and above the physical
the above statement, weight refers to hardware is known as ______.
(A) time (A) Kernel
(B) number of resources (B) Bus
(C) speed (C) Shell
(D) All the above (D) Stub
Paper-III 6 D-87-12
38. Which is not the correct statement ? 42. The grammar ‘G1’
(A) The class of regular sets is closed S OSO| ISI | 0|1| and the grammar
under homomorphisms. ‘G2’ is
S as |asb| X, X Xa | a.
(B) The class of regular sets is not
Which is the correct statement ?
closed under inverse
homomorphisms. (A) G1 is ambiguous, G2 is
unambiguous
(C) The class of regular sets is closed (B) G1 is unambiguous, G2 is
under quotient. ambiguous
(D) The class of regular sets is closed (C) Both G1 and G2 are ambiguous
under substitution. (D) Both G1 and G2 are
unambiguous
39. When a programming Language has 43. Consider n processes sharing the CPU
the capacity to produce new datatype, in round robin fashion. Assuming that
it is called as, each process switch takes s seconds.
(A) Overloaded Language What must be the quantum size q such
that the overhead resulting from
(B) Extensible Language
process switching is minimized but, at
(C) Encapsulated Language the same time each process is
guaranteed to get its turn at the CPU at
(D) Abstraction Language
least every t seconds ?
t – ns
(A) q n – 1
40. Which of the following operating
system is better for implementing t – ns
(B) q n – 1
client-server network ?
t – ns
(A) Windows 95 (C) q n + 1
(B) Windows 98 t – ns
(D) q n + 1
(C) Windows 2000
(D) All of these
44. The Default Parameter Passing
Mechanism is called as
41. Consider a system having m resources (A) Call by Value
of the same type. These resources are (B) Call by Reference
shared by 3 processes A, B and C (C) Call by Address
which have peak demands of 3, 4 and 6 (D) Call by Name
respectively. For what value of m
deadlock will not occur ?
45. Which of the following regular
(A) 7 expression identities are true ?
(B) 9 (A) (r + s)* = r* s*
(B) (r + s)* = r* + s*
(C) 10
(C) (r + s)* = (r*s*)*
(D) 13 (D) r* s* = r* + s*
D-87-12 7 Paper-III
46. Two graphs A and B are shown below : 50. Which of the following definitions
Which one of the following statement generates the same Language as L,
is true ? where L = {WWR | W {a, b}*}
(A) S asb|bsa|
(B) S asa|bsb|
(C) S asb|bsa|asa|bsb|
(D) S asb|bsa|asa|bsb
64. If the Fourier transform of the function 67. An expert system shell is an expert
f(x, y) is F(m, n), then the Fourier system without
transform of the function f(2x, 2y) is : (A) domain knowledge
1 m n (B) explanation facility
(A) 4 F 2 , 2
(C) reasoning with knowledge
1 (D) all of the above
(B) 4 F (2m, 2n)
1 68. An example of a dictionary-based
(C) 4 F (m, n) coding technique is
1 m n (A) Run-length coding
(D) 4 F 4 , 4
(B) Huffman coding
(C) Predictive coding
65. ______ establishes information about (D) LZW coding
when, why and by whom changes are
made in a software.
69. Which is the method used to retrieve
(A) Software Configuration the current state of a check box ?
Management.
(A) get State ( )
(B) Change Control.
(B) put State ( )
(C) Version Control. (C) retrieve State ( )
(D) An Audit Trail. (D) write State ( )
Paper-III 10 D-87-12
70. Referential integrity is directly related 73. Match the following :
to a. Supervised 1. The decision
learning system receives
(A) Relation key
rewards for its
(B) Foreign key action at the end
of a sequence of
(C) Primary key steps.
(D) Candidate key b. Unsupervised 2. Manual labels of
learning inputs are not
used.
c. Re- 3. Manual labels of
71. You are given four images represented inforcement inputs are used.
as learning
0 0 0 1 d. Inductive 4. System learns by
I1 = , I2 = ,
0 0 0 0 learning example
Codes :
0 1 1 1
I3 = , I4 = a b c d
1 0 1 0
(A) 1 2 3 4
The value of entropy is maximum for (B) 2 3 1 4
image
(C) 3 2 4 1
(A) I1 (D) 3 2 1 4
(B) I2
74. A* algorithm is guaranteed to find an
(C) I3 optimal solution if
(A) h' is always 0.
(D) I4 (B) g is always 1.
(C) h' never overestimates h.
(D) h' never underestimates h.
72. A cryptarithmetic problem of the type
SEND 75. Let (x, y, z) be the statement “x + y = z”
and let there be two quantifications
+ MORE
given as
MONEY (i) x y Z (x, y, z)
Can be solved efficiently using (ii) Z x y (x, y, z)
Where x, y, z are real numbers. Then
(A) depth first technique which one of the following is correct ?
(B) breadth first technique (A) (i) is true and (ii) is true.
(B) (i) is true and (ii) is false.
(C) constraint satisfaction technique (C) (i) is false and (ii) is true.
(D) bidirectional technique (D) (i) is false and (ii) is false.
D-87-12 11 Paper-III
Space For Rough Work
Paper-III 12 D-87-12
PAPER-II
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
9. How many times the word ‘print’ 14. If D1,D2, .. ..Dn are domains in a
shall be printed by the following
relational model, then the relation is
program segment ?
a table, which is a subset of
for (i=1, i<2,i++)
(A) D1+D2+ … +Dn
for (j=1,j<2,j++)
for(k=1,k<2,k++) (B) D1×D2× … ×Dn
printf("print/n") (C) D1∪D2∪ … ∪Dn
(A) 1 (D) D1–D2– … –Dn
(B) 3
(C) 6
15. Which of the following addresses is
(D) 8
used to deliver a message to the
correct application program running
10. Which of the following is not a type on a host ?
of Database Management System ? (A) Port
(A) Hierarchical
(B) IP
(B) Network
(C) Logical
(C) Relational
(D) Physical
(D) Sequential
28. The time complexity to build a heap 32. The task of correcting and pre
with a list of n numbers is processing data is called as
(A) O(log n) (A) Data streaming
(B) O(n) (B) Data cleaning
(C) O(n logn)
(C) Data mining
(D) O(n2)
(D) Data storming
J-87-13 5 Paper-II
33. Using data p=3, q=11, n=pq, d=7 in 38. How many edges must be removed to
RSA algorithm find the cipher text of produce the spanning forest of a
the given plain text SUZANNE graph with N vertices, M edges and
(A) BUTAEEZ C connected components ?
(B) SUZANNE (A) M+N–C
(C) XYZABCD (B) M–N–C
(D) ABCDXYZ
(C) M–N+C
34. The relation “divides” on a set of (D) M+N+C
positive integers is ________.
(A) Symmetric and transitive
39. Which of the following shall be a
(B) Anti symmetric and transitive
compound proposition involving the
(C) Symmetric only propositions p, q and r, that is true
(D) Transitive only when exactly two of the p, q and r are
true and is false otherwise ?
35. Give as good a big–O estimate as
possible for the following functions : (A) (p ∨ q ∧ ⎤ r) ∨ ( p ∧ q ∧ r) ∧ (⎤ p ∧ q ∨ r)
(nlogn+n2)(n3+2) and (n!+2n) (B) (p ∧ q ∨ r) ∧ ( p ∧ q ∧ r) ∨ (⎤ q ∧ ⎤ p∧ ⎤ r)
(n3+log(n2+1)) (C) (p ∧ q ∧⎤ r) ∨ ( p ∧ ⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
(A) O(n5+2n2) & O(n3*n!)
(D) (p ∨ r ∧ q) ∨ ( p ∧ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
(B) O(n5) & O(n3*2n)
(C) O(n5) & O(n3* n!)
(D) O(n5+2n2) & O(n3*2n) 40. The truth value of the statements :
∃!xP(x) → ∃xP(x) and ∃!x⎤ P(x) →
36. A test contains 100 true/false ⎤∀xP(x), (where the notation ∃!xP(x)
questions. How many different ways denotes the proposition “There exists
can a student answer the questions on a unique x such that P(x) is true”) are :
the test, if the answer may be left
blank also. (A) True and False
(A) 100P2 (B) False and True
(B) 100
C2 (C) False and False
J-87-13 7 Paper-II
Space For Rough Work
Paper-II 8 J-87-13
PAPER-III
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
16. In a fully connected mesh network 20. The ________ measures the relative
with n devices, there are ________ strengths of two signals or a signal at
physical channels to link all devices. two different points.
(A) n(n–1)/2 (B) n(n+1)/2 (A) frequency
(C) 2n (D) 2n+1 (B) attenuation
(C) throughput
17. The baud rate of a signal is 600 (D) decibel
baud/second. If each signal unit
carries 6 bits, then the bit rate of a 21. Which one of the following media is
signal is ________. multidrop ?
(A) 3600 (A) Shielded Twisted pair cable
(B) 100 (B) Unshielded Twisted pair cable
(C) 6/600 (C) Thick Coaxial cable
(D) None of the above (D) Fiber Optic cable
Paper-III 4 J-87-13
22. What is the baud rate of the standard 27. Bresenham line drawing algorithm is
10 Mbps Ethernet ? attractive because it uses
(A) 10 megabaud (B) 20 megabaud (A) Real arithmetic only
(C) 30 megabaud (D) 40 megabaud (B) Integer arithmetic only
(C) Floating point arithmetic
23. At any iteration of simplex method, (D) Real and integer arithmetic
if Δj (Zj – Cj) corresponding to any
non-basic variable Xj is obtained as
zero, the solution under the test is 28. The refresh rate above which a
picture stops flickering and fuses into
(A) Degenerate solution
a steady image is called _________.
(B) Unbounded solution
(A) Crucial fusion frequency
(C) Alternative solution
(B) Current frequency fusion
(D) Optimal solution
(C) Critical fusion frequency
(D) Critically diffused frequency
24. A basic feasible solution to a
m-origin, n-destination transportation
problem is said to be _________ if 29. In homogenous coordinate system
the number of positive allocations are (x, y, z) the points with z = 0 are
less than m + n – 1. called
(A) degenerate (A) Cartesian points
(B) non-degenerate (B) Parallel points
(C) unbounded (C) Origin point
(D) unbalanced (D) Point at infinity
40. The statements s1 and s2 are given as : 44. Interrupt which arises from illegal or
erroneous use of an instruction or
s1 : Context sensitive languages are
data is
closed under intersection,
concatenation, substitution and (A) Software interrupt
inverse homomorphism. (B) Internal interrupt
s2 : Context free languages are (C) External interrupt
closed under complementation, (D) All of the above
substitution and homomorphism.
Which of the following is correct
statement ? 45. The simplified function in product of
sums of Boolean function F(W, X, Y, Z)
(A) Both s1 and s2 are correct.
= Σ(0, 1, 2, 5, 8, 9, 10) is
(B) s1 is correct and s2 is not
(A) (W' + X') (Y' + Z') (X' + Z)
correct.
(C) s1 is not correct and s2 is (B) (W' + X') (Y' + Z') (X' + Z')
correct. (C) (W' + X') (Y' + Z) (X' + Z)
(D) Both s1 and s2 are not correct. (D) (W' + X') (Y + Z') (X' + Z)
J-87-13 7 Paper-III
46. Match the following : 49. Suppose you want to delete the name
a. TTL i. High component that occurs before “Vivek” in an
density alphabetical listing. Which of the
b. ECL ii. Low power following data structures shall be
consumption most efficient for this operation ?
c. MOS iii. Evolution of “diode- (A) Circular linked list
transistor-logic”
(B) Doubly linked list
d. CMOS iv. High speed digital
circuits (C) Linked list
Codes : (D) Dequeue
a b c d
(A) iii ii i iv 50. What will be the output of the
(B) i iv iii ii following segment of the program ?
(C) iii iv i ii main( )
(D) i ii iii iv
{
char *s = “hello world”;
47. Match the following :
a. Foreign keys i. Domain int i = 7;
constraint printf(“%, *s”, i, s);
b. Private key ii. Referential }
integrity
(A) Syntax error
c. Event control iii. Encryption
action model (B) hello w
d. Data security iv. Trigger (C) hello
Codes : (D) o world
a b c d
(A) iii ii i iv
51. Trace the error :
(B) ii i iv iii
(C) iii iv i ii void main( )
(D) i ii iii iv {
int *b, &a;
48. When an array is passed as a *b = 20
parameter to a function which of the
printf(“%d, %d”, a, *b)
following statements is correct ?
(A) The function can change values }
in the original array. (A) No error
(B) The function cannot change (B) Logical error
values in the original array.
(C) Syntax error
(C) Results in compilation error.
(D) Results in runtime error. (D) Semantic error
Paper-III 8 J-87-13
52. Match the following : 58. Consider the following processes
a. calloc( ) i. Frees previously with time slice of 4 milliseconds (I/O
allocated space requests are ignored) :
b. free( ) ii. Modifies Process A B C D
previously Arrival time 0 1 2 3
allocated space CPU cycle 8 4 9 5
c. malloc( ) iii. Allocates space The average turn around time of
for array these processes will be
d. realloc( ) iv. Allocates (A) 19.25 milliseconds
requested size of (B) 18.25 milliseconds
space (C) 19.5 milliseconds
Codes : (D) 18.5 milliseconds
a b c d
(A) iii i iv ii 59. A job has four pages A, B, C, D and
(B) iii ii i iv the main memory has two page
(C) iii iv i ii frames only. The job needs to
(D) iv ii iii i process its pages in following order :
53. Binary symmetric channel uses ABACABDBACD
(A) Half duplex protocol Assuming that a page interrupt
(B) Full duplex protocol occurs when a new page is brought in
(C) Bit oriented protocol the main memory, irrespective of
(D) None of the above whether the page is swapped out or
not. The number of page interrupts in
54. Hamming distance between FIFO and LRU page replacement
100101000110 and 110111101101 is algorithms are
(A) 3 (B) 4 (A) 9 and 7 (B) 7 and 6
(C) 5 (D) 6
(C) 9 and 8 (D) 8 and 6
55. Given code word 1110001010 is to
be transmitted with even parity check 60. Suppose S and Q are two semaphores
bit. The encoded word to be initialized to 1. P1 and P2 are two
transmitted for this code is processes which are sharing resources.
(A) 11100010101 (B) 11100010100 P1 has statements P2 has statements
(C) 1110001010 (D) 111000101 wait(S) ; wait(Q) ;
wait(Q) ; wait(S) ;
56. The number of distinct binary images
which can be generated from a given critical- critical-
binary image of right M × N are section 1; section 2;
(A) M + N (B) M × N signal(S) ; signal(Q) ;
(C) 2 M + N (D) 2MN signal(Q) ; signal(S) ;
Their execution may sometimes lead
57. If f(x, y) is a digital image, then x, y to an undesirable situation called
and amplitude values of f are (A) Starvation
(A) Finite
(B) Race condition
(B) Infinite
(C) Neither finite nor infinite (C) Multithreading
(D) None of the above (D) Deadlock
J-87-13 9 Paper-III
61. An operating system using banker’s 64. A UNIX file system has 1 KB block
algorithm for deadlock avoidance has size and 4-byte disk addresses. What
ten dedicated devices (of same type) is the maximum file size if the inode
and has three processes P1, P2 and contains ten direct block entries, one
P3 with maximum resource single indirect block entry, one
requirements of 4, 5 and 8 double indirect block entry and one
respectively. There are two states of triple indirect block entry ?
allocation of devices as follows : (A) 30 GB (B) 64 GB
State 1 Processes P1 P2 P3 (C) 16 GB (D) 1 GB
Devices
allocated 2 3 4 65. A thread is usually defined as a light
State 2 Processes P1 P2 P3 weight process because an Operating
System (OS) maintains smaller data
Devices
structure for a thread than for a
allocated 0 2 4
process. In relation to this, which of
Which of the following is correct ? the following statement is correct ?
(A) State 1 is unsafe and state 2 is (A) OS maintains only scheduling
safe. and accounting information for
(B) State 1 is safe and state 2 is each thread.
unsafe. (B) OS maintains only CPU
(C) Both, state 1 and state 2 are registers for each thread.
safe. (C) OS does not maintain a
(D) Both, state 1 and state 2 are separate stack for each thread.
unsafe. (D) OS does not maintain virtual
memory state for each thread.
62. Let the time taken to switch between 66. The versions of windows operating
user mode and kernel mode of system like windows XP and window
execution be T1 while time taken to Vista uses following file system :
switch between two user processes (A) FAT-16
be T2. Which of the following is (B) FAT-32
correct ?
(C) NTFS (NT File System)
(A) T1 < T2 (D) All of the above
(B) T1 > T2
(C) T1 = T2 67. Which one of the following is a
(D) Nothing can be said about the correct implementation of the meta-
relation between T1 and T2. predicate “not” in PROLOG (Here G
represents a goal) ?
(A) not(G):– !, call(G), fail.
63. Working set model is used in not(G).
memory management to implement (B) not(G):– call(G), !, fail.
the concept of not(G).
(A) Swapping (C) not(G):– call(G), fail, !.
(B) Principal of Locality not(G).
(C) Segmentation (D) not(G):– call(G), fail.
(D) Thrashing not(G):– !.
Paper-III 10 J-87-13
68. Which one of the following is not an 73. A fuzzy set A on R is ________ iff
informed search technique ? A(λx1 + (1 – λ)x2) ≥ min [A(x1),
(A) Hill climbing search A(x2)]
(B) Best first search
(C) A* search for all x1, x2 ∈ R and all λ ∈ [0, 1],
(D) Depth first search where min denotes the minimum
operator.
69. If we convert (A) Support (B) α-cut
∃u ∀v ∀x ∃y (P(f(u),v, x, y) → (C) Convex (D) Concave
Q(u,v,y)) to
∀v ∀x (P(f(a),v, x, g(v,x)) → 74. If A and B are two fuzzy sets with
Q(a,v,g(v,x))) membership functions
This process is known as μA(x) = {0.6, 0.5, 0.1, 0.7, 0.8}
(A) Simplification
(B) Unification μB(x) = {0.9, 0.2, 0.6, 0.8, 0.5}
(C) Skolemization Then the value of μA–––––
∪ B(x) will be
(D) Resolution
(A) {0.9, 0.5, 0.6, 0.8, 0.8}
(B) {0.6, 0.2, 0.1, 0.7, 0.5}
70. Given two jugs of capacities 5 litres
and 3 litres with no measuring (C) {0.1, 0.5, 0.4, 0.2, 0.2}
markers on them. Assume that there (D) {0.1, 0.5, 0.4, 0.2, 0.3}
is endless supply of water. Then the
minimum number of states to
measure 4 litres water will be 75. Consider a single perception with
weights as given in the following
(A) 3 (B) 4
figure :
(C) 5 (D) 7
J-87-13 11 Paper-III
Space For Rough Work
Paper-III 12 J-87-13
PAPER-II
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
30. Which of the following derivations 34. Let P(m, n) be the statement
does a top-down parser use while “m divides n” where the universe of
parsing an input string ? The input is discourse for both the variables is the
scanned from left to right. set of positive integers. Determine
(A) Leftmost derivation the truth values of each of the
(B) Leftmost derivation traced out following propositions :
in reverse I. ∀m ∀n P(m, n),
(C) Rightmost derivation traced out II. ∃m ∀n P(m, n)
in reverse
(A) Both I and II are true
(D) Rightmost derivation
(B) Both I and II are false
(C) I – false & II – true
31. The dual of a Boolean expression is
obtained by interchanging (D) I – true & II – false
(A) Boolean sums and Boolean
products 35. Big – O estimate for
(B) Boolean sums and Boolean f(x) = (x + 1) log(x2 + 1) + 3x2 is
products or interchanging 0’s given as
and 1’s (A) O(x log x)
(C) Boolean sums and Boolean
(B) O(x2)
products and interchanging 0’s
& 1’s (C) O(x3)
(D) Interchanging 0’s and 1’s (D) O(x2 log x)
32. Given that (292)10 = (1204)x in some 36. How many edges are there in a forest
of t-trees containing a total of n
number system x. The base x of that
vertices ?
number system is
(A) 2 (A) n + t
(B) 8 (B) n–t
(C) 10 (C) n∗t
(D) None of the above (D) nt
D-87-13 5 Paper-II
37. Let f and g be the functions from the 41. Active X controls are Pentium binary
set of integers to the set integers programs that can be embedded in
defined by ________
f(x) = 2x + 3 and g(x) = 3x + 2 (A) Word pages
Then the composition of f and g and (B) URL pages
g and f is given as (C) Script pages
(A) 6x + 7, 6x + 11 (D) Web pages
(B) 6x + 11, 6x + 7
(C) 5x + 5, 5x + 5 42. Match the following :
(D) None of the above
List – I List – II
a. Wireless i. HTTP
38. If n and r are non-negative integers
Application
and n ≥ r, then p(n + 1, r) equals to Environment
p(n, r) (n + 1)
(A) b. Wireless ii. IP
(n + 1 – r)
Transaction
p(n, r) (n + 1) Protocol
(B) (n – 1 + r)
c. Wireless iii. Scripts
p(n, r) (n – 1) Datagram
(C) (n + 1 – r) Protocol
p(n, r) (n + 1) d. Wireless iv. UDP
(D) (n + 1 + r) Codes :
a b c d
39. A graph is non-planar if and only if it
(A) ii iv i iii
contains a subgraph homomorphic to
(B) iv iii ii i
(A) K3, 2 or K5 (B) K3, 3 and K6
(C) iv iii i ii
(C) K3, 3 or K5 (D) K2, 3 and K5
(D) iii i iv ii
40. Which of the following statements 43. Which of the following is widely
are true ? used inside the telephone system for
I. A circuit that adds two bits, long-haul data traffic ?
producing a sum bit and a carry (A) ISDN
bit is called half adder. (B) ATM
II. A circuit that adds two bits, (C) Frame Relay
producing a sum bit and a carry
(D) ISTN
bit is called full adder.
III. A circuit that adds two bits and
a carry bit producing a sum bit 44. The document standards for EDI
and a carry bit is called full were first developed by large
adder. business house during the 1970s and
IV. A device that accepts the value are now under the control of the
of a Boolean variable as input following standard organisation :
and produces its complement is (A) ISO
called an inverter. (B) ANSI
(A) I & II (B) II & III (C) ITU-T
(C) I, II, III (D) I, III & IV (D) IEEE
Paper-II 6 D-87-13
45. Electronic Data Interchange Software 47. The virtual address generated by a
consists of the following four layers : CPU is 32 bits. The Translation
(A) Business application, Internal Look-aside Buffer (TLB) can hold
format conversion, Network total 64 page table entries and a
translator, EDI envelope 4-way set associative (i.e. with 4-
(B) Business application, Internal cache lines in the set). The page size
format conversion, EDI is 4 KB. The minimum size of TLB
translator, EDI envelope tag is
(C) Application layer, Transport (A) 12 bits
layer, EDI translator, EDI (B) 15 bits
envelope (C) 16 bits
(D) Application layer, Transport
(D) 20 bits
layer, IP layer, EDI envelope
48. Consider a disk queue with request
46. Consider a preemptive priority based
for input/output to block on cylinders
scheduling algorithm based on
dynamically changing priority. 98, 183, 37, 122, 14, 124, 65, 67
Larger priority number implies in that order. Assume that disk head
higher priority. When the process is is initially positioned at cylinder 53
waiting for CPU in the ready queue and moving towards cylinder number
(but not yet started execution), its 0. The total number of head
priority changes at a rate a = 2. When movements using Shortest Seek Time
it starts running, its priority changes First (SSTF) and SCAN algorithms
at a rate b = 1. All the processes are are respectively
assigned priority value 0 when they (A) 236 and 252 cylinders
enter ready queue. Assume that the
(B) 640 and 236 cylinders
following processes want to execute :
Process Arrival Service (C) 235 and 640 cylinders
ID Time Time (D) 235 and 252 cylinders
P1 0 4
P2 1 1 49. How much space will be required to
store the bit map of a 1.3 GB disk
P3 2 2
with 512 bytes block size ?
P4 3 1
(A) 332.8 KB
The time quantum q = 1. When two
processes want to join ready queue (B) 83.6 KB
simultaneously, the process which (C) 266.2 KB
has not executed recently is given (D) 256.6 KB
priority. The finish time of processes
P1, P2, P3 and P4 will respectively
50. Linux operating system uses
be
(A) 4, 5, 7 and 8 (A) Affinity Scheduling
(B) 8, 2, 7 and 5 (B) Fair Preemptive Scheduling
(C) 2, 5, 7 and 8 (C) Hand Shaking
(D) 8, 2, 5 and 7 (D) Highest Penalty Ratio Next
D-87-13 7 Paper-II
Space For Rough Work
Paper-II 8 D-87-13
PAPER-II
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
15. Consider the following two 18. The number of eight-bit strings
languages : beginning with either 111 or 101 is
______.
L1 = {an bl ak | n + l +k>5 }
(A) 64
L2 = {an bl ak |n>5, l >3, k≤ l }
(B) 128
Which of the following is true ? (C) 265
(A) L1 is regular language and L2 is
(D) None of the above
not regular language.
(B) Both L1 and L2 are regular
19. Find the number of ways to paint 12
languages. offices so that 3 of them will be
(C) Both L1 and L2 are not regular green, 2 of them pink, 2 of them
languages. yellow and the rest ones white.
(D) L1 is not regular language and (A) 55,440 (B) 1,66,320
L2 is regular language. (C) 4.790E+08 (D) 39,91,680
S-87-13 3 Paper-II
20. Consider the following statements : 24. The quantification ∃!x P(x) denotes
(i) A graph in which there is a the proposition “There exists a
unique path between every pair unique x such that P(x) is true”,
of vertices is a tree. express the quantification using
(ii) A connected graph with e = v – 1 universal and existential
is a tree. quantifications and logical operators :
(A) ∃x P(x) ∨ ∀x∀y ((P(x) ∨ P(y))
(iii) A graph with e = v – 1 that has
no circuit is a tree. → x = y)
(B) ∀ x P(x) ∧ ∀x∀y ((P(x) ∨ P(y))
Which of the above statements is/are
→ x = y)
true ?
(C) ∃x P(x) ∧ ∀x∀y ((P(x) ∧ P(y))
(A) (i) & (iii)
→ x = y)
(B) (ii) & (iii) (D) ∃x P(x) ∧ ∃x∃y ((P(x) ∨ P(y))
(C) (i) & (ii) → x = y)
(D) All of the above
25. If F and G are Boolean functions of
21. Consider the In-order and Post-order degree n. Then, which of the
traversals of a tree as given below : following is true ?
(A) F ≤ F + G and F G ≤ F
In-order : j e n k o p b f a c l g m d h i
(B) G ≤ F + G and F G ≥ G
Post-order : j n o p k e f b c l m g h i d a (C) F ≥ F + G and F G ≤ F
The Pre-order traversal of the tree (D) G ≥ F + G and F G ≤ F
shall be
(A) a b f e j k n o p c d g l m h i 26. Match the following identities/laws
(B) a b c d e f j k n o p g l m h i to their corresponding name :
(C) a b e j k n o p f c d g l m h i (a) x + x = x i. Dominance
x•x=x
(D) j e n o p k f b c l m g h i d a
(b) x + 0 = x ii. Absorption
x•1=x
22. A simple graph G with n-vertices is (c) x + 1 = 1 iii. Idempotent
connected if the graph has x•0=0
(A) (n – 1) (n – 2)/2 edges (d) x • (x + y) = x iv. Identity
(B) more than (n – 1) (n – 2)/2 Codes :
edges (a) (b) (c) (d)
(A) iii iv i ii
(C) less than (n – 1) (n – 2)/2 edges
(B) iv iii i ii
(D) ∑ki=1 C(ni, 2) edges (C) iv iii ii i
(D) iii iv ii i
23. Which one of the following set of
27. In which one of the following,
gates is best suited for ‘parity’
continuous process improvement is
checking and ‘parity’ generation ?
done ?
(A) AND, OR, NOT (A) ISO9001
(B) NAND, NOR (B) RMMM
(C) EX-OR, EX-NOR (C) CMM
(D) None of the above (D) None of the above
Paper-II 4 S-87-13
28. The ______ of a program or 33. What is the size of the following
computing system is the structure or Union ? Assume that the size of
structures of the system, which int = 2, size of float = 4, size of
comprise software components, the char = 1
externally visible properties of these union tag {
components, and the relationship int a;
among them. float b;
(A) E-R diagram char c;
(B) Data flow diagram
};
(C) Software architecture
(D) Software design (A) 2 (B) 4
(C) 1 (D) 7
29. Working software is not available
until late in the process in 34. What is the output of the following
(A) Waterfall model program segment ?
(B) Prototyping model sum(n)
(C) Incremental model {
(D) Evolutionary Development if ( n < 1 ) return n;
model else return (n + sum(n–1));
}
30. Equivalence partitioning is a ______ main()
testing method that divides the input
{
domain of a program into classes of
data from which test cases can be printf(“%d”, sum(5));
derived. }
(A) White box (B) Black box (A) 10 (B) 16
(C) Regression (D) Smoke (C) 15 (D) 14
31. Consider the following characteristics : 35. Assume that x and y are non-zero
(i) Correct and unambiguous positive integers. What does the
(ii) Complete and consistent following program segment perform ?
