18 Master
18 Master
DOs:
1. Check whether the Register No. has been entered and shaded in the respective circles on the OMR answer
sheet.
2. Check whether the Centre Code has been entered and shaded in the respective circles on the OMR answer
sheet.
3. Check whether the subject name has been written and the subject code has been entered and shaded in the
respective circles on the OMR answer sheet.
4. This question booklet will be issued to you by the invigilator after the 2nd bell i.e., after 1.55 pm.
5. The serial number of this question booklet should be entered on the OMR answer sheet.
6. The Version Number of this question booklet should be entered on the OMR answer sheet and the respective
circles should also be shaded completely.
7. Compulsorily sign at the bottom portion of the OMR answer sheet in the space provided.
DONTs:
1. The timing and mark’s printed on the OMR answer sheet should not be damaged / mutilated / spoiled.
2. The 3rd Bell rings at 2.00 pm, till then;
• Do not remove the seal on the right hand side of this question booklet.
• Do not look inside this question booklet.
• Do not start answering on the OMR answer sheet.
IMPORTANT INSTRUCTIONS TO CANDIDATES
1. This question booklet contains 100 questions and each question will have one statement and four distracters
(Four different options / choices.)
2. After the 3rd Bell is rung at 2.00 pm, remove the seal on the right hand side of this question booklet and check
that this booklet does not have any unprinted or torn or missing pages or items etc., if so, get it replaced by
complete test booklet. Read each item and start answering on the OMR answer sheet.
3. During the subsequent 180 minutes:
• Read each question carefully,
• Choose the correct answer from out of the four available distracters (options / choices) given under each
question / statement.
• Completely darken / shade the relevant circle with a blue or black ink ballpoint pen against the question
number on the OMR answer sheet.
Correct Method of shading the circle on the OMR answer sheet is as shown below:
A B C D
4. Please note that even a minute unintended ink dot on the OMR answer sheet will also be recognized and
recorded by the scanner. Therefore, avoid multiple markings of any kind on the OMR answer sheet.
5. Use the space provided on the question booklet for Rough Work. Do not use the OMR answer sheet for the
same.
6. After the last bell is rung at 5.00 pm, stop writing on the OMR answer sheet and affix your left hand thumb
impression on the OMR answer sheet as per the instructions.
7. Hand over the OMR answer sheet to the room invigilator as it is.
8. After separating the top sheet, the invigilator will return the bottom sheet replica (candidate’s copy) to you to
carry home for self evaluation.
9. Preserve the replica of the OMR answer sheet for a minimum period of ONE year.
10. In case of any discrepancy in the English and Kannada Versions, the English version will be taken as final in case
of Compulsory Paper – III and Optional Papers, except the languages of optional paper.
18
1. The number of one’s present in the binary representation of 10 × 256 + 5 × 16 + 5 is
10 × 256 + 5 × 16 + 5gÀ ¨ÉÊ£Àj ¤gÀÆ¥ÀuÉAiÀÄ°è ¸ÀASÉå MAzÀÄ JµÀÄÖ ¨Áj §gÀÄvÀÛzÉ ?
(A) 5 (B) 6
(C) 7 (D) 8
2. In which of the following gates, the output is one, iff atleast one input is one ?
F PɼÀV£À AiÀiÁªÀ UÉÃmï£À°è PÀ¤µÀÖ ¥ÀPÀë MAzÀÄ ºÀÆrPÉ (input)AiÀÄÄ MAzÀÄ DVzÀÝgÉ,
¤ÃrPÉ (output)AiÀÄÄ MAzÀÄ DVgÀÄvÀÛzÉ ?
(A) NOR (B) AND
(C) OR (D) NAND
3. The hexadecimal number for (95.5)10 is
(95.5)10 UÉ ºÉPÁìqɹªÀÄ2ï (hexadecimal) ¸ÀASÉå AiÀiÁªÀÅzÀÄ ?
(A) (5F.8)16 (B) (9A.B)16
(C) (2E.F)16 (D) (5A.4)16
4. Which of the following sets of component(s) is/are sufficient to implement only arbitrary
Boolean function ?
(A) XOR gates, NOT gates
(B) 2 to 1 multiplexers
(C) AND gates, XOR gates
(D) Three - input gates that output (A.B) + C for the inputs A, B and C
F PɼÀPÀAqÀ AiÀiÁªÀ WÀlPÀ(UÀ¼À) UÀtªÀÅ AiÀiÁªÀÅzÉà ¤µÀàçªÀiÁtÂvÀ §Æ°AiÀiÁÄó PÁAiÀÄðªÀ£ÀÄß
C£ÀĵÁפ¸À®Ä ¸ÁPÁUÀÄvÀÛzÉ ?
(A) XOR UÉÃmïUÀ¼ÀÄ, NOT UÉÃmïUÀ¼ÀÄ
(B) 2 to 1 ªÀİ֥ÉèPÀìgïUÀ¼ÀÄ
(C) AND UÉÃmïUÀ¼ÀÄ, XOR UÉÃmïUÀ¼ÀÄ
(D) A, B ªÀÄvÀÄÛ C ºÀÆrPÉUÀ½UÉ (A.B) + C ¤ÃrPÉUÀ¼ÁzÀ ªÀÄÆgÀÄ ºÀÆrPÉ UÉÃmïUÀ¼ÀÄ
9. If the following ‘C’ program (myprog) is run from the command line as
C:>myprog Friday Tuesday Sunday then, what would be the output?
F PɼÀV£À C PÀæªÀÄ«¢ü (myprog) AiÀÄ£ÀÄß DzÉñÀ ¸Á°¤AzÀ C :>myprog Friday Tuesday
Sunday £ÀqɹzÁUÀ ¤ÃrPÉ output K£ÁVgÀÄvÀÛzÉ ?
main(int argc, char *argv[])
{
printf(“%c” ,**++argv);
}
(A) m (B) f
(C) myprog (D) Friday
16. Identify the access specifier that is used as a default in a class definition
(A) protected (B) public
(C) private (D) friend
PÁèöå¸ï qɦü£ÉñÀ£ï£À°è r¥sÁ2ïÖ DV §¼À¸À®àqÀĪÀ ƒ’ðÜ
Þ Èó ¸É๥ÉÊAiÀÄgÀ£ÀÄß UÀÄgÀÄw¹
(A) ¥ÉÆæmÉPÉÖqï (B) ¥À©èPï
(C) ¥ÉæöʪÉÃmï (D) ¥sÉæAqï
21. Given a binary tree, whose inorder and preorder traversal are given by
Inorder : EICFBGDJHK
Preorder : BCEIFDGHJK
The post order traversal of the above binary tree is
¨ÉÊ£Àj ªÀÈPÀëzÀ E£ïDqïðgï ºÁUÀÆ ¥ÉÆÃ¸ïÖ DqÀðgï mÁæöåªÀ¸Àð2ïUÀ¼ÀÄ F ªÀÄÄA¢£ÀAwzÀÝgÉ :
M¼ÀªÀåªÀ¸ÉÜ : EICFBGDJHK
¥ÀƪÀðªÀåªÀ¸ÉÜ : BCEIFDGHJK
F PɼÀV£À AiÀiÁªÀÅzÀÄ ¨ÉÊ£Àj ªÀÈPÀëzÀ ¥ÉÆÃ¸ïÖ DqÀðgï mÁæöåªÀ¸Àð2ï DVzÉ ?
(A) IEFCGJKHDB (B) IEFCJGKHDB
(C) IEFCGKJHDB (D) IEFCGJKDBM
Space For Rough Work
23. The efficient data structure to insert/delete a number in a stored set of number is
(A) Queue (B) Linked list
(C) Doubly linked list (D) Binary tree
¸ÀASÉåUÀ¼À£ÀÄß ±ÉÃRj¹zÀ MAzÀÄ UÀtzÀ°è MAzÀÄ ¸ÀASÉåAiÀÄ£ÀÄß ¸ÉÃj¸À®Ä/
vÉUÉzÀĺÁPÀĪÀÅzÀPÁÌV ¸ÀªÀÄ¥ÀðPÀªÁzÀ zÀvÀÛ ¸ÀAgÀZÀ£É AiÀiÁªÀÅzÀÄ ?
(A) PÀÆå (B) eÉÆÃr¹zÀ ¥ÀnÖ
(C) JgÀqÀÄ ¨Áj eÉÆÃr¹zÀ ¥ÀnÖ (D) ¨ÉÊ£Àj ªÀÈPÀë
24. The minimum number of nodes in a binary tree of depth ‘d’ (root is at level o) is
‘d’ D¼ÀzÀ ¨ÉÊ£Àj ªÀÈPÀëzÀ°è£À PÀ¤µÀÖ £ÉÆÃqïUÀ¼À ¸ÀASÉå JµÀÄÖ ?
(A) 2d – 1 (B) 2d+1 – 1
(C) 2d–1 (D) d + 1
26. The post order traversal of a binary tree is DEBFCA, then the pre - order traversal is
¨ÉÊ£Àj ªÀÈPÀëzÀ ¥ÉÆÃ¸ïÖ DqÀðgï mÁæªÀ¸Àð2ï DEBFCA DVzÀÝgÉ, ¦æÃ DqÀðgï mÁæªÀ¸Àð2ï AiÀiÁªÀÅzÀÄ ?
(A) ABFCDE (B) ADBFEC
(C) ABDECF (D) ABCDEF
Space For Rough Work
28. What is the appropriate data structure for representing hierarchical relationship between
the elements ?
(A) Dequeue. (B) Priority Queue.
(C) Tree. (D) Stack.
