BARC - 2025 Model Paper - Computer-Question-Paper-with-Answer-Key
BARC - 2025 Model Paper - Computer-Question-Paper-with-Answer-Key
GATExplore.com/barc-exam/
Q1) The principal of the locality of reference justifies the use of
1. virtual memory
2. interrupts.
3. main memory
4. cache memory
Q2) The linux command” mknod myfifo b 4 16”
1. Will create a character device if the user is root
2. Will create a named pipe FIFO if the user is root
3. Will create a block device if the user is root
4. None of the above
Q3) If half adders and full adders are implements using gates, then for the addition of
Two 17 bit numbers (using minimum gates) the number of half adders and full
address required will be
1. 0,17
2. 16,1
3. 1,16
4. 8,8
Q4) The term ‘aging’ refers to
1. booting up the priority of the process in multi-level of queue without feedback
2. gradually increasing the priority of job that wait in the system for a long time
to remedy infinite booking .
3. keeping track of the following a page has been in memory for the purpose of
LRU replacement .
4. letting jobs reside in memory for a certain amount of time so that the no pages
required can be estimated accurately
Q5) By using a eight bit optical encoder the degree of resolution that can be
obtained is (approximately)
1. 1.8 o
2. 3.4 o
3. 2.8 o
4. 1.4 o
GATExplore.com/barc-exam/
3. Hard real time OS has equal jitter than soft real time OS
4. None of the above
Q8) The subnet mask 255.255.255.192
1. extends the network portion to 6 bits
2. extends the network portion to 26 bits
3. extends the network portion to 36 bits
4. has no effects on the network portion of an IP address
Q9) Consider a table that describes the customers:
Customers (custid, name, gender, rating) The rating value is an integer in the range
1 to 5 and only two values (male and female) are recorded for gender. Consider the
query ” how many male customers have a rating of 5’’? The best indexing
mechanism appropriate for the query is
1. Linear hashing
2. Extendible hashing
3. B+ tree
4. Bit-mapped index
Q10) The maximum number of edges in a n-nodes undirected graph without self
loops is
1. n2
2.
3. n-1
4.
Q11) Consider a job scheduling program with 4 jobs J1 , J2, J3 and J4 With
corresponding deadlines : (d1 , d2 , d3 , d4) = (4, 2, 4, 2). Which of the following is not
a feasible schedule without violating any job schedule?
1. J2, J4, J1, J3
2. J4, J1, J2, J3
3. J4, J2, J1, J3
4. J4, J2, J3, J1
Q12) The Boolean expression AB+AB^+A^C+AC is
1. A
2. B
3. C
4. None of these
Q13) Below is the precedence graph for a set of tasks to be executed on a parallel
processing system S.
GATExplore.com/barc-exam/
What is the efficiency of this precedence graph on S if each of the tasks T 1,…,
T8 takes the same time and the system S has five processors?
1. 25%
2. 40%
3. 50%
4. 90%
Q14) is given by
1. 0
2. -1
3. 1
4. ½
Q15) Opportunistic reasoning is addressed by Which of the following knowledge
representation?
1. Script
2. Blackboard
3. Production Rules
4. Fuzzy Logic
Q16) MOV[BX],AL type of data addressing is called
1. Register addressing
2. Immediate addressing
3. Register indirect addressing
4. Register relative
Q17) If the Sequence of operations-push(1),push(2) ,pop, push(1) ,push(2),pop, pop
pop, push (2) ,pop are performed on a stack, the Sequence of popped out values
1. 2,2,1,1,2
2. 2, 2,1,2,2
3. 2, 1,2,2,1
4. 2, 1,2,2,2
Q18) A modulus-12 ring counter requires a minimum of
1. 10 flip-flops
2. 12 flip –flops
3. 8 flip-flops
4. 6 flip-flops
Q19) In networking UTP stands for
1. Unshielded T-connector port
GATExplore.com/barc-exam/
2. Unshielded twisted pair
3. Unshielded terminating pair
4. Unshielded transmission process
Q20) A counting semaphore was initialized to 7. Then 20 P (wait) operations
and V(signal) operations were completed on this semaphore.if the final valueof
semaphore is 5,then the value will be
1. 0
2. 13
3. 18
4. 5
Q21) The address resolution protocol (ARP) is used for
1. Finding the IP address from the DNS
2. Finding the IP address of the default gateway
3. Finding the IP address that corresponds to a MAC address
4. Finding the MAC address that corresponds to an IP address
Q22) In Ethernet, the source address field in the MAC frame is the ____ address.
