Question : 1
Ravi had ______ younger brother who taught at ______ university. He was widely regarded as ______ honorable man.
Select the option with the correct sequence of articles to fill in the blanks.
a; a; an
the; an; a
a; an; a
an; an; a
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 2
The CEO’s decision to downsize the workforce was considered myopic because it sacrificed long-term stability to accommodate short-term gains.
Select the most appropriate option that can replace the word “myopic” without changing the meaning of the sentence.
visionary
shortsighted
progressive
innovative
Correct Answer : B
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 3
The average marks obtained by a class in an examination were calculated as 30.8. However, while checking the marks entered, the teacher found that the marks of one student were entered incorrectly as 24 instead of 42. After correcting the marks, the average becomes 31.4. How many students does the class have?
25
28
30
32
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 4
Consider the relationships among P, Q, R, S, and T:
• P is the brother of Q.
• S is the daughter of Q.
• T is the sister of S.
• R is the mother of Q.
The following statements are made based on the relationships given above.
(1) R is the grandmother of S.
(2) P is the uncle of S and T.
(3) R has only one son.
(4) Q has only one daughter.
Which one of the following options is correct?
Both (1) and (2) are true.
Both (1) and (3) are true.
Only (3) is true.
Only (4) is true.
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 5
According to the map shown in the figure, which one of the following statements is correct?
Note: The figure shown is representative.
The library is located to the northwest of the canteen.
The hospital is located to the east of the chemistry lab.
The chemistry lab is to the southeast of physics lab.
The classrooms and canteen are next to each other.
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 6
“I put the brown paper in my pocket along with the chalks, and possibly other things. I suppose every one must have reflected how primeval and how poetical are the things that one carries in one’s pocket: the pocket-knife, for instance the type of all human tools, the infant of the sword. Once I planned to write a book of poems entirely about the things in my pocket. But I found it would be too long: and the age of the great epics is past.”
(From G.K. Chesterton’s “A Piece of Chalk”)
Based only on the information provided in the above passage, which one of the following statements is true?
The author of the passage carries a mirror in his pocket to reflect upon things.
The author of the passage had decided to write a poem on epics.
The pocket-knife is described as the infant of the sword.
Epics are described as too inconvenient to write.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 7
In the diagram, the lines QR and ST are parallel to each other. The shortest distance between these two lines is half the shortest distance between the point P and line QR. What is the ratio of the area of the triangle PST to the area of the trapezium SQRT?
Note: The figure shown is representative.
\(1\over 3\)
\(1\over 4\)
\(2 \over 5\)
\(1\over 2\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 8
A fair six-faced dice, with the faces labelled ‘1’, ‘2’, ‘3’, ‘4’, ‘5’, and ‘6’, is rolled thrice. What is the probability of rolling ‘6’ exactly once?
\(75 \over {216}\)
\(1 \over {6}\)
\(1 \over {18}\)
\(25 \over {216}\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 9
A square paper, shown in figure (I), is folded along the dotted lines as shown in the figures (II) and (III). Then a few cuts are made as shown in figure (IV). Which one of the following patterns will be obtained when the paper is unfolded?
Note: The figures shown are representative.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 10
A shop has 4 distinct flavors of ice-cream. One can purchase any number of scoops of any flavor. The order in which the scoops are purchased is inconsequential. If one wants to purchase 3 scoops of ice-cream, in how many ways can one make that purchase?
4
20
24
48
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 11
Suppose a program is running on a non-pipelined single processor computer system. The computer is connected to an external device that can interrupt the processor asynchronously. The processor needs to execute the interrupt service routine (ISR) to serve this interrupt. The following steps (not necessarily in order) are taken by the processor when the interrupt arrives:
(i) The processor saves the content of the program counter.
(ii) The program counter is loaded with the start address of the ISR.
(iii) The processor finishes the present instruction.
Which ONE of the following is the CORRECT sequence of steps?
(iii), (i), (ii)
(i), (iii), (ii)
(i), (ii), (iii)
(iii), (ii), (i)
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 12
Which ONE of the following statements is FALSE regarding the symbol table?
Symbol table is responsible for keeping track of the scope of variables.
Symbol table can be implemented using a binary search tree.
Symbol table is not required after the parsing phase.
Symbol table is created during the lexical analysis phase.
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 13
Which ONE of the following techniques used in compiler code optimization uses live variable analysis?
Run-time function call management
Register assignment to variables
Strength reduction
Constant folding
Correct Answer : B
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 14
Consider a demand paging memory management system with 32-bit logical address, 20-bit physical address, and page size of 2048 bytes. Assuming that the memory is byte addressable, what is the maximum number of entries in the page table?
\(2^{21}\)
\(2^{20}\)
\(2^{22}\)
\(2^{24}\)
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 15
A schedule of three database transactions \(𝑇_1, 𝑇_2\), and \(𝑇_3\) is shown. \(𝑅_𝑖(𝐴)\) and \(𝑊_𝑖(𝐴)\) denote read and write of data item \(𝐴\) by transaction \(𝑇_𝑖 , 𝑖 = 1,2,3\). The transaction \(𝑇_1\) aborts at the end. Which other transaction(s) will be required to be rolled back?
