CUET Mock4 (DS + InC + OS) - Random
CUET Mock4 (DS + InC + OS) - Random
Logged in as Student
Sunday 3rd Mar, 2024 08:35:20 AM
Section : C-1st_Sem 2023 Course : JECA Joint Entrance Exam MCA (WB JECA)
1 3 2 4 or more
2. Evaluate the following statement using infix evaluation algorithm and choose the correct answer. 1+2*3-2 Marks: 2
5 3 4 6
3. In linked list each node contains a minimum of two fields. One field is data field to store the data second Marks: 1
field is?
4. Which of the following points is/are not true about Linked List data structure when it is compared with an Marks: 1
array?
Random access is not allowed in Arrays have better cache locality Access of elements in linked list
It is easy to insert and delete
a typical implementation of Linked that can make them better in terms of takes less time than compared to
elements in Linked List
Lists performance arrays
5. Which of the following application makes use of a circular linked list? Marks: 1
Allocating CPU to resources Recursive function calls Implement Hash Tables Undo operation in a text editor
6. You are asked to perform a queue operation using a stack. Assume the size of the stack is some value ‘n’ Marks: 1
and there are ‘m’ number of variables in this stack. The time complexity of performing deQueue operation is
(Using only stack operations like push and pop)(Tightly bound).
7. The type of expression in which operator succeeds its operands is? Marks: 1
8. Which of the following data structure is used to convert postfix expression to infix expression? Marks: 1
9. Which of the following statement is incorrect with respect to infix to postfix conversion algorithm? Marks: 1
10. Linked list data structure offers considerable saving in _____________ Marks: 1
74 40 -18 1
12. Which of the following arrays are used in the implementation of list data type in python? Marks: 1
15. Given only a single array of size 10 and no other memory is available. Which of the following operation is Marks: 2
not feasible to implement (Given only push and pop operation)?
16. You have two jars, one jar which has 10 rings and the other has none. They are placed one above the Marks: 2
other. You want to remove the last ring in the jar. And the second jar is weak and cannot be used to store
rings for a long time.
6 8 9 10
18. How many stacks are required for reversing a word algorithm? Marks: 1
(a+ *(c+d)
20. The postfix form of the expression (A+ B)*(C*D- E)*F / G is? Marks: 1
It is placed in operator stack It is placed on to the output It is ignored Operator stack is emptied
22. Linked list is considered as an example of ___________ type of memory allocation. Marks: 1
23. What is the time complexity of reversing a word using stack algorithm? Marks: 1
24. Consider you have an array of some random size. You need to perform dequeue operation. You can Marks: 2
perform it using stack operation (push and pop) or using queue operations itself (enQueue and Dequeue).
The output is guaranteed to be same. Find some differences?
They will have different time There are chances that output The memory used will not be
No differences
complexities might be different different
25. Is the given statement ((A+B) + [C-D]] valid with respect to balancing of symbols? Marks: 1
26. Which of these operators have the highest order of precedence? Marks: 1
‘*’ and ‘/’ ‘~’ and ‘^’ ‘(‘ and ‘)’ ‘+’ and ‘-‘
27. From the given Expression tree, identify the correct postfix expression from the list of options. Marks: 1
28. In a circular queue, how do you increment the rear end of the queue? Marks: 1
This Site Maintained by Webtech Services
(rear % CAPACITY)+1 (rear+1) % CAPACITY rear++ rear-
31. Which application of stack is used to ensure that the pair of parentheses is properly nested? Marks: 1
32. Operations required for reversing a word or a string using stack are push() and pop(). Marks: 1
33. It is easier for a computer to process a postfix expression than an infix expression. Marks: 1
To find the maximum of all sub Can be used as both stack and
All of the mentioned A-Steal job scheduling algorithm
arrays of size k queue
35. Out of the following operators (^, *, +, and, $), the one having highest priority is _________ Marks: 1
and $ ^ +
36. How many passes does the balancing symbols algorithm makes through the input? Marks: 1
38. What would be the asymptotic time complexity to find an element in the linked list? Marks: 1
4 2
O(n ) O(n ) O(n) O(1)
40. If the elements "A", "B", "C" and "D" are placed in a queue and are deleted one at a time, in what order Marks: 1
will they be removed?
Processor intra-connectivity
Processor bus Rambus Memory bus
circuitry
42. ______ type circuits are generally used for interrupt service lines. Marks: 1
i) open-collector
ii) open-drain
iii) XOR
iv) XNOR
43. The main advantage of multiple bus organisation over a single bus is _____ Marks: 1
44. The added output of the bits of the interrupt register and the mask register is set as an input of Marks: 2
______________
46. After the device completes its operation _____ assumes the control of the BUS. Marks: 1
47. A memory organisation that can hold upto 1024 bits and has a minimum of 10 address lines can be Marks: 1
organized into _____
48. ______________ register is used for the purpose of controlling the status of each interrupt request in Marks: 2
parallel priority interrupt.
49. Which of the following describes the correct format of an input instruction? Marks: 1
52. ______ are used to overcome the difference in data transfer speeds of various devices. Marks: 1
54. The private work space dedicated to a subroutine is called as ________ Marks: 1
55. To reduce the number of external connections required, we make use of ______ Marks: 1
57. The I/O interface required to connect the I/O device to the bus consists of ______ Marks: 1
58. The only difference between the EEPROM and flash memory is that the latter doesn’t allow bulk data to be Marks: 1
written.
