Question : 1
Consider a sequence \(πΉ_{00}\) defined as :
\(F_{00}\left ( 0 \right )= 1, F_{00}\left ( 1 \right )= 1\\ F_{00}\left ( n \right )= \frac{10 * F_{00}\left ( n-1 \right )+100}{F_{00}\left ( n-2 \right )} \text{ for }n\geq 2 \\\)
Then what shall be the set of values of the sequence \(πΉ_{00}\) ?
(1,110,1200)
(1,110,600,1200)
(1,2,55,110,600,1200)
(1,55,110,600,1200)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 2
Match the following :
\(\begin{array}{llll} & \textbf{List β I} & {} & \textbf{List β II} \\ \text{a.} & \text{Absurd} & \text{i.} & \text{Clearly impossible being contrary to some evident truth.} \\ \text{b.} & \text{Ambiguous} & \text{ii.} & \text{Capable of more than one interpretation or meaning.} \\ \text{c.} & \text{Axiom} & \text{iii.} & \text{An assertion that is accepted and used without a proof.} \\ \text{d.} & \text{Conjecture} & \text{iv.}& \text{An opinion preferably based on some experience or wisdom.} \end{array}\)
Code :
a - (i), b - (ii), (c) - (iii), d - (iv)
a - (i), b - (iii), (c) - (iv), d - (ii)
a - (ii), b - (iii), (c) - (iv), d - (i)
a - (ii), b - (i), (c) - (iii), d - (iv)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 3
The functions mapping R into R are defined as :
\(f\left(x \right)=x^{3} - 4x, g\left(x \right)=\frac{1}{x^{2}+1}\)
Then find the value of the following composite functions :
\(h_{o}g\left(x \right)\) and \(h_{o}g_{o}f\left(x \right)\)
\(\left ( x^{2}+1 \right )^{4}\) and \(\left [ \left ( x^{3}-4x \right )^{2}+1 \right ]^{4}\)
\(\left ( x^{2}+1 \right )^{4}\) and \(\left [ \left ( x^{3}-4x \right )^{2}+1 \right ]^{-4}\)
\(\left ( x^{2}+1 \right )^{-4}\) and \(\left [ \left ( x^{2}-4x \right )^{2}+1 \right ]^{4}\)
\(\left ( x^{2}+1 \right )^{-4}\) and \(\left [ \left ( x^{3}-4x \right )^{2}+1 \right ]^{-4}\)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 4
How many multiples of 6 are there between the following pairs of numbers ?
0 and 100 and –6 and 34
16 and 6
17 and 6
17 and 7
16 and 7
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 5
Consider a Hamiltonian Graph \(G\) with no loops or parallel edges and with \(|V(G)| = n β₯ 3\). Then which of the following is true ?
\(\text{deg}\left ( v \right )\geq \frac{n}{2}\) for each vertex \(v\\\)
\(\left | E\left ( G \right ) \right |\geq \frac{1}{2}\left ( n-1 \right )\left ( n-2 \right )+2 \\\)
\(\text{deg}\left ( v \right )+\text{deg}\left ( w \right )\geq n\) whenever \(π£\) and \(π€\) are not connected by an edge
All of the above
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 6
In propositional logic if \( (P β Q) β§ (R β S)\) and \((P β¨ R)\) are two premises such that
\(\begin{array}{c} (P \to Q) \wedge (R \to S) \\ P \vee R \\ \hline Y \\ \hline \end{array}\)
\(Y\) is the premise :
\(πβ¨π \)
\(πβ¨π \)
\(πβ¨π \)
\(πβ¨π\)
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 7
ECL is the fastest of all logic families. High speed in ECL is possible because transistors are used in difference amplifier configuration, in which they are never driven into ____.