CA±ÀUÀ¼À £ÀqÀÄ«£À ±ÉæÃtÂPÀÈvÀ ¸ÀA§AzsÀªÀ£ÀÄß ¤gÀƦ¸ÀĪÀÅzÀPÉÌ ¸ÀªÀÄAd¸ÀªÁzÀ zÀvÀÛ ¸ÀAgÀZÀ£É
AiÀiÁªÀÅzÀÄ ?
(A) rPÀÆå (B) DzÀåvÁ PÀÆå
(C) ªÀÈPÀë (D) ¸ÁÖöåPï
29. The minimum number of interchanges needed to convert the array 89, 19, 14, 40, 17, 12,
10, 2, 5, 7, 11, 6, 9, 70 into a heap with the maximum element at the root is
DgÉæÃ 89, 19, 14, 40, 17, 12, 10, 2, 5, 7, 11, 6, 9, 70 AiÀÄ£ÀÄß ªÀÄÆ®zÀ°è UÀjµÀÖ
CA±ÀzÉÆA¢UÉ MAzÀÄ gÁ²AiÀiÁV ¥ÀjªÀwð¸À®Ä CUÀvÀåªÁVgÀĪÀ CAvÀg﫤AiÀĪÀÄzÀ
PÀ¤µÀ× ¸ÀASÉå AiÀiÁªÀÅzÀÄ ?
(A) 0 (B) 1
(C) 2 (D) 3
33. A relationship between processes such that each has some point (critical section) which
must not be executed while the critical section of another is being executed is known as
(A) Semaphore (B) Mutual execution
(C) Multiprogramming (D) Message passing
¥ÀæwAiÉÆAzÀÆ, ªÀÄvÉÆÛAzÀgÀ QænPÀ2ï «¨sÁUÀªÀ£ÀÄß ¤ªÀð»¸ÀĪÁUÀ, ¤ªÀð»¸À¨ÁgÀzÁzÀ
PÉ®ªÀÅ ¨sÁUÀ (critical section) UÀ¼À£ÀÄß ºÉÆA¢gÀĪÀ ¥ÀæQæAiÉÄUÀ¼À £ÀqÀÄ«£À ¸ÀA§AzsÀªÀ£ÀÄß
K£ÉAzÀÄ PÀgÉAiÀÄ2ÁUÀÄvÀÛzÉ ?
(A) ¸ÉªÀiÁ¥sÉÆÃgï (B) ¥ÀgÀ¸ÀàgÀ §»µÀÌgÀt
(C) §ºÀÄPÀæªÀÄ«¢ü (D) ¸ÀAzÉñÀ gÀªÁ£É
35. In round robin CPU scheduling algorithm as the time quantum increases the average turn
around time
(A) Decreases (B) Increases
(C) Remains constant (D) Varies randomly
gËAqï gÁ©£ï ¹¦AiÀÄÄ µÉqÀÆå°AUï D2ÉÆÎjzÀªÀiï£À°è mÉʪÀiï PÁéAlªÀiï ºÉZÁÑzÀAvÉ
¸ÀgÁ¸Àj l£ïð CgËAqï mÉʪÀiï _________
(A) PÀrªÉÄAiÀiÁUÀÄvÀÛzÉ (B) ºÉZÁÑUÀÄvÀÛzÉ
(C) ¹ÜgÀªÁVgÀÄvÀÛzÉ (D) AiÀiÁzÀÈaÒPÀªÁV ªÀåvÁå¸ÀªÁUÀÄvÀÛzÉ.
43. In estimating the software cost the Lines of Code (LOC) and Function Point (FP) are used
to measure what ?
(A) Length of code (B) Size of software
(C) Functionality of s/w (D) Both (A) and (B) are true
vÀAvÁæA±ÀzÀ ªÉZÀѪÀ£ÀÄß CAzÁdÄUÉÆ½¸ÀĪÀ°è 2ÉÊ£ïì D¥sï PÉÆÃqï(LOC) ºÁUÀÆ ¥sÀAPÀë£ï
¥Á¬ÄAmï (FP) UÀ¼À£ÀÄß AiÀiÁªÀÅzÀ£ÀÄß C¼ÀvɪÀiÁqÀ®Ä §¼À¸À2ÁUÀÄvÀÛzÉ ?
(A) ¸ÀAPÉÃvÀzÀ GzÀÝ (B) vÀAvÁæA±ÀzÀ UÁvÀæ
(C) s/w £À PÁAiÀÄ𠤪ÀðºÀuÉ (D) (A) ªÀÄvÀÄÛ (B) JgÀqÀÆ ¸Àj
44. What is the equivalence partitioning method that divides the input domain of a program
into classes of the data from which task case can be derived ?
(A) White box testing (B) Black box testing
(C) Orthogonal array testing (D) Stress testing
MAzÀÄ PÀæªÀÄ«¢üAiÀÄ HrPÉ ªÁå¦ÛAiÀÄ£ÀÄß, mÁ¸ïÌ PÉøïUÀ¼À£ÀÄß vÀAiÀiÁj¸À§ºÀÄzÁzÀ zÀvÀÛzÀ
PÁè¸ïUÀ¼À£ÀÄß «AUÀr¸ÀĪÀ FQéªÀ2É£ïì ¥ÁnðµÀ¤AUï «zsÁ£À AiÀiÁªÀÅzÀÄ ?
(A) ªÉÊmï ¨ÁPïì ¥ÀjÃPÉë (B) ¨ÁèöåPï ¨ÁPïì ¥ÀjÃPÉë
(C) DxÁðUÀ£À2ï DgÉà ¥ÀjÃPÉë (D) ¸ÀÖç¸ï ¥ÀjÃPÉë
45. In a function oriented design
(A) Cohesion and coupling are minimised.
(B) Cohesion and coupling are maximised.
(C) Cohesion minimised and coupling are maximised.
(D) Cohesion maximised and coupling are minimised.
MAzÀÄ PÁAiÀiÁð¨sÁgÀ ¸ÀA§A¢üvÀ «£Áå¸ÀzÀ°è _________
(A) ¸ÀAWÀl£É ªÀÄvÀÄÛ eÉÆÃqÀuÉUÀ¼ÀÄ PÀÄUÀÄÎvÀÛªÉ
(B) ¸ÀAWÀl£É ªÀÄvÀÄÛ eÉÆÃqÀuÉUÀ¼ÀÄ »UÀÄÎvÀÛªÉ
(C) ¸ÀAWÀl£ÉAiÀÄÄ PÀÄUÀÄÎvÀÛzÉ ªÀÄvÀÄÛ eÉÆÃqÀuÉUÀ¼ÀÄ »UÀÄÎvÀÛzÉ
(D) ¸ÀAWÀl£ÉAiÀÄÄ »UÀÄÎvÀÛzÉ ªÀÄvÀÄÛ eÉÆÃqÀuÉUÀ¼ÀÄ PÀÄUÀÄÎvÀÛªÉ
Space For Rough Work
47. Software safety is a _________ activity that focuses on the identification and assessment
of potential hazards that may affect software negativity and cause an entire system to fail.
(A) Risk mitigation, monitoring and management
(B) Software quality assurance
(C) Software cost estimation
(D) Defect removal efficiency
vÀAvÁæA±À ¸ÀÄgÀPÀëvÉ, EzÀÄ vÀAvÁæA±À £ÀPÁgÁvÀäPÀvÉ ªÀÄvÀÄÛ MAzÀÄ ¸ÀA¥ÀÆt𠹸ÀÖªÀiï£À
«¥sÀ®ªÁUÀÄ«PÉAiÀÄ ªÉÄÃ2É ¥ÀjuÁªÀÄ ©ÃgÀĪÀ ¸ÀªÀÄxÀð CqÀZÀuÉUÀ¼À UÀÄgÀÄw¸ÀÄ«PÉ ªÀÄvÀÄÛ
ªÀi˰åÃPÀgÀtzÀ ªÉÄÃ2É UÀªÀÄ£À«j¸ÀĪÀ MAzÀÄ ________ ZÀlĪÀnPÉAiÀiÁVzÉ.
(A) j¸ïÌ «ÄnUÉñÀ£ï, ªÀiÁ¤ljAUï, ªÀiÁå£ÉÃeïªÉÄAmï
(B) ¸Á¥sïÖªÉÃgï PÁé°n C¸ÀÄìgÀ£ïì
(C) ¸Á¥sïÖªÉÃgï PÁ¸ïÖ J¹ÖªÉÄñÀ£ï
(D) r¥sÉPïÖ jªÀÄÆªÀ2ï J¦ü²AiÀĤì
48. On an average the programmer months(pm) is given by 3.6 * (KLOC)12. If so, a project
requiring one thousand sources instructions will require
3.6 * (KLOC)12 £À ªÀÄÆ®PÀ ¥ÉÆæÃUÁæªÀÄgï ªÀÄAvïì(pm) £ÀÄß ¤ÃqÀ2ÁVzÉ, ºÁUÁzÀgÉ MAzÀÄ
¸Á«gÀ DPÀgÀ ¸ÀÆZÀ£ÉUÀ¼À CªÀ±ÀåPÀvɬÄgÀĪÀ MAzÀÄ ¥ÁæeÉPïÖ _______ £ÀÄß PÉÆÃgÀÄvÀÛzÉ.
