COMPUTER SCIENCE - PAGE 15
1. The best indicator of progress on a software project is the completion
1. Of a defined engineering activity task
2. Of a successful budget review meeting on time
3. And successful review of a defined software work product
4. And successful acceptance of project prototype by the customer
Ans: 3
2. The purpose of earned value analysis is to
1. Determine how to compensate developers based on their productivity
2. Provide a quantitative means of assessing software project progress
3. Provide a qualitative means of assessing software project progress
4. Set the price point for a software product based on development effort
Ans: 2
3. Software risk always involves two characteristics
1. Fire fighting and crisis management
2. Known and unknown risks
3. Uncertainty and loss
4. Staffing and budget
Ans: 3
4. Hazard analysis focuses on the identification and assessment of potential hazards that can cause
1. Project termination
2. Schedule slippage
3. External problems
4. Entire system to fail
Ans: 4
5. A key concept of quality control is that all work products
1. Are delivered on time and under budget
2. Have complete documentation
3. Have measurable specifications for process outputs
4. Are thoroughly tested before delivery to the customer
Ans: 3
6. Which of these activities is not one of the activities recommended to be performed by an independent SQA group?
1. Prepare SQA plan for the project
2. Review software engineering activities to verify process compliance
3. Report any evidence of noncompliance to senior management
4. Serve as the sole test team forany software produced
Ans: 4
7. A review summary report answers which three questions?
1. Terminate project, replace producer, request a time extension
2. What defects were found, what caused defects, who was responsible
3. What was reviewed, who reviewed it, what were the findings
4. None of the above
Ans: 3
8. Statistical quality assurance involves
1. Using sampling in place of exhaustive testing of software
2. Surveying customers to find out their opinions about product quality
3. Tracing each defect to its underlying cause, isolating the "vital few" causes, and moving to correct them
4. Tracing each defect to its underlying causes and using the pareto principle to correct each problem found
Ans: 3
9. Software safety is a quality assurance activity that focuses on hazards that
1. Affect the reliability of a software component
2. May cause an entire system to fail
3. May result from user input errors
4. Prevent profitable marketing of the final product
Ans: 2
10. The ISO quality assurance standard that applies to software engineering is
1. ISO 9000 : 2004
2. ISO 9001 : 2000
3. ISO 9002 : 2001
4. ISO 9003 : 2004
Ans: 2
11. The clock speed in microcomputer is measured in :
1) MHz
2) Bit
3) MIPs
4) MFLOPs
Ans: 1
12. Which of the following is not a computer language ?
1) COBOL
2) FORTRAN
3) BASIC
4) WS
Ans: 4
13. Which of the following is not an input device ?
A) Keyboard
B) Mouse
C) Scanner
D) Monitor
Ans: 4
14. Which of the following is not a part of CPU of a computer ?
A) Memory Unit
B) Control Unit
C) Optical Character Reader
D) Read Only Memory
Ans: 3
15. OMR represents
A) Optical Mannual Reader
B) Optical Mark Recognition
C) Operator Mark Reader
D) Optional Mark Reader
Ans: 2
16. Which one of the following is the oldest high level computer language?
A) FORTRAN
B) COBOL
C) BASIC
D) PASCAL
Ans: 1
17. Which of the following is not offered as an independent service layer in Cloud Computing ?
(a) Hardware as a service (b) Platform as a service
(c) Software as a service (d) Infrastructure as a service
Ans: A
18. Which of the following is not offered as an independent service layer in Cloud Computing ?
(a) Hardware as a service (b) Platform as a service
(c) Software as a service (d) Infrastructure as a service
Ans: A
19. Which one is not a type of printer in a computer ?
A) Dot Matrix
B) Laser
C) Daisy Wheel
D) Scanner
Ans: 4
20. Which one the following is not the auxillary or secondary memory of the computer?
A) Magnetic Tape
B) Floppy disc
C) Hard disc
D) RAM
Ans: 4
21. Which one of the following correlation is not correct
A) 1024 Bytes = 1 KB
B) 1024 MB = 1 GB
C) 1024 GB = 1 TB
D) 1024 MB = 1 KB
Ans: 4
22. In a computer example of high level language is :
A) PASCAL
B) VGA
C) SVGA
D) OMR
Ans: 1
23. USB represents the following -
A) Universal Serial Bus
B) Uniform System Backup
C) Unique Software Bus
D) Universal Scanner Byte
Ans: 1
24. Which of the following is not a web browser ?
A) Opera
B) Internet Explorer
C) Mozilla Firefox
D) Linux
Ans: 4
25. Which of the following is an Operating System ?
(a) UNIX (b) JAVA (c) ORACLE (d) MS-Office
Ans: A
26. Which of the following is an extremely fast, small memory between CPU and main memory ?
(a) Main RAM and ROM (b) Cache memory
(c) Secondary memory (d) None of the above
Ans: B
27. Television transmission is an example of which of the following ?
(a) Simplex Communication (b) Half-duplex Communication
(c) Full-duplex Communication (d) None of the above
Ans: A
28. The set of protocols, which defines all transmission exchanges across the internet is called
(a) CSMA/CD (b) TCP/IP (c) FDDI (d) None of the above
Ans: B
1. Of a defined engineering activity task
2. Of a successful budget review meeting on time
3. And successful review of a defined software work product
4. And successful acceptance of project prototype by the customer
Ans: 3
2. The purpose of earned value analysis is to
1. Determine how to compensate developers based on their productivity
2. Provide a quantitative means of assessing software project progress
3. Provide a qualitative means of assessing software project progress
4. Set the price point for a software product based on development effort
Ans: 2
3. Software risk always involves two characteristics
1. Fire fighting and crisis management
2. Known and unknown risks
3. Uncertainty and loss
4. Staffing and budget
Ans: 3
4. Hazard analysis focuses on the identification and assessment of potential hazards that can cause
1. Project termination
2. Schedule slippage
3. External problems
4. Entire system to fail
Ans: 4
5. A key concept of quality control is that all work products
