Question : 1
Raman is confident of speaking English _______ six months as he has been practising regularly _______ the last three weeks.
during, for
for, since
for, in
within, for
Correct Answer : D
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 2
His knowledge of the subject was excellent but his classroom performance was _______ .
extremely poor
good
desirable
praiseworthy
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 3
Select the word that fits the analogy:
Cook : Cook :: Fly : _______
Flyer
Flying
Flew
Flighter
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 4
The dawn of the 21st century witnessed the melting glaciers oscillating between giving too much and too little to billions of people who depend on them for fresh water. The UN climate report estimates that without deep cuts to man-made emissions, at least 30% of the northern hemisphere’s surface permafrost could melt by the end of the century. Given this situation of imminent global exodus of billions of people displaced by rising seas, nation-states need to rethink their carbon footprint for political concerns, if not for environmental ones.
Which one of the following statements can be inferred from the given passage ?
Nation-states do not have environmental concerns.
Nation-states are responsible for providing fresh water to billions of people.
Billions of people are responsible for man-made emissions.
Billions of people are affected by melting glaciers.
Correct Answer : D
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 5
There are multiple routes to reach from node 1 to node 2, as shown in the network.
The cost of travel on an edge between two nodes is given in rupees. Nodes ‘a’, ‘b’, ‘c’, ‘d’, ‘e’, and ‘f’ are toll booths. The toll price at toll booths marked ‘a’ and ‘e’ is Rs. 200, and is Rs. 100 for the other toll booths. Which is the cheapest route from node 1 to node 2 ?
1−a−c−2
1−f−b−2
1−b−2
1−f−e−2
Correct Answer : B
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 6
Goods and Services Tax (GST) is an indirect tax introduced in India in 2017 that is imposed on the supply of goods and services, and it subsumes all indirect taxes except few. It is a destination-based tax imposed on goods and services used, and it is not imposed at the point of origin from where goods come. GST also has a few components specific to state governments, central government and Union Territories (UTs).
Which one of the following statements can be inferred from the given passage ?
GST is imposed on the production of goods and services.
GST includes all indirect taxes.
GST does not have a component specific to UT.
GST is imposed at the point of usage of goods and services.
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 7
If values of P=3, R=27, T=243, then find the value of Q+S = ________ .
40
80
90
180
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 8
The figure below shows an annular ring with outer and inner as b and a, respectively. The annular space has been painted in the form of blue colour circles touching the outer and inner periphery of annular space. If maximum n number of circles can be painted, then the unpainted area available in annular space is _________ .
\(\pi [(b^{2}-a^{2})-\frac{n}{4}(b-a)^{2}]\)
\(\pi [(b^{2}-a^{2})-n(b-a)^{2}]\)
\(\pi [(b^{2}-a^{2})-n(b-a)^{2}]\)
\(\pi [(b^{2}-a^{2})+n(b-a)^{2}]\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 9
Two straight lines are drawn perpendicular to each other in X−Y plane. If α and β are the acute angles the straight lines make with the X- axis, then α+β is ________ .
60°
90°
120°
180°
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 10
The total revenue of a company during 2014−2018 is shown in the bar graph. If the total expenditure of the company in each year is 500 million rupees, then the aggregate profit or loss (in percentage) on the total expenditure of the company during 2014−2018 is _________ .
16.67% profit
16.67% loss
20% profit
20% loss
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 11
Consider the functions
I. \(e^{-x}\)
II. \(x^{2}-\sin x\)
III. \(\sqrt{x^{3}+1}\)
Which of the above functions is/are increasing everywhere in [0, 1] ?
Ⅲ only
Ⅱ only
Ⅱ and Ⅲ only
Ⅰ and Ⅲ only
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 12
For parameters \(a\) and \(b\), both of which are \(ω(1)\), \(T(n) = T(n^{1/a})+1\), and \(T(b)=1\).
Then \(T(n)\) is
\(\Theta (\log_a \log _b n)\)
\(\Theta (\log_{ab} n)\)
\(\Theta (\log_{b} \log_{a} \: n)\)
\(\Theta (\log_{2} \log_{2} n)\)
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 13
Consider the following statements.