(A) 3.6 pm (B) 0.36 pm
(C) 0.0036 pm (D) 7.23 pm
50. If the number of conditions in a decision table is n, then maximum number of rules
(Column) is possible is
MAzÀÄ ¤tðAiÀÄ ¥ÀnÖAiÀÄ°è µÀgÀvÀÄÛUÀ¼À ¸ÀASÉåAiÀÄÄ n DVzÀÝgÉ, ¤AiÀĪÀÄ(column) UÀ¼À
¸ÀA¨sÀªÀ¤ÃAiÀÄ UÀjµÀÖ ¸ÀASÉåAiÀÄÄ
(A) n (B) 2n
(C) 2n (D) log2n
51. For a database relation R(a,b,c,d), where domain of a,b,c,d include only the atomic values
the functional dependency ac, bd holds in the following relation in
a,b,c,d AiÀÄ PÁAiÀÄðPÉëÃvÀæªÀÅ DmÉÆÃ«ÄPï ªÀiË®åUÀ¼À£ÀÄß ªÀiÁvÀæ M¼ÀUÉÆArgÀĪÀ zÀvÁÛA±À
¸ÀA§AzsÀ R(a,b,c,d)UÉ, PÁAiÀÄðzÀ CªÀ®A§£É ac, bd AiÀÄÄ F PɼÀV£À AiÀiÁªÀÅzÀgÉÆ¼ÀUÉ
ºÉÆA¢gÀÄvÀÛzÉ ?
(A) 1NF not in 2NF (B) 2NF not in 3NF
(C) 3NF (D) 1NF
54. If in a tree, for every node the height of its left subtree and, right subtree differ almost by
one then the tree is
(A) Binary search tree (B) AVL tree
(C) Threaded tree binary tree (D) Complete binary tree.
MAzÀÄ ªÀÈPÀëzÀ°è ¥Àæw £ÉÆÃqïUÉ JqÀUÀqÉAiÀÄ ªÀÄvÀÄÛ §®UÀqÉAiÀÄ G¥ÀªÀÈPÀëUÀ¼À JvÀÛgÀªÀÅ ¸ÀASÉå
1 gÀµÀÄÖ ªÀåvÁå¸À«zÀÝgÉ, D ªÀÈPÀëªÀÅ
(A) ¨ÉÊ£Àj ¸ÀZïð næÃ (B) AVL næÃ
(C) vÉæqÉqï næÃ ¨ÉÊ£Àj næÃ (D) PÀA¦èÃmï ¨ÉÊ£Àj næÃ
55. How many character per second (7 bits +1 parity) can be transmitted over a 2400 bps line
in case of synchronous data transfer ?
JµÀÄÖ CPÀëgÀUÀ¼À£ÀÄß ¥Àæw ¸ÉPÀArUÉ (7bits + 1 parity)UÉ 2400 bps 2ÉÊ£ï£À°è ¹APÉÆæÃ£Éʸï
zÀvÀÛ ªÀUÁðªÀuÉAiÀÄ°è ªÀUÁð¬Ä¸À§ºÀÄzÀÄ ?
(A) 300 (B) 240
(C) 250 (D) 275
58. What is the maximum size of data that the application layer can pass on to the TCP layer ?
(A) Any size (B) 216 bytes
(C) Size of TCP header (D) 1500 bytes
C¦èèPÉõÀ£ï 2ÉÃAiÀÄgï TCP 2ÉÃAiÀÄgïUÉ PÀ¼ÀÄ»¸À§ºÀÄzÁzÀ qÁmÁzÀ UÀjµÀ× UÁvÀæªÀÅ
(A) AiÀiÁªÀÅzÉà UÁvÀæ¢gÀ§ºÀÄzÀÄ
(B) 216 ¨ÉÊmïìUÀ¼ÁVgÀ§ºÀÄzÀÄ
(C) TCP ºÉqÀgï UÁvÀæzÀ¶ÖgÀ§ºÀÄzÀÄ
(D) 1500 ¨ÉÊmïìUÀ¼ÁVgÀ§ºÀÄzÀÄ
61. A binary relation R = {(1,1),(2,1),(2,2),(2,3), (2,4), (3,1),(3,2), (3,3), (3,4)} on the set
A = {1,2,3,4} is
(A) reflexive symmetric and transitive
(B) neither reflexive nor irreflexive but transitive
(C) irreflexive anti-symmetric
(D) irreflexive symmetric and transitive.
¨ÉÊ£Àj j2ÉõÀ£ï R={(1,1),(2,1),(2,2),(2,3)(2,4),(3,1),(3,2),(3,3),(3,4)}ªÀÅ ˜µ¸ å A={1,2,3,4}
zÀ ªÉÄÃ2É ªÁåSÁ夹zÁUÀ PɼÀV£À AiÀiÁªÀÅzÀ£ÀÄß vÀȦۥÀr¸ÀÄvÀÛzÉ ?
(A) j¥sÉèQìªï, ¹«ÄnæPï „ÏAqï mÁæ¤ìnªï
(B) j¥sÉèQìªï C®è, Egïj¥sÉèQìªï C®è DzÀgÉ mÁæ¤ìnªï DVgÀÄvÀÛzÉ
(C) Egïj¥sÉèQìªï, DAn ¹«ÄnæPï
(D) Egïj¥sÉèQìªï, ¹«ÄnæPï „ÏAqï mÁæ¤ìnªï
66. How many distinguishable permutation can be generated from a word “BANANA” ?
“BANANA” JA§ ¥ÀzÀ¢AzÀ JµÀÄÖ ¨ÉÃgÉ ¨ÉÃgÉ PÀæªÀÄ eÉÆÃqÀuÉUÀ¼À£ÀÄß GvÀàwÛ¸À§ºÀÄzÀÄ ?
(A) 720 (B) 60
(C) 240 (D) 120
69. All the hidden surface algorithms employee image space approach except which one of
the flowing method ?
(A) Back space removal (B) Depth buffer
(C) Scan line (D) Depth sort
J2Áè »qÀ£ï ¸À¥sÉðøï D2ÉÆÎjzsÀªÀiïUÀ¼ÀÄ PɼÀV£À AiÀiÁªÀ «zsÁ£ÀzÀ ºÉÆgÀvÁV EªÉÄÃeï
¸Éàøï C¥ÉÆæÃZÀ£ÀÄß C¼ÀªÀr¸ÀÄvÀÛzÉ ?
(A) ¨ÁåPï ¸Éàøï jªÀÄÆªÀ2ï (B) qÉ¥ïÛ §¥sÀgï
(C) ¸ÁÌöå£ï 2ÉÊ£ï (D) qÉ¥ïÛ ¸Ámïð
71. What is the prototype of the default constructor for public class test() ?
public class test() EzÀgÀ°è r¥sÁ2ïÖ PÀ£ïìlæPÀÖgï£À ¥ÉÆæmÉÆÃmÉÊ¥ï AiÀiÁªÀÅzÀÄ ?
(A) test () (B) test (void)
(C) public test () (D) public test (void)
74. Which one of the following method is used to obtain values of invoking object as a long ?
PɼÀV£À AiÀiÁªÀ «zsÁ£ÀÔåÄåêÆ E£ïªÉÇÃQAUï D¨ÉÓPïÖ Då¸ï J 2ÁAUï JA§ÄzÀgÀ
ªÀiË®åªÀ£ÀÄß PÀAqÀÄ»rAiÀÄ®Ä G¥ÀAiÉÆÃV¸ÀÄvÁÛgÉ ?
(A) long value() (B) longlongValue()
(C) Long longvalue() (D) LongLongvalue()
78. Which of the following is TRUE only for XML but not for HTML ?
(A) Derived from SGML.
(B) Describes control and layout.
(C) Allows user defined tags.
(D) Restricted only to be used with web browser.
PɼÀV£À AiÀiÁªÀÅzÀÄ JPïìJAJ2ïUÉ ªÀiÁvÀæ ¸ÀjAiÀiÁVzÉ DzÀgÉ ºÉZïnJAJ2ïUÉ
¸ÀA§A¢ü¹gÀĪÀÅ¢®è ?
(A) SGML ¤AzÀ rgÉÊªïØ DVzÉ
(B) EzÀÄ PÀAmÉÆæÃ2ï ªÀÄvÀÄÛ 2ÉÃOmïUÀ¼À£ÀÄß «ªÀj¸ÀÄvÀÛzÉ
(C) EzÀÄ AiÀÄÆdgï r¥sÉÊ£Àqï mÁåUïì£ÀÄß C£ÀĪÀÄw¸ÀÄvÀÛzÉ.
(D) EzÀÄ ªÉ¨ï ¨Ëædgï£ÉÆA¢UÉ ªÀiÁvÀæ G¥ÀAiÉÆÃV¸À®Ä ¤§ðA¢ü¸À®ànÖgÀÄvÀÛzÉ.
82. The worst case time complexity of the sorting algorithm by using divide- and -conquer is
rªÉÊqï ªÀÄvÀÄÛ PÁ£ÀÌgï ¥ÀzÀÞwAiÀÄ£ÀÄß G¥ÀAiÉÆÃV¹PÉÆAqÀÄ PÀæªÀĪÁV eÉÆÃr¸ÀĪÀ
C2ÉÆÎÃjzsÀªÀiï £À QèÚÈå± ¸ÀªÀÄAiÀÄzÀ vÉÆqÀPÀÄ AiÀiÁªÀÅzÀÄ ?
(A) Ο(n log n) (B) Ο(n3)
(C) Ο(n2 log n) (D) Ο(log n)
85. Given 0 – 1 knapsack problem and fractional knapsack problem and the following
statements:
S1: 0 – 1 knapsack is efficiently solved by using Greedy algorithm.
S2: Fractional knapsack is efficiently solved using by dynamic programming.
Which of the following is true?