Race condition
Saturation
Delay
High impedance
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 8
A binary 3-bit down counter uses \(π½-πΎ\) flip-flops, \(πΉπΉ_πΒ \) with inputs \(π½_π,Β πΎ_π\) and outputs \(π_π,Β πΒ =Β 0,1,2\) respectively. The minimized expression for the input from following is :
\(I. \ \ π½_0=πΎ_0=0 \\ II. \ \ π½_0=πΎ_0=1 \\ III \ \ π½_1=πΎ_1=π0 \\ IV . \ J_{1} = K_{1} = \overline{Q}_{0} \\ V. \ \ π½_2=πΎ_2=π1π0 \\ VI. \ J_{2} = K_{2} =\overline{Q}_{1} \overline{Q}_{0}\)
I, III, V
I, IV, VI
II, III, V
II, IV, VI
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 9
Convert the octal number 0.4051 into its equivalent decimal number.
0.5100098
0.2096
0.52
0.4192
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 10
The hexadecimal equivalent of the octal number 2357 is :
2EE
2FF
4EF
4FE
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 11
Which of the following cannot be passed to a function in C++ ?
Constant
Structure
Array
Header file
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 12
Which one of the following is correct for overloaded functions in C++ ?
Compiler sets up a separate function for every definition of function.
Compiler does not set up a separate function for every definition of function.
Overloaded functions cannot handle different types of objects.
Overloaded functions cannot have same number of arguments.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 13
Which of the following storage classes have global visibility in C/C++ ?
Auto
Extern
Static
Register
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 14
Which of the following operators cannot be overloaded in C/C++ ?
Bitwise right shift assignment
Address of
Indirection
Structure reference
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 15
If X is a binary number which is power of 2, then the value of X & (X – 1) is :
11….11
00…..00
100…..0
000……1
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 16
An attribute A of datatype varchar (20) has value ‘Ram’ and the attribute B of datatype char (20) has value ‘Sita’ in oracle. The attribute A has _______ memory spaces and B has _______ memory spaces.
20, 20
3, 20
3, 4
20, 4
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 17
Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints ?
(A) An instructor Id. No. cannot be null, provided Intructor Id No. being primary key.
(B) No two citizens have same Adhar-Id.
(C) Budget of a company must be zero.
(A), (B) and (C) are true.
(A) false, (B) and (C) are true.
(A) and (B) are true; (C) false.
(A), (B) and (C) are false.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 18
Let M and N be two entities in an E-R diagram with simple single value attributes. R1 and R2 are two relationship between M and N, where as
R1 is one-to-many and R2 is many-to-many.
The minimum number of tables required to represent M, N, R1 and R2 in the relational model are _______.
4
6
7
3
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 19
Consider a schema R(MNPQ) and functional dependencies M → N, P → Q. Then the decomposition of R into R1 (MN) and R2 (PQ) is ________.
Dependency preserving but not lossless join
Dependency preserving and lossless join
Lossless join but not dependency preserving
Neither dependency preserving nor lossless join.
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 20
The order of a leaf node in a B+ tree is the maximum number of children it can have. Suppose that block size is 1 kilobytes, the child pointer takes 7 bytes long and search field value takes 14 bytes long. The order of the leaf node is ________.
16
63
64
65
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 21
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum element in a sorted array ?
Insertion – 0(1), Deletion – 0(1), Maximum – 0(1), Minimum – 0(l)
Insertion – 0(1), Deletion – 0(1), Maximum – 0(n), Minimum – 0(n)
Insertion – 0(n), Deletion – 0(n), Maximum – 0(1), Minimum – 0(1)
Insertion – 0(n), Deletion – 0(n), Maximum – 0(n), Minimum – 0(n)
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 22
The seven elements A, B, C, D, E, F and G are pushed onto a stack in reverse order, i.e., starting from G. The stack is popped five times and each element is inserted into a queue. Two elements are deleted from the queue and pushed back onto the stack. Now, one element is popped from the stack. The popped item is ________.
A
B
F
G
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 23
Which of the following is a valid heap ?
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 24
If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key x is less than _______.
1
1/n
1/m
n/m
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 25
Which of the following statements is false ?
Optimal binary search tree construction can be performed efficiently using dynamic programming.
Breadth-first search cannot be used to find connected components of a graph.
Given the prefix and postfix walks of a binary tree, the tree cannot be re-constructed uniquely.
