Question : 1
How many different equivalence relations with exactly three different equivalence classes are there on a set with five elements ?
10
15
25
30
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 2
The number of different spanning trees in complete graph, K4 and bipartite graph, K2, 2 have ______ and _______ respectively.
14, 14
16, 14
16, 4
14, 4
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 3
Suppose that R1 and R2 are reflexive relations on a set A.
Which of the following statements is correct ?
R1 ∩ R2 is reflexive and R1 ∪ R2 is irreflexive.
R1 ∩ R2 is irreflexive and R1 ∪ R2 is reflexive.
Both R1 ∩ R2 and R1 ∪ R2 are reflexive.
Both R1 ∩ R2 and R1 ∪ R2 are irreflexive.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 4
There are three cards in a box. Both sides of one card are black, both sides of one card are red, and the third card has one black side and one red side. We pick a card at random and observe only one side.
What is the probability that the opposite side is the same colour as the one side we observed ?
3/4
2/3
1/2
1/3
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 5
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph. How many cliques are there in the graph shown below ?
2
4
5
6
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 6
Which of the following logic expressions is incorrect ?
1 ⊕ 0 = 1
1 ⊕ 1 ⊕ 1 = 1
1 ⊕ 1 ⊕ 0 = 1
1 ⊕ 1 = 0
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 7
The IEEE-754 double-precision format to represent floating point numbers, has a length of _____ bits.
16
32
48
64
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 8
Simplified Boolean equation for the following truth table is :
\(\begin{array}{|c|c|c|c|}\hline x & y & z & F \\ \hline \text{0} & \text{0} & \text{0} & \text{0} \\ \hline \text{0} & \text{0} & \text{1} & \text{1} \\ \hline \text{0} & \text{1} & \text{0} & \text{0} \\ \hline \text{0} & \text{1} & \text{1} & \text{1} \\ \hline \text{1} & \text{0} & \text{0} & \text{1} \\ \hline \text{1} & \text{0} & \text{1} & \text{0} \\ \hline \text{1} & \text{1} & \text{0} & \text{1} \\ \hline \text{1} & \text{1} & \text{1} & \text{0} \\ \hline \end{array}\)
\(F=y \bar{z}+\bar{y}z\)
\(F=x \bar{y}+\bar{x}y\)
\(F=\bar{x}z+x\bar{z}\)
\(F=\bar{x}z+x\bar{z}+xyz\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 9
The simplified form of the Boolean equation \((A\bar{B}+A\bar{B}+AC)(\bar{A}\bar{C}+\bar{B})\) is
\(A\bar{B}\)
\(A\bar{B}C\)
\(\bar{A}B\)
\(ABC\)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 10
In a positive-edge-triggered JK flip-flop, if J and K both are high then the output will be _____ on the rising edge of the clock.
No change
Set
Reset
Toggle
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 11
Given i = 0, j = 1, k = –1
x = 0.5, y = 0.0
What is the output of the following expression in C language ?
x * y < i + j || k
- 1
0
1
2
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 12
The following statement in ‘C’
int (*f())[ ];
declares
a function returning a pointer to an array of integers.
a function returning an array of pointers to integers.
array of functions returning pointers to integers.
an illegal statement.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 13
Which one of the following is correct, when a class grants friend status to another class ?
The member functions of the class generating friendship can access the members of the friend class.
All member functions of the class granted friendship have unrestricted access to the members of the class granting the friendship.
Class friendship is reciprocal to each other.
There is no such concept.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 14
When a method in a subclass has the same name and type signatures as a method in the superclass, then the method in the subclass _____ the method in the superclass.
Overloads
Friendships
Inherits
Overrides
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 15
What is the value returned by the function f given below when n = 100 ?
let f(int n)
{ if (n==0) then return n;
else
return n+f(n-2);
}
2550
2556
5220
5520
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 16
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as :
Referential integrity
Multi-valued dependency
Entity Integrity
Functional dependency
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 17
Which of the following statement(s) is/are FALSE in the context of Relational DBMS ?
I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data in the database.
II. E-R diagrams are useful to logically model concepts.
III. An update anomaly is when it is not possible to store information unless some other, unrelated information is stored as well.
IV. SQL is a procedural language.
I and IV only
III and IV only
I, II and III only
II, III and IV only
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 18
In a relational database model, NULL values can be used for all but which one of the following ?
To allow duplicate tuples in the table by filling the primary key column(s) with NULL.
To avoid confusion with actual legitimate data values like 0 (zero) for integer columns and ’’ (the empty string) for string columns.
To leave columns in a tuple marked as ’’unknown’’ when the actual value is unknown.
To fill a column in a tuple when that column does not really ”exist” for that particular tuple.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 19
Consider the following two commands C1 and C2 on the relation R from an SQL database :
C1 : drop table R;
C2 : delete from R;
Which of the following statements is TRUE ?
I. Both C1 and C2 delete the schema for R.
II. C2 retains relation R, but deletes all tuples in R.
III. C1 deletes not only all tuples of R, but also the schema for R.
I only
I and II only
II and III only
I, II and III
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 20
Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table :
I : {B} II : {B, C} III : {A, D} IV : {C, D}
If different symbols stand for different values in the table (e.g., d1 is definitely not equal to d2), then which of the above could not be the candidate key for the database table ?
I and III only
III and IV only
II only
I only
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 21
Consider the following binary search tree :
If we remove the root node, which of the node from the left subtree will be the new root ?
11
12
13
16
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 22
Consider the following operations performed on a stack of size 5 :
Push (a); Pop() ; Push(b); Push(c); Pop();
Push(d); Pop();Pop(); Push (e)
Which of the following statements is correct ?