1. Are delivered on time and under budget
2. Have complete documentation
3. Have measurable specifications for process outputs
4. Are thoroughly tested before delivery to the customer
Ans: 3
6. Which of these activities is not one of the activities recommended to be performed by an independent SQA group?
1. Prepare SQA plan for the project
2. Review software engineering activities to verify process compliance
3. Report any evidence of noncompliance to senior management
4. Serve as the sole test team forany software produced
Ans: 4
7. A review summary report answers which three questions?
1. Terminate project, replace producer, request a time extension
2. What defects were found, what caused defects, who was responsible
3. What was reviewed, who reviewed it, what were the findings
4. None of the above
Ans: 3
8. Statistical quality assurance involves
1. Using sampling in place of exhaustive testing of software
2. Surveying customers to find out their opinions about product quality
3. Tracing each defect to its underlying cause, isolating the "vital few" causes, and moving to correct them
4. Tracing each defect to its underlying causes and using the pareto principle to correct each problem found
Ans: 3
9. Software safety is a quality assurance activity that focuses on hazards that
1. Affect the reliability of a software component
2. May cause an entire system to fail
3. May result from user input errors
4. Prevent profitable marketing of the final product
Ans: 2
10. The ISO quality assurance standard that applies to software engineering is
1. ISO 9000 : 2004
2. ISO 9001 : 2000
3. ISO 9002 : 2001
4. ISO 9003 : 2004
Ans: 2
11. The clock speed in microcomputer is measured in :
1) MHz
2) Bit
3) MIPs
4) MFLOPs
Ans: 1
12. Which of the following is not a computer language ?
1) COBOL
2) FORTRAN
3) BASIC
4) WS
Ans: 4
13. Which of the following is not an input device ?
A) Keyboard
B) Mouse
C) Scanner
D) Monitor
Ans: 4
14. Which of the following is not a part of CPU of a computer ?
A) Memory Unit
B) Control Unit
C) Optical Character Reader
D) Read Only Memory
Ans: 3
15. OMR represents
A) Optical Mannual Reader
B) Optical Mark Recognition
C) Operator Mark Reader
D) Optional Mark Reader
Ans: 2
16. Which one of the following is the oldest high level computer language?
A) FORTRAN
B) COBOL
C) BASIC
D) PASCAL
Ans: 1
17. Which of the following is not offered as an independent service layer in Cloud Computing ?
(a) Hardware as a service (b) Platform as a service
(c) Software as a service (d) Infrastructure as a service
Ans: A
18. Which of the following is not offered as an independent service layer in Cloud Computing ?
(a) Hardware as a service (b) Platform as a service
(c) Software as a service (d) Infrastructure as a service
Ans: A
19. Which one is not a type of printer in a computer ?
A) Dot Matrix
B) Laser
C) Daisy Wheel
D) Scanner
Ans: 4
20. Which one the following is not the auxillary or secondary memory of the computer?
A) Magnetic Tape
B) Floppy disc
C) Hard disc
D) RAM
Ans: 4
21. Which one of the following correlation is not correct
A) 1024 Bytes = 1 KB
B) 1024 MB = 1 GB
C) 1024 GB = 1 TB
D) 1024 MB = 1 KB
Ans: 4
22. In a computer example of high level language is :
A) PASCAL
B) VGA
C) SVGA
D) OMR
Ans: 1
23. USB represents the following -
A) Universal Serial Bus
B) Uniform System Backup
C) Unique Software Bus
D) Universal Scanner Byte
Ans: 1
24. Which of the following is not a web browser ?
A) Opera
B) Internet Explorer
C) Mozilla Firefox
D) Linux
Ans: 4
25. Which of the following is an Operating System ?
(a) UNIX (b) JAVA (c) ORACLE (d) MS-Office
Ans: A
26. Which of the following is an extremely fast, small memory between CPU and main memory ?
(a) Main RAM and ROM (b) Cache memory
(c) Secondary memory (d) None of the above
Ans: B
27. Television transmission is an example of which of the following ?
(a) Simplex Communication (b) Half-duplex Communication
(c) Full-duplex Communication (d) None of the above
Ans: A
28. The set of protocols, which defines all transmission exchanges across the internet is called
(a) CSMA/CD (b) TCP/IP (c) FDDI (d) None of the above
Ans: B
29. The brain of a Computer System is
(A) Arithmetic and Logic Unit (B) Central Processing Unit
(C) Peripheral Devices (D) Control Unit
Ans: B
30. An input device that interprets pencil/pen marks on paper media is
(A) Optical Mark Reader (B) Punch Card Reader
(C) Optical Scanners (D) Plotters
Ans: A
31. The term phishing is
(A) An attempt for unauthorized access to a user’s system by pretending to be the user.
(B) An attempt to obtain sensitive information from the computer system.
(C) The process of sending same message to large number of internet users.
(D) None of the above.
Ans: B
32. IT Act in India was amended in
(A) 2004 (B) 2006
(C) 2011 (D) 2008
Ans: D
33. “url” stands for
(A) Uniform Resource Locator (B) Universe Reform Locator
(C) Uniform Reform Locator (D) Universe Resource Locator
Ans: A
34. Which of the following programming language is classified as low level language ?
(A) COBOL (B) FORTRAN
(C) JAVA (D) MASM
Ans: D
35. The program that monitors users activity on internet and transmit that information in background
to somewhere else is termed as
(A) Spyware (B) Adware
(C) Malware (D) Firmware
Ans: A
36. The process of recovering deleted and damaged files from criminal’s computers comes under :
(A) Computer Animation (B) Computer Graphics
(C) Computer Forensics (D) Computer Organisation
Ans: C
37. HTML is an acronym for
(A) Hyper Text Machine Language
(B) Hyper Transfer Machine Language
(C) Hyper Text Markup Language
(D) Hyper Transfer Markup Language
Ans: C
38. The octal number system consists of the following symbols :
(A) 0 – 7
(B) 0 – 9
(C) 0 – 9, A – F
(D) None of the above
Ans: A
39. The binary equivalent of (–19)10 in signed magnitude system is
(A) 11101100
(B) 11101101
(C) 10010011
(D) None of these
Ans: D
40. DNS in internet technology stands for
(A) Dynamic Name System
(B) Domain Name System
(C) Distributed Name System
(D) None of these
Ans: B
41. Which of the following is type of LAN ?
(A) Ethernet
(B) Token Ring
(C) FDDI
(D) All of the above
Ans: A
42. Which of the following statements is true ?
(A) Smart cards do not require an operating system.