1. Original sender’s physical
2. Previous station’s physical
3. Next destination’s physical
4. Original sender’s service port
Q23) Evaluate{XXOR Y} XOR Y
1. All 1,s
2. All,o s
3. X
4. Y
Q24) Which languages necessarily need heap allocation in the run time
environment?
1. Those that support recursion
2. Those that use dynamic scoping
3. Those that use global variables
4. Those that allow dynamic data structures
Q25) Which of the following is an unsupervised neural network
1. RBS
2. Hopfield
3. Back propagation
4. Kohonen
Q26) Advanced Encryption Standard (AES) is based on
1. Asymmetric Key algorithm
2. symmetric Key algorithm
GATExplore.com/barc-exam/
3. public Key algorithm
4. Key exchange
Q27) Consider the following pseudo-code while (m<n)
If ( >y) and (a< b) then
a=a+1
y=y-1
end if
m=m+1
end while
what is cyclomatic complexity of the above pseudo-code?
1. 2
2. 3
3. 4
4. 5
Q28) The subnet mask for a particular network is 255,255.31.0.Which of the
following pairs of IP address could belong to this network?
1. 172.57 .88.65 and 172.56.87.23
2. 10.35.28.2 and 10.35.29.4
3. 191.203.31 and 191.234.31.88
4. 128.8.129.43 and 128.8.161.55
Q29) The minimum number of NAND gates required to implement the boolean
function
is equal
1. 0
2. 1
3. 4
4. 7
Q30) What is the bandwidth of the signal that ranges from 40 kHz 4 kHz
1. 36MHz
2. 360 kHz
3. 3.96mHz
4. 396 MHz
Q31) What is the decimal value of the following point number C1D00000
(hexadecimal notation)? (Assume 32 bit single precision floating point IEEE
representation)
1. 28
2. -15
3. -26
4. -28
GATExplore.com/barc-exam/
Q32) LET R be the radius of the circle. What is the angle subtended by an arc of
length R at the center of the circle?
1. 1 degree
2. 1 radian
3. 90 degrees
4. radians
Q33) Which of the following is not true with respect to deadlock prevention and
deadlock avoidance schemes?
1. In deadlock prevention, the request for resources is always granted if resulting
state is safe.
2. In deadlock avoidance, the request for resources is always granted if the
resulting state is safe.
3. Deadlock avoidance requires Knowledge of resource requirements a priori.
4. Deadlock prevention is more restrictive than deadlock avoidance.
Q34) Shift reduce parsing belongs to a Class of
1. Bottom up parsing
2. Top down parsing
3. Recursive parsing
4. predicative parsing
Q35) Consider the set of integers I. Let D denote “ divides with an integer quotient”
(e.g.4D8 but 4D7).Then D is
1. Reflexive not symmetric, transitive
2. Not reflexive ,Not antisymmetric,transitive
3. Reflexive, antisymmetric, transitive
4. Not reflexive ,Not antisymmetric,Not transitive
Q36) Which of the following transmission media is not readily suitable to CSMA
operation?
1. Radio
2. Optical fibers
3. Coaxial cable
4. Twisted pair
Q37) The correct matching of The following pairs is
List-1 List-II
A. Disk check 1.Round robin
B.Batch processing 2.Scan
C.Time Sharing 3.LIFO
D.Stack operation 4.FIFO
Codes:
1. A-3, B-4, C-2, D-1
2. A-4, B-3, C-2, D-1
3. A-3, B-4, C-1, D-2
GATExplore.com/barc-exam/
4. A-2, B-4, C-1, D-3
Q38) Which logic gate is used to detect overflow in 2 S Compliment arithmetic?
1. OR gate
2. AND gate
3. NAND gate
4. XOR gate
Q39) The dynamic hazard problem occurs in
1. combinational circuit alone
2. sequential circuit only
3. Both (a) and (b)
4. None of the above
Q40) Which Project 802 standard provides for a collision-free protocol?
1. 802.2
2. 802.3
3. 802.5
4. 802.6
Q41) Which of the given number has its IEEE-754 32-bit floating point
representation as (0 10000000 110 0000 0000 0000 0000 0000)
1. 2.5
2. 3.0
3. 3.5
4. 4.5
Q42) What does a pixel mask mean?
