2015 Questions Prepared by CS Department1
2015 Questions Prepared by CS Department1
A. D B G E H I F C A C. A B G E H I F C D
B. D H B E G I F C A D. C B G E H I F D A
44. Which of the following element is used to draw scalable graphics with the help of XML?
A. <svg> C. <img>
B. <canvas> D. All
45. PHP code is always enclosed by?
A. <?php & ?> C. <?php & php?>
B. <?php? & ?/php?> D. <?php and ?/php
46. From “h1, .link, #top-link {font-weight: bold}”, which one is class selector?
A. h1 C. #top-link
B. link D. font-weight
47. Which of the following is valid PHP variable?
A. $email C. _email
B. email D. All
48. Which of the following specifies a shorthand property for setting the border properties in
one declaration?
A. border-color C. border-style
B. border-width D. border
49. Suppose, you want to include CSS in-line with html, embedded in html and externally
linking with html in single html file at the same time. From these which one has highest
priority to be applicable?
A. Inline CSS C. External CSS
B. Embedded CSS D. A & B
50. PHP uses which of the following function to create/drop a MySQL database?
A. mysql_connect B. mysql_query
C. mysql_select D. mysql_set
51. Which of the following is not component of a Process Control Block (PCB)?
A. Code C. Bootstrap program
B. Stack D. Data
52. Which module gives control of the CPU to the process selected by the short-term
scheduler?
A. dispatcher C. scheduler
B. interrupt D. none of the mentioned
53. The interval from the time of submission of a process to the time of completion is ________
A. waiting time C. response time
B. turnaround time D. throughput
54. For a deadlock to arise, which of the following conditions must hold simultaneously?
A. Mutual exclusion C. Hold and wait
B. No preemption D. All of the mentioned
55. To access the services of the operating system, the interface is provided by the_________
A. Library C. Assembly instructions
B. System calls D. API
56. CPU scheduling is the basis of ___________
A. multiprogramming OS C. multiprocessor systems
B. larger memory sized systems D. none of the mentioned
57. For an effective operating system, when to check for deadlock?
A. every time a resource request is made at fixed time intervals
B. at fixed time intervals
C. every time a resource request is made
D. none of the mentioned
58. Which one of the following is a question asked for identifying an Actor during requirement
elicitation?
A. Which events does the actor need to be informed by the system about? With what
latency?
B. What are the tasks that the actor wants the system to perform?
C. Which user groups perform secondary functions, such as maintenance and
administration?
D. Which external changes does the actor need to inform the system about? How
often? When?
E. All
59. One of the following is cause of failure for a software project.
A. poor project estimations
B. Training in project management
C. Regular communication with users
D. Decisions based on several inputs
E. All
60. Which one of the following is a feature of software coding?
A. Compatibility C. Simplicity
B. Modularity D. A and B
E. All
61. Which of the following is not project management goal?
A. Keeping overall costs within budget
B. Delivering the software to the customer at the agreed time
C. Maintaining a happy and well-functioning development team
D. Avoiding customer complaints
62. __________ is the difference between the actual outputs and expected one.
A. Bug C. Error
B. Fault D. Failure
63. The prototyping model of software development is well suited ______
A. When requirements are well defined.
B. For projects with large development teams.
C. When a customer cannot define requirements clearly.
D. None of the above
64. Non-functional requirements are statements of services the system should provide.
A. True B. False
65. The Minimum number of states required to construct NFA with 𝟄 – moves for the regular
expression (a+b)* are
A. 2 C. 8
B. 4 D. 16
66. Consider the Finite State Machine given below
Take a binary number 10100 as an input to the above Finite State Machine and read it
from the Least Significant Bit, the output obtained is the input’s
A. 1’s complement C. The number +1
B. 2’s complement D. The number -1
67. Let Σ be an alphabet and Σ = {a, b}, then all strings of length ‘K’ (K≥1) is denoted by ΣK and
the total number of strings for ΣK is denoted by | ∑𝐾 |. The value of | ∑2 | is
A. {a, b} C. {aa, bb}
B. {aa, ab, ba, bb} D. None of the Above
68. What it represents the regular expression given by (a+b)*aaa(a+b)*, if “*” denotes Kleene
Closure?
A. Strings of a’s and b’s of three consecutive a’s
B. Strings of a’s and b’s of odd length
C. Strings of as and b’s of minimum length 3
D. Strings of as and b’s of starting with a’s and ending with b’s
69. A grammar ‘G’ with all the productions of the form A→Bw and/or A→w, where A, B are
Variables and ‘w’ is a terminal is called a
A. Context free Grammar
B. Context Sensitive Grammar
C. Unrestricted Grammar
D. Regular Grammar
70. Consider a Context Free Grammar G =S→S+S│S*S│a│b and a string w= a*a+b, which of
the following statements are true?