(B) Smart cards and PCs use some operating system.
(C) COS is smart card operating system.
(D) The communication between reader and card is in full duplex mode.
Ans: B
43. Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a program works correctly for a value, then it will work correctly for all the other values in that class. This is used _____.
(A) To partition the program in the form of classes.
(B) To reduce the number of test cases required.
(C) For designing test cases in white box testing.
(D) all of the above.
Ans: B
44. The failure intensity for a basic model as a function of failures experienced is given as λ(μ)-λ0[1 – (μ)/(V0)] where λ0 is the initial failure intensity at the start of the execution, μ is the average or expected number of failures at a given point in time, the quantity V0 is the total number of failures that would occur in infinite time. Assume that a program will experience 100 failures in infinite time; the initial failure intensity was 10 failures/CPU hr. Then the decrement of failures intensity per failure will be
(A) 10 per CPU hr.
(B) 0.1 per CPU hr.
(C) –0.1 per CPU hr.
(D) 90 per CPU hr.
Ans: C
45. Improving processing efficiency or performance or restructuring of software to improve changeability is known as
(A) Corrective maintenance
(B) Perfective maintenance
(C) Adaptive maintenance
(D) Code maintenance
Ans: B
46. In ____, modules A and B make use of a common data type, but perhaps perform different operations on it.
(A) Data coupling
(B) Stamp coupling
(C) Control coupling
(D) Content coupling
Ans: B
47. Consider the following schemas:
Branch_Schema = (branch_name, assets, city)
Customer_Schema = (cutstomer_name, street, city)
Deposit_Schema = (branch_name,
account_number, customer_name, balance)
Borrow_Schema = (branch_name, loan_number, customer_name, amount)
This of the following tuple relational calculus finds all customers who have loan amount more than Rs. 12,000??
(A) {t(customer_name) | t∈borrow[?] t[amount]>12000}
(B) {t |t (customer_name) | t∈borrow[?] t[amount]>12000}
(C) {t |[?] ∈ borrow (t (customer_name=s (customer_ name))[?] [Amount]>12000}
(D) {t |[?] ∈ borrow (t (customer_name)[?] s[amount] >12000}
Ans: C
48. Match the following
(a) Create (i) The E-R Model
(b) Select (ii) Relationship Model
(c) Rectangle (iii) DDL
(d) Record (iv) DML
Codes:
(a) (b) (c) (d)
(A) (iii) (iv) (i) (ii)
(B) (iv) (iii) (ii) (i)
(C) (iv) (iii) (i) (ii)
(D) (iii) (iv) (ii) (i)
Ans: A
49. Sixty (60) reusable components were available for an application. If only 70% of these components can be used, rest 30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs. 14, what will be the risk exposure if risk probability is 80%?
(A) Rs. 25,200
(B) Rs. 20,160
(C) Rs. 25,160
(D) Rs. 20,400
Ans: B
50. Consider the following two function declarations:
(i) int *f( )
(ii) int (*f)( )
Which of the following is true?
(A) Both are identical.
(B) The first is a correct declaration and the second is wrong.
(C) Both are different ways of declaring pointer to a function.
(D) The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer.
Ans: D
(A) Arithmetic and Logic Unit (B) Central Processing Unit
(C) Peripheral Devices (D) Control Unit
Ans: B
30. An input device that interprets pencil/pen marks on paper media is
(A) Optical Mark Reader (B) Punch Card Reader
(C) Optical Scanners (D) Plotters
Ans: A
31. The term phishing is
(A) An attempt for unauthorized access to a user’s system by pretending to be the user.
(B) An attempt to obtain sensitive information from the computer system.
(C) The process of sending same message to large number of internet users.
(D) None of the above.
Ans: B
32. IT Act in India was amended in
(A) 2004 (B) 2006
(C) 2011 (D) 2008
Ans: D
33. “url” stands for
(A) Uniform Resource Locator (B) Universe Reform Locator
(C) Uniform Reform Locator (D) Universe Resource Locator
Ans: A
34. Which of the following programming language is classified as low level language ?
(A) COBOL (B) FORTRAN
(C) JAVA (D) MASM
Ans: D
35. The program that monitors users activity on internet and transmit that information in background
to somewhere else is termed as
(A) Spyware (B) Adware
(C) Malware (D) Firmware
Ans: A
36. The process of recovering deleted and damaged files from criminal’s computers comes under :
(A) Computer Animation (B) Computer Graphics
(C) Computer Forensics (D) Computer Organisation
Ans: C
37. HTML is an acronym for
(A) Hyper Text Machine Language
(B) Hyper Transfer Machine Language
(C) Hyper Text Markup Language
(D) Hyper Transfer Markup Language
Ans: C
38. The octal number system consists of the following symbols :
(A) 0 – 7
(B) 0 – 9
(C) 0 – 9, A – F
(D) None of the above
Ans: A
39. The binary equivalent of (–19)10 in signed magnitude system is
(A) 11101100
(B) 11101101
(C) 10010011
(D) None of these
Ans: D
40. DNS in internet technology stands for
(A) Dynamic Name System
(B) Domain Name System
(C) Distributed Name System
(D) None of these
Ans: B
41. Which of the following is type of LAN ?
(A) Ethernet
(B) Token Ring
(C) FDDI
(D) All of the above
Ans: A
42. Which of the following statements is true ?
(A) Smart cards do not require an operating system.
