Co 2020
Co 2020
_________
SUB: COMPUTER ENGINEERING (CO)
Time:1 Hour 30 minutes
Instructions:
1. Ensure that all pages are printed.
2. Use Black ball pen only
3. Change in option is not allowed
4. There is no negative marking
5. Use of non -programmable scientific calculator is allowed
1. Only one of the two devices can transmit, the other can only receive is
A Performance B Jitter
C Protocol D Message
C n devices D 2n devices
C Linker D Compiler
7. The Clock which defines the regular time intervals is called as_____________.
CO Page 1 of 12
8. I/o devices and memory share the same address space then the arrangement is called as
A Program-controlled I/O B Memory mapped I/O
CO Page 2 of 12
18. In which direction communication can be possible for full-duplex data communication
system?
A forward direction B reverse direction
C both forward and reverse direction D communication is not possible
19. A field in the Ethernet message packet is
A Type B Data
C Address D all of these
20. What is a range of class B IP Address for the first byte?
A 0 – 63 B 64 – 127
C 128 – 191 D 192 – 223
21. The postfix equivalent of the prefix *+ab-cd is
A ab+cd-* B abcd+-*
C ab+cd*- D ab+-cd*
22. What is achieved by the following declaration in class structure
Void operator++()
{
C++;
}
A ++ overloaded B ++ over riding
C syntax error D invalid return type
23. What is the output of the following C program?
Main()
{
Print(“%c”,”abcdefgh”[4]);
}
A Error B D
C E D Abcdefgh
24. A pure virtual function in C++ can be declared as
A virtual void display() = 0; B pure virtual void display() = null
CO Page 3 of 12
27. A static function in C++ can be called using
A name with return type B name without return type
A Queuing B Spooling
C Batch D Caching
32. ________ is the time taken by the job fom submission of job to completion of job while
processing a job.
A Running Time B Average Time
C Completion Time D Turnaround Time
33. If more jobs are ready to run at the same time, then operating system must choose
among them. _______ is suitable for this situation.
A Job Scheduling B Queue Scheduling
C Process Scheduling D CPU Scheduling
34. Switching cpu frequently between process can leads to __________
A Multithreading B Multitasking
CO Page 4 of 12
35. If more than one process tries to access and change the same data value, and the
outcome of the execution is depends on the orer in which the process gets executed is
called as _______ .
A Dependency Latency B Race Condition
36. If a process tries to access a page which was not present in the main memory will cause
_______ .
A Trap B Fault
37. If a process transaction gets _______ on a data P, then transaction it can read the data
but it can’t write the data.
A Shared lock B Exclusive lock
38. The size of main memory 64 mb and size of the virtual address space is 32-bit. if size of
a page is 4kb, then the size of a page table is ______ .
A 2 Mb B 4 Mb
C 6 Mb D 8 Mb
39. A computer system has 6 printers and n processes competing to access the printers.
Each process needs atmost 2 resources to complete its tasks. find the value of n which
could cause a deadlock.
A 1 B 2
C 3 D 4
40. Consider a cpu-bound processes with unequal cpu burst lengths enters into the cpu for
execution at the same time. Find the process scheduling algorithms that minimize the
average waiting time if the processes waits in the ready queue.
A FIFO B SJF
C FCFS D RR
A public B c&d
C abstract D Final
42. Which of the following methods are static members of the Thread class?
A run B Sleep
43. The clean room strategy is based on which software process model?
CO Page 5 of 12
A evolutionary B Incremental
C revolutionary D Spiral
A <div> B <frame>
C <table> D <form>
A HTML B XML
C Postscript D Javascript
51. Remember the page-replacement algorithms and can you predict those algorithms that
suffer from Belady’s anomaly.
A LRU B Optimal
C SJF D FIFO
52. The best case running time for binary search algorithm is _____________
CO Page 6 of 12
C O(n) D O(log n)
A O(n2) B O(log n)
A N B n-2
C n+1 D n-1
C Greedy D Backtracking
57. ____________________ Problem starts and ends at the source node S, visits all the
other nodes once and forms a cycle.
58. The _______________ algorithm does not yield any optimal solution.
A Backtracking B Divide and Conquer
C Greedy Method D Dynamic Programming
59. ________________ tree is the set of all paths from root node to other nodes.