(iii) Ranked for importance and/or while (x!=0)
stability and verifiable {
(iv) Modifiable and Traceable if (x>y)
Which of the following is true for a
x = x-y
good SRS ?
else
(A) (i), (ii) and (iii)
(B) (i), (iii) and (iv) y=y-x;
(C) (ii), (iii) and (iv) printf(“%d”,x);
(D) (i), (ii), (iii) and (iv) (A) Computes LCM of two
numbers
32. Linked Lists are not suitable for (B) Computes GCD of two
_____. numbers
(A) Binary Search (C) Divides large number with
(B) Polynomial Manipulation small number
(C) Insertion (D) Subtracts smaller number from
(D) Radix Sort large number
S-87-13 5 Paper-II
36. Consider the following program 42. A method to provide secure
segment : transmission of email is called ____.
d=0; (A) TLS (B) SA
for(i=1; i<31, ++i) (C) IPSec (D) PGP
for(j=1; j<31, ++j)
for(k=1; k<31, ++k) 43. Thoma’s-write rule is ______.
if ((i+j+k)%3)= = 0); (A) Two phase locking protocol
d = d + 1;
(B) Timestamp ordering protocol
printf(“%d”, d);
(C) One phase locking protocol
The output will be
(A) 9000 (B) 3000 (D) Sliding window protocol
(C) 90 (D) 2700
44. Match the following :
37. Usage of Preemption and Transaction List – I List - II
Rollback prevents ______. Process state Reason for
(A) Unauthorised usage of data file transition transition
(B) Deadlock situation a Ready→ i. Request made
(C) Data manipulation Running by the process
(D) File preemption is satisfied or
an event for
38. The _____ language was originally which it was
designed as the Transformation waiting occurs.
Language for Style Sheet facility. b Blocked→ ii. Process wishes
(A) XSTL (B) XML Ready to wait for
(C) XQuery (D) XPath some action by
another
39. Views are useful for _____ unwanted process.
information, and for collecting c Running→ iii. The process is
together information from more than Blocked dispatched.
one relation into a single view. d Running→ iv. The process is
(A) Hiding Ready preempted.
(B) Deleting Codes :
(C) Highlighting a b c d
(D) All of the above
(A) iii i ii iv
40. The decision tree classifier is a (B) iv i iii ii
widely used technique for ______. (C) iv iii i ii
(A) Classification (B) Association (D) iii iii ii i
(C) Partition (D) Clustering
45. The hit ratio of a Translation Look
41. Cross_tab displays permit users to Aside Buffer (TLAB) is 80%. It
view ______ of multidimensional takes 20 nanoseconds (ns) to search
data at a time. TLAB and 100 ns to access main
(A) One dimension memory. The effective memory
(B) Two dimensions access time is ______.
(C) Three dimensions (A) 36 ns (B) 140 ns
(D) Multidimensions (C) 122 ns (D) 40 ns
Paper-II 6 S-87-13
46. Consider the input/output (I/O) 48. Which of the following set of Unix
requests made at different instants of commands will always display
time directed at a hypothetical disk “WELCOME” ?
having 200 tracks as given in the (A) export title=WELCOME; Echo
following table : $title
Serial 1 2 3 4 5 (B) title = WELCOME; export $
No. title ; sh –c “echo $title”
Track 12 85 40 100 75 (C) title = WELCOME; export title ;
No. sh –c “echo $title”
Time of 65 80 110 100 175 (D) title = WELCOME; echo $title
arrival
Assume that : 49. What type of logic circuit is
Current head position is at track no. represented by the figure shown
65 below ?
Direction of last movement is
towards higher numbered tracks
Current clock time is 160
milliseconds
Head movement time per track is
1 millisecond.
S-87-13 7 Paper-II
Space For Rough Work
Paper-II 8 S-87-13
PAPER-III
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
13. If an artificial variable is present in 17. A regular grammar for the language
the ‘basic variable’ of optimal L = {anbm | n is even and m is
simplex table then the solution is even}is given by
______ (A) S→aSb | S1; S1 → bS1a | λ
(A) Alternative solution
(B) S→aaS | S1; S1 → bSb | λ
(B) Infeasible solution
(C) Unbounded solution (C) S→aSb | S1; S1 → S1ab | λ
(D) Degenerate solution (D) S→aaS | S1; S1 → bbS1 | λ
S-87-13 3 Paper-III
18. Given the following productions of a 21. Assume statements S1 and S2 defined
grammar : as :
S→ aA| aBB; S1 : L2-L1 is recursive enumerable
A→aaA |λ ; where L1 and L2 are recursive
B→ bB| bbC; and recursive enumerable
C→ B respectively.
Which of the following is true ? S2 : The set of all Turing machines
(A) The language corresponding to
is countable.
the given grammar is a set of
even number of a’s. Which of the following is true ?
(B) The language corresponding to (A) S1 is correct and S2 is not
the given grammar is a set of correct.
odd number of a’s. (B) Both S1 and S2 are correct.
(C) The language corresponding to
the given grammar is a set of (C) Both S1 and S2 are not correct.
even number of a’s followed by (D) S1 is not correct and S2 is
odd number of b’s. correct.
(D) The language corresponding to
the given grammar is a set of 22. Non-deterministic pushdown automaton
odd number of a’s followed by that accepts the language generated by
even number of b’s. the grammar: S→aSS | ab is
(A) δ(q0, λ, z) = { (q1, z)};
19. The language accepted by the non-
deterministic pushdown automaton δ(q0, a, S) = { (q1, SS)}, (q1, B) }
M= ({q0, q1, q2}, {a, b}, {a, b, z}, δ, δ(q0, b, B) = { (q1, λ)},
q0, z, {q2}) with transitions δ(q1, λ, z) = { (qf, λ)}
δ (q0 a, z) = { (q1 a), (q2 λ)};
(B) δ(q0, λ, z) = { (q1, Sz)};
δ (q1, b, a) = { (q1, b)}
δ(q0, a, S) = { (q1, SS)}, (q1, B) }
δ (q1, b, b) ={ (q1 b)}, δ (q1, a, b) =
δ(q0, b, B) = { (q1, λ)},
{ (q2, λ)}
δ(q1, λ, z) = { (qf, λ)}
is
(A) L(abb*a) (C) δ(q0, λ, z) = { (q1, Sz)};
(B) {a} U L(abb*a)
δ(q0, a, S) = { (q1, S)}, (q1, B) }
(C) L(ab*a)
(D) {a} U L(ab*a) δ(q0, b, λ) = { (q1, B)},
δ(q1, λ, z) = { (qf, λ)}
20. The language L = | n ≥ 0,
{an bn am bm
m ≥ 0} is (D) δ(q0, λ, z) = { (q1, z)};
(A) Context free but not linear δ(q0, a, S) = { (q1, SS)}, (q1, B) }
(B) Context free and linear
δ(q0, b, λ) = { (q1, B)},
(C) Not Context free and not linear
(D) Not Context free but linear δ(q1, λ, z) = { (qf, λ)}
Paper-III 4 S-87-13
23. Match the following : 26. Let A be the set of comfortable
(a) Dangling (i) Buffer houses given as
pointer replacement ⎧ x1 x2 x3 x4 ⎫
A = ⎨0.8, 0.9, 0.1, 0.7⎬
policy ⎩ ⎭
(b) Page fault (ii) Variable- and B be the set of affordable houses
length ⎧ x1 x2 x3 x4 ⎫
records B = ⎨0.9, 0.8, 0.6, 0.2⎬
⎩ ⎭
(c) List (iii) Object Then the set of comfortable and
representation identifier affordable houses is
(d) Toss- (iv) Pointer-
⎧ x1 x2 x3 x4 ⎫
immediate swizzling (A) ⎨0.8, 0.8, 0.1, 0.2⎬
Codes : ⎩ ⎭
(a) (b) (c) (d) ⎧ x1 x2 x3 x4 ⎫
(B) ⎨0.9, 0.9, 0.6, 0.7⎬
(A) (iii) (iv) (ii) (i) ⎩ ⎭
(B) (iv) (iii) (ii) (i) ⎧ x1 x2 x3 x4 ⎫
(C) (iv) (iii) (i) (ii) (C) ⎨0.8, 0.8, 0.6, 0.7⎬
⎩ ⎭
(D) (iii) (iv) (i) (ii)
⎧ x1 x2 x3 x4 ⎫
(D) ⎨0.7, 0.7, 0.7, 0.9⎬
24. _______ constraints ensure that a ⎩ ⎭
value that appears in one relation for
a given set of attributes also appears 27. Support of a fuzzy set
for a certain set of attributes in ⎧ x1 x2 x3 x4 x5 ⎫
A = ⎨0.2, 0.15, 0.9, 0.95, 0.15⎬
another relation. ⎩ ⎭
(A) Logical Integrity within a universal set X is given as
(B) Referential Integrity ⎧ x1 x2 x3 x4 x5 ⎫
(C) Domain Integrity (A) ⎨0.15, 0.15, 0.15, 0.15, 0.15⎬
⎩ ⎭
(D) Data Integrity
⎧ x1 x2 x3 x4 x5 ⎫
(B) ⎨0.95, 0.95, 0.95, 0.95, 0.95⎬
25. The SQL expression ⎩ ⎭
Select distinct T, branch_name from (C) {x3, x4}
branch T, branch S (D) {x1, x2, x3, x4, x5}
where T.assets>S.assets and
S.branch_city=”Mumbai” finds the 28. In a single perceptron, the updation
names of rule of weight vector is given by
(A) All branches that have greater (A) w(n + 1)=w(n)+η[d(n)-y(n)]
assets than some branch (B) w(n + 1)=w(n)–η[d(n)-y(n)]
located in Mumbai.
(C) w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)
(B) All branches that have greater (D) w(n + 1)=w(n)–η[d(n)-y(n)]* x (n)
assets than all branches in
Mumbai. 29. ______ refers to the discrepancy
(C) The branch that has greatest among a computed, observed or
asset in Mumbai. measured value and the true specified
(D) Any branch that has greater or theoretically correct values.
assets than any branch in (A) Fault (B) Failure
Mumbai. (C) Defect (D) Error
S-87-13 5 Paper-III
30. Which logic family dissipates the 36. A binary ripple counter is required to
minimum power ? count up to 16383. How many flip-
(A) DTL (B) TTL flops are required ?
(C) ECL (D) CMOS (A) 16382 (B) 8191
(C) 512 (D) 14
31. Which of the following electronic
component is not found in IC’s ? 37. The time complexity of recurrence
relation
(A) Diode (B) Resistor
T(n) = T(n/3) + T(2n/3) + O(n) is
(C) Transistor (D) Inductor
(A) O(Ig n) (B) O(n)
(C) O(n Ig n) (D) O(n2 )
32. A given memory chip has 14 address
pins and 8 data pins. It has the 38. How many people must there be in a
following number of locations. room before there is a 50% chance
(A) 28 (B) 214 that two of them were born on the
(C) 26 (D) 212 same day of the year ?
(A) At least 23 (B) At least 183
33. The instruction: MOV CL, [BX] [DI] (C) At least 366 (D) At least 730
+ 8 represents the _____ addressing
mode. 39. The number of possible
(A) Based Relative parenthesizations of a sequence of n
(B) Based Indexed matrices is
(C) Indexed Relative (A) O(n)
(D) Register Indexed (B) θ(n Ig n)
(C) Ω(2n)
(D) None of the above
34. The power dissipation of a flip-flop
is 3 mW. The power dissipation of a
40. The time complexity of an efficient
digital system with 4 flip-flops is
algorithm to find the longest
given by
monotonically increasing
(A) 34 mW (B) 43 mW subsequence of n numbers is
(C) 4/3 mW (D) 12 mW (A) O(n)
(B) O(n Ig n)
35. An astable multivibrator using the (C) O(n2)
555 timer to generate a square wave (D) None of the above
of 5 KHz with 70% duty cycle will
have 41. Given a binary search trees for a set
(A) RA = 40.4 KΩ, RB = 17.25 KΩ, of n=5 keys with the following
C = 2000 pF probabilities :
(B) RA = 17.25 KΩ, RB = 40.4 KΩ, i 0 1 2 3 4 5
C = 2000 pF pi – 0.15 0.10 0.05 0.10 0.20
(C) RA = 40.4 KΩ, RB = 17.25 KΩ, qi 0.05 0.10 0.05 0.05 0.05 0.10
C = 5000 pF The expected optimal cost of the
(D) RA = 17.25 KΩ, RB = 40.4 KΩ, search is
(A) 2.65 (B) 2.70
C = 5000 pF (C) 2.75 (D) 2.80
Paper-III 6 S-87-13
42. Given 0-1 knapsack problem and 45. Improving processing efficiency or
fractional knapsack problem and the performance or restructuring of software
following statements : to improve changeability is known as
S1 : 0-1 knapsack is efficiently (A) Corrective maintenance
(B) Perfective maintenance
solved using Greedy algorithm. (C) Adaptive maintenance
S2 : Fractional knapsack is (D) Code maintenance
efficiently solved using 46. In ____,modules A and B make use
Dynamic programming. of a common data type, but perhaps
Which of the following is true ? perform different operations on it.
(A) S1 is correct and S2 is not correct. (A) Data coupling
(B) Both S1 and S2 are correct. (B) Stamp coupling
(C) Control coupling
(C) Both S1 and S2 are not correct. (D) Content coupling
(D) S1 is not correct and S2 is correct. 47. Consider the following schemas :
43. Equivalence class partitioning Branch_Schema = (branch_name, assets,
approach is used to divide the input city)
domain into a set of equivalence Customer_Schema = (cutstomer_name,
classes, so that if a program works street, city)
correctly for a value, then it will Deposit_Schema = (branch_name,
work correctly for all the other values account_number, customer_name,
in that class. This is used _____. balance)
(A) to partition the program in the Borrow_Schema = (branch_name,
form of classes. loan_number, customer_name, amount)
(B) to reduce the number of test Which of the following tuple
cases required. relational calculus finds all customers
(C) for designing test cases in who have loan amount more than
white box testing. ` 12,000 ?
(D) all of the above. (A) {t(customer_name) | t∈borrow[?]
44. The failure intensity for a basic model t[amount]>12000}
as a function of failures experienced is (B) {t |t(customer_name) |
given as λ(μ)-λ0[1 – (μ)/(V0)] t∈borrow[?] t[amount]>12000}
where λ0 is the initial failure intensity (C) {t |[?] ∈ borrow
(t(customer_name=s(customer_
at the start of the execution, μ is the name))[?] [amount]>12000}
average or expected number of failures (D) {t |[?] ∈ borrow
at a given point in time, the quantity (t(customer_name)[?] s[amount]
V0 is the total number of failures that
>12000}
would occur in infinite time. 48. Match the following :
Assume that a program will experience (a) Create (i) The E-R Model
100 failures in infinite time, the initial (b) Select (ii) Relationship Model
failure intensity was 10 failures/CPU (c) Rectangle (iii) DDL
hr. Then the decrement of failures (d) Record (iv) DML
intensity per failure will be Codes :
(a) (b) (c) (d)
(A) 10 per CPU hr. (A) (iii) (iv) (i) (ii)
(B) 0.1 per CPU hr. (B) (iv) (iii) (ii) (i)
(C) –0.1 per CPU hr. (C) (iv) (iii) (i) (ii)
(D) 90 per CPU hr. (D) (iii) (iv) (ii) (i)
S-87-13 7 Paper-III
49. Match the following : 52. Assume that we have constructor
(i) One to one function for both Base and Derived
relationship classes. Now consider the declaration :
(a) main ( )
(ii) Relationship Base *p = new Derived;
(b) In what sequence, the constructor
will be executed ?
(iii) Many to many
(c) (A) Derived class constructor is
relationship
followed by Base class
(iv) Many to one constructor.
(d) relationship (B) Base class constructor is
followed by Derived class
Codes : constructor.
(a) (b) (c) (d) (C) Base class constructor is never
(A) (iii) (iv) (ii) (i) called.
(D) Derived class constructor is
(B) (iv) (iii) (ii) (i)
never called.
(C) (ii) (iii) (iv) (i)
(D) (iii) (iv) (i) (ii) 53. What is the output of the following
program ?
50. Sixty (60) reusable components were
#include<stdio.h>
available for an application. If only
main( )
70% of these components can be used,
rest 30% would have to be developed {
from scratch. If average component is int a, b = 0;
100 LOC and cost of each LOC is static int c[10] =
` 14, what will be the risk exposure if {1, 2, 3, 4, 5, 6, 7, 8, 9, 0};
risk probability is 80% ? for (a=0; a<10;++a);
(A) ` 25,200 (B) ` 20,160 if ((c[a]%2)= =0) b+=c[a];
(C) ` 25,160 (D) ` 20,400 printf(“%d”,b);
}
51. Consider the following two function (A) 15 (B) 25
declarations : (C) 45 (D) 20
(i) int *f( ) (ii) int (*f)( )
54. A Program contains the following
Which of the following is true ? declarations and initial assignments
(A) Both are identical. int i = 8, j = 5;
(B) The first is a correct declaration double x = 0.005, y = –0.01;
and the second is wrong. char c=’c’, d=’d’;
(C) Both are different ways of Determine the value of the following
declaring pointer to a function. expressions which involve the use of
library functions:
(D) The first declaration is a
function returning a pointer to abs(i-2*j) ; log(exp(x)) ;
an integer and the second is a toupper(d)
pointer to function returning (A) 2; 0.005; D (B) 1; 0.005; D
integer. (C) 2; 0.005; E (D) 1; 0.005; e
Paper-III 8 S-87-13
55. MPEG involves both spatial 61. Which of the following is/are
compression and temporal fundamental method(s) of
compression. The spatial antialiasing ?
compression is similar to JPEG and
temporal compression removes (i) Increase of sample rate.
______ frames. (ii) Treating a pixel as a finite area
(A) Temporal (B) Voice rather than as a point.
(C) Spatial (D) Redundant (iii) Decrease of sample rate.
56. If the data unit is 111111 and the (A) (i) and (ii) (B) (ii) and (iii)
divisor is 1010. In CRC method, (C) (i) only (D) (ii) only
what is the dividend at the
transmission before division ?
(A) 1111110000 (B) 1111111010 62. The two color systems – the HSV
(C) 111111000 (D) 111111 and HLS are
57. If user A wants to send an encrypted (A) Hue, Saturation, Value and
message to user B. The plain text of A is Hue, Lightness, Saturation.
encrypted with the _______. (B) High, Standard, Value and
(A) Public Key of user A High, Lightness, Saturation.
(B) Public Key of user B
(C) Private Key of user A (C) Highly, Saturated, Value and
(D) Private Key of user B Highly, Lightened, Saturation.
58. A _____ can forward or block (D) Highly, Standard, Value and
packets based on the information in Hue, Lightness, Saturation.
the network layer and transport layer
header. 63. The parametric representation of the
(A) Proxy firewall line segment between the position
(B) Firewall
(C) Packet filter firewall vectors P1(2, 3) and P2(5, 4) is given as
(D) Message digest firewall (A) x(t)= 2+7t, y(t) = 0≤t≤∝
59. Which of the following graphics 3+7t
devices are known as active graphics (B) x(t)=2+10t, y(t) = 0≤t≤1
devices ? 3+12t
(i) Alphanumeric devices
(ii) Thumb wheels (C) x(t)= 2+3t, 0≤t≤1
(iii) Digitizers y(t)=3+t
(iv) Joystics (D) t(x, y) = 14t 0≤t≤1
(A) (i) and (ii)
(B) (iii) and (iv)
(C) (i), (ii) and (iii) 64. Consider the following
(D) (i), (ii), (iii) and (iv) transformation matrix for
60. A diametric projection is said to be rotation(clockwise) :
trimetric projection when ⎡ –sinθ
cosθ sinθ 0 0
⎤
(i) two of the three foreshortening
[T] =
⎢ cosθ 0 0 ⎥
factors are equal and third is
⎢ 0 0 1 0 ⎥
arbitrary.
(ii) all of the three foreshortening ⎣ 0 0 0 1 ⎦
factors are equal. This matrix rotates an object by an
(iii) all of the three foreshortening angle θ about :
factors are arbitrary. (A) X-axis
Which of the above is true ? (B) Y-axis
(A) (i) and (ii) (B) (ii) and (iii) (C) Z-axis
(C) (i) only (D) (iii) only (D) All of the above
S-87-13 9 Paper-III
65. Consider the following sequence of 68. Which of the following statements is
operations : not correct with reference to
distributed systems ?
(i) Pointer p1 is set to point at a (A) Distributed system represents a
new heap-dynamic variable. global view of the network and
(ii) Pointer p2 is assigned p1’s considers it as a virtual uni-
processor system by controlling
value. and managing resources across
(iii) The heap dynamic variable the network on all the sites.
pointed to by p1 is explicitly (B) Distributed system is built on
bare machine, not an add-on to
de-allocated, but p2 is not the existing software.
changed by the operation. (C) In a distributed system, kernel
This situation leads to which of the provides smallest possible set
of services on which other
following : services are built. This kernel is
(A) p1 becomes a dangling pointer called microkernel. Open
servers provide other services
(B) p2 becomes a dangling pointer and access to shared resources.
(C) Both p1 and p2 are now (D) In a distributed system, if a
dangling pointers user wants to run the program
on other nodes or share the
(D) Neither p1 nor p2 is now a resources on remote sites due
dangling pointer to their beneficial aspects, user
has to log on to that site.
69. A system contains 10 units of
66. The programming languages C and resource of same type. The resource
C++ are not strongly typed languages requirement and current allocation of
because : these resources for three processes P,
Q and R are as follows :
(A) Both C and C++ allow P Q R
functions for which parameters Maximum requirement 8 7 5
are not type checked. Current allocation 4 1 3
(B) Both C and C++ allow Now, consider the following resource
requests :
functions for which parameters (i) P makes a request for 2 resource units.
are type checked. (ii) Q makes request for 2 resources units.
(C) Both C and C++ allow (iii) R makes a request of 2 resource units.
For a safe state, which of the
functions for which parameters following options must be satisfied ?
are not type checked and also (A) Only request (i)
the union types in these (B) Only request (ii)
languages are not type checked. (C) Only request (iii)
(D) Request (i) and (ii)
(D) Union types in these (C and 70. Consider the following set of
C++) languages are not type processes with the length of CPU
checked. burst time in milliseconds (ms) :
Process A B C D E
Burst time 6 1 2 1 5
67. The tracing model in Prolog Priority 3 1 3 4 2
describes program execution in terms Assume that processes are stored in
of certain events. These events are ready queue in following order :
A–B–C–D–E
(A) call and exit Using round robin scheduling with
(B) call and fail time slice of 1 ms, the average turn
around time is
(C) call, exit and redo (A) 8.4 ms (B) 12.4 ms
(D) call, exit, redo and fail (C) 9.2 ms (D) 9.4 ms
Paper-III 10 S-87-13
71. Consider a main memory with 3 page 75. Which of the following statements is
frames for the following page
reference string : not true for UNIX Operating System ?
5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4
Assuming that the execution of
process is initiated after loading page
5 in memory, the number of page (A) Major strength of UNIX
faults in FIFO and second chance
replacement respectively are Operating System is its open
(A) 8 and 9 (B) 10 and 11
(C) 7 and 9 (D) 9 and 8 standards which enabled large
72. Which of the following shell scripts will number of organizations
produce the output “my first script” ?
(A) for i in my first script { echo –i $i} ranging from academicia to
(B) for my first script; do echo –n; done
(C) for i in my first script; do echo industries to participate in its
–i $i; done
(D) for n in my first script; do echo development.
–i $i; done
73. The portion of Windows 2000 operating
system which is not portable is
(A) processor management (B) UNIX kernel uses modules
(B) user interface
(C) device management with well specified interfaces
(D) virtual memory management
and provides advantages like
74. Match the following for Windows
Operating System : simplified testing and
(a) Hard- (i) Starting all processes,
ware emulation of different maintenance of kernel. It has
abstra- operating systems,
ction security functions, better extensibility as the
layer transform character
based applications to kernel is not monolithic.
graphical
representation.
(b) Kernel (ii) Export a virtual
memory interface, (C) UNIX is kernel based operating
support for symmetric
multiprocessing, system with two main
administration, details
of mapping memory, components viz. process
configuring I/O buses,
setting up DMA. management subsystem and
(c) Exe- (iii) Thread scheduling,
cutive interrupt and exception file management subsystem.
handling, recovery
after power failure.
(d) Win32 (iv) Object manager, virtual (D) All devices are represented as
sub- memory manager,
system process manager, plug- files which simplify the
and-play and power
manager. management of I/O devices and
Codes :
(a) (b) (c) (d) files. The directories structure
(A) (i) (iii) (ii) (iv)
(B) (iv) (iii) (ii) (i) used is directed acyclic graph.
(C) (ii) (iii) (iv) (i)
(D) (iii) (ii) (i) (iv)
S-87-13 11 Paper-III
Space For Rough Work
Paper-III 12 S-87-13
PAPER-III
COMPUTER SCIENCE & APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
Paper-III 4 D-87-13
22. What are the final values of Q1 and Q0 26. The mean-end analysis process
after 4 clock cycles, if initial values are centers around the detection of
00 in the sequential circuit shown differences between the current state
below : and goal state. Once such a
difference is isolated, an operator that
can reduce the difference must be
found. But perhaps that operator can
not be applied to the current state. So
a sub-problem of getting to a state in
which it can be applied is set up. The
kind of backward chaining in which
(A) 11 (B) 10 operators are selected and then sub
(C) 01 (D) 00 goals are set up to establish the
precondition of operators is called
23. High level knowledge which relates (A) backward planning
to the use of sentences in (B) goal stack planning
different contexts and how the (C) operator subgoaling
context affect the meaning of the (D) operator overloading
sentences ? 27. In alpha-beta pruning, _________ is
(A) Morphological used to cut off the search at
(B) Syntactic maximizing level only and
(C) Semantic _________ is used to cut off the
(D) Pragmatic search at minimizing level only.
(A) alpha, beta
(B) beta, alpha
24. The objective of ________
(C) alpha, alpha
procedure is to discover at least one
(D) beta, beta
________ that causes two literals to
match. 28. If A and B are two fuzzy sets with
(A) unification, validation membership functions
(B) unification, substitution μA(x) = {0.2, 0.5, 0.6, 0.1, 0.9}
(C) substitution, unification μB(x) = {0.1, 0.5, 0.2, 0.7, 0.8}
(D) minimax, maximum Then the value of μA ∩ B will be
(A) {0.2, 0.5, 0.6, 0.7, 0.9}
25. If h* represents an estimate of (B) {0.2, 0.5, 0.2, 0.1, 0.8}
the cost of getting from the current (C) {0.1, 0.5, 0.6, 0.1, 0.8}
node N to the goal node and h (D) {0.1, 0.5, 0.2, 0.1, 0.8}
represents actual cost of getting from
the current node to the goal node, 29. The height h(A) of a fuzzy set A is
then A* algorithm gives an optimal defined as
solution if h(A) = sup A(x)
(A) h* is equal to h x∈A
Then the fuzzy set A is called normal
(B) h* overestimates h when
(C) h* underestimates h (A) h(A) = 0 (B) h(A) < 0
(D) none of these (C) h(A) = 1 (D) h(A) < 1
D-87-13 5 Paper-III
30. An artificial neuron receives n inputs 33. The message 11001001 is to be
x1, x2,...., xn with weights w1, w2,...., wn transmitted using the CRC
attached to the input links. The polynomial x3 + 1 to protect it from
weighted sum ________ is computed errors. The message that should be
to be passed on to a non-linear filter transmitted is
φ called activation function to release (A) 110010011001
the output. (B) 11001001
(A) Σ wi (B) Σ xi (C) 110010011001001
(C) Σ wi + Σ xi (D) Σ wi ⋅ xi (D) 11001001011
41. The Greibach normal form grammar 46. A client-server system uses a satellite
for the language L = {an bn + 1 | n ≥ 0} network, with the satellite at a height
is of 40,000 kms. What is the best-case
delay in response to a request ? (Note
(A) S → a SB, B → bB | λ
that the speed of light in air is
(B) S → a SB, B → bB | b 3,00,000 km/second).
(C) S → a SB | b, B → b (A) 133.33 m sec
(D) S → a Sb | b (B) 266.67 m sec
(C) 400.00 m sec
42. Given the following statements : (D) 533.33 m sec
S1 : Every context-sensitive
language L is recursive. 47. The start and stop bits are used in
serial communication for
S2 : There exists a recursive
(A) error detection
language that is not context (B) error correction
sensitive. (C) synchronization
Which statement is correct ? (D) slowing down the
(A) S1 is not correct and S2 is not communication
correct.
(B) S1 is not correct and S2 is 48. _________ is a type of transmission
correct. impairment in which the signal
looses strength due to the resistance
(C) S1 is correct and S2 is not
of the transmission medium.
correct. (A) Attenuation (B) Distortion
(D) S1 is correct and S2 is correct. (C) Noise (D) Decibel
D-87-13 7 Paper-III
49. Match the following : 52. Serial access memories are useful in
List – I List – II applications where
a. Indexed i. is not used when an (A) Data consists of numbers
Addressing operand is moved (B) Short access time is required
from memory into a (C) Each stored word is processed
register or from a differently.
register to memory.
b. Direct ii. Memory address is (D) None of these
Addressing computed by
adding up two 53. What will be the output of the
registers plus an following logic diagram ?
(optional) offset.
c. Register iii. Addressing
Addressing memory by giving
a register plus a
content offset.
d. Base- iv. can only be used to
Indexed access global (A) x OR y
Addressing variables whose (B) x AND y
address is known (C) x XOR y
at compile time. (D) x XNOR y
Codes :
a b c d
(A) ii i iv iii 54. The essential difference between
(B) ii iv i iii traps and interrupts is
(C) iii iv i ii (A) traps are asynchronous and
(D) iii i iv ii interrupts are synchronous with
the program.
