Signature and Name of Invigilator 1. (Signature) __________________________ OMR Sheet No. : ............................................... (Name) ____________________________ (To be filled by the Candidate)
2. (Signature) __________________________ Roll No.
(Name) ____________________________ (In figures as per admission card) Roll No.________________________________ J 871 1 4 (In words)
Time : 1 /4 hours] [Maximum Marks : 100
Number of Pages in this Booklet : 8 Number of Questions in this Booklet : 50 Instructions for the Candidates ¯Ö¸üßõÖÖÙ£ÖµÖÖë Ûêú ×»Ö‹ ×®Ö¤ìü¿Ö 1. Write your roll number in the space provided on the top of 1. ‡ÃÖ ¯Öéšü Ûêú ‰ú¯Ö¸ü ×®ÖµÖŸÖ Ã£ÖÖ®Ö ¯Ö¸ü †¯Ö®ÖÖ ¸üÖê»Ö ®Ö´²Ö¸ü ×»Ö×ÜÖ‹ … this page. 2. ‡ÃÖ ¯ÖÏ¿®Ö-¯Ö¡Ö ´Öë ¯Ö“ÖÖÃÖ ²ÖÆãü×¾ÖÛú»¯ÖßµÖ ¯ÖÏ¿®Ö Æïü … 2. This paper consists of fifty multiple-choice type of questions. 3. ¯Ö¸üßõÖÖ ¯ÖÏÖ¸ü´³Ö ÆüÖê®Öê ¯Ö¸ü, ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ †Ö¯ÖÛúÖê ¤êü ¤üß •ÖÖµÖêÝÖß … ¯ÖÆü»Öê 3. At the commencement of examination, the question booklet ¯ÖÖÑ“Ö ×´Ö®Ö™ü †Ö¯ÖÛúÖê ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ÜÖÖê»Ö®Öê ŸÖ£ÖÖ ˆÃÖÛúß ×®Ö´®Ö×»Ö×ÜÖŸÖ will be given to you. In the first 5 minutes, you are requested •ÖÖÑ“Ö Ûêú ×»Ö‹ פüµÖê •ÖÖµÖëÝÖê, וÖÃÖÛúß •ÖÖÑ“Ö †Ö¯ÖÛúÖê †¾Ö¿µÖ Ûú¸ü®Öß Æîü : to open the booklet and compulsorily examine it as below : (i) ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ÜÖÖê»Ö®Öê Ûêú ×»Ö‹ ˆÃÖÛêú Ûú¾Ö¸ü ¯Öê•Ö ¯Ö¸ü »ÖÝÖß ÛúÖÝÖ•Ö (i) To have access to the Question Booklet, tear off the Ûúß ÃÖᯙ ÛúÖê ±úÖ›Ìü »Öë … ÜÖã»Öß Æãü‡Ô µÖÖ ×²Ö®ÖÖ Ã™üßÛú¸ü-ÃÖᯙ Ûúß paper seal on the edge of this cover page. Do not accept ¯Öã×ßÖÛúÖ Ã¾ÖßÛúÖ¸ü ®Ö Ûú¸ëü … a booklet without sticker-seal and do not accept an open (ii) Ûú¾Ö¸ü ¯Öéšü ¯Ö¸ü ”û¯Öê ×®Ö¤ìü¿ÖÖ®ÖãÃÖÖ¸ü ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ Ûêú ¯Öéšü ŸÖ£ÖÖ booklet. ¯ÖÏ¿®ÖÖë Ûúß ÃÖÓܵÖÖ ÛúÖê †“”ûß ŸÖ¸üÆü “ÖîÛú Ûú¸ü »Öë ×Ûú µÖê ¯Öæ¸êü (ii) Tally the number of pages and number of questions Æïü … ¤üÖÂê Ö¯ÖæÞÖÔ ¯Öã×ßÖÛúÖ ×•Ö®Ö´Öë ¯Öéšü/¯ÖÏ¿®Ö Ûú´Ö ÆüÖë µÖÖ ¤ãü²ÖÖ¸üÖ †Ö in the booklet with the information printed on the ÝÖµÖê ÆüÖë µÖÖ ÃÖß׸üµÖ»Ö ´Öë ®Ö ÆüÖë †£ÖÖÔŸÖË ×ÛúÃÖß ³Öß ¯ÖÏÛúÖ¸ü Ûúß cover page. Faulty booklets due to pages/questions ¡Öã×™ü¯ÖæÞÖÔ ¯Öã×ßÖÛúÖ Ã¾ÖßÛúÖ¸ü ®Ö Ûú¸ëü ŸÖ£ÖÖ ˆÃÖß ÃÖ´ÖµÖ ˆÃÖê missing or duplicate or not in serial order or any »ÖÖî™üÖÛú¸ü ˆÃÖÛêú ãÖÖ®Ö ¯Ö¸ü ¤æüÃÖ¸üß ÃÖÆüß ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ »Öê »Öë … other discrepancy should be got replaced immediately by a correct booklet from the invigilator within the ‡ÃÖÛêú ×»Ö‹ †Ö¯ÖÛúÖê ¯ÖÖÑ“Ö ×´Ö®Ö™ü פüµÖê •ÖÖµÖëÝÖê … ˆÃÖÛêú ²ÖÖ¤ü ®Ö period of 5 minutes. Afterwards, neither the Question ŸÖÖê †Ö¯ÖÛúß ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ¾ÖÖ¯ÖÃÖ »Öß •ÖÖµÖêÝÖß †Öî¸ü ®Ö Æüß †Ö¯ÖÛúÖê Booklet will be replaced nor any extra time will be †×ŸÖ׸üŒŸÖ ÃÖ´ÖµÖ ×¤üµÖÖ •ÖÖµÖêÝÖÖ … given. (iii) ‡ÃÖ •ÖÖÑ“Ö Ûêú ²ÖÖ¤ü OMR ¯Ö¡ÖÛú Ûúß ÛÎú´Ö ÃÖÓܵÖÖ ‡ÃÖ ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ (iii) After this verification is over, the OMR Sheet Number ¯Ö¸ü †Ó×ÛúŸÖ Ûú¸ü ¤ëü … should be entered on this Test Booklet. 