Professional Documents
Culture Documents
INFORMATION TECHNOLOGY
ONE MARKS QUESTIONS (1-20) Consider the strings u = abbaba, v = bab,
and w = aabb. Which of the following
states is true?
1. In a certain town, the probability that it
a. The automaton accepts u and i’ but not
will rain in the afternoon is known to be
w
0.6. Moreover, meteorological data
indicates that if the temperature at noon is b. The automaton accepts each of a, v,
less than or equal to 25°C, the probability and w
that it will rain in the afternoon is 0.4. The c. The automaton rejects each of a, v, and
temperature at noon is equally likely to be w
above 25°C, or at/below 25°C. What is the d. The automaton accepts a but rejects v
probability that it will rain in the afternoon and w
on a day when the temperature at noon is 4. In the context-free grammar below, S is
above 25°C? the start symbol, a and b are terminals, and
a. 0.4 ε denotes the empty string
b. 0.6 S → aSa bSb a b ε
c. 0.8
Which of the following strings is NOT
d. 0.9 generated by the grammar?
2. For the set N of natural numbers and a a. aaaa
binary operation f : N × N → N, an b. baba
element z ∈ N is called an identity for f if
c. abba
f ( a, z ) = a = f ( z , a ) , for all a ∈ N .
d. babaaabab
Which of the following binary operations 5. Which regular expression best describes
have an identity? the language accepted by the
1. f ( x, y ) = x + y − 3 nondeterministic automaton below?
2. f ( x, y ) = max ( x, y )
3. f ( x, y ) = x y
a. 1 and 2 only
b. 2 and 3 only a. (a + b)* a(a + b)b
c. 1 and 3 only b. (abb)*
d. None of these c. (a + b)* a(a + b)* b(a + b)*
3. In the automaton below, s is the start state d. (a + b)*
Given a boolean function f ( x1 , x2 ,......xn )
and t is the only final state.
6.
which of the following equations is NOT
true
f ( x1 , x2 ,......, xn ) = x1 ' f ( x1 , x2 ...., xn )
a.
+ x1 f ( x1 , x2 ,...., xn )
f ( x1 , x2 ,...., xn ) = x2 f ( x1 , x2 ...., xn )
b.
+ x2 ' f ( x1 , x2 ,...., xn )
f ( x1 , x2 ,...., xn ) = xn ' f ( x1 , x2 ...., 0 )
c.
+ xn f ( x1 , x2 ,....,1)
2 of 14
f ( x1 , x2 ,...., xn ) = f ( 0, x2 ...., xn ) exceeds the total number of available
d. frames.
+ f (1, x2 ,...., xn )
a. 1 only
7. The addition of 4-bit, two’s complement, b. 2 only
binary numbers 1101 and 0100 results in c. Neither 1 nor 2
a. 0001 and an overflow d. Both 1 and 2
b. 1001 and no overflow 13. The process state transition diagram of an
c. 0001 and no overflow operating system is as given below.
d. 1001 and an overflow
8. Which of the following DMA transfer
modes and interrupt handling mechanisms
will enable the highest I/O bandwidth?
a. Transparent DMA and Polling
interrupts
b. Cycle-stealing and Vectored interrupts
c. Block transfer and Vectored interrupts
d. Block transfer and Polling interrupts Which of the following must be FALSE
9. In a binary tree, the number of internal about the above operating system?
nodes of degree 1 is 5, and the number of a. It is a multi programmed operating
internal nodes of degree 2 is 10. The system
number of leaf nodes in the binary tree is b. It uses preemptive scheduling
a. 10 c. It uses non-preemptive scheduling
b. 11 d. It is a multi-user operating system
Consider the relations r1 ( P, Q, R ) and
c. 12
14.
d. 15
10. A problem in NP is NP-complete if r2 ( R, S , T ) with primary keys P. and R
a. it can be reduced to the 3-SAT respectively. The relation r1 contains 2000
problem in polynomial time tuples and r2 contains 2500 tuples. The
b. the 3-SAT problem can be reduced to maximum size of the join r1 r2 is
it in polynomial time a. 2000
c. it can be reduced to any other problem b. 2500
in NP in polynomial time c. 4500
d. some problem in NP can be reduced to d. 5000
it in polynomial time 15. Which of the following relational query
11. If all the edge weights of an undirected languages have the same expressive
graph are positive, then any subset of power?
edges that connects all the vertices and has 1. Relational algebra
minimum total weight is a 2. Tuple relational calculus restricted to
a. Hamiltonian cycle safe expressions
b. grid 3. Domain relational calculus restricted to
c. hypercube safe expressions
d. tree a. 2 and 3 only
12. In the working-set strategy, which of the b. 1 and 2 only
following is done by the operating system c. 1 and 3 only
to prevent thrashing? d. 1, 2 and 3
1. It initiates another process if there are 16. The cyclomatic complexity of the flow
enough extra frames. graph of a program provides
2. It selects a process to suspend if the a. an upper bound for the number of tests
sum of the sizes of the working-sets that must be conducted to ensure that
3 of 14
all statements have been executed at 1. A hash function takes a message of
most once arbitrary length and generates a fixed
b. a lower bound for the number of tests length code.
that must be conducted to ensure that 2. A hash function takes a message of
all statements have been executed at fixed length and generates a code of
most once variable length.
c. an upper bound for the number of tests 3. A hash function may give the same
that must be conducted to ensure that hash value for distinct messages.
all statements have been executed at a. 1 only
least once b. 2 and 3 only
d. a lower bound for the number of tests c. 1 and 3 only
that must be conducted to ensure that d. 2 only
all statements have been executed at
least once
17. With respect to software testing, consider a TWO MARKS QUESTIONS (21-75)
flow graph G with one connected
component. Let E be the number of edges, 21. Consider the following first order logic
N be the number of nodes, and P be the formula in which R is a binary relation
number of predicate nodes of C. Consider symbol.