50. Which of the following is a design (B) traps are synchronous and
criteria for instruction formats ? interrupts are asynchronous
(A) The size of instructions with the program.
(B) The number of bits in the (C) traps are synchronous and
address fields interrupts are asynchronous
(C) The sufficient space in the with the I/O devices.
instruction format to express all (D) None of these.
the operations desired.
(D) All of these
55. Consider the following ER diagram :
51. Synchronization is achieved by a
timing device called a ________
which generates a periodic train of
________.
(A) clock generator, clock pulse The minimum number of tables
(B) master generator, clock pulse required to represent M, N, P, R1, R2
(C) generator, clock is
(D) master clock generator, clock (A) 2 (B) 3
pulse (C) 4 (D) 5
Paper-III 8 D-87-13
56. Consider the following schemas : 58. Consider the table
Branch = (Branch-name, Assets, Student (stuid, name, course, marks).
Branch-city) Which one of the following two
queries is correct to find the highest
Customer = (Customer-name, Bank
marks student in course 5 ?
name, Customer-city)
Q.1. Select S.stuid
Borrow = (Branch-name, loan From student S
number, customer account-number) Where not exists
Deposit = (Branch-name, Account- (select ∗ from student e where
number, Customer-name, Balance) e course = ‘5’ and e marks ≥ s
Using relational Algebra, the Query marks)
that finds customers who have Q.2. Select s.stu.id
balance more than 10,000 is _______ From student S
(A) πcustomer-name (σbalance > Where s ⋅ marks > any
(select distinct marks from
10000(Deposit) student S where s ⋅ course = 5)
(B) σcustomer-name (σbalance > (A) Q. 1
(B) Q. 2
10000(Deposit)
(C) Both Q. 1 and Q. 2
(C) πcustomer-name (σbalance > (D) Neither Q. 1 nor Q. 2
10000(Borrow)
59. Armstrong (1974) proposed
(D) σcustomer-name (πbalance > systematic approach to derive
10000(Borrow)
functional dependencies. Match the
following w.r.t. functional
dependencies :
57. Find the false statement : List – I List – II
(A) The relationship construct a. Decom- i. If X → Y and
known as the weak relationship position Z → W then
type was defined by Dey,
rule {X, Z} → {Y, W}
Storey & Barron (1999) b. Union rule ii. If X → Y and
(B) A weak relationship occurs {Y, W}→Z then
{X, W} → Z
when two relationship types are
linked by either Event-
c. Com- iii. If X → Y and X → Z
position then X → {Y, Z}
Precedent sequence or rule
Condition-Precedent sequence. d. Pseudo iv. If X → {Y, Z}
(C) Conceptual model is not transitivity then X → Y and
accurate representation of rule X→Z
“Universe of interest”. Codes :
(D) Ternary, Quaternary and a b c d
Quintary relationships are (A) iii ii iv i
shown through a series of (B) i iii iv ii
application scenario’s and (C) ii i iii iv
vignette’s. (D) iv iii i ii
D-87-13 9 Paper-III
60. Match the following : 63. Given below are three basic rules :
List – I List – II I. Squash and Stretch
a. Secondary i. Functional II. Slow-in and Slow-out
III. To stage the action properly
Index Dependency These rules are applied in case of
b. Non- ii. B-Tree (A) Rendering
procedural (B) Morphing
Query (C) Animation
Language (D) All the above
c. Closure of iii. Relational Algebraic 64. Which of the following points lies on
set of Operation the same side as the origin, with
Attributes reference to the line 3x + 7y = 2 ?
d. Natural iv. Domain Calculus (A) (3, 0) (B) (1, 0)
(C) (0.5, 0.5) (D) (0.5, 0)
JOIN
Codes : 65. The transformation matrix required
a b c d for conversion of CMY colour model
(A) i ii iv iii to RGB colour model is given as :
(B) ii i iv iii ⎡ R ⎤ ⎡ C ⎤ ⎡ 1 ⎤
(C) i iii iv ii (A) ⎢⎢ G ⎥⎥ = ⎢⎢ M ⎥⎥ – ⎢⎢ 1 ⎥⎥
(D) ii iv i iii ⎣ B ⎦ ⎣ Y ⎦ ⎣ 1 ⎦
⎡ R ⎤ ⎡ C ⎤ ⎡ 1 ⎤
61. Which of the following is not true (B) ⎢⎢ G ⎥⎥ = ⎢⎢ M ⎥⎥ – ⎢⎢ 2 ⎥⎥
with respect to a trackball and/or ⎣ B ⎦ ⎣ Y ⎦ ⎣ 3 ⎦
spaceball ? ⎡ R ⎤ ⎡ 1 ⎤ ⎡ C ⎤
I. A trackball is a two (C) ⎢⎢ G ⎥⎥ = ⎢⎢ 1 ⎥⎥ – ⎢⎢ M ⎥⎥
dimensional positioning device ⎣ B ⎦ ⎣ 1 ⎦ ⎣ Y ⎦
while as a spaceball provides ⎡ R ⎤ ⎡ C ⎤ ⎡ 0.5 ⎤
six degrees of freedom. (D) ⎢⎢ G ⎥⎥ = ⎢⎢ M ⎥⎥ – ⎢⎢ 0.5 ⎥⎥
II. Unlike the trackball a spaceball ⎣ B ⎦ ⎣ Y ⎦ ⎣ 0.5 ⎦
does not actually move. 66. What steps shall be required to rotate
III. A trackball is a three an object about the point P1 (as shown
dimensional positioning device
while as a spaceball provides in fig. 1) and its placement such that
six degrees of freedom. what was at P1 is now reduced and is
(A) I & II (B) II & III at P2 (as shown in fig. 2) ?
(C) II only (D) III only
62. Which of the following statement(s)
is (are) true ?
I. Two successive translations are
additive.
II. Two successive rotations are I. Translate P1 to origin
additive.
III. Two successive scaling II. Scale as required
III. Rotate
operations are multiplicative.
IV. Translate to the final position P2.
(A) I and II
(B) I and III (A) I, II and III
(B) II, III and IV
(C) II and III (C) I, III & IV
(D) All the above (D) All of the above
Paper-III 10 D-87-13
67. In Unix, how do you check that 72. The directory structure used in Unix
two given strings a and b are file system is called
equal ? (A) Hierarchical directory
(A) test $a –eq $b
(B) test $a –equal $b (B) Tree structured directory
(C) test $a = $b (C) Directed acyclic graph
(D) Sh –C test $a = = $b (D) Graph structured directory
68. In windows 2000 operating system
all the processor-dependent code is 73. Which statement is not true about
isolated in a dynamic link library process O in the Unix operating
called system ?
(A) NTFS file system (A) Process O is called init process.
(B) Hardware abstraction layer
(C) Microkernel (B) Process O is not created by
(D) Process Manager fork system call.
(C) After forking process 1,
69. To place a sound into a word process O becomes swapper
document, following feature of process.
windows is used :
(A) Clip board (D) Process O is a special
(B) Task switching process created when system
(C) C Win App boots.
(D) OLE
70. Translation Look-aside Buffer (TLB) is 74. Which of the following commands
(A) a cache-memory in which would return process_id of sleep
item to be searched is command ?
compared one-by-one with the (A) Sleep 1 and echo $?
keys.
(B) Sleep 1 and echo $#
(B) a cache-memory in which item
to be searched is compared (C) Sleep 1 and echo $×
with all the keys (D) Sleep 1 and echo $!
simultaneously.
(C) an associative memory in
which item to be searched is 75. Possible thread states in
compared one-by-one with the Windows 2000 operating system
keys. include :
(D) an associative memory in (A) Ready, running and waiting
which item to be searched is
compared with all the keys (B) Ready, standby, running,
simultaneously. waiting, transition and
terminated
71. Simplest way of deadlock recovery is
(C) Ready, running, waiting,
(A) Roll back
(B) Preempt resource transition and terminated
(C) Lock one of the processes (D) Standby, running, transition
(D) Kill one of the processes and terminated
D-87-13 11 Paper-III
Space For Rough Work
Paper-III 12 D-87-13
PAPER-II
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
Paper-II 8 J-87-14
PAPER-III
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
J-87-14 1 P.T.O.
COMPUTER SCIENCE & APPLICATIONS
Paper – III
Note : This paper contains seventy five (75) objective type questions of two (2) marks each.
All questions are compulsory.
1. Beam-penetration and shadow-mask 4. Consider a window bounded by the
are the two basic techniques for lines : x = 0; y= 0; x = 5 and y = 3.
producing color displays with a CRT. The line segment joining (–1, 0) and
Which of the following is not true ? (4, 5), if clipped against this window
I. The beam-penetration is used will connect the points
with random scan monitors. (A) (0, 1) and (2, 3)
II. Shadow-mask is used in raster- (B) (0, 1) and (3, 3)
scan systems. (C) (0, 1) and (4, 3)
III. Beam-penetration method is (D) (0, 1) and (3, 2)
better than shadow-mask 5. Which of the following color models
method. are defined with three primary colors ?
IV. Shadow-mask method is better (A) RGB and HSV color models
than beam-penetration method. (B) CMY and HSV color models
(A) I and II (B) II and III (C) HSV and HLS color models
(C) III only (D) IV only (D) RGB and CMY color models
6. In a digital transmission, the receiver
2. Line caps are used for adjusting the clock is 0.1 percent faster than the
shape of the line ends to give them a sender clock. How many extra bits
better appearance. Various kinds of per second does the receiver receive
line caps used are if the data rate is 1 Mbps ?
(A) Butt cap and sharp cap (A) 10 bps (B) 100 bps
(B) Butt cap and round cap (C) 1000 bps (D) 10000 bps
(C) Butt cap, sharp cap and round cap
7. Given U = {1, 2, 3, 4, 5, 6, 7}
(D) Butt cap, round cap and
A = {(3, 0.7), (5, 1), (6, 0.8)}
projecting square cap ~
then A will be : (where ~ → complement)
3. Given below are certain output (A) {(4, 0.7), (2, 1), (1, 0.8)}
primitives and their associated (B) {(4, 0.3), (5, 0), (6, 0.2) }
attributes. Match each primitive with (C) {(1, 1), (2, 1), (3, 0.3), (4, 1),
its corresponding attributes : (6, 0.2), (7, 1)}
List – I List – II (D) {(3, 0.3), (6.0.2)}
a. Line i. Type, Size, Color 8. Consider a fuzzy set old as defined
b. Fill Area ii. Color, Size, Font below
c. Text iii. Style, Color, Pattern Old = {(20, 0.1), (30, 0.2), (40, 0.4),
d. Marker iv. Type, Width, Color (50, 0.6), (60, 0.8), (70, 1), (80, 1)}
Codes : Then the alpha-cut for alpha = 0.4 for
the set old will be
a b c d
(A) {(40, 0.4)}
(A) i ii iii iv (B) {50, 60, 70, 80}
(B) ii i iii iv (C) {(20, 0.1), (30, 0.2)}
(C) iv iii ii i (D) {(20, 0), (30, 0), (40, 1),
(D) iii i iv ii (50, 1), (60, 1), (70, 1), (80, 1)}
Paper-III 2 J-87-14
9. Perceptron learning, Delta learning 13. Match the following with respect to
and LMS learning are learning I/O classes in object oriented
methods which falls under the programming :
category of List – I List – II
(A) Error correction learning – a. fopen() i. returns end of file
learning with a teacher
(B) Reinforcement learning – b. fclose() ii. return for any
learning with a critic problem report
(C) Hebbian learning c. ferror() iii. returns 0
(D) Competitive learning – learning d. feof() iv. returns a file pointer
without a teacher Codes :
a b c d
10. Code blocks allow many algorithms (A) iv i ii iii
to be implemented with the following (B) iii i iv ii
parameters : (C) ii iii iv i
(A) clarity, elegance, performance
(D) iv iii i ii
(B) clarity, elegance, efficiency
(C) elegance, performance, execution 14. Which one of the following describes
(D) execution, clarity, performance the syntax of prolog program ?
11. Match the following with respect to I. Rules and facts are terminated
the jump statements : by full stop (.)
List – I List – II II. Rules and facts are terminated
a. return i. The conditional test by semicolon (;)
and increment III. Variables names must start
portions with upper case alphabets.
b. goto ii. A value associated
with it IV. Variables names must start
c. break iii. Requires a label for with lower case alphabets.
operation Codes :
d. continue iv. An exit from only (A) I, II (B) III, IV
the innermost loop (C) I, III (D) II, IV
Codes :
a b c d 15. Let L be any language. Define even
(A) ii iii iv i (W) as the strings obtained by
(B) iii iv i ii extracting from W the letters in the
(C) iv iii ii i even-numbered positions and
(D) iv iii i ii even(L) = {even (W) | W ∈ L}. We
12. The control string in C++ consists of define another language Chop (L) by
three important classifications of removing the two leftmost symbols
characters of every string in L given by
(A) Escape sequence characters, Chop(L) = {W | ν W ∈ L, with | ν | = 2}.
Format specifiers and White- If L is regular language then
space characters (A) even(L) is regular and Chop(L)
(B) Special characters, White-space is not regular.
characters and Non-white space
(B) Both even(L) and Chop(L) are
characters
(C) Format specifiers, White-space regular.
characters and Non-white space (C) even(L) is not regular and
characters Chop(L) is regular.
(D) Special characters, White-space (D) Both even(L) and Chop(L) are
characters and Format specifiers not regular.
J-87-14 3 Paper-III
16. Software testing is 19. Match the following :
(A) the process of establishing that List – I List – II
errors are not present. a. Correctness i. The extent to
which a software
(B) the process of establishing tolerates the
confidence that a program does unexpected
what it is supposed to do. problems
b. Accuracy ii. The extent to
(C) the process of executing a
which a software
program to show that it is meets its
working as per specifications. specifications
(D) the process of executing a c. Robustness iii. The extent to
which a software
program with the intent of
has specified
finding errors. functions
d. Completeness iv. Meeting
specifications
17. Assume that a program will
with precision
experience 200 failures in infinite Codes :
time. It has now experienced 100 a b c d
failures. The initial failure intensity (A) ii iv i iii
was 20 failures/CPU hr. Then the (B) i ii iii iv
(C) ii i iv iii
current failure intensity will be
(D) iv ii i iii
(A) 5 failures/CPU hr
(B) 10 failures/CPU hr. 20. Which one of the following is not a
definition of error ?
(C) 20 failures/CPU hr. (A) It refers to the discrepancy
(D) 40 failures/CPU hr. between a computed, observed
or measured value and the true,
18. Consider a project with the following specified or theoretically
correct value.
functional units :
(B) It refers to the actual output of
Number of user inputs = 50 a software and the correct
Number of user outputs = 40 output.
(C) It refers to a condition that
Number of user enquiries = 35 causes a system to fail.
Number of user files = 06 (D) It refers to human action that
Number of external interfaces = 04 results in software containing a
defect or fault.
Assuming all complexity adjustment
factors and weighing factors as 21. Which one of the following is not a
average, the function points for the key process area in CMM level 5 ?
project will be (A) Defect prevention
(B) Process change management
(A) 135 (B) 722 (C) Software product engineering
(C) 675 (D) 672 (D) Technology change management
Paper-III 4 J-87-14
22. Consider the following relational 25. Consider the schema
schemas for a library database : R = {S, T, U, V}
Book (Title, Author, Catalog_no, and the dependencies
Publisher, Year, Price) S → T, T → U, U → V and V → S
Collection(Title, Author, Catalog_no)
with the following functional If R = (R1 and R2) be a
dependencies : decomposition such that R1 ∩ R2 = φ
I. Title, Author → Catalog_no then the decomposition is
II. Catalog_no → Title, Author, (A) not in 2NF
Publisher, Year
III. Publisher, Title, Year → Price (B) in 2NF but not in 3NF
Assume (Author, Title) is the key for (C) in 3NF but not in 2NF
both schemas. Which one of the (D) in both 2NF and 3NF
following is true ?
(A) Both Book and Collection are 26. Which one of the following is not a
in BCNF. Client-Server application ?
(B) Both Book and Collection are (A) Internet chat (B) Web browser
in 3NF.
(C) Book is in 2NF and Collection (C) E-mail (D) Ping
in 3NF.
(D) Both Book and Collection are 27. Which of the following concurrency
in 2NF. protocol ensures both conflict
serializability and freedom from
23. Specialization Lattice stands for
deadlock :
(A) An entity type can participate
as a subclass in only one I. 2-phase locking
specialization. II. Time phase ordering
(B) An entity type can participate (A) Both I & II
as a subclass in more than one (B) II only
specialization. (C) I only
(C) An entity type that can (D) Neither I nor II
participate in one specialization.
(D) An entity type that can
participate in one generalization. 28. Match the following :
List – I List – II
24. Match the following : a. Expert i. Pragmatics
List – I List – II systems
a. Timeout ordering i. Wait for graph
protocol b. Planning ii. Resolution
b. Deadlock ii. Roll back c. Prolog iii. Means-end
prevention analysis
c. Deadlock iii. Wait-die scheme d. Natural iv. Explanation
detection language facility
d. Deadlock iv. Thomas Write processing
recovery Rule Codes :
Codes : a b c d
a b c d
(A) iii iv i ii
(A) iv iii i ii
(B) iii ii iv i (B) iii iv ii i
(C) ii i iv iii (C) i ii iii iv
(D) iii i iv iii (D) iv iii ii i
J-87-14 5 Paper-III
29. STRIPS addresses the problem of 34. Consider a uniprocessor system
efficiently representing and where new processes arrive at an
implementation of a planner. It is not average of five processes per minute
related to which one of the following ? and each process needs an average of
(A) SHAKEY 6 seconds of service time. What will
(B) SRI be the CPU utilization ?
(C) NLP
(A) 80 % (B) 50 %
(D) None of these
(C) 60 % (D) 30 %
30. Slots and facets are used in
(A) Semantic Networks 35. Consider a program that consists of 8
(B) Frames pages (from 0 to 7) and we have 4
(C) Rules page frames in the physical memory
(D) All of these for the pages. The page reference
string is :
31. Consider f(N) = g(N) + h(N)
12325634637315363424
Where function g is a measure of the
cost of getting from the start node to 3451
the current node N and h is an The number of page faults in LRU
estimate of additional cost of getting and optimal page replacement
from the current node N to the goal algorithms are respectively (without
node. Then f(N) = h(N) is used in including initial page faults to fill
which one of the following available page frames with pages) :
algorithms ?
(A) 9 and 6 (B) 10 and 7
(A) A* algorithm
(B) AO* algorithm (C) 9 and 7 (D) 10 and 6
(C) Greedy best first search
algorithm 36. Which of the following statements is
(D) Iterative A* algorithm not true about disk-arm scheduling
algorithms ?
32. ________predicate calculus allows
quantified variables to refer to (A) SSTF (shortest seek time first)
objects in the domain of discourse algorithm increases performance
and not to predicates or functions. of FCFS.
(A) Zero-order (B) First-order (B) The number of requests for
(C) Second-order (D) High-order disk service are not influenced
by file allocation method.
33. ________ is used in game trees to (C) Caching the directories and
reduce the number of branches of the
index blocks in main memory
search tree to be traversed without
affecting the solution. can also help in reducing disk
(A) Best first search arm movements.
(B) Goal stack planning (D) SCAN and C-SCAN
(C) Alpha-beta pruning procedure algorithms are less likely to
(D) Min-max search have a starvation problem.
Paper-III 6 J-87-14
37. _________ maintains the list of free 42. The output of a sequential circuit
disk blocks in the Unix file system. depends on
(A) I-node (A) present input only
(B) Boot block (B) past input only
(C) Super block (C) both present and past input
(D) File allocation table
(D) past output only
38. A part of Windows 2000 operating
system that is not portable is 43. A byte addressable computer has a
(A) Device Management memory capacity of 2m Kbytes and
(B) Virtual Memory Management can perform 2n operations. An
(C) Processor Management instruction involving 3 operands and
(D) User Interface one operator needs a maximum of
(A) 3m bits
39. Match the following with reference
to Unix shell scripts : (B) m + n bits
List – I List – II (C) 3m + n bits
a. $? i. File name of the (D) 3m + n + 30 bits
current script
b. $# ii. List of arguments 44. Which of the following flip-flops is
c. $0 iii. The number of free from race condition ?
arguments (A) T flip-flop
d. $* iv. Exit status of last (B) SR flip-flop
command
(C) Master-slave JK flip-flop
Codes :
a b c d (D) None of the above
(A) iii ii i iv
(B) ii iii i iv 45. One of the main features that
(C) iv iii i ii distinguish microprocessor from
(D) i iii i iv micro-computers is
(A) words are usually larger in
40. The advantage of _______ is that it microprocessors.
can reference memory without (B) words are shorter in
paying the price of having a full microprocessors.
memory address in the instruction. (C) microprocessor does not
(A) Direct addressing contain I/O devices.
(B) Indexed addressing
(D) None of the above.
(C) Register addressing
(D) Register Indirect addressing
46. The output generated by the LINUX
41. The reverse polish notation command :
equivalent to the infix expression $ seq 1 2 10
((A + B) * C + D)/(E + F + G) will be
(A) A B + C * D + EF + G + / (A) 1 2 10
(B) A B + C D * + E F + G + / (B) 1 2 3 4 5 6 7 8 9 10
(C) A B + C * D + E F G + +/ (C) 1 3 5 7 9
(D) A B + C * D + E + F G + / (D) 1 5 10
J-87-14 7 Paper-III
47. All the classes necessary for 51. The pure object oriented
windows programming are available programming language with
in the module : extensive metadata available and
(A) win.txt (B) win.main modifiable at run time is
(C) win.std (D) MFC
(A) Small talk (B) C++
(C) Java (D) Eiffel
48. Windows 32 API supports
(A) 16-bit Windows
(B) 32-bit Windows 52. Match the following interfaces of
(C) 64-bit Windows Java. Servlet package :
J-87-14 9 Paper-III
61. Given the following equalities : 65. Given the following statements :
E1 : nK+∈ + nK lg n = θ(nK+∈) for all S1 : The subgraph-isomorphism
fixed K and ∈, K > 0 and ∈ > 0. problem takes two graphs G1
E2 : n32n + 6n23n = O(n32n) and G2 and asks whether G1 is
Which of the following is true ? a subgraph of G2.
(A) E1 is correct and E2 is correct. S2 : The set-partition problem takes
(B) E1 is correct and E2 is not as input a set S of numbers and
correct. asks whether the numbers can
(C) E1 is not correct and E2 is be partitioned into two sets A
–
correct. and A = S – A such that
(D) E1 is not correct and E2 is not ∑x ∑x
correct. = –
x∈A x∈A
Which of the following is true ?
62. Consider the fractional knapsack
instance n = 4, (p1, p2, p3, p4) = (10, (A) S1 is NP problem and S2 is P
10, 12, 18), (w1, w2, w3, w4) = (2, 4, problem.
6, 9) and M = 15. The maximum (B) S1 is NP problem and S2 is NP
profit is given by problem.
(Assume p and w denotes profit and
(C) S1 is P problem and S2 is P
weight of objects respectively)
(A) 40 (B) 38 problem.
(C) 32 (D) 30 (D) S1 is P problem and S2 is NP
problem.
63. The solution of the recurrence
n
relation of T(n) = 3Tfloor 4 + n is 66. Suppose that the splits at every level
of quicksort are in the proportion
(A) O(n2) (B) O(nlg n) (1 – α) to α, where 0 < α < ½ is a
(C) O(n) (D) O(l g n) constant. The minimum depth of a
leaf in the recursion tree is
64. If h is chosen from a universal approximately given by
collection of hash functions and is lgn
used to hash n keys into a table of (A) –
lg(1 – α)
size m, where n < m, the expected
number of collisions involving a
(B) – lg (1 – α)
particular key K is lgn
(A) less than 1
(C) – lgn
(B) less than lg n lgα
(C) greater than 1
lgα
(D) greater than lg n (D) – lgn
Paper-III 10 J-87-14
67. Ten signals, each requiring 3000 Hz, 73. Given the following two grammars :
are multiplexed on to a single G1 : S → AB | aaB
channel using FDM. How much
minimum bandwidth is required for A → a | Aa
the multiplexed channel ? Assume B→b
that the guard bands are 300 Hz G2 : S → a S b S | b S a S | λ
wide. Which statement is correct ?
(A) 30,000 (A) G1 is unambiguous and G2 is
(B) 32,700
unambiguous.
(C) 33,000
(D) None of the above (B) G1 is unambiguous and G2 is
ambiguous.
68. A terminal multiplexer has six 1200 (C) G1 is ambiguous and G2 is
bps terminals and ‘n’ 300 bps
terminals connected to it. If the unambiguous.
outgoing line is 9600 bps, what is the (D) G1 is ambiguous and G2 is
value of n ? ambiguous.
(A) 4 (B) 8
(C) 16 (D) 28 74. Match the following :
69. Which of the following is used in the List – I List – II
options field of IPv4 ? a. Chomsky i. S → b S S | a S | c
(A) Strict source routing Normal form
(B) Loose source routing b. Greibach ii. S → a S b | ab
(C) time stamp Normal form
(D) All of the above c. S-grammar iii. S → AS | a
A → SA | b
70. Which layers of the OSI reference
d. LL grammar iv. S → a B S B
model are host-to-host layers ?
(A) Transport, Session, Presentation, B→b
Application Codes :
a b c d
(B) Network, Transport, Session, (A) iv iii i ii
Presentation (B) iv iii ii i
(C) Data-link, Network, Transport, (C) iii iv i ii
Session (D) iii iv ii i
(D) Physical, Data-link, Network,
Transport 75. Given the following two languages :
71. A network on the Internet has a L1 = {anbn | n > 1} ∪ {a}
subnet mask of 255.255.240.0. What L2 = {w C wR | w ∈ {a, b}*}
is the maximum number of hosts it Which statement is correct ?
can handle ? (A) Both L1 and L2 are not
(A) 1024 (B) 2048
(C) 4096 (D) 8192 deterministic.
(B) L1 is not deterministic and L2 is
72. Four bits are used for packed
deterministic.
sequence numbering in a sliding
window protocol used in a computer (C) L1 is deterministic and L2 is not
network. What is the maximum deterministic.
window size ? (D) Both L1 and L2 are
(A) 4 (B) 8 deterministic.
(C) 15 (D) 16
J-87-14 11 Paper-III
Space For Rough Work
Paper-III 12 J-87-14
PAPER-II
COMPUTER SCIENCE
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
1. Consider a set A = {1, 2, 3, …….., 1000}. How many members of A shall be divisible by
3 or by 5 or by both 3 and 5 ?
(A) 533 (B) 599
2. A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of
degree 2. If the other vertices have degree 1, how many vertices are there in the graph ?
(C) 20 (D) 11
Paper-II 2 D-87-14
5. If we define the functions f, g and h that map R into R by :
f(x) = x4, g(x) = x2 + 1, h(x) = x2 + 72, then the value of the composite functions ho(gof)
and (hog)of are given as
(A) x8 – 71 and x8 – 71 (B) x8 – 73 and x8 – 73
(C) x8 + 71 and x8 + 71 (D) x8 + 73 and x8 + 73
8. How many PUSH and POP operations will be needed to evaluate the following expression
by reverse polish notation in a stack machine (A ∗ B) + (C ∗ D/E) ?
(A) 4 PUSH and 3 POP instructions (B) 5 PUSH and 4 POP instructions
(C) 6 PUSH and 2 POP instructions (D) 5 PUSH and 3 POP instructions
9. The range of representable normalized numbers in the floating point binary fractional
representation in a 32-bit word with 1-bit sign, 8-bit excess 128 biased exponent and
23-bit mantissa is
(A) 2–128 to (1 – 2–23) × 2127 (B) (1 – 2–23) × 2–127 to 2128
(C) (1 – 2–23) × 2–127 to 223 (D) 2–129 to (1 – 2–23) × 2127
10. The size of the ROM required to build an 8-bit adder/subtractor with mode control, carry
input, carry output and two’s complement overflow output is given as
(A) 216 × 8 (B) 218 × 10
(C) 216 × 10 (D) 218 × 8
D-87-14 3 Paper-II
11. What will be the output of the following ‘C’ code ?
main ( )
{ int x = 128;
printf (“\n%d”, 1 + x ++);
}
(A) 128 (B) 129
(C) 130 (D) 131
14. When an array is passed as parameter to a function, which of the following statements is
correct ?
(A) The function can change values in the original array.
(B) In C, parameters are passed by value, the function cannot change the original value
in the array.
(C) It results in compilation error when the function tries to access the elements in the
array.
(D) Results in a run time error when the function tries to access the elements in the
array.
Paper-II 4 D-87-14
15. Which of the following differentiates between overloaded functions and overridden
functions ?
(A) Overloading is a dynamic or runtime binding and overridden is a static or compile
time binding.
(B) Overloading is a static or compile time binding and overriding is dynamic or
runtime binding.
(C) Redefining a function in a friend class is called overloading, while redefining a
function in a derived class is called as overridden function.
(D) Redefining a function in a derived class is called function overloading, while
redefining a function in a friend class is called function overriding.
18. What kind of mechanism is to be taken into account for converting a weak entity set into
strong entity set in entity-relationship diagram ?