A Binary Search Tree B B+ Tree
C Optimal Binary Search Tree D State Space Tree
60. What is the time efficiency of N-Queens Problem?
A O(n2) B O(n3)
C O(n) D O(Log n)
61. What is the minimum number of time, the do…while loop is executed
A 0 B 1
C 2 D 3
62. Which of the following data structure allows random access to data?
A Stack B Linked List
C Queue D Arrays
CO Page 7 of 12
63. Recursive functions are executed in a
A LIFO order B FIFO order
C parallel fashion D all of the above
64. Average successful search time for sequential search for n items is
A n/2 B (n-1)/2
C (n+1)/2 D none of these
65. The expression which access the (ij)th entry of m X n matrix stored in column major
form is
A m*(j-1)+i B n*(i-1)+j
C m*(n-j)+j D n*(m-i)+j
66. Which of the following is not the characteristic of a Relational database model
A Tables B Tree like structure
C Complex logical relationships D Records
67. In a relation between the entities the type and condition of the relation should be
specified. That is called as ______ attribute.
A Descriptive B Derived
C Recursive D Relative
68. Consider the grammar shown below
S→CC
C→cC | d
The grammar is
A LL(1) B SLR(1) but not LL (1)
C LALR (1) but not SLR (1) D LR(1) but not LALR(1)
A 9+5+2 B 95+2+
C 952++ D ++95
A (1*0) * 1* B 0 + (0 + 10) *
CO Page 8 of 12
A Class A B Class B
C Class C D Class D
72. The system that can be used in both priority and non-priority mode is
73. The variable which can be accessed by all modules in a program are known as
A O(1) B O(log2n)
76. Which of the following sorting algorithm has the worst time complexity of n log n?
A quick sort B heap sort
C shell sort D bubble sort
77. The minimum number of comparison required to sort 5 element is
A 6 B 10
C 15 D 14
78. Which of the following data structure allows inserting data elements at rear and deleting
from front?
A Stack B Dequeue
C Queue D Binary Search Tree
79. Which of the following best describes sorting?
A accessing and processing each record B finding the location of record with a
exactly once given key
C arranging the data in some given D adding a new record to data
order structure
80. Which of the following is a prefix conversion of an expression A * (B + C) / D?
A ABC+*D/ B AB*CD/+
C *A+B/CD D /*A+BCD
CO Page 9 of 12
81. The function 𝑓(𝑧) of complex variable 𝑧 = 𝑥 + 𝑖𝑦, where 𝑖 = √−1 is given by
𝑓(𝑧) = 𝑥 2 − 𝑦 2 + 𝑖𝑣(𝑥, 𝑦). For this function to be analytic 𝑣(𝑥, 𝑦) should be
A 2𝑥𝑦 + constant B −2𝑥𝑦 + constant
C 𝑦 2 − 𝑥 2 + constant D 2𝑥𝑦 + (𝑦 2 /4) + constant
82. The series ∑∞ 𝑧 𝑛, for 𝑧 = 75 + 100𝑖, is
𝑛=0 𝑛!
A divergent B convergent
C oscillatory finitely D oscillatory infinitely
83. A student appearing in PGCET has probability 0.5 to qualify and the probability to
qualify for both PGCET and GATE is 0.3. What is the probability for a student of
qualify for GATE, if she has qualified for PGCET?
A 0.3 B 0.4
C 0.5 D 0.6
84. For a random variable 𝑋 with mean 𝜇 and standard deviation 𝜎, which of the
following is a correct Chebyshev’s inequality?