(B) Smart cards and PCs use some operating system.
(C) COS is smart card operating system.
(D) The communication between reader and card is in full duplex mode.
Ans: B
43. Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a program works correctly for a value, then it will work correctly for all the other values in that class. This is used _____.
(A) To partition the program in the form of classes.
(B) To reduce the number of test cases required.
(C) For designing test cases in white box testing.
(D) all of the above.
Ans: B
44. The failure intensity for a basic model as a function of failures experienced is given as λ(μ)-λ0[1 – (μ)/(V0)] where λ0 is the initial failure intensity at the start of the execution, μ is the average or expected number of failures at a given point in time, the quantity V0 is the total number of failures that would occur in infinite time. Assume that a program will experience 100 failures in infinite time; the initial failure intensity was 10 failures/CPU hr. Then the decrement of failures intensity per failure will be
(A) 10 per CPU hr.
(B) 0.1 per CPU hr.
(C) –0.1 per CPU hr.
(D) 90 per CPU hr.
Ans: C
45. Improving processing efficiency or performance or restructuring of software to improve changeability is known as
(A) Corrective maintenance
(B) Perfective maintenance
(C) Adaptive maintenance
(D) Code maintenance
Ans: B
46. In ____, modules A and B make use of a common data type, but perhaps perform different operations on it.
(A) Data coupling
(B) Stamp coupling
(C) Control coupling
(D) Content coupling
Ans: B
47. Consider the following schemas:
Branch_Schema = (branch_name, assets, city)
Customer_Schema = (cutstomer_name, street, city)
Deposit_Schema = (branch_name,
account_number, customer_name, balance)
Borrow_Schema = (branch_name, loan_number, customer_name, amount)
This of the following tuple relational calculus finds all customers who have loan amount more than Rs. 12,000??
(A) {t(customer_name) | t∈borrow[?] t[amount]>12000}
(B) {t |t (customer_name) | t∈borrow[?] t[amount]>12000}
(C) {t |[?] ∈ borrow (t (customer_name=s (customer_ name))[?] [Amount]>12000}
(D) {t |[?] ∈ borrow (t (customer_name)[?] s[amount] >12000}
Ans: C
48. Match the following
(a) Create (i) The E-R Model
(b) Select (ii) Relationship Model
(c) Rectangle (iii) DDL
(d) Record (iv) DML
Codes:
(a) (b) (c) (d)
(A) (iii) (iv) (i) (ii)
(B) (iv) (iii) (ii) (i)
(C) (iv) (iii) (i) (ii)
(D) (iii) (iv) (ii) (i)
Ans: A
49. Sixty (60) reusable components were available for an application. If only 70% of these components can be used, rest 30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs. 14, what will be the risk exposure if risk probability is 80%?
(A) Rs. 25,200
(B) Rs. 20,160
(C) Rs. 25,160
(D) Rs. 20,400
Ans: B
50. Consider the following two function declarations:
(i) int *f( )
(ii) int (*f)( )
Which of the following is true?
(A) Both are identical.
(B) The first is a correct declaration and the second is wrong.
(C) Both are different ways of declaring pointer to a function.
(D) The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer.
Ans: D
51. Given 0-1 knapsack problem and fractional knapsack problem and the following statements:
S1: 0-1 knapsack is efficiently solved using Greedy algorithm.
S2: Fractional knapsack is efficiently solved using Dynamic programming.
Which of the following is true?
(A) S1 is correct and S2 is not correct.
(B) Both S1 and S2 are correct.
(C) Both S1 and S2 are not correct.
(D) S1 is not correct and S2 is correct.
Ans: C
52. Assume that we have constructor function for both Base and Derived classes. Now consider the declaration:
main ( )
Base *p = new Derived;
In what sequence, the constructor will be executed?
(A) Derived class constructor is followed by Base class constructor.
(B) Base class constructor is followed by Derived class constructor.
(C) Base class constructor is never called.
(D) Derived class constructor is never called.
Ans: B
53. Given a Relation POSITION (Posting No, Skill), then query to retrieve all distinct pairs of posting-nos. requiring skill is(A) Select p.posting-No, p.posting-No From position p where p.skill= p.posting-No <p.posting-No.
(B) Select p1-posting-No, p2.posting-No from position p1, position p2 where p1.skill=p2.skill
(C) Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill=p2.skill and p1.posting-No< p2.posting-No
(D) Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill=p2.skill and p1.posting-No=p2.posting-No
Ans: C
54. A Program contains the following declarations and initial assignments
int i = 8, j = 5;
double x = 0.005, y = –0.01;
char c=’c’, d=’d’;
Determine the value of the following expressions which involve the use of library functions: abs(i-2*j) ; log(exp(x)) ; toupper(d)
(A) 2; 0.005; D
(B) 1; 0.005; D
(C) 2; 0.005; E
(D) 1; 0.005; e
Ans: A
55. MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes ______ frames.
(A) Temporal
(B) Voice
(C) Spatial
(D) Redundant
Ans: D
56. If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division?
(A) 1111110000
(B) 1111111010
(C) 111111000
(D) 111111
Ans: C
57. If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the _______.
(A) Public Key of user A
(B) Public Key of user B
(C) Private Key of user A
(D) Private Key of user B
Ans: B
58. A _____ can forward or block packets based on the information in the network layer and transport layer header.
(A) Proxy firewall
(B) Firewall
(C) Packet filter firewall
(D) Message digests firewall
Ans: A
59. Which of the following graphics devices are known as active graphics devices?
(i) Alphanumeric devices
(ii) Thumb wheels
(iii) Digitizers
(iv) Joystics
(A) (i) and (ii)
(B) (iii) and (iv)
(C) (i), (ii) and (iii)
(D) (i), (ii), (iii) and (iv)
Ans: D
60. A diametric projection is said to be trimetric projection when
(i) Two of the three foreshortening factors are equal and third is arbitrary.
