Professional Documents
Culture Documents
1.
For the 8-bit word 00111001, the check bits stored with it would be 0111. Suppose
when the word is read from memory, the check bits are calculated to be 1101.What
is the data word that was read from memory?
A.
10011001
B.
00011001
C.
00111000
D.
11000110
View/Hide
Ans
Correct Answer is B
Explanatio
n
2.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanatio
n
Since minimum bus cycle duration = 4 clock cycles and bus clock = 8 MHz
Then, maximum bus cycle rate = 8 M / 4 = 2 M/s
Data transferred per bus cycle = 16 bit = 2 bytes
Data transfer rate per second = bus cycle rate * data per bus cycle = 2 M *
2 = 4 Mbytes/sec. = 4 x 106 bytes / sec
3.
A.
CALL 0010 H
B.
CALL 0034 H
C.
CALL 0038 H
D.
CALL 003C H
View/Hide
Ans
Correct Answer is C
Explanatio
n
4.
A.
FADED
B.
AEOBE
C.
ADOBE
D.
ACABE
View/Hide
Correct Answer is C
Ans
Explanatio
n
5.
The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an
average for executing an instruction. The fifty percent of the cycles use memory
bus. A memory read/write employs one machine cycle. For execution of the
programs, the system utilizes 90 percent of the CPU time. For block data transfer,
an IO device is attached to the system while CPU executes the background
programs continuously. What is the maximum IO data transfer rate if programmed
IO data transfer technique is used?
A.
500 Kbytes/sec
B.
2.2 Mbytes/sec
C.
125 Kbytes/sec
D.
250 Kbytes/sec
View/Hide
Ans
Correct Answer is D
Explanatio
n
6.
A.
B.
C.
27
D.
11
View/Hide
Ans
Correct Answer is B
Explanatio
n
7.
Let E1 and E2 be two entities in E-R diagram with simple single valued attributes.
R1 and R2 are two relationships between E1 and E2 where R1 is one-many and R2
is many - many. R1 and R2 donot have any attributes of their own. How many
minimum number of tables are required to represent this situation in the relational
model ?
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanatio
n
8.
A.
the average marks of male students is more than the average marks of the
students in the same department
B.
The average marks of male students is more than the average marks of the
students in the university
C.
The average marks of male students is more than the average marks of male
students in the university
D.
The average marks of students is more than the average marks of male students in
the university
View/Hide
Ans
Correct Answer is D
Explanatio
n
9.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanatio
n
10.
The relation vendor order (v_no, v_ord_no, v_name, qty_sup, unit_price) is in 2NF
because :
A.
Non key attribute V_name is dependent on V_no which is part of composite key
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanatio
n
In the above question option C and Option d rejected as unit price cannot
serve as primary key. option B is also irrelevant as qty_sup has no concern
with v_name. so option A seems to be the best answer
ne 2015
Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015
11.
A.
R1R2-->(R1-R2)
B.
R1-->R2
C.
R1R2-->(R2-R1)
D.
R2-->R1R2
View/Hide
Ans
Correct Answer is C
Explanation
12.
In the index allocation scheme of blocks to a file, the maximum possible size of the
file depends on
A.
The number of blocks used for the index, and the size of the index
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
When indexes are created, the maximum no. of blocks given to a file are totally
dependent upon size of the index which tells how many blocks can be there, &
size of each block.
13.
Give the number of principal vanishing point (s) along with their direction for the
standard perspective transformation :
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
In this case the view plane normal N is vector K. since N.I =0 and N.J=0, so
there are no vanishing points in the direction I and J. on the other hand N.K =
K.K = 1. thus there is only one principal vanishing point and it is in K direction
14.
Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated
by 45 degrees about a point P( -1, -1). The co-ordinates of the new triangle obtained
after rotation shall be
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
because the rotation is not about origin, translate the point of rotation to origin
and apply similiar translation to all other points
A translates to (1,1), B translates to (2,2) and C translates to (6,3).
Apply rotation on A(45 degrees) about origin. resulting in option A as answer.
15.
The process of dividing an analog signal into a string of discrete outputs, each of
constant amplitude is called
A.
Strobing
B.
Amplification
C.
Conditioning
D.
Quantization
View/Hide
Ans
Correct Answer is D
Explanation
16.
A.
POLYLINE
B.
POLYDRAW
C.
FILL AREA
D.
POLYMARKER
View/Hide
Ans
Correct Answer is B
Explanation
17.
A.
Mapping the co-ordinates of the points and lines that form the picture into
appropriate co-ordinates on the device or workstation is known as viewing
transformation.
B.
The right handed cartesian co-ordinate system in whose coordinates we describe the
picture is known as world coordinate system.
C.
The co-ordinate system that corresponds to the device or workstation where the
image is to be displayed is known as physical device co-ordinate system.
D.
Left-handed co-ordinate system in which the display area of the virtual display
device corresponds to the unit(|x|) square whose lower left handed corner is at origin
of the co-ordinate system, is known as normalized device co-ordinate system.
View/Hide
Ans
Correct Answer is D
Explanation
18.
List-I
List-II
Flood Gun
Collector
Ground
Phosphorus
Grains
Writing Gun
System
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
19.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
20.
A.
(1 + 01)*(10 + 01)
B.
(1 + 01)*01
C.
(1 + 01)*(1 + 01)
D.
(10 + 01)* 01
View/Hide
Ans
Correct Answer is C
Explanation
The transition function for the language L = {w|na(w) and nb(w) are both odd} is given
by:
(q0, a) = q1
(q0, b) = q2
(q1, a) = q0
(q1, b) = q3
(q2, a) = q3
(q2, b) = q0
(q3, a) = q2
(q3, b) = q1
21.
q0 and q0 respectively
B.
q0 and q1 respectively
C.
q0 and q2 respectively
D.
q0 and q3 respectively
View/Hide
Ans
Correct Answer is D
Explanation
Draw the Transition diagram and you will find the result.
22.
A.
ABCD
B.
A B C D true
C.
A B C D true
D.
A B C D false
View/Hide
Ans
Correct Answer is A
Explanation
23.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
Prolog is not a strongly typed language, and in fact variables in predicates are not typerestricted in any way. This means that there is a danger of procedures being called with
unsuitable parameter values. With a strongly typed language (Pascal, for example) if a
procedure is called with too many or the wrong type of argument values, the
implementation would automatically flag a type mismatch at or before run-time, and
the user would be aware of and could pin-point the error. In Prolog the run-time
behaviour in this case would be unpredictable, and the error would be difficult to detect
and fix.
24.
A.
B.
C.
if we resolve a negated goal G against a fact or rule A to get Clause C then C has
positive literal and non null goal.
D.
if we resolve a negated goal G against a fact or rule A to get clause C then C has
positive literal or null goal.
View/Hide
Ans
Correct Answer is B
Explanation
A Horn clause is a clause (a disjunction of literals) with at most one positive, i.e.
unnegated, literal.
Conversely, a disjunction of literals with at most one negated literal is called a dualHorn clause.
A Horn clause with exactly one positive literal is a definite clause; a definite clause
with no negative literals is sometimes called a fact; and a Horn clause without a
positive literal is sometimes called a goal clause (note that the empty clause consisting
of no literals is a goal clause).
Now, if resolution is restricted to Horn clauses, some interesting properties appear.
Some of these are evident; others I will just state and you can take on faith.
I. If you resolve Horn clauses A and B to get clause C, then the positive literal of A will
resolve against a negative literal in B, so the only positive literal left in C is the one
from B (if any). Thus, the resolvent of two Horn clauses is a Horn clause.
II. If you resolve a negated goal G against a fact or rule A to get clause C, the positive
literal in A resolves against a negative literal in G. Thus C has no positive literal, and
thus is either a negated goal or the null clause.
III. Therefore: Suppose you are trying to prove Phi from Gamma, where ~Phi is a
negated goal, and Gamma is a knowledge base of facts and rules. Suppose you use the
set of support strategy, in which no resolution ever involves resolving two clauses from
Gamma together. Then, inductively, every resolution combines a negated goal with a
fact or rule from Gamma and generates a new negated goal.
25.
Which transmission technique guarantees that data packets will be received by the
receiver in the same order in which they were sent by the sender ?
A.
Broadcasting
B.
Unicasting
C.
Packet Switching
D.
Circuit Switching
View/Hide
Ans
Correct Answer is D
Explanation
26.
Which of the following control fields in TCP header is used to specify the sender has
no more data to transmit ?
A.
FIN
B.
RST
C.
SYN
D.
PSH
View/Hide
Ans
Correct Answer is A
Explanation
FIN: No more data from the sender. Receiving a TCP segment with the FIN flag does
not mean that transferring data in the opposite direction is not possible.
RST: Reset the connection. The RST bit is used to RESET the TCP connection due to
unrecoverable errors.
SYN: This flag means synchronize sequence numbers. Source is beginning a new
counting sequence.
PSH: This flag means Push function. Using this flag, TCP allows a sending application
to specify that the data must be pushed immediately.
