Professional Documents
Culture Documents
Note : This paper contains fifty (50) objective type questions. Each question carries
two (2) marks. All questions are compulsory.
1. Let X and Y be two sets having n elements 7. Minimize the following Boolean
each. Then the total number of bijective function using Karnaugh map :
functions from X and Y is F (w, x, y, z) = Σ (0, 1, 2, 4, 5, 6, 8, 9, 12, 13, 14)
(A) n (B) 2n (A) y′ + w′z′ + xz′ (B) y′ + w′yz′ + xyz′
(C) n! (D) 2n
(C) y′ + z′ (D) y′ + w′ + w′
2. Two finite sets have m and n elements.
The total number of subsets of the first 8. How many BCD adder stages are
set is 56 more than that of the total needed for a decimal parallel adder that
number of subsets of the second. The adds ‘n’ decimal digits ? Assume that
values of m and n are the output carry from one stage must be
(A) 7, 6 (B) 6, 3 connected to the input carry of the next
(C) 5, 1 (D) 8, 7
higher-order stage.
3. Let P, Q and R be three languages. If P (A) n – 1 (B) n
and R are regular and if PQ = R, then (C) n + 1 (D) 2n
(A) Q has to be regular
(B) Q cannot be regular 9. The floating-point representation is
(C) Q need not be regular defined in IEEE standard
(D) Q has to be a CFL (A) 541 (B) 633
4. Suppose that a connected plane graph (C) 754 (D) 802
has 20 vertices each of degree 3. How 10. Consider a combinational circuit designed
many regions, does a representation of
using ROM that accepts a 3-bit number
this planar graph split the plane ?
(A) 6 (B) 9 and generates an output binary number
(C) 11 (D) 12 equal to the square of the input number.
What is minimum size of the ROM ?
5. ? in regular expression indicates
(A) 3 × 4 (B) 3 × 8
(A) Matches any character
(B) Matches zero or more instances of (C) 8 × 4 (D) 8 × 8
the previous pattern item 11. Assume a = 10, b = 20 and c = 0 of integer
(C) Matches one or more instances of
type variables. To find the addition of a
the previous pattern item
(D) Matches zero or one instances of and b without using arithmetic operators,
the previous pattern item which of the following code is correct ?
(A) a++ ; while (b – –)
6. The proposition ¬(P ∧ Q) ⇔ (¬P ∨ ¬Q) is (B) while (b+ +) a++ ;
(A) Tautology (B) Contradiction (C) b – – ; while (a++)
(C) Contingency (D) Not valid (D) while (b – –) a++ ;
Paper II 2 K-2415
*K2415* Total Number of Pages : 8
12. Given below are some statements about 15. Assume that the random number
the default (0-argument) constructor : generating function – rand ( ), returns an
I) Its return type is the type of the integer between 0 and 10000 (both
class. inclusive). To randomly generate a
number between a and b (both inclusive),
II) It has no return type.
use the expression
III) The programmer can define it, but (A) rand ( ) % (b – a)
the C++ language doesn’t require (B) (rand ( ) % a) + b
this. (C) (rand ( ) % (b – a)) + a
IV) The programmer must define it. (D) (rand ( ) % (b – a + 1)) + a
V) It is always defined by C++ if it isn’t 16. Logical data independence in the three-
provided by the programmer. schema architecture means :
VI) It is sometimes, but not always, 1) The capacity to change the
defined by C++ if it isn’t provided conceptual schema without having
by the programmer. to change external schema or
Which of the statements are true ? application programs.
(A) I, III and V only 2) The capacity to change the internal
(B) I, II and VI only schema without having to change
(C) II and IV only the conceptual schema.
(D) II, III and VI only Which of the following statement is true
about the logical data independence :
13. When an ADT is implemented as a C++ (A) Both statements, 1) and 2) are true
class, which of the following should (B) Neither statement 1) nor statement
normally be true ? 2) is true
(A) Member functions are private, (C) Only statement 2) is true
member variables are public. (D) Only statement 1) is true
(B) Member functions are public,
member variables are private. 17. A key K of a relation schema R is :
(C) Member functions as well as 1) A superkey of R.
member variables are private. 2) Removing any attribute A from K
(D) Member functions as well as leaves a set of attributes K′ that
member variables are public. is not a superkey of R.
Which one of the following is correct
14. What is Shallow Copy ?
about a key ?
