Question : 1
Which of the statements given below is/are correct?
It is always important and useful to include an 'alt' attribute on 'img' tag in HTML because
A. users who cannot see the image due to vision impairment can have a textual description of the image (which can be spoken aloud by a screenreader).
B. If the image fails to load (slow connection, broken path, etc.) then alt text is displayed instead.
C. SEO (Search Engine Optimization) benefits.
Choose the correct answer from the options given below:
A only
B and C only
C only
A, B, and C
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 2
What does the following function f() in 'C' return?
int f(unsigned int N) {
unsigned int counter = 0;
while(N > 0) {
counter += N & 1; N = N >> 1;
}
return counter == 1;
}
1 if N is odd, otherwise 0
1 if N is a power of 2, otherwise 0
1 if the binary representation of N is all 1's, otherwise 0
1 if the binary representation of N has any 1's, otherwise 0
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 3
Consider the following recursive function F() in Java that takes an integer value and returns a string value:
public static String F( int N) {
if ( N <= 0) return "‐";
return F(N ‐ 3) + N + F(N ‐ 2) + N;
}
The value of F(5) is:
‐2‐25‐3‐135
‐2‐25‐1‐3‐135
‐1‐145‐2‐245
‐2‐25‐3‐1‐135
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 4
Match List I with List II
\(\begin{array}{|c|l|c|l|l|} \hline \text{List I} & \text{List II} \\ \hline \text{(Programming Term)} & \text{(Meaning)} \\ \hline \text{A. JNDI} & \text{I. Runtime support for running Java programs} \\ \hline \text{B. RMI } & \text{II. The API in support of naming and directory services} \\ \hline \text{C. JDK} & \text{III. The methods provided by the Java development kit and runtime support for calling remote methods} \\ \hline \text{(D. JRE)} & \text{IV. The compiler and class libraries to develop Java applications} \\ \hline \end{array}\)
Choose the correct answer from the options given below:
A ‐ II , B ‐ III, C ‐ IV, D ‐ I
A ‐ II, B ‐ IV, C ‐ III, D ‐ I
A ‐ I, B ‐ III, C ‐ IV, D ‐ II
A ‐ III, B ‐ II, C ‐ IV, D ‐ I
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 5
Match List I with List II
\(\begin{array}{|c|l|c|l|l|} \hline \text{List I} & \text{List II} \\ \hline \text{(Programming Paradigm)} & \text{(Characteristic)} \\ \hline \text{A. Imperative} & \text{I. Declarative, clausal representation, theorem proving} \\ \hline \text{B. Object‐oriented} & \text{II. Side‐effect free, declarative, expression evaluation} \\ \hline \text{C. Logic} & \text{III. Imperative, abstract data type} \\ \hline \text{D. Functional)} & \text{IV. Command‐based, procedural} \\ \hline \end{array}\)
Choose the correct answer from the options given below:
A ‐ IV, B ‐ III, C ‐ I, D ‐ II
A ‐ III, B ‐ IV, C ‐ I, D ‐ II
A ‐ IV, B ‐ III, C ‐ II, D ‐ I
A ‐ II, B ‐ III, C ‐ I, D ‐ IV
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 6
Suppose you have eight 'black and white' images taken with a 1‐megapixel camera and one '8‐color' image taken by an 8‐megapixel camera. How much hard disk space in total do you need to store these images on your computer?
1 GB
4 MB
3 MB
3 GB
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 7
Which of the statements given below are correct?
The midpoint (or Bresenham) algorithm for rasterizing lines is optimized relative to DDA algorithm in that
A. it avoids round‐off operations.
B. it is incremental.
C. it uses only integer arithmetic.
D. all straight lines can be displayed as straight (exact).
Choose the correct answer from the options given below:
A and B only
A and C only
A, B, C, and D
A, B, and C only
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 8
What is the transformation matrix M that transforms a square in the xy plane defined by \((1, 1)^T, (-1, 1)^T, (-1, -1)^T and \ (1, -1)^T\) to a parallelogram whose corresponding vertices are \( (2, 1)^T, (0,1)^T, (-2, -1)^T and \ (0, -1)^T \)?
\(M = \begin{bmatrix} 1 & 1 & 0 \\ 0 & 1 & 0 \\ 0 & 0 & 1 \end{bmatrix} \)
\(M = \begin{bmatrix} 1 & 0 & 0 \\ 1 & 1 & 0 \\ 0 & 0 & 1 \end{bmatrix} \)
\(M = \begin{bmatrix} 1 & 1 & 1 \\ 0 & 1 & 0 \\ 0 & 0 & 1 \end{bmatrix} \)
\(M = \begin{bmatrix} 1 & 1 & 0 \\ 1 & 1 & 0 \\ 0 & 0 & 1 \end{bmatrix} \)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 9
Suppose a Bezier curve P(t) is defined by the following four control points in the xy - plane : \(P_0 = (-2,0); P_1 = (-2,4); P_2 = (2,4); \) and \(P_3 = (2,0)\). Then which of the following statements are correct ?