27.
A.
B.
C.
D.
View/Hide
Correct Answer is B
Ans
Explanation
28.
A.
CTTOEWMROPNRUEK
B.
MROUEKCTTPNROEW
C.
OEWPNRCTTUEKMRO
D.
UEKPNRMROOEWCTT
View/Hide
Ans
Correct Answer is C
Explanation
29.
Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice
signal. It is required to sample the signal at twice the highest frequency(two samples
per hertz). what is the bit rate required, if it is assumed that each sample requires 8
bits ?
A.
32 kbps
B.
64 kbps
C.
128 kbps
D.
256 kbps
View/Hide
Ans
Correct Answer is C
Explanation
A.
65535
B.
65515
C.
65495
D.
65475
View/Hide
Ans
Correct Answer is C
Explanation
Each segment, including the TCP header, must fit in the 65515 byte IP payload, and the
TCP header is 20 bytes at least, so the maximum payload of a TCP segment is 6551520=65495 bytes.
ne 2015
Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015
31.
A.
Dijkstra' algorithm
B.
Bellman-Ford algorithm
C.
Kruskal Algorithm
D.
Floyd-Warshall algorithm
View/Hide
Ans
Correct Answer is D
Explanation
The Dijsktra algrithm solves the Single-Source Shortest Paths (SSSP) problem.
The BellmanFord algorithm is an algorithm that computes shortest paths
from a single source vertex to all of the other vertices in a weighted digraph. It is
slower than Dijkstra's algorithm for the same problem, but more versatile, as it
is capable of handling graphs in which some of the edge weights are negative
numbers.
Kruskal algorithm is a minimum-spanning-tree algorithm where the algorithm
finds an edge of the least possible weight that connects any two trees in the
forest.It is a greedy algorithm in graph theory as it finds a minimum spanning
tree for a connected weighted graph adding increasing cost arcs at each step.
The Floyd Warshal algorithm takes the dynamic programming approach. This
essentially means that independent sub-problems are solved and the results are
stored for later use. The algorithm allows negative edges, but no negative cycles,
as per usual with such shortest path problems.
32.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
33.
A.
lg(lg*n)
B.
lg*(lg n)
C.
lg(n!)
D.
lg*(n!)
View/Hide
Ans
Correct Answer is A
Explanation
34.
Consider a hash table of size m=100 and the hash function h(k) = floor(m(kA mod 1))
for A = (5 1)/2 = 0.618033. Compute the location to which the key k = 123456 is
placed in hash table.
A.
77
B.
82
C.
88
D.
89
View/Hide
Ans
Correct Answer is C
Explanation
35.
Let f(n) and g(n) be asymptotically non-negative functions. which of the following is
correct ?
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
36.
A.
B.
zh
C.
ceil(n/zh)
D.
ceil(n/zh + 1)
View/Hide
Ans
Correct Answer is D
Explanation
37.
A.
Private
B.
Protected
C.
Public
D.
Friend
View/Hide
Ans
Correct Answer is C
Explanation
Interfaces are meant to define the public API of a type - and only that, not its
implementation. So any method (or static member) you define in an interface is
by definition public.
38.
The Servlet Response interface enables a servlet to formulate a response for a client
using the method ______
A.
B.
Void destroy()
C.
int getServerPort()
D.
View/Hide
Ans
Correct Answer is D
Explanation
39.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
A.
+*!
B.
#*!
C.
+*?
D.
-*?
View/Hide
Ans
Correct Answer is C
Explanation
41.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
42.
A.
Inheritance
B.
Polymorphism
C.
Encapsulation
D.
Abstraction
View/Hide
Ans
Correct Answer is C
Explanation
43.
Verification :
A.
B.
C.
D.
both 1 and 2
View/Hide
Ans
Correct Answer is D
Explanation
44.
A.
Consistency
B.
Conciseness
C.
Efficiency
D.
Accuracy
View/Hide
Ans
Correct Answer is B
Explanation
45.
A.
Requirements validation
B.
Requirements elicitation
C.
Feasibility Study
D.
Requirement reviews
View/Hide
Ans
Correct Answer is B
Explanation
46.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
47.
A.
Top-down Approach
B.
C.
Process of elaboration
D.
View/Hide
Ans
Correct Answer is D
Explanation
48.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
49.
Match the following for operating system techniques with the most
appropriate advantage :
List-I
List-II
(a) Spooling
(b) Mult
iprogramming
Distributed
Computing
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
50.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
e 2015
Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015
51.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
52.
A.
B.
C.
Starvation Problem
D.
Synchronization Primitive
View/Hide
Ans
Correct Answer is B
Explanation
53.
In ______ allocation method for disk block allocation in a file system, insertion and
deletion of blocks in a file is easy.
A.
Index
B.
Linked
C.
Contiguous
D.
Bit Map
View/Hide
Ans
Correct Answer is A
Explanation
54.
A.
Regular file
B.
Directory File
C.
Device File
D.
View/Hide
Ans
Correct Answer is D
Explanation
Match the following :
55.
List-I
List-II
(a) Intelligence
(b) Knowledge
(c) Information
(iii) Judgemental
(d) Data
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
74.
WOW32 is a
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
75.
A.
B.
Both files i.e File1 and file2 can be edited using "ex" command to travel between files
C.
Both files can be edited using the "mv" command to move between the files
D.
View/Hide
Ans
Correct Answer is B
Explanation
When you first invoke vi, you can name more than one file to edit, and then use
ex commands to travel between the files.
$ vi file1 file2
invokes file1 first. After you have finished editing the first file, the ex
command :w writes (saves) file1 and :n calls in the next file (file2).
B) Interactive lecture
C) Group work
D) Self studyA.(A), (B) and (C)B.(A), (B), (C) and (D)C.(B), (C) and (D)D.(A), (B) and
(D)View/Hide Ans
Correct Answer is B
Explanation5.Achievement tests are commonly used for the purpose ofA.Making selections for a
specific jobB.Selecting candidates for a courseC.Identifying strengths and weaknesses of
learnersD.Assessing the amount of learning after teachingView/Hide Ans
Correct Answer is D
Explanation
6.A good teacher is one whoA.gives useful informationB.explains concepts and
principlesC.gives printed notes to studentsD.inspires students to learnView/Hide Ans
Correct Answer is D
Explanation7.Which of the following statements regarding the meaning of research are correct
1) Research refers to a series of systematic activity or activities undertaken to find out the
solution of a problem
2) It is a systematic, logical and an unbiased process wherein verification of hypothesis data
analysis, interpretation and formation of principles can be done
3) It is an intellectual enquiry or quest towards truth
4) It leads to enhancement of knowledge
A.(a), (b) and (c)B.(b), (c) and (d)C.(a), (c) and (d)D.(a), (b), (c) and (d)View/Hide Ans
Correct Answer is D
Explanation
8.A good thesis writing should involve
1) reduction of punctuation and grammatical errors to a minimum
2) careful checking of references
3) consistency in the way the thesis is written
4) a clear and well written abstract
A.(a), (b), (c) and (d)B.(a), (b) and (c)C.(a), (b) and (d)D.(b), (c) and (d)View/Hide Ans
Correct Answer is A
Explanation9.Jean Piaget gave a theory of cognitive development of humans on the basis of
hisA.Fundamental researchB.applied researchC.Action researchD.Evaluation
ResearchView/Hide Ans
Correct Answer is A
Explanation
10."Male and female students perform equally well in a numerical aptitude test."
This statement indicates aA.research hypothesisB.null hypothesisC.directional
hypothesisD.statistical hypothesisView/Hide Ans
Correct Answer is B
11.
A.
Historical research
B.
Descriptive Research
C.
Experimental Research
D.
View/Hide
Ans
Correct Answer is C
Explanation
12.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
13.
warnings : "Fail to act now and we are all doomed." Then there
are stories that indicate that all will be fine so long as we leave
everything upto a few especiallv able adults. Currently, this trend
is being led by those who call themselves "rational optimists".
They tend to claim that it is human nature to compete and to
succeed and also to profit at the expense of others. The rational
optimists however, do not realize how humanity has progressed
overtime through amiable social networks and how large groups
work in less selfishness and in the process accommodate rich and
poor, high and low alike. This aspect in story-telling is considered
by the 'Practical Possibles', who sit between those who say all is
fine and cheerful and be individualistic in your approach to a
successful future, and those who ordain pessimism and fear that
we are doomed.
What the future holds for us is which stories we hold on to and
how we act on them
Our knowledge is a collection of
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
14.
A.
an art
B.
a science
C.
in our genes
D.
View/Hide
Ans
Correct Answer is D
Explanation
15.
How the future will turn out to be, depends upon the stories
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
16.
Rational optimists :
1) Look for opportunities
2) Are sensible and cheerful
3) Are selfishly driven
A.
B.
(a) only
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
17.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
18.
A.
B.
are doom-mongers
C.
are self-centred
D.