I. Daisy chaining is used to assign priorities in attending interrupts.
II. When a device raises a vectored interrupt, the CPU does polling to identify the source of interrupt.
III. In polling,the CPU periodically checks the status bits to know if any device needs its attention.
IV. During DMA, both the CPU and DMA controller can be bus masters at the same time.
Which of the above statements is/are TRUE ?
Ⅰ and Ⅱ only
Ⅰ and Ⅳ only
Ⅰ and Ⅲ only
Ⅲ only
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 14
Consider the following data path diagram.
Consider an instruction: \(R0 ← R1 + R2\) The following steps are used to execute it over the given data path. Assume that PC is incremented appropriately. The subscripts r and w indicate read and write operations, respectively.
1. \(R2_{r},\text{ TEMP1}_{r},ALU_{\text{add}}, \text{ TEMP2}_{w}\)
2. \(R1_{r},\text{ TEMP1}_{w}\)
3. \(PC_{r}, \text{ MAR}_{w}, \text{ MEM}_{r}\)
4. \(\text{ TEMP2}_{r}, \text{ R0}_{w}\)
5. \(\text{ MDR}_{r}, \text{ IR}_{w}\)
Which one of the following is the correct order of execution of the above steps ?
2, 1, 4, 5, 3
1, 2, 4, 3, 5
3, 5, 2, 1, 4
3, 5, 1, 2, 4
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 15
The preorder traversal of a binary search tree is 15, 10, 12, 11, 20, 18, 16, 19.
Which one of the following is the postorder traversal of the tree ?
10, 11, 12, 15, 16, 18, 19, 20
11, 12, 10, 16, 19, 18, 20, 15
20, 19, 18, 16, 15, 12, 11, 10
19, 16, 18, 20, 11, 12, 10, 15
Correct Answer : B
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 16
What is the worst case time complexity of inserting \(n^2\) elements into an AVL-tree with \(n\) elements initially ?
\(\Theta (n^{4})\)
\(\Theta (n^{2})\)
\(\Theta (n^{2} \ log \ n)\)
\(\Theta (n^{3})\)
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 17
Which one of the following regular expressions represents the set of all binary strings with an odd number of 1′s ?
\(((0+1)^*1(0+1)^*1)^*10^*\)
\((0^*10^*10^*)^*0^*1\)
\(10^*(0^*10^*10^*)^*\)
\((0^*10^*10^*)^*10^*\)
Correct Answer : MTA
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 18
Consider the following statements.
I. If L1∪L2 is regular, then both L1 and L2 must be regular.
II. The class of regular languages is closed under infinite union.
Which of the above statements is/are TRUE ?
Ⅰ only
Ⅱ only
Both Ⅰ and Ⅱ
Neither Ⅰ nor Ⅱ
Correct Answer : D
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 19
Consider the following statements.
I. Symbol table is accessed only during lexical analysis and syntax analysis.
II. Compilers for programming languages that support recursion necessarily need heap storage for memory allocation in the run-time environment.
III. Errors violating the condition ‘any variable must be declared before its use’ are detected during syntax analysis.
Which of the above statements is/are TRUE ?
I only
I and III only
Ⅱ only
None of Ⅰ, Ⅱ and Ⅲ
Correct Answer : D
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 20
Consider the language \(L = \{a^{n}\mid n \geq 0\} \cup \{a^{n}b^{n}\mid n \geq 0\}\) and the following statements.
I. \(L\) is deterministic context-free.
II. \(L\) is context-free but not deterministic context-free.
III. \(L\) is not \(LL(k)\) for any \(k\).
Which of the above statements is/are TRUE ?
Ⅰ only
Ⅱ only
Ⅰ and Ⅲ only
Ⅲ only
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 21
Consider allocation of memory to a new process. Assume that none of the existing holes in the memory will exactly fit the process’s memory requirement. Hence, a new hole of smaller size will be created if allocation is made in any of the existing holes. Which one of the following statement is TRUE ?