\(𝑅_1 (𝑋) 𝑊_1 (𝑌) 𝑅_2 (𝑋) 𝑅_2 (𝑌) 𝑅_3 (𝑌) 𝐴𝐵𝑂𝑅𝑇(𝑇_1 )\)
Only \(𝑇_2\)
Only \(𝑇_3\)
Both \(𝑇_2\) and \(𝑇_3\)
Neither \(𝑇_2\) nor \(𝑇_3\)
Correct Answer : C
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 16
Identify the ONE CORRECT matching between the OSI layers and their corresponding functionalities as shown.
\(\begin{array}{|l|l|} \hline \textbf{OSI Layer} & \textbf{Functionality} \\ \hline (a) Network layer & (I) Packet routing \\ \hline (b) Transport layer & (II) Framing and error handling \\ \hline (c) Datalink layer & (III) Host to host communication \\ \hline \end{array} \)
\((a)-(I), (b)-(II), (c)-(III) \)
\((a)-(I), (b)-(III), (c)-(II)\)
\((a)-(II), (b)-(I), (c)-(III)\)
\((a)-(III), (b)-(II), (c)-(I)\)
Correct Answer : B
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 17
\(𝑔(. )\) is a function from \(A\) to \(𝐵, 𝑓(. )\) is a function from \(B\) to \(C\), and their composition defined as \(𝑓(𝑔(. ))\) is a mapping from \(A\) to \(C\). If \(𝑓(. )\) and \(𝑓(𝑔(. ))\) are onto (surjective) functions, which ONE of the following is TRUE about the function \(𝑔(. )\)?
\(𝑔(. )\) must be an onto (surjective) function.
\(𝑔(. )\) must be a one-to-one (injective) function.
\(𝑔(. )\) must be a bijective function, that is, both one-to-one and onto.
\(𝑔(. )\) is not required to be a one-to-one or onto function.
Correct Answer : D
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 18
Let \(G\) be any undirected graph with positive edge weights, and \(𝑇\) be a minimum spanning tree of \(G\). For any two vertices, \(𝑢\) and \(𝑣\), let \(𝑑_1(𝑢, 𝑣)\) and \(𝑑_2(𝑢, 𝑣)\) be the shortest distances between \(u\) and \(𝑣\) in \(G\) and 𝑇, respectively. Which ONE of the options is CORRECT for all possible \(𝐺, 𝑇, 𝑢\) and \(𝑣\)?
\(d_1(u, v) = d_2(u, v) \)
\(d_1(u, v) \leq d_2(u, v) \)
\(d_1(u, v) \geq d_2(u, v) \)
\(d_1(u, v) \neq d_2(u, v) \)
Correct Answer : B
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 19
Consider the following context-free grammar \(G\), where \(𝑆, 𝐴,\) and \(B\) are the variables (non-terminals), \(a\) and \(b\) are the terminal symbols, \(S\) is the start variable, and the rules of \(G\) are described as:
\(𝑆 → 𝑎𝑎𝐵 | 𝐴𝑏𝑏 \\ \\ 𝐴 → 𝑎 | 𝑎𝐴 \\ \\ 𝐵 → 𝑏 | 𝑏B \\\)
Which ONE of the languages \(𝐿(𝐺)\) is accepted by \(G\)?
\(L(G) = \{ a^{2} b^n \mid n \geq 1 \} \cup \{ a^n b^2 \mid n \geq 1 \} \)
\(L(G) = \{ a^n b^{2n} \mid n \geq 1 \} \cup \{ a^{2n} b^n \mid n \geq 1 \}\)
\(L(G) = \{ a^n b^n \mid n \geq 1 \} \)
\(L(G) = \{ a^{2n} b^{2n} \mid n \geq 1 \} \)
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 20
Consider the following recurrence relation:
\(T(n) = 2T(n - 1) + n^2 2^n, \quad \text{for } n > 0, \quad T(0) = 1. \)
Which ONE of the following options is CORRECT?
\(T(n) = \Theta(n^2 2^n) \)
\(T(n) = \Theta(n 2^n) \)
\(T(n) = \Theta((\log n)^2 2^n) \)
\(T(n) = \Theta(4^n)\)
Correct Answer : A
Question Type : MCQ
Max Marks : 1
Negative Marks : 0.33
Question : 21
Consider the following \(B^+\) tree with 5 nodes, in which a node can store at most 3 key values. The value 23 is now inserted in the \(B^+\) tree. Which of the following options(s) is/are CORRECT?
None of the nodes will split.
At least one node will split and redistribute.
The total number of nodes will remain same.
The height of the tree will increase.
Correct Answer : BD
Question Type : MSQ
Max Marks : 1
Negative Marks : 0
Question : 22
Consider the 3-way handshaking protocol for TCP connection establishment. Let the three packets exchanged during the connection establishment be denoted as P1, P2, and P3, in order. Which of the following option(s) is/are TRUE with respect to TCP header flags that are set in the packets?
P3: SYN = 1, ACK = 1
P2: SYN = 1, ACK =
P2: SYN = 0, ACK = 1
P1: SYN = 1
Correct Answer : BD
Question Type : MSQ
Max Marks : 1
Negative Marks : 0
Question : 23
Consider the given system of linear equations for variables \(x\) and \(y\), where \(k\) is a real-valued constant. Which of the following option(s) is/are CORRECT?