4. ¯ÖÏŸµÖêÛú ¯ÖÏ¿®Ö Ûêú ×»Ö‹ “ÖÖ¸ü ˆ¢Ö¸ü ×¾ÖÛú»¯Ö (A), (B), (C) ŸÖ£ÖÖ (D) פüµÖê 4. Each item has four alternative responses marked (A), (B), (C) ÝÖµÖê Æïü … †Ö¯ÖÛúÖê ÃÖÆüß ˆ¢Ö¸ü Ûêú ¾Öé¢Ö ÛúÖê ¯Öê®Ö ÃÖê ³Ö¸üÛú¸ü ÛúÖ»ÖÖ Ûú¸ü®ÖÖ Æîü and (D). You have to darken the circle as indicated below on •ÖîÃÖÖ ×Ûú ®Öß“Öê פüÜÖÖµÖÖ ÝÖµÖÖ Æîü … the correct response against each item. ˆ¤üÖÆü¸üÞÖ : Example : •Ö²Ö×Ûúú(C) ÃÖÆüß ˆ¢Ö¸ü Æîü … where (C) is the correct response. 5. ¯ÖÏ¿®ÖÖë Ûêú ˆ¢Ö¸ü Ûêú¾Ö»Ö ¯ÖÏ¿®Ö ¯Ö¡Ö I Ûêú †®¤ü¸ü פüµÖê ÝÖµÖê OMR ¯Ö¡ÖÛú ¯Ö¸ü Æüß 5. Your responses to the items are to be indicated in the OMR †Ó×ÛúŸÖ Ûú¸ü®Öê Æïü … µÖפü †Ö¯Ö OMR ¯Ö¡ÖÛú ¯Ö¸ü פüµÖê ÝÖµÖê ¾Öé¢Ö Ûêú †»ÖÖ¾ÖÖ Sheet given inside the Paper I Booklet only. If you mark ×ÛúÃÖß †®µÖ ãÖÖ®Ö ¯Ö¸ü ˆ¢Ö¸ü דÖÅ®ÖÖÓ×ÛúŸÖ Ûú¸üŸÖê Æïü, ŸÖÖê ˆÃÖÛúÖ ´Ö滵ÖÖÓÛú®Ö at any place other than in the circle in the OMR Sheet, it will ®ÖÆüà ÆüÖêÝÖÖ … not be evaluated. 6. †®¤ü¸ü פüµÖê ÝÖµÖê ×®Ö¤ìü¿ÖÖë ÛúÖê ¬µÖÖ®Ö¯Öæ¾ÖÔÛú ¯ÖœÌëü … 6. Read instructions given inside carefully. 7. Ûú““ÖÖ ÛúÖ´Ö (Rough Work) ‡ÃÖ ¯Öã×ßÖÛúÖ Ûêú †×®ŸÖ´Ö ¯Öéšü ¯Ö¸ü Ûú¸ëü … 7. Rough Work is to be done in the end of this booklet. 8. µÖפü †Ö¯Ö OMR ¯Ö¡ÖÛú ¯Ö¸ü ×®ÖµÖŸÖ Ã£ÖÖ®Ö Ûêú †»ÖÖ¾ÖÖ †¯Ö®ÖÖ ®ÖÖ´Ö, ¸üÖê»Ö 8. If you write your Name, Roll Number, Phone Number or put ®Ö´²Ö¸ü, ±úÖê®Ö ®Ö´²Ö¸ü µÖÖ ÛúÖê‡Ô ³Öß ‹êÃÖÖ ×“ÖÅ®Ö ×•ÖÃÖÃÖê †Ö¯ÖÛúß ¯ÖÆü“ÖÖ®Ö ÆüÖê any mark on any part of the OMR Sheet, except for the space ÃÖÛêú, †Ó×ÛúŸÖ Ûú¸üŸÖê Æïü †£Ö¾ÖÖ †³Ö¦ü ³ÖÖÂÖÖ ÛúÖ ¯ÖϵÖÖêÝÖ Ûú¸üŸÖê Æïü, µÖÖ ÛúÖê‡Ô allotted for the relevant entries, which may disclose your †®µÖ †®Öã×“ÖŸÖ ÃÖÖ¬Ö®Ö ÛúÖ ¯ÖϵÖÖêÝÖ Ûú¸üŸÖê Æïü, •ÖîÃÖê ×Ûú †Ó×ÛúŸÖ ×ÛúµÖê ÝÖµÖê identity, or use abusive language or employ any other unfair ˆ¢Ö¸ü ÛúÖê ×´Ö™üÖ®ÖÖ µÖÖ ÃÖ±êú¤ü õÖÖÆüß ÃÖê ²Ö¤ü»Ö®ÖÖ ŸÖÖê ¯Ö¸üßõÖÖ Ûêú ×»ÖµÖê means such as change of response by scratching or using white fluid, you will render yourself liable to disqualification. †µÖÖêÝµÖ ‘ÖÖê×ÂÖŸÖ ×ÛúµÖê •ÖÖ ÃÖÛúŸÖê Æïü … 9. You have to return the test question booklet and Original 9. †Ö¯ÖÛúÖê ¯Ö¸üßõÖÖ ÃÖ´ÖÖ¯ŸÖ ÆüÖê®Öê ¯Ö¸ü ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ‹¾ÖÓ ´Öæ»Ö OMR ¯Ö¡ÖÛú OMR Sheet to the invigilators at the end of the examination ×®Ö¸üßõÖÛú ´ÖÆüÖê¤üµÖ ÛúÖê »ÖÖî™üÖ®ÖÖ †Ö¾Ö¿µÖÛú Æîü †Öî¸ü ¯Ö¸üßõÖÖ ÃÖ´ÖÖׯŸÖ Ûêú ²ÖÖ¤ü compulsorily and must not carry it with you outside the ˆÃÖê †¯Ö®Öê ÃÖÖ£Ö ¯Ö¸üßõÖÖ ³Ö¾Ö®Ö ÃÖê ²ÖÖÆü¸ü ®Ö »ÖêÛú¸ü •ÖÖµÖë … ÆüÖ»ÖÖÓ×Ûú †Ö¯Ö Examination Hall. You are, however, allowed to carry original ¯Ö¸üßõÖÖ ÃÖ´ÖÖׯŸÖ ¯Ö¸ü ´Öæ»Ö ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ŸÖ£ÖÖ OMR ¯Ö¡ÖÛú Ûúß ›ãü¯»ÖßÛêú™ü question booklet and duplicate copy of OMR Sheet on ¯ÖÏ×ŸÖ †¯Ö®Öê ÃÖÖ£Ö »Öê •ÖÖ ÃÖÛúŸÖê Æïü … conclusion of examination. 