Question : 1
Consider a set A = {1, 2, 3, …….., 1000}. How many members of A shall be divisible by 3 or by 5 or by both 3 and 5 ?
533
599
467
66
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 2
A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of degree 2. If the other vertices have degree 1, how many vertices are there in the graph ?
5
n – 3
20
11
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 3
Consider the Graph shown below :
This graph is a __________.
Complete Graph
Bipartite Graph
Hamiltonian Graph
All of the above
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 4
A computer program selects an integer in the set {k : 1 ≤ k ≤ 10,00,000} at random and prints out the result. This process is repeated 1 million times. What is the probability that the value k = 1 appears in the printout atleast once ?
0.5
0.704
0.632121
0.68
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 5
If we define the functions f, g and h that map R into R by :
\(f(x) = x^4, g(x) = \sqrt {x^2 + 1}, h(x) = x^2 + 72\) , then the value of the composite functions ho(gof) and (hog)of are given as
\(x^8 - 71 \ \ and \ \ x^8 -71\)
\(x^8 - 73 \ \ and \ \ x^8 -73\)
\(x^8 + 71 \ \ and \ \ x^8 +71\)
\(x^8 + 73 \ \ and \ \ x^8 +73\)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 6
The BCD adder to add two decimal digits needs minimum of
6 full adders and 2 half adders
5 full adders and 3 half adders
4 full adders and 3 half adders
5 full adders and 2 half adders
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 7
The Excess-3 decimal code is a self-complementing code because
The binary sum of a code and its 9’s complement is equal to 9.
It is a weighted code.
Complement can be generated by inverting each bit pattern.
The binary sum of a code and its 10’s complement is equal to 9.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 8
How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine (A ∗ B) + (C ∗ D/E) ?
4 PUSH and 3 POP instructions
5 PUSH and 4 POP instructions
6 PUSH and 2 POP instructions
5 PUSH and 3 POP instructions
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 9
The range of representable normalized numbers in the floating point binary fractional representation in a 32-bit word with 1-bit sign, 8-bit excess 128 biased exponent and 23-bit mantissa is
2–128 to (1 – 2–23) × 2127
(1 – 2–23) × 2–127 to 2128
(1 – 2–23) × 2–127 to 223
2–129 to (1 – 2–23) × 2127
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 10
The size of the ROM required to build an 8-bit adder/subtractor with mode control, carry input, carry output and two’s complement overflow output is given as
216 × 8
218 × 10
216 × 10
218 × 8
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 11
What will be the output of the following ‘C’ code ?
main ( )
{ int x = 128;
printf (“\n%d”, 1 + x ++);
}
128
129
130
131
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 12
What does the following expression means ?
char ∗(∗(∗ a[N]) ( )) ( );
a pointer to a function returning array of n pointers to function returning character pointers.
a function return array of N pointers to functions returning pointers to characters
an array of n pointers to function returning pointers to characters
an array of n pointers to function returning pointers to functions returning pointers to characters.
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 13
Which of the following is not a member of class ?
Static function
Friend function
Const function
Virtual function
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 14
When an array is passed as parameter to a function, which of the following statements is correct ?
The function can change values in the original array.
In C, parameters are passed by value, the function cannot change the original value in the array.
It results in compilation error when the function tries to access the elements in the array.
Results in a run time error when the function tries to access the elements in the array.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 15
Which of the following differentiates between overloaded functions and overridden functions ?
Overloading is a dynamic or runtime binding and overridden is a static or compile time binding.
Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
Redefining a function in a friend class is called overloading, while redefining a function in a derived class is called as overridden function.
Redefining a function in a derived class is called function overloading, while redefining a function in a friend class is called function overriding.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 16
Division operation is ideally suited to handle queries of the type :
customers who have no account in any of the branches in Delhi.
customers who have an account at all branches in Delhi.
customers who have an account in atleast one branch in Delhi.
customers who have only joint account in any one branch in Delhi
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 17
Which of the following is true ?
I. Implementation of self-join is possible in SQL with table alias.
II. Outer-join operation is basic operation in relational algebra.
III. Natural join and outer join operations are equivalent.
I and II are correct.
II and III are correct.
Only III is correct.
Only I is correct.
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 18
What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-relationship diagram ?
Generalization
Aggregation
Specialization
Adding suitable attributes
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 19
The best normal form of relation scheme R(A, B, C, D) along with the set of functional dependencies F = {AB → C, AB → D, C → A, D → B} is
Boyce-Codd Normal form
Third Normal form
Second Normal form
First Normal form
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 20
Identify the minimal key for relational scheme R(A, B, C, D, E) with functional dependencies F = {A → B, B → C, AC → D}
A
AE
BE
CE
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 21
Convert the following infix expression into its equivalent post fix expression
(A + B^ D) / (E – F) + G
ABD^ + EF – / G+
ABD + ^EF – / G+
ABD + ^EF / – G+
ABD^ + EF / – G+
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 22
You have to sort a list L, consisting of a sorted list followed by a few ‘random’ elements. Which of the following sorting method would be most suitable for such a task ?
Bubble sort
Selection sort
Quick sort
Insertion sort
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 23
The directory can be viewed as ________ that translates filenames into their directory entries.
Symbol table
Partition
Swap space
Cache
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 24
Consider an array A[20, 10], assume 4 words per memory cell and the base address of array A is 100. What is the address of A[11, 5] ? Assume row major storage.