\(𝑥 + 𝑘𝑦 = 1 \\ 𝑘𝑥 + 𝑦 = −1\)
There is exactly one value of 𝑘 for which the above system of equations has no solution.
There exist an infinite number of values of 𝑘 for which the system of equations has no solution.
There exists exactly one value of 𝑘 for which the system of equations has exactly one solution.
There exists exactly one value of 𝑘 for which the system of equations has an infinite number of solutions.
Correct Answer : AD
Question Type : MSQ
Max Marks : 1
Negative Marks : 0
Question : 24
Let \(𝑋\) be a 3-variable Boolean function that produces output as ‘1’ when at least two of the input variables are ‘1’. Which of the following statement(s) is/are CORRECT, where \( 𝑎, 𝑏, 𝑐, 𝑑,𝑒\) are Boolean variables?
\(𝑋(𝑎, 𝑏, 𝑋(𝑐, 𝑑,𝑒)) = 𝑋(𝑋(𝑎, 𝑏, 𝑐), 𝑑,𝑒) \)
\( 𝑋(𝑎, 𝑏, 𝑋(𝑎, 𝑏, 𝑐)) = 𝑋(𝑎, 𝑏, 𝑐) \)
\( 𝑋(𝑎, 𝑏, 𝑋(𝑎, 𝑐, 𝑑)) = (𝑋(𝑎, 𝑏, 𝑎) AND 𝑋(𝑐, 𝑑, 𝑐)) \)
\(𝑋(𝑎, 𝑏, 𝑐) = 𝑋(𝑎, 𝑋(𝑎, 𝑏, 𝑐), 𝑋(𝑎, 𝑐, 𝑐))\)
Correct Answer : BD
Question Type : MSQ
Max Marks : 1
Negative Marks : 0
Question : 25
The number −6 can be represented as 1010 in 4-bit 2’s complement representation. Which of the following is/are CORRECT 2’s complement representation(s) of −6?
1000 1010 in 8-bits
1111 1010 in 8-bit
1000 0000 0000 1010 in 16-bits
1111 1111 1111 1010 in 16-bits
Correct Answer : BD
Question Type : MSQ
Max Marks : 1
Negative Marks : 0
Question : 26
Which of the following statement(s) is/are TRUE for any binary search tree (BST) having 𝑛 distinct integers?
The maximum length of a path from the root node to any other node is \((𝑛 − 1)\).
An inorder traversal will always produce a sorted sequence of elements
Finding an element takes \(𝑂(log_2 𝑛)\) time in the worst case.
Every BST is also a Min-Heap.
Correct Answer : AB
Question Type : MSQ
Max Marks : 1
Negative Marks : 0
Question : 27
A partial data path of a processor is given in the figure, where RA, RB, and RZ are 32-bit registers. Which option(s) is/are CORRECT related to arithmetic operations using the data path as shown?
The data path can implement arithmetic operations involving two registers.
The data path can implement arithmetic operations involving one register and one immediate value.
The data path can implement arithmetic operations involving two immediate values.
The data path can only implement arithmetic operations involving one register and one immediate value.
Correct Answer : ABC
Question Type : MSQ
Max Marks : 1
Negative Marks : 0
Question : 28
A regular language \(L\) is accepted by a non-deterministic finite automaton (NFA) with \(n\) states. Which of the following statement(s) is/are FALSE?
\(L\) may have an accepting NFA with \(< n\) states
\(L\) may have an accepting DFA with \(< n\) states.
There exists a DFA with \(≤ 2^n\) states that accepts \(L\).
Every DFA that accepts \(L\) has \(> 2^n\) states.
Correct Answer : D
Question Type : MSQ
Max Marks : 1
Negative Marks : 0
Question : 29
Suppose in a multiprogramming environment, the following C program segment is executed. A process goes into I/O queue whenever an I/O related operation is performed. Assume that there will always be a context switch whenever a process requests for an I/O, and also whenever the process returns from an I/O. The number of times the process will enter the ready queue during its lifetime (not counting the time the process enters the ready queue when it is run initially) is _______. (Answer in integer)
\( \begin{aligned} &\text{#include <stdio.h>} \\ &\text{int main()} \\ &\text{\{} \\ &\quad \text{int x = 0, i = 0;} \\ &\quad \text{scanf("%d", &x);} \\ &\quad \text{for(i = 0; i < 20; i++)} \\ &\quad \text{\{} \\ &\quad\quad \text{x = x + 20;} \\ &\quad\quad \text{printf("%d\n", x);} \\ &\quad \text{\}} \\ &\quad \text{return 0;} \\ &\text{\}} \\ \end{aligned} \)
Correct Answer : 21
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 30
Let 𝑆 be the set of all ternary strings defined over the alphabet \(\{𝑎, 𝑏, 𝑐\}\). Consider all strings in \(S\) that contain at least one occurrence of two consecutive symbols, that is, “aa”, “bb” or “cc”. The number of such strings of length 5 that are possible is _______. (Answer in integer)
Correct Answer : 195
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 31
Consider the given function \(𝑓(𝑥)\).