(A) Generalization (B) Aggregation
(C) Specialization (D) Adding suitable attributes
19. The best normal form of relation scheme R(A, B, C, D) along with the set of functional
dependencies F = {AB → C, AB → D, C → A, D → B} is
(A) Boyce-Codd Normal form (B) Third Normal form
(C) Second Normal form (D) First Normal form
20. Identify the minimal key for relational scheme R(A, B, C, D, E) with functional
dependencies F = {A → B, B → C, AC → D}
(A) A (B) AE
(C) BE (D) CE
D-87-14 5 Paper-II
21. Convert the following infix expression into its equivalent post fix expression
(A + B^ D) / (E – F) + G
(A) ABD^ + EF – / G+ (B) ABD + ^EF – / G+
(C) ABD + ^EF / – G+ (D) ABD^ + EF / – G+
22. You have to sort a list L, consisting of a sorted list followed by a few ‘random’ elements.
Which of the following sorting method would be most suitable for such a task ?
(A) Bubble sort (B) Selection sort
(C) Quick sort (D) Insertion sort
23. The directory can be viewed as ________ that translates filenames into their directory
entries.
(A) Symbol table (B) Partition
(C) Swap space (D) Cache
24. Consider an array A[20, 10], assume 4 words per memory cell and the base address of
array A is 100. What is the address of A[11, 5] ? Assume row major storage.
(A) 560 (B) 565
(C) 570 (D) 575
Paper-II 6 D-87-14
28. Which of the following algorithms is not a broadcast routing algorithm ?
(A) Flooding (B) Multidestination routing
(C) Reverse path forwarding (D) All of the above
29. An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data
elements are carried by each signal element ?
(A) 0.336 bits/baud (B) 3 bits/baud
(C) 120,00,000 bits/baud (D) None of the above
30. How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit
key ?
(A) 16 (B) 17
(C) 18 (D) 19
D-87-14 7 Paper-II
33. In a two-pass assembler, symbol table is
(A) Generated in first pass
(B) Generated in second pass
(C) Not generated at all
(D) Generated and used only in second pass
36. Consider the following justifications for commonly using the two-level CPU scheduling :
I. It is used when memory is too small to hold all the ready processes.
II. Because its performance is same as that of the FIFO.
III. Because it facilitates putting some set of processes into memory and a choice is
made from that.
IV. Because it does not allow to adjust the set of in-core processes.
Which of the following is true ?
(A) I, III and IV (B) I and II
(C) III and IV (D) I and III
Paper-II 8 D-87-14
37. A specific editor has 200 K of program text, 15 K of initial stack, 50 K of initialized data,
and 70 K of bootstrap code. If five editors are started simultaneously, how much physical
memory is needed if shared text is used ?
(A) 1135 K (B) 335 K
(C) 1065 K (D) 320 K
38. Which of the following conditions does not hold good for a solution to a critical section
problem ?
(A) No assumptions may be made about speeds or the number of CPUs.
(B) No two processes may be simultaneously inside their critical sections.
(C) Processes running outside its critical section may block other processes.
(D) Processes do not wait forever to enter its critical section.
39. For the implementation of a paging scheme, suppose the average process size be x bytes,
the page size be y bytes, and each page entry requires z bytes. The optimum page size that
minimizes the total overhead due to the page table and the internal fragmentation loss is
given by
x xz
(A) (B)
2 2
xz
(C) 2xz (D) 2
40. In a demand paging memory system, page table is held in registers. The time taken to
service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not
modified, and it takes 20 m.secs., if the replaced page is modified. What is the average
access time to service a page fault assuming that the page to be replaced is modified 70%
of the time ?
(A) 11.6 m.sec. (B) 16.4 m.sec.
(C) 28 m.sec. (D) 14 m.sec.
D-87-14 9 Paper-II
42. Requirement Development, Organizational Process Focus, Organizational Training, Risk
Management and Integrated Supplier Management are process areas required to achieve
maturity level
(A) Performed
(B) Managed
(C) Defined
(D) Optimized
43. The software _________ of a program or a computing system is the structure or structures
of the system, which comprise software components, the externally visible properties of
those components, and the relationships among them.
(A) Design
(B) Architecture
(C) Process
(D) Requirement
44. Which one of the following set of attributes should not be encompassed by effective
software metrics ?
(A) Simple and computable
(B) Consistent and objective
(C) Consistent in the use of units and dimensions
(D) Programming language dependent
Paper-II 10 D-87-14
46. Consider the following statements S1 and S2 :
S1 : A hard handover is one in which the channel in the source cell is retained and used
for a while in parallel with the channel in the target cell.
S2 : A soft handover is one in which the channel in the source cell is released and only
then the channel in the target cell is engaged.
(A) S1 is true and S2 is not true. (B) S1 is not true and S2 is true.
(C) Both S1 and S2 are true. (D) Both S1 and S2 are not true.
48. Which e-business model allows consumers to name their own price for products and
services ?
(A) B2 B (B) B2 G
(C) C2 C (D) C2 B
49. __________ model is designed to bring prices down by increasing the number of
customers who buy a particular product at once.
(A) Economic Order Quantity (B) Inventory
(C) Data Mining (D) Demand-Sensitive Pricing
D-87-14 11 Paper-II
Space For Rough Work
Paper-II 12 D-87-14
PAPER-III
COMPUTER SCIENCE
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
D-87-14 1 P.T.O.
COMPUTER SCIENCE
PAPER – III
Note : This paper contains seventy five (75) objective type questions of two (2) marks each. All
questions are compulsory.
1. A hierarchical memory system that uses cache memory has cache access time of 50 nano
seconds, main memory access time of 300 nano seconds, 75% of memory requests are for
read, hit ratio of 0.8 for read access and the write-through scheme is used. What will be
the average access time of the system both for read and write requests ?
(A) 157.5 n.sec. (B) 110 n.sec.
(C) 75 n.sec. (D) 82.5 n.sec.
2. For switching from a CPU user mode to the supervisor mode following type of interrupt is
most appropriate
(A) Internal interrupts (B) External interrupts
(C) Software interrupts (D) None of the above
3. In a dot matrix printer the time to print a character is 6 m.sec., time to space in between
characters is 2 m.sec., and the number of characters in a line are 200. The printing speed
of the dot matrix printer in characters per second and the time to print a character line are
given by which of the following options ?
(A) 125 chars/second and 0.8 seconds
(B) 250 chars/second and 0.6 seconds
(C) 166 chars/second and 0.8 seconds
(D) 250 chars/second and 0.4 seconds
6. Specify the contents of the accumulator and the status of the S, Z and CY flags when 8085
microprocessor performs addition of 87 H and 79 H.
(A) 11, 1, 1, 1 (B) 10, 0, 1, 0
(C) 01, 1, 0, 0 (D) 00, 0, 1, 1
9. __________ rules used to limit the volume of log information that has to be handled and
processed in the event of system failure involving the loss of volatile information.
(A) Write-ahead log (B) Check-pointing
(C) Log buffer (D) Thomas
13. Which of the following categories of languages do not refer to animation languages ?
(A) Graphical languages (B) General-purpose languages
(C) Linear-list notations (D) None of the above
15. A technique used to approximate halftones without reducing spatial resolution is known as
_________.
(A) Halftoning (B) Dithering
(C) Error diffusion (D) None of the above
Paper-III 4 D-87-14
16. Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated by 45
degrees about a point P(–1, –1). The co-ordinates of the new triangle obtained after
rotation shall be _______
3 9
(A) A' (–1, 2 – 1), B'(–1, 2 2 – 1), C' 2 – 1 , 2 – 1
2 2
3 9
(B) A' ( 2 – 1, –1), B'(2 2 – 1, –1), C' 2 – 1 , 2 – 1
2 2
3 9
(C) A' (–1, 2 – 1), B'(2 2 – 1, –1), C' 2 – 1 , 2 – 1
2 2
9 3
(D) A' (–1, 2 – 1), B'(2 2 – 1, –1), C'2 2 – 1 , 2 2 – 1
17. In Cyrus-Beck algorithm for line clipping the value of t parameter is computed by the
relation :
(Here P1 and P2 are the two end points of the line, f is a point on the boundary, n1 is inner
normal)
(P1 – fi) ⋅ ni (fi – P1) ⋅ ni
(A) (B)
(P2 – P1) ⋅ ni (P2 – P1) ⋅ ni
(P2 – fi) ⋅ ni (fi – P2) ⋅ ni
(C) (D)
(P1 – P2) ⋅ ni (P1 – P2) ⋅ ni
20. How many tokens will be generated by the scanner for the following statement ?
x = x ∗ (a + b) – 5;
(A) 12 (B) 11
(C) 10 (D) 07
22. The pushdown automation M = ({q0, q1, q2}, {a, b}, {0, 1}, δ, q0, 0, {q0}) with
δ(q0, a, 0) = {(q1, 10)}
δ(q1, a, 1) = {(q1, 11)}
δ(q1, b, 1) = {(q2, λ)}
δ(q2, b, 1) = {(q2, λ)}
δ(q2, λ, 0) = {(q0, λ)}
Accepts the language
(A) L = {an bm | n, m ≥ 0} (B) L = {an bn | n ≥ 0}
(C) L = {an bm | n, m > 0} (D) L = {an bn | n > 0}
26. How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps
line if the transfer is asynchronous ? (Assuming 1 start bit and 1 stop bit)
(A) 300 (B) 320
(C) 360 (D) 400
28. What is the propagation time if the distance between the two points is 48,000 ? Assume
the propagation speed to be 2.4 × 108 metre/second in cable.
(A) 0.5 ms (B) 20 ms
(C) 50 ms (D) 200 ms
35. Consider the problem of a chain <A1, A2, A3> of three matrices. Suppose that the
dimensions of the matrices are 10 × 100, 100 × 5 and 5 × 50 respectively. There are two
different ways of parenthesization : (i) ((A1 A2)A3) and (ii) (A1(A2 A3)). Computing the
product according to the first parenthesization is ________ times faster in comparison to
the second parenthesization.
(A) 5 (B) 10
(C) 20 (D) 100
36. Suppose that we have numbers between 1 and 1000 in a binary search tree and we want to
search for the number 365. Which of the following sequences could not be the sequence of
nodes examined ?
(A) 4, 254, 403, 400, 332, 346, 399, 365
(B) 926, 222, 913, 246, 900, 260, 364, 365
(C) 927, 204,913, 242, 914, 247, 365
(D) 4, 401, 389, 221, 268, 384, 383, 280, 365
37. Which methods are utilized to control the access to an object in multi-threaded
programming ?
(A) Asynchronized methods (B) Synchronized methods
(C) Serialized methods (D) None of the above
(A)
(B)
(C)
(D)
Paper-III 8 D-87-14
39. Converting a primitive type data into its corresponding wrapper class object instance is
called
(A) Boxing (B) Wrapping
(C) Instantiation (D) Autoboxing
40. The behaviour of the document elements in XML can be defined by
(A) Using document object
(B) Registering appropriate event handlers
(C) Using element object
(D) All of the above
41. What is true about UML stereotypes ?
(A) Stereotype is used for extending the UML language.
(B) Stereotyped class must be abstract
(C) The stereotype indicates that the UML element cannot be changed
(D) UML profiles can be stereotyped for backward compatibility
42. Which method is called first by an applet program ?
(A) start( ) (B) run( )
(C) init( ) (D) begin( )
43. Which one of the following is not a source code metric ?
(A) Halstead metric (B) Function point metric
(C) Complexity metric (D) Length metric
44. To compute function points (FP), the following relationship is used
FP = Count – total × (0.65 + 0.01 × Σ(Fi)) where Fi (i = 1 to n) are value adjustment
factors (VAF) based on n questions. The value of n is
(A) 12 (B) 14
(C) 16 (D) 18
45. Assume that the software team defines a project risk with 80% probability of occurrence
of risk in the following manner :
Only 70 percent of the software components scheduled for reuse will be integrated into the
application and the remaining functionality will have to be custom developed. If 60
reusable components were planned with average component size as 100 LOC and
software engineering cost for each LOC as $ 14, then the risk exposure would be
(A) $ 25,200 (B) $ 20,160
(C) $ 17,640 (D) $ 15,120
46. Maximum possible value of reliability is
(A) 100 (B) 10
(C) 1 (D) 0
47. ‘FAN IN’ of a component A is defined as
(A) Count of the number of components that can call, or pass control, to a component A
(B) Number of components related to component A
(C) Number of components dependent on component A
(D) None of the above
D-87-14 9 Paper-III
48. Temporal cohesion means
(A) Coincidental cohesion
(B) Cohesion between temporary variables
(C) Cohesion between local variables
(D) Cohesion with respect to time
49. Various storage devices used by an operating system can be arranged as follows in
increasing order of accessing speed :
(A) Magnetic tapes → magnetic disks → optical disks → electronic disks → main
memory → cache → registers
(B) Magnetic tapes → magnetic disks → electronic disks → optical disks → main
memory → cache → registers
(C) Magnetic tapes → electronic disks → magnetic disks → optical disks → main
memory → cache → registers
(D) Magnetic tapes → optical disks → magnetic disks → electronic disks → main
memory → cache → registers
50. How many disk blocks are required to keep list of free disk blocks in a 16 GB hard disk
with 1 kB block size using linked list of free disk blocks ? Assume that the disk block
number is stored in 32 bits.
(A) 1024 blocks (B) 16794 blocks
(C) 20000 blocks (D) 1048576 blocks
51. Consider an imaginary disk with 40 cylinders. A request come to read a block on cylinder
11. While the seek to cylinder 11 is in progress, new requests come in for cylinders 1, 36,
16, 34, 9 and 12 in that order. The number of arm motions using shortest seek first
algorithm is
(A) 111 (B) 112
(C) 60 (D) 61
52. An operating system has 13 tape drives. There are three processes P1, P2 & P3. Maximum
requirement of P1 is 11 tape drives, P2 is 5 tape drives and P3 is 8 tape drives. Currently,
P1 is allocated 6 tape drives, P2 is allocated 3 tape drives and P3 is allocated 2 tape drives.
Which of the following sequences represent a safe state ?
(A) P2 P1 P3 (B) P2 P3 P1
(C) P1 P2 P3 (D) P1 P3 P2
55. Equivalent logical expression for the Well Formed Formula (WFF),
~(∀x) F[x]
is
(A) ∀x (~F[x]) (B) ~(∃x) F[x]
(C) ∃x (~F[x]) (D) ∀x F[x]
61. Given the recursively enumerable language (LRE), the context sensitive language (LCS),
the recursive language (LREC), the context free language (LCF) and deterministic context
free language (LDCF). The relationship between these families is given by
(A) LCF ⊆ LDCF ⊆ LCS ⊆ LRE ⊆ LREC
(B) LCF ⊆ LDCF ⊆ LCS ⊆ LREC ⊆ LRE
(C) LDCF ⊆ LCF ⊆ LCS ⊆ LRE ⊆ LREC
(D) LDCF ⊆ LCF ⊆ LCS ⊆ LREC ⊆ LRE
Paper-III 12 D-87-14
62. Match the following :
List – I List – II
a. Context free grammar i. Linear bounded automaton
b. Regular grammar ii. Pushdown automaton
c. Context sensitive grammar iii. Turing machine
d. Unrestricted grammar iv. Deterministic finite automaton
Codes :
a b c d
(A) ii iv iii i
(B) ii iv i iii
(C) iv i ii iii
(D) i iv iii ii
65. Given a simple image of size 10 × 10 whose histogram models the symbol probabilities
and is given by
p1 p2 p3 p4
a b c d
The first order estimate of image entropy is maximum when
1 1
(A) a = 0, b = 0, c = 0, d = 1 (B) a = 2, b = 2, c = 0, d = 0
1 1 1 1 1 1 1
(C) a = 3, b = 3, c = 3, d = 0 (D) a = 4, b = 4, c = 4, d = 4
D-87-14 13 Paper-III
66. A Butterworth lowpass filter of order n, with a cutoff frequency at distance D0 from the
origin, has the transfer function H(u, v) given by
1 1
(A) 2n (B)
D(u, v) D(u, v)n
1+ D 1+ D
0 0
1 1
(C) (D)
D0 2n D0 n
1+ 1+
D(u, v) D(u, v)
67. If an artificial variable is present in the ‘basic variable’ column of optimal simplex table,
then the solution is
(A) Optimum (B) Infeasible
(C) Unbounded (D) Degenerate
68. The occurrence of degeneracy while solving a transportation problem means that
(A) total supply equals total demand
(B) total supply does not equal total demand
(C) the solution so obtained is not feasible
(D) none of these
69. Five men are available to do five different jobs. From past records, the time (in hours) that
each man takes to do each job is known and is given in the following table :
Jobs
I II III IV V
P 2 9 2 7 1
Q 6 8 7 6 1
Men R 4 6 5 3 1
S 4 2 7 3 1
T 5 3 9 5 1
Find out the minimum time required to complete all the jobs.
(A) 5 (B) 11
(C) 13 (D) 15
Paper-III 14 D-87-14
71. A _________ point of a fuzzy set A is a point x ∈ X at which µA(x) = 0.5
(A) core (B) support
(C) crossover (D) α-cut
72. Match the following learning modes w.r.t. characteristics of available information for
learning :
a. Supervised i. Instructive information on desired responses,
explicitly specified by a teacher.
b. Recording ii. A priori design information for memory storing
c. Reinforcement iii. Partial information about desired responses, or
only “right” or “wrong” evaluative information
d. Unsupervised iv. No information about desired responses
Codes :
a b c d
(A) i ii iii iv
(B) i iii ii iv
(C) ii iv iii i
(D) ii iii iv i
73. Which of the following versions of Windows O.S. contain built-in partition manager
which allows us to shrink and expand pre-defined drives ?
(A) Windows Vista (B) Windows 2000
(C) Windows NT (D) Windows 98
75. Which of the following computing models is not an example of distributed computing
environment ?
(A) Cloud computing (B) Parallel computing
(C) Cluster computing (D) Peer-to-peer computing
_____________
D-87-14 15 Paper-III
Space For Rough Work
Paper-III 16 D-87-14
Signature and Name of Invigilator OMR Sheet No. : ..........................................................
(To be filled by the Candidate)
1. (Signature)
Roll No.
(Name)
(In figures as per admission card)
2. (Signature)
Roll No.
(Name) (In words)
J 8 7 1 5 PAPER - II
Time : 1¼ hours] COMPUTER SCIENCE [Maximum Marks : 100
Number of Pages in this Booklet : 12 Number of Questions in this Booklet : 50
Instructions for the Candidates ÂÚUèÿææçÍüØô¢ ·ð¤ çܰ çÙÎðüàæ
1. Write your roll number in the space provided on the top of
1. §â ÂëDU ·ð¤ ª¤ÂÚU çÙØÌ SÍæÙ ÂÚU ¥ÂÙæ ÚUôÜU ÙÕÚU çÜç¹°Ð
this page.
2. This paper consists of fifty multiple-choice type of questions. 2. §â ÂýàÙ-Âæ ×𢠿æâ Õãéçß·¤ËÂèØ ÂýàÙ ãñ´Ð
3. At the commencement of examination, the question booklet 3. ÂÚUèÿææ ÂýæÚUÖ ãôÙð ÂÚU, ÂýàÙ-ÂéçSÌ·¤æ ¥æÂ·¤ô Îð Îè ÁæØð»èÐ ÂãÜðU ÂUæ¡¿ ç×ÙÅU
will be given to you. In the first 5 minutes, you are requested ¥æÂ·¤ô ÂýàÙ-ÂéçSÌ·¤æ ¹ôÜÙð ÌÍæ ©â·¤è çÙÙçÜç¹Ì Áæ¡¿ ·ð¤ çܰ çÎØð
to open the booklet and compulsorily examine it as below : ÁæØð¢»ð, çÁâ·¤è Áæ¡¿ ¥æÂ·¤ô ¥ßàØ ·¤ÚUÙè ãñ Ñ
(i) To have access to the Question Booklet, tear off the (i) ÂýàÙ-ÂéçSÌ·¤æ ¹ôÜÙð ·ð¤ çܰ ÂéçSÌ·¤æ ÂÚU Ü»è ·¤æ»Á ·¤è âèÜ ·¤æð
paper seal on the edge of this cover page. Do not accept
a booklet without sticker-seal and do not accept an open
ȤæÇ¸ Üð¢UÐ ¹éÜè ãé§ü Øæ çÕÙæ SÅUè·¤ÚU-âèÜU ·¤è ÂéçSÌ·¤æ Sßè·¤æÚU Ù ·¤Úð¢UÐ
booklet. (ii) ·¤ßÚU ÂëDU ÂÚU ÀUÂð çÙÎðüàææÙéâæÚU ÂýàÙ-ÂéçSÌ·¤æ ·ð¤ ÂëDU ÌÍæ ÂýàÙô¢ ·¤è
(ii) Tally the number of pages and number of questions in â¢Øæ ·¤ô ¥ÀUè ÌÚUã ¿ñ·¤ ·¤ÚU Üð¢U ç·¤ Øð ÂêÚðU ãñ¢UÐ ÎôáÂêæü ÂéçSÌ·¤æ
the booklet with the information printed on the cover çÁÙ×ð¢ ÂëDU/ÂýàÙ ·¤× ãô¢ Øæ ÎéÕæÚUæ ¥æ »Øð ãô¢ Øæ âèçÚUØÜU ×ð¢ Ù ãô¢
page. Faulty booklets due to pages/questions missing ¥ÍæüÌ ç·¤âè Öè Âý·¤æÚU ·¤è æéçÅUÂêæü ÂéçSÌ·¤æ Sßè·¤æÚU Ù ·¤Úð¢U ÌÍæ
or duplicate or not in serial order or any other ©âè âר ©âð ÜUõÅUæ·¤ÚU ©â·ð¤ SÍæÙ ÂÚU ÎêâÚUè âãè ÂýàÙ-ÂéçSÌ·¤æ Üð
discrepancy should be got replaced immediately by a
correct booklet from the invigilator within the period
Üð¢Ð U §â·ð¤ çܰ ¥æÂ·¤ô Âæ¡¿ ç×ÙÅU çÎØð ÁæØð¢»ðÐ ©â·ð¤ ÕæÎ Ù Ìô
of 5 minutes. Afterwards, neither the Question Booklet ¥æÂ·¤è ÂýàÙ-ÂéçSÌ·¤æ ßæÂâ Üè ÁæØð»è ¥õÚU Ù ãè ¥æÂ·¤ô ¥çÌçÚUQ¤
will be replaced nor any extra time will be given. âר çÎØæ ÁæØð»æÐ
(iii) After this verification is over, the Test Booklet Number (iii) §â Áæ¡¿ ·ð¤ ÕæÎ ÂýàÙ-ÂéçSÌ·¤æ ·¤æ Ù´ÕÚU OMR Âæ·¤ ÂÚU ¥¢ç·¤Ì ·¤Úð¢U
should be entered on the OMR Sheet and the OMR Sheet ¥UõÚU OMR Âæ·¤ ·¤æ Ù´ÕÚU §â ÂýàÙ-ÂéçSÌ·¤æ ÂÚU ¥¢ç·¤Ì ·¤ÚU Îð¢Ð
Number should be entered on this Test Booklet.
4. ÂýØð·¤ ÂýàÙ ·ð¤ çܰ ¿æÚU ©æÚU çß·¤Ë (1), (2), (3) ÌÍæ (4) çÎØð »Øð ãñ¢Ð
4. Each item has four alternative responses marked (1), (2), (3)
and (4). You have to darken the circle as indicated below on
¥æÂ·¤ô âãè ©æÚU ·ð¤ ßëæ ·¤ô ÂðÙ âð ÖÚU·¤ÚU ·¤æÜæ ·¤ÚUÙæ ãñ Áñâæ ç·¤ Ùè¿ð
the correct response against each item. çÎ¹æØæ »Øæ ãñÐ
Example : where (3) is the correct response. ©ÎæãÚUæ Ñ ÁÕç·¤ (3) âãè ©æÚU ãñÐ
5. Your responses to the items are to be indicated in the OMR 5. ÂýàÙæð´ ·ð¤ ©æÚU ·ð¤ßÜ ÂýàÙ ÂéçSÌ·¤æ ·ð¤ ¥ÎÚU çÎØð »Øð OMRU Âæ·¤ ÂÚU ãè
Sheet given inside the Booklet only. If you mark your ¥´ç·¤Ì ·¤ÚUÙð ãñ´Ð ØçÎ ¥æÂ OMRU Âæ·¤ ÂÚU çÎØð »Øð ßëæ ·ð¤ ¥Üæßæ ç·¤âè
response at any place other than in the circle in the OMR ¥Ø SÍæÙ ÂÚU ©æÚU ç¿ãæ¢ç·¤Ì ·¤ÚUÌð ãñ´, Ìô ©â·¤æ ×êËUØæ¢·¤Ù Ùãè¢ ãô»æÐ
Sheet, it will not be evaluated.
6. ¥ÎÚU çÎØð »Øð çÙÎðüàæô¢ ·¤ô ØæÙÂêßü·¤ Âɸð¢UÐ
6. Read instructions given inside carefully.
7. ·¤ææ ·¤æ× (Rough Work) §â ÂéçSÌ·¤æ ·ð¤ ¥çÌ× ÂëDU ÂÚU ·¤Úð¢UÐ
7. Rough Work is to be done in the end of this booklet.
8. If you write your Name, Roll Number, Phone Number or 8. ØçÎ ¥æÂ OMR Âæ·¤ ÂÚU çÙØÌ SÍæÙ ·ð¤ ¥Üæßæ ¥ÂÙæ Ùæ×, ÚUæðÜ ÙÕÚU,
put any mark on any part of the OMR Sheet, except for the ȤæðÙ ÙÕÚU Øæ ·¤æð§ü Öè °ðâæ ç¿q çÁââð ¥æÂ·¤è Âã¿æÙ ãæð â·ð¤, ¥´ç·¤Ì ·¤ÚUÌð
space allotted for the relevant entries, which may disclose ãñ´ ¥Íßæ ¥ÖÎý Öæáæ ·¤æ ÂýØæð» ·¤ÚUÌð ãñ´, Øæ ·¤æð§ü ¥Ø ¥Ùéç¿Ì âæÏÙ ·¤æ
your identity, or use abusive language or employ any other ÂýØæð» ·¤ÚUÌð ãñ´, Áñâð ç·¤ ¥´ç·¤Ì ç·¤Øð »Øð ©æÚU ·¤æð ç×ÅUæÙæ Øæ âÈð¤Î SØæãè âð
unfair means, such as change of response by scratching or ÕÎÜÙæ Ìæð ÂÚUèÿææ ·ð¤ çÜØð ¥ØæðØ ææðçáÌ ç·¤Øð Áæ â·¤Ìð ãñ´Ð
using white fluid, you will render yourself liable to
disqualification. 9. ¥æÂ·¤ô ÂÚUèÿææ â׿# ãôÙð ¤ÂÚU ×êÜ OMR Âæ·¤ çÙÚUèÿæ·¤ ×ãôÎØ ·¤ô ÜUõÅUæÙæ
9. You have to return the original OMR Sheet to the invigilators ¥æßàØ·¤ ãñ ¥õÚU ÂÚUèÿææ â׿ç# ·ð¤ ÕæÎ ©âð ¥ÂÙð âæÍ ÂÚUèÿææ ÖßÙ âð ÕæãÚU
at the end of the examination compulsorily and must not Ù Üð·¤ÚU ÁæØð¢Ð ãæÜæ´ç·¤ ¥æÂ ÂÚUèÿææ â׿ç# ÂÚU ×êÜ ÂýàÙ-ÂéçSÌ·¤æ ÌÍæ OMR
carry it with you outside the Examination Hall. You are Âæ·¤ ·¤è ÇéUÜè·ð¤ÅU ÂýçÌ ¥ÂÙð âæÍ Üð Áæ â·¤Ìð ãñ´Ð
however, allowed to carry original question booklet and 10. ·ð¤ßÜ ÙèÜð/·¤æÜð ÕæÜU ßæ§ZÅU ÂðÙ ·¤æ ãè §SÌð×æÜ ·¤Úð¢UÐ
duplicate copy of OMR Sheet on conclusion of examination.
10. Use only Blue/Black Ball point pen. 11. ç·¤âè Öè Âý·¤æÚU ·¤æ ⢻淤 (·ñ¤Ü·é¤ÜðÅUÚU) UØæ Üæ» ÅðUÕÜ ¥æçÎ ·¤æ
11. Use of any calculator or log table etc., is prohibited.
ÂýØô» ßçÁüÌ ãñÐ
12. There are no negative marks for incorrect answers. 12. »ÜÌ ©æÚUæð´ ·ð¤ çܰ ·¤æð§ü Ù·¤æÚUæ×·¤ ¥´·¤ Ùãè´ ãñ´Ð
Note : This paper contains fifty (50) objective type questions of two (2) marks each. All questions
are compulsory. Choose the most appropriate option.
1. How many strings of 5 digits have the property that the sum of their digits is 7 ?
(1) 66 (2) 330 (3) 495 (4) 99
2. Consider an experiment of tossing two fair dice, one black and one red. What is the probability
that the number on the black die divides the number on red die ?
22 12 14 6
(1) (2) (3) (4)
36 36 36 36
3. In how many ways can 15 indistinguishable fish be placed into 5 different ponds, so that
each pond contains atleast one fish ?
(1) 1001 (2) 3876 (3) 775 (4) 200
5. Consider a Hamiltonian Graph (G) with no loops and parallel edges. Which of the following
is true with respect to this Graph (G) ?