(A) S1 is correct and S2 is not correct
(B) S1 and S2 both are correct
(C) S1 and S2 both are not correct
(D) S1 is not correct and S2 is correct
0–1 knapsack ªÀÄvÀÄÛ fractional knapsack ¸ÀªÀĸÉåUÀ¼À£ÀÄß PÉÆmÁÖUÀ ªÀÄvÀÄÛ PɼÀV£À
ºÉýPÉUÀ¼À£ÀÄß UÀªÀĤ¹zÁUÀ :
S1 : 0 – 1 knapsack C£ÀÄß VæÃqï C2ÉÆÎjzÀªÀiï£À ¸ÀªÀÄ¥ÀðPÀ §¼ÀPɬÄAzÀ ¥ÀjºÀj¸À2ÁVzÉ
S2 : fractional knapsackC£ÀÄß qÉÊ£Á«ÄPï ¥ÉÆæÃUÁæªÀiï£À ¸ÀªÀÄ¥ÀðPÀ §¼ÀPɬÄ0zÀ
¥ÀjºÀjÜÈå2ÁUÀĪÀÅÁµåê. DUÀ F PɼÀV£À AiÀiÁªÀÅzÀÄ ¸ÀjAiÀiÁVzÉ ?
(A) S1 ¸Àj ªÀÄvÀÄÛ S2 vÀ¥ÀÄà
(B) S1 ªÀÄvÀÄÛ S2 JgÀqÀÆ ¸Àj
(C) S1 ªÀÄvÀÄÛ S2 JgÀqÀÆ vÀ¥ÀÄà
(D) S1 vÀ¥ÀÄà ªÀÄvÀÄÛ S2 ¸Àj
Space For Rough Work
87. The Newton–Raphson iteration xn+1 = (xn / 2) + (3 / 2xn) can be used to solve the equation
£ÀÆål£ï-gÁå¥À¸À£ï£À, ElgÉõÀ£ï xn+1 = (xn / 2) + (3 / 2xn) £ÀÄß PɼÀV£À AiÀiÁªÀ ¸À«ÄÃPÀgÀtPÉÌ
¥ÀjºÁgÀ PÀAqÀÄ»rAiÀÄ®Ä G¥ÀAiÉÆÃV¸À§ºÀÄzÀÄ ?
(A) x2 = 3 (B) x3 = 3
(C) x2 = 2 (D) x3 = 2
88. A root of the equation x3 – x – 11 = 0, correct to four decimal using bisection method is
¨ÉʸÉPÀë£ï ¥ÀzÀÞwAiÀÄ£ÀÄß G¥ÀAiÉÆÃV¹ x3 – x – 11 = 0, ¸À«ÄÃPÀgÀtªÀ£ÀÄß ©r¹zÁUÀ
x ªÀÄÆ® ¨É2ÉAiÀÄÄ £Á®ÄÌ zÀ±ÁA±ÀUÀ½UÉ F PɼÀV£À AiÀiÁªÀ MAzÀÄ ¸ÀASÉå ¸ÀjAiÀiÁVgÀÄvÀÛzÉ ?
(A) 2.3737 (B) 2.3838
(C) 2.3736 (D) 2.3837
89. The order of errors in the Simpson’s rule for solving a numerical integration with a step
size h is
¹A¥Àì£ï ¤AiÀĪÀÄzÀ°è ‘h’ UÁvÀæ-ºÀAvÀzÀ £ÀÆåªÀÄjPÀ2ï EAnæUÉæÃ±À£ï ¥ÀjºÁgÀ
PÀAqÀÄ»rAiÀÄĪÁUÀ zÉÆÃµÀUÀ¼À PÀæªÀĪÀÅ PɼÀV£À AiÀiÁªÀÅzÁVgÀÄvÀÛzÉ ?
(A) h (B) h2
(C) h3 (D) h4
Space For Rough Work
94. In star schema, a type of relationship between a dimension and fact table is
(A) many-to-many (B) one-to-one
(C) one-to-many (D) many-to-one
¸ÁÖgï ¹ÌÃÔåìæzÀ MAzÀÄ qÉʪÉÄ£Àë£ï ªÀÄvÀÄÛ ¥sÁå’ó± mÉç2ï£À £ÀqÀÄ«£À ¸ÀA§AzsÀzÀ «zsÁ£À
AiÀiÁªÀÅzÀÄ ?
(A) ªÉĤ-lÄ-ªÉĤ (B) M£ï-lÄ-M£ï
(C) M£ï-lÄ-ªÉĤ (D) ªÉĤ-lÄ-M£ï
97. The term ____________ refer loosely to the process of semi-automatically analyzing large
databases to find useful pattern.
(A) data analysis (B) data warehouse
(C) data mining (D) knowledge discovery
MAzÀÄ G¥ÀAiÀÄÄPÀÛ ªÀiÁzÀjAiÀÄ£ÀÄß ºÀÄqÀÄPÀĪÀÅzÀPÁÌV ¸É«Ä DmÉÆÃªÉÄnPÀ° C£Á2ÉʹAUï
2Á¦ÿóð qÁmÁ ¨ÉÃ¸ï ¥ÀæQæAiÉÄAiÀÄ£ÀÄß G2ÉèÃT¸ÀĪÀ ¥ÀzÀ _______
(A) qÁmÁ C£Á°¹¸ï (B) qÁmÁ ªÉÃgïºË¸ï
(C) qÁmÁ ªÉÄʤA˜µó (D) £Á2ÉqïÓ r¸À̪Àj
99. A type of classifier that gives accurate classification across a range of application is
(A) Binary split (B) Multiway split
(C) Overfitting (D) Support vector machine
J2Áè C¦èÃPÉõÀ£ïUÀ¼À£ÀÄß ¸ÀjAiÀiÁV «AUÀr¸ÀĪÀ MAzÀÄ §UÉAiÀÄ PÁè¹¥sÉÊAiÀÄgï AiÀiÁªÀÅzÀÄ ?
(A) ¨ÉÊ£Àj ¹à÷èmï (B) ªÀİ֪Éà ¹à÷èmï
(C) NªÀgïÇ·n
Ý ÖAUï (D) ¸À¥ÉÆÃmïð ªÉPÁÖgï ªÉĶ£ï
4. Which of the following sets of component(s) is/are sufficient to implement only arbitrary
Boolean function ?
(A) XOR gates, NOT gates
(B) 2 to 1 multiplexers
(C) AND gates, XOR gates
(D) Three - input gates that output (A.B) + C for the inputs A, B and C
F PɼÀPÀAqÀ AiÀiÁªÀ WÀlPÀ(UÀ¼À) UÀtªÀÅ AiÀiÁªÀÅzÉà ¤µÀàçªÀiÁtÂvÀ §Æ°AiÀiÁÄó PÁAiÀÄðªÀ£ÀÄß
C£ÀĵÁפ¸À®Ä ¸ÁPÁUÀÄvÀÛzÉ ?
(A) XOR UÉÃmïUÀ¼ÀÄ, NOT UÉÃmïUÀ¼ÀÄ
(B) 2 to 1 ªÀİ֥ÉèPÀìgïUÀ¼ÀÄ
(C) AND UÉÃmïUÀ¼ÀÄ, XOR UÉÃmïUÀ¼ÀÄ
(D) A, B ªÀÄvÀÄÛ C ºÀÆrPÉUÀ½UÉ (A.B) + C ¤ÃrPÉUÀ¼ÁzÀ ªÀÄÆgÀÄ ºÀÆrPÉ UÉÃmïUÀ¼ÀÄ
9. If the following ‘C’ program (myprog) is run from the command line as
C:>myprog Friday Tuesday Sunday then, what would be the output?
F PɼÀV£À C PÀæªÀÄ«¢ü (myprog) AiÀÄ£ÀÄß DzÉñÀ ¸Á°¤AzÀ C :>myprog Friday Tuesday
Sunday £ÀqɹzÁUÀ ¤ÃrPÉ output K£ÁVgÀÄvÀÛzÉ ?
main(int argc, char *argv[])
{
printf(“%c” ,**++argv);
}
(A) m (B) f
(C) myprog (D) Friday
16. Identify the access specifier that is used as a default in a class definition
(A) protected (B) public
(C) private (D) friend
PÁèöå¸ï qɦü£ÉñÀ£ï£À°è r¥sÁ2ïÖ DV §¼À¸À®àqÀĪÀ ƒ’ðÜ
Þ Èó ¸É๥ÉÊAiÀÄgÀ£ÀÄß UÀÄgÀÄw¹
(A) ¥ÉÆæmÉPÉÖqï (B) ¥À©èPï
(C) ¥ÉæöʪÉÃmï (D) ¥sÉæAqï
21. Given a binary tree, whose inorder and preorder traversal are given by
Inorder : EICFBGDJHK
Preorder : BCEIFDGHJK
The post order traversal of the above binary tree is
¨ÉÊ£Àj ªÀÈPÀëzÀ E£ïDqïðgï ºÁUÀÆ ¥ÉÆÃ¸ïÖ DqÀðgï mÁæöåªÀ¸Àð2ïUÀ¼ÀÄ F ªÀÄÄA¢£ÀAwzÀÝgÉ :
M¼ÀªÀåªÀ¸ÉÜ : EICFBGDJHK
¥ÀƪÀðªÀåªÀ¸ÉÜ : BCEIFDGHJK
F PɼÀV£À AiÀiÁªÀÅzÀÄ ¨ÉÊ£Àj ªÀÈPÀëzÀ ¥ÉÆÃ¸ïÖ DqÀðgï mÁæöåªÀ¸Àð2ï DVzÉ ?