A. Bezier curve P(t) has degree 3.
B. \(P(\frac 1 2) = (0,3)\).
C. Bezier curve P(t) may extend outside the convex hull of its control points.
Choose the correct answer from the options given below :
A and B only
A and C only
B and C only
A, B, and C
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 10
Given below are two statements Statement
I: The maximum number of sides that a triangle might have when clipped to a rectangular viewport is 6. Statement
II: In 3D graphics, the perspective transformation is nonlinear in z.
In light of the above statements, choose the correct answer from the options given below
Both Statement I and Statement II are true
Both Statement I and Statement II are false
Statement I is true but Statement II is false
Statement I is false but Statement II is true
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 11
In software testing, beta testing is the testing performed by _______________.
potential customers at the developer's location
potential customers at their own locations
product developers at the customer's location
product developers at their own locations
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 12
The V components in MVC are responsible for:
User interface.
Security of the system.
Business logic and domain objects.
Translating between user interface actions/events and operations on the domain objects.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 13
In software engineering, what kind of notation do formal methods predominantly use?
textual
diagrammatic
mathematical
computer code
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 14
If every requirement stated in the Software Requirement Specification (SRS) has only one interpretation, then SRS is said to be
correct
consistent
unambiguous
verifiable
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 15
A system has 99.99% uptime and has a mean‐time‐between‐failure of 1 day. How fast does the system has to repair itself in order to reach this availability goal?
- 9 Seconds
-10 Seconds
-11 Seconds
-12 Seconds
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 16
In the context of Software Configuration Management (SCM), what kind of files should be committed to your source control repository?
A. Code files
B. Documentation files
C. Output files
D. Automatically generated files that are required for your system to be used
Choose the correct answer from the options given below:
A and B only
B and C only
C and D only
D and A only
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 17
Match List I with List II
\(\begin{array}{|c|l|c|l|l|} \hline \text{List I} & \text{List II} \\ \hline \text{(Software Process Model)} & \text{(Decsription)} \\ \hline \text{A. Waterfall Model} & \text{I. Software can be developed incrementally} \\ \hline \text{B. Evolutionary Model} & \text{II. Requirement compromises are inevitable} \\ \hline \text{C. Component‐based Software Engineeering} & \text{III. Explicit recognition of risk} \\ \hline \text{(D. Spiral Development)} & \text{IV. Inflexible partitioning of the project into stages} \\ \hline \end{array}\)
Choose the correct answer from the options given below:
A ‐ IV, B ‐ I, C ‐ III, D ‐ II
A ‐ I, B ‐ IV, C ‐ II, D ‐ III
A ‐ II, B ‐ III, C ‐ I, D ‐ IV
A ‐ IV, B ‐ I, C ‐ II, D ‐ III
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 18
Identify the correct order of the following five levels of Capability Maturity Model (from lower to higher) to measure the maturity of an organisation's software process.
A. Defined
B. Optimizing
C. Initial
D. Managed
E. Repeatable
Choose the correct answer from the options given below
C, A, E, D, B
C, E, A, B, D
C, B, D, E, A
C, E, A, D, B
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 19
Given below are two statements Statement
I: Cleanroom software process model incorporates the statistical quality certification of code increments as they accumulate into a system. Statement
II: Cleanroom software engineering follows the classic analysis, design, code, test, and debug cycle to software development and focussing on defect removal rather than defect prevention.
In light of the above statements, choose the correct answer from the options given below
Both Statement I and Statement II are true
Both Statement I and Statement II are false
Statement I is true but Statement II is false
Statement I is false but Statement II is true
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 20
Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R
Assertion A : Software developers donot do exhaustive software testing in practice.
Reason R : Even for small inputs, exhaustive testing is too computationally intensive (e.g., takes too long) to run all the tests.
In light of the above statements, choose the correct answer from the options given below
Both A and R are true and R is the correct explanation of A
Both A and R are true but R is NOT the correct explanation of A
A is true but R is false
A is false but R is true
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 21
Which of the following are logically equivalent ?
A. \(\neg p \rightarrow (q \rightarrow r) \ and \ q \rightarrow (p \lor r) \)
B. \(( p \rightarrow q ) \rightarrow r \ and \ p \rightarrow ( q \rightarrow r ) \)
C. \(( p \rightarrow q ) \rightarrow ( r \rightarrow s ) \ and \ ( p \rightarrow r ) \rightarrow ( q \rightarrow s ) \)
Choose the correct answer from the options given :
A only
A and B only
B and C only
A and C only
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 22
Which of these statements about the floor and ceiling functions are correct ?