1. string Containing only 1`S
2. string Containing only 0`S
3. string Containing two 0`S
4. string Containing two 0`S
Q43) We use malloc and calloc for
1. Dynamic memory allocation
2. Static memory allocation
3. Both dynamic and Static memory allocation
4. None of the above
Q44) The process of modifying IP address information in IP packet headers while in
transit across a traffic routing device is called
1. port address translation (PAT)
2. network address translation (PAT)
3. Address mapping
4. port mapping
GATExplore.com/barc-exam/
Q45) The characteristic equation of an SR filp-flop is given by
1. Qn+1 = S+RQn
2. Qn+1 = S+RQn
3. Qn+1 = S+RQn
4. Qn+1 = S+ Qn
Q46) What is the maximum number of characters (7bits+pairy) that can be
transmitted in a second on a 19.2 Kbps line. This asynchronous transmission
requires 1 start bit and 1 stop bit.
1. 192
2. 240
3. 1920
4. 1966
Q47) If (G,.) is a group such that (ab)-1 = a-1 b-1, a,b G, then G is a/an
1. Commutative semi group
2. Abelian group
3. non- abelian group
4. None of these
Q48) A machine needs a minimum of 100 sec to sort 1000 names by, quick sort. The
minimum time needed to sort 100 names will be approximately
1. 50.2 sec
2. 6.7 sec
3. 72.7 sec
4. 11.2 sec
Q49) Which one of the following are essential features of object oriented language?
A. Abstraction and encapsulation
B. Strictly-typed
C. Type-safe property coupled with-sub type rule
D. polymorphism in the presence of inheritance
1. A and B only
2. A, D and B Only
3. A and D only
4. A,C and D only
Q50) The number of rotations required to insert a Sequence of elements 9,6,5,8,7,10
into an empty AVL three is?
1. 0
2. 1
3. 2
4. 3
Q51) Consider the following gate network
GATExplore.com/barc-exam/
Which one of the following gates is redundant?
1. Gate No.1
2. Gate No.2
3. Gate No.3
4. Gate No.4 .
Q52) Consider a 33 MHz CPU based system. What is the number of wait states
required if it is interfaced with a 60 ns memory? Assume a maximum of 10 ns delay
for additional Circuitry like buffering and decoding.
1. 0
2. 1
3. 2
4. 3
Q53) Which of the following is a MAC address?
1. 192.166.200.50
2. 000.56A :01A01A5CCA7FF60
3. 568.Airport Road
4. 568.Airport Road
Q54) A given connected graph G is a Euler Graph if and only if all vertices of G are
of
1. Same degree
2. Even degree
3. Odd degree
4. Different degree
Q55) Which of the following is true?
1.
2.
3.
4.
Q56) Which of these is super class of all errors and exceptions in the java language?
1. Run time exceptions
2. Throw able
3. Catchable
4. None of the above
Q57) In an array of 2n elements that is both 2- ordered and 3 ordered What is the
maximum number of positions that an element can be from its position if the array
were 1 ordered?
GATExplore.com/barc-exam/
1. 1
2. 2
3. N/2
4. 2N-1
Q58) The following Steps in a linked list
P=get node () info (p) =10
Next (p) =list list=p
Result in which type of operation?
1. Pop operation is stack
2. Removal of a node
3. Inserting a node
4. Modifying an existing node
Q59) Suppose A is a finite set with N elements. The number of elements and the
rank of the largest equivalence relation on A are
1. {n,1}
2. {n,n}
3. {n2,1}
4. {1,n2}
Q60) A graph with n vertices and n-1 edges that is not a tree , is
1. Connected
2. Disconnected
3. Euler
4. A circuit
Q61) Which of the following is true about the z-buffer algorithm?
1. It is depth sort algorithm
2. No limitation on total number of objects in the scene.
3. Comparison of objects is done
4. Z-buffer is initialized to background colour at start of algorithm
Q62) The number of states required by a Finite state machine, to simulate the
behavior of a computer with a memory capable of storing ‘m’ words, with each being
n bits long is?
1. m x 2n
2. 2m+n
3. 2mn
4. m+n
Q63) In the frame buffer has 8 bits per pixel and 8 bits are allocated for each of the
R,G,B Components, What Would be the Size of the lookup tables?
1. 24 bytes
2. 1024 bytes
3. 768 bytes
GATExplore.com/barc-exam/
4. 256 bytes
Q64) What is the raw throughput of USB 2.0 technology?
1. 480 Mbps
2. 400 Mbps
3. 200 Mbps
4. 12 Mbps
Q65) How many 32kx1 RAM chips are needed to provide a memory capacity of 256
k –bytes?