(ii) All of the three foreshortening factors are equal.
(iii) All of the three foreshortening factors are arbitrary.
Which of the above is true?
(A) (i) and (ii)
(B) (ii) and (iii)
(C) (i) only
(D) (iii) only
Ans: C
61. Which of the following is/are fundamental method(s) of antialiasing?
(i) Increase of sample rate.
(ii) Treating a pixel as a finite area rather than as a point.
(iii) Decrease of sample rate.
(A) (i) and (ii)
(B) (ii) and (iii)
(C) (i) only
(D) (ii) only
Ans: A
62. The two color systems – the HSV and HLS are
(A) Hue, Saturation, Value and Hue, Lightness, Saturation.
(B) High, Standard, Value and High, Lightness, Saturation.
(C) Highly, Saturated, Value and Highly, Lightened, Saturation.
(D) Highly, Standard, Value and Hue, Lightness, Saturation.
Ans: A
63. The parametric representation of the line segment between the position vectors P1(2, 3) and P2(5, 4) is given as
(A) x (t)= 2+7t, y(t) = 3+7t 0 ≤ t ≤ ∝
(B) x (t)=2+10t, y(t) = 3+12t 0 ≤ t ≤ 1
(C) x (t)= 2+3t, y(t)=3+t 0 ≤ t ≤ 1
(D) t(x, y) = 14t 0 ≤ t ≤ 1
Ans: C
64. Identify the operation which is commutative but not associative?
(A) OR
(B) NOR
(C) EX-OR
(D) NAND
Ans: C
65. Consider the following sequence of operations:
(i) Pointer p1 is set to point at a new heap-dynamic variable.
(ii) Pointer p2 is assigned p1’s value.
(iii) The heap dynamic variable pointed to by p1 is explicitly de-allocated, but p2 is not changed by the operation.
This situation leads to which of the following:
(A) p1 becomes a dangling pointer
(B) p2 becomes a dangling pointer
(C) Both p1 and p2 are now dangling pointers
(D) Neither p1 nor p2 is now a dangling pointer
Ans: B
66. The programming languages C and C++ are not strongly typed languages because:
(A) Both C and C++ allow functions for which parameters are not type checked.
(B) Both C and C++ allow functions for which parameters are type checked.
(C) Both C and C++ allow functions for which parameters are not type checked and also the union types in these languages are not type checked.
(D) Union types in these (C and C++) languages are not type checked.
Ans: C
67. The tracing model in Prolog describes program execution in terms of certain events. These events are
(A) Call and exit
(B) Call and fail
(C) Call, exit and redo
(D) Call, exit, redo and fail
Ans: D
68. Which of the following statements is not correct with reference to distributed systems?
(A) Distributed system represents a global view of the network and considers it as a virtual uniprocessor system by controlling and managing resources across the network on all the sites.
(B) Distributed system is built on bare machine, not an add-on to the existing software.
(C) In a distributed system, kernel provides smallest possible set of services on which other services are built. This kernel is called microkernel. Open servers provide other services and access to shared resources.
(D) In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site.
Ans: D
69. Match the following:
a. TTL 1. High fan out
b. ECL 2. Low propagation delay
c. CMOS 3. High power dissipation
Code:
a b c
(A) 3 2 1
(B) 1 2 3
(C) 1 3 2
(D) 3 1 2
Ans: D
70. ______ is an “umbrella” activity that is applied throughout the software engineering process.
(A) Debugging
(B) Testing
(C) Designing
(D) Software quality assurance
Ans: C
71. Consider a main memory with 3 page frames for the following page reference string:
5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4
Assuming that the execution of process is initiated after loading page 5 in memory, the number of page faults in FIFO and second chance replacement respectively are
(A) 8 and 9
(B) 10 and 11
(C) 7 and 9
(D) 9 and 8
Ans: D
72. Which of the following shell scripts will produce the output “my first script”?
(A) For i in my first script {echo –i $i}
(B) For my first script; do echo –n; done
(C) For i in my first script; do echo –i $i; done
(D) For n in my first script; do echo –i $i; done
Ans: C
73. The portion of Windows 2000 operating system which is not portable is
(A) Processor management
(B) User interface
(C) Device management
(D) Virtual memory management
Ans: D
74. Match the following for Windows Operating System:
(a) Hardware abstraction layer (i) Starting all processes, emulation of different operating systems, security functions, transform character based applications to graphical representation.
(b) Kernel (ii) Export a virtual memory interface, support for symmetric multiprocessing administration, details of mapping memory, configuring I/O buses, setting up DMA.
(c) Executive (iii) Thread scheduling, interrupt and exception handling, recovery after power failure.
(d) Win32 subsystem (iv) Object manager, virtual memory manager, process manager, plug and- play and power manager.
Codes:
(a) (b) (c) (d)
(A) (i) (iii) (ii) (iv)
(B) (iv) (iii) (ii) (i)
(C) (ii) (iii) (iv) (i)
(D) (iii) (ii) (i) (iv)
Ans: C
75. Which of the following statements is not true for UNIX Operating System?
(A) Major strength of UNIX Operating System is its open standards which enabled large number of organizations ranging from academician to industries to participate in its development.
(B) UNIX kernel uses modules with well specified interfaces and provides advantages like simplified testing and maintenance of kernel. It has better extensibility as the kernel is not monolithic.
(C) UNIX is kernel based operating system with two main components viz. process management subsystem and file management subsystem.
(D) All devices are represented as files which simplify the management of I/O devices and files. The directories structure used is directed acyclic graph.
Ans: B
76. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded?
(A) 112 Mbits
(B) 6.72 Mbits
(C) 67.20 Mbits
(D) 672 Mbits
Ans: B
77. In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.
(A) Non-persistent
(B) 0-persistent
(C) 1-persistent
(D) p-persistent
Ans: D
78. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?