(a) deg (n)/n/2 for each vertex of G
(b) |E(G)|/1/2 (n21) (n22)12 edges
(c) deg (n)1deg (w)/n for every n and v not connected by an edge
(1) (a) and (b) (2) (b) and (c) (3) (a) and (c) (4) (a), (b) and (c)
8. If my computations are correct and I pay the electric bill, then I will run out of money. If I
dont pay the electric bill, the power will be turned off. Therefore, if I dont run out of money
and the power is still on, then my computations are incorrect.
Convert this argument into logical notations using the variables c, b, r, p for propositions of
computations, electric bills, out of money and the power respectively. (Where Ø means
NOT)
(1) if (cÙb)®r and Øb®Øp, then (ØrÙp)®Øc
(2) if (cÚb)®r and Øb®Øp, then (rÙp)®c
(3) if (cÙb)®r and Øp®Øb, then (ØrÚp)®Øc
(4) if (cÚb)®r and Øb®Øp, then (ØrÙp)®Øc
12. Which of the following, in C++, is inherited in a derived class from base class ?
(1) constructor (2) destructor (3) data members (4) virtual methods
15. When the inheritance is private, the private methods in base class are __________ in the
derived class (in C++).
(1) inaccessible (2) accessible (3) protected (4) public
17. Which of the following concurrency protocol ensures both conflict serializability and freedom
from deadlock ?
(a) z - phase Locking
(b) Time stamp - ordering
(1) Both (a) and (b) (2) (a) only
(3) (b) only (4) Neither (a) nor (b)
18. Drop Table cannot be used to drop a Table referenced by __________ constraint.
(a) Primary key (b) Sub key (c) Super key (d) Foreign key
(1) (a) (2) (a), (b) and (c) (3) (d) (4) (a) and (d)
19. Database applications were built directly on top of file system to overcome the following
drawbacks of using file-systems :
(a) Data redundancy and inconsistency
(b) Difficulty in accessing Data
(c) Data isolation
(d) Integrity problems
(1) (a) (2) (a) and (d)
(3) (a), (b) and (c) (4) (a), (b), (c) and (d)
20. For a weak entity set to be meaningful, it must be associated with another entity set in
combination with some of their attribute values, is called as :
(1) Neighbour Set (2) Strong Entity Set
(3) Owner Entity Set (4) Weak Set
(1) (2)
(3) (4)
22. The inorder and preorder Traversal of binary Tree are dbeafcg and abdecfg respectively.
The post-order Traversal is __________.
(1) dbefacg (2) debfagc (3) dbefcga (4) debfgca
23. Level order Traversal of a rooted Tree can be done by starting from root and performing :
(1) Breadth First Search (2) Depth First Search
(3) Root Search (4) Deep Search
26. Which of the following protocols is an application layer protocol that establishes, manages
and terminates multimedia sessions ?
(1) Session Maintenance Protocol
(2) Real - time Streaming Protocol
(3) Real - time Transport Control Protocol
(4) Session Initiation Protocol
28. Which of the following is not associated with the session layer ?
(1) Dialog control
(2) Token management
(3) Semantics of the information transmitted
(4) Synchronization
29. What is the size of the total length field in IPv 4 datagram ?
(1) 4 bits (2) 8 bits (3) 16 bits (4) 32 bits
33. If all the production rules have single non - terminal symbol on the left side, the grammar
defined is :
(1) context free grammar (2) context sensitive grammar
(3) unrestricted grammar (4) phrase grammar
37. Let Pi and Pj be two processes, R be the set of variables read from memory, and W be the set
of variables written to memory. For the concurrent execution of two processes Pi and Pj
which of the following conditions is not true ?
(1) R(Pi) Ç W(Pj)5F (2) W(Pi) Ç R(Pj)5F
(3) R(Pi) Ç R(Pj)5F (4) W(Pi) Ç W(Pj)5F
38. A LRU page replacement is used with four page frames and eight pages. How many page
faults will occur with the reference string 0172327103 if the four frames are initially empty ?
(1) 6 (2) 7 (3) 5 (4) 8
40. The Unix Kernel maintains two key data structures related to processes, the process table
and the user structure. Which of the following information is not the part of user
structure ?
(1) File descriptor table (2) System call state
(3) Scheduling parameters (4) Kernel stack
43. Which process model is also called as classic life cycle model ?
(1) Waterfall model (2) RAD model
(3) Prototyping model (4) Incremental model
45. Which one from the following is highly associated activity of project planning ?
(1) Keep track of the project progress.
(2) Compare actual and planned progress and costs.
(3) Identify the activities, milestones and deliverables produced by a project.
(4) Both (2) and (3).
46. In the case of parallelization, Amdahls law states that if P is the proportion of a program
that can be made parallel and (12P) is the proportion that cannot be parallelized, then the
maximum speed-up that can be achieved by using N processors is :
1 1
1 1
(1) (2) (3) P (4) (1 2 P)
(1 2 P) 1 N.P (N 2 1)P 1 P (1 2 P) 1 P1
N N
47. Which of the following statements is incorrect for Parallel Virtual Machine (PVM) ?
(1) The PVM communication model provides asynchronous blocking send, asynchronous
blocking receive, and non-blocking receive function.
(2) Message buffers are allocated dynamically.
(3) The PVM communication model assumes that any task can send a message to any
other PVM task and that there is no limit to the size or number of such messages.
(4) In PVM model, the message order is not preserved.
49. Which of the following statements is FALSE about weak entity set ?
(1) Weak entities can be deleted automatically when their strong entity is deleted.
(2) Weak entity set avoids the data duplication and consequent possible inconsistencies
caused by duplicating the key of the strong entity.
(3) A weak entity set has no primary keys unless attributes of the strong entity set on
which it depends are included.
(4) Tuples in a weak entity set are not partitioned according to their relationship with
tuples in a strong entity set.
50. Which of the following is not valid with reference to Message Passing Interface (MPI) ?
(1) MPI can run on any hardware platform.
(2) The programming model is a distributed memory model.
(3) All parallelism is implicit.
(4) MPI - Comm - Size returns the total number of MPI processes in specified
communication.
-o0o-
Note : This paper contains seventy five (75) objective type questions of two (2) marks each.
All questions are compulsory.
1. For the 8 - bit word 00111001, the check bits stored with it would be 0111. Suppose when
the word is read from memory, the check bits are calculated to be 1101. What is the data
word that was read from memory ?
(1) 10011001 (2) 00011001 (3) 00111000 (4) 11000110
2. Consider a 32 - bit microprocessor, with a 16 - bit external data bus, driven by an 8 MHz
input clock. Assume that this microprocessor has a bus cycle whose minimum duration
equals four input clock cycles. What is the maximum data transfer rate for this
microprocessor ?
(1) 83106 bytes/sec (2) 43106 bytes/sec
(3) 163106 bytes/sec (4) 43109 bytes/sec
5. The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an average for
executing an instruction. The fifty percent of the cycles use memory bus. A memory read/
write employs one machine cycle. For execution of the programs, the system utilizes 90 percent
of the CPU time. For block data transfer, an IO device is attached to the system while CPU
executes the background programs continuously. What is the maximum IO data transfer
rate if programmed IO data transfer technique is used ?
(1) 500 Kbytes/sec (2) 2.2 Mbytes/sec (3) 125 Kbytes/sec (4) 250 Kbytes/sec
7. Let E1 and E2 be two entities in E-R diagram with simple single valued attributes. R1 and R2
are two relationships between E1 and E2 where R1 is one - many and R2 is many - many.
R1 and R2 donot have any attribute of their own. How many minimum number of tables are
required to represent this situation in the Relational Model ?
(1) 4 (2) 3 (3) 2 (4) 1
9. Select the False statement from the following statements about Normal Forms :
(1) Lossless preserving decomposition into 3NF is always possible
(2) Lossless preserving decomposition into BCNF is always possible
(3) Any Relation with two attributes is in BCNF
(4) BCNF is stronger than 3NF
11. The relation schemas R1 and R2 form a Lossless join decomposition of R if and only if :
(a) R1ÇR2 (R12R2)
(b) R1®R2
(c) R1ÇR2 (R22R1)
(d) R2®R1ÇR2
Codes :
(1) (a) and (b) happens (2) (a) and (d) happens
(3) (a) and (c) happens (4) (b) and (c) happens
12. In the indexed scheme of blocks to a file, the maximum possible size of the file depends on :
(1) The number of blocks used for index and the size of index
(2) Size of Blocks and size of Address
(3) Size of index
(4) Size of Block
14. Consider a triangle A(0,0), B(1,1) and C(5,2). The triangle has to be rotated by an angle of
458 about the point P(21, 21). What shall be the coordinates of the new triangle ?
9
(1) ( ) (
)
A’ 5 1, 2 2 1 , B’ 5 21, 2 2 2 1 and C’ 5 3 2 2 1,
2
2 2 1
9
(2) ( ) (
)
A’ 5 1, 2 2 1 , B’ 5 2 2 2 1 , 21 and C’ 5 3 2 2 1,
2
2 2 1
9
(3) ( ) (
)
A’ 5 2 1, 2 2 1 , B’ 5 21, 2 2 2 1 and C’ 5 3 2 2 1,
2
2 2 1
9
(4) A’ 5 ( ) ( )
2 2 1 , 2 1 , B’ 5 21, 2 2 2 1 and C’ 5 3 2 2 1,
2
2 2 1
15. The process of dividing an analog signal into a string of discrete outputs, each of constant
amplitude, is called :
(1) Strobing (2) Amplification (3) Conditioning (4) Quantization
16. Which of the following is not a basic primitive of the Graphics Kernel System (GKS) ?
(1) POLYLINE (2) POLYDRAW (3) FILL AREA (4) POLYMARKER
19. Minimal deterministic finite automaton for the language L 5 {0 n ? n / 0 , n ≠ 4} will have :
(1) 1 final state among 5 states (2) 4 final states among 5 states
(3) 1 final state among 6 states (4) 5 final states among 6 states
21. The transition function for the language L5{w?na(w) and nb(w) are both odd} is given by :
d (q0, a)5q1 ; d (q0, b)5q2
d (q1, a)5q0 ; d (q1, b)5q3
d (q2, a)5q3 ; d (q2, b)5q0
d (q3, a)5q2 ; d (q3, b)5q1
The initial and final states of the automata are :
(1) q0 and q0 respectively (2) q0 and q1 respectively
(3) q0 and q2 respectively (4) q0 and q3 respectively
23. Which of the following is false for the programming language PROLOG ?
(1) A PROLOG variable can only be assigned to a value once
(2) PROLOG is a strongly typed language
(3) The scope of a variable in PROLOG is a single clause or rule
(4) The scope of a variable in PROLOG is a single query
25. Which transmission technique guarantees that data packets will be received by the receiver
in the same order in which they were sent by the sender ?
(1) Broadcasting (2) Unicasting
(3) Packet switching (4) Circuit switching
26. Which of the following control fields in TCP header is used to specify whether the sender has
no more data to transmit ?
(1) FIN (2) RST (3) SYN (4) PSH
29. Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice
signal. It is required to sample the signal at twice the highest frequency (two samples per
hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits ?
(1) 32 kbps (2) 64 kbps (3) 128 kbps (4) 256 kbps
34. Consider a hash table of size m5100 and the hash function h(k)5floor (m(kA mod 1)) for
A5
( 5 21 ) 5 0.618033 . Compute the location to which the key k5123456 is placed in
2
hash table.
(1) 77 (2) 82 (3) 88 (4) 89
35. Let f (n) and g (n) be asymptotically non-negative functions. Which of the following is
correct ?
(1) u ( f (n)*g(n))5min (f (n), g(n)) (2) u ( f (n)*g(n))5max (f (n), g(n))
(3) u ( f (n)1g(n))5min (f (n), g(n)) (4) u ( f (n)1g(n))5max (f (n), g(n))
n n
(1) h (2) zh (3) ceil h (4) ceil h 1 1
z z
38. The Servlet Response interface enables a servlet to formulate a response for a client using the
method __________.
(1) void log(Exception e, String s) (2) void destroy( )
(3) int get ServerPort( ) (4) void set ContextType(String type)
40. In XML we can specify the frequency of an element by using the symbols :
(1) 1*! (2) #*! (3) 1*? (4) 2*?
42. Module design is used to maximize cohesion and minimize coupling. Which of the following
is the key to implement this rule ?
(1) Inheritance (2) Polymorphism (3) Encapsulation (4) Abstraction
43. Verification :
(1) refers to the set of activities that ensure that software correctly implements a specific
function
(2) gives answer to the question - Are we building the product right ?
(3) requires execution of software
(4) both (1) and (2)
44. Which design matric is used to measure the compactness of the program in terms of lines of
code ?
(1) Consistency (2) Conciseness (3) Efficiency (4) Accuracy
49. Match the following for operating system techniques with the most appropriate advantage :
List - I List - II
(a) Spooling (i) Allows several jobs in memory to improve CPU
utilization
(b) Multiprogramming (ii) Access to shared resources among geographically
dispersed computers in a transparent way
(c) Time sharing (iii) Overlapping I/O and computations
(d) Distributed computing (iv) Allows many users to share a computer
simultaneously by switching processor frequently
Codes :
(a) (b) (c) (d)
(1) (iii) (i) (ii) (iv)
(2) (iii) (i) (iv) (ii)
(3) (iv) (iii) (ii) (i)
(4) (ii) (iii) (iv) (i)
50. Which of the following statements is not true for Multi Level Feedback Queue processor
scheduling algorithm ?
(1) Queues have different priorities
(2) Each queue may have different scheduling algorithm
(3) Processes are permanently assigned to a queue
(4) This algorithm can be configured to match a specific system under design
51. What is the most appropriate function of Memory Management Unit (MMU) ?
(1) It is an associative memory to store TLB
(2) It is a technique of supporting multiprogramming by creating dynamic partitions
(3) It is a chip to map virtual address to physical address
(4) It is an algorithm to allocate and deallocate main memory to a process
53. In __________ allocation method for disk block allocation in a file system, insertion and
deletion of blocks in a file is easy.
(1) Index (2) Linked (3) Contiguous (4) Bit Map
56. Match the following knowledge representation techniques with their applications :
List - I List - II
(a) Frames (i) Pictorial representation of objects, their
attributes and relationships
(b) Conceptual dependencies (ii) To describe real world stereotype events
(c) Associative networks (iii) Record like structures for grouping closely
related knowledge
(d) Scripts (iv) Structures and primitives to represent
sentences
Codes :
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (iii) (iv) (ii) (i)
(3) (iv) (iii) (i) (ii)
(4) (iv) (iii) (ii) (i)
58. Which of the following statements is true for Branch - and - Bound search ?
(1) Underestimates of remaining distance may cause deviation from optimal path.
(2) Overestimates cant cause right path to be overlooked.
(3) Dynamic programming principle can be used to discard redundant partial paths.
(4) All of the above
59. Match the following with respect to heuristic search techniques :
List - I List - II
(a) Steepest - accent Hill Climbing (i) Keeps track of all partial paths which can be
candidate for further exploration
(b) Branch - and - bound (ii) Discover problem state(s) that satisfy a set of
constraints
(c) Constraint satisfaction (iii) Detects difference between current state and
goal state
(d) Means - end - analysis (iv) Considers all moves from current state and
selects best move
Codes :
(a) (b) (c) (d)
(1) (i) (iv) (iii) (ii)
(2) (iv) (i) (ii) (iii)
(3) (i) (iv) (ii) (iii)
(4) (iv) (ii) (i) (iii)
60. Match the following for methods of MIS development :
List - I List - II
(a) Joint Application Design (JAD) (i) Delivers functionality in rapid iteration
measured in weeks and needs frequent
communication, development, testing and
delivery
(b) Computer Aided Software Engg (ii) Reusable applications generally with one
specific function. It is closely linked with idea
of web services and service oriented
architecture.
(c) Agile development (iii) Tools to automate many tasks of SDLC
(d) Component based technology (iv) A group based tool for collecting user
requirements and creating system design.
Mostly used in analysis and design stages of
SDLC
Codes :
(a) (b) (c) (d)
(1) (i) (iii) (ii) (iv)
(2) (iv) (iii) (i) (ii)
(3) (iii) (iv) (i) (ii)
(4) (iii) (i) (iv) (ii)
G2 : S ® A ? B
A ® a A b ? ab
B®abB?e
Which of the following is correct ?
(1) G1 is ambiguous and G2 is unambiguous grammars
(2) G1 is unambiguous and G2 is ambiguous grammars
(3) both G1 and G2 are ambiguous grammars
(4) both G1 and G2 are unambiguous grammars
67. In the Hungarian method for solving assignment problem, an optimal assignment requires
that the maximum number of lines that can be drawn through squares with zero opportunity
cost be equal to the number of :
→ Warehouse
↓ W1 W2 W3 Supply
F1 16 20 12 200
Factory F2 14 8 18 160
F3 26 24 16 90
Demand 180 120 150
The initial basic feasible solution of the above transportation problem using Vogels
Approximation Method (VAM) is given below :
→ Warehouse
W1 W2 W3 Supply
↓ F1 16 (140) 20 12 (60) 200
Factory F2 14 (40) 8 (120) 18 160
F3 26 24 16 (90) 90
Demand 180 120 150
70. Consider the two class classification task that consists of the following points :
Class C1 : [1 1.5] [1 21.5]
Class C2 : [22 2.5] [22 22.5]
The decision boundary between the two classes using single perceptron is given by :
(1) x 11x 211.550 (2) x 11x 221.550
(3) x 1 11.550 (4) x 1 21.550
⊕ ≡ max
f (A1B) is __________ . Note :
⊗ ≡ min
(1) {(11, 0.8), (13, 1), (15,1)}
(2) {(11, 0.3), (12, 0.5), (13, 1), (14, 1), (15, 1), (16, 0.5), (17, 0.2)}
(3) {(11, 0.3), (12, 0.5), (13, 0.6), (14, 1), (15, 1), (16, 0.5), (17, 0.2)}
(4) {(11, 0.3), (12, 0.5), (13, 0.6), (14, 1), (15, 0.7), (16, 0.5), (17, 0.2)}
72. Suppose the function y and a fuzzy integer number around 24 for x are given as
y5(x23) 212.
Around 24 5{(2, 0.3), (3, 0.6), (4, 1), (5, 0.6), (6, 0.3)} respectively. Then f (Around 24) is
given by :
(1) {(2, 0.6), (3, 0.3), (6, 1), (11, 0.3)}
(2) {(2, 0.6), (3, 1), (6, 1), (11, 0.3)}
(3) {(2, 0.6), (3, 1), (6, 0.6), (11, 0.3)}
(4) {(2, 0.6), (3, 0.3), (6, 0.6), (11, 0.3)}
74. WOW32 is a :
(1) Win 32 API library for creating processes and threads.
(2) Special kind of file system to the NT name space.
(3) Kernel - mode objects accessible through Win 32 API
(4) Special execution environment used to run 16 bit Windows applications on 32 - bit
machines.
-o0o-
Note : This paper contains fifty (50) objective type questions of two (2) marks each. All questions
are compulsory. Choose the most appropriate option.
1. How many committees of five people can be chosen from 20 men and 12 women such that
each committee contains atleast three women ?
(1) 75240 (2) 52492 (3) 41800 (4) 9900
The two distinct sets of vertices, which make the graph bipartite are :
(1) (v1, v4, v6); (v2, v3, v5, v7, v8) (2) (v1, v7, v8); (v2, v3, v5, v6)
(3) (v1, v4, v6, v7); (v2, v3, v5, v8) (4) (v1, v4, v6, v7, v8); (v2, v3, v5)
(b)
(c)
Codes :
(1) (a) and (b) (2) (b) and (c) (3) (a) and (c) (4) (a), (b) and (c)
6. Which of the following arguments are not valid ?
(a) If Gora gets the job and works hard, then he will be promoted. If Gora gets promotion,
then he will be happy. He will not be happy, therefore, either he will not get the job or
he will not work hard.
(b) Either Puneet is not guilty or Pankaj is telling the truth. Pankaj is not telling the truth,
therefore, Puneet is not guilty.
(c) If n is a real number such that n>1, then n2>1. Suppose that n2>1, then n>1.
Codes :
(1) (a) and (c) (2) (b) and (c) (3) (a), (b) and (c) (4) (a) and (b)
7. Let P(m, n) be the statement m divides n where the Universe of discourse for both the
variables is the set of positive integers. Determine the truth values of the following
propositions.
(a) $m "n P(m, n) (b) "n P(1, n) (c) "m "n P(m, n)
Codes :
(1) (a) - True; (b) - True; (c) - False (2) (a) - True; (b) - False; (c) - False
(3) (a) - False; (b) - False; (c) - False (4) (a) - True; (b) - True; (c) - True
8. Match the following terms :
List - I List - II
(a) Vacuous proof (i) A proof that the implication p ® q is true based on the fact that
p is false.
(b) Trivial proof (ii) A proof that the implication p ® q is true based on the fact that
q is true.
(c) Direct proof (iii) A proof that the implication p ® q is true that proceeds by
showing that q must be true when p is true.
(d) Indirect proof (iv) A proof that the implication p ® q is true that proceeds by
showing that p must be false when q is false.
Codes :
(a) (b) (c) (d)
(1) (i) (ii) (iii) (iv)
(2) (ii) (iii) (i) (iv)
(3) (iii) (ii) (iv) (i)
(4) (iv) (iii) (ii) (i)
10. Which of the following property/ies a Group G must hold, in order to be an Abelian group ?
(a) The distributive property
(b) The commutative property
(c) The symmetric property
Codes :
(1) (a) and (b) (2) (b) and (c) (3) (a) only (4) (b) only
17. In C++, which system - provided function is called when no handler is provided to deal with
an exception ?
(1) terminate ( ) (2) unexpected ( ) (3) abort ( ) (4) kill ( )
18. Which of the following provides the best description of an entity type ?
(1) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes)
(2) A value given to a particular attribute (e.g. height - 230 cm)
(3) A thing that we wish to collect data about zero or more, possibly real world examples
of it may exist
(4) A template for a group of things with the same set of characteristics that may exist in
the real world
19. Data which improves the performance and accessibility of the database are called :
(1) Indexes (2) User Data
(3) Application Metadata (4) Data Dictionary
20. A relation R = {A, B, C, D, E, F,G} is given with following set of functional dependencies :
F = {AD ® E, BE ® F, B ® C, AF ® G}
Which of the following is a candidate key ?
(1) A (2) AB (3) ABC (4) ABD
21. Which of the following services is not provided by wireless access point in 802.11 WLAN ?
(1) Association (2) Disassociation (3) Error correction (4) Integration
22. Which of the following fields in IPv 4 datagram is not related to fragmentation ?
(1) Type of service (2) Fragment offset (3) Flags (4) Identification
24. In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency
band in adjacent cells. If 840 frequencies are available, how many can be used in a given
cell ?
(1) 280 (2) 210 (3) 140 (4) 120
25. Using p53, q513, d57 and e53 in the RSA algorithm, what is the value of ciphertext for a
plain text 5 ?
(1) 13 (2) 21 (3) 26 (4) 33
26. A virtual memory has a page size of 1K words. There are eight pages and four blocks. The
associative memory page table contains the following entries :
Page Block
0 3
2 1
5 2
7 0
Which of the following list of virtual addresses (in decimal) will not cause any page fault if
referenced by the CPU ?
(1) 1024, 3072, 4096, 6144 (2) 1234, 4012, 5000, 6200
(3) 1020, 3012, 6120, 8100 (4) 2021, 4050, 5112, 7100
27. Suppose that the number of instructions executed between page fault is directly proportional
to the number of page frames allocated to a program. If the available memory is doubled, the
mean interval between page faults is also doubled. Further, consider that a normal instruction
takes one microsecond, but if a page fault occurs, it takes 2001 microseconds. If a program
takes 60 sec to run, during which time it gets 15,000 page faults, how long would it take to
run if twice as much memory were available ?
(1) 60 sec (2) 30 sec (3) 45 sec (4) 10 sec
28. Consider a disk with 16384 bytes per track having a rotation time of 16 msec and average
seek time of 40 msec. What is the time in msec to read a block of 1024 bytes from this
disk ?
(1) 57 msec (2) 49 msec (3) 48 msec (4) 17 msec
30. In Unix, the login prompt can be changed by changing the contents of the file __________.
(1) contrab (2) init (3) gettydefs (4) inittab
31. A data cube C, has n dimensions, and each dimension has exactly p distinct values in the
base cuboid. Assume that there are no concept hierarchies associated with the dimensions.
What is the maximum number of cells possible in the data cube, C ?
(1) pn (2) p (3) (2n21) p11 (4) (p11)n
32. Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the
1
time, that the proportion of persons having meningitis is , and that the proportion of
50000
1
people having stiff neck is . Then the percentage of people who had meningitis and
20
complain about stiff neck is :
(1) 0.01% (2) 0.02% (3) 0.04% (4) 0.05%
33. __________ system is market oriented and is used for data analysis by knowledge workers
including Managers, Executives and Analysts.
(1) OLTP (2) OLAP (3) Data System (4) Market System
34. __________ allows selection of the relevant information necessary for the data warehouse.
(1) The Top - Down View (2) Data Warehouse View
(3) Datasource View (4) Business Query View
37. The number of disk pages access in B - tree search, where h is height, n is the number of keys,
and t is the minimum degree, is :
(1) u (logn h*t) (2) u (logt n*h) (3) u (logh n) (4) u (logt n)
(1) 2 3 4 6 7 13 15 17 18 18 20
(2) 20 18 18 17 15 13 7 6 4 3 2
(3) 15 13 20 4 7 17 18 2 3 6 18
(4) 2 4 3 13 7 6 15 17 20 18 18
42. What will be the hexadecimal value in the register ax (32-bit) after executing the following
instructions ?
mov al, 15
mov ah, 15
xor al, al
mov cl, 3
shr ax, cl
Codes :
(1) 0F00 h (2) 0F0F h (3) 01E0 h (4) FFFF h
45. The __________ transfers the executable image of a C++ program from hard disk to main
memory.
(1) Compiler (2) Linker (3) Debugger (4) Loader
46. In software testing, how the error, fault and failure are related to each other ?
(1) Error leads to failure but fault is not related to error and failure.
(2) Fault leads to failure but error is not related to fault and failure.
(3) Error leads to fault and fault leads to failure.
(4) Fault leads to error and error leads to failure.
48. How many solutions are there for the equation x1y1z1u529 subject to the constraints
that x/1, y/2, z/3 and u/0 ?
(1) 4960 (2) 2600 (3) 23751 (4) 8855
49. A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size
if i-nodes contain 10 direct entries and one single, double and triple indirect entry each ?
(1) 32 GB (2) 64 GB (3) 16 GB (4) 1 GB
50. __________ uses electronic means to transfer funds directly from one account to another
rather than by cheque or cash.
(1) M-Banking (2) E-Banking (3) O-Banking (4) C-Banking
-o0o-
Note : This paper contains seventy five (75) objective type questions of two (2) marks each.
All questions are compulsory.
1. The three outputs x1x2x3 from the 833 priority encoder are used to provide a vector address
of the form 101x1x2x300. What is the second highest priority vector address in hexadecimal
if the vector addresses are starting from the one with the highest priority ?
(1) BC (2) A4 (3) BD (4) AC
3. Which of the following 8085 microprocessor hardware interrupt has the lowest priority ?
(1) RST 6.5 (2) RST 7.5 (3) TRAP (4) INTR
4. A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires
100 nsec and a memory cycle requires 250 nsec. What percentage of memorys total operating
time is required for refreshes ?
(1) 0.64 (2) 0.96 (3) 2.00 (4) 0.32
5. A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are
assembled from a device that transmits characters at a rate of 4800 characters per second.
The CPU is fetching and executing instructions at an average rate of one million instructions
per second. By how much will the CPU be slowed down because of the DMA transfer ?
(1) 0.06% (2) 0.12% (3) 1.2% (4) 2.5%
8. Forward chaining systems are __________ where as backward chaining systems are
__________.
(1) Data driven, Data driven (2) Goal driven, Data driven
(3) Data driven, Goal driven (4) Goal driven, Goal driven
11. A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute
with each frame carrying an average of 8,000 bits. What is the throughput of this network ?
(1) 2 Mbps (2) 60 Mbps (3) 120 Mbps (4) 10 Mbps
12. Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters,
each containing 9 regions of 10 routers, then total number of entries in the routing table is
__________.
(1) 25 (2) 27 (3) 53 (4) 72
14. In electronic mail, which of the following protocols allows the transfer of multimedia
messages ?
(1) IMAP (2) SMTP (3) POP 3 (4) MIME
15. A device is sending out data at the rate of 2000 bps. How long does it take to send a file of
1,00,000 characters ?
(1) 50 (2) 200 (3) 400 (4) 800
16. In Activity - Selection problem, each activity i has a start time si and a finish time fi where
si £ fi . Activities i and j are compatible if :
(1) si ³ fj (2) sj ³ fi (3) si ³ fj or sj ³ fi (4) si ³ fj and sj ³ fi
Y 5 b, d, c, a, b, a .
The longest common subsequence of X and Y is :
(1) b, c, a (2) c, a, b (3) b, c, a, a (4) b, c, b, a
18. If there are n integers to sort, each integer has d digits and each digit is in the set {1, 2, ..., k},
radix sort can sort the numbers in :
(1) O(d n k) (2) O(d nk) (3) O((d1n)k) (4) O(d(n1k))
u(1) if n ≤ 80
T(n) ≤ n 7n
T s 1 T 10 1 6 1 O(n) if n > 80
is :
(1) O(lg n) (2) O(n)
(3) O(n lg n) (4) None of the above
20. Floyd-Warshall algorithm utilizes __________ to solve the all-pairs shortest paths problem
on a directed graph in __________ time.