(A) IEFCGJKHDB (B) IEFCJGKHDB
(C) IEFCGKJHDB (D) IEFCGJKDBM
Space For Rough Work
23. The efficient data structure to insert/delete a number in a stored set of number is
(A) Queue (B) Linked list
(C) Doubly linked list (D) Binary tree
¸ÀASÉåUÀ¼À£ÀÄß ±ÉÃRj¹zÀ MAzÀÄ UÀtzÀ°è MAzÀÄ ¸ÀASÉåAiÀÄ£ÀÄß ¸ÉÃj¸À®Ä/
vÉUÉzÀĺÁPÀĪÀÅzÀPÁÌV ¸ÀªÀÄ¥ÀðPÀªÁzÀ zÀvÀÛ ¸ÀAgÀZÀ£É AiÀiÁªÀÅzÀÄ ?
(A) PÀÆå (B) eÉÆÃr¹zÀ ¥ÀnÖ
(C) JgÀqÀÄ ¨Áj eÉÆÃr¹zÀ ¥ÀnÖ (D) ¨ÉÊ£Àj ªÀÈPÀë
24. The minimum number of nodes in a binary tree of depth ‘d’ (root is at level o) is
‘d’ D¼ÀzÀ ¨ÉÊ£Àj ªÀÈPÀëzÀ°è£À PÀ¤µÀÖ £ÉÆÃqïUÀ¼À ¸ÀASÉå JµÀÄÖ ?
(A) 2d – 1 (B) 2d+1 – 1
(C) 2d–1 (D) d + 1
26. The post order traversal of a binary tree is DEBFCA, then the pre - order traversal is
¨ÉÊ£Àj ªÀÈPÀëzÀ ¥ÉÆÃ¸ïÖ DqÀðgï mÁæªÀ¸Àð2ï DEBFCA DVzÀÝgÉ, ¦æÃ DqÀðgï mÁæªÀ¸Àð2ï AiÀiÁªÀÅzÀÄ ?
(A) ABFCDE (B) ADBFEC
(C) ABDECF (D) ABCDEF
Space For Rough Work
28. What is the appropriate data structure for representing hierarchical relationship between
the elements ?
(A) Dequeue. (B) Priority Queue.
(C) Tree. (D) Stack.
CA±ÀUÀ¼À £ÀqÀÄ«£À ±ÉæÃtÂPÀÈvÀ ¸ÀA§AzsÀªÀ£ÀÄß ¤gÀƦ¸ÀĪÀÅzÀPÉÌ ¸ÀªÀÄAd¸ÀªÁzÀ zÀvÀÛ ¸ÀAgÀZÀ£É
AiÀiÁªÀÅzÀÄ ?
(A) rPÀÆå (B) DzÀåvÁ PÀÆå
(C) ªÀÈPÀë (D) ¸ÁÖöåPï
29. The minimum number of interchanges needed to convert the array 89, 19, 14, 40, 17, 12,
10, 2, 5, 7, 11, 6, 9, 70 into a heap with the maximum element at the root is
DgÉæÃ 89, 19, 14, 40, 17, 12, 10, 2, 5, 7, 11, 6, 9, 70 AiÀÄ£ÀÄß ªÀÄÆ®zÀ°è UÀjµÀÖ
CA±ÀzÉÆA¢UÉ MAzÀÄ gÁ²AiÀiÁV ¥ÀjªÀwð¸À®Ä CUÀvÀåªÁVgÀĪÀ CAvÀg﫤AiÀĪÀÄzÀ
PÀ¤µÀ× ¸ÀASÉå AiÀiÁªÀÅzÀÄ ?
(A) 0 (B) 1
(C) 2 (D) 3
33. A relationship between processes such that each has some point (critical section) which
must not be executed while the critical section of another is being executed is known as
(A) Semaphore (B) Mutual execution
(C) Multiprogramming (D) Message passing
¥ÀæwAiÉÆAzÀÆ, ªÀÄvÉÆÛAzÀgÀ QænPÀ2ï «¨sÁUÀªÀ£ÀÄß ¤ªÀð»¸ÀĪÁUÀ, ¤ªÀð»¸À¨ÁgÀzÁzÀ
PÉ®ªÀÅ ¨sÁUÀ (critical section) UÀ¼À£ÀÄß ºÉÆA¢gÀĪÀ ¥ÀæQæAiÉÄUÀ¼À £ÀqÀÄ«£À ¸ÀA§AzsÀªÀ£ÀÄß
K£ÉAzÀÄ PÀgÉAiÀÄ2ÁUÀÄvÀÛzÉ ?
(A) ¸ÉªÀiÁ¥sÉÆÃgï (B) ¥ÀgÀ¸ÀàgÀ §»µÀÌgÀt
(C) §ºÀÄPÀæªÀÄ«¢ü (D) ¸ÀAzÉñÀ gÀªÁ£É
35. In round robin CPU scheduling algorithm as the time quantum increases the average turn
around time
(A) Decreases (B) Increases
(C) Remains constant (D) Varies randomly
gËAqï gÁ©£ï ¹¦AiÀÄÄ µÉqÀÆå°AUï D2ÉÆÎjzÀªÀiï£À°è mÉʪÀiï PÁéAlªÀiï ºÉZÁÑzÀAvÉ
¸ÀgÁ¸Àj l£ïð CgËAqï mÉʪÀiï _________
(A) PÀrªÉÄAiÀiÁUÀÄvÀÛzÉ (B) ºÉZÁÑUÀÄvÀÛzÉ
(C) ¹ÜgÀªÁVgÀÄvÀÛzÉ (D) AiÀiÁzÀÈaÒPÀªÁV ªÀåvÁå¸ÀªÁUÀÄvÀÛzÉ.
43. In estimating the software cost the Lines of Code (LOC) and Function Point (FP) are used
to measure what ?
(A) Length of code (B) Size of software
(C) Functionality of s/w (D) Both (A) and (B) are true
vÀAvÁæA±ÀzÀ ªÉZÀѪÀ£ÀÄß CAzÁdÄUÉÆ½¸ÀĪÀ°è 2ÉÊ£ïì D¥sï PÉÆÃqï(LOC) ºÁUÀÆ ¥sÀAPÀë£ï
¥Á¬ÄAmï (FP) UÀ¼À£ÀÄß AiÀiÁªÀÅzÀ£ÀÄß C¼ÀvɪÀiÁqÀ®Ä §¼À¸À2ÁUÀÄvÀÛzÉ ?
(A) ¸ÀAPÉÃvÀzÀ GzÀÝ (B) vÀAvÁæA±ÀzÀ UÁvÀæ
(C) s/w £À PÁAiÀÄ𠤪ÀðºÀuÉ (D) (A) ªÀÄvÀÄÛ (B) JgÀqÀÆ ¸Àj
44. What is the equivalence partitioning method that divides the input domain of a program
into classes of the data from which task case can be derived ?
(A) White box testing (B) Black box testing
(C) Orthogonal array testing (D) Stress testing
MAzÀÄ PÀæªÀÄ«¢üAiÀÄ HrPÉ ªÁå¦ÛAiÀÄ£ÀÄß, mÁ¸ïÌ PÉøïUÀ¼À£ÀÄß vÀAiÀiÁj¸À§ºÀÄzÁzÀ zÀvÀÛzÀ
PÁè¸ïUÀ¼À£ÀÄß «AUÀr¸ÀĪÀ FQéªÀ2É£ïì ¥ÁnðµÀ¤AUï «zsÁ£À AiÀiÁªÀÅzÀÄ ?
(A) ªÉÊmï ¨ÁPïì ¥ÀjÃPÉë (B) ¨ÁèöåPï ¨ÁPïì ¥ÀjÃPÉë
(C) DxÁðUÀ£À2ï DgÉà ¥ÀjÃPÉë (D) ¸ÀÖç¸ï ¥ÀjÃPÉë
45. In a function oriented design
(A) Cohesion and coupling are minimised.
(B) Cohesion and coupling are maximised.
(C) Cohesion minimised and coupling are maximised.
(D) Cohesion maximised and coupling are minimised.
MAzÀÄ PÁAiÀiÁð¨sÁgÀ ¸ÀA§A¢üvÀ «£Áå¸ÀzÀ°è _________
(A) ¸ÀAWÀl£É ªÀÄvÀÄÛ eÉÆÃqÀuÉUÀ¼ÀÄ PÀÄUÀÄÎvÀÛªÉ
(B) ¸ÀAWÀl£É ªÀÄvÀÄÛ eÉÆÃqÀuÉUÀ¼ÀÄ »UÀÄÎvÀÛªÉ
(C) ¸ÀAWÀl£ÉAiÀÄÄ PÀÄUÀÄÎvÀÛzÉ ªÀÄvÀÄÛ eÉÆÃqÀuÉUÀ¼ÀÄ »UÀÄÎvÀÛzÉ
(D) ¸ÀAWÀl£ÉAiÀÄÄ »UÀÄÎvÀÛzÉ ªÀÄvÀÄÛ eÉÆÃqÀuÉUÀ¼ÀÄ PÀÄUÀÄÎvÀÛªÉ
Space For Rough Work
47. Software safety is a _________ activity that focuses on the identification and assessment
of potential hazards that may affect software negativity and cause an entire system to fail.
(A) Risk mitigation, monitoring and management
(B) Software quality assurance
(C) Software cost estimation
(D) Defect removal efficiency
vÀAvÁæA±À ¸ÀÄgÀPÀëvÉ, EzÀÄ vÀAvÁæA±À £ÀPÁgÁvÀäPÀvÉ ªÀÄvÀÄÛ MAzÀÄ ¸ÀA¥ÀÆt𠹸ÀÖªÀiï£À
«¥sÀ®ªÁUÀÄ«PÉAiÀÄ ªÉÄÃ2É ¥ÀjuÁªÀÄ ©ÃgÀĪÀ ¸ÀªÀÄxÀð CqÀZÀuÉUÀ¼À UÀÄgÀÄw¸ÀÄ«PÉ ªÀÄvÀÄÛ
ªÀi˰åÃPÀgÀtzÀ ªÉÄÃ2É UÀªÀÄ£À«j¸ÀĪÀ MAzÀÄ ________ ZÀlĪÀnPÉAiÀiÁVzÉ.