View/Hide
Ans
Correct Answer is A
Explanation
19.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
20.
of information
A.
Both (A) and (R) are correct and (R) is correct explanation of (A)
B.
Both (A) and (R) are correct, but (R) is not correct explanation of
(A)
C.
D.
View/Hide
Ans
Correct Answer is D
21.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
22.
A.
Downward communication
B.
Informal communication
C.
Upward communication
D.
Horizontal communication
View/Hide
Ans
Correct Answer is B
Explanation
23.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
24.
A.
B.
Intrapersonal
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
25.
A.
83
B.
75
C.
78
D.
80
View/Hide
Ans
Correct Answer is B
Explanation
26.
A.
LEQIBP
B.
ELQBIP
C.
LEBIQP
D.
ELIPQB
View/Hide
Ans
Correct Answer is B
Explanation
27.
A.
10
B.
20
C.
15
D.
30
View/Hide
Ans
Correct Answer is C
Explanation
A.
Brother
B.
Uncle
C.
Nephew
D.
Son
View/Hide
Ans
Correct Answer is A
Explanation
29.
A.
6300
B.
6900
C.
7300
D.
7900
View/Hide
Ans
Correct Answer is A
Explanation
30.
A.
42
B.
48
C.
45
D.
50
View/Hide
Ans
Correct Answer is D
Explanation
31.
A.
Inductive
B.
Deductive
C.
Demonstrative
D.
Physiological
View/Hide
Ans
Correct Answer is D
Explanation
32.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
33.
A.
Integrity of nature
B.
Unity of nature
C.
Uniformity of nature
D.
Harmony of nature
View/Hide
Ans
Correct Answer is C
Explanation
34.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
35.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
36.
A.
Stipulative
B.
Theoretical
C.
Lexical
D.
Persuasive
View/Hide
Ans
Correct Answer is B
Explanation
37.
35 - 40 years
B.
40 - 45 years
C.
45 - 50 years
D.
50 - 55 years
View/Hide
Ans
Correct Answer is D
Explanation
38.
A.
20 PERC
B.
25 PERC
C.
30 PERC
D.
35 PERC
View/Hide
Ans
Correct Answer is B
Explanation
39.
A.
40.3 years
B.
38.6 years
C.
47.2 years
D.
45.3 years
View/Hide
Ans
Correct Answer is A
Explanation
40.
A.
45 PERC
B.
50 PERC
C.
35 PERC
D.
32 PERC
View/Hide
Ans
Correct Answer is A
41.
What is the average salary (in thousand per month) in the age
group 40 - 50 years
A.
35
B.
42.5
C.
40.5
D.
36.5
View/Hide
Ans
Correct Answer is B
Explanation
42.
A.
45 PERC
B.
50 PERC
C.
55 PERC
D.
47 PERC
View/Hide
Ans
Correct Answer is C
Explanation
43.
A.
Protection
B.
Detection
C.
Encryption
D.
Decryption
View/Hide
Ans
Correct Answer is C
Explanation
44.
A.
Printer
B.
Speaker
C.
Monitor
D.
Keyboard
View/Hide
Ans
Correct Answer is D
Explanation
45.
A.
Kilobyte
B.
Megabyte
C.
Gigabyte
D.
Terabyte
View/Hide
Ans
Correct Answer is C
Explanation
46.
A.
Internet Explorer
B.
Fedora Linux
C.
Open office
D.
View/Hide
Ans
Correct Answer is A
Explanation
47.
A.
10101
B.
01101
C.
11001
D.
11011
View/Hide
Ans
Correct Answer is C
Explanation
48.
A.
Altavista
B.
MAC
C.
Microsoft Office
D.
Google Talk
View/Hide
Ans
Correct Answer is D
Explanation
49.
A.
USA
B.
European Union
C.
China
D.
India
View/Hide
Ans
Correct Answer is A
Explanation
50.
A.
~ 3 PERC
B.
~ 6 PERC
C.
~ 10 PERC
D.
~ 15 PERC
View/Hide
Ans
Correct Answer is B
1.
A.
~8
B.
~ 16
C.
~ 32
D.
~ 64
View/Hide
Ans
Correct Answer is C
Explanation
52.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
53.
A.
Carbon monoxide
B.
C.
Ozone
D.
Chlorofluorocarbons
View/Hide
Ans
Correct Answer is D
Explanation
54.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
55.
A.
The President
B.
C.
D.
The Speaker of the Lok Sabha and the Chairman of the Rajya
Sabha
View/Hide
Ans
Correct Answer is A
Explanation
56.
A.
21st April
B.
24th April
C.
21st June
D.
7th July
View/Hide
Ans
Correct Answer is A
Explanation
57.
A.
Colombo
B.
Dhaka
C.
New Delhi
D.
Kathmandu
View/Hide
Ans
Correct Answer is C
Explanation
58.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
59.
A.
8 percent
B.
12 percent
C.
19 percent
D.
23 percent
View/Hide
Ans
Correct Answer is C
Explanation
60.
A.
08
B.
14
C.
27
D.
43
View/Hide
Ans
Correct Answer is D
1.
How many strings of 5 digits have the property that the sum of
their digits is 7?
A.
66
B.
330
C.
495
D.
99
View/Hide
Ans
Correct Answer is B
Explanation
2.
Consider an experiment of tossing two fair dice, one black and one
red. What is the probability that the number on the black die
divides the number on red die ?
A.
22 / 36
B.
12 / 36
C.
14 / 36
D.
6 / 36
View/Hide
Ans
Correct Answer is C
Explanation
3.
A.
1001
B.
3876
C.
775
D.
200
View/Hide
Ans
Correct Answer is A
Explanation
4.
Consider the following statements(a) Depth - first search is used to traverse a rooted tree.
(b) Pre - order, Post-order and Inorder are used to list the vertices
of an ordered rooted tree.
(c) Huffman's algorithm is used to find an optimal binary tree with
given weights.
(d) Topological sorting provides a labelling such that the parents
have larger labels than their children.
Which of the above statements are true ?
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
5.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
6.
A.
(a) only
B.
(b) only
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
7.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
8.
"lf my computations are correct and I pay the electric bill, then I
will run out of money. If I don't pay the electric biIl the power will
be turned off. Therefore, if I don't run out of money and the power
is still on then my computations are incorrect."
Convert this argument into logical notations using the vations,
electric bills, out of money and the power respectively. (Where
means NOT) ariables c, b, r, p for propositions of comput
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
Match the following:
9.
List - I
List - II
(a) (p q) (q p)
(i) Contrapositive
(c) (p q) [(p ? q) o]
(iv) Equivalence
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
10.
A.
(a) only
B.
(c) only
C.
D.
(b) only
View/Hide
Ans
Correct Answer is C
11.
A.
ABCDEFGH1000
B.
CDEFGH1000
C.
DDEFGHH1000
D.
DEFGH1000
View/Hide
Ans
Correct Answer is D
Explanation
12.
A.
constructor
B.
destructor
C.
data members
D.
virtual methods
View/Hide
Ans
Correct Answer is C
Explanation
13.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
14.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
15.
A.
inaccessible
B.
accessible
C.
protected
D.
public
View/Hide
Ans
Correct Answer is A
Explanation
16.
A.
B.
C.
D.
SELECT ASSERTION
View/Hide
Ans
Correct Answer is A
Explanation
17.
A.
B.
(a) only
C.
(b) only
D.
View/Hide
Ans
Correct Answer is C
Explanation
18.
A.
(a)
B.
C.
(d)
D.
View/Hide
Ans
Correct Answer is C
Explanation
19.
A.
(a)
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
20.
A.
Neighbour Set
B.
C.
D.
Weak Set
View/Hide
Ans
Correct Answer is B
Correct Answer is B
Explanation
22.
22: The inorder and preorder Traversal of binary Tree are dbeafcg
and abdecfg respectively.The post order traversal is ------
A.
dbefacg
B.
debfagc
C.
dbefcga
D.
debfgca
View/Hide
Ans
Correct Answer is D
Explanation
23.
A.
B.
C.
Root search
D.
Deep search
View/Hide
Ans
Correct Answer is A
Explanation
24.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
25.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
26.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
Match the following port numbers with their uses :
27.
List-I
List-II
(a) 23
(b) 25
(c) 80
(d) 119
(iv) Email
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
28.
A.
Dialog control
B.
Token management
C.
D.
Synchronization
View/Hide
Ans
Correct Answer is C
Explanation
29.
A.
4 bits
B.
8 bits
C.
16 bits
D.
32 bits
View/Hide
Ans
Correct Answer is C
Explanation
30.
A.
B.
C.
in the block.
D.
View/Hide
Ans
Correct Answer is D
31.
List-I
List-II
(d) EQU
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
32.
A.
Macro processor
B.
Micro pre-processor
C.
Macro pre-processor
D.
Dynamic linker
View/Hide
Ans
Correct Answer is C
Explanation
33.
A.
B.