1. 8
2. 32
3. 64
4. 128
Q66) For a binary half-sub tractor having two inputs A and B,the correct set of logical
outputs D(=A minus B) and X(=borrow) are
1.
2.
3.
4.
Q67) What is the Primary purpose of a VLAN?
1. Demonstrating the proper layout for a network
2. Simulating a Network
3. To Create a Virtual Private network
4. Segmenting a network inside a Switch or device
Q68) In the context of modular software design, which one of the following
combinations is desirable?
1. High cohesion and high coupling
2. High cohesion and low coupling
3. Low cohesion and high coupling
4. Low cohesion and Low coupling
Q69) In the standard IEEE 754 single precision floating point representation ,there is
1 bit for sign,23 bits for fraction and 8 bits for exponent .what is the precision in terms
of the number of decimal digits?
1. 5
2. 6
3. 7
4. 8
Q70) Consider the following Psuedocode:
X: interger :=1
Y: interger:=2
GATExplore.com/barc-exam/
Procedure add
X:=x+y
Procedure second (p: procedure)
X:interger:=2
P()
Procedure first
Y:interger :=3
Second (add)
First()
Write integer(X)
What does it print if the language uses dynamic Scoping with deep binding?
1. 2
2. 3
3. 4
4. 5
Q71) Which of the following productions eliminate left recursion in the
productions given below:
S→Aa/b
S→Ac/Sd /
GATExplore.com/barc-exam/
2. Dijkstra ` s algorithm
3. Bellman-Ford `s algorithm
4. Floyd Warshall`s algorithm
Q75) In compiler terminology reduction in strength means
1. Replacing run time computation by compile time computation
2. removing loop invariant computation
3. Removing common subexpressions
4. Replacing a Costly operation by a relatively cheaper one
Q76) The primary purpose of an operating System is
1. To make most efficient use of the computer hardware
2. To allow people use the computer
3. To Keep system programmer employed
4. To make computers easier to use
Q77) To make computers easier to use
1. A parse tree
2. Intermediate code
3. Machine code
4. Machine code
Q78) When two number are added in excess-3 code and the sum is less than 9, then
in order to get the correct answer it is necessary to
1. subtract 0011 from the sum
2. add 0011 to the sum
3. subtract 0110 from the sum
4. subtract 0110 from the sum
Q79) If L and P are two recursively enumerable languages, then they are not closed
under
1. Kleene star L*of L
2. Intersection L P
3. Union L P
4. Set difference
Q80) Which of the following is an illegal array definition?
1. Type COLONGE: (LIME, PINE, MUSK, MENTHOL): var a: array (COLONGE)
or REAL;
2. var a: array [REAL] of REAL;
3. var a: array [‘A’……..’Z’] of RRAL;
4. var a: array [BOOLEAN]of REAL;
Q81) What is the output of the following C program?
# include<stdio.h>
# define SQR( ( * )
GATExplore.com/barc-exam/
Int main ()
{ int a;
Int b=4;
a=SQR (b+2);
printf (% d/n S,a);
return0;
}
1. 14
2. 36
3. 18
4. 20
Q82) What is the number of steps required to derive the string ( (() () ) for the
following grammar?
• S → SS
• S → (s)
•S→
1. 10
2. 12
3. 16
4. 15
Q83) Which Project 802 standard provides for a collision-free protocol?
1. 802.2
2. 802.3
3. 802.5
4. 802.6
Q84) The TCP sliding window
1. Can be used to control the flow of information
2. always occurs when the field value is 0
3. always occurs when the field value is 1
4. occurs horizontal
Q85) A 32 bit adder is formed by cascading 4 bit CLA adder. The gate delays
(latency) for getting the sum bits is
1. 16
2. 18
3. 17
4. 19
Q86) SHA-1 is a
1. encryption algorithm
2. Decryption algorithm
3. Key exchange algorithm
4. message digest function
GATExplore.com/barc-exam/
Q87) The encoding technique used to transmit the signal in giga Ethernet technology
over fiber optic medium is
1. Differential Manchester encoding
2. Non return to zero
3. 4B/5B encoding
4. 8B/10 B encoding
Q88) A read bit can be read
1. and written by CPU
2. and written by peripheral
3. by peripheral and written by CPU
4. by CPU and written by the peripheral
Q89) The number of 1^s in the binary representation of 3x4096+15x256+5x16+3)
are:
1. 8
2. 9
3. 10
4. 12
Q90) he following table shows the processes in the ready queue and time required
for each process for completing its job.
