Question : 1
The three outputs 𝑥1𝑥2𝑥3 from the 8×3 priority encoder are used to provide a vector address of the form 101𝑥1𝑥2𝑥300. what is the second highest priority vector address in hexadecimal if the vector addresses are starting from the one with the highest priority?
𝐵𝐶
𝐴4
𝐵𝐷
𝐴𝐶
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 2
What will be the output at PORT1 if the following program is executed?
MVI B, 82H
MOV A, B
MOV C, A
MVI D, 37H
OUT PORT1
HLT
37𝐻
82𝐻
𝐵9𝐻
00𝐻
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 3
Which of the following 8085 microprocessor hardware interrupt has the lowest priority?
RST 6.5
RST 7.5
TRAP
INTR
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 4
A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 msec and a memory cycle requires 250 msec. What percentage of memory's total operating time is required for refreshes?
0.64
0.96
2.00
0.32
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 5
A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average rate of one million instructions per second. By how much will the CPU be slowed down because of the DMA transfer?
0.06%
0.12%
1.2%
2.5%
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 6
A CPU handles interrupt by executing interrput service subroutine ____
by checking interrupt register after execution of each instruction
by checking interrupt register at the end of the fetch cycle
whenever an interrupt is registered
by checking interrupt register at regular time interval
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 7
Given the following set of prolog clauses:
father(X,Y) :
parent(X,Y),
male(X),
parent(Sally, Bob),
parent(Jim, Bob),
parent(Alice, Jane),
male(Bob),
male(Jim),
female(Salley),
female(Alice)
How many atoms are matched to the variable 'X' before the query father(X, Jane) reports a Result?
1
2
3
4
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 8
Forward chaining systems are ____ where as backward chaining systems are ____
Data driven, Data driven
Goal driven, Data driven
Data driven, Goal driven
Goal driven, Goal driven
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 9
Match the following w.r.t. programming languages :
\(\begin{array}{clcl} & \textbf{List – I} & & \textbf{List – II} \\ \text{(a)} & \text{JAVA} & \text{(i)} & \text{Dynamically object oriented} \\ \text{(b)}& \text{Phython} & \text{(ii)} & \text{Statistically non-object oriented} \\ \text{(c)} & \text{Prolog} & \text{(iii)} & \text{Statistically object oriented} \\ \text{(d)} & \text{ADA} & \text{(iv)} & \text{Dynamically non-object oriented} \\ \end{array}\)
Codes :
(a)-(iii), (b)-(i), (c)-(ii), (d)-(iv)
(a)-(i), (b)-(iii), (c)-(ii), (d)-(iv)
(a)-(i), (b)-(iii), (c)-(iv), (d)-(ii)
(a)-(ii), (b)-(iv), (c)-(i), (d)-(iii)
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 10
The combination of an IP address and a port number is known as _____
network number
socket address
subnet mask number
MAC address
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 11
A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network ?
2 Mbps
60 Mbps
120 Mbps
10 Mbps
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 12
Consider a subnet with 720 routers. If a three level hierarchy is chosen with 8 clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is _______
25
27
53
72
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 13
In a classful addressing the IP address with 0(zero) as network number:
refers to the current network
refers to broadcast on the local network
refers to the broadcast on a distant network
refers to loopback testing
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 14
In electronic mail, which of the following protocols allows the transfer of multimedia messages?
IMAP
SMTP
POP 3
MIME
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 15
A network device is sending out the data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters?