10. Ûêú¾Ö»Ö ®Öß»Öê/ÛúÖ»Öê ²ÖÖ»Ö ¯¾ÖÖ‡Õ™ü ¯Öê®Ö ÛúÖ Æüß ‡ÃŸÖê´ÖÖ»Ö Ûú¸ëü … 10. Use only Blue/Black Ball point pen. 11. ×ÛúÃÖß ³Öß ¯ÖÏÛúÖ¸ü ÛúÖ ÃÖÓÝÖÞÖÛú (Ûîú»ÖÛãú»Öê™ü¸ü) µÖÖ »ÖÖÝÖ ™êü²Ö»Ö †Öפü ÛúÖ 11. Use of any calculator or log table etc., is prohibited. ¯ÖϵÖÖêÝÖ ¾ÖÙ•ÖŸÖ Æîü … 12. There is no negative marks for incorrect answers. 12. ÝÖ»ÖŸÖ ˆ¢Ö¸üÖë Ûêú ×»Ö‹ ÛúÖê‡Ô ®ÖÛúÖ¸üÖŸ´ÖÛú †ÓÛú ®ÖÆüà Æïü … J-87-14 1 P.T.O. COMPUTER SCIENCE AND APPLICATIONS Paper – II Note : This paper contains fifty (50) objective type questions of two (2) marks each. All questions are compulsory. 1. Infrared signals can be used for short 6. A grammar G is LL(1) if and only if range communication in a closed the following conditions hold for two area using _______ propagation. distinct productions A → α | β (A) ground (B) sky I. First (α) ∩ First (β) ≠ {a} where (C) line of sight (D) space a is some terminal symbol of the grammar. 2. A bridge has access to _______ II. First (α) ∩ First (β) ≠ λ address in the same network. III. First (α) ∩ Follow (A) = φ if λ ∈ (A) Physical (B) Network First (β) (C) Datalink (D) Application (A) I and II (B) I and III (C) II and III (D) I, II and III 3. The minimum frame length for 10 Mbps Ethernet is _______ bytes 7. Which of the following suffices to convert and maximum is _______ bytes. an arbitrary CFG to an LL(1) grammar ? (A) Removing left recursion alone (A) 64 & 128 (B) 128 & 1518 (B) Removing the grammar alone (C) 1518 & 3036 (D) 64 & 1518 (C) Removing left recursion and 4. The bit rate of a signal is 3000 bps. If factoring the grammar each signal unit carries 6 bits, the baud (D) None of the above rate of the signal is _______. 8. A shift reduce parser suffers from (A) 500 baud/sec (A) shift reduce conflict only (B) 1000 baud/sec (B) reduce reduce conflict only (C) 3000 baud/sec (C) both shift reduce conflict and reduce reduce conflict (D) 18000 baud/sec. (D) shift handle and reduce handle 5. Match the following : conflicts List – I List – II 9. The context free grammar for the a. Physical i. Allow resources to language L = {anbmck | k = |n – m|, layer network access n > 0, m > 0, k > 0} is b. Datalink ii. Move packets from (A) S → S1S3, S1 → aS1c | S2| λ, layer one destination to S2 → aS2b|λ, S3 → aS3b| S4 | λ, other c. Network iii. Process to process S4 → bS4c|λ layer message delivery (B) S → S1S3, S1→ aS1S2c | λ, d. Transport iv. Transmission of S2 → aS2b|λ, S3 → aS3b| S4 |λ, layer bit stream e. Application v. Formation of S4 → bS4c|λ Layer frames (C) S → S1|S2, S1→ aS1S2c | λ, Codes : S2 → aS2b | λ, S3 → aS3b | S4 |λ, a b c d e