∀x∀y ( R ( x, y ) ⇒ R ( y, x ) )
the following four expressions:
1. E – N + P
2. E – N + 2 The formula is
3. P + 2 a. satisfiable and valid
4. P + 1 b. satisfiable and so is its negation
The cyclomatic complexity of G is given c. unsatisfiable but its negation is valid
by d. satisfiable but its negation is
a. 1 or 3 unsatisfiable
b. 2 or 3 22. When a coin is tossed, the probability of
getting a Head is p, 0 < p < 1. Let N be the
c. 2 or 4
random variable denoting the number of
d. 1 or 4 tosses till the first Head appears, including
18. HELO and PORT, respectively, are the toss where the Head appears.
commands from the protocols Assuming that successive tosses are
a. FTP and HTP independent, the expected value of N is
b. TELNET and POP3 a. 1/p
c. HTTP and TELNET b. 1/(1 – p)
d. SMTP and FTP c. 1/p2
19. Which of the following statements is d. 1/(1 - p)2
TRUE? 23. Let P, Q, and R be sets. Let Δ denote the
a. Both Ethernet frame and IP packet symmetric difference operator defined as
include checksum fields pΔQ = ( P ∪ Q ) − ( P ∩ Q ) . Using Venn
b. Ethernet frame includes a checksum diagrams, determine which of the
field and IF packet includes a CRC
following is/are TRUE.
field
c. Ethernet frame includes a CRC field 1. pΔ ( Q ∪ R ) = ( PΔQ ) ∩ ( PΔR )
and IF packet includes a checksum 2. p ∩ ( Q ΔR ) = ( P ∩ Q ) Δ ( P ∩ R )
field
a. 1 only
d. Both Ethernet frame and IP packet
include CRC fields b. 2 only
20. Which of the following statement(s) is c. Neither 1 nor 2
TRUE? d. Both 1 and 2
4 of 14
24. What is the cardinality of the set of d. 4 1 2 3
integers X defined below? 28. The following definite integral evaluates to
X = {n | 1 ≤ n ≤ 123, n is not divisible by 0
⎛ x2 ⎞
−⎜ ⎟
⎜ 20 ⎟
∫e
⎝ ⎠ dx
either 2, 3 or 5)
a. 28 −∞
b. 33 a. 1/2
c. 37 b. π 10
d. 44 c. 10
25. Consider the undirected graph G defined
d. π
as follows. The vertices of G are bit strings
of length n. We have an edge between 29. Consider the regular grammar below.
vertex n and vertex u if and only if is and v S → bS aA ε
differ in exactly one bit position (in other A → aS | bA
words, v can be obtained from u by
The Myhill-Nerode equivalence classes for
flipping a single bit). The ratio of the
the language generated by the grammar are
chromatic number of G to the diameter of
G is a. {w ∈ ( a + b ) * | #a ( w ) is even} and
a. 1/2n-1 {w ∈ ( a + b ) * | #a ( w ) is odd}
b. 1/n
b. {w ∈ ( a + b ) * | #b ( w ) is even} and
c. 2/n
d. 3/n {w ∈ ( a + b ) * | #b ( w ) is odd}
26. What are the eigenvalues of the matrix P c. {w ∈ ( a + b ) * | #a ( w ) = #b ( w ) } and
given below?
{w ∈ ( a + b ) * | #a ( w ) ≠ #b ( w ) }
⎛a 1 0⎞
⎜
P = ⎜1 a 1⎟
⎟ d. {ε } ,{wa | w ∈ ( a + b ) *} and
⎜0 1 a⎟
⎝ ⎠ {wb | w ∈ ( a + b ) *}
Order of convcrence b. {a b c | l ≠ m or m ≠ n}
l m n
1. 2 or more
2. 1.62 c. {a b | n ≥ 0}
n n
3. 1 d. {a b | m, n ≥ 0}
m n
b. {a b l
c | l = m}
m n
{a b c | 2l = m + n}
l m n
a. XOR, AND
c.
b. XOR, XOR
d. {a b l
c | m = n}
m n
c. OR, OR
d. OR, AND
34. In the context-free grammar below, S is
the start symbol, a and b are terminals, ε 37. For a state machine with the following
denotes the empty string. state diagram, the expression for the next
state S+ in terms of the current state S and
S → aSAb | ε
the input variables x and y is
A → bA | ε
The grammar generates the language
a. ( ( a + b ) * b ) *
b. {a m n
b | m ≤ n}
c. {a m n
b | m = n}
a. S + = S '. y '+ S .x
d. a * b *
35. The boolean function for a combinational b. S + = S .x. y '+ S '. y.x '
circuit with four inputs is represented by c. S + = x. y '
the following Karnaugh map.
d. S + = S '. y + S .x '
6 of 14
38. When multiplicand Y is multiplied by
multiplier X = xn −1 xn − 2 .......x0 using bit-pair
recoding in Booth’s algorithm, partial
products are generated according to the
following table.
a. Karthikeyan, Boris
b. Sachin, Salman
c. Karthikeyan, Boris, Sachin
d. Schumacher, Senna
85. Let ii be the number of comparisons
performed when the above SQL query is
optimally executed. If linear search is used
to locate a tuple in a relation using primary
key, then ii lies in the range
a. 3640
b. 44-48
c. 60-64
d. 100-104