You are on page 1of 73

1.

The postfix expression AB + CD – * can be evaluated using a


(A) stack (B) tree
(C) queue (D) linked list
Ans: A

2. The post order traversal of a binary tree is DEBFCA. Find out the preorder
traversal.
(A) ABFCDE (B) ADBFEC
(C) ABDECF (D) None of the above
Ans: C

3. The branch logic that provides making capabilities in the control unit is
known as
(A) Controlled transfer (B) Conditional transfer
(C) Unconditional transfer (D) None of the above
Ans: A

4. The number of colours required to properly colour the vertices of every planer
graph is
(A) 2 (B) 3
(C) 4 (D) 5
Ans: D

5. Networks that use different technologies can be connected by using


(A) Packets (B) Switches
(C) Bridges (D) Routers
Ans: d

6. Both hosts and routers are TCP/IP protocol software. However, routers do not
use protocol from all layers. The layer for which protocol software is not
needed by a router is
(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)
Ans: A

7. In multiuser database if two users wish to update the same record at the same
time, they are prevented from doing so by
(A) Jamming (B) Password
(C) Documentation (D) Record lock
Ans: D

8. A binary search tree is a binary tree :


(A) All items in the left subtree are less than root
(A) All items in the right subtree are greater than or equal to the root
(C) Each subtree is itself a binary search tree
(D) All of the above
Ans: D

9. What deletes the entire file except the file structure ?


(A) ERASE (B) DELETE
(C) ZAP (D) PACK
Ans: C

10. Which command is the fastest among the following ?


(A) COPY TO <NEW FILE>
(B) COPY STRUCTURE TO <NEW FILE>
(C) COPY FILE <FILE 1> <FILE 2>
(D) COPY TO MFILE-DAT DELIMITED
Ans: B

11. B+ tree are preferred to binary tree in Database because


(A) Disk capacity are greater than memory capacities
(B) Disk access is much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disks are more reliable than memory
Ans: B

12. A Transaction Manager is which of the following ?


(A) Maintains a log of transactions
(B) Maintains before and after database images
(C) Maintains appropriate concurrency control
(D) All of the above
Ans: D

13. Leaves of which of the following trees are at the same level ?
(A) Binary tree (B) B-tree
(C) AVL-tree (D) Expression tree
Ans: B

14. Which of the following TCP/IP Internet protocol is diskless machine uses to
obtain its IP address from a server ?
(A) RAP (B) RIP
(C) ARP (D) X.25
Ans: C

15. Decryption and encryption of data are the responsibility of which of the
following layer ?
(A) Physical layer (B) Data Link layer
(C) Presentation layer (D) Session layer
Ans: C
16. In which circuit switching, delivery of data is delayed because data must be
stored and retrieved from RAM ?
(A) Space division (B) Time division
(C) Virtual (D) Packet
Ans: B

17. In which Routing Method do all the routers have a common database?
(A) Distance vector (B) Link state
(C) Link vector (D) Dijkestra method
Ans: B

18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps
using 16 level. Find the line signals and speed (i.e. modulation rate).
(A) 2400 bauds (B) 1200 bauds
(C) 4800 bauds (D) 9600 bauds
Ans: A

19. The station to hub distance in which it is 2000 metres.


(A) 100 Base-Tx (B) 100 Base-Fx
(C) 100 Base-T4 (D) 100 Base-T1
Ans: B

20. Main aim of software engineering is to produce


(A) program
(B) software
(C) within budget
(D) software within budget in the given schedule
Ans: D

21. Key process areas of CMM level 4 are also classified by a process which is
(A) CMM level 2 (B) CMM level 3
(C) CMM level 5 (D) All of the above
Ans: C

22. Validation means


(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above
Ans: B

23. If a process is under statistical control, then it is


(A) Maintainable (B) Measurable
(C) Predictable (D) Verifiable
Ans: C

24. In a function oriented design, we


(A) minimize cohesion and maximize coupling
(B) maximize cohesion and minimize coupling
(C) maximize cohesion and maximize coupling
(D) minimize cohesion and minimize coupling
Ans: B

25. Which of the following metric does not depend on the programming language used
?
(A) Line of code (B) Function count
(C) Member of token (D) All of the above
Ans: B

26. A / B+ tree index is to be built on the name attribute of the relation


STUDENT. Assume that all students names are of length 8 bytes, disk block are
of size 512 bytes and index pointers are of size 4 bytes. Given this scenario
what would be the best choice of the degree (i.e. the number of pointers per
node) of the B+ tree ?
(A) 16 (B) 42
(C) 43 (D) 44
Ans: A

27. The Inorder traversal of the tree will yield a sorted listing of elements of
tree in
(A) Binary tree (B) Binary search tree
(C) Heaps (D) None of the above
Ans: B

28. Mobile IP provides two basic functions.


(A) Route discovery and registration
(B) Agent discovery and registration
(C) IP binding and registration
(D) None of the above
Ans: B

29. Pre-emptive scheduling is the strategy of temporarily suspending a gunning


process
(A) before the CPU time slice expires
(B) to allow starving processes to run
(C) when it requests I/O
(D) to avoid collision
Ans: A

30. In round robin CPU scheduling as time quantum is increased the average turn
around time
(A) increases (B) decreases
(C) remains constant (D) varies irregularly
Ans: D
31. Resources are allocated to the process on non-sharable basis is
(A) mutual exclusion (B) hold and wait
(C) no pre-emption (D) circular wait
Ans: A

32. Cached and interleaved memories are ways of speeding up memory access between
CPU’s and slower RAM. Which memory models are best suited (i.e. improves the
performance most) for which programs ?
(i) Cached memory is best suited for small loops.
(ii) Interleaved memory is best suited for small loops
(iii) Interleaved memory is best suited for large sequential code.
(iv) Cached memory is best suited for large sequential code.
(A) (i) and (ii) are true.
(B) (i) and (iii) are true.
(C) (iv) and (ii) are true.
(D) (iv) and (iii) are true.
Ans: B

33. Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5.


Percentage of page fault that would occur if FIFO page replacement algorithm
is used with number of frames for the JOB m=4 will be
(A) 8 (B) 9
(C) 10 (D) 12
Ans: C

34. Check sum used along with each packet computes the sum of the data, where data
is treated as a sequence of
(A) Integer (B) Character
(C) Real numbers (D) Bits
Ans: D

35. If an integer needs two bytes of storage, then the maximum value of a signed
integer is
(A) 216 – 1 (B) 215 – 1
(C) 216 (D) 215
Ans: B

36. Which of the following logic families is well suited for high-speed operations
?
(A) TTL (B) ECL
(C) MOS (D) CMOS
Ans: B

37. Interrupts which are initiated by an instruction are


(A) Internal (B) External
(C) Hardware (D) Software
Ans: D

38. printf(“%c”, 100);


(A) prints 100
(B) prints ASCII equivalent of 100
(C) prints garbage
(D) none of the above
Ans: B

39. For the transmission of the signal, Bluetooth wireless technology uses
(A) time division multiplexing
(B) frequency division multiplexing
(C) time division duplex
(D) frequency division duplex
Ans: C

40. Consider the following statements :


I. Recursive languages are closed under complementation.
II. Recursively enumerable languages are closed under union.
III. Recursively enumerable languages are closed under complementation.
Which of the above statements are true ?
(A) I only
(B) I and II
(C) I and III
(D) II and III
Ans: B

41. What is the routing algorithm used by RIP and IGRP ?


(A) OSPF (B) Link-state
(C) Dynamic (D) Dijkestra vector
Ans: D

42. Identify the incorrect statement :


(A) The overall strategy drives the E-Commerce data warehousing strategy.
(B) Data warehousing in an E-Commerce environment should be done in a classical
manner.
(C) E-Commerce opens up an entirely new world of web server.
(D) E-Commerce security threats can be grouped into three major categories.
Ans: D

43. Reliability of software is directly dependent on


(A) quality of the design
(B) number of errors present
(C) software engineers experience
(D) user requirement
Ans: B
44. ______ is not an E-Commerce application.
(A) House banking
(B) Buying stocks
(C) Conducting an auction
(D) Evaluating an employee
Ans: D

45. ______ is a satellite based tracking system that enables the determination of
person’s position.
(A) Bluetooth
(B) WAP
(C) Short Message Service
(D) Global Positioning System
Ans: D

46. A complete microcomputer system consists of


(A) Microprocessor
(B) Memory
(C) Peripheral equipment
(D) All of the above
Ans: D

47. Where does a computer add and compare data ?


(A) Hard disk (B) Floppy disk
(C) CPU chip (D) Memory chip
Ans: C

48. Pipelining strategy is called implement


(A) instruction execution
(B) instruction prefetch
(C) instruction decoding
(D) instruction manipulation
Ans: B

49. Which of the following data structure is linear type ?


(A) Strings (B) Lists
(C) Queues (D) All of the above
Ans: D

50. To represent hierarchical relationship between elements, which data structure


is suitable ?
(A) Dequeue (B) Priority
(C) Tree (D) All of the above
Ans: C

Which of the following data structure is Non-linear type ?


(A) Strings (B) Lists
(C) Stacks (D) None of the above
Ans: D

2. The total number of comparisons in a bubble sort is


(A) 0(log n)
(B) 0(n log n)
(C) 0(n)
(D) None of the above
Ans: B

3. Which of the following is a bad example of recursion ?


(A) Factorial (B) Fibonacci numbers
(C) Tower of Hanai (D) Tree traversal
Ans: B

4. Domain and Range of the function


Y = –√(–2x + 3) is
(A) x≥3/2, y≥0
(B) x>3/2, y≤0
(C) x≥3/2, y≤0
(D) x≤3/2, y≤0
Ans: D

5. Maximum number of edges in a n-Node undirected graph without self loop is


(A) n2 (B) n(n – 1)
(C) n(n + 1) (D) n(n – 1)/2
Ans: D

6. A hash table has space for 75 records, then the probability of collision
before the table is 6% full.
(A) .25 (B) .20
(C) .35 (D) .30
Ans: B
Explanation:
On .75th insertion probability of collision = 1/75
On 1.5th insertion probability of collision = 2/75
On 2.25th insertion probability of collision = 3/75
On 3th insertion probability of collision = 4/75
On 3.75th insertion probability of collision = 5/75
So the required probability is 1+2+3+4+5/75 = .20

7. BCC in the internet refers to


(A) Black carbon copy
(B) Blind carbon copy
(C) Blank carbon copy
(D) Beautiful carbon copy
Ans: B

8. Hub is a term used with


(A) A Star Networks
(B) A Ring Networks
(C) A Router
(D) A Bridge
Ans: A

9. The amount of uncertainty in a system of symbol is called


(A) Bandwidth (B) Entropy
(C) Loss (D) Quantum
Ans: B

10. Which of the following network access standard disassembler is used for
connection station to a packet switched network ?
(A) X.3 (B) X.21
(C) X.25 (D) X.75
Ans: C