C.
unrestricted grammar
D.
phrase grammar
View/Hide
Ans
Correct Answer is A
Explanation
34.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
35.
A.
Syntax analysis
B.
Lexical Analysis
C.
Code generation
D.
Code optimization
View/Hide
Ans
Correct Answer is A
Explanation
36.
A.
0.984 sec
B.
0.396 sec
C.
0.738 sec
D.
0.42 sec
View/Hide
Ans
Correct Answer is D
Explanation
37.
A.
R(Pi) W (Pj) =
B.
W(Pi) R (Pj) =
C.
R(Pi) R (Pj) =
D.
W(Pi) W (Pj) =
View/Hide
Correct Answer is D
Ans
Explanation
38.
A LRU page replacement is used with four page frames and eight
pages. How many page faults will occur with the reference string
0172327103 if the four frames are initially empty?
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
39.
A.
It will print all of the lines in the file x that match the search string
"abc"
B.
It will print all of the lines in file x that do not match the search
string "abc"
C.
It will print total no of the lines in file x that match the search
string "abc".
D.
View/Hide
Ans
Correct Answer is B
Explanation
40.
A.
B.
C.
Scheduling parameters
D.
Kernel stack
View/Hide
Ans
Correct Answer is C
List - I
List - II
(a) Size-oriented
metric
(c) Extended
Function Point
Metrics
B.
C.
D.
View/Hide Ans
Correct Answer
is B
Explanation
42.
In which testing
strategy
requirements
established during
requirements
analysis are
validated against
developed
software?
A.
Validation testing
B.
Integration testing
C.
Regression testing
D.
System testing
View/Hide Ans
Correct Answer
is A
Explanation
43.
Which process
model is also called
as classic life cycle
model?
A.
Waterfall model
B.
RAD model
C.
Prototyping model
D.
Incremental model
View/Hide Ans
Correct Answer
is A
Explanation
44.
Cohesion is an
extension of :
A.
Abstraction
concept
B.
Refinement
concept
C.
Information hiding
concept
D.
Modularity
View/Hide Ans
Correct Answer
is D
Explanation
45.
A.
B.
Compare actual
and planned
progress and costs
C.
Identify the
activities,
milestones and
deliverables
produced by a
project
D.
View/Hide Ans
Correct Answer
is C
Explanation
46.
In the case of
parallelization,
Amdahl's law
states that if P is
the proportion of
the program that
can be made
parallel and (1 - P)
is the proportion
that cannot be
parallelized , then
the maximum
speed that can be
achieved by using
N processors is A.
1 / (1 - P) + N.P
B.
1 / (N 1) P + P
C.
1 / (1 P) + P / N
D.
1 / P + (1 P) / N
View/Hide Ans
Correct Answer
is C
Explanation
47.
Which of the
following
statements is
incorrect for
Parallel Virtual
Machine (PVM)?
A.
The PVM
Communication
model provides
asynchronous
blocking send,
asynchronous
blocking receive
and non-blocking
receive function
B.
Message buffers
are allocated
dynamically
C.
The PVM
communication
model assumes
that any task that
can send a
message to any
other PVM task and
that there is no
limit to the size or
number of such
messages
D.
View/Hide Ans
Correct Answer
is D
Explanation
48.
Which of the
following
algorithms sort n
integers, having
the range 0 to (n2
- 1), in ascending
order in O(n)
time ?
A.
Selection sort
B.
Bubble sort
C.
Radix sort
D.
Insertion sort
View/Hide Ans
Correct Answer
is C
Explanation
49.
Which of the
following
statements is
FALSE about weak
entity set ?
A.
B.
C.
D.
Tuples in a weak
enfity set are not
partitioned
according to their
relationship with
tuples in a strong
entity set.
View/Hide Ans
Correct Answer
is D
Explanation
50.
Which of the
following is not
valid with
reference to
Message Passing
Interface (MPI) ?
A.
B.
The programming
model is a
distributed
memory model.
C.
All parallelism is
implicit
D.
View/Hide Ans
Correct Answer
is C
2h-1
h
log2(n+1)
e=n-1
2k-1 internal
nodes
2n - 1 nodes
3. The total number of spanning trees that can be drawn using five labeled vertices is:
(A). 125 (B).64
(C ). 36 (D). 16
Ans : A. According to cayleys formula for counting spanning trees, for a complete graph Kn,
T(Kn)= n n-2 where n is the number of vertices.
T(k5)=5 5-2=5 3= 5 * 5 * 5=125
4. Extremely low power dissipation and low cost per gate can be achieved in
(A) MOS ICS (B) C MOS ICS
(C ) TTL ICS (D) ECL ICS
Ans : B. CMOS ICS
11. If a code is t error detecting, the minimum hamming distance should be equal to :
(A). t-1 (B). t
(C ). t+1 (D). 2t+1
Ans: C. To guarantee the detection of upto s errors in all cases, the minimum hamming distance in a
block code must be
dmin=s+1
So, the minimum hamming distance for a t error detecting must be t+1
21. N processes are waiting for I/O. A process spends a fraction of its time in I/O wait state. The
CPU utilization is given by:
(A). 1-P N (B). 1 P N
(C ). P N (D). P -N
Ans:B. According to the probabilistic model, if a process spends a fraction p of its time in I/O wait
state, and if there are N processes in memory, then the CPU utilization is given by 1-PN
22. If holes are half as large as processes, the fraction of memory wasted in holes is:
(A) 2 / 3 (B). 1 / 2
(C ). 1 / 3 (D). 1 / 5
Ans : D
33. In a heap, every element is ________________ of all the elements in the subtree.
(A) Maximum (B) minimum
(C ) sum (D) product
Ans:- A
Ans:- A.
41. In which of the following, ready to execute processes must be present in RAM?
(A) Multiprocessing (B) multiprogramming (C) multitasking (D) all of the above
42. If the executing program size is greater than the existing RAM of a computer, it is still possible to
execute the program if the OS supports:
(A) Multitasking (B) virtual memory (C) paging system (D) none of the above
Ans: B
46. Font sizes are usually expressed in points. One point is:
(A) 0.0069 inch (B) 0.0138 inch
(C) 0.0207 inch (D0 0.0276 inch
Ans:- B. One point is 1/72 of an inch and so we will get the answer 0.0138 inch.
47. Assertion (A): Cellular telephone systems can handle a multitude of users.
Reasoning(R ): Cellular telephone systems permit extensive frequency reuse in a small local area.
(A) Both (A) and (R ) are true and (R ) is the correct explanation for (A)
(B) Both (A) and (R ) are true but (R ) is not the correct explanation
(C) (A) is true but (R ) is false
(D) (A) is false but (R ) is true
Ans:- A.
49. An example of a data mining algorithm which uses squared error score function is:
(A) CART algorithm (B) back propagation algorithm (C) a priori algorithm
(D) vector space algorithm
Ans:- B. Back propagation algorithm uses squared error score function. CART algorithm uses crossvalidated loss function.
50. (I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the following is
true?
(A) Only (I) (B) only (II) (C) both (I) and (II) (d) none of the above
Ans:- C
number then the total number of nodes in the tree also will be odd if we apply the above formula.
22. The number of edges in a complete graph of n vertices is
(A) n (B) n(n-1)/2 (C ) n(n+1)/2 (D) n2/2
Ans:- B. The complete graph on n vertices has n(n-1)/2 edges.
23. At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in and park
right behind the car in front of them, one behind another. A car cant leave until all the cars in front of
it have left. Is the parking lot more like
(A) An array (B) A stack (C) A queue (D) A linked list
Ans:- C.
24. With regard to linked list, which of the following statement is false ?
(A) An algorithm to search for an element in a singly linked list requires O(n) operations in the worst
case.
(B) An algorithm for deleting the first element in a singly linked list requires o(n) operations in the
worst case.
(C ). An algorithm for finding the maximum value in a circular linked list requires o(n) operations.
(D ). An algorithm for deleting the middle node of a circular linked list requires o(n) operations.
Ans:- B
25. A hash function f defined as f(key)=key mod 7, with linear probing used to resolve collisions.
Insert the keys 37,38,72,48,98 and 11 into the table indexed from 0 to 6. What will be the location of
11?
(A) 3 (B) 4 (C ) 5 (D) 6
Ans:- C
26. Device on one network can communicate with devices on another network via a
(A) Hub/switch (B) Utility server
( C) File server (D) Gateway
Ans:- D
27. What is the maximum window size in sliding window protocol used in a computer network?
(A) 4 (B) 8 (C ) 15 (D) 16
Ans:- A
28. Which of the following are Data Link Layer standard?
1. Ethernet 2. HSSI 3. Frame Relay
4. 10-Base T 5. Token Ring
(A) 1,2,3 (B) 1,3,5 (C) 1,3,4,5 (D) 1,2,3,4,5
Ans:- C
29. In case of Bus/Tree topology signal balancing issue is overcome by
Explanation:The semantic model(s) of parameter passing are in,out and inout. The actual
parameters are brought in, moved out, or brought in and moved out respectively.