S4 → bS4c|λ (A) iv v ii iii i (B) v iv i ii iii (D) S → S1 | S3, S1→ aS1c|S2 | λ, (C) i iii ii v iv S2 → aS2b | λ, S3 → a S3b| S4 | λ, (D) i ii iv iii v S4 → bS4c | λ Paper-II 2 J-87-14 10. The regular grammar for the language 15. Regression testing is primarily related to L = {w|na(w) and nb(w) are both even, (A) Functional testing (B) Development testing w ∈ {a, b}*} is given by : (C) Data flow testing (Assume, p, q, r and s are states) (D) Maintenance testing (A) p → aq | br | λ, q → bs | ap 16. How many different truth tables of the r → as | bp, s → ar | bq, p and s compound propositions are there that are initial and final states. involve the propositions p & q ? (B) p → aq | br, q → bs | ap (A) 2 (B) 4 r → as | bp, s → ar | bq, p and s (C) 8 (D) 16 are initial and final states. 17. A Boolean function F is called self- (C) p → aq | br | λ, q → bs | ap dual if and only if r → as | bp, s → ar | bq – – – F(x1, x2, … xn) = F(x 1, x2, … x n) p is both initial and final states. (D) p → aq | br, q → bs | ap How many Boolean functions of degree n are self-dual ? r → as | bp, s → ar | bq n p is both initial and final states. (A) 2n (B) (2)2 2 n–1 11. KPA in CMM stands for (C) (2) n (D) (2) 2 (A) Key Process Area 18. Which of the following statement(s) is (B) Key Product Area (are) not correct ? (C) Key Principal Area i. The 2’s complement of 0 is 0. (D) Key Performance Area ii. In 2’s complement, the left most bit cannot be used to express a 12. Which one of the following is not a quantity. risk management technique for iii. For an n-bit word (2’s managing the risk due to unrealistic complement) which includes the schedules and budgets ? sign bit, there are 2n–1 positive (A) Detailed multi source cost and integers, 2n+1 negative integers schedule estimation. and one 0 for a total of 2n unique (B) Design cost states. (C) Incremental development iv. In 2’s complement the significant (D) Information hiding information is contained in the 1’s of positive numbers and 0’s 13. _______ of a system is the structure or of the negative numbers. structures of the system which (A) i & iv (B) i & ii comprise software elements, the (C) iii (D) iv externally visible properties of these elements and the relationship amongst 19. The notation ∃!xP(x) denotes the them. proposition “there exists a unique x (A) Software construction such that P(x) is true”. (B) Software evolution Give the truth values of the following (C) Software architecture statements : I. ∃!xP(x) → ∃xP(x) (D) Software reuse II. ∃!x ¬ P(x) → ¬∀xP(x) 14. In function point analysis, the number (A) Both I & II are true. of complexity adjustment factors is (B) Both I & II are false. (A) 10 (B) 12 (C) I – false, II – true (C) 14 (D) 20 (D) I – true, II – false J-87-14 3 Paper-II 20. Give a compound proposition 23. Consider a complete