Statement I : \(\lfloor 2x \rfloor = \lfloor x \rfloor + \lfloor x + (1/2) \rfloor \) for all real numbers x.
Statement II : \(\lceil x + y \rceil = \lceil x \rceil + \lceil y \rceil \) for all real numbers \(x\) and \(y\).
Both Statement I and Statement II are true
Both Statement I and Statement II are false
Statement I is true but Statement II is false
Statement I is false but Statement II is true
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 23
How many ways are there to assign 5 different jobs to 4 different employees if every employee is assigned at least 1 job?
1024
625
240
20
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 24
A company stores products in a warehouse. Storage bins in this warehouse are specified by their aisle, location in the aisle, and self. There are 50 aisles, 85 horizontal locations in each aisle, and 5 shelves throughout the warehouse. What is the least number of products the company can have so that at least two products must be stored in the same bin?
251
426
4251
21251
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 25
Let us assume a person climbing the stairs can take one stair or two stairs at a time. How many ways can this person climb a flight of eight stairs?
21
24
31
34
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 26
For which value of n is Wheel graph Wn regular?
2
3
4
5
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 27
Which of the following Graph is(are) planar?
A and B only
B and C only
A only
B only
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 28
Match List I with List II
\(\begin{array}{|c|l|c|l|l|} \hline \text{List I} & \text{List II} \\ \hline \text{Identity} & \text{Name} \\ \hline \text{A. x + x =x} & \text{I. Identity Law} \\ \hline \text{B. x + 0 = x} & \text{II. Absorption Law} \\ \hline \text{C. x +1 = 1} & \text{III. Idempotent law} \\ \hline \text{D. x + xy = x} & \text{IV. Domination Law} \\ \hline \end{array}\)
Choose the correct answer from the options given below:
A ‐ III, B ‐I , C ‐ II, D ‐ IV
A ‐ I, B ‐III , C ‐ IV, D ‐ II
A ‐ III, B ‐I , C ‐ IV, D ‐ II
A ‐ III, B ‐IV , C ‐ I, D ‐ II
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 29
Let (X, *) be a semigroup. Furthermore, for every a and b in X, if a ≠ b, then a*b ≠ b*a. Based on the defined seimigroup, choose the correct equalities from the options given below:
A. For every a in X, a*a = a
B. For every a, b in X, a*b *a= a
C. For every a, b, c in X, a*b *c= a*c
A and B only
A and C only
B and C only
A, B and C
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 30
Consider the following linear optimization problem:
Maximize Z = 6x+5y
Subject to 2x ‐ 3y <= 5
x+3y <= 11
4x + y <=15
and x>=0, y >= 0.
The optimal solution of the problem is:
15
25
31.72
41.44
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 31
Which of the following languages are not regular?
A. L={ (01)n 0k | n > k, k>=0 }
B. L={ cn bk an+k | n >= 0, k>=0 }
C. L={ 0n 1k | n≠k }
Choose the correct answer from the options given below:
A and B only
A and C only
B and C only
A, B and C
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 32
Any string of terminals that can be generated by the following context free grammar (where S is start nonterminal symbol)
\(S \rightarrow XY \\ X \rightarrow 0X |1X|0 \\ Y \rightarrow Y0|Y1|0\)
has at least one 1
should end with 0
has no consecutive 0’s or 1’s
has at least two 0’s
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 33
Let
\(L_1 = \{ 0^n 1^n 0^m | n>=1, m>=1 \} \\
L_2 = \{ 0^n 1^m 0^m | n>=1, m>=1 \} \\
L_3 = \{ 0^n 1^n 0^n | n>=1\} \)
Which of the following are correct statements?
A. \( L_3 =L_1 \cap L_2\)
B. \(L_1\) and \(L_2\) are context free languages but L is not a context free language
C. \(L_1\) and \(L_2\) are not context free languages but L is a context free language
D. \(L_1\) is a subset of \(L_3\)
Choose the correct answer from the options given below:
A and B only
A and C only
A and D only
A only
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 34
Given below are two statements Statement
I: The family of context free languages is closed under homomorphism Statement
II: The family of context free languages is closed under reversal
In light of the above statements, choose the correct answer from the options given below
Both Statement I and Statement II are true
Both Statement I and Statement II are false
Statement I is true but Statement II is false
Statement I is false but Statement II is true
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 35
What is the minimum number of states required to the finite automaton equivalent to the transition diagram given below?
3
4
5
6
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 36
Find the regular expression for the language accepted by the automata given below.