\(f(x) = \begin{cases} ax + b, & \text{for } x < 1 \\ x^3 + x^2 + 1, & \text{for } x \geq 1 \end{cases} \)
If the function is differentiable everywhere, the value of 𝑏 must be ________. (rounded off to one decimal place)
Correct Answer : -1.9 to -2.1
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 32
A box contains 5 coins: 4 regular coins and 1 fake coin. When a regular coin is tossed, the probability 𝑃(ℎ𝑒𝑎𝑑) = 0.5 and for a fake coin, 𝑃(ℎ𝑒𝑎𝑑) = 1. You pick a coin at random and toss it twice, and get two heads. The probability that the coin you have chosen is the fake coin is _______. (rounded off to two decimal places)
Correct Answer : 0.49 to 0.51
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 33
The pseudocode of a function \(fun()\) is given below:
\(\begin{aligned} &\text{fun(int A[0, ... , n-1])} \\ &\text{\{} \\ &\quad \text{for } i = 0 \text{ to } n-2 \\ &\quad \quad \text{for } j = 0 \text{ to } n-i-2 \\ &\quad \quad \quad \text{if } (A[j] > A[j+1]) \\ &\quad \quad \quad \quad \text{then swap A[j] and A[j+1]} \\ &\text{\}} \end{aligned} \)
Let \(𝐴[0, … ,29]\) be an array storing 30 distinct integers in descending order. The number of swap operations that will be performed, if the function \(fun()\) is called with \(𝐴[0, … ,29]\) as argument, is __________. (Answer in integer)
Correct Answer : 435
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 34
\(\begin{aligned} &\text{#include <stdio.h>} \\ &\text{void foo(int *p, int x)\{} \\ &\quad *p = x; \\ &\text{\}} \\ &\text{int main()\{} \\ &\quad \text{int *z;} \\ &\quad \text{int a = 20, b = 25;} \\ &\quad \text{z = &a;} \\ &\quad \text{foo(z, b);} \\ &\quad \text{printf("%d", a);} \\ &\quad \text{return 0;} \\ &\text{\}} \end{aligned} \)
The output of the given C program is __________. (Answer in integer)
Correct Answer : 25
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 35
The height of any rooted tree is defined as the maximum number of edges in the path from the root node to any leaf node.
Suppose a Min-Heap 𝑇 stores 32 keys. The height of 𝑇 is _____________. (Answer in integer)
Correct Answer : 5
Question Type : NAT
Max Marks : 1
Negative Marks : 0
Question : 36
Consider a memory system with 1M bytes of main memory and 16K bytes of cache memory. Assume that the processor generates 20-bit memory address, and the cache block size is 16 bytes. If the cache uses direct mapping, how many bits will be required to store all the tag values? [Assume memory is byte addressable, 1K=210 , 1M=220 .]
6 × 210
8 × 210
212
214
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 37
A processor has 64 general-purpose registers and 50 distinct instruction types. An instruction is encoded in 32-bits. What is the maximum number of bits that can be used to store the immediate operand for the given instruction?
ADD R1, #25 // R1 = R1 + 25
16
20
22
24
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 38
A computer has two processors, \(𝑀_1\) and \(𝑀_2\). Four processes \(𝑃_1, 𝑃_2, 𝑃_3, 𝑃_4\) with CPU bursts of 20, 16, 25, and 10 milliseconds, respectively, arrive at the same time and these are the only processes in the system. The scheduler uses non-preemptive priority scheduling, with priorities decided as follows:
• \(𝑀_1\) uses priority of execution for the processes as, \(𝑃_1 > 𝑃_3 > 𝑃_2 > 𝑃_4\), i.e., \(P_1\) and \(P_4\) have highest and lowest priorities, respectively.
• \(𝑀_2\) uses priority of execution for the processes as, \(𝑃_2 > 𝑃_3 > 𝑃_4 > 𝑃_1\), i.e., \(P_2\) and \(P_1\) have highest and lowest priorities, respectively.
A process \(𝑃_𝑖\) is scheduled to a processor \(𝑀_𝑘\), if the processor is free and no other process \(𝑃_𝑗\) is waiting with higher priority. At any given point of time, a process can be allocated to any one of the free processors without violating the execution priority rules. Ignore the context switch time. What will be the average waiting time of the processes in milliseconds?
9.00
8.75
6.50
7.50
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 39
Consider two relations describing \(𝑡𝑒𝑎𝑚𝑠 \) and \(𝑝𝑙𝑎𝑦𝑒𝑟𝑠 \) in a sports league:
• \(𝑡𝑒𝑎𝑚𝑠(𝑡𝑖𝑑,𝑡𝑛𝑎𝑚𝑒): 𝑡𝑖𝑑, 𝑡𝑛𝑎𝑚e\) are team-id and team-name, respectively
• \(𝑝𝑙𝑎𝑦𝑒𝑟𝑠(𝑝𝑖𝑑, 𝑝𝑛𝑎𝑚𝑒,𝑡𝑖𝑑): 𝑝𝑖𝑑, 𝑝𝑛𝑎𝑚𝑒\), and \(𝑡𝑖𝑑\) denote player-id, playername and the team-id of the player, respectively
Which ONE of the following tuple relational calculus queries returns the name of the players who play for the team having 𝑡𝑛𝑎𝑚𝑒 as ′\(𝑀𝐼\)′?