47. The colour of an object is largely determined by its diffuse reflection coefficient. If Kd =
(0.8, 0.4, 0), then what shall be the colour of the object, if the light used is blue and magenta ?
(A) White and Red
(B) Red and Blue
(C) Black and White
(D) Black and Red
Ans:- D
Explanation:The color of an object is largely determined by its diffuse reflection coefficient(kd). Kd is
assigned a value between 0.0 and 1.0.
0.0 for dull surface that absorbs almost all light
1.0 for shiny surface that reflects almost all light.
You should understand the range of kd and its meaning very clearly. For colored surfaces, there
are three kd values, one for red, green and blue.
Let us consider a polygon with diffuse color(1,0,0). It reflects all of the red light it is hit with,
and absorbs all of the blue and green(because red has a value 1, and green and blue has a 0).
If this red polygon is hit with a white light it will appear red. If it is hit with a blue light, or a
green light, or an aqua light it will appear black(as those lights have no red component). If it is
hit with a yellow light or a purple light it will appear red(as the polygon will reflect the red
component of the light).
The kd value given in the equation is kd=(0.8,0.4,0)
What shall be the color of the object if the light used is blue and magenta?. That is the question.
Let us consider the first color. Blue light falls on the object. But the blue component of kd is 0. It
means that color is going to be completely absorbed by the object and it will appear black. So,
when blue light falls on the object, the object will appear black.
Let us consider the next color. Magenta light falls on the object. Magents is a violet-red or
purplish-red color. It is midway between red and blue. Since red has a high kd value, it will get
reflected more and so the color of the object will be Red.
So, the color of the object will be Black and Red. The correct option is D.
59. The perspective projection matrix, on the view plane z = d where the centre of projection is
the origin (0, 0, 0) shall be
(A) 0
0
0
d
0
0
d
0
0
d
0
0
d
0
0
1
(B) d 0
0
0
0
(C) 0
d
0
0
0
0
0
1
(D) d 0
0
0
0
0
d
1
0
0
d
0
0
d
0
0
0
0
0
d
d
0
0
0
0
d
0
0
0
0
0
0
1
Ans:- B
Explanation:A perspective transformation is determined by prescribing a center of projection and a view
plane. The view plane is determined by its view reference point R0 and view plane normal N.
The projection transformation as a matrix
PerN,R0 = d0
0
0
d0
0
0
n1 n2 n3
0
0
d0
0
0
0
0
The plance z = d is parallel, to the xy plane. Thus the view plane normal vector N is the same as
the normal vector K to the xy plance, that is N=K. Choosing the view reference point as
R0(0,0,d), we can identify the parameters
N(n1,n2,n3) = (0,0,1)
R0(x0,y0,z0)=(0,0,d)
So,
d0 = n1x0 + n2y0 + n3z0 = d
and so the projection matrix is
PerK,R0 = d
0
0
0
0
d
0
0
0
0
d
0
0
0
1
0
So, the correct answer is option B. The same problem is solved in the Schaums outlines,
Computer Graphics book(pg. no. 138).
7. The PROJECT operator of a relational algebra creates a new table that has always
(A) More columns than columns in original table
(B) More rows than original table
(C) Same number of rows as the original table
(D) Same number of columns as the original table
Ans:-C
Explanation:The Projection operator is also a unary operator. Whereas the selection operator chooses a subset
of the rows of the relation, the projection operator chooses a subset of the columns. The
Projection operation on a table, simply forms another table by copying specified columns, from
the original table. Symbol of projection is . Given a employee table having the columns(Empid, name, salary).
To select only the name of employee :- name(employee)
To know only the salary :- salary(employee)
Selection operation:
It yields a horizontal subset of a given relation that is the subset of row should be selected with in
the given relation for which a particular condition is satisfied. Sign of selection is . To see the
details of those employees whose salary is greater than 10000, the selection operation will be
used.
salary>10000(employee).
So, looking at the options given for the answer, the PROJECT operator cannot create a table
having more columns than the original table. Same number of columns also ruled out. More rows
than the original table is also not correct. So, it will be Same number of rows as the original
table, but less number of columns than the original table. SO, the correct answer is C.
8. The employee information of an Organization is stored in the relation : Employee (name, sex,
salary, deptname) Consider the following SQL query Select deptname from Employee Where sex
= M group by deptname having avg (salary) > {select avg (salary) from Employee} Output of
the given query corresponds to
(A) Average salary of employee more than average salary of the organization.
(B) Average salary less than average salary of the organization.
(C) Average salary of employee equal to average salary of the organization.
(D) Average salary of male employees in a department is more than average salary of the
organization
Ans:- D
Explanation:The question is very length and intimidating. But the answer is surprisingly simple. Rule out the
wrong options first and you will always get the correct answer. There is a greater than symbol
used in the query and we all know what it stands for. Options B and C says that Average salary
less and equal. So both B and C are ruled out. Option A says Average salary of employee more
than average salary of the organization. But in the query there is a where clause which is sex='M'
and so the query is average salary of male employees is more than average salary of the
organization. So the correct answer is option D.
9. For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic
values. The functional dependency a c, b d holds in the following relation
(A) In 1NF not in 2NF
(B) In 2NF not in 3NF
(C) In 3NF
(D) In 1NF
Ans:-A
Explanation:A relation is in the first normal form if the domain of each attribute contains only atomic values.
It means atomicity must be present in the relation. So, the question clearly mentions the same.
The domains of a,b,c,d include only the atomic values and so 1NF holds but the question is
whether 2NF holds or not. A relation will be in second normal form if it is in the first normal
form and all the non primary key attribute must be fully functionally dependent on the primary
key attribute. Although the functional dependency is given, no information is provided about the
primary key here. So the correct answer is A.
25. Which of the following can be the sequence of nodes examined in binary search tree while
searching for key 88 ?
(A) 90, 40, 65, 50, 88
(B) 90, 110, 80, 85, 88
(C) 190, 60, 90, 85, 88
(D) 65, 140, 80, 70, 88
Ans:- B
Explanation:I am taking the liberty of retaining an explanation given for a similar question from yahoo
answers.
Best Answer: For a binary search tree, the entire tree is sorted such that for any node, every node
to the left is less than the current node value and every node to the right is more than the current
node value.
When walking a BST tree, you "zero in" on the value by following the correct nodes down the
tree. Ideally you work closer and closer to your answer, kind of like the "guess the number"
game where you give "nope, more!" and "nope, less!" hints.
a) 2, 399, 387, 219, 266, 382, 381, 278, 363
This sequence is possible.
b) 935, 278, 347, 621, 299, 392, 358, 363
This sequence is not possible. Since 621 is to the right of 347, every other node under 621 must
ALSO be to the right of 347. 299 is not -- so this is an impossible walk. Basically, once you pass
347, 299 is swinging too far in the opposite direction.
c) 924, 220, 911, 244, 898, 258, 362, 363
This sequence is possible.
d) 925, 202, 911, 240, 912, 245, 363
Not possible -- 240 is to the left of 911, so every other node must also be less than 911 (but still
may be to the right of 240). 912 is not to the left of 911.
e) 2, 252, 401, 398, 330, 344, 397, 363 This sequence is possible. Just barely though -- 397 is to
the left of 398 but just barely!
I am taking the example b which explains why a particular sequence is not possible. Since 621 is
to the right of 347, every other node under 621 must ALSO be to the right of 347.
Let us apply the same rule to all the sequences given above for us in the question.
The first sequence is 90,40,65,50,88. Do not consider any particular element as the root. But start
analysing the numbers from first. 90 is the first number. 40 is the second one. So, 40 will be to
the left of 90, since it is less than 90. Since 40 is to the left of 90, all numbers following 40 also
should be to the left of 90, which is true in this sequence. 65,50, and 88 will be to the left of 90.
So this sequence is possible.
Let us consider the second sequence which is 90,110,80,85,88. Again 90 is the first number. 110
will be to its right since it is greater than 90. So all the numbers following 110 also should be to
the right of 90,but 80,85 and 88 fall to its left. So, this sequence is not possible.
Let us consider the third sequence which is 190,60,90,85,88. So, 190 is the first number. 60 is to
its left. So all the other numbers following 60 should be to the left of 190, which is holding good
here. 90,85 and 88 will be to the left of 190. So, this sequence is possible.
Let us consider the fourth sequence which is 65,140,80,70,88. 65 is the first number. 140 will be
to its right. All the numbers following 140 should be to the right of 65 which is true. 80,70 and
88 will be to the right of 65 as well.
So, the correct answer is option B and not C.
26. An actor in an animation is a small program invoked _______ per frame to
determine the characteristics of some object in the animation.
(A) once
(B) twice
(C) 30 times
(D) 60 times
Ans:- A
Explanation:An actor in an animation is a small program invoked once per frame to determine
the characteristics of some object in the animation.