The hole created by first fit is always larger than the hole created by next fit.
The hole created by worst fit is always larger than the hole created by first fit.
The hole created by best fit is never larger than the hole created by first fit.
The hole created by next fit is never larger than the hole created by best fit.
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 22
Consider the following statements about process state transitions for a system using preemptive scheduling.
I. A running process can move to ready state.
II. A ready process can move to running state.
III. A blocked process can move to running state.
IV. A blocked process can move to ready state.
Which of the above statements are TRUE ?
I, II, and III only
II and III only
I, II, and IV only
I, II, III and IV only
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 23
Consider a relational database containing the following schemas.
The primary key of each table is indicated by underlining the constituent fields.
SELECT s.sno, s.sname FROM Suppliers s, Catalogue c WHERE s.sno=c.sno AND cost > (SELECT AVG (cost) FROM Catalogue WHERE pno = ‘P4’ GROUP BY pno) ;
The number of rows returned by the above SQL query is
4
5
0
2
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 24
Which one of the following is used to represent the supporting many-one relationships of a weak entity set in an entity-relationship diagram ?
Diamonds with double/bold border
Rectangles with double/bold border
Ovals with double/bold border
Ovals that contain underlined identifiers
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 25
Consider the following statements about the functionality of an IP based router.
I. A router does not modify the IP packets during forwarding.
II. It is not necessary for a router to implement any routing protocol.
III. A router should reassemble IP fragments if the MTU of the outgoing link is larger than the size of the incoming IP packet.
Which of the above statements is/are TRUE ?
I and II only
I only
II and III only
II only
Correct Answer : D
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 26
What is the worst case time complexity of inserting \(n\) elements into an empty linked list, if the linked list needs to be maintained in sorted order ?
\(\theta (n)\)
\(\theta (n \ log \ n)\)
\(\theta (n^2)\)
\(\theta (1)\)
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 27
Let \(\mathcal{R}\) be the set of all binary relations on the set \(\{1,2,3\}\) . Suppose a relation is chosen from R at random. The probability that the chosen relation is reflexive (round off to 3 decimal places) is ________ .
Correct Answer : 0.125
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 28
Let \(G\) be a group of 35 elements. Then the largest possible size of a subgroup of \(G\) other than \(G\) itself is ________ .
Correct Answer : 7
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 29
A multiplexer is placed between a group of 32 registers and an accumulator to regulate data movement such that at any given point in time the content of only one register will move to the accumulator. The number of select lines needed for the multiplexer is _________ .
Correct Answer : 5
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 30
If there are \(m\) input lines \(n\) output lines for a decoder that is used to uniquely address a byte addressable 1 KB RAM, then the minimum value of \(m+n\) is ________ .
Correct Answer : 1034
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 31
A direct mapped cache memory of 1 MB has a block size of 256 bytes. The cache has an access time of 3 ns and a hit rate of 94%. During a cache miss, it takes 20 ns to bring the first word of a block from the main memory, while each subsequent word takes 5 ns. The word size is 64 bits. The average memory access time in ns (round off to 1 decimal place) is ________ .
Correct Answer : 13.3 to 13.3 13.5 to 13.5
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 32
Consider the following C program.
#include <stdio.h>
int main () {
int a[4] [5] = {{1, 2, 3, 4, 5},
{6, 7,8, 9, 10},
{11, 12, 13, 14, 15},
{16, 17,18, 19, 20}};
printf(“%d\n”, *(*(a+**a+2)+3));
return(0);
}
The output of the program is _______.
Correct Answer : 19
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 33
Consider a double hashing scheme in which the primary hash function is \(h_1(k) = k\ mod \ 23\) mod 23, and the secondary hash function is \(h_2(k) = 1+(k \ mod \ 19)\). Assume that the table size is 23. Then the address returned by probe 1 in the probe sequence (assume that the probe sequence begins at probe 0) for key value \(k = 90\) is ________ .
Correct Answer : 13
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 34
Consider the following grammar.
\(S \rightarrow aSB \mid d\)
\(B \rightarrow b\)
The number of reduction steps taken by a bottom-up parser while accepting the string \(aaadbbb\) is ________ .