11. A station in a network in a network forward incoming packets by placing them


on its shortest output queue. What routing algorithm is being used ?
(A) Hot potato routing
(B) Flooding
(C) Static routing
(D) Delta routing
Ans: A

12. Start and stop bits are used in serial communications for
(A) Error detection
(B) Error correction
(C) Synchronization
(D) Slowing down the communication
Ans: C

13. For a data entry project for office staff who have never used computers before
(user interface and user-friendliness are extremely important), one will use
(A) Spiral model
(B) Component based model
(C) Prototyping
(D) Waterfall model
Ans: C

14. An SRS
(A) establishes the basis for agreement between client and the
supplier.
(B) provides a reference for validation of the final product.
(C) is a prerequisite to high quality software.
(D) all of the above.
Ans: D

15. McCabe’s cyclomatic metric V(G) of a graph G with n vertices, e edges and p
connected component is
(A) e
(B) n
(C) e – n + p
(D) e – n + 2p
Ans: C

16. Emergency fixes known as patches are result of


(A) adaptive maintenance
(B) perfective maintenance
(C) corrective maintenance
(D) none of the above
Ans: C

17. Design recovery from source code is done during


(A) reverse engineering
(B) re-engineering
(C) reuse
(D) all of the above
Ans: D

18. Following is used to demonstrate that the new release of software still
performs the old one did by rerunning the old tests :
(A) Functional testing
(B) Path testing
(C) Stress testing
(D) Regression testing
Ans: D

19. The post order traversal of a binary tree is DEBFCA. Find out the preorder
traversal.
(A) ABFCDE (B) ADBFEC
(C) ABDECF (D) ABDCEF
Ans: C

20. B + tree are preferred to binary tree in database because


(A) Disk capacities are greater than memory capacities
(B) Disk access much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disk are more reliable than memory
Ans: B
21. What deletes the entire file except the file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK
Ans: C

22. Which command classes text file, which has been created using “SET
ALTERNATIVE” <FILE NAME> “Command” ?
(A) SET ALTERNATE OFF
(B) CLOSE DATABASE
(C) CLOSE ALTERNATE
(D) CLEAR ALL
Ans: A

23. Data security threats include


(A) privacy invasion
(B) hardware failure
(C) fraudulent manipulation of data
(D) encryption and decryption
Ans: C

24. Which of the following statements is true, when structure of database file
with 20 records is modified ?
(A) ? EOF ( ) Prints T
(B) ? BOF ( ) Prints F
(C) ? BOF ( ) Prints T
(D) ? EOF ( ) Prints F
Ans: A

25. The SQL Expression


Select distinct T. branch name from branch T, branch S where T. assets > S.
assets and S. branch-city = DELHI, finds the name of
(A) all branches that have greater asset than any branch located in DELHI.
(B) all branches that have greater assets than allocated in DELHI.
(C) the branch that has the greatest asset in DELHI.
(D) any branch that has greater asset than any branch located in DELHI.
Ans: A

26. Dijkestra banking algorithm in an operating system, solves the problem of


(A) deadlock avoidance (B) deadlock recovery
(C) mutual exclusion (D) context switching
Ans: A

27. The multiuser operating system, 20 requests are made to use a particular
resource per hour, on an average the probability that no request are made in
45 minutes is
(A) e-15 (B) e-5
(C) 1 – e (D) 1 – e-10
-5

Ans: A

28. On receiving an interrupt from an I/O device, the CPU


(A) halts for predetermined time.
(B) branches off to the interrupt service routine after completion of the
current instruction
(C) branches off to the interrupt service routine immediately.
(D) hands over control of address bus and data bus to the interrupting
device.
Ans: B

29. The maximum amount of information that is available in one portion of the disk
access arm for a removal disk pack (without further movement of the arm with
multiple heads)
(A) a plate of data
(B) a cylinder of data
(C) a track of data
(D) a block of data
Ans: B

30. Consider a logical address space of 8 pages of 1024 words mapped with memory
of 32 frames. How many bits are there in the physical address ?
(A) 9 bits (B) 11 bits
(C) 13 bits (D) 15 bits
Ans: D

31. CPU does not perform the operation


(A) data transfer
(B) logic operation
(C) arithmetic operation
(D) all of the above
Ans: D

32. A chip having 150 gates will be classified as


(A) SSI (B) MSI
(C) LSI (D) VLSI
Ans: B

33. If an integer needs two bytes of storage, then the maximum value of unsigned
integer is
(A) 216 – 1
(B) 215 – 1
(C) 216
(D) 215
Ans: A
34. Negative numbers cannot be represented in
(A) signed magnitude form
(B) 1’s complement form
(C) 2’s complement form
(D) none of the above
Ans: D

35. The cellular frequency reuse factor for the cluster size N is
(A) N (B) N2
(C) 1/N (D) 1/N2
Ans: C

36. X – = Y + 1 means
(A) X = X – Y + 1
(B) X = –X – Y – 1
(C) X = –X + Y + 1
(D) = X – Y – 1
Ans: A

37. Handoff is the mechanism that


(A) transfer an ongoing call from one base station to another
(B) initiating a new call
(C) dropping an ongoing call
(D) none of above
Ans: A

38. Which one of the following statement is false ?


(A) Context-free languages are closed under union.
(B) Context-free languages are closed under concatenation.
(C) Context-free languages are closed under intersection.
(D) Context-free languages are closed under Kleene closure.
Ans: D

39. All of the following are examples of real security and privacy risks except
(A) Hackers
(B) Spam
(C) Viruses
(D) Identify theft
Ans: B

40. Identify the incorrect statement :


(A) The ATM adoption layer is not service dependent.
(B) Logical connections in ATM are referred to as virtual channel
connections.
(C) ATM is streamlined protocol with minimal error and flow control
capabilities
(D) ATM is also known as cell delays.
Ans: A

41. Software risk estimation involves following two tasks :


(A) Risk magnitude and risk impact
(B) Risk probability and risk impact
(C) Risk maintenance and risk impact
(D) Risk development and risk impact
Ans: B

42. The number of bits required for an IPV6 address is


(A) 16 (B) 32
(C) 64 (D) 128
Ans: D

43. The proposition ~qvp is equivalent to


(A) p→q (B) q→p
(C) p↔q (D) p˅q
Ans: B

44. Enterprise Resource Planning (ERP)


(A) has existed for over a decade.
(B) does not integrate well with the functional areas other than operations.
(C) is inexpensive to implement.
(D) automate and integrates the majority of business processes.
Ans: D

45. Which of the following is false concerning Enterprise Resource Planning (ERP)
?
(A) It attempts to automate and integrate the majority of business processes.
(B) It shares common data and practices across the enterprise.
(C) It is inexpensive to implement.
(D) It provides and access information in a real-time environment.
Ans: C

46. To compare, overlay or cross analyze to maps in GIS


(A) both maps must be in digital form
(B) both maps must be at the same equivalent scale.
(C) both maps must be on the same coordinate system
(D) All of the above
Ans: D

47. Web Mining is not used in which of the following areas ?


(A) Information filtering
(B) Crime fighting on the internet
(C) Online transaction processing
(D) Click stream analysis.
Ans: B

48. A telephone conference call is an example of which type of communications ?


(A) same time / same place
(B) same time / different place
(C) different time / different place
(D) different time / same place
Ans: B

49. What is the probability of choosing correctly an unknown integer between 0 and
9 with 3 chances ?
(A) 963/1000
(B) 973/1000
(C) 983/1000
(D) 953/1000
Ans: A

50. The number of nodes in a complete binary tree of height h (with roots at level
0) is equal to
(A) 20 + 21 + ….. 2h
(B) 20 + 21 + ….. 2h-1
(C) 20 + 21 + ….. 2h+1
(D) 21 + ….. 2h+1
Ans: A
Any integer composed of 3n identical digits divisible by
(A) 2n (B) 3n
(C) 5 n (D) 7n
Ans: B

2. The circumferences of the two concentric disks are divided into 100 sections
each. For the outer disk, 100 of the sections are painted red and 100 of the
sections are painted blue. For the inner disk, the sections are painted red
and blue in an arbitrary manner. It is possible to align the two disks so
that
(A) 100 or more
(B) 125 or more
(C) 150 or more
(D) 175 or more
of the sections on the inner disks have their colours matched with the
corresponding section on outer disk.
Ans: A

3. The proposition ~pq is equivalent to


(A) pq (B) qp
(C) pq (D) pq
Ans: A
4. The absorption law in Boolean algebra say that
(A) X + X = X
(B) X . X = X
(C) x + x . y = x
(D) None of the above
Ans: C

5. The number of 1’s present in the binary representation of


10 × 256 + 5 × 16 + 5 is
(A) 5 (B) 6
(C) 7 (D) 8
Ans: B

6. The hexadecimal number equivalent to (1762.46)8 is


(A) 3F2.89
(B) 3F2.98
(C) 2F3.89
(D) 2F3.98
Ans: B

7. (A + B)(AB)’ is equivalent to
(A) AB (B) AʘB
(C)(AB)ʘA (D)(AʘB)A
Ans: A

8. A latch is constructed using two cross-coupled


(A) AND and OR gates
(B) AND gates
(C) NAND and NOR gates
(D) NAND gates
Ans: D

9. A multiplexer is a logic circuit that


(A) accepts one input and gives several output
(B) accepts many inputs and gives many output
(C) accepts many inputs and gives one output
(D) accepts one input and gives one output
Ans: C

10. 8-bit 1’s complement form of –77.25 is


(A) 01001101.0100
(B) 01001101.0010
(C) 10110010.1011
(D) 10110010.1101
Ans: C
11. From the point of view of the programmer, what are the major advantages of
using a high-level language rather than internal machine code or assembly
language ?
(A) Program portability
(B) Easy development
(C) Efficiency
(D) None of the above
Ans: B

12. What features make C++ so powerful ?


(A) Easy implementation
(B) Reusing old code
(C) Easy memory management
(D) All of the above
Ans: D

13. The goal of operator overloading is


(A) to help the user of a class
(B) to help the developer of a class
(C) to help define friend function
(D) None of the above
Ans: A

14. The scheme of which interpreter translates the source program is known as
(A) Paragraph by paragraph
(B) Instruction by instruction
(C) Line by line
(D) None of the above
Ans: C

15. Portable program means


(A) Program with wheels
(B) Independent from its authors
(C) Independent of platform
(D) None of the above
Ans: C

16. Which of the following is the recovery management technique in DDBMS ?


(A) 2PC (Two Phase Commit)
(B) Backup
(C) Immediate update
(D) All of the above
Ans: D

17. Which of the following is the process by which a user’s privileges ascertained
?
(A) Authorization (B) Authentication
(C) Access Control (D) None of these
Ans: A

18. The basic variants of time-stampbased method of concurrency control are


(A) Total time stamp-ordering
(B) Partial time stamp ordering
(C) Multiversion Time stamp ordering
(D) All of the above
Ans: D