\((aa^* (a+b)ab)^*\)
\((a+b)ab(ab+bb+ aa^* (a+b)ab)^*\)
\(a^* ab(ab+bb+ aa^* (a+b)ab)^*\)
\( a^* (a+b)ab(ab+bb+ aa^* (a+b)ab)^*\)
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 37
What language is accepted by the pushdown automaton
\(M=(\{q_0 , q_1 , q_2\}, \{a, b\}, \{a, b, z\}, δ, q_0 , z, \{q_2 \})\)
with \( δ(q_0 , a, a) =\{ (q_0 , aa) \}; δ(q_0 , b, a) =\{(q_0 , ba)\}\)
\(δ(q_0 , a, b) =\{ (q_0 , ab) \}; δ(q_0 , b, b) =\{ (q_0 , bb) \}\)
\(δ(q_0 , a, z) =\{ (q_0 , az) \}; δ(q_0 , b, z) =\{ (q_0 , bz) \}\)
\(δ(q_0 , λ, b) =\{ (q_1 , b) \}; δ(q_0 , λ, a) =\{ (q_1 , a) \}\)
\(δ(q_1 , a, a) =\{ (q_1 , λ) \}; δ(q_1 , b, b) =\{ (q_1 , λ) \}\)
\(δ(q_1 , λ, z) ={ (q_2 , z) }\) ?
\(L = \{ w | n_a(w) = n_b (w), w \ Є \ \{a, b\}^+ \}\)
\(L = \{ w | n_a(w) <= n_b (w), w \ Є \ \{a, b\}^+ \}\)
\(L = \{ w | n_b(w) <= n_a (w), w \ Є \ \{a, b\}^+ \}\)
\(L = \{ ww^R, w \ Є \ \{a, b\}^+ \}\)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 38
Match List I with List II
Choose the correct answer from the options given below :
A ‐ III, B ‐I , C ‐ IV, D ‐ II
A ‐ III, B ‐II , C ‐ I, D ‐ IV
A ‐ III, B ‐IV, C ‐ I, D ‐ II
A ‐ IV, B ‐III , C ‐ I, D ‐ II
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 39
Which of the following concepts can be used to identify loops?
A. Depth first ordering
B. Dominators
C. Reducible graphs
Choose the correct answer from the options given below:
A and B only
A and C only
B and C only
A, B and C
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 40
Given below are two statements
Statement I: LL(1) and LR are examples of Bottom‐up parsers.
Statement II: Recursive descent parser and SLR are examples of Top‐down parsers
In light of the above statements, choose the correct answer from the options given below
Both Statement I and Statement II are true
Both Statement I and Statement II are false
Statement I is true but Statement II is false
Statement I is false but Statement II is true
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 41
The postfix form of the expression (A + B) * (C * D ‐ E) * F / G is _______ .
A B + C D * E – F G / * *
A B + C D * E – F * * G /
A B + C D * E – * F * G /
A B + C D E * – * F * G /
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 42
A double‐ended queue (dequeue) supports adding and removing items from both the ends of the queue. The operations supported by dequeue are AddFront(adding item to front of the queue), AddRear(adding item to the rear of the queue), RemoveFront(removing item from the front of the queue), and RemoveRear(removing item from the rear of the queue). You are given only stacks to implement this data structure. You can implement only push and pop operations. What’s the time complexity of performing AddFront() and AddRear() assuming m is the size of the stack and n is the number of elements?
\( O(m) \ and \ O(n)\)
\(O(1) \ and \ O(n)\)
\(O(n) \ and \ O(1)\)
\(O(n) \ and \ O(m)\)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 43
Two balanced binary trees are given with m and n elements, respectively. They can be merged into a balanced binary search tree in ____ time.
\(O(m*n)\)
\(O(m+n)\)
\(O(m*log n)\)
\(O(m*log(m+n))\)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 44
A data structure is required for storing a set of integers such that each of the following operations can be done in \(O(log \ n)\) time, where \(n\) is the number of elements in the set.
Deletion of the smallest element
Insertion of an element if it is not already present in the set
Which of the following data structures can be used for this purpose?
A heap can be used but not a balanced binary search tree.
A balanced binary search tree can be used but not a heap.
Both balanced binary search tree and heap can be used.
Neither balanced binary search tree nor heap can be used.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 45
Consider the following graph.
Among the following sequences
I. a b e g h f
II. a b f e h g
III. a b f h g e
IV. a f g h b e
Which are depth first traversals of the above graph?
I, II, and IV only
I and IV only
II, III, and IV only
I, III, and IV only
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 46
Given below are two statements
Statement I: In an undirected graph, number of odd degree vertices is even.
Statement II: In an undirected graph, sum of degrees of all vertices is even.
In light of the above statements, choose the correct answer from the options given below.
Both Statement I and Statement II are true.
Both Statement I and Statement II are false.