Correct Answer : 7
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 35
Assume that you have made a request for a web page through your web browser to a web server. Initially the browser cache is empty. Further, the browser is configured to send HTTP requests in non-persistent mode. The web page contains text and five very small images. The minimum number of TCP connections required to display the web page completely in your browser is ________ .
Correct Answer : 6
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 36
Which of the following languages are undecidable? Note that \(⟨M⟩\) indicates encoding of the Turing machine \(M\).
\(L_1 = \{\left \langle M \right \rangle \mid L(M) = \varnothing \}\)
\(L_2= \{\left \langle M,w,q \right \rangle \mid M \text{ on input } w \text{ reaches state } q \text{ in exactly } 100 \text{ steps}\}\)
\(L_3= \{\left \langle M \right \rangle \mid L (M) \text{ is not recursive}\}\)
\(L_4= \{\left \langle M \right \rangle \mid L(M) \text{contains at least $21$ members}\}\)
\(L_1\), \(L_3\), and \(L_4\) only
\(L_1\) and \(L_3\) only
\(L_2\) and \(L_3\) only
\(L_2\), \(L_3\), and \(L_4\) only
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 37
Let \(A\) and \(B\) be two \(n×n\) matrices over real numbers. Let rank(\(M\)) and det(\(M\)) denote the rank and determinant of a matrix \(M\), respectively. Consider the following statements.
I. rank(\(AB\)) = rank(\(A\))*rank (\(B\)) II. det(\(AB\)) = det(\(A\))*det(\(B\)) III. rank(\(A+B\)) ≤ rank(\(A\)) + rank(\(B\)) IV. det(\(A+B\)) ≤ det(\(A\)) + det(\(B\))
Which of the above statements are TRUE ?
I and II only
I and IV only
II and III only
III and IV only
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 38
Consider the Boolean function \(z(a,b,c)\).
Which one of the following minterm lists represents the circuit given above ?
\(z=\sum (0,1,3,7)\)
\(z=\sum (1,4,5,6,7)\)
\(z=\sum (2,4,5,6,7)\)
\(z=\sum (2,3,5)\)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 39
Consider three registers \(R1, R2\), and \(R3\) that store numbers in IEEE−754 single precision floating point format. Assume that \(R1\) and \(R2\) contain the values (in hexadecimal notation) 0x42200000 and 0xC1200000, respectively.
If \(R3 = \frac {R1} {R2}\), what is the value stored in \(R3\) ?
0x40800000
0xC0800000
0x83400000
0xC8500000
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 40
A computer system with a word length of 32 bits has a 16 MB byte- addressable main memory and a 64 KB, 4-way set associative cache memory with a block size of 256 bytes. Consider the following four physical addresses represented in hexadecimal notation.
\(A1 = 0x42C8A4, \ \ \ \ \ \ \ \ A2 = 0x546888, \ \ \ \ \ \ \ \ A3 = 0x6A289C, \ \ \ \ \ \ \ \ A4 = 0x5E4880\)
Which one of the following is TRUE ?
\(A1\) and \(A4\) are mapped to different cache sets.
\(A2\) and \(A3\) are mapped to the same cache set.
\(A3\) and \(A4\) are mapped to the same cache set.
\(A1\) and \(A3\) are mapped to the same cache set.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 41
Let \(G = (V, G)\) be a weighted undirected graph and let \(T\) be a Minimum Spanning Tree (\(MST\)) of \(G\) maintained using adjacency lists. Suppose a new weighed edge \((u, v) ∈ V×V\) is added to \(G\). The worst case time complexity of determining if \(T\) is still an \(MST\) of the resultant graph is
\(\Theta (\mid E \mid + \mid V \mid) \\\)
\(\Theta (\mid E \mid \mid V \mid) \\\)
\(\Theta(E \mid \log \mid V \mid) \\\)
\(\Theta( \mid V \mid)\)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 42
Consider the following languages.