(1) Greedy algorithm, u(V3) (2) Greedy algorithm, u(V2 lgn)
(3) Dynamic programming, u(V ) 3 (4) Dynamic programming, u(V2 lgn)
2 3 1 1 1
q(1 : 4) 5 , , , , where p(i) and q(i) denotes the probability with which we search ai
8 8 8 8 8
and the identifier x being searched satisfy ai < x < ai11 respectively. The optimal search tree
is given by :
(1) (2)
(3) (4)
22. The family of context sensitive languages is __________ under union and __________ under
reversal.
(1) closed, not closed (2) not closed, not closed
(3) closed, closed (4) not closed, closed
24. The language of all non-null strings of as can be defined by a context free grammar as
follow :
S ® a S|S a| a
The word a3 can be generated by __________ different trees.
(1) Two (2) Three (3) Four (4) Five
27. There are exactly __________ different finite automata with three states x, y and z over the
alphabet {a, b} where x is always the start state.
(1) 64 (2) 256 (3) 1024 (4) 5832
32. The end points of a given line are (0, 0) and (6, 18). Compute each value of y as x steps from
0 to 3, by using equation of straight line :
(1) For x50, y50; x51, y53; x52, y56; x53, y59
(2) For x50, y51; x51, y53; x52, y54; x53, y59
(3) For x50, y52; x51, y53; x52, y56; x53, y59
(4) For x50, y50; x51, y53; x52, y54; x53, y56
33. Which of the following graphic primitives are considered as the basic building blocks of
computer graphics ?
(a) Points (b) Lines (c) Polylines (d) Polygons
Codes :
(1) (a) only (2) (a) and (b)
(3) (a), (b) and (c) (4) (a), (b), (c) and (d)
34. Javascript and Java has similar name because __________ is/are true.
(a) Javascripts syntax is loosely based on Javas syntax
(b) Javascript is stripped down version of Java
(c) Java and Javascript are originated from Island of Java
Codes :
(1) (a) only (2) (a), (b) and (c) (3) (a) and (b) (4) (a) and (c)
35. Which of the following statements are true with reference to the way of describing XML
data ?
(a) XML uses DTD to describe the data
(b) XML uses XSL to describe the data
(c) XML uses a description node to describe the data
Codes :
(1) (a) only (2) (b) only (3) (a) and (b) (4) (a) and (c)
36. Which of the following is/are correct with reference to Abstract class and interface ?
(a) A class can inherit only one Abstract class but may inherit several interfaces.
(b) An Abstract class can provide complete and default code but an interface has no code.
Codes :
(1) (a) is true (2) (b) is true
(3) Both (a) and (b) are true (4) Neither (a) nor (b) is true
39. Consider a system with twelve magnetic tape drives and three processes P1, P2 and P3. Process
P1 requires maximum ten tape drives, process P2 may need as many as four tape drives and
P3 may need upto nine tape drives. Suppose that at time t1, process P1 is holding five tape
drives, process P2 is holding two tape drives and process P3 is holding three tape drives. At
time t1, system is in :
(1) safe state (2) unsafe state (3) deadlocked state (4) starvation state
48. As compared to rental and leasing methods to acquire computer systems for a Management
Information System (MIS), purchase method has following advantage :
(1) It has high level of flexibility
(2) It doesnt require cash up-front
(3) It is a business investment
(4) Little risk of obsolescence
49. Consider the conditional entropy and mutual information for the binary symmetric channel.
12 p p
matrix is p 1 2 p where p is the transition probability. Then the conditional entropy
is given by :
(1) 1 (2) 2plog(p)2(12p)log(12p)
(3) 11plog(p)1(12p)log(12p) (4) 0
52. A basic feasible solution of a linear programming problem is said to be __________ if at least
one of the basic variable is zero.
(1) degenerate (2) non-degenerate (3) infeasible (4) unbounded
Stores
I II III IV Supply
A 4 6 8 13 50
Factories
B 13 11 10 8 70
C 14 4 10 13 30
D 9 11 13 8 50
Demand 25 35 105 20
The transportation cost in the initial basic feasible solution of the above transportation problem
using Vogels Approximation method is :
(1) 1450 (2) 1465 (3) 1480 (4) 1520
55. The character set used in Windows 2000 operating system is __________.
(1) 8 bit ASCII (2) Extended ASCII
(3) 16 bit UNICODE (4) 12 bit UNICODE
56. In Unix, the command to enable execution permission for file mylife by all is ____________.
(1) Chmod ugo1X myfile (2) Chmod a1X myfile
(3) Chmod 1X myfile (4) All of the above
58. Which of the following statements regarding the features of the object-oriented approach to
databases are true ?
(a) The ability to develop more realistic models of the real world.
(b) The ability to represent the world in a non-geometric way.
(c) The ability to develop databases using natural language approaches.
(d) The need to split objects into their component parts.
(e) The ability to develop database models based on location rather than state and behaviour.
Codes :
(1) (a), (b) and (c) (2) (b), (c) and (d) (3) (a), (d) and (e) (4) (c), (d) and (e)
60. Suppose ORACLE relation R(A, B) currently has tuples {(1, 2), (1, 3), (3, 4)} and relation
S(B, C) currently has {(2, 5), (4, 6), (7, 8)}. Consider the following two SQL queries SQ1 and
SQ2 :
SQ1 : Select *
From R Full Join S
On R.B5S.B;
SQ2 : Select *
From R Inner Join S
On R.B5S.B;
The numbers of tuples in the result of the SQL query SQ1 and the SQL query SQ2 are given
by :
(1) 2 and 6 respectively (2) 6 and 2 respectively
(3) 2 and 4 respectively (4) 4 and 2 respectively
62. The distributed system is a collection of (P) and communication is achieved in distributed
system by (Q) , where (P) and (Q) are :
(1) Loosely coupled hardware on tightly coupled software and disk sharing, respectively.
(2) Tightly coupled hardware on loosely coupled software and shared memory, respectively.
(3) Tightly coupled software on loosely coupled hardware and message passing,
respectively.
(4) Loosely coupled software on tightly coupled hardware and file sharing, respectively.
63. Consider the following three tables R, S and T. In this question, all the join operations are
natural joins (®). (p) is the projection operation of a relation :
R S T
A B B C A C
1 2 6 2 7 1
3 2 2 4 1 2
5 6 8 1 9 3
7 8 8 3 5 4
9 8 2 5 3 5
Possible answer tables for this question are also given as below :
A B C
1 2 4
1 2 5
3 2 4
A B C A B C
3 2 5
5 6 2 1 2 2 1 6 2
7 8 1 3 2 5 3 2 5 A B C
7 8 3 5 6 4 5 2 4 3 2 5
9 8 1 7 8 1 7 8 1 7 8 1
9 8 3 9 8 3 9 8 3 9 8 3
(a) (b) (c) (d)
What is the resulting table of pA,B(R®T) ® pB,C(S®T) ?
(1) (a) (2) (b) (3) (c) (4) (d)
(1)
z5 ∑ mAi (x0 ) mBi (y0 ) mCi (z)
i
(3) z 5 centroid ∑ mAi (x0 ) mBi (y0 ) mCi (z)
i
(4) z 5 centroid ∑ mAi (x0 ) mBi (y0 )
i
67. Which of the following is/are the principle components of a memory-tube display ?
(a) Flooding gun (b) Collector
(c) Phosphorus grains (d) Ground
Codes :
(1) (a) and (b) (2) (c) only (3) (d) only (4) All the above
68. Which of the following steps is/are not required for analog to digital conversion ?
(a) Sensing (b) Conversion (c) Amplification
(d) Conditioning (e) Quantization
Codes :
(1) (a) and (b) (2) (c) and (d)
(3) (a), (b) and (e) (4) None of the above
70. Consider a unit square centred at origin. The coordinates of the square are translated by a
1
factor , 1 and rotated by an angle of 908. What shall be the coordinates of the new
2
square ?
21 21 23 23
(1) , 0, , 1 , , 1 , , 0
2 2 2 2
21 1 3 3
(2) , 0 , , 1 , , 1 , , 0
2 2 2 2
21 1 23 23
(3) , 0, , 0, , 1 , , 0
2 2 2 2
21 1 23 23
(4) , 0 , , 1 , , 1 , , 0
2 2 2 2
The expression n/2 means the floor of n/2, or what you get by rounding n/2 down to the
nearest integer.
Which of the following is not an example of a string in A ?
(1) 011 (2) 0111 (3) 0011 (4) 001111
74. Which one of the following statements, related to the requirements phase in Software
Engineering, is incorrect ?
(1) Requirement validation is one of the activities in the requirements phase.
(2) Prototyping is one of the methods for requirement analysis.
(3) Modelling-oriented approach is one of the methods for specifying the functional
specifications.
(4) Function points is one of the most commonly used size metric for requirements.
75. __________ tag is an extension to HTML that can enclose any number of Javascript statements.
(1) <SCRIPT> (2) <BODY> (3) <HEAD> (4) <TITLE>
-o0o-
Paper – II
Note : This paper contains fifty (50) objective type questions of two (2) marks each. All
questions are compulsory.
1. How many different equivalence relations with exactly three different equivalence classes
are there on a set with five elements ?
(1) 10 (2) 15
(3) 25 (4) 30
2. The number of different spanning trees in complete graph, K4 and bipartite graph, K2, 2
have ______ and _______ respectively.
(1) 14, 14 (2) 16, 14
(3) 16, 4 (4) 14, 4
4. There are three cards in a box. Both sides of one card are black, both sides of one card are
red, and the third card has one black side and one red side. We pick a card at random and
observe only one side.
What is the probability that the opposite side is the same colour as the one side we
observed ?
(1) 3/4 (2) 2/3
(3) 1/2 (4) 1/3
Paper-II 2 J-87-16
5. A clique in a simple undirected graph is a complete subgraph that is not contained in any
larger complete subgraph. How many cliques are there in the graph shown below ?
(1) 2
(2) 4
(3) 5
(4) 6
(1) 1⊕0=1
(2) 1⊕1⊕1=1
(3) 1⊕1⊕0=1
(4) 1⊕1=0
7. The IEEE-754 double-precision format to represent floating point numbers, has a length
of _____ bits.
(1) 16 (2) 32
(3) 48 (4) 64
J-87-16 3 Paper-II
8. Simplified Boolean equation for the following truth table is :
x y z F
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 1
1 0 1 0
1 1 0 1
1 1 1 0
– – –– –
9. The simplified form of a Boolean equation (AB + ABC + AC) (AC + B) is :
– –
(1) AB (2) ABC
–
(3) AB (4) ABC
10. In a positive-edge-triggered JK flip-flop, if J and K both are high then the output will be
_____ on the rising edge of the clock.
Paper-II 4 J-87-16
11. Given i = 0, j = 1, k = –1
x = 0.5, y = 0.0
x * y < i + j || k
(1) –1 (2) 0
(3) 1 (4) 2
int (*f())[ ];
declares
13. Which one of the following is correct, when a class grants friend status to another class ?
(1) The member functions of the class generating friendship can access the members of
the friend class.
(2) All member functions of the class granted friendship have unrestricted access to the
members of the class granting the friendship.
14. When a method in a subclass has the same name and type signatures as a method in the
superclass, then the method in the subclass _____ the method in the superclass.
J-87-16 5 Paper-II
15. What is the value returned by the function f given below when n = 100 ?
int f (int n)
{ if (n = = 0) then return n;
else
return n + f(n-2);
16. In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as :
17. Which of the following statement(s) is/are FALSE in the context of Relational DBMS ?
I. Views in a database system are important because they help with access control by
allowing users to see only a particular subset of the data in the database.
III. An update anomaly is when it is not possible to store information unless some other,
unrelated information is stored as well.
Paper-II 6 J-87-16
18. In a relational database model, NULL values can be used for all but which one of the
following ?
(1) To allow duplicate tuples in the table by filling the primary key column(s) with
NULL.
(2) To avoid confusion with actual legitimate data values like 0 (zero) for integer
columns and ’’ (the empty string) for string columns.
(3) To leave columns in a tuple marked as ’’unknown’’ when the actual value is
unknown.
(4) To fill a column in a tuple when that column does not really ”exist” for that
particular tuple.
19. Consider the following two commands C1 and C2 on the relation R from an SQL database :
C1 : drop table R;
C2 : delete from R;
Which of the following statements is TRUE ?
I. Both C1 and C2 delete the schema for R.
II. C2 retains relation R, but deletes all tuples in R.
III. C1 deletes not only all tuples of R, but also the schema for R.
(1) I only (2) I and II only
(3) II and III only (4) I, II and III
20. Consider the following database table having A, B, C and D as its four attributes and four
possible candidate keys (I, II, III and IV) for this table :
A B C D
a1 b1 c1 d1
a2 b3 c3 d1
a1 b2 c1 d2
J-87-16 7 Paper-II
21. Consider the following binary search tree :
If we remove the root node, which of the node from the left subtree will be the new root ?
(1) 11 (2) 12
(3) 13 (4) 16
23. Suppose you are given a binary tree with n nodes, such that each node has exactly either
zero or two children. The maximum height of the tree will be
n n
(1) – +
2 1 (2) 2 1
Paper-II 8 J-87-16
24. Which of the following is not an inherent application of stack ?
A∩B–A∩B–A
(1) 15 (2) 14
(3) 13 (4) 12
26. A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit
rate ?
27. In a fully-connected mesh network with 10 computers, total ______ number of cables are
required and ______ number of ports are required for each device.
28. In TCP/IP Reference model, the job of _______ layer is to permit hosts to inject packets
into any network and travel them independently to the destination.
J-87-16 9 Paper-II
29. If there are N people in the world and are using secret key encryption/decryption for
privacy purpose, then number of secret keys required will be :
(1) N (2) (N – 1)
N(N – 1) N(N + 1)
(3) 2 (4) 2
30. Optical fiber uses reflection to guide light through a channel, in which angle of incidence
is ________ the critical angle.
31. The number of strings of length 4 that are generated by the regular expression
(0|∈)1+2* (3|∈), where | is an alternation character, {+, *} are quantification characters,
and ∈ is the null string, is :
(1) 08 (2) 10
(3) 11 (4) 12
32. The content of the accumulator after the execution of the following 8085 assembly
language program, is :
MVI A, 42H
MVI B, 05H
UGC: ADD B
DCR B
JNZ UGC
ADI 25H
HLT
(1) 82 H (2) 78 H
(3) 76 H (4) 47 H
Paper-II 10 J-87-16
33. In _______, the bodies of the two loops are merged together to form a single loop
provided that they do not make any references to each other.
(1) The grammar S → a Sb |bSa|SS|∈, where S is the only non-terminal symbol and ∈
is the null string, is ambiguous.
0 1 2 3 0 1 4 0 1 2 3 4
If FIFO page replacement algorithm is used, then the number of page faults with three
page frames and four page frames are _______ and ______ respectively.
J-87-16 11 Paper-II
37. Suppose there are four processes in execution with 12 instances of a Resource R in a
system.
The maximum need of each process and current allocation are given below :
P1 8 3
P2 9 4
P3 5 2
P4 3 1
With reference to current allocation, is system safe ? If so, what is the safe sequence ?
38. If the Disk head is located initially at track 32, find the number of disk moves required
with FCFS scheduling criteria if the disk queue of I/O blocks requests are :
39. In UNIX, _________ creates three subdirectories : ‘PIS’ and two subdirectories ‘progs’
and ‘data’ from just created subdirectory ‘PIS’.
Paper-II 12 J-87-16
40. A scheduling Algorithm assigns priority proportional to the waiting time of a process.
Every process starts with priority zero (lowest priority). The scheduler reevaluates the
process priority for every ‘T’ time units and decides next process to be scheduled. If the
process have no I/O operations and all arrive at time zero, then the scheduler implements
_________ criteria.
(4) FCFS
41. If S1 is total number of modules defined in the program architecture, S3 is the number of
modules whose correct function depends on prior processing then the number of modules
not dependent on prior processing is :
S3 S3
(1) 1+S (2) 1–S
1 1
S1 S1
(3) 1+S (4) 1–S
3 3
42. The ________ model is preferred for software development when the requirements are not
clear.
45. The extent to which a software tolerates the unexpected problems, is termed as :
46. An attacker sits between customer and Banker, and captures the information from the
customer and retransmits to the banker by altering the information. This attack is called as
______.
(A) Business intelligence and Data warehousing is used for forecasting and Data mining.
(B) Business intelligence and Data warehousing is used for analysis of large volumes of
sales data.
Paper-II 14 J-87-16
48. Pipelining improves performance by :
(A) Data scrubling is a process to upgrade the quality of data, before it is moved into
Data warehouse.
(B) Data scrubling is a process of rejecting data from data warehouse to create indexes.
____________
J-87-16 15 Paper-II
Space For Rough Work
Paper-II 16 J-87-16
PAPER-III
COMPUTER SCIENCE & APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
J-87-16 1 P.T.O.
COMPUTER SCIENCE & APPLICATIONS
PAPER – III
Note : This paper contains seventy five (75) objective type questions of two (2) marks each. All
questions are compulsory.
5. The _____ addressing mode is similar to register indirect addressing mode, except that an
offset is added to the contents of the register. The offset and register are specified in the
instruction.
(1) Base indexed (2) Base indexed plus displacement
(3) Indexed (4) Displacement
6. In _____ method, the word is written to the block in both the cache and main memory, in
parallel.
(1) Write through (2) Write back
(3) Write protected (4) Direct mapping
7. Which of the following statements concerning Object-Oriented databases is FALSE ?
(1) Objects in an object-oriented database contain not only data but also methods for
processing the data.
(2) Object-oriented databases store computational instructions in the same place as the
data.
(3) Object-oriented databases are more adapt at handling structured (analytical) data
than relational databases.
(4) Object-oriented databases store more types of data than relational databases and
access that data faster.
8. In distributed databases, location transparency allows for database users, programmers and
administrators to treat the data as if it is at one location. A SQL query with location
transparency needs to specify :
(1) Inheritances (2) Fragments
(3) Locations (4) Local formats
Paper-III 2 J-87-16
9. Consider the relations R(A, B) and S(B, C) and the following four relational algebra
queries over R and S :
I. ΠA, B (R S)
II. R ΠB(S)
III. R ∩ (ΠA(R) × ΠB(S))
IV. ΠA,R.B (R × S) where R⋅B refers to the column B in table R.
One can determine that :
(1) I, III and IV are the same query. (2) II, III and IV are the same query.
(3) I, II and IV are the same query. (4) I, II and III are the same query.
10. Which of the following statements is TRUE ?
D1 : The decomposition of the schema R(A, B, C) into R1(A, B) and R2 (A, C) is always
lossless.
D2 : The decomposition of the schema R(A, B, C, D, E) having AD → B, C → DE,
B → AE and AE → C, into R1 (A, B, D) and R2 (A, C, D, E) is lossless.
(1) Both D1 and D2 (2) Neither D1 nor D2
(3) Only D1 (4) Only D2
11. Consider the following ORACLE relations :
R (A, B, C) = {<1, 2, 3>, <1, 2, 0>, <1, 3, 1>, <6, 2, 3>, <1, 4, 2>, <3, 1, 4> }
S (B, C, D) = {<2, 3, 7>, <1, 4, 5>, <1, 2, 3>, <2, 3, 4>, <3, 1, 4>}.
Consider the following two SQL queries SQ1 and SQ2 :
SQ1 : SELECT R⋅B, AVG (S⋅B)
FROM R, S
WHERE R⋅A = S⋅C AND S⋅D < 7
GROUP BY R⋅B;
SQ2 : SELECT DISTINCT S⋅B, MIN (S⋅C)
FROM S
GROUP BY S⋅B
HAVING COUNT (DISTINCT S⋅D) > 1;
If M is the number of tuples returned by SQ1 and N is the number of tuples returned by
SQ2 then
(1) M = 4, N = 2 (2) M = 5, N = 3
(3) M = 2, N = 2 (4) M = 3, N = 3
12. Semi-join strategies are techniques for query processing in distributed database system.
Which of the following is a semi-join technique ?
(1) Only the joining attributes are sent from one site to another and then all of the rows
are returned.
(2) All of the attributes are sent from one site to another and then only the required rows
are returned.
(3) Only the joining attributes are sent from one site to another and then only the
required rows are returned.
(4) All of the attributes are sent from one site to another and then only the required rows
are returned.
J-87-16 3 Paper-III
13. Consider the Breshenham’s circle generation algorithm for plotting a circle with centre (0,
0) and radius ‘r’ units in first quadrant. If the current point is (xi, yi) and decision
parameter is pi then what will be the next point (xi + 1, yi + 1) and updated decision
parameter pi + 1 for pi ≥ 0 ?
(1) xi + 1 = xi + 1 (2) xi + 1 = xi + 1
yi + 1 = yi yi + 1 = yi – 1
pi + 1 = pi + 4xi + 6 pi + 1 = pi + 4 (xi – yi) + 10
(3) xi + 1 = xi (4) xi + 1 = xi – 1
yi + 1 = yi – 1 yi + 1 = yi
pi + 1 = pi + 4 (xi – yi) + 6 pi + 1 = pi + 4xi + 10
14. A point P(5, 1) is rotated by 90° about a pivot point (2, 2). What is the coordinate of new
transformed point P′ ?
(1) (3, 5) (2) (5, 3)
(3) (2, 4) (4) (1, 5)
15. Let R be the rectangular window against which the lines are to be clipped using 2D
Sutherland-Cohen line clipping algorithm. The rectangular window has lower left-hand
corner at (– 5, 1) and upper right-hand corner at (3, 7). Consider the following three lines
for clipping with the given end point co-ordinates :
Line AB : A (– 6, 2) and B (–1, 8)
Line CD : C (– 1, 5) and D (4, 8)
Line EF : E (–2, 3) and F (1, 2)
Which of the following line(s) is/are candidate for clipping ?
(1) AB (2) CD
(3) EF (4) AB and CD
16. In perspective projection, if a line segment joining a point which lies in front of the viewer
to a point in back of the viewer is projected to a broken line of infinite extent. This is
known as _______.
(1) View confusion (2) Vanishing point
(3) Topological distortion (4) Perspective foreshortening
17. Let us consider that the original point is (x, y) and new transformed point is (x′, y′).
Further, Shx and Shy are shearing factors in x and y directions. If we perform the
y-direction shear relative to x = xref then the transformed point is given by _______.
(1) x′ = x + Shx ⋅ (y – yref) (2) x′ = x
y′ = y y′ = y ⋅ Shx
Paper-III 4 J-87-16
18. Which of the following statement(s) is/are correct with reference to curve generation ?
I. Hermite curves are generated using the concepts of interpolation.
II. Bezier curves are generated using the concepts of approximation.
III. The Bezier curve lies entirely within the convex hull of its control points.
IV. The degree of Bezier curve does not depend on the number of control points.
(1) I, II and IV only (2) II and III only
(3) I and II only (4) I, II and III only
19. Given the following statements :
(A) To implement Abstract Data Type, a programming language require a syntactic unit
to encapsulate type definition.
(B) To implement ADT, a programming language requires some primitive operations
that are built in the language processor.
(C) C++, Ada, Java 5.0, C#2005 provide support for parameterised ADT.
Which one of the following options is correct ?
(1) (A), (B) and (C) are false.
(2) (A) and (B) are true; (C) is false.
(3) (A) is true; (B) and (C) are false.
(4) (A), (B) and (C) are true.
20. Match the following types of variables with the corresponding programming languages :
(a) Static variables (i) Local variables in Pascal
(b) Stack dynamic (ii) All variables in APL
(c) Explicit heap dynamic (iii) Fortran 77
(d) Implicit heap dynamic (iv) All objects in JAVA
Codes :
(a) (b) (c) (d)
(1) (i) (iii) (iv) (ii)
(2) (iv) (i) (iii) (ii)
(3) (iii) (i) (iv) (ii)
(4) (ii) (i) (iii) (iv)
21. Which of the following is false regarding the evaluation of computer programming
languages ?
(1) Application oriented features (2) Efficiency and Readability
(3) Software development (4) Hardware maintenance cost
22. The symmetric difference of two sets S1 and S2 is defined as
S1 s S2 = {x|x ∈ S1 or x ∈ S2, but x is not in both S1 and S2}
The nor of two languages is defined as
nor (L1, L2) = {w|w ∈L
| 1 and w ∈| L2}.
Which of the following is correct ?
(1) The family of regular languages is closed under symmetric difference but not closed
under nor.
(2) The family of regular languages is closed under nor but not closed under symmetric
difference.
(3) The family of regular languages are closed under both symmetric difference and nor.
(4) The family of regular languages are not closed under both symmetric difference and
nor.
J-87-16 5 Paper-III
23. The regular expression for the complement of the language L = {anbm|n ≥ 4, m ≤ 3} is :
(1) (λ + a + aa + aaa) b* + a* bbbb* + (a + b)* ba(a + b)*
(2) (λ + a + aa + aaa) b* + a* bbbbb* + (a + b)* ab(a + b)*
(3) (λ + a + aa + aaa) + a* bbbbb* + (a + b)* ab(a + b)*
(4) (λ + a + aa + aaa)b* + a* bbbbb* + (a + b)* ba(a + b)*
25. If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of
circuit of this TDM is ______.
(1) 64 Kbps (2) 32 MbpS
(3) 32 Kbps (4) 64 MbpS
27. A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps
bandwidth. If the system (all stations put together) produces 500 frames per second, then
the throughput of the system is ______.
(1) 0.384 (2) 0.184
(3) 0.286 (4) 0.586
Paper-III 6 J-87-16
28. Match the following :
(a) Line coding (i) A technique to change analog signal to digital
data.
(b) Block coding (ii) Provides synchronization without increasing
number of bits.
(c) Scrambling (iii) Process of converting digital data to digital
signal.
(d) Pulse code modulation (iv) Provides redundancy to ensure
synchronization and inherits error detection.
Codes :
(a) (b) (c) (d)
(1) (iv) (iii) (ii) (i)
(2) (iii) (iv) (ii) (i)
(3) (i) (iii) (ii) (iv)
(4) (ii) (i) (iv) (iii)
29. Assume that we need to download text documents at the rate of 100 pages per minute. A
page is an average of 24 lines with 80 characters in each line and each character requires
8 bits. Then the required bit rate of the channel is _____.
(1) 1.636 Kbps (2) 1.636 Mbps
(3) 3.272 Mbps (4) 3.272 Kbps
30. Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with
the following key :
3 5 2 1 4 (Cipher text)
1 2 3 4 5 (Plain text)
Using ‘Z’ as bogus character.
(1) TAXERTZENZ (2) EXTRANETZZ
(3) EZXZTRZANZET (4) EXTZRANZETZ
32. Let A[1…n] be an array of n distinct numbers. If i < j and A[i] > A[j], then the pair (i, j) is
called an inversion of A. What is the expected number of inversions in any permutation on
n elements ?
(1) θ(n) (2) θ(lgn)
(3) θ(nlgn) (4) θ(n2)
J-87-16 7 Paper-III
34. Match the following :
(a) Huffman codes (i) O(n2)
(b) Optimal polygon triangulation (ii) θ(n3)
(c) Activity selection problem (iii) O(nlgn)
(d) Quicksort (iv) θ(n)
Codes :
(a) (b) (c) (d)
(1) (i) (ii) (iv) (iii)
(2) (i) (iv) (ii) (iii)
(3) (iii) (ii) (iv) (i)
(4) (iii) (iv) (ii) (i)
35. Suppose that we have numbers between 1 and 1,000 in a binary search tree and want to
search for the number 364. Which of the following sequences could not be the sequence of
nodes examined ?
(1) 925, 221, 912, 245, 899, 259, 363, 364
(2) 3, 400, 388, 220, 267, 383, 382, 279, 364
(3) 926, 203, 912, 241, 913, 246, 364
(4) 3, 253, 402, 399, 331, 345, 398, 364
36. A triangulation of a polygon is a set of T chords that divide the polygon into disjoint
triangles. Every triangulation of n-vertex convex polygon has _____ chords and divides
the polygon into _____ triangles.
(1) n – 2, n – 1 (2) n – 3, n – 2
(3) n – 1, n (4) n – 2, n – 2
38. It is possible to define a class within a class termed as nested class. There are _____ types
of nested classes.
(1) 2 (2) 3
(3) 4 (4) 5
42. When one object reference variable is assigned to another object reference variable then
(1) a copy of the object is created.
(2) a copy of the reference is created.
(3) a copy of the reference is not created.
(4) it is illegal to assign one object reference variable to another object reference
variable.
43. A server crashes on the average once in 30 days, that is, the Mean Time Between Failures
(MTBF) is 30 days. When this happens, it takes 12 hours to reboot it, that is, the Mean
Time to Repair (MTTR) is 12 hours. The availability of server with these reliability data
values is approximately :
(1) 96.3% (2) 97.3%
(3) 98.3% (4) 99.3%
44. Match the software maintenance activities in List – I to its meaning in List – II.
List – I List – II
I. Corrective (a) Concerned with performing activities to reduce the software
complexity thereby improving program understandability
and increasing software maintainability.
II. Adaptive (b) Concerned with fixing errors that are observed when the
software is in use.