\({ 𝑝. 𝑝𝑛𝑎𝑚𝑒 | 𝑝 ∈ 𝑝𝑙𝑎𝑦𝑒𝑟𝑠 ∧ ∃𝑡 (𝑡 ∈ 𝑡𝑒𝑎𝑚𝑠 ∧ 𝑝.𝑡𝑖𝑑 = 𝑡.𝑡𝑖𝑑 ∧ 𝑡.𝑡𝑛𝑎𝑚𝑒 = ′𝑀𝐼′)}\)
\({ 𝑝. 𝑝𝑛𝑎𝑚𝑒 | 𝑝 ∈ 𝑡𝑒𝑎𝑚𝑠 ∧ ∃𝑡 (𝑡 ∈ 𝑝𝑙𝑎𝑦𝑒𝑟𝑠 ∧ 𝑝.𝑡𝑖𝑑 = 𝑡.𝑡𝑖𝑑 ∧ 𝑡.𝑡𝑛𝑎𝑚𝑒 = ′𝑀𝐼′)}\)
\({ 𝑝. 𝑝𝑛𝑎𝑚𝑒 | 𝑝 ∈ 𝑝𝑙𝑎𝑦𝑒𝑟𝑠 ∧ ∃𝑡 (𝑡 ∈ 𝑡𝑒𝑎𝑚𝑠 ∧ 𝑡.𝑡𝑛𝑎𝑚𝑒 = ′𝑀𝐼′)}\)
\({ 𝑝. 𝑝𝑛𝑎𝑚𝑒 | 𝑝 ∈ 𝑡𝑒𝑎𝑚𝑠 ∧ ∃𝑡 (𝑡 ∈ 𝑝𝑙𝑎𝑦𝑒𝑟𝑠 ∧ 𝑡.𝑡𝑛𝑎𝑚𝑒 = ′𝑀𝐼′)}\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 40
A packet with the destination IP address 145.36.109.70 arrives at a router whose routing table is shown. Which interface will the packet be forwarded to?
E3
E1
E2
E5
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 41
Let \(A\) be a 2 × 2 matrix as given.
\(A = \begin{bmatrix} 1 & 1 \\ 1 & -1 \end{bmatrix} \)
What are the eigenvalues of the matrix \(𝐴^{13}\) ?
\(1, −1\)
\(2\sqrt{2}, \quad -2\sqrt{2} \)
\(4\sqrt{2}, \quad -4\sqrt{2} \)
\(64\sqrt{2}, \quad -64\sqrt{2} \)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 42
Consider the following four variable Boolean function in sum-of-product form
\(𝐹(𝑏_3, 𝑏_2, 𝑏_1, 𝑏_0) = ∑(0, 2, 4, 8, 10, 11, 12).\)
where the value of the function is computed by considering \(𝑏_3𝑏_2𝑏_1𝑏_0\) as a 4-bit binary number, where \(𝑏_3\) denotes the most significant bit and \(𝑏_0\) denotes the least significant bit. Note that there are no don’t care terms. Which ONE of the following options is the CORRECT minimized Boolean expression for \(F\)?
\(\bar{b}_1 \bar{b}_0 + \bar{b}_2 \bar{b}_0 + b_1 \bar{b}_2 b_3 \)
\(\bar{b}_1 \bar{b}_0 + \bar{b}_2 \bar{b}_0 \)
\(\bar{b}_2 \bar{b}_0 + b_1 b_2 b_3 \)
\(\bar{b}_0 \bar{b}_2 + \bar{b}_3\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 43
Let \(𝐺(𝑉, 𝐸)\) be an undirected and unweighted graph with 100 vertices. Let \(𝑑(𝑢, 𝑣)\) denote the number of edges in a shortest path between vertices \(u\) and \(v\) in \(V\). Let the maximum value of \(𝑑(𝑢, 𝑣), 𝑢, 𝑣 ∈ 𝑉\) such that \(𝑢 ≠ 𝑣\), be 30. Let \(T\) be any breadthfirst-search tree of \(G\). Which ONE of the given options is CORRECT for every such graph \(G\) ?
The height of \(T\) is exactly 15.
The height of \(T\) is exactly 30.
The height of \(T\) is at least 15.
The height of \(T\) is at least 30.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 44
Consider the following two languages over the alphabet \(\{𝑎, 𝑏\}\):
\( L_1 = \{ \alpha \beta \alpha \mid \alpha \in \{a, b\}^+ \text{ AND } \beta \in \{a, b\}^+ \} \\ L_2 = \{ \alpha \beta \alpha \mid \alpha \in \{a\}^+ \text{ AND } \beta \in \{a, b\}^+ \} \)
Which ONE of the following statements is CORRECT ?
Both \(L_1\) and \(L_2\) are regular languages.
\(L_1\) is a regular language but \(L_2\) is not a regular language.
\(L_1\) is not a regular language but \(L_2\) is a regular language.
Neither \(L_1\) nor \(L_2\) is a regular language.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 45
Consider the following two languages over the alphabet \(\{𝑎, 𝑏, 𝑐\}\), where 𝑚 and 𝑛 are natural numbers.