(A) Monoalphabetic
(B) Polyalphabetic
(C) Transpositional
(D) None of the above
Ans: B
79. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
(A) 100 meters
(B) 200 meters
(C) 1000 meters
(D) 2000 meters
Ans: A
80. The ______ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
(A) Hyper Text Markup Language
(B) File Transfer Protocol
(C) Hyper Text Transfer Protocol
(D) Common Gateway Interface
Ans: D
81. The count-to-infinity problem is associated with
(A) Flooding algorithm
(B) Hierarchical routing algorithm
(C) Distance vector routing algorithm
(D) Link state routing algorithm
Ans: C
82. The IEEE single-precision and double-precision format to represent floating-point numbers, has a length of ______ and ______ respectively.
(A) 8 bits and 16 bits
(B) 16 bits and 32 bits
(C) 32 bits and 64 bits
(D) 64 bits and 128 bits
Ans: C
83. Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in G so that the graph is not connected is
(A) 2451
(B) 4950
(C) 4851
(D) 9900
Ans: C
84. The amortized time complexity to perform ______ operation(s) in Splay trees is O(Ig n).
(A) Search
(B) Search and Insert
(C) Search and Delete
(D) Search, Insert and Delete
Ans: D
85. Suppose that the splits at every level of Quicksort are in proportion 1-β to β, where 0 < β ≤ 0.5 is a constant. The number of elements in an array is n. The maximum depth is approximately
(A) 0.5 β Ig n
(B) 0.5 (1 – β) Ig n
(C) – (Ig n)/(Ig β)
(D) – (Ig n)/Ig (1 – β)
Ans: D
86. The efficient data structure to insert/delete a number in a stored set of numbers is
(A) Queue
(B) Linked list
(C) Doubly linked list
(D) Binary tree
Ans: C
87. Regular expression for the language L = {w ∈ {0, 1}* | w has no pair of consecutive zeros} is
(A) (1 + 010)*
(B) (01 + 10)*
(C) (1 + 010)* (0 + λ)
(D) (1 + 01)* (0 + λ)
Ans: D
88. Assume the statements S1 and S2 given as:
S1: Given a context free grammar G, there exists an algorithm for determining whether L(G) is infinite.
S2: There exists an algorithm to determine whether two context free grammars generate the same language.
Which of the following is true?
(A) S1 is correct and S2 is not correct.
(B) Both S1 and S2 are correct.
(C) Both S1 and S2 are not correct.
(D) S1 is not correct and S2 is correct.
Ans: A
89. The number of eight-bit strings beginning with either 111 or 101 is ______.
(A) 64
(B) 128
(C) 265
(D) None of the above
Ans: A
90. Find the number of ways to paint 12 offices so that 3 of them will be green, 2 of them pink, 2 of them yellow and the rest ones white.
(A) 55,440
(B) 1, 66,320
(C) 4.790E+08
(D) 39, 91,680
Ans: B
91. Consider the following statements:
(i) A graph in which there is a unique path between every pair of vertices is a tree.
(ii) A connected graph with e = v – 1 is a tree.
(iii) A graph with e = v – 1 that has no circuit is a tree.
Which of the above statements is/are true?
(A) (i) & (iii)
(B) (ii) & (iii)
(C) (i) & (ii)
(D) All of the above
Ans: D
92. Consider the In-order and Post-order traversals of a tree as given below: In-order: j e n k o p b f a c l g m d h i Post-order: j n o p k e f b c l m g h i d a
The Pre-order traversal of the tree shall be
(A) a b f e j k n o p c d g l m h i
(B) a b c d e f j k n o p g l m h i
(C) a b e j k n o p f c d g l m h i
(D) j e n o p k f b c l m g h i d a
Ans: C
93. Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation?
(A) AND, OR, NOT
(B) NAND, NOR
(C) EX-OR, EX-NOR
(D) None of the above
Ans: C
94. The quantification ∃!x P(x) denotes the proposition “There exists a unique x such that P(x) is true”, express the quantification using universal and existential quantifications and logical operators:
(A) ∃x P(x) ∨∀x∀y ((P(x) ∨ P(y)) → x = y)
(B) ∀ x P(x) ∧∀x∀y ((P(x) ∨ P(y)) → x = y)
(C) ∃x P(x) ∧∀x∀y ((P(x) ∧ P(y)) → x = y)
(D) ∃x P(x) ∧∃x∃y ((P(x) ∨ P(y)) → x = y)
Ans: C
95. If F and G are Boolean functions of degree n. Then, which of the following is true?
(A) F ≤ F + G and F G ≤ F
(B) G ≤ F + G and F G ≥ G
(C) F ≥ F + G and F G ≤ F
(D) G ≥ F + G and F G ≤ F
Ans: A
96. Which of the following mode declaration is used in C++ to open a file for input?
(A) ios: : app
(B) In:: ios
(C) ios: : file
(D) ios: : in
Ans: B
97. Data Encryption Techniques are particularly used for ______.
(A) Protecting data in Data Communication System.
(B) Reduce Storage Space Requirement.
(C) Enhances Data Integrity.
(D) Decreases Data Integrity.
Ans: B
98. Let L be a set accepted by a nondeterministic finite automaton. The number of states in non-deterministic finite automaton is |Q|. The maximum number of states in equivalent finite automaton that accepts L is
(A) |Q|
(B) 2|Q|
(C) 2|Q| – 1
(D) 2|Q|
Ans: A
99. What is the result of the following expression?
(1 & 2) + (3 & 4)
(A) 1
(B) 3
(C) 2
(D) 0
Ans: A
100. Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
(A) Forward from source to sink No
(B) Backward from sink to source from position p
(C) Forward from source to hidden nodes
(D) Backward from since to hidden nodes
Ans: C
S1: 0-1 knapsack is efficiently solved using Greedy algorithm.
S2: Fractional knapsack is efficiently solved using Dynamic programming.
Which of the following is true?