Statement I is true but Statement II is false.
Statement I is false but Statement II is true.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 47
Which of the given options provides the increasing order of asymptotic complexity of functions \(f1, f2, f3\) and \(f4\) ?
A. \(f1(n) = 2^n\)
B. \(f2(n) = n^{3/2}\)
C. \(f3(n) = n \ log \ n\)
D. \(f4(n) = n^{log \ n}\)
Choose the correct answer from the options given below
C, B, D, A
C, B, A, D
B, C, A, D
B, C, D, A
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 48
The order of a leaf node in a B+ tree is the maximum number of (value, data record pointer) pairs it can hold. Given that the block size is 1K bytes, data record pointer is 7 bytes long, the value field is 9 bytes long and a block pointer is 6 bytes long, what is the order of the leaf node ?
63
64
67
68
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 49
A hash function h defined as h(key)=key mod 7, with linear probing, is used to insert the keys 44, 45, 79, 55, 91, 18, 63 into a table indexed from 0 to 6. What will be the location of key 18?
3
4
5
6
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 50
In the following table, the left column contains the names of standard graph algorithms and the right column contains the time complexities of the algorithms. Here, n and m are number of vertices and edges, respectively. Match each algorithm with its time complexity.
\(\begin{array}{|ll|ll|}\hline \text{1.} & \text{Bellman-Ford algorithm} & \text{A:} & \text{$O(m\log n)$} \\\hline \text{2.} & \text{Kruskal’s algorithm} & \text{B:}& \text{$O(n^3)$} \\\hline \text{3.}& \text{Floyd-Warshall algorithm} & \text{C:} & \text{$O(nm)$} \\\hline \text{4.} & \text{Topological sorting} &\text{D:} & \text{$O(n+m)$} \\\hline \end{array}\)
Choose the correct answer from the options given below:
A ‐ III, B ‐ I, C ‐ II, D ‐ IV
A ‐ II, B ‐ IV, C ‐ III, D ‐ I
A ‐ III, B ‐ IV, C ‐ I, D ‐ II
A ‐ II, B ‐ I, C ‐ III, D ‐ IV
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 51
Which agent deals with the happy and unhappy state?
Utility‐based agent
Model‐based agent
Goal‐based Agent
Learning Agent
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 52
Given below are two statements
Statement I: Breadth‐First Search is optimal when all the step costs are equal whereas uniform‐cost search is optimal with any step‐cost.
Statement II: When all the step costs are same uniform‐cost search expends more nodes at depth d than the Breadth‐First Search.
In light of the above statements, choose the correct answer from the options given below
Both Statement I and Statement II are true
Both Statement I and Statement II are false
Statement I is true but Statement II is false
Statement I is false but Statement II is true
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 53
Consider the given tree below. Calculate the value at the root of the tree using alpha‐beta pruning algorithm.
3
5
6
9
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 54
Which among the following statement(s) is(are) FALSE?
A. Greedy best‐first search is not optimal but is often efficient.
B. A* is complete and optimal provided h(n) is admissible or consistent.
C. Recursive best‐first search is efficient in terms of time complexity but poor in terms of space complexity.
D. h(n) = 0 is an admissible heuristic for the 8‐puzzle.
A only
A and D only
C only
C and D only
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 55
Consider the sentence below. There is a country that borders both India and Pakistan. Which of the following logical expressions express the above sentence correctly when the predicate \(Country(x)\) represents that \(x\) is a country and \(Borders(x, y)\) represents that the countries \(x\) and \(y\) share the border?
\(∃c \ Country(c) ∧ Border (c, India) ∧ Border (c,Pakistan) \)
\(∃c \ Country(c) ⇒ [Border (c, India) ∧ Border (c,Pakistan)]\)
\([∃c \ Country(c)] ⇒ [Border (c, India) ∧ Border (c,Pakistan)]\)
\(∃c \ Border (Country(c), India ∧ Pakistan)\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 56
Next five questions are based on the following passage. Consider a domain consisting of three Boolean variables Toothache, Cavity, and Catch. The full joint distribution is a 2×2×2 table as shown in the figure below.
The marginal probability of cavity P(cavity) is __________.
0.200
0.216
0.120
0.080
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 57
The probability of a cavity, given evidence of a toothache, P(cavity | toothache) is __________.
0.400
0.600
0.280
0.216
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 58
The probability of a toothache, given evidence of a cavity, P(toothache | cavity) is __________.
0.400
0.600
0.280
0.216
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 59
P(cavity ∨ toothache) is __________.
0.200
0.120
0.280
0.600
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 60
The probability for Cavity, given that either Toothache or Catch is true, P(Cavity | toothache ∨ catch) is _______ .
