KSET2015T
KSET2015T
KSET2015T
Note : This paper contains seventy-five (75) objective type questions. Each question
carries two (2) marks. All questions are compulsory.
3. After Executing the following code the 6. Which one of the following is correct ?
7. Which one of the following is not 10. Which one of the following privileges may
correct ?
not be granted using SQL ?
(A) A restriction selects one or more rows
of a relation (A) GRANT SELECT
(B) A projection selects one or more (B) GRANT DELETE
columns of a relation
(C) A join glues each row of one relation (C) REVOKE SELECT
with all the rows of the other (D) REVOKE VIEW
(D) A difference gives all the rows in the
first relation that are not in the 11. Let the maximum number of pixels
second
in a line be M. The number of
8. Which one of the following data definition subdivision at most necessary using
command is not an SQL command ?
the mid-point subdivision method of
(A) CREATE TABLE
clipping is
(B) DROP TABLE
(C) MODIFY TABLE (A) N = log M
2
(D) DROP DOMAIN
(B) N = 2M
13. The clarity of displayed image 17. Which of the following operators cannot
depends on be overloaded ?
21. You have 8 work stations that are 25. Which of the following is an IP link state
connected to a switch, each is connected protocol ?
to an 10 Mbps port. What will be the
(A) RIP
individual bandwidth available to each ?
(B) IGRP
(A) 80
(C) EIGRP
(B) 10
(D) OSPF
(C) 16
(D) 5 26. What is the time complexity of the
following recursive function ?
22. What does RARP do ?
int DoSomething ( int n )
(A) Get IP from MAC addresses
{
(B) Get MAC address from IP addresses
if ( n<=2)
(C) Get IP from IPX addresses
return 1;
(D) It resolves an network address to
else
DLCI
return (DoSomething ( floor (sqrt(n))) + n);
24. In order to have 5 subnets and 17 hosts 27. Given an empty stack, after performing
on each subnet how many bits subnetting push (1), push (2), Pop, push (3), push
will you do on the class B address (4), Pop, Pop, push (5), Pop, what is the
162.13.0.0/16 ? value of the top of the stack ?
(A) 255.255.128.0 (A) 4
(B) 255.255.224.0
(B) 3
(C) 255.255.240.0
(C) 2
(D) 255.255.248.0
(D) 1
K-2415 5 Paper III
*2415* Total Number of Pages : 16
28. Consider a linked list implementation of 32. The _______ operator dynamically
a queue with two pointers: front and rear. allocates memory for an object of a
The time needed to insert element in a
specified type and returns a ______ to
queue of length n is
that type.
(A) O (1)
(A) new, pointer
(B) O( log n)
2
(B) mem, mem
(C) O(n)
(D) O(n log2 n) (C) volatile, data
35. An overloaded unary operator defined as 38. Which of the following Construct in
a member function requires how many
formal model in software
values to be passed as function
engineering execute each statement
arguments ?
in succession ?
(A) 0
(A) Selection Construct
(B) 1
41. At a particular time, the value of a 44. Consider a system having ‘m’ resources
counting semaphore is 10. It will become of the same type. These resources are
(B) 12
42. Fence register is used for
(C) 13
(A) CPU protection
(D) 14
(B) Memory protection
45. The most efficient data set
(C) File protection
organization is
(D) All of these
(A) A sequential file
43. In a paged memory, the page hit ratio is (B) An ISAM file
0.35. The time required to access a page (C) Variable depending upon the usage
in secondary memory is equal to 100 ns. of the data set
47. Hill-Climbing algorithm terminates when, 50. Which part of an expert system applies
constitutes to the frame structure ? 51. Any polynomial with positive integer
61. In linear programming we need to ensure 64. Identify in which among the following
that both the objective function and the methods does a row or column difference
constraints can be expressed as linear indicate the minimum unit penalty
expressions of
incurred by failing to make an allocation
(A) Constraints
to the least cost cell in that row or
(B) Basic variables
column.
(C) Decision variables
(A) North West corner rule
(D) Objective function
(B) Matrix minima method
62. When a linear programming problem is
represented in the canonical form, the (C) Vogel’s approximation method
minimization of a function is
(D) Modi method
mathematically equivalent to the
_________ function.
65. The technique of Monte Carlo involves
(A) Minimization of the negative
the selection of _________ observations
expression
(B) Maximization of the negative with in the simulation model.
(D) None of them are true (A) Process 0 is called init process
(B) a neural network that contains (C) After forking process 1, process 0
feedback
becomes swapper process
(C) a neural network that has only one
loop (D) Process 0 is a special process
(D) a neural network that has multiple created when system boots
loop
72. Match the following for Windows 73. Which command is used to remove the
Operating System :
read permission of the file ‘note’ from both
List – I List – II
a) Hardware (i) Starting all processes, the group and others ?