(A) j¸ïÌ «ÄnUÉñÀ£ï, ªÀiÁ¤ljAUï, ªÀiÁå£ÉÃeïªÉÄAmï
(B) ¸Á¥sïÖªÉÃgï PÁé°n C¸ÀÄìgÀ£ïì
(C) ¸Á¥sïÖªÉÃgï PÁ¸ïÖ J¹ÖªÉÄñÀ£ï
(D) r¥sÉPïÖ jªÀÄÆªÀ2ï J¦ü²AiÀĤì
48. On an average the programmer months(pm) is given by 3.6 * (KLOC)12. If so, a project
requiring one thousand sources instructions will require
3.6 * (KLOC)12 £À ªÀÄÆ®PÀ ¥ÉÆæÃUÁæªÀÄgï ªÀÄAvïì(pm) £ÀÄß ¤ÃqÀ2ÁVzÉ, ºÁUÁzÀgÉ MAzÀÄ
¸Á«gÀ DPÀgÀ ¸ÀÆZÀ£ÉUÀ¼À CªÀ±ÀåPÀvɬÄgÀĪÀ MAzÀÄ ¥ÁæeÉPïÖ _______ £ÀÄß PÉÆÃgÀÄvÀÛzÉ.
(A) 3.6 pm (B) 0.36 pm
(C) 0.0036 pm (D) 7.23 pm
50. If the number of conditions in a decision table is n, then maximum number of rules
(Column) is possible is
MAzÀÄ ¤tðAiÀÄ ¥ÀnÖAiÀÄ°è µÀgÀvÀÄÛUÀ¼À ¸ÀASÉåAiÀÄÄ n DVzÀÝgÉ, ¤AiÀĪÀÄ(column) UÀ¼À
¸ÀA¨sÀªÀ¤ÃAiÀÄ UÀjµÀÖ ¸ÀASÉåAiÀÄÄ
(A) n (B) 2n
(C) 2n (D) log2n
51. For a database relation R(a,b,c,d), where domain of a,b,c,d include only the atomic values
the functional dependency ac, bd holds in the following relation in
a,b,c,d AiÀÄ PÁAiÀÄðPÉëÃvÀæªÀÅ DmÉÆÃ«ÄPï ªÀiË®åUÀ¼À£ÀÄß ªÀiÁvÀæ M¼ÀUÉÆArgÀĪÀ zÀvÁÛA±À
¸ÀA§AzsÀ R(a,b,c,d)UÉ, PÁAiÀÄðzÀ CªÀ®A§£É ac, bd AiÀÄÄ F PɼÀV£À AiÀiÁªÀÅzÀgÉÆ¼ÀUÉ
ºÉÆA¢gÀÄvÀÛzÉ ?
(A) 1NF not in 2NF (B) 2NF not in 3NF
(C) 3NF (D) 1NF
54. If in a tree, for every node the height of its left subtree and, right subtree differ almost by
one then the tree is
(A) Binary search tree (B) AVL tree
(C) Threaded tree binary tree (D) Complete binary tree.
MAzÀÄ ªÀÈPÀëzÀ°è ¥Àæw £ÉÆÃqïUÉ JqÀUÀqÉAiÀÄ ªÀÄvÀÄÛ §®UÀqÉAiÀÄ G¥ÀªÀÈPÀëUÀ¼À JvÀÛgÀªÀÅ ¸ÀASÉå
1 gÀµÀÄÖ ªÀåvÁå¸À«zÀÝgÉ, D ªÀÈPÀëªÀÅ
(A) ¨ÉÊ£Àj ¸ÀZïð næÃ (B) AVL næÃ
(C) vÉæqÉqï næÃ ¨ÉÊ£Àj næÃ (D) PÀA¦èÃmï ¨ÉÊ£Àj næÃ
55. How many character per second (7 bits +1 parity) can be transmitted over a 2400 bps line
in case of synchronous data transfer ?
JµÀÄÖ CPÀëgÀUÀ¼À£ÀÄß ¥Àæw ¸ÉPÀArUÉ (7bits + 1 parity)UÉ 2400 bps 2ÉÊ£ï£À°è ¹APÉÆæÃ£Éʸï
zÀvÀÛ ªÀUÁðªÀuÉAiÀÄ°è ªÀUÁð¬Ä¸À§ºÀÄzÀÄ ?
(A) 300 (B) 240
(C) 250 (D) 275
58. What is the maximum size of data that the application layer can pass on to the TCP layer ?
(A) Any size (B) 216 bytes
(C) Size of TCP header (D) 1500 bytes
C¦èèPÉõÀ£ï 2ÉÃAiÀÄgï TCP 2ÉÃAiÀÄgïUÉ PÀ¼ÀÄ»¸À§ºÀÄzÁzÀ qÁmÁzÀ UÀjµÀ× UÁvÀæªÀÅ
(A) AiÀiÁªÀÅzÉà UÁvÀæ¢gÀ§ºÀÄzÀÄ
(B) 216 ¨ÉÊmïìUÀ¼ÁVgÀ§ºÀÄzÀÄ
(C) TCP ºÉqÀgï UÁvÀæzÀ¶ÖgÀ§ºÀÄzÀÄ
(D) 1500 ¨ÉÊmïìUÀ¼ÁVgÀ§ºÀÄzÀÄ
61. A binary relation R = {(1,1),(2,1),(2,2),(2,3), (2,4), (3,1),(3,2), (3,3), (3,4)} on the set
A = {1,2,3,4} is
(A) reflexive symmetric and transitive
(B) neither reflexive nor irreflexive but transitive
(C) irreflexive anti-symmetric
(D) irreflexive symmetric and transitive.
¨ÉÊ£Àj j2ÉõÀ£ï R={(1,1),(2,1),(2,2),(2,3)(2,4),(3,1),(3,2),(3,3),(3,4)}ªÀÅ ˜µ¸ å A={1,2,3,4}
zÀ ªÉÄÃ2É ªÁåSÁ夹zÁUÀ PɼÀV£À AiÀiÁªÀÅzÀ£ÀÄß vÀȦۥÀr¸ÀÄvÀÛzÉ ?
(A) j¥sÉèQìªï, ¹«ÄnæPï „ÏAqï mÁæ¤ìnªï
(B) j¥sÉèQìªï C®è, Egïj¥sÉèQìªï C®è DzÀgÉ mÁæ¤ìnªï DVgÀÄvÀÛzÉ
(C) Egïj¥sÉèQìªï, DAn ¹«ÄnæPï
(D) Egïj¥sÉèQìªï, ¹«ÄnæPï „ÏAqï mÁæ¤ìnªï
66. How many distinguishable permutation can be generated from a word “BANANA” ?
“BANANA” JA§ ¥ÀzÀ¢AzÀ JµÀÄÖ ¨ÉÃgÉ ¨ÉÃgÉ PÀæªÀÄ eÉÆÃqÀuÉUÀ¼À£ÀÄß GvÀàwÛ¸À§ºÀÄzÀÄ ?
(A) 720 (B) 60
(C) 240 (D) 120
69. All the hidden surface algorithms employee image space approach except which one of
the flowing method ?
(A) Back space removal (B) Depth buffer
(C) Scan line (D) Depth sort
J2Áè »qÀ£ï ¸À¥sÉðøï D2ÉÆÎjzsÀªÀiïUÀ¼ÀÄ PɼÀV£À AiÀiÁªÀ «zsÁ£ÀzÀ ºÉÆgÀvÁV EªÉÄÃeï
¸Éàøï C¥ÉÆæÃZÀ£ÀÄß C¼ÀªÀr¸ÀÄvÀÛzÉ ?
(A) ¨ÁåPï ¸Éàøï jªÀÄÆªÀ2ï (B) qÉ¥ïÛ §¥sÀgï
(C) ¸ÁÌöå£ï 2ÉÊ£ï (D) qÉ¥ïÛ ¸Ámïð
71. What is the prototype of the default constructor for public class test() ?
public class test() EzÀgÀ°è r¥sÁ2ïÖ PÀ£ïìlæPÀÖgï£À ¥ÉÆæmÉÆÃmÉÊ¥ï AiÀiÁªÀÅzÀÄ ?
(A) test () (B) test (void)
(C) public test () (D) public test (void)
74. Which one of the following method is used to obtain values of invoking object as a long ?
PɼÀV£À AiÀiÁªÀ «zsÁ£ÀÔåÄåêÆ E£ïªÉÇÃQAUï D¨ÉÓPïÖ Då¸ï J 2ÁAUï JA§ÄzÀgÀ
ªÀiË®åªÀ£ÀÄß PÀAqÀÄ»rAiÀÄ®Ä G¥ÀAiÉÆÃV¸ÀÄvÁÛgÉ ?
(A) long value() (B) longlongValue()
(C) Long longvalue() (D) LongLongvalue()
78. Which of the following is TRUE only for XML but not for HTML ?
(A) Derived from SGML.
(B) Describes control and layout.
(C) Allows user defined tags.
(D) Restricted only to be used with web browser.