60. When Performing a looping operation, the instruction gets stored in the ______ Marks: 1
62. Which registers can interact with the secondary storage? Marks: 1
IR R0 MAR PC
Commonly Operated Machines Commonly Operated Machines Commonly Occupied Machines Commonly Oriented Machines
Used in Technical and Environmental Used in Technical and Educational Used in Technical and Educational Used in Technical and Educational
Research Research Research Research
64. The less space consideration as lead to the development of ________ (for large memories). Marks: 2
65. The processor must take into account the delay in accessing the memory location, such memories are Marks: 1
called ______
Standard Visual Graphics Array Super Visual Graphics Array Standard Video Graphics Array Super Video Graphics Array
67. In SDRAM’s buffers are used to store data that is read or written. Marks: 1
68. In case of nested subroutines the return addresses are stored in __________ Marks: 1
69. The only language which the computer understands is ______________ Marks: 1
71. The cells in a row are connected to a common line called ______ Marks: 1
72. The most efficient way of handling parameter passing is by using ______ Marks: 1
73. The main virtue for using single Bus structure is ____________ Marks: 1
74. The controller multiplexes the addresses after getting the _____ signal. Marks: 2
75. In multiple Bus organisation, the registers are collectively placed and referred as ______ Marks: 1
76. To overcome the slow operating speeds of the secondary memory we make use of faster flash drives. Marks: 1
77. The registers, ALU and the interconnection between them are collectively called as _____ Marks: 1
80. IBM developed a bus standard for their line of computers ‘PC AT’ called _____ Marks: 1
It selects which process has to be It selects which process has to be It selects which process to
None of the mentioned
executed next and allocates CPU brought into the ready queue remove from memory by swapping
82. Round robin scheduling falls under the category of ____________ Marks: 1
All of the mentioned Non-preemptive scheduling None of the mentioned Preemptive scheduling
None of the mentioned Dining - Philosophers problem Readers - Writers problem Producer - Consumer problem
84. In Unix, Which system call creates the new process? Marks: 1
85. What will happen if a non-recursive mutex is locked more than once? Marks: 2
86. In Operating Systems, which of the following is/are CPU scheduling algorithms? Marks: 1
It is a unique identity given to an It is an address that is indexed to It is a unique device number that
None of the mentioned
interrupt an interrupt handler is indexed by an address
88. Which of the following need not necessarily be saved on a context switch between processes? Marks: 1
General purpose registers Translation lookaside buffer Program counter All of the mentioned
CPU cycles wasting locks over Locks that work better on Locks that avoid time wastage in
All of the mentioned
critical sections of programs multiprocessor systems context switches
91. Cascading termination refers to termination of all child processes if the parent process terminates ______ Marks: 1
92. In priority scheduling algorithm, when a process arrives at the ready queue, its priority is compared with Marks: 1
the priority of ____________
93. Which of the following does not interrupt a running process? Marks: 1
Decrease CPU utilization Increase CPU utilization Keep the CPU more idle None of the mentioned
98. Which system call can be used by a parent process to determine the termination of child process? Marks: 1
99. Consider the following set of processes, the length of the CPU burst time given in milliseconds. Marks: 1
Assuming the above process being scheduled with the SJF scheduling algorithm.
The waiting time for process P1 is The waiting time for process P1 is The waiting time for process P1 is The waiting time for process P1 is
0ms 9ms 16ms 3ms
100. To access the services of operating system, the interface is provided by the ___________ Marks: 1
101. Suppose that a process is in "Blocked" state waiting for some I/O service. When the service is Marks: 1
completed, it goes to the __________
102. Which one of the following is a visual ( mathematical ) way to determine the deadlock occurrence? Marks: 1
Starvation graph Inversion graph Resource allocation graph None of the mentioned
103. Which of the following concurrency control protocols ensure both conflict serializability and freedom Marks: 2
from deadlock?
I) 2-phase locking
II) Timestamp ordering
After the corresponding log Until the whole log record has Before the corresponding log
All of the mentioned
record is written out to stable storage been checked for inconsistencies record is written out to stable storage
106. Under multiprogramming, turnaround time for short jobs is usually ________ and that for long jobs is Marks: 1
slightly ___________
CPU is allocated to the process Equal priority processes can not CPU is allocated to the process
None of the mentioned
with highest priority be scheduled with lowest priority
108. In operating system, each process has its own __________ Marks: 1
111. An SJF algorithm is simply a priority algorithm where the priority is ____________ Marks: 1
Destruction and creation phase Growing and shrinking phase Shrinking and creation phase Creation and growing phase
113. Bounded waiting implies that there exists a bound on the number of times a process is allowed to enter Marks: 2
its critical section ____________
Collection of programs that Interface between the hardware System service provider to the
All of the mentioned
manages hardware resources and application programs application programs
Concurrent execution of
The transactions can be carried A valid result occurs after
None of the mentioned transactions is equivalent to the
out one after the other execution transactions
transactions executed serially
117. The initial program that is run when the computer is powered up is called __________ Marks: 1
Lesser prone to deadlocks More prone to deadlocks None of the mentioned Not at all prone to deadlocks
None of the mentioned Keep the waiting time the same Increase the waiting time Decrease the waiting time
Submit Cancel