27. Bresenham line drawing algorithm is attractive because it uses
(A) Real arithmetic only
(B) Integer arithmetic only
(C) Floating point arithmetic
(D) Real and integer arithmetic
Ans:- B
Explanation:Bresenhems algorithm offers a significant advantage over the other methods, as it
avoids floating-point arithmetic and rounding. It is a classic example of an
incremental algorithm that computes the location of each pixel along the line based
on information about the previous pixel. It uses only integer values and avoids any
multiplications.
28. The refresh rate above which a picture stops flickering and fuses into a steady
image is called _________.
(A) Crucial fusion frequency
(B) Current frequency fusion
(C) Critical fusion frequency
(D) Critically diffused frequency
Ans:- C
Explanation:-
The refresh rate of a CRT is the number of times per second the image is redrawn. It
is typically 60 per second for raster displays. As the refresh rate decreases, flicker
develops because the eye can no longer integrate the individual light pulses coming
from a pixel. The refresh rate above which a picture stops flickering and fuses into a
steady image is called the critical fusion frequency (or) CFF.
29. In homogenous coordinate system (x, y, z) the points with z = 0 are called
(A) Cartesian points
(B) Parallel points
(C)Origin point
(D) Point at infinity
Ans:- D
Explanation:In homogenous coordinates, we add a third coordinate to a point. Instead of being
represented by a pair of numbers(x,y) each point is represented by a triple(x,y,w).
At the same time, we say that two sets of homogenous coordinates(x,y,w) and
(x,y,w) represent the same point if and only if one is a multiple of the other. Thus
(2,3,6) and (4,6,12) are the same points represented by the different coordinate
triples. Also, at least one of the homogenous coordinates must be nonzero : (0,0,0)
is not allowed. If the w coordinate is nonzero, we can divide through by it(x,y,w)
represents the same point as (x/w,y/w,1). When w is nonzero, we normally do this
division, and the numbers x/w and y/w are called the Cartesian coordinates of the
homogenous points. The points with w=0 are called points at infinity. So, the correct
answer is D.
30. If 40 black lines interleaved with 40 white lines can be distinguished across one
inch, the resolution is
(A) 40 line-pairs per inch
(B) 80 line-pairs per inch
(C) 1600 lines per inch
(D) 40 lines per inch
Ans:- A
Explanation:Resolution is the number of distinguishable lines per inch that a device can create.
Resolution is defined as the closest spacing at which adjacent black and white lines
can be distinguished by observers. If 40 black lines interleaved with 40 white lines
can be distinguished across one inch, the resolution is 80 lines per inch or 40 linepairs per inch. So, the correct answer is A.
31. Images tend to be very large collection of data. The size of memory required for
a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit
number, (in an 8 bit machines) is
(A) n X 8 MB
(B) n / 8 MB
(C) (1024 X 1024 ) / 8 MB
(D) 1024 MB
Ans:- B
Explanation:Look at the options which are not going to be correct at all. Eliminate the wrong
answers to get the right answer. Every pixel is represented by a n-bit number, the
value of n is not mentioned. So, we rule out C and D options completely. So, it can
be either A or B. But it is not A because the n-bit number is not going to be
multiplied with 8 for a 8 bit machine. So, the correct answer is B.
32. Arrays in C language can have _________ with reference to memory
representation.
(A) n-subscripts
(B) two-subscripts
(C) only one subscript
(D) three subscripts only
Ans:- C
Explanation:With reference to memory representation, even a two-dimensional array subscript is
going to be converted into a single subscript for accessing or referring the memory
location. So, it will be option C.
33. Refer the points as listed below :
(a) What are the operator precedence rules ?
(b) What are the operator associativity rules ?
(c) What is the order of operand evaluation ?
(d) Are there restrictions on operand evaluation side effects ?
Which of the above must be considered as primary design issues
for arithmetic expressions ?
(A) (a), (b) and (c)
(B) (a), (c) and (d)
(C) (a), (b) and (d)
(D) (a), (b), (c) and (d)
Ans:- C
Explanation:The options (a),(b) and (d) makes sense, but option (c) is not so clear. There is no
order on the operand evaluation. It is decided by the operator precedence and
associativity. So, the correct answer is C.
34. Horn clauses are special kinds of propositions which can be described as
(A) Single atomic proposition on left side.
(B) Single or multiple atomic proposition on left side.
(C) A single atomic proposition on left side and a single atomic proposition on right
side.
(D) A single atomic proposition on left side or an empty left side.
Ans:- D
Explanation:A Horn clause is a unique kind of proposition which has either one single proposition
on the left hand side or an empty proposition. When a Horn clause does contain a
proposition on the left side, it is sometimes refered to as a headed Horn clause. The
Horn clause is named after Alfred Horn who studied this type of propositional clause
(Horn, 1951).
35.Which of the following is/are the fundamental semantic model(s) of parameter
passing ?
(A) in mode
(B) out mode
(C)in-out mode
(D) all of the above
Ans:- D
Explanation:The semantic model(s) of parameter passing are in,out and inout. The actual
parameters are brought in, moved out, or brought in and moved out respectively.
14. A data file of 1,00,000 characters contains only the characters g-l, with the
frequencies as indicated in table :
g
Frequency in thousand
45
13
12
16
9
5
Using the variable-length code by Huffman codes, the file can be encoded with
(A) 2,52,000 bits
(B) 2,64,000 bits
(C) 2,46,000 bits
(D) 2,24,000 bits
Ans:- D
Explanation :The explanation is quite lengthy. so, download the following ppt and read through it
to understand the steps.
Huffman tree.ppt
15. A vertex cover of an undirected graph G(V,E) is a subset V1 such that
(A) Each pair of vertices in V1 is connected by an edge.
(B)If (u,v) E then u V1and v V1
(C) If (u,v) E then u V1 and v V1
(D) All pairs of vertices in V1 are not connected by an edge
Ans:- C
Explanation :A vertex cover in a graph G is a set of vertices C such that each edge of G contains
at least one vertex in C. An edge will be formed by two vertices. For each edge of G,
at least one vertex should be in C, where C stands for the vertex cover. So, in the
question above, vertex cover is represented by the subset V1. V1 is a subset of
vertices V. Let us consider the edge (u,v). According to the vertex cover definition,
any one vertex, either u or v should belong to V1. So, option C is the correct answer.
16. In a fully connected mesh network with n devices, there are ________ physical
channels to link all devices.
(A) n(n-1)/2
(B) n(n+1)/2
(C ) 2n
(D ) 2n+1
Ans:- B
17. The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits,
then the bit rate of a signal is
(A) 3600
(B)100
(C )6/600
(D) None of the above
Ans:- A
Explanation :Bit rate = baud rate X n
Baud rate = 600 baud/second.
n= number of bits = 6
bit rate = 600 X 6 = 3600
So, the correct answer is A.
18. Match the following :
a. Data link layer
i. Flow control
b. Network layer
ii. Node to node delivery
c. Transport layer
iii. Mail services
d. Application layer
iv. Routing
Codes :
a b c d
(A) ii i iv iii
(B) ii iv i iii
(C) ii i iii iv
(D) ii iv iii i
Ans:- B
Explanation:Refer to my post on Computer networks. I have solved many questions of the
same kind. The most obvious approach is to associate the easy ones first. So, it will
be Network layer to routing, Application layer to mail services. b-iv, d iii, There is
only one option which satisfies it and it is B. So, data link layer will be Node to node
delivery and transport layer will be flow control. So, the correct answer is B.
19. An image is 1024 800 pixels with 3 bytes/pixel. Assume the image is
uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ?
(A) 196.6 seconds
(B) 19.66 seconds
(C) 1.966 seconds
(D) 0.1966 seconds
Ans:- C
Explanation:The size of the image is 1024 * 800 pixels = 819200 pixels.
No of bytes / pixel = 3
Explanation:For obvious reasons, option A is ruled out. Now let us look at the meaning of black box testing. The
term "Black box" refers to the actual software that is getting tested. In black box testing one knows
only the set of inputs and expected outputs and is unaware of how those inputs are transformed into
outputs by the software. So option C seems to be the right choice.
There are many types of black box testing techniques. It is better to know some of them by name.
Boundary Value Analysis(BVA)
Equivalence Class Testing
Decision Table based testing
Cause-Effect Graphing Technique
Depending on any more questions based on black box testing we can go through the techniques in
detail later. I think knowing some technique names could be useful for now.
Ans:-C
16. In generalisation, the differences between members of an entity is
(A) maximized
(B) minimized
(C) both (A) & (B)
(D) None of these
Ans:-B
Explanation:Generalisation and specialization are two terms that have a opposite meaning. In generalization the
differences between members of an entity is minimized. Generalisation is a bottom up process. It
goes from more specific to more general. For example, if the subclasses are taken as car and bike
they would fall under the category of superclass called vehicle. From the subclasses we would
identify features which can take us to the superclass vehicle.
Specialisation is the opposite of this. In Specialisation the differences between members of an entity
are maximized. Specialisation is a top down process. It goes from more general to more specific. If
vehicle is a super class and car and bike are its subclasses, identifying the characteristics or
uniqueness of its subclasses is what happens in specialization.