Depth-first-search can be used to find the connected components of a graph.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 26
Match the following Layers and Protocols for a user browsing with SSL :
\(\begin{array}{clcl} \text{a.} & \text{Application of layer} & \text{i.} & \text{TCP} \\ \text{b.} & \text{Transport layer} & \text{ii.} & \text{IP} \\ \text{c.} & \text{Network layer} & \text{iii.} & \text{PPP} \\ \text{d.} & \text{Datalink layer} & \text{iv.} & \text{HTTP} \\ \end{array}\)
Codes :
a-iv, b-i, c-ii, d-iii
a-iii, b-ii, c-i, d-iv
a-ii, b-iii, c-iv, d-i
a-iii, b-i, c-iv, d-ii
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 27
The maximum size of the data that the application layer can pass on to the TCP layer below is __________.
216 bytes
216 bytes + TCP header length
216 bytes – TCP header length
215 bytes
Correct Answer : MTA
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 28
A packet whose destination is outside the local TCP/IP network segment is sent to _____.
File server
DNS server
DHCP server
Default gateway
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 29
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated _____.
automatically
by server
by exchanging information with neighbour nodes
with back up database
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 30
In link state routing algorithm after construction of link state packets, new routes are computed using :
DES algorithm
Dijkstra’s algorithm
RSA algorithm
Packets
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 31
Which of the following strings would match the regular expression : p+ [3 – 5]∗ [xyz] ?
I. p443y II. p6y
III. 3xyz IV. p35z
V. p353535x VI. ppp5
I, III and VI only
IV, V and VI only
II, IV and V only
I, IV and V only
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 32
Consider the following assembly language instructions :
mov al, 15
mov ah, 15
xor al, al
mov cl, 3
shr ax, cl
add al, 90H
adc ah, 0
What is the value in ax register after execution of above instructions ?
0270H
0170H
01E0H
0370H
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 33
Consider the following statements related to compiler construction :
I. Lexical Analysis is specified by context-free grammars and implemented by pushdown automata.
II. Syntax Analysis is specified by regular expressions and implemented by finite-state machine.
Which of the above statement(s) is/are correct ?
Only I
Only II
Both I and II
Neither I nor II
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 34
The contents of Register (BL) and Register (AL) of 8085 microprocessor are 49H and 3AH respectively. The contents of AL, the status of carry flag (CF) and sign flag (SF) after executing ‘SUB AL, BL’ assembly language instruction, are
AL = 0FH; CF = 1; SF = 1
AL = F0H; CF = 0; SF = 0
AL = F1H; CF = 1; SF = 1
AL = 1FH; CF = 1; SF = 1
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 35
Which of the following statement(s) regarding a linker software is/are true ?
I. A function of a linker is to combine several object modules into a single load module.
II A function of a linker is to replace absolute references in an object module by symbolic references to locations in other modules.
Only I
Only II
Both I and II
Neither I nor II
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 36
There are three processes P1 , P2 and P3 sharing a semaphore for synchronizing a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access the semaphore in following order :
(a) P2 needs to access
(b) P1 needs to access
(c) P3 needs to access
(d) P2 exits critical section
(e) P1 exits critical section
The final value of semaphore will be :
0
1
- 1
- 2
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 37
In a paging system, it takes 30 ns to search translation Look-a-side Buffer (TLB) and 90 ns to access the main memory. If the TLB hit ratio is 70%, the effective memory access time is :
48ns
147ns
120ns
84ns
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 38
Match the following w.r.t. Input/Output management :
\(\begin{array}{ll} &{\text{List β I}} & & {\text{List β II}} \\ \text{a.} & \text{Device controller} & \text{i.} & \text{Extracts information from the controller register and store it in data buffer} \\ \text{b.} & \text{Device driver} & \text{ii.} & \text{I/O scheduling} \\ \text{c.} & \text{Interrupt handler} & \text{iii.} & \text{Performs data transfer} \\ \text{d.} & \text{Kernel I/O subsystem} & \text{iv.} & \text{Processing of I/O request} \end{array}\)
Code :
a - (iii), b - (iv), c - (i), d -(ii)
a - (ii), b - (i), c - (iv), d -(iii)
a - (iv), b - (i), c - (ii), d -(iii)
a - (i), b - (iii), c - (iv), d -(ii)
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 39
Which of the following scheduling algorithms may cause starvation ?
a. First-come-first-served
b. Round Robin
c. Priority
d. Shortest process next
e. Shortest remaining time first
a, c and e
c, d and e
b, d and e
b, c and d
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 40
Distributed operating systems consist of :
Loosely coupled O.S. software on a loosely coupled hardware.