50
200
400
800
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 16
In Activity-Selection problem, each activity \(𝑖\) has a start time \(𝑠_𝑖\) and a finish time \(𝑓_𝑖\) where \(𝑠_𝑖 ≤ 𝑓_𝑖\). Activities \(𝑖\) and \(𝑗\) are compatible if :
\(s_i \geq f_j\)
\(s_j \geq f_i\)
\(s_i \geq f_j \ or \ s_j \geq f_i\)
\(s_i \geq f_j \ and \ s_j \geq f_i\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 17
Given two sequences 𝑋 and 𝑌:
𝑋 = 〈𝑎,𝑏,𝑐,𝑏,𝑑,𝑎,𝑏〉
𝑌 = 〈𝑏,𝑑,𝑐,𝑎,𝑏,𝑎〉
The longest common subsequence of X and Y is:
〈𝑏,𝑐,𝑎〉
〈𝑐,𝑎,𝑏〉
〈𝑏,𝑐,𝑎,𝑎〉
〈𝑏,𝑐,𝑏,𝑎〉
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 18
If there are n integers to sort, each integer had d digits and each digit is in the set {1,2,…,𝑘}, radix sort can sort the numbers in :
\(O(d \: n \: k)\)
\(O(d \ n^k)\)
\(O(d+n)k)\)
\(O(d(n+k))\)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 19
The solution of the reccurence relation
\(T(n) \leq \begin{cases} \theta(1) & \text{ if } n \leq 80 \\ T\bigg(\dfrac{n}{s} \bigg)+T \bigg(\dfrac{7n}{10}+6\bigg)+O(n) & \text{ if } n> 80 \end{cases}\)
\(O(\lg n)\)
\(O(n)\)
\(O(n \lg n)\)
None of the above
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 20
Floyd-Warshall algorithm utilizes _____ to solve the all-pairs shortest paths problem on a directed graph in ____ time.
Greedy algorithm, 𝜃(𝑉3)
Greedy algorithm, 𝜃(𝑉2 𝑙𝑔𝑛)
Dynamic programming, 𝜃(𝑉3)
Dynamic programming, 𝜃(𝑉2 𝑙𝑔𝑛)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 21
Let \(𝑛=4\) and \((𝑎_1,𝑎_2,𝑎_3,𝑎_4)\) = (do, if, int, while). Let \(𝑝(1:4)\) = \((\frac 3 8,\frac 3 8,\frac 1 8, \frac 1 8)\) and \(𝑞(1:4)=(\frac 2 8,\frac 3 8,\frac 1 8,\frac 1 8,\frac 1 8)\) where \(𝑝(𝑖)\) and \(𝑞(𝑖)\) denotes the probability with which we search \(𝑎_𝑖\) and the identifier \(𝑥\) being searched satisfy \(𝑎_𝑖 < 𝑥 < 𝑎_{𝑖+1}\) respectively. The optimal search tree is given by:
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 22
The family of context sensitive languages is _____ under union and ____ under reversal.
closed, not closed
not closed, not closed
closed, closed
not closed, closed
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 23
Match the following :
\(\begin{array}{clcl} & \textbf{List – I} & & \textbf{List – II} \\ \text{(a)} & \{a^n b^n \mid n > 0\} \text{ is a deterministic } & \text{(i)} & \text{but not recursive language}\\ & \text{ context free language} \\ \text{(b)} & \text{The complement of }\{a^n b^n a^n \mid n>0\} & \text{(ii)} & \text{but not context free language}\\ & \text{is a context free language} \\ \text{(c)} & \{a^nb^na^n\}\text{ is a context sensitive} & \text{(iii)} & \text{but cannot be accepted by a } \\& \text{ language} && \text{deterministic pushdown }\\ &&& \text{automaton} \\ \text{(d)} & \text{L is a recursive language} & \text{(iv)} &\text{but not regular} \\ \end{array}\)
Codes :
(a)-(i), (b)-(ii), (c)-(iii), (d)-(iv)
(a)-(i), (b)-(ii), (c)-(iv), (d)-(iii)
(a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
(a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 24
The language of all non-null strings of a's can be defined by a context free grammar as follow :
\(S \rightarrow a \: S \mid S\: a \mid a\)
The word 𝑎3 can be generated by ______ different trees.
Two
Three
Four
Five
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 25
Which of the following non-functional quality attributes is not highly affected by the architecture of the software?
Performance
Reliablity
Usability
Portability
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 26
The context free grammar given by
\(S \rightarrow XYX \\ X \rightarrow aX \mid bX \mid \lambda \\ Y \rightarrow bbb\)
generates the language which is defined by regular expression:
\((a+b)^*bbb\)
\(abbb(a+b)^*\)
\((a+b)^*(bbb)(a+b)^*\)
\((a+b)(bbb)(a+b)^*\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 27
There are exactly ____ different finite automata with three states 𝑥, 𝑦 and 𝑧 over the alphabet {𝑎,𝑏} where 𝑥 is always the start state.
