0% found this document useful (0 votes)
12 views

Computer Science note

The document outlines the instructions and guidelines for the Common P.G. Entrance Test (CPET-2024) in Computer Science, including test format, rules for candidates, and examination procedures. It contains multiple-choice questions covering various topics in computer science, with specific instructions on how to answer and fill out the OMR answer sheet. Additionally, it emphasizes the importance of adhering to the rules to avoid disqualification due to malpractice.

Uploaded by

bhuyanabhijit79
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
12 views

Computer Science note

The document outlines the instructions and guidelines for the Common P.G. Entrance Test (CPET-2024) in Computer Science, including test format, rules for candidates, and examination procedures. It contains multiple-choice questions covering various topics in computer science, with specific instructions on how to answer and fill out the OMR answer sheet. Additionally, it emphasizes the importance of adhering to the rules to avoid disqualification due to malpractice.

Uploaded by

bhuyanabhijit79
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 16
COMMON P. G. ENTRANCE TEST — 2024 (CPET-2024) Test BookletNo.: 92748 suatoctOode-(22) Subject : COMPUTER SCIENCE TEST BOOKLET ‘ime Allowed : 60 Minutes) Full Marks : 80) : INSTRUCTIONS TO CANDIDATES : The Test Booklet contains 16 pages including the cover page and 80 (Question Nos. 1 to 80) multiple choice questions. 2. DO NOT break open the seal of the Test Booklet until the invigilator instructs to do so. 3. The candidates must check discrepancy, if any (like up-printed or tom or missing pages or missing questions) in the Test Booklet immediately after breaking the seal of the Test Booklet. If detected, the invigilator may be requested to replace the same. 4. Candidates are required to fill up and darken the Hall Ticket No., Test Booklet Serial No. and OMR Answer Sheet Serial No. in attendance sheet carefully. Wrongly filled in OMR Answer Sheet is liable for rejection. 5. Each question has four choices / answers marked (A), (B), (C), (0). Candidate has to select the ‘most appropriate choice / answer to each question and darken the oval completely against the question number provided in the OMR Answer Sheet. 6. _ Indicate only one choice / answer from the options provided by darkening the appropriate oval in the OMR Answer Sheet. More than one response to a question shall be treated as a wrong answer. 7. _ Use only Black Ball Point Pen for darkening the oval for answering. & _Allthe questions are compulsory and they carry equal marks. The total marks scored by a candidate depends on the number of correct choices / answers darkened in the OMR Answer Sheet. There will be no negative marking for wrong answers. 9. Nocandidate shall be allowed to leave the Examination Hall / Room tllall OMR Answer Sheets have been collected by the invigilator. 10. Oncompletion of the entrance test, the original OMR Answer Sheet be handed over to the invigilator. Candidates are allowed to take the second copy of the OMR Answer Sheet along with the used Test Booklet for reference 11. Candidates are not allowed to carry any personal belongings including electronic devices such as scientific calculator, cell phones, headphones, earbuds, or any other type of devices that allow ‘communication of any kind inside the Examination Room / Hall 12. The candidates are advised not to scribble or make any mark on the OMR Answer Sheet except marking the answers at the appropriate places and filing up the details required. Rough work, if any, may be done in the blank sheet(s) provided at the end of the Test Booklet. 13. Any malpractice / use of unfair means will lead to your disqualification from the entrance test / admission process and may also lead to appropriate legal action as deemed fit (DO NOT OPEN THIS TEST BOOKLET UNTIL YOU ARE ASKED TO DO SO} GO-28/13 (Tum over) (Continued ) GO-2813 1. What does the following C code display ? #include intmaing) - intp1 =1,p2=2, p3,i=3; printf(“%d\t%d", p1, p2) ; while(i<=5) { p3=p1+p2; printf(°4%d", p3) ; pt =p2;p2=p3;i=i+1; } return 0; } (A) 01123 (B) 12358 (C) 12345 (0) 13579 2. Whatwill be the output of the following C program ? #include main() { intn =579,d,s=0; while (n> 0){ d=n%10;s+=d;n=n/t0; } printf("%d", s) ; } A) 57 ®) 9 ©) 21 (0) 5 Go-28/13 (3) (Tumover) Whatill be the output of the following C code ? #include #include main() {float m=4.3; printf(“%d", int(pow(int(cell(m)), int(floor(m))))) ; y (A) 125 (8) 1024 (Cc) 64 (D) 625 The equivalent pointer notation for the subscripted variable p[0][2] is : (A) *(p +0) +2) (8) *(P+2)) (C) *((p+0)+2) (0) “(p+2) The following code segmentis the logic for : forfi= 1 ;i<=n—1; i++) {forg=i+1;j<=n;j++) {iffa [il > af) (temp = afi]; afi] = aff]; aj] = temp +} J } (A) Insertion sort (8) Selection sort (C) Bubble sort (0) Exchange sort In 2's complement representation, the binary number 11100101 is equivalent to the decimal number : (a) +27 (®) -27 (©) +25 (0) -25 ‘The key difference between synchronous DRAM and asynchronous DRAM is based on their operation relative to: (A) Clock speed of a processor (8) Memory size (C)_ System clock (0) Volatility of data A field-programmable gate array is a type of - (A) Programming language (B) Array processor (c) ROM (D) Configurable integrated circuit GO-28/13 (4) (Continued ) 10. 