1. AB+AC+BC
2. A+BC
3. A+B
4. A+B+C
GATExplore.com/barc-exam/
Q92) Consider a set of n tasks with known runtimes r1 ,r2………….. rn To be run on a
uni processor machine . Which of the following processer scheduling algorithms will
result in the maximum throughput?
1. Round Robin
2. Shortest job first
3. Highest response ratio first
4. First come first served
Q93) The team phong associated with
1. Ray tracing
2. Shading
3. Hiddenline removal
4. a game
Q94) Which is the correct definition of a valid process transition in as operating
system?
1. Wake up: ready → running
2. Wake up: ready → running
3. block: ready → running
4. Time runout: → ready→ running.
Q95) On a LAN, where are IP datagram transported?
1. In the LAN header
2. In the application field
3. In the information field of the LAN frame
4. After the TCP header
Q96) The time complexity of computing the transitive closure of a binary relation on a
set n elements is know to be
1. O(n log n)
2. O(n 3/2)
3. (n3)
4. (n)
Q97) The range of integers that can be represented by an n bit 2 s complement
number system is :
1. -2n-1to(2n-1-1)
2. -2(2n-1-1)to (2n-1-1)
3. -2n-to-2n-1
4. -2 (2n-1+1)to (2n-1-1)
Q98) The output of a lexical analyzer is
1. A parse tree
2. Intermediate code
3. Machine code
GATExplore.com/barc-exam/
4. A stream of tokens
Q99) Consider the schema: Sailors(sid,sname,rating,age) with the following
22 Dusting 7 45
29 Borg 1 33
31 Pathy 8 55
32 Robert 8 25
58 Raghu 10 17
64 Herald 7 35
71 Vishnu 10 16
74 King 9 35
85 Archer 3 26
84 Bob 3 64
96 Finch 3 17
For yhe query
SELECT S, rating, AVG(S. age) AS avgage
From sailors S
Where S.age>=18
GROUP BY S.rating
HAVING S2 where S.rating = S2.rating)
The number of rows returned is
1. 6
2. 5
3. 4
4. 3
Q100) Let A(1:8,-5:5,-10:5) be a three dimensional array. How many elements are
there in the array A?
1. 1200
2. 1408
3. 33
4. 1050
GATExplore.com/barc-exam/
BARC Computer Science
Answer Key (GATExplore.com)
Question Answer Question Answer Question Answer Question Answer
Q. 1 4 Q. 26 2 Q. 51 2 Q. 76 1
Q. 2 3 Q. 27 3 Q. 52 4 Q. 77 4
Q. 3 3 Q. 28 4 Q. 53 4 Q. 78 1
Q. 4 2 Q. 29 1 Q. 54 2 Q. 79 4
Q. 5 4 Q. 30 3 Q. 55 4 Q. 80 2
Q. 6 1 Q. 31 3 Q. 56 2 Q. 81 1
Q. 7 1 Q. 32 2 Q. 57 1 Q. 82 1
Q. 8 2 Q. 33 1 Q. 58 3 Q. 83 3
Q. 9 4 Q. 34 1 Q. 59 3 Q. 84 1
Q. 10 2 Q. 35 2 Q. 60 2 Q. 85 2
Q. 11 2 Q. 36 1 Q. 61 1 Q. 86 4
Q. 12 2 Q. 37 4 Q. 62 3 Q. 87 4
Q. 13 2 Q. 38 4 Q. 63 3 Q. 88 4
Q. 14 3 Q. 39 3 Q. 64 1 Q. 89 3
Q. 15 2 Q. 40 3 Q. 65 3 Q. 90 2
Q. 16 3 Q. 41 3 Q. 66 3 Q. 91 1
Q. 17 1 Q. 42 4 Q. 67 4 Q. 92 2
Q. 18 2 Q. 43 1 Q. 68 2 Q. 93 2
Q. 19 2 Q. 44 2 Q. 69 3 Q. 94 2
Q. 20 3 Q. 45 4 Q. 70 3 Q. 95 3
Q. 21 4 Q. 46 3 Q. 71 2 Q. 96 3
Q. 22 2 Q. 47 2 Q. 72 2 Q. 97 1
Q. 23 3 Q. 48 2 Q. 73 2 Q. 98 4
Q. 24 4 Q. 49 2 Q. 74 4 Q. 99 4
Q. 25 4 Q. 50 4 Q. 75 4 Q. 100 2
GATExplore.com/barc-exam/