Loosely coupled O.S. software on a tightly coupled hardware.
Tightly coupled O.S. software on a loosely coupled hardware.
Tightly coupled O.S. software on a tightly coupled hardware.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 41
Software Engineering is an engineering discipline that is concerned with :
how computer systems work.
theories and methods that underlie computers and software systems.
all aspects of software production
all aspects of computer-based systems development, including hardware, software and process engineering.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 42
Which of the following is not one of three software product aspects addressed by McCall’s software quality factors ?
Ability to undergo change
Adaptiability to new environments
Operational characteristics
Production costs and scheduling
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 43
Which of the following statement(s) is/are true with respect to software architecture ?
S1 : Coupling is a measure of how well the things grouped together in a module belong together logically.
S2 : Cohesion is a measure of the degree of interaction between software modules.
S3 : If coupling is low and cohesion is high then it is easier to change one module without affecting others.
Only S1 and S2
Only S3
All of S1, S2 and S3
Only S1
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 44
The prototyping model of software development is :
a reasonable approach when requirements are well-defined.
a useful approach when a customer cannot define requirements clearly.
the best approach to use for projects with large development teams.
a risky model that rarely produces a meaningful product.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 45
A software design pattern used to enhance the functionality of an object at run-time is :
Adapter
Decorator
Delegation
Proxy
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 46
Match the following :
\(\begin{array}{clcl} & \textbf{List-I} & {} & \textbf{List-II} \\ \text{a.} & \text{Affiliate Marketing} & \text{i.} & \text{Vendors ask partners to place logos on}\\&&& \text{partnerβs site. If customers click, come to} \\&&& \text{vendors and buy.} \\ \text{b.} & \text{Viral Marketing} & \text{ii.} & \text{Spread your brand on the net by} \\ &&& \text{word-of-mouth. Receivers will send} \\ &&& \text{your information to their friends.} \\ \text{c.} & \text{Group Purchasing} & \text{iii.} & \text{Aggregating the demands of small buyers} \\ &&& \text{to get a large volume. Then negotiate a price.} \\ \text{d.} & \text{Bartering Online} & \text{iv.}& \text{Exchanging surplus products and services} \\ &&& \text{with the process administered completely} \\ &&& \text{online by an intermediary. Company receives} \\&&& \text{βpointsβ for its contribution.} \\ \end{array}\)
Codes :
a-i, b-ii, c-iii, d-iv
a-i, b-iii, c-ii, d-iv
a-iii, b-ii, c-iv, d-i
a-ii, b-iii, c-i, d-iv
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 47
________ refers loosely to the process of semi-automatically analyzing large databases to find useful patterns.
Datamining
Data warehousing
DBMS
Data mirroring
Correct Answer : A
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 48
Which of the following is/are true w.r.t. applications of mobile computing ?
(A) Travelling of salesman
(B) Location awareness services
(A) true; (B) false.
Both (A) and (B) are true.
Both (A) and (B) are false.
(A) false; (B) true.
Correct Answer : B
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 49
In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation required for W-CDMA is _______.
2 MHz
20 KHz
5 KHz
5 MHz
Correct Answer : D
Question Type : MCQ
Max Marks : 2
Negative Marks : 0
Question : 50
Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP) ?
(A) ERP automates and integrates majority of business processes.
(B) ERP provides access to information in a Real Time Environment.
(C) ERP is inexpensive to implement.
(A), (B) and (C) are false.
(A) and (B) false; (C) true.
(A) and (B) true; (C) false.
(A) true ; (B) and (C) are false.
Correct Answer : C
Question Type : MCQ
Max Marks : 2
Negative Marks : 0