(A) S1 is correct and S2 is not correct.
(B) Both S1 and S2 are correct.
(C) Both S1 and S2 are not correct.
(D) S1 is not correct and S2 is correct.
Ans: C
52. Assume that we have constructor function for both Base and Derived classes. Now consider the declaration:
main ( )
Base *p = new Derived;
In what sequence, the constructor will be executed?
(A) Derived class constructor is followed by Base class constructor.
(B) Base class constructor is followed by Derived class constructor.
(C) Base class constructor is never called.
(D) Derived class constructor is never called.
Ans: B
53. Given a Relation POSITION (Posting No, Skill), then query to retrieve all distinct pairs of posting-nos. requiring skill is(A) Select p.posting-No, p.posting-No From position p where p.skill= p.posting-No <p.posting-No.
(B) Select p1-posting-No, p2.posting-No from position p1, position p2 where p1.skill=p2.skill
(C) Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill=p2.skill and p1.posting-No< p2.posting-No
(D) Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill=p2.skill and p1.posting-No=p2.posting-No
Ans: C
54. A Program contains the following declarations and initial assignments
int i = 8, j = 5;
double x = 0.005, y = –0.01;
char c=’c’, d=’d’;
Determine the value of the following expressions which involve the use of library functions: abs(i-2*j) ; log(exp(x)) ; toupper(d)
(A) 2; 0.005; D
(B) 1; 0.005; D
(C) 2; 0.005; E
(D) 1; 0.005; e
Ans: A
55. MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes ______ frames.
(A) Temporal
(B) Voice
(C) Spatial
(D) Redundant
Ans: D
56. If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division?
(A) 1111110000
(B) 1111111010
(C) 111111000
(D) 111111
Ans: C
57. If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the _______.
(A) Public Key of user A
(B) Public Key of user B
(C) Private Key of user A
(D) Private Key of user B
Ans: B
58. A _____ can forward or block packets based on the information in the network layer and transport layer header.
(A) Proxy firewall
(B) Firewall
(C) Packet filter firewall
(D) Message digests firewall
Ans: A
59. Which of the following graphics devices are known as active graphics devices?
(i) Alphanumeric devices
(ii) Thumb wheels
(iii) Digitizers
(iv) Joystics
(A) (i) and (ii)
(B) (iii) and (iv)
(C) (i), (ii) and (iii)
(D) (i), (ii), (iii) and (iv)
Ans: D
60. A diametric projection is said to be trimetric projection when
(i) Two of the three foreshortening factors are equal and third is arbitrary.
(ii) All of the three foreshortening factors are equal.
(iii) All of the three foreshortening factors are arbitrary.
Which of the above is true?
(A) (i) and (ii)
(B) (ii) and (iii)
(C) (i) only
(D) (iii) only
Ans: C
61. Which of the following is/are fundamental method(s) of antialiasing?
(i) Increase of sample rate.
(ii) Treating a pixel as a finite area rather than as a point.
(iii) Decrease of sample rate.
(A) (i) and (ii)
(B) (ii) and (iii)
(C) (i) only
(D) (ii) only
Ans: A
62. The two color systems – the HSV and HLS are
(A) Hue, Saturation, Value and Hue, Lightness, Saturation.
(B) High, Standard, Value and High, Lightness, Saturation.
(C) Highly, Saturated, Value and Highly, Lightened, Saturation.
(D) Highly, Standard, Value and Hue, Lightness, Saturation.
Ans: A
63. The parametric representation of the line segment between the position vectors P1(2, 3) and P2(5, 4) is given as
(A) x (t)= 2+7t, y(t) = 3+7t 0 ≤ t ≤ ∝
(B) x (t)=2+10t, y(t) = 3+12t 0 ≤ t ≤ 1
(C) x (t)= 2+3t, y(t)=3+t 0 ≤ t ≤ 1
(D) t(x, y) = 14t 0 ≤ t ≤ 1
Ans: C
64. Identify the operation which is commutative but not associative?
(A) OR
(B) NOR
(C) EX-OR
(D) NAND
Ans: C
65. Consider the following sequence of operations:
(i) Pointer p1 is set to point at a new heap-dynamic variable.
(ii) Pointer p2 is assigned p1’s value.
(iii) The heap dynamic variable pointed to by p1 is explicitly de-allocated, but p2 is not changed by the operation.
This situation leads to which of the following:
(A) p1 becomes a dangling pointer
(B) p2 becomes a dangling pointer
(C) Both p1 and p2 are now dangling pointers
(D) Neither p1 nor p2 is now a dangling pointer
Ans: B
66. The programming languages C and C++ are not strongly typed languages because:
(A) Both C and C++ allow functions for which parameters are not type checked.
(B) Both C and C++ allow functions for which parameters are type checked.
(C) Both C and C++ allow functions for which parameters are not type checked and also the union types in these languages are not type checked.
(D) Union types in these (C and C++) languages are not type checked.
Ans: C
67. The tracing model in Prolog describes program execution in terms of certain events. These events are
(A) Call and exit
(B) Call and fail
(C) Call, exit and redo
(D) Call, exit, redo and fail
Ans: D
68. Which of the following statements is not correct with reference to distributed systems?
(A) Distributed system represents a global view of the network and considers it as a virtual uniprocessor system by controlling and managing resources across the network on all the sites.
(B) Distributed system is built on bare machine, not an add-on to the existing software.
(C) In a distributed system, kernel provides smallest possible set of services on which other services are built. This kernel is called microkernel. Open servers provide other services and access to shared resources.
(D) In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site.
Ans: D
69. Match the following:
a. TTL 1. High fan out
b. ECL 2. Low propagation delay
c. CMOS 3. High power dissipation
Code:
a b c
(A) 3 2 1
(B) 1 2 3
(C) 1 3 2
(D) 3 1 2
Ans: D
70. ______ is an “umbrella” activity that is applied throughout the software engineering process.