bipartite graph involving propositions p, q and r that is km,n. For which values of m and n does true when exactly two of p, q and r are true and is false otherwise. this, complete graph have a Hamilton (A) (p∨q∧¬r) ∧ (p∧¬q∧r) ∧ (¬p∧q∧r) circuit (B) (p∧q∧¬r) ∧ (p∨q∧¬r) ∧ (¬p∧q∧r) (A) m = 3, n = 2 (B) m = 2, n = 3 (C) (p∧q∧¬r) ∨ (p∧¬q∧r) ∧ (¬p∧q∧r) (C) m = n > 2 (D) m = n > 3 (D) (p∧q∧¬r) ∨ (p∧¬q∧r) ∨ (¬p∧q∧r) 21. Consider the graph given below as : 24. Big-O estimates for the factorial function and the logarithm of the factorial function i.e. n! and log n! is given by (A) O(n!) and O(n log n) (B) O(nn) and O(n log n) (C) O(n!) and O(log n!) Which one of the following graph is (D) O(nn) and O(log n!) isomorphic to the above graph ? 25. How many cards must be chosen from a deck to guarantee that atleast (A) i. two aces of two kinds are chosen. ii. two aces are chosen. iii. two cards of the same kind are chosen. iv. two cards of two different kinds (B) are chosen. (A) 50, 50, 14, 5 (B) 51, 51, 15, 7 (C) 52, 52, 14, 5 (D) 51, 51, 14, 5 26. Match the following with respect to the mobile computing technologies : (C) List – I List – II a. GPRS i. An integrated digital radio standard b. GSM ii. 3G wireless/Mobile technology (D) c. UMTS iii. Nine different schemes for modulation and error 22. The upper bound and lower bound for correction the number of leaves in a B-tree of d. EDGE iv. An emerging wireless degree K with height h is given by : service that offers a h–1 mobile data (A) Kh and 2K/2 Codes : h–1 a b c d (B) K*h and 2K/2 (A) iii iv ii i h–1 (C) Kh and 2K/2 (B) iv i ii iii h–1 (C) ii iii iv i (D) K*h and 2K/2 (D) ii i iv iii Paper-II 4 J-87-14 27. Object Request Broker (ORB) is 32. Match the following : I. A software program that runs on List – I List – II the client as well as on the a. Multilevel i. Time-slicing application server. feedback queue II. A software program that runs on b. FCFS ii. Criteria to the client side only. move processes III. A software program that runs on between queues the application server, where c. Shortest iii. Batch most of the components reside. process next processing (A) I, II & III (B) I & II d. Round robin iv. Exponential (C) II & III (D) I only scheduling smoothening 28. A software agent is defined as Codes : I. A software developed for a b c d accomplishing a given task. (A) i iii ii iv II. A computer program which is (B) iv iii ii i capable of acting on behalf of the (C) iii i iv i user in order to accomplish a (D) ii iii iv i given computational task. 33. Consider a system with five processes III. An open source software for accomplishing a given task. P0 through P4 and three resource types (A) I R1, R2 and R3. Resource type R1 has (B) II (C) III 10 instances, R2 has 5 instances and R3 (D) All of the above has 7 instances. Suppose