560
565
570
575
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 25
A full binary tree with n leaves contains
n nodes
log2 n nodes
2n –1 nodes
2n nodes
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 26
The period of a signal is 10 ms. What is its frequency in Hertz ?
10
100
1000
10000
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 27
In a classful addressing, first four bits in Class A IP address is
1010
1100
1011
1110
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 28
Which of the following algorithms is not a broadcast routing algorithm ?
Flooding
Multidestination routing
Reverse path forwarding
All of the above
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 29
An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element ?
0.336 bits/baud
3 bits/baud
120,00,000 bits/baud
None of the above
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 30
How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key ?
16
17
18
19
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 31
Shift-Reduce parsers perform the following :
Shift step that advances in the input stream by K(K > 1) symbols and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
Shift step that advances in the input stream by K(K = 2) symbols and Reduce step that applies a completed grammar rule to form a single tree.
Shift step that does not advance in the input stream and Reduce step that applies a completed grammar rule to form a single tree.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 32
Which of the following is true ?
Canonical LR parser is LR (1) parser with single look ahead terminal
All LR(K) parsers with K > 1 can be transformed into LR(1) parsers.
Both (A) and (B)
None of the above
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 33
In a two-pass assembler, symbol table is
Generated in first pass
Generated in second pass
Not generated at all
Generated and used only in second pass
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 34
Debugger is a program that
allows to examine and modify the contents of registers
does not allow execution of a segment of program
allows to set breakpoints, execute a segment of program and display contents of register
All of the above
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 35
The following Context-Free Grammar (CFG) :
S → aB | bA
A → a | as | bAA
B → b | bs | aBB
will generate
odd numbers of a’s and odd numbers of b’s
even numbers of a’s and even numbers of b’s
equal numbers of a’s and b’s
different numbers of a’s and b’s
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 36
Consider the following justifications for commonly using the two-level CPU scheduling :
I. It is used when memory is too small to hold all the ready processes.
II. Because its performance is same as that of the FIFO.
III. Because it facilitates putting some set of processes into memory and a choice is made from that.
IV. Because it does not allow to adjust the set of in-core processes.
Which of the following is true ?
I, III and IV
I and II
III and IV
I and III
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 37
A specific editor has 200 K of program text, 15 K of initial stack, 50 K of initialized data, and 70 K of bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared text is used ?
1135 K
335 K
1065 K
320 K
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 38
Which of the following conditions does not hold good for a solution to a critical section problem ?
No assumptions may be made about speeds or the number of CPUs.
(B) No two processes may be simultaneously inside their critical sections.
Processes running outside its critical section may block other processes.
Processes do not wait forever to enter its critical section.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 39
For the implementation of a paging scheme, suppose the average process size be x bytes, the page size be y bytes, and each page entry requires z bytes. The optimum page size that minimizes the total overhead due to the page table and the internal fragmentation loss is given by
\(\frac x 2\)
\(\frac {xz} 2\)
\(\sqrt {2xz}\)
\(\frac {\sqrt {xz}} 2\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 40
In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced page is modified. What is the average access time to service a page fault assuming that the page to be replaced is modified 70% of the time ?
11.6 m.sec.
16.4 m.sec.
28 m.sec.
14 m.sec.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 41
__________ are applied throughout the software process.
Framework activities
Umbrella activities
Planning activities
Construction activities
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 42
Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level
Performed
Managed
Defined
Optimized
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 43
The software _________ of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them.
Design
Architecture
Process
Requirement
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 44
Which one of the following set of attributes should not be encompassed by effective software metrics ?
Simple and computable
Consistent and objective
Consistent in the use of units and dimensions
Programming language dependent
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 45
Which one of the following is used to compute cyclomatic complexity ?
The number of regions – 1
E – N + 1, where E is the number of flow graph edges and N is the number of flow graph nodes.
P – 1, where P is the number of predicate nodes in the flow graph G.
P + 1, where P is the number of predicate nodes in the flow graph G.
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 46
Consider the following statements S1 and S2 : S1 : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell. S2 : A soft handover is one in which the channel in the source cell is released and only then the channel in the target cell is engaged.
S1 is true and S2 is not true.
S1 is not true and S2 is true.
Both S1 and S2 are true.
Both S1 and S2 are not true.
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 47
Fact-less fact table in a data warehouse contains
only measures
only dimensions
keys and measures
only surrogate keys
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 48
Which e-business model allows consumers to name their own price for products and services ?
B2 B
B2 G
C2 C
C2 B
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 49
__________ model is designed to bring prices down by increasing the number of customers who buy a particular product at once.
Economic Order Quantity
Inventory
Data Mining
Demand-Sensitive Pricing
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 50
Match the following :
\(\begin{array}{clcl} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Call Control protocol} &\text{i.} & \text{Interface between Base Transceiver Station} \\ &&&\text{ (BTS) and Base Station Controller (BSC)} \\ \text{b.} & \text{A-bis} & \text{ii.} & \text{Spread spectrum} \\ \text{c.}& \text{BSMAP} & \text{iii.} & \text{Connection management} \\ \text{d.} & \text{CDMA} & \text{iv.} & \text{Works between Mobile Switching Centre}\\ &&& \text{( MSC) and Base Station Subsystem (BSS) } \\ \end{array}\)
Codes :
a-iii, b-iv, c-i, d-ii
a-iii, b-i, c-iv, d-ii
a-i, b-ii, c-iii, d-iv
a-iv, b-iii, c-ii, d-i
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0