A 𝑃(|𝑋 − 𝜇| ≥ 𝑘𝜎) ≤ 1 − 𝑘 −2 B 𝑃(|𝑋 − 𝜇| ≤ 𝑘𝜎) ≤ 1 − 𝑘 −2
C 𝑃(|𝑋 − 𝜇| ≥ 𝑘𝜎) ≤ 𝑘 −2 D 𝑃(|𝑋 − 𝜇| ≤ 𝑘𝜎) ≤ 𝑘 −2
85. For the beta function 𝐵(𝑚 + 1, 𝑛) = _______
A 𝑤 −1 cos(𝑤𝑡) B 𝑤 −1 sin(𝑤𝑡)
C 𝑤 −1 sinh(𝑤𝑡) D 𝑤 −1 cosh(𝑤𝑡)
87. 1; 0≤𝑡 ≤2
For function 𝑓(𝑡) = { 𝑡 ; 2 < 𝑡 ≤ 4 , its Heaviside unit step function
𝑡2; 𝑡>4
representation is
A (𝑡 2 − 𝑡)𝐻(𝑡 − 4) + (1 − 𝑡)𝐻(𝑡 − 2) − 𝐻(𝑡)
B (𝑡 2 + 𝑡)𝐻(𝑡 − 4) + (1 − 𝑡)𝐻(𝑡 − 2) − 𝐻(𝑡)
C (𝑡 2 + 𝑡)𝐻(𝑡 − 4) + (𝑡 − 1)𝐻(𝑡 − 2) + 𝐻(𝑡)
D (𝑡 2 − 𝑡)𝐻(𝑡 − 4) + (1 − 𝑡)𝐻(𝑡 − 2) + 𝐻(𝑡)
88. Which of the following measure of central tendency divides data equally in two
parts?
CO Page 10 of 12
A Median B Mean
C Quartile D Mode
89. The particular integral of 𝑦 ′′ + 𝑦 = sin 𝑥 is,
A cos 𝑥 B sin 𝑥
C (−𝑥 cos 𝑥)/2 D (𝑥 cos 𝑥)/2
90. Using the separable variable method, the general solution of the partial differential
equation 𝑢𝑥 + 𝑢𝑡 + 𝑢(𝑥, 𝑡) = 0 is,
A 1 1 B 1 1
∫ ∫ 2(𝑥 + 𝑦)𝑑𝑦 𝑑𝑥 ∫ ∫ 2(𝑥 − 𝑦)𝑑𝑦 𝑑𝑥
0 𝑥 0 𝑥
C 1 1 D 1 1
∫ ∫ 2(𝑥 − 𝑦)𝑑𝑥 𝑑𝑦 ∫ ∫ 2(𝑥 + 𝑦)𝑑𝑥 𝑑𝑦
0 𝑦 0 𝑦
92. 1 0 0
For the matrix [0 2 3], the eigenvalues are
0 1 4
A 1,2,4 B 1,2,3
C 1,1,5 D 0,1,3
93. For an (𝑚 × 𝑛) −matrix 𝐴 and (𝑛 × 𝑝) − matrix 𝐵,
A 2 B 3
C 2 D 3
3 2
95. The number of points at which the function 𝑓(𝑥, 𝑦) = 𝑥 3 − 𝑥2
−
𝑦2
has local
3 2 2
maxima is
A 1 B 2
C 3 D 0
CO Page 11 of 12
96. For the forward difference operator ∆, the backward difference operator ∇ and the
shift operator 𝐸, ∆ + ∇= _____
A 𝐸−1 B 1−𝐸
C 𝐸 + 𝐸 −1 D 𝐸 − 𝐸 −1
97. For the function 𝑓(𝑥) to have a local minima at a point ′𝑎′,
A 𝑓 ′ (𝑎) = 0 and 𝑓 ′′ (𝑎) = 0
B 𝑓 ′ (𝑎) = 0 and 𝑓 ′ (𝑎) changes sign from negative to positive
C 𝑓 ′ (𝑎) = 0 and 𝑓 ′ (𝑎) changes sign from positive to negative
D 𝑓 ′′ (𝑎) < 0
98. For 𝑢 = 𝑒 𝑥 2 −𝑦 2 at 𝑥 = 𝑦 = 1, 𝜕2𝑢 = _______
𝜕𝑥 2
A 1 B 2
C 4 D 6
99. For 𝑢 = sin−1(𝑥 + 𝑦), 𝑥𝑢𝑥 + 𝑦𝑢𝑦 = _______
A 1 B tan 𝑢
C tan 𝑢 (sec 2 𝑢 − 1) D 0
100. Let 𝐹⃗ (𝑥, 𝑦, 𝑧) = 𝑎𝑧𝑖̂ + 𝑏𝑦𝑗̂ − 𝑐𝑥𝑘̂ be a vector field, whose curl is zero. Then
necessarily
A 𝑎+𝑏−𝑐 =0 B 𝑎 = 𝑏 = −𝑐
C 𝑎 = −𝑐 D 𝑎=𝑐
CO Page 12 of 12