19. A transaction can include following basic database access operations :


(A) Read_item(X)
(B) Write_item(X)
(C) Both (A) and (B)
(D) None of these
Ans: C

20. Decomposition help in eliminating some of the problems of bad design


(A) Redundancy
(B) Inconsistencies
(C) Anomalies
(D) All of the above
Ans: D

21. The number of different trees with 8 nodes is


(A) 256 (B) 255
(C) 248 (D) None of these
Ans: C

22. Given a binary tree whose inorder and preorder traversal are given by
Inorder : EICFBGDJHK
Preorder : BCEIFDGHJK
The post order traversal of the above binary tree is
(A) IEFCGJKHDB
(B) IEFCJGKHDB
(C) IEFCGKJHDB
(D) IEFCGJKDBH
Ans: A

23. The number of disk accesses performed by insertion operation in B-tree of


height h is
(A) 0(1) (B) 0(1gh)
(C) 0(h) (D) None of these
Ans: C

24. Consider a hash table of size m = 10000 and the hash function h(k) = ∟m(kA mod
1)'┘ for A = (√5–1)/2. The location to the key k = 123456 is
(A) 46 (B) 47
(C) 41 (D) 43
Ans: C

25. When the priority queue is represented by max heap, the insertion and deletion
of an element can be performed in (queue containing n elements)
(A) (n) and (1) respectively
(B) (n) and (n) respectively
(C) (1) and (1) respectively
(D) None of the above
Ans: C

26. A comparison of frequency division and time division multiplexing system shows
that
(A) FDM requires a lower bandwidth, but TDM has greater noise immunity.
(B) FDM has greater noise immunity and requires lower bandwidth than TDM.
(C) FDM requires channel synchronization, while TDM has greater noise
immunity.
(D) FDM requires more multiplex while TDM requires band pass filter.
Ans: C

27. If carrier modulated by a digital bit stream, has one one of the possible
phase of 0, 90, 180 and 270 degrees, then modulation called
(A) BPSK (B) QPSK
(C) QAM (D) MSK
Ans: B

28. Consider the following statement :


(i) The bandwidth of the A.M., wave depends on the band width of the
modulating signal.
(ii) The bandwidth of the A.M., wave depends on the modulation index.
(iii) The bandwidth of the F.M, wave for all practical purpose depends on the
amplitude of the carrier. Of these statements the correct statements are
(A) (i, ii)
(B) (i, iii)
(C) (ii, iii)
(D) All of the above
Ans: B

29. A smart modem can dial, hangup and answer incoming calls automatically. Can
you tell who provides the appropriate instructions to the modem for this
purpose ?
(A) Communication software
(B) Error detection protocols
(C) Link access procedure (LAP)
(D) Telecommunications
Ans: A
30. Which of the following switching techniques is most suitable for interactive
traffic ?
(A) Circuit switching
(B) Message switching
(C) Packet switching
(D) All of the above
Ans: C

31. Object modules generated by assembler that contains unresolved external


references are resolved for two or more object module by a/an
(A) Operating system
(B) Loader
(C) Linker
(D) Compiler
Ans: C

32. A special software that is used to create a job queue is called


(A) Drive (B) Spooler
(C) Interpreter (D) Linkage editor
Ans: B

33. Which of the following permanent database that has an entry for each terminal
symbol ?
(A) Literal table
(B) Identifier table
(C) Terminal table
(D) Source table
Ans: C

34. In which way(s) a macroprocessor for assembly language can be implemented ?


(A) Independent two-pass processor
(B) Independent one-pass processor
(C) Expand macrocalls and substitute arguments
(D) All of the above
Ans: D

35. Which of the following can be accessed by transfer vector approach of linking
?
(A) External data segments
(B) External subroutine
(C) Data located in other procedure
(D) All of the above
Ans: B

36. Block or Buffer caches are used to


(A) improve disk performance
(B) handle interrupts
(C) increase the capacity of main memory
(D) speed up main memory Read operations
Ans: D

37. A file organization component VSAM file is


(A) Relative records data set
(B) Keyed sequential data set
(C) Entry sequential data set
(D) All of the above
Ans: D

38. A relationship between processes such that each has some part (critical
section) which must not be executed while the critical section of another is
being executed, is known as
(A) Semaphore
(B) Mutual exclusion
(C) Multiprogramming
(D) Message passing
Ans: B

39. How many states can a process be in ?


(A) 3 (B) 4
(C) 2 (D) 5
Ans: D

40. Which command allows you to view your file 24 lines at a time ?
(A) More (B) Cat
(C) Pg (D) None of the above
Ans: A

41. Which one of the items listed below is not one of the software engineering
layers ?
(A) Process (B) Manufacturing
(C) Method (D) Tools
Ans: B

42. What is the first stage in program development ?


(A) Specification and design
(B) System Analysis
(C) Testing
(D) None of the above
Ans: B

43. By means of a data flow diagram, the analyst can detect


(A) Task duplication
(B) Unnecessary delays
(C) Task overlapping
(D) All of the above
Ans: D

44. Which of these are the 5 generic software engineering framework activities ?
(A) Communication, planning, modelling, construction, deployment
(B) Communication, risk management, measurement, production, reviewing
(C) Analysis, designing, programming, Debugging, maintenance
(D) Analysis, planning, designing, programming, testing
Ans: A

45. Many causes of the software crisis can be traced to mythology based on
(A) Management Myths
(B) Customer Myths
(C) Practitioner Myths
(D) All of the above
Ans: D

46. Data warehousing refers to


(A) storing data offline at a separate site
(B) backing up data regularly
(C) is related to data mining
(D) uses tape as opposed to disk
Ans: C

47. Virtual memory is


(A) related to virtual reality
(B) a form of ROM
(C) a form of RAM
(D) None of the above
Ans: C

48. “M-Commerce” refers to


(A) a myth which does not exist in reality
(B) the ability of business to reach potential customers wherever they are
(C) the ability to have large capacity of memory storage dealing trade and
commerce
(D) None of the above
Ans: D

49. The principal electronic payment systems for electronic commerce is


(A) Credit Card (B) Digital Wallet
(C) Electronic Cheque (D) All of the above
Ans: D

50. Which is the most valuable electronic commerce to the individual customer in
long run ?
(A) Business to Customer
(B) Business to Business
(C) Customer to Customer
(D) None of the above
Ans: B
The number of integers between 1 and 250 that are divisible by 2, 5 and 7 is
(A) 2 (B) 3
(C) 5 (D) 8
Ans: B

2. An undirected graph possesses an eulerian circuit if and only if it is


connected and its vertices are
(A) all of even degree
(B) all of odd degree
(C) of any degree
(D) even in number
Ans: A

3. A partially ordered set is said to be a lattice if every two elements in the


set have
(A) a unique least upper bound
(B) a unique greatest lower bound
(C) both (A) and (B)
(D) none of the above
Ans: C

4. The minimum number of edges in a connected graph with ‘n’ vertices is equal to
(A) n(n–1)
(B) n(n–1)/2
(C) n2
(D) n–1
Ans: D

5. Consider the problem of connecting 19 lamps to a single electric outlet by


using extension cords each of which has four outlets. The number of extension
cords required is
(A) 4 (B) 5
(C) 6 (D) 7
Ans: C

6. The decimal number equivalent of (4057.06)8 is


(A) 2095.75
(B) 2095.075
(C) 2095.937
(D) 2095.0937
Ans: D
7. AB+(A+B)’ is equivalent to
(A) AB
(B) AʘB
(C) (AB)ʘA
(D) (AʘB)A
Ans: B

8. An astable multivibrator has


(A) one stable state
(B) two stable states
(C) no stable states
(D) none of these
Ans: C

9. 12-bit 2’s complement of –73.75 is


(A) 01001001.1100
(B) 11001001.1100
(C) 10110110.0100
(D) 10110110.1100
Ans: C

10. Encoding of data bits 0011 into 7-bit even Parity Hamming Code is
(A) 0011110 (B) 0101110
(C) 0010110 (D) 0011100
Ans: A

11. How many of the following declarations are correct ?


int z = 7.0;
double void = 0.000;
short array [2] = {0, 1, 2};
char c = “\n”;
(A) None
(B) One is correct
(C) Two are correct
(D) All four are correct
Ans: C

12. The value of the following expression (13/4*3)%5+1 is


(A) 5.75 (B) 2.95
(C) 1.4875 (D) 5
Ans: A

13. Which one of the following will set the value of y to 5 if x has the value 3,
but not otherwise ?
(A) if (x = 3) y = 5
(B) if x = = 3 (y = 5)
(C) if (x = = 3); y = 5
(D) if (x = = 3) y = 5
Ans: D

14. Which one of the following sentences is true ?


(A) The body of a while loop is executed at least once.
(B) The body of a do … while loop is executed at least once.
(C) The body of a do … while loop is executed zero or more times.
(D) A for loop can never be used in place of a while loop.
Ans: B

15. “Black” refers in the “Black-box” testing means


(A) Characters of the movie “Black”
(B) I – O is hidden
(C) Design is hidden
(D) Users are hidden
Ans: C

16. In generalisation, the differences between members of an entity is


(A) maximized
(B) minimized
(C) both (A) & (B)
(D) None of these
Ans: A

17. The dependency preservation decomposition is a property to decompose database


schema D, in which each functional dependency XY specified in F,
(A) appeared directly in one of the relation schemas Ri in the decomposed D.
(B) could be inferred from dependencies that appear in some Ri.
(C) both (A) and (B)
(D) None of these
Ans: C

18. Which of the following is an optimistic concurrency control method ?


(A) Validation based
(B) Time stamp ordering
(C) Lock-based
(D) None of these
Ans: A

19. Optical storage is a


(A) high-speed direct access storage device.
(B) low-speed direct access storage device.
(C) medium-speed direct access storage device.
(D) high-speed sequential access storage device.
Ans: C
20. Which of the following is the process by which a user’s access to physical
data in the application is limited, based on his privileges ?
(A) Authorization (B) Authentication
(C) Access Control (D) All of these
Ans: C

21. What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root
at depth 0) ?
(A) 111 (B) 999
(C) 9999 (D) None of the above
Ans: D

22. A binary tree with 27 nodes has _______ null branches.


(A) 54 (B) 27
(C) 26 (D) None of the above
Ans: D

23. The time complexity to build a heap of n elements is


(A) 0(1) (B) 0(lgn)
(C) 0(n) (D) 0(nlgn)
Ans: D

24. Linear probing suffers from a problem known as


(A) Secondary clustering
(B) Primary clustering
(C) Both (A) and (B)
(D) None of these
Ans: B

25. Which of the following can be the sequence of nodes examined in binary search
tree while searching for key 88 ?
(A) 90, 40, 65, 50, 88
(B) 90, 110, 80, 85, 88
(C) 190, 60, 90, 85, 88
(D) 65, 140, 80, 70, 88
Ans: C

26. Frequency shift keying is used mostly in


(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above
Ans: B

27. The baud rate is


(A) always equal to the bit transfer rate
(B) equal to twice the bandwidth of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth of an ideal channel
Ans: B

28. How much bandwidth is there in 1 micron of spectrum at a wavelength of 1


micron ?
(A) 300 MHz (B) 3 GHz
(C) 300 THz (D) 30 KHz
Ans: C

29. Which of the following file transfer protocols use TCP and establishes two
virtual circuits between the local and remote server ?
(A) FTP (B) TFTP
(C) TELNET (D) NFS
Ans: A

30. The threshold effect in demodulator is


(A) exhibited by all demodulator, when the input signal to noise ratio is
low.
(B) the rapid fall on output signal to noise ratio when the input signal to
noise ratio fall below a particular value.
(C) the property exhibited by all A.M. suppressed carrier coherent
demodulator.
(D) the property exhibited by correlation receiver.
Ans: B

31. Object code is the output of ______.


(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler
Ans: B

32. ‘Macro’ in an assembly level program is _______.