III. Perfective (c) Concerned with the change in the software that takes place
to make the software adaptable to new environment (both
hardware and software).
IV. Preventive (d) Concerned with the change in the software that takes place to
make the software adaptable to changing user requirements.
Codes :
I II III IV
(1) (b) (d) (c) (a)
(2) (b) (c) (d) (a)
(3) (c) (b) (d) (a)
(4) (a) (d) (b) (c)
J-87-16 9 Paper-III
45. Match each application/software design concept in List – I to its definition in List – II.
List – I List – II
I. Coupling (a) Easy to visually inspect the design of the software and
understand its purpose.
II. Cohesion (b) Easy to add functionality to a software without having to
redesign it.
III. Scalable (c) Focus of a code upon a single goal.
IV. Readable (d) Reliance of a code module upon other code modules.
Codes :
I II III IV
(1) (b) (a) (d) (c)
(2) (c) (d) (a) (b)
(3) (d) (c) (b) (a)
(4) (d) (a) (c) (b)
46. Software safety is quality assurance activity that focuses on hazards that
(1) affect the reliability of a software component.
(2) may cause an entire system to fail.
(3) may result from user input errors.
(4) prevent profitable marketing of the final product.
47. Which of the following sets represent five stages defined by Capability Maturity Model
(CMM) in increasing order of maturity ?
(1) Initial, Defined, Repeatable, Managed, Optimized.
(2) Initial, Repeatable, Defined, Managed, Optimized.
(3) Initial, Defined, Managed, Repeatable, Optimized.
(4) Initial, Repeatable, Managed, Defined, Optimized.
48. The number of function points of a proposed system is calculated as 500. Suppose that the
system is planned to be developed in Java and the LOC/FP ratio of Java is 50. Estimate
the effort (E) required to complete the project using the effort formula of basic COCOMO
given below :
E = a(KLOC)b
Assume that the values of a and b are 2.5 and 1.0 respectively.
(1) 25 person months (2) 75 person months
(3) 62.5 person months (4) 72.5 person months
49. In UNIX, processes that have finished execution but have not yet had their status collected
are known as _________.
(1) Sleeping processes (2) Stopped processes
(3) Zombie processes (4) Orphan processes
50. In Unix operating system, when a process creates a new process using the fork () system
call, which of the following state is shared between the parent process and child process ?
(1) Heap (2) Stack
(3) Shared memory segments (4) Both Heap and Stack
Paper-III 10 J-87-16
51. Which of the following information about the UNIX file system is not correct ?
(1) Super block contains the number of i-nodes, the number of disk blocks, and the start
of the list of free disk blocks.
(2) An i-node contains accounting information as well as enough information to locate
all the disk blocks that holds the file’s data.
(3) Each i-node is 256-bytes long.
(4) All the files and directories are stored in data blocks.
52. Which of the following option with reference to UNIX operating system is not correct ?
(1) INT signal is sent by the terminal driver when one types <Control-C> and it is a
request to terminate the current operation.
(2) TERM is a request to terminate execution completely. The receiving process will
clean up its state and exit.
(3) QUIT is similar to TERM, except that it defaults to producing a core dump if not
caught.
(4) KILL is a blockable signal.
53. A multicomputer with 256 CPUs is organized as 16 × 16 grid. What is the worst case
delay (in hops) that a message might have to take ?
(1) 16 (2) 15
(3) 32 (4) 30
54. Suppose that the time to do a null remote procedure call (RPC) (i.e. 0 data bytes) is
1.0 msec, with an additional 1.5 msec for every 1K of data. How long does it take to read
32 K from the file server as 32 1K RPCs ?
(1) 49 msec (2) 80 msec
(3) 48 msec (4) 100 msec
55. Let L be the language generated by regular expression 0*10* and accepted by the
deterministic finite automata M. Consider the relation RM defined by M. As all states are
reachable from the start state, RM has _____ equivalence classes.
(1) 2 (2) 4
(3) 5 (4) 6
58. Consider a discrete memoryless channel and assume that H(x) is the amount of
information per symbol at the input of the channel; H(y) is the amount of information per
symbol at the output of the channel; H(x|y) is the amount of uncertainty remaining on x
knowing y; and I (x; y) is the information transmission.
Which of the following does not define the channel capacity of a discrete memoryless
channel ?
(1) max I (x; y) (2) max [H(y) – H(y|x)]
p(x) p(x)
(3) max [H(x) – H(x|y)] (4) max H(x|y)
p(x) p(x)
59. Consider a source with symbols A, B, C, D with probabilities 1/2, 1/4, 1/8, 1/8
respectively. What is the average number of bits per symbol for the Huffman code
generated from above information ?
(1) 2 bits per symbol (2) 1.75 bits per symbol
(3) 1.50 bits per symbol (4) 1.25 bits per symbol
60. Which of the following is used for the boundary representation of an image object ?
(1) Quad Tree (2) Projections
(3) Run length coding (4) Chain codes
61. The region of feasible solution of a linear programming problem has a _____ property in
geometry, provided the feasible solution of the problem exists.
(1) concavity (2) convexity
(3) quadratic (4) polyhedron
has a solution
A B C
I 1
II 3 0
III 2 2
The above solution of a given transportation problem is
(1) infeasible solution (2) optimum solution
(3) non-optimum solution (4) unbounded solution
65. Compute the value of adding the following two fuzzy integers :
A = {(0.3, 1), (0.6, 2), (1, 3), (0.7, 4), (0.2, 5)}
B = {(0.5, 11), (1, 12), (0.5, 13)}
Where fuzzy addition is defined as
μA+B (z) = max (min (μA(x), μB(x)))
x+y=z
Then, f (A + B) is equal to
(1) {(0.5, 12), (0.6, 13), (1, 14), (0.7, 15), (0.7, 16), (1, 17), (1, 18)}
(2) {(0.5, 12), (0.6, 13), (1, 14), (1, 15), (1, 16), (1, 17), (1, 18)}
(3) {(0.3, 12), (0.5, 13), (0.5, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
(4) {(0.3, 12), (0.5, 13), (0.6, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
J-87-16 13 Paper-III
66. A perceptron has input weights W1 = – 3.9 and W2 = 1.1 with threshold value T = 0.3.
What output does it give for the input x1 = 1.3 and x2 = 2.2 ?
(1) – 2.65 (2) – 2.30
(3) 0 (4) 1
68. Which of the following statement is not correct with reference to cron daemon in UNIX
O.S. ?
(1) The cron daemon is the standard tool for running commands on a pre-determined
schedule.
(2) It starts when the system boots and runs as long as the system is up.
(3) Cron reads configuration files that contain list of command lines and the times at
which they invoked.
(4) Crontab for individual users are not stored.
69. In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now,
consider the following two statements:
I. A mode of 641 (octal) means that the owner can read and write the file, other
members of the owner’s group can read it, and users can execute only.
II. A mode of 100 (octal) allows the owner to execute the file, but prohibits all other
access.
Which of the following options is correct with reference to above statements ?
(1) Only I is correct. (2) Only II is correct.
(3) Both I and II are correct. (4) Both I and II are incorrect.
73. Consider the following game tree in which root is a maximizing node and children are
visited left to right. What nodes will be pruned by the alpha-beta pruning ?
A
B C
D E F G H I
3 12 8 2 15 6
(1) I (2) HI
(3) CHI (4) GHI
74. Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an
1 2
adjacent empty space. Given the initial state , which of the following state cannot
3
be reached ?
3 1 3
(1) (2)
2 2 1
1 3 2
(3) (4)
2 1 3
75. A software program that infers and manipulates existing knowledge in order to generate
new knowledge is known as :
(1) Data dictionary (2) Reference mechanism
(3) Inference engine (4) Control strategy
_______________
J-87-16 15 Paper-III
Space For Rough Work
Paper-III 16 J-87-16
PAPER-II
COMPUTER SCIENCE & APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
Paper – II
Note : This paper contains fifty (50) objective type questions of two (2) marks each. All
questions are compulsory.
2. Let us assume that you construct ordered tree to represent the compound proposition
(~ (p∧q)) ↔ (~ p ∨ ~ q).
Then, the prefix expression and post-fix expression determined using this ordered tree are
given as ____ and _____ respectively.
Paper-II 2 J-87-16
4. What is the probability that a randomly selected bit string of length 10 is a palindrome ?
1 1
(1) (2)
64 32
1 1
(3) (4)
8 4
a b
c d
(G1) (G2)
(1) G1 contains Euler circuit and G2 does not contain Euler circuit.
(2) G1 does not contain Euler circuit and G2 contains Euler circuit.
7. Which of the following is the most efficient to perform arithmetic operations on the
numbers ?
x = 0.5, y = 0.0
x * 3 & & 3 || j | k
(1) –1 (2) 0
(3) 1 (4) 2
int * f[ ]( ) ;
declares :
(2) Friend functions are not members of a class, they are associated with it.
(4) It can have access to all members of the class, even private ones.
J-87-16 5 Paper-II
15. A function template in C++ provides _____ level of generalization.
(1) 4 (2) 3
(3) 2 (4) 1
16. DBMS provides the facility of accessing data from a database through
(3) eliminating number of anomalies that could otherwise occur with inserts and deletes.
(a) NULL values can be used to opt a tuple out of enforcement of a foreign key.
(b) Suppose that table T has only one candidate key. If Q is in 3NF, then it is also in
BCNF.
(c) The difference between the project operator (Π) in relational algebra and the
SELECT keyword in SQL is that if the resulting table/set has more than one
occurrences of the same tuple, then Π will return only one of them, while SQL
SELECT will return all.
(1) (a) and (b) are true. (2) (a) and (c) are true.
(3) (b) and (c) are true. (4) (a), (b) and (c) are true.
Paper-II 6 J-87-16
19. Consider the following Entity-Relationship (E-R) diagram and three possible relationship
sets (I, II and III) for this E-R diagram :
I: P Q S T II : P Q S T III: P Q S T
p1 q1 s1 t1 p1 q1 s1 t1 p1 q1 s1 t1
p1 q1 s1 t2 p1 q1 s2 t2 p1 q2 s1 t1
If different symbols stand for different values (e.g., t1 is definitely not equal to t2), then
which of the above could not be the relationship set for the E-R diagram ?
(1) I only (2) I and II only
(3) II only (4) I, II and III
20. Consider a database table R with attributes A and B. Which of the following SQL queries
is illegal ?
(1) SELECT A FROM R;
(2) SELECT A, COUNT(*) FROM R;
(3) SELECT A, COUNT(*) FROM R GROUP BY A;
(4) SELECT A, B, COUNT(*) FROM R GROUP BY A, B;
21. Consider an implementation of unsorted single linked list. Suppose it has its
representation with a head and a tail pointer (i.e. pointers to the first and last nodes of the
linked list). Given the representation, which of the following operation can not be
implemented in O(1) time ?
(1) Insertion at the front of the linked list.
(2) Insertion at the end of the linked list.
(3) Deletion of the front node of the linked list.
(4) Deletion of the last node of the linked list.
J-87-16 7 Paper-II
22. Consider an undirected graph G where self-loops are not allowed. The vertex set of G is
{(i, j) | 1 < i < 12, 1 < j < 12}. There is an edge between (a, b) and (c, d) if |a – c| < 1 or
| b – d | < 1. The number of edges in this graph is
23. The runtime for traversing all the nodes of a binary search tree with n nodes and printing
them in an order is
*+3+3↑3+333
Paper-II 8 J-87-16
26. Which of the following statements is not true with respect to microwaves ?
(1) Electromagnetic waves with frequencies from 300 GHz to 400 THz.
(2) Propagation is line-of-sight.
(3) Very high-frequency waves cannot penetrate walls.
(4) Use of certain portions of the band requires permission from authorities.
27. In a fast Ethernet cabling, 100 Base-TX uses ____ cable and maximum segment size is
_____.
(1) twisted pair, 100 metres (2) twisted pair, 200 metres
(3) fibre optics, 1000 metres (4) fibre optics, 2000 metres
28. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per
minute with each frame carrying an average of 10,000 bits. What is the throughput of this
network ?
(1) 1 Mbps (2) 2 Mbps
(3) 10 Mbps (4) 12 Mbps
J-87-16 9 Paper-II
30. Which of the following protocols is used by email server to maintain a central repository
that can be accessed from any machine ?
(1) POP3
(2) IMAP
(3) SMTP
(4) DMSP
31. The number of strings of length 4 that are generated by the regular expression
(0+ 1+ | 2+ 3+)*, where | is an alternation character and {+, *} are quantification characters,
is :
(1) 08 (2) 09
(3) 10 (4) 12
32. The content of the accumulator after the execution of the following 8085 assembly
language program, is
MVI A, 35H
MOV B, A
STC
CMC
RAR
XRA B
Paper-II 10 J-87-16
33. In compiler optimization, operator strength reduction uses mathematical identities to
replace slow math operations with faster operations. Which of the following code
replacements is an illustration of operator strength reduction ?
(3) Replace P * 0 by 0
34. Which of the following are the principles tasks of the linker ?
III. Relocate code and data relative to the beginning of the program.
(1) The grammar S→aS|aSbS|∈, where S is the only non-terminal symbol, and ∈ is the
null string, is ambiguous.
(2) An unambiguous grammar has same left most and right most derivation.
J-87-16 11 Paper-II
36. Consider a system with seven processes A through G and six resources R through W.
37. Suppose that the virtual Address space has eight pages and physical memory with four
page frames. If LRU page replacement algorithm is used, _____ number of page faults
occur with the reference string.
021354637473355311172341
(1) 11 (2) 12
(3) 10 (4) 9
38. Consider a system having ‘m’ resources of the same type. These resources are shared by
three processes P1, P2 and P3 which have peak demands of 2, 5 and 7 resources
(1) 70 (2) 14
(3) 13 (4) 7
Paper-II 12 J-87-16
39. Five jobs A, B, C, D and E are waiting in Ready Queue. Their expected runtimes are 9, 6,
3, 5 and x respectively. All jobs entered in Ready queue at time zero. They must run in
_____ order to minimize average response time if 3 < x < 5.
(1) B, A, D, E, C (2) C, E, D, B, A
(3) E, D, C, B, A (4) C, B, A, E, D
40. Consider three CPU intensive processes P1, P2, P3 which require 20, 10 and 30 units of
time, arrive at times 1, 3 and 7 respectively. Suppose operating system is implementing
Shortest Remaining Time first (preemptive scheduling) algorithm, then _____ context
switches are required (suppose context switch at the beginning of Ready queue and at the
end of Ready queue are not counted).
(1) 3 (2) 2
(3) 4 (4) 5
n1 n2
(1) (2)
n2 n1
(3) n1 + n2 (4) n1 – n2
Where n1 is the number of requirements for which all reviewers have identical
interpretations, n2 is number of requirements in a specification.
J-87-16 13 Paper-II
43. The quick design of a software that is visible to end users leads to _____.
44. For a program of k variables, boundary value analysis yields ______ test cases.
(1) 4k – 1 (2) 4k
(3) 4k + 1 (4) 2k – 1
45. The extent to which a software performs its intended functions without failures, is termed
as
(1) Robustness
(2) Correctness
(3) Reliability
(4) Accuracy
46. An attacker sits between the sender and receiver and captures the information and
retransmits to the receiver after some time without altering the information. This attack is
called as _____.
Paper-II 14 J-87-16
47. _______ is subject oriented, integrated, time variant, nonvolatile collection of data in
support of management decisions.
(1) Association
(2) Visualization
(3) Correlation
(4) Segmentation
(1) STRING
(2) COBWEB
(3) CORBA
(4) OLAD
____________
J-87-16 15 Paper-II
Space For Rough Work
Paper-II 16 J-87-16
PAPER-III
COMPUTER SCIENCE & APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
J-87-16 1 P.T.O.
COMPUTER SCIENCE & APPLICATIONS
PAPER – III
Note : This paper contains seventy five (75) objective type questions of two (2) marks each. All
questions are compulsory.
(1) 32 (2) 16
(3) 8 (4) 4
3. The register that stores the bits required to mask the interrupts is ______.
HL = HL + HL ?
5. In ______ addressing mode, the operands are stored in the memory. The address of the
corresponding memory location is given in a register which is specified in the instruction.
Paper-III 2 J-87-16
6. The output of the following combinational circuit
is :
(1) X.Y (2) X+Y
7. Which of the following statements is/are True regarding some advantages that an object-
oriented DBMS (OODBMS) offers over a relational database ?
I. An OODBMS avoids the “impedance mismatch” problem.
8. The Global conceptual Schema in a distributed database contains information about global
relations. The condition that all the data of the global relation must be mapped into the
fragments, that is, it must not happen that a data item which belongs to a global relation
does not belong to any fragment, is called :
(1) Disjointness condition
(2) Completeness condition
(3) Reconstruction condition
(4) Aggregation condition
J-87-16 3 Paper-III
9. Suppose database table T1(P, R) currently has tuples {(10, 5), (15, 8), (25, 6)} and table
T2 (A, C) currently has {(10, 6), (25, 3), (10, 5)}. Consider the following three relational
algebra queries RA1, RA2 and RA3 :
RA1 : T1 T1.P = T2.A T2 where is natural join symbol
The number of tuples in the resulting table of RA1, RA2 and RA3 are given by :
(1) 2, 4, 2 respectively (2) 2, 3, 2 respectively
(3) 3, 3, 1 respectively (4) 3, 4, 1 respectively
10. Consider the table R with attributes A, B and C. The functional dependencies that hold on
R are : A → B, C → AB. Which of the following statements is/are True ?
I. The decomposition of R into R1(C, A) and R2(A, B) is lossless.
II. The decomposition of R into R1(A, B) and R2(B, C) is lossy.
(1) Only I (2) Only II
(3) Both I and II (4) Neither I nor II
13. Consider a raster grid having XY-axes in positive X-direction and positive upward
Y-direction with Xmax = 10, Xmin = –5, Ymax = 11, and Ymin = 6. What is the address of
memory pixel with location (5, 4) in raster grid assuming base address 1 (one) ?
(1) 150 (2) 151
(3) 160 (4) 161
14. Consider a N-bit plane frame buffer with W-bit wide lookup table with W > N. How many
intensity levels are available at a time ?
(1) 2N (2) 2W
J-87-16 5 Paper-III
15. Consider the Breshenham’s line generation algorithm for a line with gradient greater than
one, current point (xi, yi) and decision parameter, di. The next point to be plotted
(xi+1, yi+1) and updated decision parameter, di+1, for di < 0 are given as _______.
yi+1 = yi
di+1 = di + 2 dy
(2) xi+1 = xi
yi+1 = yi + 1
di+1 = di + 2 dx
(3) xi+1 = xi
yi+1 = yi + 1
(4) xi+1 = xi + 1
yi+1 = yi + 1
16. A point P(2, 5) is rotated about a pivot point (1, 2) by 60°. What is the new transformed
point P' ?
(1) (1, 4) (2) (–1, 4)
(3) (1, – 4) (4) (– 4, 1)
17. In perspective projection (from 3D to 2D), objects behind the centre of projection are
projected upside down and backward onto the view-plane. This is known as _____.
(1) Topological distortion
(2) Vanishing point
(3) View confusion
(4) Perspective foreshortening
Paper-III 6 J-87-16
18. The Liang-Barsky line clipping algorithm uses the parametric equation of a line from
(x1, y1) to (x2, y2) along with its infinite extension which is given as :
x = x1 + ∆x.u
y = y1 + ∆y.u
Where ∆x = x2 – x1, ∆y = y2 – y1, and u is the parameter with 0 < u < 1. A line AB with
end points A(–1, 7) and B(11, 1) is to be clipped against a rectangular window with
xmin = 1, xmax = 9, ymin = 2, and ymax = 8. The lower and upper bound values of the
parameter u for the clipped line using Liang-Barsky algorithm is given as :
2 1 5
(1) (0, ) (2) 6 , 6
3
1
(3) (0, ) (4) (0, 1)
3
J-87-16 7 Paper-III
21. Assume that the program ‘P’ is implementing parameter passing with ‘call by reference’.
What will be printed by following print statements in P ?
Program P( )
{
x = 10;
y = 3;
funb (y, x, x)
print x;
print y;
}
funb (x, y, z)
{
y = y + 4;
z = x + y + z;
}
(1) 10, 7 (2) 31, 3
(3) 10, 3 (4) 31, 7
22. The regular grammar for the language L = {anbm | n + m is even} is given by
(1) S → S1 | S2
S1 → a S1 | A1
A1 → b A1 | λ
S2 → aaS2 | A2
A2 → b A2 | λ
(2) S → S1 | S2
S1 → a S1 | a A1
S2 → aa S2 | A2
A1 → bA1 | λ
A2 → bA2 | λ
(3) S → S1 | S2
S1 → aaa S1 | aA1
S2 → aaS2 | A2
A1 → bA1 | λ
A2 → bA2 | λ
(4) S → S1 | S2
S1 → aa S1 | A1
S2 → aaS2 | aA2
A1 → bbA1 | λ
A2 → bbA2 | b
Paper-III 8 J-87-16
23. Let Σ = {a, b} and language L = {aa, bb}. Then, the complement of L is
(1) {λ, a, b, ab, ba} ∪ {w∈{a, b}* | |w| > 3}
(2) {a, b, ab, ba} ∪ {w∈{a, b}* | |w| > 3}
(3) {w ∈ { a, b}* | |w| > 3} ∪ {a, b, ab, ba}
(4) {λ, a, b, ab, ba} ∪ {w ∈ {a, b}* | |w| > 3}
25. Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to
destination and each packet p contains 8000 bits. Total end to end delay in sending packet
P is _____.
(1) 2 sec (2) 3 sec
(3) 4 sec (4) 1 sec
28. A slotted ALOHA network transmits 200 bits frames using a shared channel with 200
kbps bandwidth. If the system (all stations put together) produces 1000 frames per second,
then the throughput of the system is _______.
(1) 0.268 (2) 0.468
(3) 0.368 (4) 0.568
29. An analog signal has a bit rate of 8000 bps and a baud rate of 1000.
Then analog signal has _____ signal elements and carry _____ data elements in each
signal.
(1) 256, 8 bits
(2) 128, 4 bits
(3) 256, 4 bits
(4) 128, 8 bits
30. The plain text message BAHI encrypted with RSA algorithm using e = 3, d = 7 and n = 33
and the characters of the message are encoded using the values 00 to 25 for letters A to Z.
Suppose character by character encryption was implemented. Then, the Cipher Text
message is _____.
(1) ABHI
(2) HAQC
(3) IHBA
(4) BHQC
Paper-III 10 J-87-16
31. Consider the problem of a chain <A1, A2, A3, A4> of four matrices. Suppose that the
dimensions of the matrices A1, A2, A3 and A4 are 30 × 35, 35 × 15, 15 × 5 and 5 × 10
respectively. The minimum number of scalar multiplications needed to compute the
product A1A2A3A4 is ____.
32. Consider a hash table of size m = 10000, and the hash function h(K) = floor
(m(KA mod 1)) for A = ( 5 – 1)/2. The key 123456 is mapped to location ______.
(1) 46 (2) 41
(3) 43 (4) 48
33. Consider a weighted complete graph G on the vertex set {ν1, ν2, …. νn} such that the
weight of the edge (νi, νj) is 4 | i – j|. The weight of minimum cost spanning tree of G is :
(3) 4n – 4 (4) 2n – 2
34. A priority queue is implemented as a max-heap. Initially, it has five elements. The level-
order traversal of the heap is as follows :
Two new elements ‘10’ and ‘17’ are inserted in the heap in that order. The level-order
traversal of the heap after the insertion of the element is :
J-87-16 11 Paper-III
35. If there are n integers to sort, each integer has d digits, and each digit is in the set
{1, 2, …, k}, radix sort can sort the numbers in :
Where V is the set of nodes and E is the set of edges in the graph.
Codes :
a b c d
(1) i iii iv ii
(2) i iii ii iv
(3) iii i iv ii
(4) iii i ii iv
Paper-III 12 J-87-16
39. Which of the following is a correct statement ?
(1) Composition is a strong type of association between two classes with full ownership.
(2) Composition is a strong type of association between two classes with partial
ownership.
(3) Composition is a weak type of association between two classes with partial
ownership.
(4) Composition is a weak type of association between two classes with strong
ownership.
41. Which of the following tag in HTML is used to surround information, such as signature of
the person who created the page ?
(1) <body> </body> (2) <address> </address>
(3) <strong> </strong> (4) <em> </em>
43. An Operating System (OS) crashes on the average once in 30 days, that is, the Mean Time
Between Failures (MTBF) = 30 days. When this happens, it takes 10 minutes to recover
the OS, that is, the Mean Time To Repair (MTTR) = 10 minutes. The availability of the
OS with these reliability figures is approximately :
(1) 96.97% (2) 97.97%
(3) 99.009% (4) 99.97%
J-87-16 13 Paper-III
44. Match each software lifecycle model in List – I to its description in List – II :
List – I List – II
I. Code-and-Fix a. Assess risks at each step; do most critical
action first.
II. Evolutionary prototyping b. Build an initial small requirement
specifications, code it, then “evolve” the
specifications and code as needed.
III. Spiral c. Build initial requirement specification for
several releases, then design-and-code in
sequence
IV. Staged Delivery d. Standard phases (requirements, design,
code, test) in order
V. Waterfall e. Write some code, debug it, repeat
(i.e. ad-hoc)
Codes :
I II III IV V
(1) e b a c d
(2) e c a b d
(3) d a b c e
(4) c e a b d
48. Which of the following is/are CORRECT statement(s) about version and release ?
I. A version is an instance of a system, which is functionally identical but non-
functionally distinct from other instances of a system.
II. A version is an instance of a system, which is functionally distinct in some way
from other system instances.
III. A release is an instance of a system, which is distributed to users outside of the
development team.
IV. A release is an instance of a system, which is functionally identical but non-
functionally distinct from other instances of a system.
(1) I and III (2) II and IV
(3) I and IV (4) II and III
49. The Unix Operating System Kernel maintains two key data structures related to processes,
the process table and the user structure. Now, consider the following two statements :
I. The process table is resident all the time and contain information needed for all
processes, even those that are not currently in memory.
II. The user structure is swapped or paged out when its associated process is not in
memory, in order not to waste memory on information that is not needed.
Which of the following options is correct with reference to above statements ?
(1) Only (I) is correct. (2) Only (II) is correct.
(3) Both (I) and (II) are correct. (4) Both (I) and (II) are wrong.
J-87-16 15 Paper-III
50. Consider a system which have ‘n’ number of processes and ‘m’ number of resource types.
The time complexity of the safety algorithm, which checks whether a system is in safe
state or not, is of the order of :
51. An operating system supports a paged virtual memory, using a central processor with a
cycle time of one microsecond. It costs an additional one microsecond to access a page
other than the current one. Pages have 1000 words, and the paging device is a drum that
rotates at 3000 revolutions per minute and transfers one million words per second.
Further, one percent of all instructions executed accessed a page other than the current
page. The instruction that accessed another page, 80% accessed a page already in memory
and when a new page was required, the replaced page was modified 50% of the time.
What is the effective access time on this system, assuming that the system is running only
one process and the processor is idle during drum transfers ?
(1) 30 microseconds
(2) 34 microseconds
(3) 60 microseconds
(4) 68 microseconds
1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1, 2, 3, 6
Which of the following options, gives the correct number of page faults related to LRU,
FIFO, and optimal page replacement algorithms respectively, assuming 05 page frames
and all frames are initially empty ?
Paper-III 16 J-87-16
53. Consider a file currently consisting of 50 blocks. Assume that the file control block and
the index block is already in memory. If a block is added at the end (and the block
information to be added is stored in memory), then how many disk I/O operations are
required for indexed (single-level) allocation strategy ?
(1) 1 (2) 101
(3) 27 (4) 0
54. An experimental file server is up 75% of the time and down for 25% of the time due to
bugs. How many times does this file server have to be replicated to give an availability of
at least 99% ?
(1) 2 (2) 4
(3) 8 (4) 16
δ(q0, B) = (q1, B, R)
J-87-16 17 Paper-III
57. Let G = (V, T, S, P) be a context-free grammar such that every one of its productions is of
the form A → ν, with |ν| = k > 1. The derivation tree for any string W ∈ L (G) has a
height such that
(|W| – 1)
(1) h< (2) logk |W| < h
k–1
(|W| – 1) (|W| – 1)
(3) logk|W| < h < (4) logk|W| < h <
k–1 k–1
58. Which of the following is not used in standard JPEG image compression ?
(1) Huffman coding (2) Runlength encoding
(3) Zig-zag scan (4) K-L Transform
60. If the histogram of an image is clustered towards origin on X-axis of a histogram plot then
it indicates that the image is ______.
(1) Dark (2) Good contrast
(3) Bright (4) Very low contrast
x1 + x2 < 20
Paper-III 18 J-87-16
62. Consider the following statements :
(a) If primal (dual) problem has a finite optimal solution, then its dual (primal) problem
has a finite optimal solution.
(b) If primal (dual) problem has an unbounded optimum solution, then its dual (primal)
has no feasible solution at all.
(c) Both primal and dual problems may be infeasible.
Which of the following is correct ?