It is a sort of repeatedly asked question. In June 2010 the following question appeared.
Generalization is _______ process.
(A) top-down
(B) bottom up
(C) both (A) & (B)
(D) None of these
The answer of course is B, Generalisation is a bottom up process.
To summarise,
Generalisation - Bottom up - Differences between members of an entity is minimized.
Specialisation - Top down - Differences between members of an entity is maximized.
21. A* algorithm uses f' = g + h' to estimate the cost of getting from the initial state to the goal state,
where g is a measure of the cost of getting from initial state to the current node and the function h' is
an estimate of the cost of getting from the current node to the goal state. To find a path involving the
fewest number of steps, we should set
(A) g=1
(B) g=0
(C) h'=0
(D) h'=1
Ans:-A
22. The transform which possesses the highest energy compaction property is
(A) Slant transform
(B) Cosine transform
(C) Fourier transform
(D) Karhunen-Loeve transform
Ans:-D
23. Which one of the following prolog programs correctly implement if G succeeds then execute goal
P else execute goal ?
(A) if-else (G, P, ) :- !, call(G), call(P). if-else (G, P, ) :- call().
(B) if-else (G, P, ) :- call(G), !, call(P). if-else (G, P, ) :- call().
(C) if-else (G, P, ) :- call(G), call(P), !. if-else (G, P, ) :- call().
(D) All of the above
Ans:-B
Explanation:- The syntax of If--then---else in prolog goes the following way
(A->B;C) :call(A),
!,
call(B)
(A->B;C) :call(C )
So according to the above syntax option B is correct.
24. The _______ memory allocation function modifies the previous allocated space.
(A) calloc( )
(B) free()
(C) malloc( )
(D) realloc()
Ans:-D
25. Which is not the correct statement(s) ?
(i) Every context sensitive language is recursive.
(ii) There is a recursive language that is not context sensitive.
(A) (i) is true, (ii) is false.
(B) (i) is true and (ii) is true.
(C) (i) is false, (ii) is false.
(D) (i) is false and (ii) is true.
Ans:-B
26. The mechanism that binds code and data together and keeps them secure from outside world is
known as
(A) Abstraction
(B) Inheritance
(C) Encapsulation
(D) Polymorphism
Ans:-C
27. Identify the addressing modes of below instructions and match them :
(a) ADI (1) Immediate addressing
(b) STA (2) Direct addressing
(C )CMA (3) Implied addressing
(d) SUB (4) Register addressing
(A) a-1,b-2,c-3,d-4
(B) a-2,b-1,c-4,d-3
(C ) a-3,b-2,c-1,d-4
(D) a-4,b-3,c-2,d-1
Ans:- A
Explanation:- The instruction ADI adds some content to the accumulator. It is an immediate
addressing mode instruction.
The instruction STA stores the contents of the accumulator in the particular memory location
specified as operand.
CMA instruction takes complement of the contents of the accumulator.
SUB instruction subtracts the contents of the register to the contents of the accumulator.
. So the option is A.
28. Which one of the following is not a Greibach Normal form grammar ?
(i) S a | bA | aA | bB
Aa Bb
(ii) Sa|aA|AB
Aa
Bb
(iii) Sa|A|aA
Aa
(A) (i) and (ii)
(B) (i) and (iii)
(C) (ii) and (iii)
(D) (i), (ii) and (iii)
Ans:-C
Explanation:- Restriction for GNF:The first symbol on the right hand side of the production must be a terminal. It can be followed by
zero or more variables. In grammar (ii) of the question, S->AB is a production. AB are two nonterminals and it can be in GNF. In grammar (iii) S->A is given and it is a unit production and that is
not allowed in GNF. So the grammar which is not in GNF is (ii) and (iii). So the option is C.
29. Which of the following IP address class is a multicast address ?
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Ans:-D
30. While unit testing a module, it is found that for a set of test data, maximum 90% of the code
alone were tested with a probability of success 0.9. The reliability of the module is
(A) atleast greater than 0.9
(B) equal to 0.9
(C) atmost 0.81
(D) atleast 1/0.81
Ans:-C
In DBMS, there could be a question on different steps in normalization and what is achieved at the
end of every step in it.You need to be knowing the following things very clearly and without any
ambiguity.The question would be based on these terms.
A table is in 1NF if there and no duplicate rows in the table. Each cell is single-valued.
A table is in 2NF if it is in 1NF and if all non-key attributes are dependent on all of the key. A table is
in 2NF if it is in 1NF and if it has no partial dependencies
A table is in 3NF if it is in 2NF and if it has no transitive dependencies
A table is in BCNF if it is in 3NF and if every determinant is a candiate key.
A table is in 4NF if it is in BCNF and it it has no multi-valued dependencies.
A table is in 5NF if it is in 4NF and it has no join dependency.
1. The number of integers between 1 and 250 that are divisible by 2,5 and 7 is
A)
2 (B)
3
C)
5 (D)
8
Ans:- B. There are 3 integers between 1 and 250 that are divisible by 2,5 and 7. They are
70,140 and 210.
2. An undirected graph possess an Eulerian circuit if and only if it is connected and its vertices are
A) All
of
even
degree (B)All
of
odd
degree
C) Of
any
degree (D)even
in
number
Ans:- A. According to Euler's theorem 1, if a graph is undirected then it has an eulerian
circuit if and only if it is connected and each vertex has an even degree.
***It would be useful to know about the Hamiltonian circuit as well.
3. A partially ordered set is said to be a lattice if every two elements in the set have
A)a
unique
least
upper
bound (B)a
unique
greatest
lower
bound
C)both
(A)
and
(B) (D)none
of
the
above.
Ans:- C.
4. The minimum number of edges in a connected graph with 'n' vertices is equal to
A)n(n-1) (B)n(n-1)/2
C)n2 (D)n-1
Ans:- D. The formula for counting the minimum number of edges in a connected graph is (n1).
5. Would be done later.....
6.
The
A)
C)
Ans:- D.
decimal
number
equivalent
of
(4057.06) 8 is
:
2095.75 (B)2095.075
2095.937 (D)2095.09375
An
stable
stable
astable
state (B)two
states (D)none
multivibrator
stable
of
has
states
these
Ans:- C. An astable multivibrator has two states but neither of them are stable.
9.12-bit
A)
2's
complement
of
-73.75
is
01001001.1100 (B)11001001.1100
C)
Ans:- B
10110110.0100 (D)10110110.1100
10. Encoding of data bits 0011 into 7-bit even parity Hamming code is
A)0011110 (B)0101110
C)0010110 (D)0011100
Ans:A.
The explanation is quite lengthy. If you google the question, you would get a link to the book
"Fundamentals of digital circuit" by A.Anand Kumar. The explanation is great there.
11.
How
many
of
the
following
declarations
are
correct?
int z=7.0;
double void=0.000;
short array[2]={0,1,2};
char c="\n";
(A) None (B)One
is
correct
(C) Two
are
correct (D)All
four
are
correct
Ans:-The second declaration is for sure wrong because we cannot have a keyword as a
variable name. The last declaration is also wrong because we cannot assign anything within
double quotes to a character variable. So we are left with only the first and the array
declaration.I think those two would still not give errors in c. So 'C' could be the answer for
this question.
1.
A.
Knowing
B.
Understanding
C.
Analysing
D.
Evaluating
View/Hide
Ans
Correct Answer is D
Explanation
2.
A.
B.
C.
D.
Teacher's knowledge
View/Hide
Ans
Correct Answer is B
Explanation
3.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
4.
A) Lecture
B) Interactive lecture
C) Group work
D) Self study
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
5.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
6.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
7.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
8.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
9.
A.
Fundamental research
B.
applied research
C.
Action research
D.
Evaluation Research
View/Hide
Ans
Correct Answer is A
Explanation
10.
A.
research hypothesis
B.
null hypothesis
C.
directional hypothesis
D.
statistical hypothesis
View/Hide
Ans
Correct Answer is B
11.
A.
Historical research
B.
Descriptive Research
C.
Experimental Research
D.
View/Hide
Ans
Correct Answer is C
Explanation
12.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
13.
successful future, and those who ordain pessimism and fear that
we are doomed.
What the future holds for us is which stories we hold on to and
how we act on them
Our knowledge is a collection of
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
14.
A.
an art
B.
a science
C.
in our genes
D.
View/Hide
Ans
Correct Answer is D
Explanation
15.
How the future will turn out to be, depends upon the stories
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
16.
Rational optimists :
1) Look for opportunities
2) Are sensible and cheerful
3) Are selfishly driven
A.
B.
(a) only
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
17.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
18.
A.
B.
are doom-mongers
C.
are self-centred
D.
View/Hide
Ans
Correct Answer is A
Explanation
19.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
20.
A.
Both (A) and (R) are correct and (R) is correct explanation of (A)
B.