(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding
Ans: A

33. Grammar of the programming is checked at ________ phase of compiler.


(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization
Ans: C
34. The register or main memory location which contains the effective address of
the operand is known as
(A) pointer
(B) special location
(C) indexed register
(D) None of the above
Ans: A

35. Macro-processors are ______.


(A) Hardware (B) Compiler
(C) Registers (D) None of the above
Ans: B

36. The dynamic allocation of storage areas with VSAM files is accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding
Ans: B

37. Which of the following command the file names in multiple columns?
(A) IS–X
(B) IS
(C) IS–1
(D) IS–f–X
Ans: B

38. WINDOWS is a _________ operating.


(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive
Ans: C

39. Page making process from main memory to disk is called


(A) Interruption (B) Termination
(C) Swapping (D) None of the above
Ans: C

40. A Dead-lock in an Operating System is


(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above
Ans: C

41. Prototyping is used to


(A) test the software as an end product
(B) expand design details
(C) refine and establish requirements gathering
(D) None of the above
Ans: C

42. Which one of these are not software maintenance activity ?


(A) Error correction
(B) Adaptation
(C) Implementation of Enhancement
(D) Establishing scope
Ans: D

43. The system specification is the first deliverable in the computer system
engineering process which does not include
(A) Functional Description
(B) Cost
(C) Schedule
(D) Technical Analysis
Ans: A

44. The COCOMO model was introduced in the book title “Software Engineering
Economics” authored by
(A) Abraham Silberschatz
(B) Barry Boehm
(C) C.J. Date
(D) D.E. Knuth
Ans: B

45. The Warnier diagram enables analyst


(A) to represent information hierarchy in a compact manner
(B) to further identify requirement
(C) to estimate the total cost involved
(D) None of the above
Ans: A

46. A data mart may contain


(A) summarised data
(B) de-normalized data
(C) aggregate departmental data
(D) All of the above
Ans: D

47. Data mining is


(A) the process of extracting valid, previously unknown, comprehensible and
actionable information from large databases and using it to make crucial
business decisions.
(B) a tool that allows end users direct access and manipulation of data from
within datawarehousing environment without the intervention of customised
programming activity.
(C) a tool that helps end users extract useful business information from
large database.
(D) All of the above
Ans: A

48. E-Choupal refers to


(A) calling meeting of Surpanches electronically.
(B) conducting Panchayat meeting using latest electronic gadgets.
(C) providing window of information to villagers and farmers in NIC network.
(D) None of the above
Ans: C

49. The basic concepts of ethics in information society is/are


(A) Responsibility
(B) Accountability
(C) Liability
(D) All of the above
Ans: D

50. One of the distinguished features of super-computer over other category of


computer is
(A) parallel processing
(B) highest accuracy level
(C) more speed
(D) more capacity
Ans: C

“x1 is a clone of x” means x1 is identical to x in terms of the physical


attributes namely, height, weight and complexion. Given, height, weight and
complexion only form a complete set of attributes for an entity, cloning is
an equivalence relation. What is your impression about this statement ?

(A) The statement is true


(B) The statement is false
(C) The truth value of the statement cannot be computed
(D) None of these
Ans: A

2. ‘R is a robot of M’ means R can perform some of the tasks that otherwise M


would do and R is unable to do anything else. Which of the following is the
most appropriate representation to model this situation ?
Ans:

3. “My Lafter Machin (MLM) recognizes the following strings :


(i) a
(ii) aba
(iii) abaabaaba
(iv) abaabaabaabaabaabaabaabaaba
Using this as an information, how would you compare the following regular
expressions ?
(i) (aba)3x
(ii) a.(baa)3x–1. ba
(iii) ab.(aab).3x–1.a
(A) (ii) and (iii) are same, (i) is different.
(B) (ii) and (iii) are not same.
(C) (i), (ii) and (iii) are different.
(D) (i), (ii) and (iii) are same.
Ans: D

4. S1 : I teach algorithms and maths.


S2 : My professor teaches maths, electronics and computer science.
S3 : I have a student of maths.
S4 : Algorithm is a part of computer science.
S5 : Maths students know computer science.
What would be the chromatic number of a graph, vertices of which are the
actors/entities that are involved in the sentences S1 to S5 and edges-to
represent the associations/relationships amongst the entities/actors as
expressed in the sentences S1 to S5 above?
(A) 2
(B) 3
(C) 4
(D) None of these
Ans:

5. For your ATM debit card, you have a 4-decimal-digit personal secret code. In
the absence of any clue, a brute-force attack takes time-‘t’ to crack the
code on an ATM terminal. Therefore ‘t’ is the secure-time for a customer to
report in case the card is misplaced. Your Bank has decided to facilitate an
increased secure-time. Out of the following, which option should provide the
largest rise in the value of ‘t’ ?
(A) Instead of 4-decimal-digits, maintain the personal secret code in 4-
hexadecimal-digits.
(B) Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret
code.
(C) Reduce the processing speed of the ATM terminals to the half of their
current speed.
(D) None of the above provides any improvement.
Ans: B

6. The logic expression for the output of the circuit shown in the figure is
(A) A’C’+B’C’+CD
(B) AC’+BC’+C’D
(C) ABC+C’D’
(D) A’B’+B’C’+C’D’
Ans: C

7. Advantage of synchronous sequential circuits over asynchronous ones is


(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity
Ans: A

8. What is the transitive voltage for the voltage input of a CMOS operating from
10V supply ?
(A) 1V (B) 2V
(C) 5V (D) 10 V
Ans: C

9. What is decimal equivalent of BCD 11011.1100 ?


(A) 22.0 (B) 22.2
(C) 20.2 (D) 21.2
Ans: B

10. The function represented by the kmap given below is

(A) A.B
(B) AB+BC+CA
(C) (BC)’
(D) A.B.C
Ans:

11. The statement


print f (“ % d”, 10 ? 0 ? 5 : 1 : 12);
will print
(A) 10 (B) 0
(C) 12 (D) 1
Ans: D

12. What will be the output of the following c-code ?


void main ( )
{
char *P = "ayqm" ;
char c;
c = ++*p ;
printf ("%c", c);
}
(A) a (B) c
(C) b (D) q
Ans: C

13. Member of a class specified as _______ are accessible only to method of the
class.
(A) private (B) public
(C) protected (D) derive
Ans: A

14. Match the following :


(a) Garbage collection in 1. Java
(b) Nameless object 2. generic programming
(c) Template support 3. defines a class
(d) A forward reference 4. member function
(e) Derived class inherits
from base class 5. within a statement
Codes :
(a) (b) (c) (d) (e)
(A) 1 5 4 2 3
(B) 1 5 2 3 4
(C) 5 1 2 3 4
(D) 5 4 3 1 2
Ans: B

15. The data type created by the data abstraction process is called
(A) class
(B) structure
(C) abstract data type
(D) user defined data type
Ans: C

16. An entity instance is a single occurrence of an _______.


(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these
Ans: A

17. Generalization is _______ process.


(A) top-down (B) bottom up
(C) both (A) & (B) (D) None of these
Ans: B

18. Match the following :


I. 2 NF (a) transitive dependencies eliminated
II. 3 NF (b) multivalued attribute removed
III. 4 NF (c) contain no partial functional dependencies
IV. 5 NF (d) contains no join dependency
Codes :
I II III IV
(A) (a) (c) (b) (d)
(B) (d) (a) (b) (c)
(C) (c) (d) (a) (b)
(D) (d) (b) (a) (c)
Ans: B

19. Which data management language component enabled the DBA to define the schema
components ?
(A) DML (B) Sub-schema DLL
(C) Schema DLL (D) All of these
Ans: C

20. The PROJECT Command will create new table that has
(A) more fields than the original table
(B) more rows than original table
(C) both (A) & (B)
(D) none of these
Ans: D

21. If we have six stack operations pushing and popping each of A, B and C-such
that push (A) must occur before push (B) which must occur before push (C),
then A, C, B is a possible order for the pop operations, since this could be
our sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B). Which
one of the following orders could not be the order the pop operations are
run, if we are to satisfy the requirements described above ?
(A) ABC (B) CBA
(C) BAC (D) CAB
Ans: D

22. What is the most appropriate data structure to implement a priority queue ?
(A) Heap
(B) Circular array
(C) Linked list
(D) Binary tree
Ans: A

23. In a complete binary tree of n nodes, how far are the two most distant nodes ?
Assume each edge in the path counts as !
(A) About log2n
(B) About 2 log2n
(C) About n log2n
(D) About 2n
Ans: B

24. A chained hash table has an array size of 100. What is the maximum number of
entries that can be placed in the table ?
(A) 100
(B) 200
(C) 10000
(D) There is no upper limit
Ans:

25. In a B tree of order 5, the following keys are inserted as follows :


7, 8, 1, 4, 13, 20, 2, 6 and 5
How many elements are present in the root of the tree ?
(A) 1 (B) 2
(C) 3 (D) 4
Ans: B

26. The ______ field is the SNMP PDV reports an error in a response message.
(A) error index (B) error status
(C) set request (D) agent index
Ans: B

27. What does the URL need to access documents ?


I. Path name
II. Host name
III. DNS
IV. Retrieval method
V. Server port number
(A) I, II, III (B) I, III, V
(C) I, II, IV (D) III, IV, V
Ans: B

28. End-to-End connectivity is provided from Last-to-Last in


(A) Network layer (B) Session layer
(C) Transport layer (D) Data link layer
Ans: C
29. What services does the internet layer provide ?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5
Ans:

30. What is the maximum operating rate of a wireless LAN using infrared
communication ?
(A) 1 mbps (B) 2 mbps
(C) 5 mbps (D) 11mbps
Ans: A

31. In an absolute loading scheme, which loader function is accomplished by a


loader ?
(A) Re-allocation (B) Allocation
(C) Linking (D) Loading
Ans: D

32. Which of the following expression is represented by the parse tree ?

(A) (A + B) * C (B) A + * BC
(C) A + B * C (D) A * C + B
Ans: A

33. Consider the following left associative operators in decreasing order of


precedence :
– subtraction (highest precedence)
* multiplication
$ exponentiation (lowest precedence)
What is the result of the following expression ?
3 – 2 * 4 $ | * 2**3
(A) – 61 (B) 64
(C) 512 (D) 4096
Ans: D

34. Which of the following is the most general phase structured grammar ?
(A) Regular
(B) Context-sensitive
(C) Context free
(D) None of the above
Ans: B

35. Which of the following is used for grouping of characters into tokens (in a
computer) ?
(A) A parser
(B) Code optimizer
(C) Code generator
(D) Scanner
Ans: D

36. Match the following :


(a) Disk scheduling 1. Round-robin
(b) Batch processing 2. SCAN
(c) Time sharing 3. LIFO
(d) Interrupt processing 4. FIFO
Codes :
(a) (b) (c) (d)
(A) 3 4 2 1
(B) 4 3 2 1
(C) 2 4 1 3
(D) 1 4 3 2
Ans: C

37. ________ synchronizes critical resources to prevent dead lock.


