It352 QP
It352 QP
Page 1 of 5
U V612 Pages: 5
10 A body is vibrating with simple harmonic motion of amplitude 120 mm and frequency
5cps. Calculate the maximum velocity of the body.
(a) 3.77 (b) 2.77 (c) 1.5 (d) 2.90
11 The address resolution protocol (ARP) is used for
(a) Finding the IP address from the DNS
(b) Finding the IP address of the default gateway
(c) Finding the IP address that corresponds to a MAC address
(d) Finding the MAC address that corresponds to an IP address
12 The postfix form of the expression (A+ B)*(C*D- E)*F / G is?
(a) AB+ CD*E – FG /** (b) AB + CD* E – F **G /
(c) AB + CD* E – *F *G / (d) AB + CDE * – * F *G /
13 Which one is not a Real Time Operating System?
a) Vx Works b) RT Linux c) Windows CE d)Windows 7
14 Which one of the following is a synchronization tool?
(a) Thread (b) Pipe (c) Semaphore (d) Socket
15 The technique where the controller is given complete access to memory bus is
(a) Cycle stealing (b) Memory stealing
(c) Memory Con (d) Burst mode
16 Which of the following is not true of deadlock prevention and deadlock avoidance scheme
(a) In deadlock prevention, the request for resources is always granted, if the
resulting state is safe
(c) Deadlock avoidance is less restrictive than deadlock prevention
(b) In deadlock avoidance, the request for resources is always granted, if the
resulting state is safe
(d) Deadlock avoidance requires knowledge of resource requirements a prior
17 Which of the following memory allocation scheme suffers from external fragmentation?
(a)Pure demand paging (b) Segmentation (c) Swapping (d) Paging
18 A hash function f defined as f(key) =key mod 7 with linear probing, is used to insert the
keys 37, 38, 72, 48, 98, 11, 56 into a table indexed from 0 to 6 . What will be the
location of key 11?
(a) 3 (b) 4 (c) 5 (d) 6
19 Which of the following is NOT true with respect to a transparent bridge and a router?
(a) Both bridge and router selectively forward data packets
(c) A bridge builds up its routing table by inspect-ing incoming packets
(b) A bridge uses IP addresses while a router uses MAC addresses
(d) A router can connect between a LAN and a WAN
Page 2 of 5
U V612 Pages: 5
Page 3 of 5
U V612 Pages: 5
III. Recursively enumerable languages are closed under complementation. Which of the
above statements are true?
a) I only b) I and III c) I and II d) II and III
32 The number of states of the FSM, required to simulate the behaviour of a computer, with a
memory capable of storing m words, each of length n bits is:
a)m x 2nb)2mnc) 2(m+n)d)None of the above
33 Efficient cache block replacement algorithm is:
a) FIFO b)LIFO c)LRU d)None of the above
34 A ………… does not have a distinguishing attribute if its own and mostly are dependent
entities, which are part of some another entity.
(a)Non attributes entity (b)Dependent entity (c)Weak entity (d)Strong entity
35 A deadlock situation arises if the following four conditions hold simultaneously in a system
a) Mutual exclusion, Hold and Wait, preemption and Circular wait
b) Mutual exclusion, Hold and Wait, No preemption and Circular wait
c) Mutex lock, Hold and Wait, preemption and Circular wait
d) Mutual exclusion, Hold and Wait, race condition and Circular wait
36 While opening a TCP connection, the initial sequence number is to be derived using a time-
of-day (ToD) clock that keeps running even when the host is down. The low order 32 bits
of the counter of the ToD clock is to be used for the initial sequence numbers. The clock
counter increments once per millisecond. The maximum packet lifetime is given to be 64s.
Which one of the choices given below is closest to the minimum permissible rate at which
sequence numbers used for packets of a connection can increase?
a)0.015/s b)0.064/s c)0.135/s d)0.327/s
37 The width of the physical address on a machine is 40 bits. The width of the tag field in a
512 KB 8-way set associative cache is ____________ bits
a)20 b)24 c)30 d)40
38 Suppose the numbers 7, 5, 1, 8, 3, 6, 0, 9, 4, 2 are inserted in that order into an initially
empty binary search tree. The binary search tree uses the usual ordering on natural
numbers. What is the in-order traversal sequence of the resultant tree?
a) 7 5 1 0 3 2 4 6 8 9 b). 0 2 4 3 1 6 5 9 8 7
c). 0 1 2 3 4 5 6 7 8 9 d). 9 8 6 4 2 3 0 1 5 7
39 In the __________ normal form, a composite attribute is converted to individual attributes.
a)Second b)Third c)First d)Fourth
40 Perform Column Matching :
A. Bridge (i) Port No:80
B. Ethernet (ii) CSMA/CD
C. Token ring (iii) Layer 2
D Token bus (iv)IEEE 802.4
E. HTTP (v) IEEE 802.3
a)A- iii, B- i,C-v, D-iv, E-ii b) A-iii, B-ii, C-v,D-iv E-i
c) A-iii, B-ii, C-iv,D-v E-i d) A-i, B-iii, C-iv,D-v E-ii
41 Which of the following statements is TRUE about CSMA/CD
a) IEEE 802.11 wireless LAN runs CSMA/CD protocol
Page 4 of 5
U V612 Pages: 5
49 Consider a B+-tree in which the maximum number of keys in a node is 5. What is the
minimum number of keys in any non-root node?
a) 1 b) 2 c) 3 d) 4
50 Which of the following statement is false?
a) LBA recognizes Type 0 Grammars
b) PDA recognizes Type 1 Grammars
c) LBA recognizes Type 2 Grammars
d) PDA recognizes Type 3 Grammars
****
Page 5 of 5