\( L_1 = \{ a^m b^m c^{m+n} \mid m, n \geq 1 \} \\ L_2 = \{ a^m b^n c^{m+n} \mid m, n \geq 1 \} \)
Which ONE of the following statements is CORRECT?
Both \(𝐿_1\) and \(𝐿_2\) are context-free languages.
\(𝐿_1\) is a context-free language but \(𝐿_2\) is not a context-free language.
\(𝐿_1\) is not a context-free language but \(𝐿_2\) is a context-free language.
Neither \(𝐿_1\) nor \(𝐿_2\) are context-free languages.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0.67
Question : 46
Which of the following statement(s) is/are TRUE while computing \(First \) and \(Follow \) during top down parsing by a compiler?
For a production \( 𝐴 → 𝜖, 𝜖\) will be added to \(𝐹𝑖𝑟𝑠𝑡(𝐴)\).
If there is any input right end marker, it will be added to \(𝐹𝑖𝑟𝑠𝑡(𝑆)\), where \(S\) is the start symbol.
For a production \(𝐴 → 𝜖, 𝜖\) will be added to \(𝐹𝑜𝑙𝑙𝑜𝑤(𝐴)\).
If there is any input right end marker, it will be added to \(𝐹𝑜𝑙𝑙𝑜𝑤(𝑆)\), where \(S\) is the start symbol.
Correct Answer : AD
Question Type : MSQ
Max Marks : 2
Negative Marks : 0
Question : 47
Consider a relational schema \(𝑡𝑒𝑎𝑚(𝑛𝑎𝑚𝑒, 𝑐𝑖𝑡𝑦, 𝑜𝑤𝑛𝑒𝑟)\), with functional dependencies \(\{𝑛𝑎𝑚𝑒 → 𝑐𝑖𝑡𝑦, 𝑛𝑎𝑚𝑒 → 𝑜𝑤𝑛𝑒𝑟\}\).
The relation \(𝑡𝑒𝑎𝑚\) is decomposed into two relations, \(𝑡1(𝑛𝑎𝑚𝑒, 𝑐𝑖𝑡𝑦)\) and \(𝑡2(𝑛𝑎𝑚𝑒, 𝑜𝑤𝑛𝑒𝑟)\). Which of the following statement(s) is/are TRUE?
The relation \(𝑡𝑒𝑎𝑚\) is NOT in BCNF.
The relations \(t1\) and \(t2\) are in BCNF.
The decomposition constitutes a lossless join.
The relation \(𝑡𝑒𝑎𝑚 \) is NOT in 3NF.
Correct Answer : BC
Question Type : MSQ
Max Marks : 2
Negative Marks : 0
Question : 48
Which of the following predicate logic formulae/formula is/are CORRECT representation(s) of the statement: “Everyone has exactly one mother”?
The meanings of the predicates used are:
• \(𝑚𝑜𝑡ℎ𝑒𝑟(𝑦, 𝑥): 𝑦\) is the mother of \(x\)
• \(𝑛𝑜𝑡𝑒𝑞(𝑥, 𝑦): 𝑥\) and \(y\) are not equal
\(∀𝑥∃𝑦∃𝑧(𝑚𝑜𝑡ℎ𝑒𝑟(𝑦, 𝑥) ∧ ¬𝑚𝑜𝑡ℎ𝑒𝑟(𝑧, 𝑥)) \)
\( ∀𝑥∃𝑦[𝑚𝑜𝑡ℎ𝑒𝑟(𝑦, 𝑥) ∧ ∀𝑧(𝑛𝑜𝑡𝑒𝑞(𝑧, 𝑦) → ¬𝑚𝑜𝑡ℎ𝑒𝑟(𝑧, 𝑥))] \)
\( ∀𝑥∀𝑦[𝑚𝑜𝑡ℎ𝑒𝑟(𝑦, 𝑥) → ∃𝑧(𝑚𝑜𝑡ℎ𝑒𝑟(𝑧, 𝑥) ∧ ¬𝑛𝑜𝑡𝑒𝑞(𝑧, 𝑦))] \)
\(∀𝑥∃𝑦[𝑚𝑜𝑡ℎ𝑒𝑟(𝑦, 𝑥) ∧ ¬∃𝑧(𝑛𝑜𝑡𝑒𝑞(𝑧, 𝑦) ∧ 𝑚𝑜𝑡ℎ𝑒𝑟(𝑧, 𝑥))]\)
Correct Answer : BD
Question Type : MSQ
Max Marks : 2
Negative Marks : 0
Question : 49
\(𝐴 = \{0, 1, 2, 3, … \}\) is the set of non-negative integers. Let \(F\) be the set of functions from \(A\) to itself. For any two functions, \(𝑓_1, 𝑓_2 ∈ Ϝ\), we define
\((𝑓_1⨀𝑓_2)(𝑛) = 𝑓_1(𝑛) + 𝑓_2(𝑛)\)
for every number \(n\) in \(A\). Which of the following is/are CORRECT about the mathematical structure \((Ϝ, ⨀)\)?
\((Ϝ, ⨀)\) is an Abelian group.
\((Ϝ, ⨀)\) is an Abelian monoid.
\((Ϝ, ⨀)\) is a non-Abelian group.