(A) A Shallow Copy creates a copy of the
(A) Only statement 1) need to be satisfied
dynamically allocated objects too
(B) Only statement 2) need to be satisfied
(B) A Shallow Copy creates a copy of (C) Both statement 1) and 2) need to be
the statistically allocated object too satisfied
(C) A Shallow Copy just copies the (D) Neither statement 1) nor statement
value of the data as they are 2) need to be satisfied
(D) Both B) and C)
K-2415 3 Paper II
*K2415* Total Number of Pages : 8
18. From the following statements : 21. In a 2-dimentional matrix A, let m be the
1) A superkey SK defines a uniqueness number of rows, n be the number of
constraint that no two distinct columns, ws be the word-size of the data
tuples in any state r of R can have
item, lower bound of both row and column
the same value for SK.
be 1 and let BA be the base-address of
2) A relation schema may have more
the matrix. If the matrix were to be stored
than one key. In such a case, each of
the keys is called a candidate key. using row-major representation, the
3) A database state that does not memory location of the element A(i, j) can
obey all the integrity constraints is be found using the formula
called an invalid state. (A) BA + [((m – 1) * i) + j] * ws
Which one of the following is correct ? (B) BA + [(m * i) + (j – 1)] * ws
(A) All statements are true (C) BA + [(n * (i – 1)) + j] * ws
(B) Statements 1) and 2) are true, but
(D) BA + [(n * (i – 1)) +(j – 1)] * ws
statement 3) is false
(C) Statements 1) and 3) are true, but 22. In a Binary Tree, if the inorder and preorder
statement 2) is false
traversing result in the sequence 5, 4,
(D) Statements 2) and 3) are true, but
1) is false 6, 7, 8, 3 and 7, 4, 5, 6, 8, 3 respectively,
the post-order traversing sequence is
19. Note the following statements : (A) 5, 6, 4, 8, 3, 7 (B) 5, 6, 4, 3, 8, 7
1) The insert operation can violate entity (C) 5, 6, 4, 7, 3, 8 (D) 5, 6, 7, 4, 3, 8
integrity constraint or referential
integrity constraint. 23. The Quick sort algorithm :
2) The delete operation can violate 2
1) Worst case complexity is O(n )
only referential integrity.
2) Average case complexity is
3) Updating an attribute that is neither
O(n log2n)
part of a primary key nor a foreign
key usually causes no problems. 3) Performs badly when input elements
Which one of the following is correct are given in sorted order
about the statements ?
4) Pivot element always divides the
(A) All statements are true
(B) Statements 1) and 2) are true, but elements into two equal sized
statement 3) is false sub-arrays
(C) Statements, 2) and 3) are true, but Which of the following option are correct ?
statement 1) is false (A) Statements 1), 2) and 4) are true, but
(D) Statements 1) and 3) are true, but statement 3) is false
statement 2) is false
(B) Statements 1), 2) and 3) are true, but
20. ‘A’ in the ACID property of the Database statement 4) is false
Management System stands for (C) Statements 1) and 2) are true, but
(A) Accountability (B) Allowability
statements 3) and 4) are false
(C) Accessibility (D) Atomicity
(D) All statements are true
Paper II 4 K-2415
*K2415* Total Number of Pages : 8
24. Strassen’s matrix multiplication algorithm : 27. What do routers use to segment LANs ?
1) Complexity is O(n3) (A) SNAP
(B) Logical addresses
2) Complexity is O(nlog27) (C) MAC addresses
3) Decreases number of multiplication (D) CDP
compared to traditional multiplication
algorithm 28. A pure ALOHA network transmits
200-bit frames on a shared channel of
4) Uses divide and conquer technique 200 kbps. What is the throughput if the
Which of the following option is correct ? system (all systems together) produces
(A) Statements 2), 3) and 4) are true, but 1000 frames per second ?
statement 1) is false (A) 50 (B) 135 (C) 200 (D) 270
(B) Statements 1), 3) and 4) are true, but 29. A network on the Internet has a subnet
statement 2) is false mask of 255.255.240.0. What is the
(C) Statements 2) and 4) are true, but maximum number of hosts it can handle ?
statements 1) and 3) are false (A) 256 (B) 1024
(D) Statements 2) and 3) are true, but (C) 256 × 256 (D) 4096
statements 1) and 4) are false
30. Suppose that the TCP congestion
25. Consider the following Binary Search Tree : window is set to 18 KB and a timeout
occurs. How big will the window be if
the next four transmission bursts are all
successful ? Assume that the maximum
segment size is 1 KB.