64
256
1024
5832
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 28
Given the following two languages:
\(L_1=\{a^nba^n\;|\;n>0\} \\ L_2=\{a^nba^nb^{n+1}\;|\;n>0\}\)
Which of the following is correct?
\( 𝐿_1\) is context free language and \(𝐿_2\) is not context free language
\( 𝐿_1\) is not context free language and \(𝐿_2\) is context free language
Both \( 𝐿_1\) and \(𝐿_2\) are context free languages
Both \( 𝐿_1\) and \(𝐿_2\) are not context free languages
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 29
Which of the following is used to make an Abstract class?
Making at least one member function as pure virtual function
Making at least one member function as virtual function
Declaring as Abstract class using virtual keyword
Declaring as Abstract class using static keyword
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 30
Match the following with reference to object oriented modelling :
\(\begin{array}{clcl} & \textbf{List-I} && \textbf{List-II} \\ \text{(a)} & \text{Polymorphism} & \text{(i)} & \text{Picking both operator and attributes with} \\ &&& \text{operations appropriate to model an object} \\ \text{(b)} & \text{Inheritance} &\text{(ii)} & \text{Hiding implementation details of} \\ &&& \text{methods from users of objects} \\ \text{(c)} & \text{Encapsulation} & \text{(iii)}& \text{Using similar operations} \\ &&& \text{to do similar things} \\ \text{(d)} & \text{Abstraction} & \text{(iv) }& \text{Create new classes from} \\ &&& \text{existing class} \\ \end{array}\)
Codes :
(a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
(a)-(iii), (b)-(iv), (c)-(i), (d)-(ii)
(a)-(iii), (b)-(i), (c)-(ii), (d)-(iv)
(a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 31
In CRC based design, a CRC Team consists of
(a) one or two users representatives
(b) several programmers
(c) project co-ordinators
(d) one or two system analysts
Codes :
(a) and (c)
(a), (b), (c) and (d)
(a), (c) and (d)
(a), (b) and (d)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 32
The end points of a given line are (0,0) and (6,18). Compute each value of y as x steps from 0 to 3, by using equation of straight line:
For 𝑥 = 0,𝑦 = 0;𝑥 = 1,𝑦 = 3;𝑥 = 2,𝑦 = 6;𝑥 = 3,𝑦 = 9
For 𝑥 = 0,𝑦 = 1;𝑥 = 1,𝑦 = 3;𝑥 = 2,𝑦 = 4;𝑥 = 3,𝑦 = 9
For 𝑥 = 0,𝑦 = 2;𝑥 = 1,𝑦 = 3;𝑥 = 2,𝑦 = 6;𝑥 = 3,𝑦 = 9
For 𝑥 = 0,𝑦 = 0;𝑥 = 1,𝑦 = 3;𝑥 = 2,𝑦 = 4;𝑥 = 3,𝑦 = 6
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 33
Which of the following graphic primitives are considered as the basic building blocks of computer graphics?
(a) Points (b) Lines (c) Polylines (d) Polygons
Codes :
(a) only
(a) and (b)
(a), (b) and (c)
(a), (b), (c) and (d)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 34
Javascript and Java have similar name because
(a) Javascript syntax is loosely based on Java's syntax
(b) Javascript is stripped down version of Java
(c) Java and Javascript are originated from island of Java
Codes :
(a) only
(a), (b) and (c)
(a) and (b)
(a) and (c)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 35
Which of the following statements are true with reference to the way of describing XML data?
(a) XML uses DTD to describe the data
(b) XML uses XSL to describe the data
(c) XML uses a description node to describe the data
Codes :
(a) only
(b) only
(a) and (b)
(a) and (c)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 36
Which of the following is/are correct with reference to Abstract class and interface?