Both (A) and (R) are correct, but (R) is not correct explanation of
(A)
C.
D.
View/Hide
Ans
Correct Answer is D
21.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
22.
A.
Downward communication
B.
Informal communication
C.
Upward communication
D.
Horizontal communication
View/Hide
Ans
Correct Answer is B
Explanation
23.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
24.
A.
B.
Intrapersonal
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
25.
A.
83
B.
75
C.
78
D.
80
View/Hide
Ans
Correct Answer is B
Explanation
26.
A.
LEQIBP
B.
ELQBIP
C.
LEBIQP
D.
ELIPQB
View/Hide
Ans
Correct Answer is B
Explanation
27.
A.
10
B.
20
C.
15
D.
30
View/Hide
Ans
Correct Answer is C
Explanation
28.
A.
Brother
B.
Uncle
C.
Nephew
D.
Son
View/Hide
Ans
Correct Answer is A
Explanation
29.
A.
6300
B.
6900
C.
7300
D.
7900
View/Hide
Ans
Correct Answer is A
Explanation
30.
A.
42
B.
48
C.
45
D.
50
View/Hide
Ans
Correct Answer is D
Explanation
31.
A.
Inductive
B.
Deductive
C.
Demonstrative
D.
Physiological
View/Hide
Ans
Correct Answer is D
Explanation
32.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
33.
A.
Integrity of nature
B.
Unity of nature
C.
Uniformity of nature
D.
Harmony of nature
View/Hide
Ans
Correct Answer is C
Explanation
34.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
35.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
36.
A.
Stipulative
B.
Theoretical
C.
Lexical
D.
Persuasive
View/Hide
Ans
Correct Answer is B
Explanation
A.
35 - 40 years
B.
40 - 45 years
C.
45 - 50 years
D.
50 - 55 years
View/Hide
Ans
Correct Answer is D
Explanation
38.
A.
20 PERC
B.
25 PERC
C.
30 PERC
D.
35 PERC
View/Hide
Correct Answer is B
Ans
Explanation
39.
A.
40.3 years
B.
38.6 years
C.
47.2 years
D.
45.3 years
View/Hide
Ans
Correct Answer is A
Explanation
40.
A.
45 PERC
B.
50 PERC
C.
35 PERC
D.
32 PERC
View/Hide
Ans
Correct Answer is A
41.What is the average salary (in thousand per month) in the age group 40 - 50
yearsA.35B.42.5C.40.5D.36.5View/Hide Ans
Correct Answer is B
Explanation
42.What is the fraction of employees getting salary less than the average salary of
all the employeesA.45 PERCB.50 PERCC.55 PERCD.47 PERCView/Hide Ans
Correct Answer is C
Explanation
43.Encoding or scrambling data for transmission across a network is known
asA.ProtectionB.DetectionC.EncryptionD.DecryptionView/Hide Ans
Correct Answer is C
Explanation
44.Which of the following is not an output
deviceA.PrinterB.SpeakerC.MonitorD.KeyboardView/Hide Ans
Correct Answer is D
Explanation
Keyboard is an Input Device
45.Which of the following represents one billion
charactersA.KilobyteB.MegabyteC.GigabyteD.TerabyteView/Hide Ans
Correct Answer is C
Explanation
46.Which of the following is not open source softwareA.Internet ExplorerB.Fedora
LinuxC.Open officeD.Apache HTTP serverView/Hide Ans
Correct Answer is A
Explanation
Internet explorer is a Product of Microsoft Corporation
47.Which one of the following represents the binary equivalent of the decimal
number 25A.10101B.01101C.11001D.11011View/Hide Ans
Correct Answer is C
Explanation
51.
A.
~8
B.
~ 16
C.
~ 32
D.
~ 64
View/Hide
Ans
Correct Answer is C
Explanation
52.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
53.
In the recently launched Air Quality Index in India, which of the following
pollutants is not included
A.
Carbon monoxide
B.
C.
Ozone
D.
Chlorofluorocarbons
View/Hide
Ans
Correct Answer is D
Explanation
54.
A.
B.
Population, affluence per person and the technology used for exploiting
resources
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
55.
A.
The President
B.
C.
D.
The Speaker of the Lok Sabha and the Chairman of the Rajya Sabha
View/Hide
Ans
Correct Answer is A
Explanation
56.
A.
21st April
B.
24th April
C.
21st June
D.
7th July
View/Hide
Ans
Correct Answer is A
Explanation
57.
A.
Colombo
B.
Dhaka
C.
New Delhi
D.
Kathmandu
View/Hide
Ans
Correct Answer is C
Explanation
58.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
59.
A.
8 percent
B.
12 percent
C.
19 percent
D.
23 percent
View/Hide
Ans
Correct Answer is C
Explanation
60.
A.
08
B.
14
C.
27
D.
43
View/Hide
Ans
Correct Answer is D
1.
A.
533
B.
599
C.
467
D.
66
View/Hide
Ans
Correct Answer is C
Explanation
2.
A.
B.
n-3
C.
20
D.
11
View/Hide
Ans
Correct Answer is D
Explanation
A.
Complete Graph
B.
Bipartite Graph
C.
Hamiltonian Graph
D.
View/Hide
Ans
Correct Answer is C
Explanation
4.
A.
0.5
B.
0.704
C.
.632121
D.
.68
View/Hide
Ans
Correct Answer is C
Explanation
5.
A.
B.
C.
D.
x8 + 73 and x8 +73
View/Hide
Ans
Correct Answer is D
Explanation
6.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
7.
A.
B.
it is a weighted code
C.
D.
View/Hide
Ans
Explanation
8.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
9.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
10.
A.
216 x 8
B.
218 x 10
C.
216 x 10
D.
218 x 8
View/Hide
Ans
Correct Answer is B
Explanation
for 8 bit data of two binary number total number of bits required
16 plus 2 bits for multiplexer to select between 4 operations so in
total 18 bits required and for 8 bit size the requirement will be
218x 8
11.
A.
128
B.
129
C.
130
D.
131
View/Hide
Ans
Correct Answer is B
Explanation
postfix operator
12.
A.
B.
C.
D.
View/Hide
Ans
Explanation
13.
A.
Static function
B.
Friend Function
C.
Const Function
D.
Virtual function
View/Hide
Ans
Correct Answer is B
Explanation
14.
A.
B.
C.
D.
Results in a run time error when the funtion tries to access the
elements in the array
View/Hide
Ans
Correct Answer is A
Explanation
15.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
16.
A.
B.
C.
D.
customers who have only joint account in any one branch in Delhi.
View/Hide
Ans
Correct Answer is B
Explanation
17.
A.
B.
C.
D.
Only I is correct
View/Hide
Ans
Correct Answer is D
Explanation
18.
A.
Generalization
B.
Aggregation
C.
Specialization
D.
View/Hide
Ans
Correct Answer is D
Explanation
19.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
20.
A.
B.
AE
C.
BE
D.
CE
View/Hide
Ans
Correct Answer is A
Explanation
21.Convert the Following Infix expression into its equivalent Post Fix expression
(A + B ^ D) / (E - F) +GA.ABD^+EF-/G+B.ABD+^EF-/G+C.ABD+^EF/G+D.ABD^+EF/-G+View/Hide Ans
Correct Answer is A
Explanation
Just draw the Expression tree of infix expression and perform preorder traversal of
the tree.
22.You have to sort a list L, consisting of a sorted list followed by a few 'random'
elements. Which of the following sorting method would be most suitable for such a
task ?A.Bubble SortB.Selection SortC.Quick SortD.Insertion SortView/Hide Ans
Correct Answer is D
Explanation
Only Insertion sort is the method that is most suitable for list consisting of a sorted
list followed by a few 'random' elements. like the used by card game player.
23.The Directory can be viewed as ____ that translates file names into their
directory entries.A.Symbol TableB.PartitionC.Swap spaceD.CacheView/Hide Ans
Correct Answer is A
Explanation
The Directory can be viewed as symbol table that translates file names into their
directory entries.
24.Consider an array A[20,10], assume 4 words per memory cell and the base
address of array A is 100. What is the address of A[11,5]? Assume row major
storage.A.560B.565C.570D.575View/Hide Ans
Correct Answer is A
Explanation
base address + (rownum - start)*size of columns * size of memory cell + (colnum start) * size of memory cell
100+(11-0)*(10)*4 + (5-0)*4 = 560
25.A full binary tree with n leaves containsA.n nodesB.log 2n nodesC.2n-1
nodesD.2n nodesView/Hide Ans
Correct Answer is C
Explanation
The Property of Full Binary tree.
26.The period of a signal is 10 ms. what is the frequency in
Hertz.A.10B.100C.1000D.10000View/Hide Ans
Correct Answer is B
Explanation
There is a reciprocal relationship between frequency and the time for a cycle (the
'period'):
frequency = 1 / clock period
clock period = 1 / frequency
if a CPU operates at 100 Hz, its "clock cycle" is 0.01 second = 10 ms