1. Ina JK flip-flop, a toggle condition occurs when : (A) J=4,K=4 (8) J=1,K=0 (C) J=0,K=14 (0) J=0,K=0 ‘What happens if the input is high in a finite state machine ? (A) No change of state (8) Transition to the previous state (C) Change of state (0) Invalid state Which of the following statements false ? (A) Aconstructoris used to initialize an object at the time of its creation (8) One can have multiple constructors in a C++ program (C) Aconstructor can be overloaded (D) The return type of constructor is void The pointer which is set to contain the address of the object at the time of object creation is referred as _____ pointer. (A) New (B) This (C) Current (D) Active Whatwill be the output of the following C++ code ? #include #include using namespace std ; class count {private intn; public : count() {n=0;} count operator +#int) { n——;retum “this ; } void display() {cout <<'n=" < #include using namespace std ; class base {private: intx; protected: inty; public: intz; k class dd: public base { public: void setvalue() {y=2; void display() {cout<<"y="< (B) _styles.css (C)_ (D) Which of the following is used for concatenation in PHP ? (A) append() (8) +(plus) (C) .(dot) () * (Asterisk) GO-28/13 (11) (Tum over ) 55. 56. 57. 58. 59. 60. 61 In Java Script, which of the following function of the Strting object returns the character in the string starting at the specified position to the specified number of characters ? (A). substring) (8) split (C) sliced) (D) subst) Which of the following software development model is more flexible, and involves close collaboration between thé development team and the customer to ensure that the product meets their expectations ? (A) Spiral model (8) RAD (C) Agile development model (0) Waterfall model Whats true about COCOMO ? (A) Itestimates the duration of a software project (B) _ Itis a software cost estimation model (C)_ tis helpful in finding software requirements (0) tis a software testing technique The objective of SCMis to: (A) Develop a software quickly (8) Monitor and control changes in a software (C) Testa software properly (D) Estimate the cost of a software The degree of interdependence between software modules is referred to as : (A) Modularity (8) Cohesion (C) Reusabilty (0) Coupling The software testing method that evaluates the overall functionality and performance ofa complete and fully integrated software solution is called (A) Integration testing (8) Systemtesting (C) Blackbox testing (0) Whitebox testing Which of the following is not an attribute of an intelligent agent ? (A) Autonomous control (B) Ability to perceive its environment (C) Exhibit goal directed behavior (D) Exhibit irrational behavior GO-28/13 (12) (Continued ) 62. 63. 65. 66. 67. 68. 69. Which of the following is an informed search technique ? (A) Depth first search (8) Breadth first search (C) Bestfirst search (0) Binary search What is the objective of Alpha-beta pruning algorithm ? (A) Todetermine the next state ©) (C) Toeliminate the previous states (D) To eliminate some of the less promising alternative states To apply back tracking Which of the following knowledge representation scheme is suitable for stereotyped sequence of expected events ? (A) Frames (8) Production rules (C) Semantic nets (0) Scripts Bayesian probabilistic reasoning is suitable for dealing with : (A) Inconsistencies (8) Uncertainties (C) Determinism . (D) Adaptability Which of the following cannot be adopted to solve recurrence relations ? (A) Substitution method (B) Recursion tree method (C) Elimination method (D) Master method Which of the following method is not suitable for collision resolution 7 (A) Linear probing (8) Non-linear probing (C) Quadratic probing (D) Double hashing The fractional knapsack problem can be solved by: (A) Recursive approach (B) Iterative approach (C)_ Greedy approach (0) Dynamic programming The main use of dynamic programming is to solve : (A) Searching problems (8) Optimization problems (C) Uncertainties (0) Recurrence relations GO~28/13 (13) (Tum over) 70. 71. 72. 73. 74, 5. 76. 77. ‘Which of the following is capable of handling graphs with negative edge weights ? (A) Prim’s algorithm (8) Kruskal’s algorithm (C) Bellman-Ford algorithm (0) Dijkstra algorithm Whats the full form of the abbreviation OLAP ? (A) Ondine Analysis and Processing (B)_ On-line Analytical Product (C) Online Analytical Processing (D) Online Access Permission Whats the objective of FP-tree algorithm 2 (A) Tosearch an item in a tree data structure (8) Tofind frequent patterns in large databases (C)_ Tofind the shortest path between two nodes (0) Totraverse a tree in a systematic manner Which of the following is a non-impact printer ? (A) Dot matrix printer (8) Line printer (©) Laser printer (D) Daisy wheel printer Which memory acts as a buffer between RAM and CPU in order to speed up the system performance ? (A) Buffermemory (B) Auxiliary memory (©) Cache memory (0) ROM Which is not a valid storage class in C programming ? (A) extem (B) auto (C) register (0) dynamic Which of the following is not a data type in Python programming ? (A) dict (B) class (©) list (0) tuple ‘What is the output of the following Python code 7 b=“Examination” print(o[2:5]) (A) xami (B) ami (C) amin (0) xamin GO-28/13 (14) (Continued ) 78. Whatis the full form of the abbreviation HTTP ? (A) Hypertext Transmission Protocol (B) Hypertext Transaction Protocol (C) Hypertext Transfer Protocol (D) Hypertext Test Protocol 79. Whatis PHP ? (A) Operating system (8) Serverside scripting language (C) Browser program (D) Database query language 80. Which of the following is not a standard service model in cloud computing ? (A) SaaS (8) PaaS (C) laas (0) Yaas pera are Go-2813 (15) (Tum over) SEAL GO - 28/13 (2,800) SPACE FOR ROUGH WORK (16) Computer Science

You might also like