(A) P-operator (B) V-operator
(C) Semaphore (D) Swapping
Ans: C

38. _______ is one of pre-emptive scheduling algorithm.


(A) RR (B) SSN
(C) SSF (D) Priority based
Ans: A

39. In order to allow only one process to enter its critical section, binary
semaphore are initialized to
(A) 0 (B) 1
(C) 2 (D) 3
Ans: B
40. Remote Computing Service involves the use of time sharing and _______.
(A) multi-processing
(B) interactive processing
(C) batch processing
(D) real-time processing
Ans: C

41. Software engineering primarily aims on


(A) reliable software
(B) cost effective software
(C) reliable and cost effective software
(D) none of the above
Ans: C

42. Top-down design does not require


(A) step-wise refinement
(B) loop invariants
(C) flow charting
(D) modularity
Ans: B

43. Which model is simplest model in Software Development ?


(A) Waterfall model (B) Prototyping
(C) Iterative (D) None of these
Ans: A

44. Design phase will usually be


(A) top-down (B) bottom-up
(C) random (D) centre fringing
Ans: A

45. Applications-software
(A) is used to control the operating system
(B) includes programs designed to help programmers
(C) performs a specific task for computer users
(D) all of the above
Ans: C

46. The cost of the network is usually determined by


(A) time complexity
(B) switching complexity
(C) circuit complexity
(D) none of these
Ans: B

47. A leased special high-speed connection from the local telephone carrier for
business users that transmits at 1.544 mbps is known as ________ carrier.
(A) T1 (B) T2
(C) T3 (D) T4
Ans: A

48. CDMA Cell uses ________ carriers of 1.25 MHz.


(A) 9 (B) 18
(C) 22 (D) 64
Ans: A

49. At any given time Parallel Virtual Machine (PVM) has ________ send buffer and
________ receive buffer.
(A) one-one (B) one-two
(C) two-two (D) two-one
Ans: B

50. Data Mining uses ________, ________ and ________ to build effective predictive
model.
(i) Data set
(ii) Information set
(iii) Input set
(iv) Process set
(v) Output set
(vi) Test set
(A) (i), (ii) and (iv)
(B) (ii), (iv) and (v)
(C) (i), (v) and (vi)
(D) (ii), (iii) and (v)
Ans:

If she is my friend and you are her friend, then we are friends. Given this,
the friend relationship in this context is ________.

(i) commutative (ii) transitive


(ii) (iii) implicative (iv) equivalence
(A) (i) and (ii) (B) (iii)
(C) (i), (ii), (iii) and (iv) (D) None of these
Ans: D

2. Circle has ____________


(A) No vertices (B) Only 1 vertex
(C) ∞ vertices (D) None of these
Ans: A

3. If in an error detection and correction code a message M : “You are good


students” is stored as M' : Youare areyou aregood goodare goodstudents
studentsgood. What is the space required to store M' in general ? (assume
that ‘n’ is the length of M)
(A) 2n (B) 3n
(C) 4n (D) less than 4n
Ans: D

4. P : “Program is a step by step execution of the instructions”. Given P, which


of the following is true ?
(A) Program is a subset of an instruction set.
(B) Program is a sequence of a subset of an instruction set.
(C) Program is a partially ordered set of an instruction set.
(D) All of the above
Ans: B

5. In a MIU puzzle, either of the letters M, I or U could go as a start symbol.


Production rules are given below :
R1 : UIU
R2 : M.xM.x.x where ːˑ is string concatenation operator. Given this, which
of the following holds for
(i) MIUIUIUIUIU (ii) MIUIUIUIUIUIUIUIU
(A) Either (i) or (ii) but not both of these are valid words.
(B) Both (i) and (ii) are valid words and they take identical number of
transformations for the production.
(C) Both (i) and (ii) are valid words but they involve different number of
transformations in the production.
(D) None of these
Ans: C

6. The simplified form of the Boolean expression (X+Y+XY)(X+Z) is


(A) X + Y + ZX + Y (B) XY – YZ
(C) X + YZ (D) XZ + Y
Ans: C

7. Identify the logic function performed by the circuit shown

(A) exclusive OR (B) exclusive NOR


(C) NAND (D) NOR
Ans: B
8. The highest noise margin is offered by
(A) BICMOS (B) TTL
(C) ECL (D) CMOS
Ans: B

9. The answer of the operation (10111)2*(1110)2 in hex equivalence is


(A) 150 (B) 241
(C) 142 (D) 101011110
Ans: C

10. How many 1’s are present in the binary representation of


3 × 512 + 7 × 64 + 5 × 8 + 3
(A) 8 (B) 9
(C) 10 (D) 11
Ans: B

11. Recursive functions are executed in a


(A) First in first out-order (B) Last in first out-order
(C) Parallel fashion (D) Load balancing
Ans: B

12. What would be the output of the following program, if run from the command
line as “myprog 1 2 3” ?
main (int argc, char * argv[ ])
{ int i ;
i = argv[1] + argv[2] + argv[3] ;
printf (“% d”, i) ;
}
(A) 123 (B) 6
(C) Error (D) “123”
Ans: C

13. A __________ is a special method used to initialize the instance variable of a


class.
(A) Member function (B) Destructor
(C) Constructor (D) Structure
Ans: C

14. Encapsulation is
(A) Dynamic binding
(B) A mechanism to associate the code and data.
(C) Data abstraction
(D) Creating new class
Ans: B

15. Which of the statements are true ?


I. Function overloading is done at compile time.
II. Protected members are accessible to the member of derived class.
III. A derived class inherits constructors and destructors.
IV. A friend function can be called like a normal function.
V. Nested class is a derived class.
(A) I, II, III (B) II, III, V
(C) III, IV, V (D) I, II, IV
Ans: D

16. The E-R model is expressed in term of


I. Entities
II. The relationship among entities.
III. The attributes of the entities.
IV. Functional relationship.
(A) I, II (B) I, II, IV
(C) II, II, IV (D) I, II, III
Ans: D

17. Specialization is __________ process.


(A) top-down (B) bottom up
(C) both (A) and (B) (D) none of these
Ans: A

18. Match the following :


(1) Determinants (a) No attribute can be added
(2) Candidate key (b) Uniquely identified a row
(3) Non-redundancy (c) A constraint between two attribute
(4) Functional dependency (d) Group of attributes on the left
hand side of arrow of function dependency.
(A) 1 – d, 2 – b, 3 – a, 4 – c
(B) 2 – d, 3 – a, 1 – b, 4 – c
(C) 4 – a, 3 – b, 2 – c, 1 – d
(D) 3 – a, 4 – b, 1 – c, 2 – d
Ans: A

19. A function that has no partial functional dependencies is in __________ form.


(A) 3 NF (B) 2 NF
(C) 4 NF (D) BCNF
Ans: B

20. Which of the following statement is wrong ?


I. 2-phase locking protocol suffer from dead lock.
II. Time stamp protocol suffer from more aborts.
III. A block hole in a DFD is a data store with only inbound flows.
IV. Multivalued dependency among attribute is checked at 3 NF level.
V. An entity-relationship diagram is a tool to represent event model.
(A) I, II, II (B) II, III, IV
(C) III, IV, V (D) II, IV, V
Ans: A

21. If the number of leaves in a strictly binary tree is an odd number, then what
can you say with full conviction about total number of nodes in the tree ?
(A) It is an odd number.
(B) It is an even number.
(C) It cannot be equal to the number of leaves.
(D) It is always greater than twice the number of leaves.
Ans: A

22. The number of edges in a complete graph of n vertices is


(A) n (B) n(n – 1)/2
(C) n(n + 1)/2 (D) n2/2
Ans: B

23. At a hill station, the parking lot is one long drive way snaking up a hill
side. Cars drive in and park right behind the car in front of them, one
behind another. A car can’t leave until all the cars in front of it have
left. Is the parking lot more like
(A) An array (B) A stack
(C) A queue (D) A linked list
Ans: C

24. With regard to linked list, which of the following statement is false ?
(A) An algorithm to search for an element in a singly linked list requires
0(n) operations in the worst case.
(B) An algorithm for deleting the first element in a singly linked list
requires 0(n) operations in the worst case.
(C) An algorithm for finding the maximum value in a circular linked list
requires 0(n) operations.
(D) An algorithm for deleting the middle node of a circular linked list
requires 0(n) operations.
Ans: B

25. A hash function f defined as f(key) = key mod 7, with linear probing used to
resolve collisions. Insert the keys 37, 38, 72, 48, 98 and 11 into the table
indexed from 0 to 6. What will be the location of 11 ?
(A) 3 (B) 4
(C) 5 (D) 6
Ans: C

26. Device on one network can communicate with devices on another network via a
(A) Hub/Switch (B) Utility server
(C) File server (D) Gateway
Ans: D
27. What is the maximum window size in sliding window protocol used in a computer
network ?
(A) 4 (B) 8
(C) 15 (D) 16
Ans: A

28. Which of the following are Data Link Layer standard ?


1. Ethernet 2. HSSI 3. Frame Relay
4. 10 – Base T 5. Token Ring
(A) 1, 2, 3 (B) 1, 3, 5
(C) 1, 3, 4, 5 (D) 1, 2, 3, 4, 5
Ans: C

29. In case of Bus/Tree topology signal balancing issue is overcome by


(A) Modulation (B) Polling
(C) Segmentation (D) Strong transmitter
Ans: C

30. Match the following :


(i) Ethernet (a) Deterministic
(ii) Token Ring (b) Utilize the full wire speed
(iii) Cut-through switch (c) Prevent looping
(iv) Spanning tree (d) Checking valid address
Codes :
(A) i – d, ii – a, iii – b, iv – c
(B) i – a, ii – d, iii – b, iv – c
(C) i – d, ii – d, iii – c, iv – b
(D) i – d, ii – c, iii – b, iv – a
Ans: A