(a) A class can inherit only one Abstract class but may inherit several interfaces
(b) An abstract class can provide complete and default code but an interface has no code
Codes :
(a) is true
(b) is true
Both (a) and (b) are true
Neither (a) nor (b) is true
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 37
Match the following with respect to various memory management algorithms :
\(\begin{array}{clcl} & \textbf{List-I} & & \textbf{List-II} \\ \text{(a)} & \text{Demand paging} & \text{(i)} & \text{degree of multiprogramming} \\ \text{(b)} & \text{Segmentation} & \text{(ii)} & \text{working set} \\ \text{(c)} & \text{Dynamic partitions} & \text{(iii)}& \text{supports user view of memory} \\ \text{(d)} & \text{Fixed partitions} & \text{(iv)}& \text{compaction} \\ \end{array}\)
Codes :
(a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)
(a)-(ii), (b)-(iii), (c)-(i), (d)-(iv)
(a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
(a)-(ii), (b)-(iii), (c)-(iv), (d)-(i)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 38
Function of memory management unit is :
Address translation
Memory Allocation
Cache management
All of the above
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 39
Consider a system with twelve magnetic tape drives and three processes 𝑃1,𝑃2 and 𝑃3. process 𝑃1 requires maximum ten tape drives, process 𝑃2 may need as many as four tape drives and 𝑃3 may need upto nine tape drives. Suppose that at time 𝑡1, process 𝑃1 is holding five tape drives, process 𝑃2 is holding two tape drives and process 𝑃3 is holding three tape drives, At time 𝑡1, system is in:
safe state
unsafe state
deadlocked state
starvation state
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 40
In Unix operating system, special files are used to :
buffer data received in its input from where a process reads
provide a mechanism to map physical device to file names
store list of file names plus pointers associated with i-nodes
store information entered by a user application program or utility program
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 41
Match the following in Unix file system :
\(\begin{array}{clcl} & \textbf{List-I} & & \textbf{List-II} \\ \text{(a)} & \text{Boot block} & \text{(i)} & \text{Information about file system} \\ \text{(b)} & \text{Super block} & \text{(ii)} & \text{Information about file} \\ \text{(c)} & \text{Inode table} & \text{(iii)} & \text{Storage space} \\ \text{(d)} & \text{Data block} & \text{(iv)} & \text{Code for making OS ready}\\ \end{array}\)
Codes :
(a)-(iv), (b)-(i), (c)-(ii), (d)-(iii)
(a)-(i), (b)-(iii), (c)-(ii), (d)-(iv)
(a)-(iii), (b)-(i), (c)-(ii), (d)-(iv)
(a)-(iv), (b)-(ii), (c)-(i), (d)-(iii)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 42
In an operating system, indivisibility of operation means:
Operation is interruptable
Race Condition may occur
processor can not be prempted
All of the above
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 43
A horn clause is ___________ .
A clause in which no variables occur in the expression
A clause that has at least one negative literal
A disjunction of a number of literals
A clause that has atmost one positive literal
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 44
In propositional logic, given 𝑃 and 𝑃→𝑄, we can infer ________ .
∼𝑄
𝑄
𝑃∧𝑄
∼𝑃∧𝑄
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 45
Reasoning strategies used in expert systems include ________ .
Forward chaining, backward chaining and problem reduction
Forward chaining, backward chaining and boundary mutation
Forward chaining, backward chaining and back propagation
Forward chaining, problem reduction and boundary mutation
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 46
Language model used in LISP is _________ .
Functional programming
Logic programming
Object oriented programming
All of the above
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 47
In constraint satisfaction problem, constraints can be stated as __________ .
Arithmetic equations and inequalities that bind the values of variables
Arithmetic equations and inequalities that does not bind any restriction over variables
Arithmetic equations that impose restrictions over variables
Arithmetic equations that discard constraints over the given variables
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 48
As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has following advantage:
It has high level of flexibility
It does not require cash up-front
It is a business investment
Little risk of obsolescence
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 49
Consider the conditional entropy and mutual information for the binary symmetric channel. The input source has alphabet \(𝑋={0,1}\) and associated probabilities \({\dfrac{1}{2}, \dfrac{1}{2}}\). The channel matrix is \(\begin{pmatrix} 1-p & p \\ p & 1-p \end{pmatrix}\) wgere \(p\) is the transition probability. Then the conditional entropy is given by:
\(1\)
\(-p \log(p)-(1-p) \log(1-p)\)
\(1+p \log(p)+(1-p) \log(1-p)\)
\(0\)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 50
Which of the following is not a lossy compression technique ?