PɼÀV£À AiÀiÁªÀÅzÀÄ JPïìJAJ2ïUÉ ªÀiÁvÀæ ¸ÀjAiÀiÁVzÉ DzÀgÉ ºÉZïnJAJ2ïUÉ
¸ÀA§A¢ü¹gÀĪÀÅ¢®è ?
(A) SGML ¤AzÀ rgÉÊªïØ DVzÉ
(B) EzÀÄ PÀAmÉÆæÃ2ï ªÀÄvÀÄÛ 2ÉÃOmïUÀ¼À£ÀÄß «ªÀj¸ÀÄvÀÛzÉ
(C) EzÀÄ AiÀÄÆdgï r¥sÉÊ£Àqï mÁåUïì£ÀÄß C£ÀĪÀÄw¸ÀÄvÀÛzÉ.
(D) EzÀÄ ªÉ¨ï ¨Ëædgï£ÉÆA¢UÉ ªÀiÁvÀæ G¥ÀAiÉÆÃV¸À®Ä ¤§ðA¢ü¸À®ànÖgÀÄvÀÛzÉ.
82. The worst case time complexity of the sorting algorithm by using divide- and -conquer is
rªÉÊqï ªÀÄvÀÄÛ PÁ£ÀÌgï ¥ÀzÀÞwAiÀÄ£ÀÄß G¥ÀAiÉÆÃV¹PÉÆAqÀÄ PÀæªÀĪÁV eÉÆÃr¸ÀĪÀ
C2ÉÆÎÃjzsÀªÀiï £À QèÚÈå± ¸ÀªÀÄAiÀÄzÀ vÉÆqÀPÀÄ AiÀiÁªÀÅzÀÄ ?
(A) Ο(n log n) (B) Ο(n3)
(C) Ο(n2 log n) (D) Ο(log n)
85. Given 0 – 1 knapsack problem and fractional knapsack problem and the following
statements:
S1: 0 – 1 knapsack is efficiently solved by using Greedy algorithm.
S2: Fractional knapsack is efficiently solved using by dynamic programming.
Which of the following is true?
(A) S1 is correct and S2 is not correct
(B) S1 and S2 both are correct
(C) S1 and S2 both are not correct
(D) S1 is not correct and S2 is correct
0–1 knapsack ªÀÄvÀÄÛ fractional knapsack ¸ÀªÀĸÉåUÀ¼À£ÀÄß PÉÆmÁÖUÀ ªÀÄvÀÄÛ PɼÀV£À
ºÉýPÉUÀ¼À£ÀÄß UÀªÀĤ¹zÁUÀ :
S1 : 0 – 1 knapsack C£ÀÄß VæÃqï C2ÉÆÎjzÀªÀiï£À ¸ÀªÀÄ¥ÀðPÀ §¼ÀPɬÄAzÀ ¥ÀjºÀj¸À2ÁVzÉ
S2 : fractional knapsackC£ÀÄß qÉÊ£Á«ÄPï ¥ÉÆæÃUÁæªÀiï£À ¸ÀªÀÄ¥ÀðPÀ §¼ÀPɬÄ0zÀ
¥ÀjºÀjÜÈå2ÁUÀĪÀÅÁµåê. DUÀ F PɼÀV£À AiÀiÁªÀÅzÀÄ ¸ÀjAiÀiÁVzÉ ?
(A) S1 ¸Àj ªÀÄvÀÄÛ S2 vÀ¥ÀÄà
(B) S1 ªÀÄvÀÄÛ S2 JgÀqÀÆ ¸Àj
(C) S1 ªÀÄvÀÄÛ S2 JgÀqÀÆ vÀ¥ÀÄà
(D) S1 vÀ¥ÀÄà ªÀÄvÀÄÛ S2 ¸Àj
Space For Rough Work
87. The Newton–Raphson iteration xn+1 = (xn / 2) + (3 / 2xn) can be used to solve the equation
£ÀÆål£ï-gÁå¥À¸À£ï£À, ElgÉõÀ£ï xn+1 = (xn / 2) + (3 / 2xn) £ÀÄß PɼÀV£À AiÀiÁªÀ ¸À«ÄÃPÀgÀtPÉÌ
¥ÀjºÁgÀ PÀAqÀÄ»rAiÀÄ®Ä G¥ÀAiÉÆÃV¸À§ºÀÄzÀÄ ?
(A) x2 = 3 (B) x3 = 3
(C) x2 = 2 (D) x3 = 2
88. A root of the equation x3 – x – 11 = 0, correct to four decimal using bisection method is
¨ÉʸÉPÀë£ï ¥ÀzÀÞwAiÀÄ£ÀÄß G¥ÀAiÉÆÃV¹ x3 – x – 11 = 0, ¸À«ÄÃPÀgÀtªÀ£ÀÄß ©r¹zÁUÀ
x ªÀÄÆ® ¨É2ÉAiÀÄÄ £Á®ÄÌ zÀ±ÁA±ÀUÀ½UÉ F PɼÀV£À AiÀiÁªÀ MAzÀÄ ¸ÀASÉå ¸ÀjAiÀiÁVgÀÄvÀÛzÉ ?
(A) 2.3737 (B) 2.3838
(C) 2.3736 (D) 2.3837
89. The order of errors in the Simpson’s rule for solving a numerical integration with a step
size h is
¹A¥Àì£ï ¤AiÀĪÀÄzÀ°è ‘h’ UÁvÀæ-ºÀAvÀzÀ £ÀÆåªÀÄjPÀ2ï EAnæUÉæÃ±À£ï ¥ÀjºÁgÀ
PÀAqÀÄ»rAiÀÄĪÁUÀ zÉÆÃµÀUÀ¼À PÀæªÀĪÀÅ PɼÀV£À AiÀiÁªÀÅzÁVgÀÄvÀÛzÉ ?
(A) h (B) h2
(C) h3 (D) h4
Space For Rough Work
94. In star schema, a type of relationship between a dimension and fact table is
(A) many-to-many (B) one-to-one
(C) one-to-many (D) many-to-one
¸ÁÖgï ¹ÌÃÔåìæzÀ MAzÀÄ qÉʪÉÄ£Àë£ï ªÀÄvÀÄÛ ¥sÁå’ó± mÉç2ï£À £ÀqÀÄ«£À ¸ÀA§AzsÀzÀ «zsÁ£À
AiÀiÁªÀÅzÀÄ ?
(A) ªÉĤ-lÄ-ªÉĤ (B) M£ï-lÄ-M£ï
(C) M£ï-lÄ-ªÉĤ (D) ªÉĤ-lÄ-M£ï
97. The term ____________ refer loosely to the process of semi-automatically analyzing large
databases to find useful pattern.
(A) data analysis (B) data warehouse
(C) data mining (D) knowledge discovery
MAzÀÄ G¥ÀAiÀÄÄPÀÛ ªÀiÁzÀjAiÀÄ£ÀÄß ºÀÄqÀÄPÀĪÀÅzÀPÁÌV ¸É«Ä DmÉÆÃªÉÄnPÀ° C£Á2ÉʹAUï
2Á¦ÿóð qÁmÁ ¨ÉÃ¸ï ¥ÀæQæAiÉÄAiÀÄ£ÀÄß G2ÉèÃT¸ÀĪÀ ¥ÀzÀ _______
(A) qÁmÁ C£Á°¹¸ï (B) qÁmÁ ªÉÃgïºË¸ï
(C) qÁmÁ ªÉÄʤA˜µó (D) £Á2ÉqïÓ r¸À̪Àj
99. A type of classifier that gives accurate classification across a range of application is
(A) Binary split (B) Multiway split
(C) Overfitting (D) Support vector machine
J2Áè C¦èÃPÉõÀ£ïUÀ¼À£ÀÄß ¸ÀjAiÀiÁV «AUÀr¸ÀĪÀ MAzÀÄ §UÉAiÀÄ PÁè¹¥sÉÊAiÀÄgï AiÀiÁªÀÅzÀÄ ?
(A) ¨ÉÊ£Àj ¹à÷èmï (B) ªÀİ֪Éà ¹à÷èmï
(C) NªÀgïÇ·n
Ý ÖAUï (D) ¸À¥ÉÆÃmïð ªÉPÁÖgï ªÉĶ£ï
ªÀiÁr
1. £ÉÆAzÀt ¸ÀASÉåAiÀÄ£ÀÄß N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ°è §gÉzÀÄ CzÀPÉÌ ¸ÀA§A¢ü¹zÀ ªÀÈvÀÛUÀ¼À£ÀÄß ¸ÀA¥ÀÆtðªÁV vÀÄA©¢ÝÃgÉAzÀÄ
SÁwæ¥Àr¹PÉÆ½î.
2. PÉÃAzÀæ ¸ÀAPÉÃvÀªÀ£ÀÄß N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ°è §gÉzÀÄ CzÀPÉÌ ¸ÀA§A¢ü¹zÀ ªÀÈvÀÛUÀ¼À£ÀÄß ¸ÀA¥ÀÆtðªÁV vÀÄA©¢ÝÃgÉAzÀÄ
SÁwæ¥Àr¹PÉÆ½î.
3. ¥ÀjÃPÁë «µÀAiÀĪÀ£ÀÄß N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ°è §gÉzÀÄ ºÁUÀÄ «µÀAiÀÄzÀ ¸ÀAPÉÃvÀªÀ£ÀÄß §gÉzÀÄ CzÀPÉÌ ¸ÀA§A¢ü¹zÀ ªÀÈvÀÛUÀ¼À£ÀÄß
¸ÀA¥ÀÆtðªÁV vÀÄA©¢ÝÃgÉAzÀÄ SÁwæ¥Àr¹PÉÆ½î.