\(\begin{array}{ll} L_1= \{ wxyx \mid w,x,y \in (0+1)^{+} \} \\ L_2= \{xy \mid x,y \in (a+b)^{*}, \mid x \mid=\mid y \mid, x \neq y \} \end{array}\)
Which one of the following is TRUE ?
\(L_1\) is regular and \(L_2\) is context- free.
\(L_1\) context- free but not regular and \(L_2\) is context-free
Neither \(L_1\) nor \(L_2\) is context- free
\(L_1\) context- free but \(L_2\) is not context-free
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 43
Consider the productions \(A → PQ\) and \(A → XY\). Each of the five non-terminals \(A,P,Q,X\), and \(Y\) has two attributes: \(s\) is a synthesized attribute, and \(i\) is an inherited attribute. Consider the following rules.
Rule 1 : \( P . i = A.i + 2, \: Q.i = P. i + A.i,\) and \(A.s = P.s +Q. s\)
Rule 2 : \( X.i = A.i + Y.s\), and \(Y. i = X. s +A .i\)
Which one of the following is TRUE ?
Both Rule 1 and Rule 2 are \(L - attributed\)
Only Rule 1 is \(L - attributed\)
Only Rule 2 is \(L - attributed\)
Neither Rule 1 nor Rule 2 is \(L - attributed\)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 44
Each of a set of \(n\) processes executes the following code using two semaphores \(a\) and \(b\) initialized to 1 and 0, respectively. Assume that \(count \) is a shared variable initialized to 0 and not used in CODE SECTION \(P\).
\(\begin{array}{|c|} \hline \textbf{CODE SECTION P} \\ \hline \end{array}\)
wait(a); count=count+1;
if (count==n) signal (b);
signal (a): wait (b) ; signal (b);
\(\begin{array}{|c|} \hline \textbf{CODE SECTION Q} \\ \hline \end{array}\)
What does the code achieve ?
It ensures that no process executes \(CODE \ SECTION \ Q\) before every process has finished \(CODE \ SECTION \ P\).
It ensures that two processes are in \(CODE \ SECTION \ Q\) at any time.
It ensures that all processes execute \(CODE \ SECTION \ P\) mutually exclusively.
It ensures that at most \(n−1\) processes are in \(CODE \ SECTION \ P\) at any time.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 45
Consider the following five disk five disk access requests of the form (request id, cylinder number) that are present in the disk scheduler queue at a given time.
(P, 155), (Q, 85), (R, 110), (S, 30), (T, 115)
Assume the head is positioned at cylinder 100. The scheduler follows Shortest Seek Time First scheduling to service the requests.
Which one of the following statements is FALSE ?
T is serviced before P
Q is serviced after S, but before T
The head reverses its direction of movement between servicing of Q and P
R is serviced before P
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 46
Consider a relational table R that is in 3NF, but not in BCNF. Which one of the following statements is TRUE ?
R has a nontrivial functional dependency X→A, where X is not a superkey and A is a prime attribute.
R has a nontrivial functional dependency X→A, where X is not a superkey and A is a non-prime attribute and X is not a proper subset of any key.
R has a nontrivial functional dependency X→A, where X is not a superkey and A is a non-prime attribute and X is a proper subset of some key.
A cell in R holds a set instead of an atomic value.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 47
Consider a schedule of transactions \(T_1\) and \(T_2\):
\(\begin{array}{|c|c|c|c|c|c|c|c|c|c|c|} \hline T_1 & RA & & & RC & & WD & & WB & \text{Commit} & \\ \hline T_2 & & RB & WB & & RD & & WC & & & \text{Commit} \\ \hline \end{array}\)
Here, RX stands for “Read(X)” and WX stands for “Write(X)”. Which one of the following schedules is conflict equivalent to the above schedule ?