JPEG
MPEG
FFT
Arithmetic coding
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 51
Blind image disconvolution is ________ .
Combination of blur identification and image restoration
Combination of segmentation and classification
Combination of blur and non-blur image
None of the above
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 52
A basic feasible solution of a linear programming problem is said to be ______ if at least one of the basic variable is zero.
generate
degenerate
infeasible
unbounded
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 53
Consider the following conditions:
(a) The solution must be feasible, i.e. it must satisfy all the supply and demand constraints
(b) The number of positive allocations must be equal to 𝑚 + 𝑛 − 1, where 𝑚 is the number of rows and 𝑛 is the number of columns
(c) All the positive allocations must be in independent positions
The initial solution of a transportation problem is said to be non-degenerate basic feasible solution if it satisfies:
Codes :
(a) and (b) only
(a) and (c) only
(b) and (c) only
(a), (b) and (c)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 54
Consider the following transportation problem:
The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel's Approximation method is :
1450
1465
1480
1520
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 55
The character set used in Windows 2000 operating system is __________ .
8 bit ASCII
Extended ASCII
16 bit UNICODE
12 bit UNICODE
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 56
In Unix, the command to enable execution permission for file "mylife" by all is________ .
Chmod ugo + X mylife
Chmod a + X mylife
Chmod + X mylife
All of the above
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 57
What will be the output of the following Unix command ?
$rm chap0\[1 - 3\]
Remove file chap0[1 - 3]
Remove file chap01,chap02, chap03
Remove file chap\[1 - 3\]
None of the above
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 58
Which of the following statements regarding the features of the object-oriented approach to databases are true?
(a) The ability to develop more realistic models of the real world
(b) The ability to represent the world in a non-geometric way
(c) The ability to develop databases using natural language approaches
(d) The need to split objects into their component parts
(e) The ability to develop database models based on location rather than state and behaviour
Codes :
(a), (b) and (c)
(b), (c) and (d)
(a), (d) and (e)
(c), (d) and (e)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 59
Consider the following database table:
Create table test( one integer, two integer, primary key(one), unique(two), check(one>=1 and <=10), check (two>=1 and <=5) );
How many data records/tuples atmost can this table contain?
5
10
15
50
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 60
Suppose ORACLE relation 𝑅(𝐴,𝐵) currently has tuples {(1,2),(1,3),(3,4)} and relation 𝑆(𝐵,𝐶) currently has {(2,5),(4,6),(7,8)}.Consider the following two SQL queries SQ1 and SQ2:
SQ1: Select *
From R Full Join S
On R.B=S.B;
SQ2: Select *
From R Inner Join S
On R.B=S.B;
The numbers of tuples in the result of the SQL query SQ1 and the SQL query SQ2 are given by:
2 and 6 respectively
6 and 2 respectively
2 and 4 respectively
4 and 2 respectively
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 61
Consider the following three SQL queries (Assume the data in the people table):
(a) Select Name from people where Age>21;
(b) Select Name from people where Height>180;
(c) Select Name from people where (Age>21) or (Height>180);
If the SQL queries 𝑎 and 𝑏 above, return 10 rows and 7 rows in the result set respectively, then what is one possible number of rows returned by the SQL query 𝑐 ?