31. In an absolute loading scheme which loader function is accomplished by


assembler ?
(A) re-allocation (B) allocation
(C) linking (D) loading
Ans: A

32. Which of the following grammar is LR (1) ?


(A) AaAb, AbAb, Aa , Ab
(B) AaAa, AaAb, Ac
(C) AA+A, Aa
(D) Both (A) and (B)
Ans: D

33. A shift-reduce parser carries out the actions specified within braces
immediately after reducing with the corresponding rule of the grammar.
SxxW[print“1”]
Sy[print“2”]
WS2[print“3”], what is the translation of “x x x x y z z” ?
(A) 1 1 2 3 1 (B) 1 1 2 3 3
(C) 2 3 1 3 1 (D) 2 3 3 2 1
Ans: C

34. Contex-free Grammar (CFG) can be recognized by


(A) Finite state automata
(B) 2-way linear bounded automata
(C) push down automata
(D) both (B) and (C)
Ans: D

35. Synthesized attribute can be easily simulated by a


(A) LL grammar (B) Ambiguous grammar
(C) LR grammar (D) None of the above
Ans: C

36. In the process management Round-robin method is essentially the pre-emptive


version of _________
(A) FILO (B) FIFO
(C) SSF (D) Longest time first
Ans: B

37. A page fault


(A) is an error specific page.
(B) is an access to the page not currently in memory.
(C) occur when a page program occur in a page memory.
(D) page used in the previous page reference.
Ans: B

38. A semaphore count of negative n means (s=–n) that the queue contains ________
waiting processes.
(A) n + 1 (B) n
(C) n – 1 (D) 0
Ans: B

39. A program is located in the smallest available hole in the memory is _________
(A) best – fit (B) first – bit
(C) worst – fit (D) buddy
Ans: A

40. The Unix command used to find out the number of characters in a file is
(A) nc (B) wc
(C) chcnt (D) lc
Ans: B
41. Software Engineering is a discipline that integrates _________ for the
development of computer software.
(A) Process (B) Methods
(C) Tools (D) All
Ans: D

42. Any error whose cause cannot be identified anywhere within the software system
is called ________
(A) Internal error (B) External error
(C) Inherent error (D) Logic error
Ans: B

43. Recorded software attributes can be used in the following endeavours :


(i) Cost and schedule estimates.
(ii) Software product reliability predictions.
(iii) Managing the development process.
(iv) No where
Codes :
(A) (i) (ii) (iv)
(B) (ii) (iii) (iv)
(C) (i) (ii) (iii)
(D) (i) (ii) (iii) (iv)
Ans: C

44. Black Box testing is done


(A) to show that s/w is operational at its interfaces i.e. input and output.
(B) to examine internal details of code.
(C) at client side.
(D) none of above.
Ans: A

45. The name of the transaction file shall be provided by the operator and the
file that contains the edited transactions ready for execution shall be
called
(A) Batch. Exe (B) Trans. Exe
(C) Opt. Exe (D) Edit.Exe
Ans: C

46. The single stage network is also called


(A) one sided network (B) two sided network
(C) recirculating network (D) pipeline network
Ans: C

47. Analysis of large database to retrieve information is called


(A) OLTP (B) OLAP
(C) OLDP (D) OLPP
Ans: B
48. Which technology is sometime referred to as wireless cable ?
(A) MMDS (B) ATM
(C) LMDS (D) CDMA
Ans: A

49. Another name of IEEE 802.11 a is ____________


(A) Wi-Max (B) Fast Ethernet
(C) Wi-Fi (D) 802.11 g
Ans: C

50. The unlicensed National Information Infrastructure band operates at the


_________ frequency
(A) 2.4 GHz (B) 5 GHz
(C) 33 MHz (D) 5 MHz
Ans: B

If x and y are independent Gaussian random variables with average value 0 and
with same variance, their joint probability density function is given by:

(A) p(x,y)=p(x).p(y) (B) p(x,y)=p(x)+p(y)


(C) p(x,y)=p(x+y) (D) p(x,y)=p(x).p(y)+p(x)
Ans:

2. In order that a code is ‘t’ error correcting, the minimum Hamming distance
should be:
(A) t (B) 2t-1
(C) 2t (D) 2t+1
Ans: D

3. The Boolean expression x’y’z+yz+xz is equivalent to:


(A) x (B) y
(C) z (D) x+y+z
Ans: C

4. The characteristic equation of a JK flip flop is:


(A) Qn+1=J.Qn+K.Qn (B) Qn+1=J.Q’n+K’.Qn
(C) Qn+1=QnJ.K (D) Qn+1=(J+K)Qn
Ans: B

5. In order to implement a n variable switching function, a MUX must have:


(A) 2n inputs (B) 2n+1 inputs
(C) 2 n-1 inputs (D) 2n-1 inputs
Ans: A
6. The throughput of pure ALOHA is given by:
(A) S=G (B) S=e2G
(C) S=Ge 2G (D) Ge-2G
Ans: D

7. The Fiber Distributed Data Interface uses:


(A) single mode fibers and LEDs
(B) multimode fibers and LEDs
(C) single mode fibers and ILDs
(D) multimode fibers and ILDs
Ans: B

8. To employ multi-access in GSM, users are given different:


(A) time slots (B) bandpass filters
(C) handsets (D) frequency bands
Ans: B

9. With a four programs in memory and with 80% average I/O wait, the CPU
utilization is?
(A) 60% (B) 70%
(C) 90% (D) 100%
Ans: A

10. Assume N segments in memory and a page size of P bytes. The wastage on account
of internal fragmentation is:
(A) NP/2 bytes (B) P/2 bytes
(C) N/2 bytes (D) NP bytes
Ans: A

11. Assertion(A): Bit maps are not often used in memory management.
Reason(R): Searching a bitmap for a run of given length is a slow operation.
(A) Both (A) and (R) are true and (R) is correct explanation for (A)
(B) Both(A) and (R) are true but (R) is not correct explanation for (A)
(C) (A) is true (R) is false
(D) (A) is false (R) is true
Ans: A

12. The complete graph with four vertices has k edges where k is:
(A) 3 (B) 4
(C) 5 (D) 6
Ans: D

13. The octal equivalent of hexadecimal (A.B)16 is:


(A) 47.21 (B) 12.74
(C) 12.71 (D) 17.21
Ans: B
14. A reduced state table has 18 rows. The minimum number of flip flops needed to
implement the sequential machine is:
(A) 18 (B) 9
(C) 5 (D) 4
Ans: C

15. What is the value of ‘b’ after the execution of the following code statements:
C=10;
B=++c+++c;
(A) 20 (B) 22
(C) 23 (D) None
Ans: D

16. Which of the following does not represent a valid storage class in ’c’?
(A) automatic (B) static
(C) union (D) extern
Ans: C

17. The friend functions are used in situations where:


(A) We want to have access to unrelated classes
(B) Dynamic binding is required
(C) Exchange of data between classes to take place
(D) None of the above
Ans: C

18. (i) DML includes a query language based on both relation algebra and tuple
calculus
(ii) DML includes a query language based on tuple calculus
(iii) DML includes a query language based on relational algebra
(iv) DML includes a query language based on none of the relational algebra
and tuple calculus
Which one is correct?
(A) (i) only (B) (ii) only
(C) (iii) only (D) (iv) only
Ans: A

19. Suppose it takes 100 ns to access a page table and 20 ns to access associative
memory with a 90% hit rate, the average access time equals:
(A) 20 ns (B) 28 ns
(C) 90 ns (D) 100 ns
Ans: B

20. There exists a construct which returns a value ‘true’ if the argument subquery
is:
(A) empty (B) non-empty
(C) in error (D) none of the above
Ans: B
21. Which construct in SQL is used to test whether a subquery has any tuples in
its result?
(A) UNIQUE (B) EXISTS
(C) GROUP BY (D) EXCEPT
Ans: B

22. ORACLE supports:


(A) inner join and outer join only
(B) outer join and semi join only
(C) inner join, outer join , semi join only
(D) inner join, outer join, semi join and anti join
Ans:

23. Which two of the following are equivalent for an undirected graph G?
(i) G is a tree
(ii) There is at least one path between any two distinct vertices of G
(iii) G contains no cycles and has (n-1) edges
(iv) G has n edges
(A) (i) and (ii)
(B) (i) and (iii)
(C) (i) and (iv)
(D) (ii) and (iii)
Ans: B

24. In a B tree of order m with p nodes the average number of splits is at most:

Ans: B

25. The prepositional formula given by the tree:


is:
(A) ˄˅x2˅x1¬x1¬x1
(B) (x2˅¬x2)˄(x1˅x2)
(C) (¬x1˅x2)˄(¬x1˅x2)
(D) None
Ans: C

26. Queue is a ----------- list.


(A) LIFO (B) LILO
(C) FILO (D) FIFO
Ans: D

27. In a full binary tree of height k, there are ----------- internal nodes.
(A) 2k-1 (B) 2k-1
(C) 2 k (D) 2k+1
Ans: A

28. A binary tree is said to have heap property if the elements along any path:
(A) from leaf to root are non-increasing
(B) from leaf to root are non-decreasing
(C) from root to leaf are non-decreasing
(D) from root to leaf are non-increasing
Ans: D

29. X.25 protocol consists of:


(A) Physical and Frame levels
(B) Frame and Packet levels
(C) Physical, Frame and Packet levels
(D) None of the above
Ans: C

30. GSM/CDMA systems:


(A) are limited to very low speed data
(B) require no local loop wires
(C) are predominantly used for voice
(D) all of the above
Ans: D

31. Usually information security in a network is achieved by:


(A) Layering (B) Cryptography
(C) Grade of service (D) None of the above
Ans: B

32. The linker:


(A) is similar to interpreter
(B) uses source code as its input
(C) is required to create a load module
(D) none of the above
Ans: C

33. In which addressing mode the operand is given explicitly in the instruction
itself?
(A) Absolute mode (B) Immediate mode
(C) Indirect mode (D) Index mode
Ans: B

34. A compiler that runs on one machine and produces code for a different machine
is called:
(A) Cross compilation (B) One pass compilation
(C) Two pass compilation (D) None of the above
Ans: A

35. Any syntactic construct that can be described by a regular expression can also
be described by a:
(A) Context sensitive grammar
(B) Non context free grammar
(C) Context free grammar
(D) None of the above
Ans: C

36. Find the odd man out:


(A) tail (B) cut
(C) wart (D) sed
Ans: C

37. Which of the following changes permission to deny write permission to group
and others?
(A) Chmod go-w filex (B) Chmod go w filex
(C) Chmod go=w filex (D) None of the above
Ans: A
38. Variable partition memory management technique with compaction results in:
(A) Reduction of fragmentation
(B) Minimal wastage
(C) Segment sharing
(D) None of the above
Ans: A

39. Capability Maturity Model is meant for:


(A) Product (B) Process
(C) Product and Process (D) None of the above
Ans: B

40. In the light of software engineering software consists of:


(A) Programs (B) Data
(C) Documentation (D) All of the above
Ans: D

41. Which one of the following ISO standard is used for software process?
(A) ISO 9000 (B) ISO 9001
(C) ISO 9003 (D) ISO 9000-3
Ans: D