Underflow occurs
Stack operations are performed smoothly
Overflow occurs
None of the above
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 23
Suppose you are given a binary tree with n nodes, such that each node has exactly either zero or two children. The maximum height of the tree will be
\(\frac n 2 - 1\)
\(\frac n 2 + 1\)
\((n - 1) / 2\)
\((n + 1) / 2\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 24
Which of the following is not an inherent application of stack ?
Implementation of recursion
Evaluation of a postfix expression
Job scheduling
Reverse a string
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 25
In how many ways can the string
A ∩ B – A ∩ B – A
be fully parenthesized to yield an infix expression ?
15
14
13
12
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 26
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ?
100 Kbps
200 Kbps
400 Kbps
1000 Kbps
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 27
In a fully-connected mesh network with 10 computers, total ______ number of cables are required and ______ number of ports are required for each device.
40, 9
45, 10
45, 9
50, 10
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 28
In TCP/IP Reference model, the job of _______ layer is to permit hosts to inject packets into any network and travel them independently to the destination.
Physical
Transport
Application
Host-to-network
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 29
If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be :
\(N\)
\((N - 1)\)
\(\frac {N(N - 1)} {2}\)
\(\frac {N(N + 1)} {2}\)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 30
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ________ the critical angle.
equal to
less than
greater than
less than or equal to
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 31
The number of strings of length 4 that are generated by the regular expression (0|∈)1+2* (3|∈), where | is an alternation character, {+, *} are quantification characters, and ∈ is the null string, is :
08
10
11
12
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 32
The content of the accumulator after the execution of the following 8085 assembly language program, is :
MVI A, 42H
MVI B, 05H
UGC: ADD B
DCR B
JNZ UGC
ADI 25H
HLT
82 H
78 H
76 H
47 H
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 33
In _______, the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other.
Loop unrolling
Strength reduction
Loop concatenation
Loop jamming
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 34
Which of the following is not typically a benefit of dynamic linking ?
I. Reduction in overall program execution time.
II. Reduction in overall space consumption in memory.
III. Reduction in overall space consumption on disk.
IV. Reduction in the cost of software updates.
I and IV
I only
II and III
IV only
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 35
Which of the following is FALSE ?
The grammar S → a Sb |bSa|SS|∈, where S is the only non-terminal symbol and ∈ is the null string, is ambiguous.
SLR is powerful than LALR.
An LL(1) parser is a top-down parser.
YACC tool is an LALR(1) parser generator.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 36
Consider the reference string
0 1 2 3 0 1 4 0 1 2 3 4
If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are _______ and ______ respectively.
10, 9
9, 9
10, 10
9, 10
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 37
Suppose there are four processes in execution with 12 instances of a Resource R in a system.
The maximum need of each process and current allocation are given below :
With reference to current allocation, is system safe ? If so, what is the safe sequence ?
No
Yes, P1P2P3P4
Yes, P4P3P1P2
Yes, P2P1P3P4
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 38
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are :
98, 37, 14, 124, 65, 67
320
322
321
319
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 39
In UNIX, _________ creates three subdirectories : ‘PIS’ and two subdirectories ‘progs’ and ‘data’ from just created subdirectory ‘PIS’.
mkdir PIS/progs PIS/data PIS
mkdir PIS progs data
mkdir PIS PIS/progs PIS/data
mkdir PIS/progs data
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 40
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler reevaluates the process priority for every ‘T’ time units and decides next process to be scheduled. If the process have no I/O operations and all arrive at time zero, then the scheduler implements _________ criteria.
Priority scheduling
Round Robin Scheduling
Shortest Job First
FCFS
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 41
If \(S_1\) is total number of modules defined in the program architecture, \(S_3\) is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is :
\(1 + \frac {s_3} {s_1}\)
\(1 - \frac {s_3} {s_1}\)
\(1 + \frac {s_1} {s_3}\)
\(1 - \frac {s_1} {s_3}\)
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 42
The ________ model is preferred for software development when the requirements are not clear.
Rapid Application Development
Rational Unified Process
Evolutionary Model
Waterfall Model
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 43
Which of the following is not included in waterfall model ?
Requirement analysis
Risk analysis
Design
Coding
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 44
The cyclomatic complexity of a flow graph V(G), in terms of predicate nodes is :
(1) P + 1 (2) P – 1
(3) P – 2 (4) P + 2
Where P is number of predicate nodes in flow graph V(G).
(1)
(2)
(3)
(4)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 45
The extent to which a software tolerates the unexpected problems, is termed as :
Accuracy
Reliability
Correctness
Robustness
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 46
An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ______.
Masquerade Attack
Replay Attack
Passive Attack
Denial of Service Attack
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 47
Consider the following two statements :
(A) Business intelligence and Data warehousing is used for forecasting and Data mining.
(B) Business intelligence and Data warehousing is used for analysis of large volumes of sales data.
Which one of the following options is correct ?
(A) is true, (B) is false.
Both (A) and (B) are true.
(A) is false, (B) is true.
Both (A) and (B) are false.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 48
Pipelining improves performance by :
decreasing instruction latency
eliminating data hazards
exploiting instruction level parallelism
decreasing the cache miss rate
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 49
Consider the following two statements :
(A) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse.
(B) Data scrubling is a process of rejecting data from data warehouse to create indexes.
Which one of the following options is correct ?
(A) is true, (B) is false.
(A) is false, (B) is true.
Both (A) and (B) are false.
Both (A) and (B) are true.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 50
Given the following statements :
(A) Strategic value of data mining is timestamping.
(B) Information collection is an expensive process in building an expert system.
Which of the following options is correct ?
Both (A) and (B) are false.
Both (A) and (B) are true.
(A) is true, (B) is false.
(A) is false, (B) is true.
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0