0.6000
0.5384
0.8000
0.4615
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 61
Which of the DBMS component ensures that concurrent execution of multiple operations on the database results into a consistent database state?
Logs
Buffer manager
File manager
Transaction processing system
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 62
Consider following two statements:
Statement I: Relational database schema represents the logical design of the database.
Statement II: Current snapshot of a relation only provides the degree of the relation.
In the context to the above statements, choose the correct option from the options given below:
Statement I is TRUE but Statement II is FALSE
Statement I is FALSE but Statement II is TRUE
Both Statement I and Statement II are FALSE
Both Statement I and Statement II are TRUE
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 63
Given a fixed‐length record file that is ordered on the key field. The file needs B disk blocks to store R number of records. Find the average access time needed to access any record of the given file using binary search.
\(\frac B 2\)
\(B + R\)
\(B\)
\(log_2 \ B\)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 64
Given the following STUDENT‐COURSE scheme: STUDENT (Rollno, Name, courseno) COURSE (courseno, coursename, capacity), where Rollno is the primary key of relation STUDENT and courseno is the primary key of relation COURSE. Attribute coursename of COURSE takes unique values only. Which of the following query(ies) will find total number of students enrolled in each course, along with its coursename.
A. SELECT coursename, count(*) 'total' from STUDENT natural join COURSE group by coursename;
B. SELECT C.coursename, count(*) 'total' from STUDENT S, COURSE C where S.courseno=C.courseno group by coursename;
C. SELECT coursename, count(*) 'total' from COURSE C where courseno in (SELECT courseno from STUDENT);
A and B only
C only
A only
B only
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 65
Given the following STUDENT‐COURSE scheme: STUDENT (Rollno, Name, Courseno) COURSE (Courseno, Coursename, Capacity), where Rollno is the primary key of relation STUDENT and Courseno is the primary key of relation COURSE. Attribute Coursename of COURSE takes unique values only. The number of records in COURSE and STUDENT tables are 3 and 5 respectively. Following relational algebra query is executed: R=STUDENT X COURSE
Match List I with List II in context to the above problem statement.
\(\begin{array}{|c|l|c|l|l|} \hline \text{List I} & \text{List II} \\ \hline \text{A. Degree of table R} & \text{I. 15} \\ \hline \text{B. Cardinality of table R} & \text{II. NIL} \\ \hline \text{C. Foreign key of relation STUDENT} & \text{III. 6} \\ \hline \text{D. Foreign key of relation COURSE} & \text{IV. Courseno} \\ \hline \end{array}\)
Choose the correct answer from the options given below:
A ‐III , B ‐I , C ‐IV , D ‐ II
A ‐I , B ‐III , C ‐IV , D ‐ II
A ‐I , B ‐III , C ‐IV , D ‐ II
A ‐I , B ‐III, C ‐II , D ‐ IV
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 66
Suppose a B+ tree is used for indexing a database file. Consider the following information:
size of the search key field= 10 bytes, block size = 1024 bytes, size of the record pointer= 9 bytes, size of the block pointer= 8 bytes.
Let K be the order of internal node and L be the order of leaf node of B tree, then (K, L)=______.
(57, 53)
(50, 52)
(60, 64)
(34, 31)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 67
Given a relation scheme \(R(x,y,z,w)\) with functional dependencies set \( F=\{x \rightarrow y, z \rightarrow w\}\). All attributes take single and atomic values only.
A. Relation \(R\) is in First Normal FORM
B. Relation \(R\) is in Second Normal FORM
C. Primary key of \(R\) is \(xz\)
Choose the correct answer from the options given below:
C only
B and C only
A and C only
B only
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 68
A company is consuming parts in the manufacturing of other products. Each of the part is either manufactured within the company or purchased from the external suppliers or both. For each part, partnumber, partname is maintained. Attribute batchnumber is maintained if the consumed part is manufactured in the company. If part is purchased from external supplier, then supplier name is maintained. Which of the following constraints need to be considered when modelling class/subclass concepts in ERD for the given problem.
Total specialization and overlapping constraints
Disjoint constraint only
Partial participation
Partial participation and disjoint constraints
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 69
A transaction may be in one of the following states during its execution life cycle in concurrent execution environment.
A. FAILED
B. TERMINATED
C. PARTIALLY COMMITTED
D. COMMITTED
E. ACTIVE
Given a transaction in active state during its execution, find its next transitioned state from the options given below: [
A only
Either A or C only
C only
D only
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 70
Which of the following is used to create a database schema?