(A) 1 KB (B) 2 KB
(C) 4 KB (D) 8 KB
31. Consider the grammar :
S → ABSc/Abc
BA → AB
Bb → bb
If we delete the element 50, which Ab → ab
element will replace the element 50 in Aa → aa
the tree ? Which of the following sentences can
(A) 45 be derived by this grammar ?
(B) 75 (A) abc (B) aab
(C) Either 45 or 75 (C) abcc (D) abbc
(D) Neither 45 nor 75 32. Match all the items in Group 1 with correct
26. Consider the coding scheme for error options from those given in Group 2 :
correction in the following table : Group 1 Group 2
Dataword Codeword P) Regular 1) Syntax analysis
expression
00 00000 Q) Pushdown 2) Code generation
01 01011 automata
R) Data flow 3) Lexical analysis
10 10101 analysis
11 11110 S) Register 4) Code optimization
The minimum Hamming distance of the allocation
(A) P – 4, Q – 1, R – 2, S – 3
coding scheme is (B) P – 3, Q – 1, R – 4, S – 2
(A) 1 (B) 2 (C) P – 3, Q – 4, R – 1, S – 2
(C) 3 (D) 4 (D) P – 2, Q – 1, R – 4, S – 3
K-2415 5 Paper II
*K2415* Total Number of Pages : 8
44. _______ is a Black Box testing method. 48. Assume that a mobile service provider
(A) Boundary Value Analysis is allocated 124 slots in a Country. The
(B) Basic path testing frequency slots are in the uplink frequency
(C) Code path analysis range :
Ch1 : 890 MHz ± 100 KHz
(D) Top-down testing
Ch2 : 890.2 MHz ± 100 KHz
45. What is the appropriate pairing of items and so on till
in the two columns listing various activities Ch124 : 915 MHz ± 100 KHz.
encounted in a software life cycle ? What is the spectrum allocated ?
(A) 890 MHz (B) 100 KHz
List – I List – II
(C) 915 MHz (D) 25 MHz
P) Requirements 1) Module
49. The values for a given set of data are
capture development and
grouped into intervals. The intervals and
integration
corresponding frequencies are as follows :
Q) Design 2) Domain analysis Age Frequency
R) Implementation 3) Structural and 1–5 200
behavioural 5 – 15 450
modeling 15 – 20 300
S) Maintenance 4) Performance 20 – 50 1500
tuning 50 – 80 700
(A) P – 3, Q – 2, R – 4, S – 1 80 – 110 44
(B) P – 2, Q – 3, R – 1, S – 4 Compute an approximate median value
(C) P – 3, Q – 2, R – 1, S – 4 for the data.
(D) P – 2, Q – 3, R – 4, S – 1 (A) 36.4 years (B) 32.94 years
(C) 28.6 years (D) 16.7 years
46. Which Act among the following gave legal
validity to the electronic-commerce 50. A dishonest casino uses a fair die most
(e-commerce) in India ? of the time. However, it switches to a
(A) Company Act loaded die with a probability of 0.05 and
(B) Consumer Protection Act switches back to the fair die with a
(C) IT Act probability 0.10. The fair die has a
(D) Cyber Act 1
probability of of rolling any number.
6
47. Amdahl’s law broadly related to the
following issue. The loaded die has P(1) = P(2) = P(3) =
P(4) = P(5) = 0.10 and P(6) = 0.50.
(A) Instruction stream and data stream
Calculate Emission probabilities for
(B) Doubling of computers performance
Fair (F) and Loaded (L) states.
every eighteen months
(C) Memory hierarchy ⎛1 ⎞
(A) (2, 3) (B) ⎜ , 0.5 ⎟
(D) Bottleneck of sequential code for ⎝6 ⎠
parallel processing (C) (3, 2) (D) (4, 5)
____________
K-2415 7 Paper II
*K2415* Total Number of Pages : 8
Paper II 8 K-2415
KSET - 2015
Subject: COMPUTER SCI. & Code: 24
APPLICATION
KEY - Paper - II
Q.No Ans Q.No Ans Q.No Ans
1 C 21 D 41 C
2 B 22 B 42 C
3 C 23 B 43 D
4 D 24 A 44 A
5 D 25 C 45 B
6 A 26 C 46 C
7 A 27 B 47 D
8 B 28 B 48 D
9 C 29 D 49 B
10 C 30 D 50 B
11 D 31 A
12 D 32 B
13 B 33 C
14 C 34 A
15 D 35 A
16 D 36 A
17 C 37 B
18 A 38 A
19 A 39 B
20 D 40 B