\((Ϝ, ⨀)\) is a non-Abelian monoid.
Correct Answer : B
Question Type : MSQ
Max Marks : 2
Negative Marks : 0
Question : 50
Consider the following deterministic finite automaton (DFA) defined over the alphabet, \(Σ = \{𝑎, 𝑏\}\). Identify which of the following language(s) is/are accepted by the given DFA.
The set of all strings containing an even number of \(𝑏\)’s.
The set of all strings containing the pattern \(𝑏𝑎𝑏\).
The set of all strings ending with the pattern \(𝑏𝑎𝑏\).
The set of all strings not containing the pattern \(𝑎𝑏𝑎\).
Correct Answer : C
Question Type : MSQ
Max Marks : 2
Negative Marks : 0
Question : 51
A disk of size 512M bytes is divided into blocks of 64K bytes. A file is stored in the disk using linked allocation. In linked allocation, each data block reserves 4 bytes to store the pointer to the next data block. The link part of the last data block contains a NULL pointer (also of 4 bytes). Suppose a file of 1M bytes needs to be stored in the disk. Assume, 1K = 210 and 1M = 220 . The amount of space in bytes that will be wasted due to internal fragmentation is ______. (Answer in integer)
Correct Answer : 65468
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 52
Refer to the given 3-address code sequence. This code sequence is split into basic blocks. The number of basic blocks is ________. (Answer in integer)
\(\begin{aligned} &1001: \quad i = 1 \\ &1002: \quad j = 1 \\ &1003: \quad t1 = 10 \cdot i \\ &1004: \quad t2 = t1 + j \\ &1005: \quad t3 = 8 \cdot t2 \\ &1006: \quad t4 = t3 - 88 \\ &1007: \quad a[t4] = 0.0 \\ &1008: \quad j = j + 1 \\ &1009: \quad \text{if } j \leq 10 \text{ goto } 1003 \\ &1010: \quad i = i + 1 \\ &1011: \quad \text{if } i \leq 10 \text{ goto } 1002 \\ &1012: \quad i = 1 \\ &1013: \quad t5 = i - 1 \\ &1014: \quad t6 = 88 \cdot t5 \\ &1015: \quad a[t6] = 1.0 \\ &1016: \quad i = i + 1 \\ &1017: \quad \text{if } i \leq 10 \text{ goto } 1013 \end{aligned} \)
Correct Answer : 6
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 53
A computer has a memory hierarchy consisting of two-level cache (L1 and L2) and a main memory. If the processor needs to access data from memory, it first looks into L1 cache. If the data is not found in L1 cache, it goes to L2 cache. If it fails to get the data from L2 cache, it goes to main memory, where the data is definitely available. Hit rates and access times of various memory units are shown in the figure. The average memory access time in nanoseconds (ns) is ________. (rounded off to two decimal places)
Correct Answer : 11.83 to 11.87
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 54
In optimal page replacement algorithm, information about all future page references is available to the operating system (OS). A modification of the optimal page replacement algorithm is as follows:
The OS correctly predicts only up to next 4 page references (including the current page) at the time of allocating a frame to a page.
A process accesses the pages in the following order of page numbers:
1, 3, 2, 4, 2, 3, 1, 2, 4, 3, 1, 4.
If the system has three memory frames that are initially empty, the number of page faults that will occur during execution of the process is ________ . (Answer in integer)
Correct Answer : 6
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 55
Consider the following database tables of a sports league.
\( \begin{array}{l l} \textbf{player}(\text{pid}, \text{pname}, \text{age}) & \textbf{team}(\text{tid}, \text{tname}, \text{city}, \text{cid}) \\ \textbf{coach}(\text{cid}, \text{cname}) & \textbf{members}(\text{pid}, \text{tid}) \end{array} \)
An instance of the table and an SQL query are given.
\(\begin{aligned} &\text{SELECT } \text{MIN}(P.\text{age}) \\ &\text{FROM } \textbf{player} \ P \\ &\text{WHERE } P.\text{pid} \text{ IN } ( \\ &\quad \text{SELECT } M.\text{pid} \\ &\quad \text{FROM } \textbf{team} \ T, \textbf{coach} \ C, \textbf{members} \ M \\ &\quad \text{WHERE } C.\text{cname} = 'Mark' \\ &\quad \text{AND } T.\text{cid} = C.\text{cid} \\ &\quad \text{AND } M.\text{tid} = T.\text{tid} \ ) \end{aligned} \)
The value returned by the given SQL query is ______ . (Answer in integer)
Correct Answer : 26
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 56
Suppose a 5-bit message is transmitted from a source to a destination through a noisy channel. The probability that a bit of the message gets flipped during transmission is 0.01. Flipping of each bit is independent of one another. The probability that the message is delivered error-free to the destination is ______ . (rounded off to three decimal places)
Correct Answer : 0.949 to 0.952
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 57
Suppose a message of size 15000 bytes is transmitted from a source to a destination using IPv4 protocol via two routers as shown in the figure. Each router has a defined maximum transmission unit (MTU) as shown in the figure, including IP header. The number of fragments that will be delivered to the destination is ________ . (Answer in integer)
Correct Answer : 7
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 58
Consider a probability distribution given by the density function \(𝑃(𝑥)\).