DML
DDL
HTML
XML
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 71
Given memory access time as p nanoseconds and additional q nanoseconds for handling the page fault. What is the effective memory access time if a page fault occurs once for every 100 instructions? [
\(P + \frac {q} {100}\)
\(\frac {p+q} {100}\)
\(p + q\)
\(\frac {p} {100} + q\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 72
In a file allocation system, the following allocation schemes are used:
A. Contiguous
B. Indexed
C. Linked allocation
Which of the allocation scheme(s) given above will not suffer from external fragmentation? Choose the correct answer from the options given below:
A only
B and C only
A and B only
C only
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 73
Given below are three statements related to interrupt handling mechanism
A. Interrupt handler routine is not stored at a fixed address in the memory.
B. CPU hardware has a dedicated wire called the interrupt request line used for handling interrupts
C. Interrupt vector contains the memory addresses for speciaized interrupt handlers.
In the context of above statements, choose the correct answer from the options given below:
A is TRUE only
Both B and C are TRUE only
Both A and B are TRUE only
Both A, C are TRUE only
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 74
Match List I with List II
\(\begin{array}{|c|l|c|l|l|} \hline \text{List I} & \text{List II} \\ \hline \text{System calls} & \text{Description} \\ \hline \text{A. fork()} & \text{I. Sends a signal from one process to another process} \\ \hline \text{B. exec()} & \text{II. Indicates termination of the current process} \\ \hline \text{C. kill()} & \text{III. Loads the specified program in the memory} \\ \hline \text{D. exit()} & \text{IV. Creates a child process} \\ \hline \end{array}\)
Choose the correct answer from the options given below:
A ‐ II , B ‐ III , C ‐ IV , D ‐ I
A ‐ IV , B ‐ III , C ‐ I , D ‐ II
A ‐ IV , B ‐ I , C ‐ II , D ‐ III
A ‐ IV , B ‐ III , C ‐ II, D ‐ I
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 75
Consider the following 3 processes with the length of the CPU burst time given in milliseconds:
Process | Arrival Time | Burst Time |
P1 | 0 | 8 |
P2 | 1 | 4 |
P3 | 2 | 9 |
What is the average waiting time for these processes if they are scheduled using preemptive shortest job first scheduling algorithm?
5.5
2.66
4.66
6
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 76
Read the following and answer the questions:
Consider a machine with 16 GB main memory and 32‐bits virtual address space, with page size as 4KB. Frame size and page size is same for the given machine.
The number of bits reserved for the frame offset is ______ .
12
14
32
8
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 77
Read the following and answer the questions:
Consider a machine with 16 GB main memory and 32‐bits virtual address space, with page size as 4KB. Frame size and page size is same for the given machine.
Find number of pages required for the given virtual address space
210
220
230
212
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 78
Read the following and answer the questions:
Consider a machine with 16 GB main memory and 32‐bits virtual address space, with page size as 4KB. Frame size and page size is same for the given machine.
What is the minimum number of bits needed for the physical address?
28
34
24
12
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 79
Read the following and answer the questions:
Consider a machine with 16 GB main memory and 32‐bits virtual address space, with page size as 4KB. Frame size and page size is same for the given machine.
What is the size of page table for handling the given virtual address space, given that each page table entry is of size 2 bytes?
2MB
2KB
32MB
12KB
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 80
Read the following and answer the questions:
Consider a machine with 16 GB main memory and 32‐bits virtual address space, with page size as 4KB. Frame size and page size is same for the given machine.
If a process of size 34KB is to be executed on this machine, then what will be the size of internal fragmentation for this process?
4KB
Zero
1KB
2KB
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 81
Match List I with List II
\(\begin{array}{|c|l|c|l|l|} \hline \text{List I} & \text{List II} \\ \hline \text{A. Odd Function} & \text{I. NAND gate} \\ \hline \text{B. Universal Gate} & \text{II. XOR gate} \\ \hline \text{C. 2421 code} & \text{III. Amplification} \\ \hline \text{D. Buffer} & \text{IV. Self‐Complementing} \\ \hline \end{array}\)
Choose the correct answer from the options given below:
A ‐ I, B ‐ II, C ‐ III, D ‐ IV
A ‐ II, B ‐ I, C ‐ IV, D ‐ III
A ‐ I, B ‐ III, C ‐ II, D ‐ IV
A ‐ IV, B ‐ II, C ‐ III, D ‐ I
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 82
The Octal equivalent of hexadecimal (D.C)16 is:
(15.6)8
(61.6)8
(15.3)8
(61.3)8
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 83
A digital computer has a common bus system for 8 registers 16 bits each. How many multiplexers are required to implement common bus? What size of multiplexers is required?
16, 8x1
8, 16x1
8, 8x1
16, 16x1
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 84
Which of the following is not an example of pseudo‐instruction ?
ORG
DEC
END
HLT
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 85
The reverse Polish notation of the following infix expression [A*{B+C*(D+E)}] / {F*(G+H)} is__________.