42. Which of the following is used for test data generation?


(A) White box (B) Black box
(C) Boundary-value analysis (D) All of the above
Ans: C

43. Reverse engineering is the process which deals with:


(A) Size measurement (B) Cost measurement
(C) Design recovery (D) All of the above
Ans: C

44. The spacing between character pairs is called:


(A) Kerning (B) x-height
(C) intercap (D) serif
Ans: A

45. When compared with analog cellular systems, an advantage of digital TDMA
cellular system is that:
(A) it is less complicated
(B) it requires less of computer memory
(C) it conserves spectrum bandwidth
(D) it costs less
Ans: C

46. E-commerce includes:


(A) B2C (B) B2B
(C) C2C (D) All of the above
Ans: D

47. A clustering technique that permits a convenient graphical display is:


(A) partition based clustering
(B) probabilistic model based clustering
(C) hierarchical clustering
(D) agglomerative clustering
Ans: C

48. After sending a message, the sender should not be able to, at a later date,
deny having sent the message, is referred to as:
(A) Authenticity (B) Non-Repudiability
(C) Auditability (D) Repudiability
Ans: B

49. The device which connects dissimilar LANs of different topologies using
different sets of communication protocols so that information can flow from
one to another is called:
(A) Router (B) Bridge
(C) Gateway (D) Switch
Ans: C

50. We cannot delete the ---------- icon but we can made it invisible.
(A) Recycle (B) My Computer
(C) Internet explorer (D) None of the above
Ans: A
Consider the following pseudocode segment :
K:=0
for i1:= l to n
for i2:= 1 to i1
:
:
:
for im:= 1 to im–1
K:= K+1
The value of K after the execution of this code shall be
(A) C(n + m – 1, m)
(B) C(n – m + 1, m)
(C) C(n + m – 1, n)
(D) C(n – m + 1, n)
Ans: A

2. In Delta Rule for error minimization


(A) weights are adjusted w.r.to change in the output
(B) weights are adjusted w.r.to difference between desired output and actual
output
(C) weights are adjusted w.r.to difference between input and output
(D) none of the above
Ans: B

3. The concept of pipelining is most effective in improving performance if the


tasks being performed in different stages :
(A) require different amount of time
(B) require about the same amount of time
(C) require different amount of time with time difference between any two tasks
being same
(D) require different amount with time difference between any two tasks being
different
Ans: B

4. What is Granularity ?
(A) The size of database
(B) The size of data item
(C) The size of record
(D) The size of file
Ans: B

5. Suppose that a given application is run on a 64-processor machine and that 70


percent of the application can be parallelized. Then the expected performance
improvement using Amdahl’s law is
(A) 4.22 (B) 3.22
(C) 3.32 (D) 3.52
Ans: B

6. If two fuzzy sets A and B are given with membership functions


μA(x) = {0.2, 0.4, 0.8, 0.5, 0.1}
μB(x) = {0.1, 0.3, 0.6, 0.3, 0.2}
Ans: Wrong question

7. Match the following :


(i) OLAP (a) Regression
(ii) OLTP (b) Data Warehouse
(iii) Decision Tree (c) RDBMS
(iv) Neural Network (d) Classification
(i) (ii) (iii) (iv)
(A) (b) (c) (a) (d)
(B) (b) (c) (d) (a)
(C) (c) (b) (a) (d)
(D) (c) (b) (d) (a)
Ans: B

8. Which level of Abstraction describes what data are stored in the Database ?
(A) Physical level (B) View level
(C) Abstraction level (D) Logical level
Ans: D

9. The problem that occurs when one transaction updates a database item and then
the transaction fails for some reason is ________.
(A) Temporary Select Problem
(B) Temporary Modify Problem
(C) Dirty Read Problem
(D) None
Ans: C

10. In an image compression system 16384 bits are used to represent 256 × 256
image with 256 gray levels. What is the compression ratio for this system ?
(A) 1 (B) 2
(C) 4 (D) 8
Ans: Wrong question

11. X.25 is ________ Network.


(A) Connection Oriented Network
(B) Connection Less Network
(C) Either Connection Oriented or Connection Less
(D) Neither Connection Oriented nor Connection Less
Ans: A

12. Which of the following can be used for clustering of data ?


(A) Single layer perception
(B) Multilayer perception
(C) Self organizing map
(D) Radial basis function
Ans: C

13. Which of the following is scheme to deal with deadlock ?


(A) Time out (B) Time in
(C) Both (A) & (B) (D) None of the above
Ans: A

14. If the pixels of an image are shuffled then the parameter that may change is
(A) Histogram (B) Mean
(C) Entropy (D) Covariance
Ans: D

15. The common property of functional language and logical programming language :
(A) Both are declarative
(B) Both are based on l-calculus
(C) Both are procedural
(D) Both are functional
Ans: A
16. Given the following statements :
(i) The power of deterministic finite state machine and nondeterministic
finite state machine are same.
(ii) The power of deterministic pushdown automaton and nondeterministic
pushdown automaton are same.
Which of the above is the correct statement(s) ?
(A) Both (i) and (ii)
(B) Only (i)
(C) Only (ii)
(D) Neither (i) nor (ii)
Ans: B

17. Let Q(x, y) denote “x + y = 0” and let there be two quantifications given as
(i) yx Q(x, y)
(ii) xy Q(x, y)
where x & y are real numbers. Then which of the following is valid ?
(A) (i) is true & (ii) is false.
(B) (i) is false & (ii) is true.
(C) (i) is false & (ii) is also false.
(D) both (i) & (ii) are true.
Ans: B

18. Consider a schema R(A, B, C, D) and functional dependencies AB and CD. Then
the decomposition R1(A, B) and R2(C, D) is
(A) Dependency preserving but not lossless join
(B) Dependency preserving and lossless join
(C) Lossless Join but not dependency preserving
(D) Lossless Join
Ans: A

19. The quantiser in an image-compression system is a


(A) lossy element which exploits the psychovisual redundancy
(B) lossless element which exploits the psychovisual redundancy
(C) lossy element which exploits the statistical redundancy
(D) lossless element which exploits the statistical redundancy
Ans: A

20. Data Warehouse provides


(A) Transaction Responsiveness
(B) Storage, Functionality Responsiveness to queries
(C) Demand and Supply Responsiveness
(D) None of the above
Ans: B

21. A* algorithm uses f ' = g + h' to estimate the cost of getting from the
initial state to the goal state, where g is a measure of the cost of getting
from initial state to the current node and the function h' is an estimate of
the cost of getting from the current node to the goal state. To find a path
involving the fewest number of steps, we should set
(A) g = 1 (B) g = 0
(C) h' = 0 (D) h' = 1
Ans: A

22. The transform which possesses the highest ‘energy compaction’ property is
(A) Slant transform
(B) Cosine transform
(C) Fourier transform
(D) Karhunen-Loeve transform
Ans: D

23. Which one of the following prolog programs correctly implement “if G succeeds
then execute goal P else execute goal  ?”
(A) if-else (G, P, ) :- !, call(G), call(P).
if-else (G, P, ) :- call().
(B) if-else (G, P, ) :- call(G), !, call(P).
if-else (G, P, ) :- call().
(C) if-else (G, P, ) :- call(G), call(P), !.
if-else (G, P, ) :- call().
(D) All of the above
Ans: B

24. The _______ memory allocation function modifies the previous allocated space.
(A) calloc( ) (B) free( )
(C) malloc( ) (D) realloc( )
Ans: D

25. Which is not the correct statement(s) ?


(i) Every context sensitive language is recursive.
(ii) There is a recursive language that is not context sensitive.
(A) (i) is true, (ii) is false.
(B) (i) is true and (ii) is true.
(C) (i) is false, (ii) is false.
(D) (i) is false and (ii) is true.
Ans: B

26. The mechanism that binds code and data together and keeps them secure from
outside world is known as
(A) Abstraction
(B) Inheritance
(C) Encapsulation
(D) Polymorphism
Ans: C
27. Identify the addressing modes of below instructions and match them :
(a) ADI (1) Immediate addressing
(b) STA (2) Direct addressing
(c) CMA (3) Implied addressing
(d) SUB (4) Register addressing
(A) a – 1, b – 2, c – 3, d – 4
(B) a – 2, b – 1, c – 4, d – 3
(C) a – 3, b – 2, c – 1, d – 4
(D) a – 4, b – 3, c – 2, d – 1
Ans: A

28. Which one of the following is not a Greibach Normal form grammar?
(i) Sa|bA|aA|bB
Aa
Bb
(ii) Sa|aA|AB
Aa
Bb
(iii) Sa|A|aA
Aa
(A) (i) and (ii)
(B) (i) and (iii)
(C) (ii) and (iii)
(D) (i), (ii) and (iii)
Ans: C

29. Which of the following IP address class is a multicast address ?


(A) Class A (B) Class B
(C) Class C (D) Class D
Ans: D

30. While unit testing a module, it is found that for a set of test data, maximum
90% of the code alone were tested with a probability of success 0.9. The
reliability of the module is
(A) atleast greater than 0.9
(B) equal to 0.9
(C) atmost 0.81
(D) atleast 1/0.81
Ans: C

31. The upper bound of computing time of m coloring decision problem is


(A) O(nm) (B) O(nm)
(C) O(nm )
n (D) O(nmmn)
Ans: C

32. The equivalent grammar corresponding to the grammar G : SaA, ABB,


BaBb| is
(A) SaA, ABB, BaBb
(B) Sa|aA, ABB, BaBb|ab
(C) Sa|aA, ABB|B, BaBb
(D) Sa|aA, ABB|B, BaBb|ab
Ans: D

33. Which one of the following statements is incorrect ?


(A) The number of regions corresponds to the cyclomatic complexity.
(B) Cyclometric complexity for a flow graph G is V(G) = N–E+2, where E is the
number of edges and N is the number of nodes in the flow graph.
(C) Cyclometric complexity for a flow graph G is V(G) = E–N+2, where E is the
number of edges & N is the number of nodes in the flow graph.
(D) Cyclometric complexity for a flow graph G is V(G) = P + 1, where P is the
number of predicate nodes contained in the flow graph G.
Ans: B

34. Consider a weighted undirected graph with positive edge weights and let (u, v)
be an edge in the graph. It is known that the shortest path from source
vertex s to u has weight 53 and shortest path from s to v has weight 65.
Which statement is always true ?
(A) Weight (u, v) <= 12
(B) Weight (u, v) = 12
(C) Weight (u, v) >= 12
(D) Weight (u, v) > 12
Ans: C

35. Consider the regular expression (a + b) (a + b) … (a + b) (n-times). The


minimum number of states in finite automaton that recognizes the language
represented by this regular expression contains
(A) n states (B) n + 1 states
(C) n + 2 states (D) 2n states
Ans: B