\(\begin{array}{|c|c|c|c|c|c|c|c|c|c|c|} \hline T_1 & & & & RA & RC & WD & WB & & \text{Commit} & \\ \hline T_2 & RB & WB & RD & & & & & WC & & \text{Commit} \\ \hline \end{array} \\\)
\(\begin{array}{|c|c|c|c|c|c|c|c|c|c|c|} \hline T_1 & RA & RC &WD &WB & & & & & \text{Commit} & \\ \hline T_2 & & & & &RB & WB & RD& WC & & \text{Commit} \\ \hline \end{array} \\\)
\(\begin{array}{|c|c|c|c|c|c|c|c|c|c|c|} \hline T_1 & RA & RC & WD & & & & WB & & \text{Commit} & \\ \hline T_2 & & & & RB & WB & RD & & WC & & \text{Commit} \\ \hline \end{array} \\\)
\(\begin{array}{|c|c|c|c|c|c|c|c|c|c|c|} \hline T_1 & & & & & RA & RC & WD & WB & \text{Commit} & \\ \hline T_2 & RB & WB & RD & WC & & & & & & \text{Commit} \\ \hline \end{array}\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 48
An organization requires a range of IP address to assign one to each of its 1500 computers. The organization has approached an Internet Service Provider (ISP) for this task. The ISP uses CIDR and serves the requests from the available IP address space 202.61.0.0/17. The ISP wants to assign an address space to the organization which will minimize the number of routing entries in the ISP’s router using route aggregation. Which of the following address spaces are potential candidates from which the ISP can allot any one of the organization ?
I. 202.61.84.0 / 21
II. 202.61.104.0 / 21
III. 202.61.64.0 / 21
IV. 202.61.144.0 / 21
I and II only
II and III onlY
III and IV only
I and IV only
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 49
Which one of the following predicate formulae is NOT logically valid ?
Note that \(W\) is a predicate formula without any free occurrence of \(x\).
\(\forall x (p(x) \vee W) \equiv \forall x \: ( px) \vee W\)
\(\exists x(p(x) \wedge W) \equiv \exists x \: p(x) \wedge W\)
\(\forall x(p(x) \rightarrow W) \equiv \forall x \: p(x) \rightarrow W\)
\(\exists x(p(x) \rightarrow W) \equiv \forall x \: p(x) \rightarrow W\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 50
Let \(G = (V,E)\) be a directed, weighted graph with weight function \(w: E \rightarrow \mathbb{R}\). For some function \(f: V \rightarrow \mathbb{R}\), for each edge \( (u,v)∈E\), define \(w′(u,v)\) as \(w(u,v)+f(u)−f(v)\).
Which one of the options completes the following sentence so that it is TRUE ?
“The shortest paths in \(G\) under w are shortest paths under \(w′\) too, _________”.
for every \(f: V \rightarrow \mathbb{R}\)
if and only if \(\forall u \in V, \: f(u)\) is positive
if and only if \(\forall u \in V, \: f(u)\) is negative
if and only if \(f(u)\) is the distance from \(s\) to \(u\) in the graph obtained by adding a new vertex \(s\) to \(G\) and edges of zero weight from \(s\) to every vertex of \(G\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 51
In a balanced binary search tree with \(n\) elements, what is the worst-case time complexity of reporting all elements in the range \([a,b]\)? Assume that the number of reported elements is \(k\).
\(\Theta (\log n)\)
\(\Theta (\log n +k)\)
\(\Theta (k \log n)\)
\(\Theta ( n \log k)\)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 52
The number of permutations of the characters in LILAC so that no character appears in its original position, if the two L’s are indistinguishable, is ________ .
Correct Answer : 12
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 53
Consider a non-pipelined processor operating at 2.5 GHz. It takes 5 clock cycles to complete an instruction. You are going to make a 5- stage pipeline out of this processor. Overheads associated with pipelining force you to operate the pipelined processor at 2 GHz. In a given program, assume that 30% are memory instructions, 60% are ALU instructions and the rest are branch instructions. 5% of the memory instructions cause stalls of 50 clock cycles each due to cache misses and 50% of the branch instructions cause stalls of 2 cycles each. Assume that there are no stalls associated with the execution of ALU instructions. For this program, the speedup achieved by the pipelined processor over the non-pipelined processor (round off to 2 decimal places) is __________ .