3
7
10
21
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 62
The distributed system is a collection of _____(P)_____ and communication is achieved in disributed system by ____(Q)____, where (P) and (Q) are:
Loosely coupled hardware on tightly coupled software and disk sharing, repspectively
Tightly coupled hardware on loosely coupled software and shared memory, repspectively
Tightly coupled software on loosely coupled hardware and message passing, repspectively
Loosely coupled software on tightly coupled hardware and file sharing, repspectively
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 63
Consider the following three tables 𝑅,𝑆 and 𝑇. In this question, all the join operations are natural joins (⋈). (𝜋) is the projection operation of a relation:
\(\begin{array}{|ccc|} \hline & R & \\ \hline A && B \\ \hline 1 && 2 \\ 3 && 2 \\ 5 && 6 \\ 7 & &8 \\ 9 && 8 \\ \hline \end{array} \begin{array}{|ccc|} \hline & S & \\ \hline B && C \\ \hline 6 && 2 \\ 2 && 4 \\ 8 && 1 \\ 8 & &3 \\ 2 && 5 \\ \hline \end{array} \begin{array}{|ccc|} \hline & T & \\ \hline A && C \\ \hline 7 && 1 \\ 1 && 2 \\ 9 && 3 \\ 5 & &4 \\ 3 && 5 \\ \hline \end{array}\)
Possible answer tables for this question are also given as below:
\(\underset{\text{(a)}}{\begin{array}{|ccc|} \hline A & B & C \\ \hline 1 & 2& 4 \\ 1 &2& 5 \\ 3 &2& 4 \\ 3 &2& 5 \\ 5 & 6 &2 \\ 7 & 8 & 1 \\ 7 & 8 & 3 \\ 9 & 8 & 1 \\ 9 & 8 & 3 \\ \hline \end{array}} \underset{\text{(b)}}{\begin{array}{|ccc|} \hline A & B & C \\ \hline 1 & 2& 2 \\ 3 &2& 5 \\ 5 &6& 4 \\ 7 &8& 1 \\ 9 & 8 &3 \\ \hline \end{array}} \underset{\text{(c)}}{\begin{array}{|ccc|} \hline A & B & C \\ \hline 1 & 6& 2 \\ 3 &2& 5 \\ 5 &2& 4 \\ 7 &8& 1 \\ 9 & 8 &3 \\ \hline \end{array}} \underset{\text{(d)}}{\begin{array}{|ccc|} \hline A & B & C \\ \hline 3 & 2& 5 \\ 7 &8& 1 \\ 9 & 8 &3 \\ \hline \end{array}}\)
What is the resulting table of \(𝜋_{ A,B} (R \bowtie T) \bowtie 𝜋_{B,C} (S \bowtie T)\) ?
(a)
(b)
(c)
(d)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 64
Consider the two class classification task that consists of the following points:
Class 𝐶1:[−1,−1],[−1,1],[1,−1]
Class 𝐶2:[1,1]
The decision boundary between the two classes 𝐶1 and 𝐶2 using single perception is given by :
\(x_1-x_2-0.5=0\)
\(-x_1-x_2-0.5=0\)
\(0.5(x_1+x_2)-1.5=0\)
\(x_1+x_2-0.5=0\)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 65
Consider a standard additive model consisting of rules of the form of
If \(𝑥\) is \(𝐴_𝑖\) AND \(𝑦\) is \(𝐵_𝑖\) THEN \(𝑧\) is \(𝐶_𝑖\).
Given crisp inputs \(𝑥=𝑥_0,𝑦=𝑦_0\) the output of the model is :
\(z=\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0) \mu_{C_i} (z)\)
\(z=\Sigma_i \mu_{A_i}(x_0) \mu_{B_i} (y_0)\)
\(z=\text{centroid } (\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0) \mu_{C_i} (z))\)
\(z=\text{centroid } (\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0)\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 66
A bell shaped membership function is specified by three parameters (𝑎,𝑏,𝑐) as follows:
\(\dfrac{1}{1+\bigg(\dfrac{x-c}{a} \bigg)^b} \\\)
\(\dfrac{1}{1+\bigg(\dfrac{x-c}{a} \bigg)^{2b}} \\\)
\(1+\bigg(\dfrac{x-c}{a}\bigg)^b \\\)
\(1+\bigg(\dfrac{x-c}{a} \bigg)^{2b}\)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 67
Which of the following is/are the principle components of a memory-tube display?
(a) Flooding gun (b) Collector
(c) Phosphorus grains (d) Ground
Codes :
(a) and (b)
(c) only
(d) only
All the above
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 68
Which of the following steps is/are not required for analog to digital conversion?