4. PÉÆoÀr ªÉÄðéZÁgÀPÀjAzÀ F ¥Àæ±Éß ¥ÀwæPÉAiÀÄ£ÀÄß ¤ªÀÄUÉ 2£Éà ¨ÉGï DzÀ £ÀAvÀgÀ CAzÀgÉ ªÀÄ. 1.55 DzÀ £ÀAvÀgÀ PÉÆqÀGÁUÀĪÀÅzÀÄ.
5. ¥Àæ±Éß ¥ÀwæPÉAiÀÄ PÀæªÀÄ ¸ÀASÉåAiÀÄ£ÀÄß N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ°è §gÉAiÀĨÉÃPÀÄ.
6. ¥Àæ±Éß ¥ÀwæPÉAiÀÄ ªÀµÀð£ï ¸ÀASÉå,, N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ°è §gÉzÀÄ CzÀPÉÌ ¸ÀA§A¢ü¹zÀ ªÀÈvÀÛUÀ¼À£ÀÄß ¸ÀA¥ÀÆtðªÁV vÀÄA§¨ÉÃPÀÄ.
7. N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ PɼÀ¨sÁUÀzÀ ¤UÀ¢vÀ eÁUÀz°è PÀqÁØAiÀĪÁV ¸À» ªÀiÁqÀ¨ÉÃPÀÄ.
ªÀiÁqÀ¨ÉÃr
1. N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ°è ªÀÄÄ¢ævÀªÁVgÀĪÀ mÉÊ«ÄAUï ªÀiÁPÀð£ÀÄß wzÀݨÁgÀzÀÄ / ºÁ¼ÀĪÀiÁqÀ¨ÁgÀzÀÄ / C½¸À¨ÁgÀzÀÄ.
2. ªÀÄÆgÀ£Éà ¨ÉGï ªÀÄ. 2.00 PÉÌ DUÀÄvÀÛzÉ. C°èAiÀĪÀgÉUÀÆ,
• ¥Àæ±Éß ¥ÀwæPÉAiÀÄ §®¨sÁUÀzÀ°ègÀĪÀ ¦£ï CxÀªÁ ¹ÃGï C£ÀÄß vÉUÉAiÀĨÁgÀzÀÄ.
• ¥Àæ±Éß ¥ÀwæPÉAiÀÄ M¼ÀUÀqÉ EgÀĪÀ ¥Àæ±ÉßUÀ¼À£ÀÄß £ÉÆÃqÀ®Ä ¥ÀæAiÀÄw߸À¨ÁgÀzÀÄ.
• N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀİè GvÀÛj¸À®Ä ¥ÁægÀA©ü¸¨ÁgÀzÀÄ.
C¨sÀåyðUÀ½UÉ ªÀÄÄRå ¸ÀÆZÀ£ÉUÀ¼ÀÄ
1. ¥Àæ±Éß ¥ÀwæPÉAiÀİè MlÄÖ 100 ¥Àæ±ÉßUÀ½zÀÄÝ, ¥Àæw ¥Àæ±ÉßAiÀÄÄ MAzÀÄ ºÉýPÉAiÀÄ£ÀÄß M¼ÀUÉÆArzÀÄÝ ªÀÄvÀÄÛ 4 §ºÀÄ DAiÉÄÌ GvÀÛgÀUÀ¼ÀÄ EgÀÄvÀÛªÉ.
2. ªÀÄÆgÀ£Éà ¨ÉGï CAzgÉ ªÀÄ. 2.00 gÀ £ÀAvÀgÀ ¥Àæ±Éß ¥ÀwæPÉAiÀÄ §®¨sÁUÀzÀ°ègÀĪÀ ¦£ï / ¹ÃGï vÉUÉzÀÄ F ¥Àæ±Éé ¥ÀwæPÉAiÀİè AiÀiÁªÀÅzÉÃ
¥ÀÄlUÀ¼ÀÄ ªÀÄÄ¢ævÀªÁV®èzÉà EgÀĪÀÅzÀÄ PÀAqÀÄ §AzÀ°è CxÀªÁ ºÀjzÀÄ ºÉÆÃVzÀݰè CxÀªÁ AiÀiÁªÀÅzÉà LlAUÀ¼ÀÄ ©lÄÖºÉÆÃVzÀݰè,
CzÀ£ÀÄß RavÀ¥Àr¹PÉÆAqÀÄ, F jÃw DVzÀÝgÉ ¥Àæ±ÉߥÀwæPÉAiÀÄ£ÀÄß §zÀGÁ¬Ä¹PÉÆ¼ÀÄîªÀÅzÀÄ £ÀAvÀgÀ N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀİè
GvÀÛj¸À®Ä ¥ÁægÀA©ü¸ÀĪÀÅzÀÄ.
3. ªÀÄÄA¢£À 180 ¤«ÄµÀUÀ¼À°è
• ¥Àæw ¥Àæ±ÉßAiÀÄ£ÀÄß JZÀÑjPɬÄAzÀ N¢.
• ¥Àæw ¥Àæ±ÉßAiÀÄ PɼÀUÉ PÉÆnÖgÀĪÀ £Á®ÄÌ §ºÀÄ DAiÉÄÌAiÀÄ GvÀÛgÀUÀ¼À°è ¸ÀjAiÀiÁzÀ GvÀÛgÀªÀ£ÀÄß DAiÉÄÌ ªÀiÁr.
• ¥Àæ±Éß ¥ÀwæPÉAiÀİè£À ¥Àæ±ÉßUÉ C£ÀÄUÀÄtªÁVgÀĪÀ ¸Àj GvÀÛgÀªÀ£ÀÄß N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀİè CzÉà PÀæªÀÄ ¸ÀASÉåAiÀÄ ªÀÄÄAzÉ
¤ÃrgÀĪÀ ¸ÀA§A¢ü¹zÀ ªÀÈvÀÛªÀ£ÀÄß ¤Ã° CxÀªÁ PÀ¥ÀÄà ±Á¬ÄAiÀÄ ¨ÁGï ¥Á¬ÄAmï ¥É£ï¤AzÀ ¸ÀA¥ÀÆtðªÁV vÀÄA§ÄªÀÅzÀÄ.
N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀİègÀĪÀ ªÀÈvÀÛUÀ¼À£ÀÄß vÀÄA§ÄªÀ ¸ÀjAiÀiÁzÀ «zsÁ£À : A B C D
4. F N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ£ÀÄß ¸ÁÌöå£ï ªÀiÁqÀĪÀ ¸ÁÌöå£gï §ºÀ¼À ¸ÀÆPÀëöäªÁVzÀÄÝ ¸ÀtÚ UÀÄgÀÄvÀ£ÀÄß ¸ÀºÀ zÁR°¸ÀÄvÀÛzÉ. DzÀÝjAzÀ
N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀİè GvÀÛj¸ÀĪÁUÀ JZÀÑjPÉ ªÀ»¹.
5. ¥Àæ±Éß ¥ÀwæPÉAiÀİè PÉÆnÖgÀĪÀ SÁ° eÁUÀªÀ£ÀÄß gÀ¥sï PÉ®¸ÀPÉÌ G¥ÀAiÉÆÃV¹. N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ£ÀÄß EzÀPÉÌ G¥ÀAiÉÆÃV¸À¨ÉÃr.
6. PÉÆ£ÉAiÀÄ ¨ÉGï CAzÀgÉ ¸ÀA. 5.00 DzÀ £ÀAvÀgÀ GvÀÛj¸ÀĪÀÅzÀ£ÀÄß ¤°è¹. ¤ªÀÄä JqUÉÊ ºÉ§âgÀ¼À UÀÄgÀÄvÀ£ÀÄß ¤UÀ¢vÀ eÁUÀzÀ°è ºÁQ.
7. N.JA.Dgï. GvÀÛgÀ ¥ÀwæPÉAiÀÄ£ÀÄß PÉÆoÀr ªÉÄðéZÁgÀPÀjUÉ AiÀÄxÁ¹ÜwAiÀÄ°è ¤Ãrj.
8. PÉÆoÀr ªÉÄðéZÁgÀPÀgÀÄ, ªÉÄÃGÁãUÀzÀ ºÁ¼ÉAiÀÄ£ÀÄß ¥ÀævÉåÃQ¹ vÀ£Àß ªÀ±ÀzÀ°è ElÄÖPÉÆAqÀÄ vÀ¼À§¢AiÀÄ AiÀÄxÁ¥ÀæwAiÀÄ£ÀÄß C¨sÀåyðUÀ½UÉ
¸ÀéAiÀÄA ªÀiË®åªÀiÁ¥À£ÀPÁÌV ªÀÄ£ÉUÉ PÉÆAqÉÆAiÀÄå®Ä PÉÆqÀÄvÁÛgÉ.
9. GvÀÛgÀ ¥ÀwæPÉAiÀÄ £ÀPÀ®£ÀÄß MAzÀÄ ªÀµÀð PÁ® ¸ÀÄgÀQëvÀªÁV Er.
10. PÀ£ÀßqÀ DªÀÈwÛAiÀÄ ¥Àæ±ÉßUÀ¼À°è GvÀÛj¸ÀĪÀ C¨sÀåyðUÀ½UÉ PÀ£ÀßqÀzÀ°è ªÀÄÄ¢ævÀªÁVgÀĪÀ ¥Àæ±ÉßUÀ¼À §UÉÎ K£ÁzÀgÀÆ ¸ÀAzÉúÀ«zÀݰè
EAVèõï DªÀÈwÛAiÀÄ ¥Àæ±ÉߥÀwæPÉAiÀÄ£ÀÄß £ÉÆÃqÀ§ºÀÄzÀÄ. 18