Correct Answer : 2.15 to 2.18
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 54
A processor has 64 registers and uses 16-bit instruction format. It has two types of instructions: I-type and R-type. Each I-type instruction contains an opcode, a register name, and a 4-bit immediate value. Each R-type instruction contains an opcode and two register names. If there are 8 distinct I-type opcodes, then the maximum number of distinct R-type opcodes is _______ .
Correct Answer : 14
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 55
For \(n>2\), let \(a ∈ \{0, 1\}^n\) be a non-zero vector. Suppose that \(x\) is chosen uniformly at random from \(\{0,1\}^n\). Then, the probability that \(\displaystyle{} \Sigma_{i=1}^n a_i x_i\) is an odd number is _________ .
Correct Answer : 0.5
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 56
Consider the following C functions.
The return value of fun2(5) is ________ .
Correct Answer : 55
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 57
Consider the array representation of a binary min-heap containing 1023 elements. The minimum number of comparisons required to find the maximum in the heap is _________ .
Correct Answer : 511
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 58
Consider the following C functions.
The value returned by pp(3,4) is ________ .
Correct Answer : 81
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 59
Consider a graph \(G = (V, E)\), where \( V = \{ v_1,v_2,…,v_{100} \}\), \(E = \{ (v_i, v_j) ∣ 1≤ i < j ≤ 100 \}\) and weight of the edge \((v_i, v_j)\) is \( ∣i–j∣\). The weight of minimum spanning tree of \(G\) is ________.
Correct Answer : 99
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 60
Consider the following set of processes, assumed to have arrived at time 0. Consider the CPU scheduling algorithms Shortest Job First (SJF) and Round Robin (RR). For RR, assume that the processes are scheduled in the order \(P_1, P_2, P_3, P_4\).
\(\begin{array}{|l|l|l|l|l|} \hline \text{Processes} & P_1 & P_2 & P_3 & P_4 \\ \hline \text{Burst time (in ms)} &8 & 7 & 2 & 4 \\ \hline \end{array}\)
If the time quantum for RR is 4 ms, then the absolute value of the difference between the average turnaround times (in ms) of SJF and RR (round off to 2 decimal places) is _________ .
Correct Answer : 5.25
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 61
Consider the following language.
\(L = \{{ x\in \{a,b\}^*\mid}\)number of \(a’s\) in \(x\) divisible by 2 but not divisible by 3 }
The minimum number of states in DFA that accepts \(L\) is _________ .
Correct Answer : 6
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 62
Graph \(G\) is obtained by adding vertex s to \(K_{3,4}\) and making \(s\) adjacent to every vertex of \(K_{3,4}\). The minimum number of colours required to edge-colour \(G\) is _________ .
Correct Answer : 7
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 63
Consider a paging system that uses 1-level page table residing in main memory and a TLB for address translation. Each main memory access takes 100 ns and TLB lookup takes 20 ns. Each page transfer to/from the disk takes 5000 ns. Assume that the TLB hit ratio is 95%, page fault rate is 10%. Assume that for 20% of the total page faults, a dirty page has to be written back to disk before the required page is read from disk. TLB update time is negligible. The average memory access time in ns (round off to 1 decimal places) is ___________ .
Correct Answer : 154.5 to 155.5
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 64
Consider a database implemented using B+ tree for file indexing and installed on a disk drive with block size of 4 KB. The size of search key is 12 bytes and the size of tree/disk pointer is 8 bytes. Assume that the database has one million records. Also assume that no node of the B+ tree and no records are present initially in main memory. Consider that each record fits into one disk block. The minimum number of disk accesses required to retrieve any record in the database is ___________ .
Correct Answer : 4
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 65
Consider a TCP connection between a client and a server with the following specifications; the round trip time is 6 ms, the size of the receiver advertised window is 50 KB, slow-start threshold at the client is 32 KB, and the maximum segment size is 2 KB. The connection is established at time t=0. Assume that there are no timeouts and errors during transmission. Then the size of the congestion window (in KB) at time t+60 ms after all acknowledgements are processed is _________ .
Correct Answer : 44
Question Type : NAT
Max Marks : 2
Negative Marks : 0