36. Number of binary trees formed with 5 nodes are


(A) 32 (B) 36
(C) 120 (D) 42
Ans: D

37. Are we building the right product ?


This statement refers to
(A) Verification
(B) Validation
(C) Testing
(D) Software quality assurance
Ans: B

38. The following postfix expression is evaluated using a stack


823^/23* + 51* –
The top two elements of the stack after first * is evaluated
(A) 6, 1 (B) 5, 7
(C) 3, 2 (D) 1, 5
Ans: A

39. The following CFG


SaB|bA, Aa|as|bAA, Bb|bs|aBB
generates strings of terminals that have
(A) odd number of a’s and odd number of b’s
(B) even number of a’s and even number of b’s
(C) equal number of a’s and b’s
(D) not equal number of a’s and b’s
Ans: C

40. Consider the following pseudo-code :


If (A > B) and (C > D) then
A = A + 1
B = B + 1
Endif
The cyclomatic complexity of the pseudo-code is
(A) 2 (B) 3
(C) 4 (D) 5
Ans: B

41. Which layer of OSI reference model uses the ICMP (Internet Control Message
Protocol) ?
(A) Transport layer
(B) Data link layer
(C) Network layer
(D) Application layer
Ans: C

42. Which one of the following binary search tree is optimal, if probabilities of
successful search and unsuccessful search are same ?
Ans: D

43. The regular expression for the following DFA

is
(A) ab*(b + aa*b)*
(B) a*b(b + aa*b)*
(C) a*b(b* + aa*b)
(D) a*b(b * + aa*b)*
Ans: D
44. Which diagram provides a formal graphic notation for modelling objects,
classes and their relationships to one another ?
(A) Object diagram
(B) Class diagram
(C) Instance diagram
(D) Analysis diagram
Ans: A

45. A computer system supports 32 bit virtual address as well as 32 bit physical
addresses. Since the virtual address space is of same size as that of
physical address space, if we want to get rid of virtual memory, which one of
the following is true ?
(A) Efficient implementation of multiuser support is no longer possible.
(B) The processor cache can be made more efficient.
(C) Hardware support for memory management is not needed.
(D) CPU scheduling can be made more efficient.
Ans: C

46. The feasible region represented by the constraints x1–


x2<=1, x1+x2>=3, x1>=0,x2>=0 of the objective function Max Z=3x1+2x2 is
(A) A polygon
(B) Unbounded feasible region
(C) A point
(D) None of these
Ans: B

47. The colour of an object is largely determined by its diffuse reflection


coefficient. If Kd = (0.8, 0.4, 0), then what shall be the colour of the
object, if the light used is blue and magenta ?
(A) White and Red
(B) Red and Blue
(C) Black and White
(D) Black and Red
Ans: D

48. If an instruction takes ‘i’ microseconds and a page fault takes an additional
‘j’ microseconds. The effective instruction time, if on the average a page
fault occurs every k instructions, is
(A) i + j/k (B) i + j * k
(C) (i + j)/k (D) (i + j) * k
Ans: A

49. In any simplex table, if corresponding to any negative j, all elements of the
column are negative or zero, the solution under the test is
(A) degenerate solution
(B) unbounded solution
(C) alternative solution
(D) non-existing solution
Ans: B

50. How many relations are there on a set with n elements that are symmetric and a
set with n elements that are reflexive and symmetric ?
(A) 2n(n+1)/2 and 2n.3n(n–1)/2
(B) 3n(n–1)/2 and 2n(n–1)
(C) 2n(n+1)/2 and 3n(n–1)/2
(D) 2n(n+1)/2 and 2n(n–1)/2
Ans: D

51. The strategy used to reduce the number of tree branches and the number of
static evaluations applied in case of a game tree is
(A) Minmax strategy
(B) Alpha-beta pruning strategy
(C) Constraint satisfaction strategy
(D) Static max strategy
Ans: B

52. Match the following :


(i) Regular Grammar (a) Pushdown automaton
(ii) Context free Grammar (b) Linear bounded automaton
(iii) Unrestricted Grammar (c) Deterministic finite automaton
(iv) Context Sensitive Grammar(d) Turing machine
(i) (ii) (iii) (iv)
(A) (c) (a) (b) (d)
(B) (c) (a) (d) (b)
(C) (c) (b) (a) (d)
(D) (c) (b) (d) (a)
Ans: B

53. Consider the below circuit and find the output function f(x,y,z).
(A) xz’+xy+y’z
(B) xz’+xy+y’z’
(C) xz+xy+y’z’
(D) xz+xy’+y’z
Ans: A

54. What is the size (in terms of bits) of Header length field in IPV4 header ?
(A) 2 (B) 4
(C) 8 (D) 16
Ans: B

55. Match the following with respect to java.util.* class methods :


(a) Bit Set (i) Time zone getTimezone( )
(b) Calendar (ii) int hashcode( )
(c) Time zone (iii) int nextInt( )
(d) Random (iv) Void setID(String tzName)
(a) (b) (c) (d)
(A) (ii) (i) (iv) (iii)
(B) (iii) (iv) (i) (ii)
(C) (iv) (iii)(ii) (i)
(D) (ii) (i) (iii)(iv)
Ans: A

56. ______ is sometimes said to be object oriented, because the only way to
manipulate kernel objects is by invoking methods on their handles.
(A) Windows NT
(B) Windows XP
(C) Windows VISTA
(D) Windows 95/98
Ans: A

57. A user level process in Unix traps the signal sent on a Ctrl + C input and has
a signal handling routine that saves appropriate files before terminating the
process. When a Ctrl + C input is given to this process, what is the mode in
which the signal handling routine executes ?
(A) User mode
(B) Kernel mode
(C) Superuser mode
(D) Privileged mode
Ans: B

58. A CPU generally handles an interrupt by executing an interrupt service routine


(A) as soon as an interrupt is raised
(B) by checking the interrupt register at the end of fetch cycle
(C) by checking the interrupt register after finishing the executing the current
instruction
(D) by checking the interrupt register at fixed time intervals
Ans: C

59. The perspective projection matrix, on the view plane z = d where the center of
projection is the origin (0, 0, 0) shall be
Ans: B

60. Radio signals generally propagate according to the following mechanisms:


(A) Modulation, Amplification, Scattering
(B) Reflection, Diffraction, Scattering
(C) Amplification, Diffraction, Modulation
(D) Reflection, Amplification, Diffraction
Ans: B

61. Identify the devices given below with their IC numbers :


(i) USART (a) 8251
(ii) Micro controller (b) 8051
(iii) Interrupt controller (c) 8259
(iv) DMA controller (d) 8257
(i) (ii) (iii) (iv)
(A) (a) (b) (c) (d)
(B) (b) (a) (d) (c)
(C) (c) (d) (a) (b)
(D) (d) (a) (b) (c)
Ans: A

62. The optimal solution of the following assignment problem using Hungarian
method is
(A) (B) (C) (D)
(A) (I) (II) (III) (IV)
(B) (I) (III) (II) (IV)
(C) (I) (III) (IV) (II)
(D) (I) (IV) (II) (III)
Ans: B

63. If a and b are the end points of a line, then which one of the following is
true ?
(A) If both end points are left, right, above or below the window, the line is
invisible.
(B) If both end points are left, right, above or below the window, the line is
completely visible.
(C) If both end points are left, right, above or below the window, the line is
trivially visible.
(D) If both end points are left, right, above or below the window, the line is
trivially invisible.
Ans: D

64. Match the following with link quality measurement and handoff initiation :
(a) Networked-Controlled Handoff(NCHO)(i) MS connect to BS
HO) (ii) Process via channel the target BS
(c) Forward Handoff (iii) First Generation Analog Cellular System
(d) Hard Handoff (iv) Second Generation Digital Cellular System
(a) (b) (c) (d)
(A) (iii) (iv) (ii) (i)
(B) (ii) (iii) (i) (iv)
(C) (ii) (i) (iv) (iii)
(D) (iv) (iii) (i) (ii)
Ans: A

65. Consider the methods used by processes P1 and P2 for accessing their critical
sections. The initial values of shared Boolean variables S1 and S2 are
randomly assigned,
P1 P2
while (S1 = = S2); while (S1 = = S2);
critical section critical section
S1 = S2; S1 = S2;
Which one of the following statements describes the properties achieved ?
(A) Mutual exclusion but not progress
(B) Progress but not mutual exclusion
(C) Neither mutual exclusion nor progress
(D) Both mutual exclusion and progress
Ans: C

66. If the period of a signal is 1000 ms, then what is its frequency in kilohertz
?
(A) 10–3 KHz (B) 10–2 KHz
(C) 10–1 KHz (D) 1 KHz
Ans: A

67. Let a * H and b * H be two cosets of H.


(i) Either a * H and b * H are disjoint
(ii) a * H and b * H are identical
Then,
(A) only (i) is true
(B) only (ii) is true
(C) (i) or (ii) is true
(D) (i) and (ii) is false
Ans: C

68. HTML is defined using SGML – an _______ standard, information processing-text


and office systems (SGML) for text information processing.
(A) ISO – 8878
(B) ISO – 8879
(C) ISO – 8880
(D) ISO – 8881
Ans: B

69. What is the meaning of ‘Hibernate’ in Windows XP/Windows 7 ?


(A) Restart the computers in safe mode.
(B) Restart the computers in normal mode.
(C) Shutdown the computer terminating all the running applications.
(D) Shutdown the computer without closing the running applications.
Ans: D

70. Assume that we have constructor functions for both base class and derived
class. Now consider the declaration in main( ). Base * P = New Derived; in
what sequence will the constructor be called ?
(A) Derived class constructor followed by Base class constructor.
(B) Base class constructor followed by derived class constructor.
(C) Base class constructor will not be called.
(D) Derived class constructor will not be called.
Ans: B

71. Which one of the following options is not a shell in UNIX system?
(A) Bourne Shell
(B) C Shell
(C) Net Shell
(D) Korn Shell
Ans: C

72.

G1 and G2 are two graphs as shown :


(A) Both G1 and G2 are planar graphs.
(B) Both G1 and G2 are not planar graphs.
(C) G1 is planar and G2 is not planar graph.
(D) G1 is not planar and G2 is planar graph.
Ans: D

73. In which file the compiler manage the various objects, which are used in
windows programming ?
(A) Control File
(B) Binary File
(C) Text File
(D) Obj File
Ans: C

74. On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk
arm must move to satisfy all the requests in the disk queue. Assume the last
request service was at track 345 and the head is moving toward track 0. The
queue in FIFO order contains requests for the following tracks :
123, 874, 692, 475, 105, 376
(Assume SCAN algorithm)
(A) 2013
(B) 1219
(C) 1967
(D) 1507
Ans: B

75. Halftoning is defined as


(A) a technique to obtain increased visual resolution using multiple intensity
levels.
(B) a technique for using minimum number of intensity levels to obtain increased
visual resolution.
(C) a technique to obtain increased visual resolution using maximum number of
intensity levels.
(D) a technique for using appropriate number intensity levels to obtain increased
visual resolution.
Ans: B