that at time 29. Match the following : T0, the following snapshot of the List – I List – II system has been taken : a. Classification i. Principal component Allocation analysis R1 R2 R3 b. Clustering ii. Branch and Bound P0 0 1 0 c. Feature iii. K-nearest Extraction neighbour P1 2 0 0 d. Feature iv. K-means P2 3 0 2 Selection Codes : P3 2 1 1 a b c d P4 0 2 2 (A) iii iv ii i (B) iv iii i ii Max (C) iii iv i ii R1 R2 R3 (D) iv iii ii i 7 5 3 30. SET, an open encryption and security 3 2 2 specification model that is designed for 9 0 2 protecting credit card transactions on 2 2 2 the internet, stands for 4 3 3 (A) Secure Electronic Transaction (B) Secular Enterprise for Transaction Available (C) Security Electronic Transmission R1 R2 R3 (D) Secured Electronic Termination 3 3 2 31. In a paged memory management Assume that now the process P1 requests algorithm, the hit ratio is 70%. If it takes 30 nanoseconds to search Translation one additional instance of type R1 and Look-aside Buffer (TLB) and 100 two instances of resource type R3. The nanoseconds (ns) to access memory, the effective memory access time is state resulting after this allocation will be (A) 91 ns (B) 69 ns (A) Ready state (B) Safe state (C) 200 ns (D) 160 ns (C) Blocked state (D) Unsafe state J-87-14 5 Paper-II 34. Match the following : 38. Searching for an element in the hash List – I List – II table requires O(1) time for the a. Contiguous i. This scheme ________ time, whereas for direct allocation supports very addressing it holds for the ________ large file sizes. time. b. Linked ii. This allocation allocation technique (A) worst-case, average supports only (B) worst-case, worst-case sequential files. (C) average, worst-case c. Indexed iii. Number of (D) best, average allocation disks required to access file is 39. An algorithm is made up of 2 modules minimal. M1 and M2. If time complexity of d. Multi-level iv. This technique modules M1 and M2 are h(n) and g(n) indexed suffers from maximum respectively, the time complexity of wastage of the algorithm is space in storing (A) min (h(n), g(n)) pointers. (B) max (h(n), g(n)) Codes : (C) h(n) + g(n) a b c d (D) h(n) * g(n) (A) iii iv ii i (B) iii ii iv i 40. What is the maximum number of (C) i ii iv iii parenthesis that will appear on the (D) i iv ii iii stack at any one time for parenthesis expression given by 35. Which of the following commands will (( ) ( ( ) ) ( ( ) ) ) output “onetwothree” ? (A) 2 (B) 3 (A) for val; do echo-n $val; done < one two three (C) 4 (D) 5 (B) for one two three; do echo-n-; 41. Match the following : done List – I List – II (C) for n in one two three; do echo-n a. Automatic i. Scope of the $n; done storage class variable is global. (D) for n in one two three {echo –n $ n} b. Register ii. Value of the 36. Mergesort makes two