ABCDE+*+*FGH+*/
ABCDE*++*FGH+*/
ABCDE+*+*FGH*+/
ABCDE+**+FGH+*/
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 86
Arrange the following in the increasing order of complexity.
A. I/O Module
B. I/O processor
C. I/O Channel
D. DMA
Choose the correct answer from the options given below
D, C, B, A
C, D, A, B
A, B, C, D
A, D, C, B
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 87
The characteristics of the combinational circuits are:
A. Output at any time is function of inputs at that time
B. Contains memory elements
C. Do not have feedback paths
D. Clock is used to trigger the circuits to obtain outputs
Choose the correct answer from the options given below:
A and B only
B and C only
A and C only
B and D only
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 88
The cache coherence problem can be solved
A. by having multiport memory
B. allow only nonshared data to be stored in cache
C. using a snoopy cache controller D. uisng memory interleaving
Choose the correct answer from the options given below:
A and C only
B and C only
D and C only
B and D only
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 89
Given below are two statements
Statement I: CISC computers have a large of number of addressing modes.
Statement II: In RISC machines memory access is limited to load and store instructions.
In light of the above statements, choose the correct answer from the options given below
Both Statement I and Statement II are true
Both Statement I and Statement II are false
Statement I is true but Statement II is false
Statement I is false but Statement II is true
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 90
Which of the following statement is true?
A. Control memory is part of the hardwired control unit.
B. Program control instructions are used to alter the sequential flow of the program.
C. The register indirect addressing mode for accessing memory operand is similar to displacement addressing mode.
D. CPU utilization is not affected by the introduction of Interrupts.
A
B
C
D
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 91
Match List I with List II
List I | List II |
A. Data Link Layer | I. True end‐to‐end layer |
B. Network Layer | II. Token Management |
C. Transport Layer | III. Produce billing information |
D. Session Layer | IV. Piggybacking |
Choose the correct answer from the options given below:
A ‐ IV, B ‐ III, C ‐ I, D ‐ II
A ‐ IV, B ‐ II, C ‐ I, D ‐ III
A ‐ II, B ‐ III, C ‐ I, D ‐ IV
A ‐ IV, B ‐ I, C ‐ III, D ‐ II
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 92
Given below are two statements
Statement I: Telnet, Ftp, Http are application layer protocol
Statement II: The Iridium project was planned to launch 66 low orbit satellites.
In light of the above statements, choose the correct answer from the options given below
Both Statement I and Statement II are true
Both Statement I and Statement II are false
Statement I is true but Statement II is false
Statement I is false but Statement II is true
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 93
Which of the following statement is False?
Packet switching leads to better utilization of bandwidth resources than circuit switching.
Packet switching results in less variation in the delay than circuit switching.
Packet switching sender and receiver can use any bit rate, format or framing method unlike circuit switching.
Packet switching can lead to reordering unlike circuit switching.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 94
In Ethernet when Manchester coding is used, the bit rate is__________.
Half the baud rate
twice the baud rate
Thrice the baud rate
Same as the baud rate
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 95
The address of class B host is to be split into subnets with 6‐bit subnet number. What is the maximum number of the subnets and the maximum number of hosts in each subnet?
62 subnets and 262142 hosts
64 subnets and 1024 hosts
64 subnets and hosts 262142
62 subnets and 1022 hosts
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 96
In electronic mail, which of the following protocols allows the transfer of multimedia?
IMAP
SMTP
POP3
MIME
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 97
A message is encrypted using public key cryptography to send a message from sender to receiver. Which one of the following statements is True?
Sender encrypts using receiver’s public key
Sender encrypts using his own public key
Receiver decrypts using sender’s public key
Receiver decrypts using his own public key
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 98
Which of the following statements are true?
A. Frequency division multiplexing technique can be handled by digital circuits.
B. Time division multiplexing technique can be handled by analog circuits
C. Wavelength division multiplexing technique is used with optical fiber for combining two signals.
D. Frequency division multiplexing technique can be applied when the bandwidth of a link is greater than the bandwidth of the signals to be transmitted.
Choose the correct answer from the options given below:
B and D only
C and D only
A and D only
B and D only
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 99
Which of the following statements are true?
A. X.25 is connection‐oriented network
B. X.25 doesn’t support switched virtual circuits.
C. Frame relay service provides acknowledgements.
D. Frame relay service provides detection of transmission errors.
Choose the correct answer from the options given below:
A and D only
B and D only
C and D only
B and C only
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 100
Let G(x) be the generator polynomial used for CRC checking. The condition that should be satisfied by the G(x) to catch all errors consisting of an odd number of inverted bits is:
(x+1) is factor of G(x)
(x‐1) is factor of G(x)
(x2 +1) is factor of G(x)
(1‐x2) is factor of G(x)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0