I. The string w does not belong to the grammar G
II. The string w can be derived using right most derivation
III. The string w is ambiguous
IV. The grammar G is ambiguous
V. The string w can be derived using left most derivation
A. I, III, IV C. II, IV, V
B. II, III, IV,V D. III, IV, V
71. Which of the statement are true?
I. Regular Grammar is Type-2 Grammar
II. Push Down Automata Accepts Context Free Grammars
III. An unrestricted Grammar is recognized by the Turing Machine
IV. Type-1 Grammars consists of Context Sensitive Grammars
V. Finite Automata can recognize all types Grammars
A. II, III, IV C. II, III, V
B. I, III, V D. II, III, IV, V
72. While programming can be done in any language, in today’s world which programming
Language has become the go-to language for AI and ML-related tasks due to its vast and
diverse library functionalities.
A. Java C. Python
B. Lisp D. PHP
73. Which of the following is not an application of artificial intelligence?
A. Database Management System C. Digital assistant
B. Computer Vision D. Natural Language Processing
74. If a machine can change its course of action based on the external environment on its own,
the machine is called?
A. Actuators C. Intelligent
B. Preceptors D. Mobile
75. Which one of the following symbols is not logical symbol in Artificial intelligence?
A. Implication C. Conjunction
B. Negation D. Preposition
76. What happens when a Machine Learning model learns the detail and noise in the training
data to the extent that it negatively impacts the performance of the model on new data?
A. Under-fitting C. Weak Learning
B. Over-fitting D. Nothing happens
77. Which type of Machine learning algorithms make predictions on a given set of samples, or
searches for patterns within the value labels assigned to data points.
A. Supervised ML algorithms C. Semi-supervised ML algorithms
B. Unsupervised ML algorithms D. Re-enforced ML algorithms
78. What is the name of a collection of text of similar type, for example, movie reviews, social
media posts, etc.?
A. Vocabulary
B. Preprocessing
C. Corpus
D. Tokenization
79. The symbol table is an essential data structure used by the compiles, which of the following
statements are false with respect to symbol table
I. The symbol Table is used by the compiler to find out whether a variable is
passed by value or passed by reference
II. Error handlers are stored in the symbol table
III. The symbol table reduces the memory consumption
IV. Symbol table is used to resolve the scope issues V. The symbol table is
stored in the object file
A. II, III, IV C. III, V
B. I, II, V D. II, III
80. The LEX file, the LEX program is divided in to how many parts and which delimiter is used
to separate each part
A. 4 Parts, Delimiter is ## C. 3 Parts, Delimiter is %%
B. 3 Parts, Delimiter is && D. 4 Parts, Delimiter is @@
81. What is the FOLLOW(B) of the below given grammar?
S → aBDh
B → cC
C → bC / ∈
D → EF
E →g/∈
F →f/∈
A. {$} C. {g, f, h}
B. {g, h} D. {h}
82. Which of the below given parsers will not starts with the input symbol and constructs the
parse tree up to the start symbol by tracing out right most derivation in reverse order
A. LL(1) C. LALR(1)
B. LR(0) D. SLR(1)
83. In view of Syntax Directed Translation, which of the following statements are true?
I. Grammar + Semantic rules = Syntax Directed Translation.
II. The Syntax directed translation scheme is a Regular grammar.
III. For the production, S→E$, after the syntax directed translation scheme is
applied the semantic rule is {print E.val}.
IV. In the semantic rule, attribute is VAL and an attribute may hold anything like
a string, a number, a memory location and a complex record.
V. Syntax direct translation is implemented by constructing a parse tree and
performing the actions in a right to left depth first order.
A. I, II, III C. I, IV, V
B. I, III, IV D. I, III, V
84. For the below given code snippet, if the compiler automatically replaces the last stamen
with y=(float) x, this type of type implicit type conversion is called
int x = 10; float y; y =x;
A. Type casting C. Type coercion
B. Type assignment D. Type correction
85. Which of the following statements are true about the Intermediate code generation
I) Three-address code is an intermediate code and it is used by the optimizing
compilers
II) Each Three address code instruction has at least three operands.
III) The quadruples have four fields to implement the three-address code.
IV) Intermediate code can be represented High Level code as well.
V) Low level intermediate code is used for machine-in dependent optimizations.
A. I, II, V C. I, III, V
B. II, V, III D. I, III, IV