recursive calls. storage class variable persists Which statement is true after these two between different recursive calls finish, but before the function calls. merge step ? c. Static iii. Value stored in (A) The array elements form a heap. storage class memory and (B) Elements in each half of the array local to the block are sorted amongst themselves. (C) Elements in the first half of the in which the array are less than or equal to variable is elements in second half of the array. defined. (D) All of the above d. External iv. Value stored in storage class CPU registers. 37. A text is made up of the characters α, Codes : β, γ, δ and σ with the probability 0.12, a b c d 0.40, 0.15, 0.08 and 0.25 respectively. The optimal coding technique will (A) iii iv i ii have the average length of (B) iii iv ii i (A) 1.7 (B) 2.15 (C) iv iii ii i (C) 3.4 (D) 3.8 (D) iv iii i ii Paper-II 6 J-87-14 42. When we pass an array as an argument 47. Which of the following statements is to a function, what actually gets passed ? false ? (A) Address of the array (A) Any relation with two attributes (B) Values of the elements of the is in BCNF. array (B) A relation in which every key has only one attribute is in 2NF. (C) Base address of the array (C) A prime attribute can be (D) Number of elements of the array transitively dependent on a key in 3NF relation. 43. While (87) printf(“computer”); (D) A prime attribute can be The above C statement will transitively dependent on a key in BCNF relation. (A) print “computer” 87 times (B) print “computer” 0 times 48. A clustering index is created when (C) print “computer” 1 times _______. (D) print “computer” infinite times (A) primary key is declared and ordered 44. A friend function can be used to (B) no key ordered (A) avoid arguments between classes. (C) foreign key ordered (B) allow access to classes whose (D) there is no key and no order source code is unavailable. (C) allow one class to access an 49. Let R ={A, B, C, D, E, F} be a relation unrelated class. schema with the following dependencies C → F, E → A, EC → D, A → B (D) None of the above Which of the following is a key for R ? (A) CD (B) EC 45. Which of the following is the correct (C) AE (D) AC value returned to the operating system upon the successful completion of a program ? 50. Match the following : (A) 0 List – I List – II (B) 1 a. DDL i. LOCK TABLE (C) –1 b. DML ii. COMMIT (D) Program do not return a value. c. TCL iii. Natural Difference d. BINARY iv. REVOKE Operation 46. Manager’s salary details are hidden Codes : from the employee. This is called as a b c d (A) Conceptual level data hiding (A) ii i iii iv (B) Physical level data hiding (B) i ii iv iii (C) External level data hiding (C) iii ii i iv (D) Local level data hiding (D) iv i ii iii J-87-14 7 Paper-II Space For Rough Work