(a) Sensing (b) Conversion
(c) Amplification (d) Conditioning
(e) Quantization
Codes :
(a) and (b)
(c) and (d)
(a), (b) and (e)
None of the above
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 69
Which raster locations would be chosen by Bresenham's algorithm when scan converting a line from (1,1) to (8,5)?
\(\begin{array}{|c|c|} \hline x & y \\ \hline 1 & 1 \\ 2 & 2 \\ 3 & 3 \\ 4 & 3 \\ 5 & 4 \\ 6 & 4 \\ 7 & 5 \\ 8 & 6 \\ \hline \end{array}\)
\(\begin{array}{|c|c|} \hline x & y \\ \hline 1 & 1 \\ 2 & 2 \\ 3 & 2 \\ 4 & 3 \\ 5 & 4 \\ 6 & 5 \\ 7 & 6 \\ 8 & 7 \\ \hline \end{array}\)
\(\begin{array}{|c|c|} \hline x & y \\ \hline 1 & 1 \\ 2 & 2 \\ 3 & 2 \\ 4 & 3 \\ 5 & 3 \\ 6 & 4 \\ 7 & 4 \\ 8 & 5 \\ \hline \end{array}\)
\(\begin{array}{|c|c|} \hline x & y \\ \hline 1 & 1 \\ 2 & 2 \\ 3 & 2 \\ 4 & 3 \\ 5 & 5 \\ 6 & 4 \\ 7 & 5 \\ 8 & 5 \\ \hline \end{array}\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 70
Consider a unit square centered at origin. The coordinates at the square are translated by a factor \(\biggr( \dfrac{1}{2}, 1 \biggl)\) and rotated by an angle of 90∘. What shall be the coordinates of the new square ?
\(\biggr(\dfrac{-1}{2},0 \biggl), \biggr( \dfrac{-1}{2},1 \biggl),\biggr( \dfrac{-3}{2},1 \biggl),\biggr( \dfrac{-3}{2},0 \biggl) \\\)
\(\biggr( \dfrac{-1}{2},0 \biggl), \biggr( \dfrac{1}{2},1 \biggl),\biggr( \dfrac{3}{2},1 \biggl), \biggr( \dfrac{3}{2},0 \biggl) \\\)
\(\biggr( \dfrac{-1}{2},0 \biggl), \biggr( \dfrac{1}{2},0 \biggl),\biggr( \dfrac{-3}{2},1 \biggl), \biggr( \dfrac{-3}{2},0 \biggl) \\\)
\(\biggr( \dfrac{-1}{2},0 \biggl), \biggr( \dfrac{1}{2},1 \biggl),\biggr( \dfrac{-3}{2},1 \biggl), \biggr( \dfrac{-3}{2},0 \biggl)\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 71
Which of the following is/are the components of a CRT?
(a) Electron Gun
(b) Control Electrode
(c) Focusing Electrode
(d) Phosphor Coated Screen
Codes :
(a) and (d)
(a), (b) and (d)
(a), (b), (c) and (d)
(a), (c) and (d)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 72
Which one of the following statements is incorrect ?
Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management.
Reliability of a software specifies the probability of failure-free operation of that software for a given time duration.
The reliability of a system can also be specified as the Mean Time To Failure (MTTF).
In white-box testing, the test cases are decided from the specifications or the requirements.
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 73
Consider Language \(𝐴\) defined over the alphabet \(Σ=\{0,1\}\) as
\(A=\{0^{\lfloor n/2 \rfloor} 1^n :n>=0 \}\)
The expression \(⌊𝑛/2⌋\) means the floor of \(𝑛/2\), or what you get by rounding \(𝑛/2\) down to the nearest integer.
Which of the following is not an example of a string in \(𝐴\) ?
011
0111
0011
001111
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 74
Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ?
“Requirement validation” is one of the activities in the requirements phase.
“Prototyping” is one of the methods for requirement analysis.
“Modelling-oriented approach” is one of the methods for specifying the functional specifications.
“Function points” is one of the most commonly used size metric for requirements.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 75
__________ tag is an extension to HTML that can enclose any number of Javascript statements.
<SCRIPT>
<BODY>
<HEAD>
<TITLE>
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0