(1) (a) and (b) only (2) (a) and (c) only
(3) (b) and (c) only (4) (a), (b) and (c)
64. What are the following sequence of steps taken in designing a fuzzy logic machine ?
(1) Fuzzification → Rule evaluation → Defuzzification
(2) Fuzzification → Defuzzification → Rule evaluation
(3) Rule evaluation → Fuzzification → Defuzzification
(4) Rule evaluation → Defuzzification → Fuzzification
65. Which of the following 2 input Boolean logic functions is linearly inseparable ?
(a) AND (b) OR
(c) NOR (d) XOR
(e) NOT XOR
(1) (a) and (b) (2) (b) and (c)
(3) (c), (d) and (e) (4) (d) and (e)
J-87-16 19 Paper-III
66. Let R and S be two fuzzy relations defined as
y1 y2
x1 0.7 0.5
R=
x2 0.8 0.4
z1 z2 z3
y1 0.9 0.6 0.2
and S =
y2 0.1 0.7 0.5
Then, the resulting relation, T, which relates elements of universe of X to elements of
universe of Z using max-product composition is given by
z1 z2 z3
z1 z2 z3
z1 z2 z3
z1 z2 z3
Paper-III 20 J-87-16
67. Consider the following operations to be performed in Unix :
“The pipe sorts all files in the current directory modified in the month of “June” by order
of size and prints them to the terminal screen. The sort option skips ten fields then sorts
the lines in numeric order.”
Which of the following Unix command will perform above set of operations ?
68. Which of the following statements is incorrect for a Windows Multiple Document
Interface (MDI) ?
(2) An MDI application has three kinds of windows namely a frame window, an MDI
client window and number of child windows.
(3) An MDI application can support more than one kind of document.
(4) An MDI application displays output in the client area of the frame window.
69. Which of the following statement(s) is/are True regarding ‘nice’ command of UNIX ?
J-87-16 21 Paper-III
70. Let ν(x) mean x is a vegetarian, m(y) for y is meat, and e(x, y) for x eats y. Based on these,
consider the following sentences :
I. ∀x ν(x ) ⇔ (∀y e(x, y) ⇒ ¬m(y))
II. ∀x ν(x ) ⇔ (¬(∃y m(y) ∧e(x, y)))
III. ∀x (∃y m(y) ∧e(x, y)) ⇔ ¬ν(x)
One can determine that
(1) Only I and II are equivalent sentences
(2) Only II and III are equivalent sentences.
(3) Only I and III are equivalent sentence .
(4) I, II, and III are equivalent sentences.
71. Match each Artificial Intelligence term in List-I that best describes a given situation in
List – II :
List – I List – II
I. Semantic Network a. Knowledge about what to do as opposed to
how to do it.
II. Frame b. A premise of a rule that is not concluded
by any rule.
III. Declarative knowledge c. A method of knowledge representation that
uses a graph.
IV. Primitive d. A data structure representing stereotypical
knowledge.
Codes :
I II III IV
(1) d a b c
(2) d c a b
(3) d c b a
(4) c d a b
Paper-III 22 J-87-16
73. Criticism free idea generation is a factor of _____.
(1) Decision Support System
75. Which formal system provides the semantic foundation for Prolog ?
_______________
J-87-16 23 Paper-III
Space For Rough Work
Paper-III 24 J-87-16
PAPER-II
COMPUTER SCIENCE & APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
JA-087-17 1 P.T.O.
COMPUTER SCIENCE & APPLICATIONS
Paper – II
Note : This paper contains fifty (50) objective type questions of two (2) marks each.
All questions are compulsory.
F00(0) = 1, F00(1) = 1
10 ∗ F00(n – 1) + 100
F00(n) = for n ≥ 2
F00(n – 2)
List – I List – II
1
f(x) = x3 – 4x, g(x) = and h(x) = x4.
x2 + 1
4. How many multiples of 6 are there between the following pairs of numbers ?
0 and 100 and –6 and 34
(1) 16 and 6 (2) 17 and 6
(3) 17 and 7 (4) 16 and 7
5. Consider a Hamiltonian Graph G with no loops or parallel edges and with |V(G)| = n ≥ 3.
Then which of the following is true ?
n
(1) deg(v) ≥ for each vertex v.
2
(2) |E(G)| ≥ 12 (n – 1) (n – 2) + 2
(3) deg (v) + deg(w) ≥ n whenever v and w are not connected by an edge.
(4) All of the above
(P → Q) ∧ (R → S)
P∨R
Y
Y is the premise :
(1) P∨R (2) P∨S
(3) Q∨R (4) Q∨S
JA-087-17 3 Paper-II
7. ECL is the fastest of all logic families. High speed in ECL is possible because transistors
are used in difference amplifier configuration, in which they are never driven into ____.
(1) Race condition (2) Saturation
(3) Delay (4) High impedance
8. A binary 3-bit down counter uses J-K flip-flops, FFi with inputs Ji, Ki and outputs Qi,
i = 0, 1, 2 respectively. The minimized expression for the input from following, is
I. J0 = K0 = 0
II. J0 = K0 = 1
III. J1 = K1 = Q0
–
IV. J1 = K1 = Q0
V. J2 = K2 = Q1 Q0
– –
VI. J2 = K2 = Q1 Q0
9. Convert the octal number 0.4051 into its equivalent decimal number.
(1) 0.5100098 (2) 0.2096
(3) 0.52 (4) 0.4192
(2) Compiler does not set up a separate function for every definition of function.
13. Which of the following storage classes have global visibility in C/C++ ?
(2) Address of
(3) Indirection
X & (X – 1) is :
16. An attribute A of datatype varchar (20) has value ‘Ram’ and the attribute B of datatype
char (20) has value ‘Sita’ in oracle. The attribute A has _______ memory spaces and B
has _______ memory spaces.
JA-087-17 5 Paper-II
17. Integrity constraints ensure that changes made to the database by authorized users do not
result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t.
the examples of integrity constraints ?
(A) An instructor Id. No. cannot be null, provided Intructor Id No. being primary key.
18. Let M and N be two entities in an E-R diagram with simple single value attributes. R1 and
(1) 4 (2) 6
(3) 7 (4) 3
Paper-II 6 JA-087-17
20. The order of a leaf node in a B+ tree is the maximum number of children it can have.
Suppose that block size is 1 kilobytes, the child pointer takes 7 bytes long and search field
value takes 14 bytes long. The order of the leaf node is ________.
(1) 16 (2) 63
(3) 64 (4) 65
21. Which of the following is true for computation time in insertion, deletion and finding
maximum and minimum element in a sorted array ?
(1) Insertion – 0(1), Deletion – 0(1), Maximum – 0(1), Minimum – 0(l)
(2) Insertion – 0(1), Deletion – 0(1), Maximum – 0(n), Minimum – 0(n)
(3) Insertion – 0(n), Deletion – 0(n), Maximum – 0(1), Minimum – 0(1)
(4) Insertion – 0(n), Deletion – 0(n), Maximum – 0(n), Minimum – 0(n)
22. The seven elements A, B, C, D, E, F and G are pushed onto a stack in reverse order, i.e.,
starting from G. The stack is popped five times and each element is inserted into a queue.
Two elements are deleted from the queue and pushed back onto the stack. Now, one
element is popped from the stack. The popped item is ________.
(1) A (2) B
(3) F (4) G
(A) (B)
(C) (D)
(1) A (2) B
(3) C (4) D
JA-087-17 7 Paper-II
24. If h is chosen from a universal collection of hash functions and is used to hash n keys into
a table of size m, where n ≤ m, the expected number of collisions involving a particular
key x is less than _______.
(1) 1 (2) 1/n
(3) 1/m (4) n/m
(A) Optimal binary search tree construction can be performed efficiently using dynamic
programming.
(C) Given the prefix and postfix walks of a binary tree, the tree cannot be re-constructed
uniquely.
26. Match the following Layers and Protocols for a user browsing with SSL :
Codes :
a b c d
(1) iv i ii iii
(2) iii ii i iv
(3) ii iii iv i
(4) iii i iv ii
Paper-II 8 JA-087-17
27. The maximum size of the data that the application layer can pass on to the TCP layer
below is __________.
(1) 216 bytes (2) 216 bytes + TCP header length
28. A packet whose destination is outside the local TCP/IP network segment is sent to _____.
(1) File server (2) DNS server
(3) DHCP server (4) Default gateway
29. Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in
distance vector routing algorithm are updated _____.
(1) automatically
(2) by server
(3) by exchanging information with neighbour nodes
(4) with back up database
30. In link state routing algorithm after construction of link state packets, new routes are
computed using :
(1) DES algorithm (2) Dijkstra’s algorithm
(3) RSA algorithm (4) Packets
31. Which of the following strings would match the regular expression : p+ [3 – 5]∗ [xyz] ?
JA-087-17 9 Paper-II
32. Consider the following assembly language instructions :
mov al, 15
mov ah, 15
xor al, al
mov cl, 3
shr ax, cl
adc ah, 0
34. The contents of Register (BL) and Register (AL) of 8085 microprocessor are 49H and
3AH respectively. The contents of AL, the status of carry flag (CF) and sign flag (SF)
after executing ‘SUB AL, BL’ assembly language instruction, are
(1) AL = 0FH; CF = 1; SF = 1
(2) AL = F0H; CF = 0; SF = 0
(3) AL = F1H; CF = 1; SF = 1
(4) AL = 1FH; CF = 1; SF = 1
Paper-II 10 JA-087-17
35. Which of the following statement(s) regarding a linker software is/are true ?
(1) Only I
(2) Only II
36. There are three processes P1, P2 and P3 sharing a semaphore for synchronizing a variable.
Initial value of semaphore is one. Assume that negative value of semaphore tells us how
many processes are waiting in queue. Processes access the semaphore in following
order :
(1) 0
(2) 1
(3) –1
(4) –2
JA-087-17 11 Paper-II
37. In a paging system, it takes 30 ns to search translation Look-a-side Buffer (TLB) and 90
ns to access the main memory. If the TLB hit ratio is 70%, the effective memory access
time is :
(1) 48ns (2) 147ns
(3) 120ns (4) 84ns
Codes :
a b c d
(1) iii iv i ii
(2) ii i iv iii
(3) iv i ii iii
(4) i iii iv ii
a. First-come-first-served
b. Round Robin
c. Priority
42. Which of the following is not one of three software product aspects addressed by
McCall’s software quality factors ?
(1) Ability to undergo change
(2) Adaptiability to new environments
(3) Operational characteristics
(4) Production costs and scheduling
43. Which of the following statement(s) is/are true with respect to software architecture ?
S3 : If coupling is low and cohesion is high then it is easier to change one module
without affecting others.
(1) Only S1 and S2 (2) Only S3
(3) All of S1, S2 and S3 (4) Only S1
JA-087-17 13 Paper-II
44. The prototyping model of software development is :
(1) a reasonable approach when requirements are well-defined.
(2) a useful approach when a customer cannot define requirements clearly.
(3) the best approach to use for projects with large development teams.
(4) a risky model that rarely produces a meaningful product.
45. A software design pattern used to enhance the functionality of an object at run-time is :
(1) Adapter (2) Decorator
(3) Delegation (4) Proxy
Codes :
a b c d
(1) i ii iii iv
(2) i iii ii iv
(3) iii ii iv i
(4) ii iii i iv
Paper-II 14 JA-087-17
47. ________ refers loosely to the process of semi-automatically analyzing large databases to
find useful patterns.
(1) Datamining (2) Data warehousing
(3) DBMS (4) Data mirroring
48. Which of the following is/are true w.r.t. applications of mobile computing ?
49. In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation
required for W-CDMA is _______.
(1) 2 MHz (2) 20 KHz
(3) 5 KHz (4) 5 MHz
50. Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP) ?
JA-087-17 15 Paper-II
Space For Rough Work
Paper-II 16 JA-087-17
PAPER-III
COMPUTER SCIENCE & APPLICATIONS
Signature and Name of Invigilator
1. (Signature) __________________________ OMR Sheet No. : ...............................................
(Name) ____________________________ (To be filled by the Candidate)
JA-087-17 1 P.T.O.
COMPUTER SCIENCE & APPLICATIONS
PAPER – III
Note : This paper contains seventy five (75) objective type questions of two (2) marks each. All
questions are compulsory.
6. In 8085, which of the following performs : load register pair immediate operation ?
(1) LDAX rp (2) LHLD addr
(3) LXI rp, data (4) INX rp
9. Let pk(R) denotes primary key of relation R. A many-to-one relationship that exists
between two relations R1 and R2 can be expressed as follows :
(1) pk(R2) → pk(R1) (2) pk(R1) → pk(R2)
(3) pk(R2) → R1 ∩ R2 (4) pk(R1) → R1 ∩ R2
10. For a database relation R(A, B, C, D) where the domains of A, B, C and D include only
atomic values, only the following functional dependencies and those that can be inferred
from them are :
A→C
B→D
The relation R is in _______.
(1) First normal form but not in second normal form.
(2) Both in first normal form as well as in second normal form.
(3) Second normal form but not in third normal form.
(4) Both in second normal form as well as in third normal form.
JA-087-17 3 Paper-III
11. Consider the following relation :
Works (emp_name, company_name, salary)
Here, emp_name is primary key.
Consider the following SQL query
Select emp_name
From works T
where salary > (select avg (salary)
from works S
where T.company _ name =
S.company _ name)
The above query is for following :
(1) Find the highest paid employee who earns more than the average salary of all
employees of his company.
(2) Find the highest paid employee who earns more than the average salary of all the employees
of all the companies.
(3) Find all employees who earn more than the average salary of all employees of all the
companies.
(4) Find all employees who earn more than the average salary of all employees of their company.
12. If following sequence of keys are inserted in a B+ tree with K(=3) pointers :
8, 5, 1, 7, 3, 12, 9, 6
Which of the following shall be correct B+ tree ?
(1)
(2)
(3)
(4)
Paper-III 4 JA-087-17
13. Which of the following statement(s) is/are correct ?
(1) Persistence is the term used to describe the duration of phosphorescence.
(2) The control electrode is used to turn the electron beam on and off.
(3) The electron gun creates a source of electrons which are focussed into a narrow
beam directed at the face of CRT.
(4) All of the above
14. A segment is any object described by GKS commands and data that start with CREATE
SEGMENT and Terminates with CLOSE SEGMENT command. What functions can be
performed on these segments ?
(1) Translation and Rotation
(2) Panning and Zooming
(3) Scaling and Shearing
(4) Translation, Rotation, Panning and Zooming
15. Match the following :
a. Glass i. Contains liquid crystal and serves as a bonding
surface for a conductive coating.
b. Conductive coating ii. Acts as a conductor so that a voltage can be
applied across the liquid crystal.
c. Liquid crystal iii. A substance which will polarize light when a
voltage is applied to it.
d. Polarized film iv. A transparent sheet that polarizes light.
Codes :
a b c d
(1) i ii iii iv
(2) i iii ii iv
(3) iv iii ii i
(4) iv ii i iii
16. Below are the few steps given for scan-converting a circle using Bresenham’s Algorithm.
Which of the given steps is not correct ?
(1) Compute d = 3 – 2r (where r is radius)
(2) Stop if x > y
(3) If d < 0, then d = 4x + 6 and x = x + 1
(4) If d ≥ 0, then d = 4 ∗ (x – y) + 10, x = x + 1 and y = y + 1
17. Which of the following is/are side effects of scan conversion ?
a. Aliasing
b. Unequal intensity of diagonal lines
c. Overstriking in photographic applications
d. Local or Global aliasing
(1) a and b (2) a, b and c
(3) a, c and d (4) a, b, c and d
18. Consider a line AB with A = (0, 0) and B = (8, 4). Apply a simple DDA algorithm and
compute the first four plots on this line.
(1) [(0, 0), (1, 1), (2, 1), (3, 2)] (2) [(0, 0), (1, 1.5), (2, 2), (3, 3)]
(3) [(0, 0), (1, 1), (2, 2.5), (3, 3)] (4) [(0, 0), (1, 2), (2, 2), (3, 2)]
JA-087-17 5 Paper-III
19. Which of the following are not regular ?
(A) Strings of even number of a’s.
(B) Strings of a’s, whose length is a prime number.
(C) Set of all palindromes made up of a’s and b’s.
(D) Strings of a’s whose length is a perfect square.
(1) (A) and (B) only (2) (A), (B) and (C) only
(3) (B), (C) and (D) only (4) (B) and (D) only
20. Consider the languages L1 = φ and L2 = {1}. Which one of the following represents
* * *
L1 ∪ L2 L1 ?
(1) {∈} (2) {∈, 1}
(3) φ (4) 1*
21. Given the following statements :
(A) A class of languages that is closed under union and complementation has to be
closed under intersection.
(B) A class of languages that is closed under union and intersection has to be closed
under complementation.
Which of the following options is correct ?
(1) Both (A) and (B) are false. (2) Both (A) and (B) are true.
(3) (A) is true, (B) is false. (4) (A) is false, (B) is true.
22. Let G = (V, T, S, P) be a context-free grammar such that every one of its productions is of
the form A → v, with |v| = K > 1. The derivation tree for any W ∈ L(G) has a height h
such that
⎛|W| – 1⎞
(1) logK|W| ≤ h ≤ logK⎜ K – 1 ⎟ (2) logK|W| ≤ h ≤ logK(K|W|)
⎝ ⎠
⎛|W| – 1⎞
(3) logK|W| ≤ h ≤ K logK|W| (4) logK|W| ≤ h ≤ ⎜ K – 1 ⎟
⎝ ⎠
23. Given the following two languages :
L1 = {an bn | n ≥ 0, n ≠ 100}
L2 = {w ∈ {a, b, c}*| na(w) = nb(w) = nc(w)}
Which of the following options is correct ?
(1) Both L1 and L2 are not context free language
(2) Both L1 and L2 are context free language.
(3) L1 is context free language, L2 is not context free language.
(4) L1 is not context free language, L2 is context free language.
24. A recursive function h, is defined as follows :
h(m) = k, if m = 0
= 1, if m = 1
= 2 h(m – 1) + 4h(m – 2), if m ≥ 2
If the value of h(4) is 88 then the value of k is :
(1) 0 (2) 1
(3) 2 (4) –1
Paper-III 6 JA-087-17
25. Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a
probability P in each time slot. The probability that only one station transmits in a given
slot is _______.
(1) nP(1 – P)n – 1 (2) nP
(3) P(1 – P) n – 1 (4) nP(1 – P)n – 1
26. Station A uses 32 byte packets to transmit messages to station B using sliding window
protocol. The round trip delay between A and B is 40 milliseconds and the bottleneck
bandwidth on the path between A and B is 64 kbps. The optimal window size of A is
________.
(1) 20 (2) 10
(3) 30 (4) 40
27. Let G(x) be generator polynomial used for CRC checking. The condition that should be
satisfied by G(x) to correct odd numbered error bits, will be :
(1) (1 + x) is factor of G(x) (2) (1 – x) is factor of G(x)
2
(3) (1 + x ) is factor of G(x) (4) x is factor of G(x)
28. In a packet switching network, if the message size is 48 bytes and each packet contains a
header of 3 bytes. If 24 packets are required to transmit the message, the packet size is
________.
(1) 2 bytes (2) 1 byte
(3) 4 bytes (4) 5 bytes
29. In RSA public key cryptosystem suppose n = p ∗ q where p and q are primes. (e, n) and
(d, n) are public and private keys respectively. Let M be an integer such that o < M < n
and φ(n) = (p – 1) (q – 1).
Which of the following equations represent RSA public key cryptosystem ?
I. C ≡ Me (mod n) II. ed ≡ 1(mod n)
M ≡ (C) (mod n)
d
44. Which of the following are facts about a top-down software testing approach ?
I. Top-down testing typically requires the tester to build method stubs.
II. Top-down testing typically requires the tester to build test drivers.
(1) only I (2) Only II
(3) Both I and II (4) Neither I nor II
JA-087-17 9 Paper-III
45. Match the terms related to Software Configuration Management (SCM) in List – I with
the descriptions in List – II.
List – I List – II
I. Version A. An instance of a system that is distributed to
customers.
II. Release B. An instance of a system which is functionally identical
to other instances, but designed for different
hardware/software configurations.
III. Variant C. An instance of a system that differs, in some way,
from other instances.
Codes :
I II III
(1) B C A
(2) C A B
(3) C B A
(4) B A C
46. A software project was estimated at 352 Function Points (FP). A four person team will be
assigned to this project consisting of an architect, two programmers, and a tester. The
salary of the architect is ` 80,000 per month, the programmer ` 60,000 per month and the
tester ` 50,000 per month. The average productivity for the team is 8 FP per person
month. Which of the following represents the projected cost of the project ?
(1) ` 28,16,000 (2) ` 20,90,000
(3) ` 26,95,000 (4) ` 27,50,000
47. Complete each of the following sentences in List – I on the left hand side by filling in the
word or phrase from the List – II on the right hand side that best completes the sentence :
List – I List – II
I. Determining whether you have A. Software testing
built the right system is called
________
II. Determining whether you have B. Software verification
built the system right is called
________
III. ________ is the process of C. Software debugging
demonstrating the existence of
defects or providing confidence
that they do not appear to be
present.
IV. _______ is the process of D. Software validation
discovering the cause of a defect
and fixing it.
Codes :
I II III IV
(1) B D A C
(2) B D C A
(3) D B C A
(4) D B A C
Paper-III 10 JA-087-17
48. A software company needs to develop a project that is estimated as 1000 function points
and is planning to use JAVA as the programming language whose approximate lines of
code per function point is accepted as 50. Considering a = 1.4 as multiplicative factor,
b = 1.0 as exponention factor for the basic COCOMO effort equation and c = 3.0 as
multiplicative factor, d = 0.33 as exponention factor for the basic COCOMO duration
equation, approximately how long does the project take to complete ?
(1) 11.2 months (2) 12.2 months
(3) 13.2 months (4) 10.2 months
49. A memory management system has 64 pages with 512 bytes page size. Physical memory
consists of 32 page frames. Number of bits required in logical and physical address are
respectively :
(1) 14 and 15 (2) 14 and 29
(3) 15 and 14 (4) 16 and 32
50. Consider a disk queue with I/O requests on the following cylinders in their arriving order :
6, 10, 12, 54, 97, 73, 128, 15, 44, 110, 34, 45
The disk head is assumed to be at cylinder 23 and moving in the direction of decreasing
number of cylinders. Total number of cylinders in the disk is 150. The disk head
movement using SCAN-scheduling algorithm is :
(1) 172 (2) 173
(3) 227 (4) 228
Paper-III 12 JA-087-17
60. The first order logic (FOL) statement ((R ∨ Q) ∧ (P ∨ Q)) is equivalent to which of the
following ?
(1) ((R ∨ Q) ∧ (P ∨ Q) ∧ (R ∨ P))
(2) ((R ∨ Q) ∧ (P ∨ Q) ∧ (R ∨ P))
(3) ((R ∨ Q) ∧ (P ∨ Q) ∧ (R ∨ P))
(4) ((R ∨ Q) ∧ (P ∨ Q) ∧ ( R ∨ P))
61. Given the following two statements :
A. L = {w|na(w) = nb(w)} is deterministic context free language, but not linear.
B. L = {an bn} ∪ {an b2n} is linear, but not deterministic context free language.
Which of the following options is correct ?
(1) Both (A) and (B) are false. (2) Both (A) and (B) are true.
(3) (A) is true, (B) is false. (4) (A) is false, (B) is true.
62. Which of the following pairs have different expressive power ?
(1) Single-tape-turing machine and multi-dimensional turing machine.
(2) Multi-tape turing machine and multi-dimensional turing machine.
(3) Deterministic push down automata and non-deterministic pushdown automata.
(4) Deterministic finite automata and Non-deterministic finite automata
63. Which of the following statements is false ?
(1) Every context-sensitive language is recursive.
(2) The set of all languages that are not recursively enumerable is countable.
(3) The family of recursively enumerable languages is closed under union.
(4) The families of recursively enumerable and recursive languages are closed under reversal.
64. Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____
bits of error.
(1) t + 1 (2) t
t
(3) t – 2 (4) 2
65. A t-error correcting q-nary linear code must satisfy :
t
⎛n⎞
M Σ ⎝i ⎠ (q – 1)i ≤ X
i=0
Where M is the number of code words and X is
(1) qn (2) qt
(3) q–n (4) q–t
66. Names of some of the Operating Systems are given below :
(a) MS-DOS (b) XENIX (c) OS/2
In the above list, following operating systems didn’t provide multiuser facility.
(1) (a) only (2) (a) and (b) only
(3) (b) and (c) only (4) (a), (b) and (c)
67. From the given data below :
abbaabbaab
which one of the following is not a word in the dictionary created by LZ-coding (the
initial words are a, b) ?
(1) a b (2) b b
(3) b a (4) b a a b
JA-087-17 13 Paper-III
68. With respect to a loop in the transportation table, which one of the following is not correct ?
(1) Every loop has an odd no. of cells and atleast 5.
(2) Closed loops may or may not be square in shape.
(3) All the cells in the loop that have a plus or minus sign, except the starting cell, must
be occupied cells.
(4) Every loop has an even no. of cells and atleast four.
69. At which of the following stage(s), the degeneracy do not occur in transportation problem ?
(m, n represents number of sources and destinations respectively)
(a) While the values of dual variables ui and vj cannot be computed.
(b) While obtaining an initial solution, we may have less than m + n – 1 allocations.
(c) At any stage while moving towards optimal solution, when two or more occupied
cells with the same minimum allocation become unoccupied simultaneously.
(d) At a stage when the no. of +ve allocation is exactly m + n – 1.
(1) (a), (b) and (c) (2) (a), (c) and (d)
(3) (a) and (d) (4) (a), (b), (c) and (d)
70. Consider the following LPP :
Min. Z = x1 + x2 + x3
Subject to 3x1 + 4x3 ≤ 5
5x1 + x2 + 6x3 = 7
8x1 + 9x3 ≥ 2,
x1, x2, x3 ≥ 0
The standard form of this LPP shall be :
(1) Min. Z = x1 + x2 + x3 + 0x4 + 0x5
Subject to 3x1 + 4x3 + x4 = 5;
5x1 + x2 + 6x3 = 7;
8x1 + 9x3 – x5 = 2;
x1, x2, x3, x4, x5 ≥ 0
(2) Min. Z = x1 + x2 + x3 + 0x4 + 0x5 – 1(x6) – 1(x7)
Subject to 3x1 + 4x3 + x4 = 5;
5x1 + x2 + 6x3 + x6 = 7;
8x1 + 9x3 – x5 + x7 = 2;
x1 to x7 ≥ 0
(3) Min. Z = x1 + x2 + x3 + 0x4 + 0x5 + 0x6
Subject to 3x1 + 4x3 + x4 = 5;
5x1 + x2 + 6x3 = 7;
8x1 + 9x3 – x5 + x6 = 2;
x1 to x6 ≥ 0
(4) Min. Z = x1 + x2 + x3 + 0x4 + 0x5 + 0x6 + 0x7
Subject to 3x1 + 4x3 + x4 = 5;
5x1 + x2 + 6x3 + x6 = 7;
8x1 + 9x3 – x5 + x7 = 2;
x1 to x7 ≥ 0
Paper-III 14 JA-087-17
71. Let R and S be two fuzzy relations defined as :
y1 y2 z1 z2 z3
x1⎡ 0.6 0.4 ⎤ y1⎡ 0.8 0.5 0.1 ⎤
R= ⎢ ⎥ and S = ⎢ ⎥
x2⎣ 0.7 0.3 ⎦ y2⎣ 0.0 0.6 0.4 ⎦
Then, the resulting relation, T, which relates elements of universe x to the elements of
universe z using max-min composition is given by :
z1 z2 z3 z1 z2 z3
x1⎡ 0.4 0.6 0.4 ⎤ x1⎡ 0.4 0.6 0.4 ⎤
(1) T = ⎢ ⎥ (2) T = ⎢ ⎥
x2⎣ 0.7 0.7 0.7 ⎦ x2⎣ 0.8 0.5 0.4 ⎦
z1 z2 z3 z1 z2 z3
x1⎡ 0.6 0.5 0.4 ⎤ x1⎡ 0.6 0.5 0.5 ⎤
(3) T = ⎢ ⎥ (4) T = ⎢ ⎥
x2⎣ 0.7 0.5 0.3 ⎦ x2⎣ 0.7 0.7 0.7 ⎦
72. A neuron with 3 inputs has the weight vector [0.2 –0.1 0.1]T and a bias θ = 0. If the input
vector is X = [0.2 0.4 0.2]T then the total input to the neuron is :
(1) 0.20 (2) 1.0
(3) 0.02 (4) –1.0
73. Which of the following neural networks uses supervised learning ?
(A) Multilayer perceptron
(B) Self organizing feature map
(C) Hopfield network
(1) (A) only (2) (B) only
(3) (A) and (B) only (4) (A) and (C) only
74. Unix command to change the case of first three lines of file “shortlist” from lower to
upper
(1) $ tr ‘[a – z]’ ‘[A – Z]’ shortlist ¦ head-3
(2) $ head-3 shortlist ¦ tr ‘[a – z]’ ‘[A – Z]’
(3) $ tr head -3 shortlist ‘[A – Z]’ ‘[a – z]’
(4) $ tr shortlist head -3 ‘[a – z]’ ‘[A – Z]’
75. Match the following vi commands in Unix :
List – I List – II
a. : w i. saves the file and quits editing mode
b. : x ii. escapes unix shell
c. : q iii. saves file and remains in editing mode
d. : sh iv. quits editing mode and no changes are saved to the file
Codes :
a b c d
(1) ii iii i iv
(2) iv iii ii i
(3) iii iv i ii
(4) iii i iv ii
___________
JA-087-17 15 Paper-III
Space For Rough Work
Paper-III 16 JA-087-17