\(P(x) = \begin{cases} Cx^2, & \text{for } 1 \leq x \leq 4 \\ 0, & \text{for } x < 1 \text{ or } x > 4 \end{cases} \)
The probability that \(x\) lies between 2 and 3, i.e., \(𝑃(2 ≤ 𝑥 ≤ 3)\) is __________. (rounded off to three decimal places)
Correct Answer : 0.300 to 0.302
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 59
Consider a finite state machine (FSM) with one input \(X\) and one output \(𝑓\), represented by the given state transition table. The minimum number of states required to realize this FSM is ________. (Answer in integer)
Correct Answer : 5
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 60
Consider the given sequential circuit designed using D-Flip-flops. The circuit is initialized with some value (initial state). The number of distinct states the circuit will go through before returning back to the initial state is _________ . (Answer in integer)
Correct Answer : 7 or 8
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 61
\(\begin{array}{l} \text{#include <stdio.h>} \\ \text{int foo(int S[], int size) \{} \\ \quad \text{if(size == 0) return 0;} \\ \quad \text{if(size == 1) return 1;} \\ \quad \text{if(S[0] != S[1]) return 1+foo(S+1, size-1);} \\ \quad \text{return foo(S+1, size-1);} \\ \text{\}} \\[5pt] \text{int main() \{} \\ \quad \text{int A[]={0,1,2,2,2,0,0,1,1};} \\ \quad \text{printf("\%d", foo(A,9));} \\ \quad \text{return 0;} \\ \text{\}} \end{array} \)
The value printed by the given C program is _______ . (Answer in integer)
Correct Answer : 5
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 62
Let \(LIST \) be a datatype for an implementation of linked list defined as follows:
\(\begin{array}{l} \text{typedef struct list \{} \\ \quad \text{int data;} \\ \quad \text{struct list *next;} \\ \text{\} LIST;} \end{array} \)
Suppose a program has created two linked lists, L1 and L2, whose contents are given in the figure below (code for creating L1 and L2 is not provided here). L1 contains 9 nodes, and L2 contains 7 nodes. Consider the following C program segment that modifies the list L1. The number of nodes that will be there in L1 after the execution of the code segment is ________ . (Answer in integer)
\(\begin{array}{l} \text{int find (int query, LIST *list) \{} \\ \quad \text{while (list != NULL) \{} \\ \quad\quad \text{if (list->data == query) return 1;} \\ \quad\quad \text{list = list->next;} \\ \quad \text{\}} \\ \quad \text{return 0;} \\ \text{\}} \\[10pt] \text{int main () \{} \\ \quad \text{... ... ...} \\ \quad \text{ptr1 = L1; ptr2 = L2;} \\ \quad \text{while (ptr1->next != NULL) \{} \\ \quad\quad \text{query = ptr1->next->data;} \\ \quad\quad \text{if (find (query, L2))} \\ \quad\quad\quad \text{ptr1->next = ptr1->next->next;} \\ \quad\quad \text{else ptr1 = ptr1->next;} \\ \quad \text{\}} \\ \quad \text{... ... ...} \\ \quad \text{return 0;} \\ \text{\}} \end{array} \)
Correct Answer : 5
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 63
Consider the following C program:
\(\begin{array}{l} \text{#include <stdio.h>} \\[5pt] \text{int gate (int n) \{} \\ \quad \text{int d, t, newnum, turn;} \\ \quad \text{newnum = turn = 0; t = 1;} \\ \quad \text{while (n >= t) t *= 10;} \\ \quad \text{t /= 10;} \\ \quad \text{while (t > 0) \{} \\ \quad\quad \text{d = n / t;} \\ \quad\quad \text{n = n % t;} \\ \quad\quad \text{t /= 10;} \\ \quad\quad \text{if (turn) newnum = 10 * newnum + d;} \\ \quad\quad \text{turn = (turn + 1) % 2;} \\ \quad \text{\}} \\ \quad \text{return newnum;} \\ \text{\}} \\[10pt] \text{int main () \{} \\ \quad \text{printf ("%d", gate(14362));} \\ \quad \text{return 0;} \\ \text{\}} \end{array} \)
The value printed by the given C program is _______ . (Answer in integer)
Correct Answer : 46
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 64
The maximum value of 𝑥 such that the edge between the nodes B and C is included in every minimum spanning tree of the given graph is _________ . (answer in integer)
Correct Answer : 5
Question Type : NAT
Max Marks : 2
Negative Marks : 0
Question : 65
In a double hashing scheme, \(ℎ_1 (𝑘) = 𝑘 \ mod \ 11\) and \(ℎ_2 (𝑘) = 1 + (𝑘 \ mod \ 7)\) are the auxiliary hash functions. The size \(m\) of the hash table is 11. The hash function for the \(i\)-th probe in the open address table is \([ℎ_1 (𝑘) + 𝑖 \ ℎ_2(𝑘)] \ mod \ 𝑚\). The following keys are inserted in the given order: 63, 50, 25, 79, 67, 24.
The slot at which key 24 gets stored is ___________. (Answer in integer)
Correct Answer : 10
Question Type : NAT
Max Marks : 2
Negative Marks : 0