(A) Debugging
(B) Testing
(C) Designing
(D) Software quality assurance
Ans: C
71. Consider a main memory with 3 page frames for the following page reference string:
5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4
Assuming that the execution of process is initiated after loading page 5 in memory, the number of page faults in FIFO and second chance replacement respectively are
(A) 8 and 9
(B) 10 and 11
(C) 7 and 9
(D) 9 and 8
Ans: D
72. Which of the following shell scripts will produce the output “my first script”?
(A) For i in my first script {echo –i $i}
(B) For my first script; do echo –n; done
(C) For i in my first script; do echo –i $i; done
(D) For n in my first script; do echo –i $i; done
Ans: C
73. The portion of Windows 2000 operating system which is not portable is
(A) Processor management
(B) User interface
(C) Device management
(D) Virtual memory management
Ans: D
74. Match the following for Windows Operating System:
(a) Hardware abstraction layer (i) Starting all processes, emulation of different operating systems, security functions, transform character based applications to graphical representation.
(b) Kernel (ii) Export a virtual memory interface, support for symmetric multiprocessing administration, details of mapping memory, configuring I/O buses, setting up DMA.
(c) Executive (iii) Thread scheduling, interrupt and exception handling, recovery after power failure.
(d) Win32 subsystem (iv) Object manager, virtual memory manager, process manager, plug and- play and power manager.
Codes:
(a) (b) (c) (d)
(A) (i) (iii) (ii) (iv)
(B) (iv) (iii) (ii) (i)
(C) (ii) (iii) (iv) (i)
(D) (iii) (ii) (i) (iv)
Ans: C
75. Which of the following statements is not true for UNIX Operating System?
(A) Major strength of UNIX Operating System is its open standards which enabled large number of organizations ranging from academician to industries to participate in its development.
(B) UNIX kernel uses modules with well specified interfaces and provides advantages like simplified testing and maintenance of kernel. It has better extensibility as the kernel is not monolithic.
(C) UNIX is kernel based operating system with two main components viz. process management subsystem and file management subsystem.
(D) All devices are represented as files which simplify the management of I/O devices and files. The directories structure used is directed acyclic graph.
Ans: B
76. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded?
(A) 112 Mbits
(B) 6.72 Mbits
(C) 67.20 Mbits
(D) 672 Mbits
Ans: B
77. In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.
(A) Non-persistent
(B) 0-persistent
(C) 1-persistent
(D) p-persistent
Ans: D
78. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?
(A) Monoalphabetic
(B) Polyalphabetic
(C) Transpositional
(D) None of the above
Ans: B
79. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
(A) 100 meters
(B) 200 meters
(C) 1000 meters
(D) 2000 meters
Ans: A
80. The ______ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
(A) Hyper Text Markup Language
(B) File Transfer Protocol
(C) Hyper Text Transfer Protocol
(D) Common Gateway Interface
Ans: D
81. The count-to-infinity problem is associated with
(A) Flooding algorithm
(B) Hierarchical routing algorithm
(C) Distance vector routing algorithm
(D) Link state routing algorithm
Ans: C
82. The IEEE single-precision and double-precision format to represent floating-point numbers, has a length of ______ and ______ respectively.
(A) 8 bits and 16 bits
(B) 16 bits and 32 bits
(C) 32 bits and 64 bits
(D) 64 bits and 128 bits
Ans: C
83. Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in G so that the graph is not connected is
(A) 2451
(B) 4950
(C) 4851
(D) 9900
Ans: C
84. The amortized time complexity to perform ______ operation(s) in Splay trees is O(Ig n).
(A) Search
(B) Search and Insert
(C) Search and Delete
(D) Search, Insert and Delete
Ans: D
85. Suppose that the splits at every level of Quicksort are in proportion 1-β to β, where 0 < β ≤ 0.5 is a constant. The number of elements in an array is n. The maximum depth is approximately
(A) 0.5 β Ig n
(B) 0.5 (1 – β) Ig n
(C) – (Ig n)/(Ig β)
(D) – (Ig n)/Ig (1 – β)
Ans: D
86. The efficient data structure to insert/delete a number in a stored set of numbers is
(A) Queue
(B) Linked list
(C) Doubly linked list
(D) Binary tree
Ans: C
87. Regular expression for the language L = {w ∈ {0, 1}* | w has no pair of consecutive zeros} is
(A) (1 + 010)*
(B) (01 + 10)*
(C) (1 + 010)* (0 + λ)
(D) (1 + 01)* (0 + λ)
Ans: D
88. Assume the statements S1 and S2 given as:
S1: Given a context free grammar G, there exists an algorithm for determining whether L(G) is infinite.
S2: There exists an algorithm to determine whether two context free grammars generate the same language.
Which of the following is true?
(A) S1 is correct and S2 is not correct.
(B) Both S1 and S2 are correct.
(C) Both S1 and S2 are not correct.
(D) S1 is not correct and S2 is correct.
Ans: A
89. The number of eight-bit strings beginning with either 111 or 101 is ______.
(A) 64
(B) 128
(C) 265
(D) None of the above
Ans: A
90. Find the number of ways to paint 12 offices so that 3 of them will be green, 2 of them pink, 2 of them yellow and the rest ones white.
(A) 55,440
(B) 1, 66,320
(C) 4.790E+08
(D) 39, 91,680
Ans: B
91. Consider the following statements:
(i) A graph in which there is a unique path between every pair of vertices is a tree.
(ii) A connected graph with e = v – 1 is a tree.
(iii) A graph with e = v – 1 that has no circuit is a tree.
Which of the above statements is/are true?
(A) (i) & (iii)
(B) (ii) & (iii)
(C) (i) & (ii)
(D) All of the above
Ans: D
92. Consider the In-order and Post-order traversals of a tree as given below: In-order: j e n k o p b f a c l g m d h i Post-order: j n o p k e f b c l m g h i d a
The Pre-order traversal of the tree shall be
(A) a b f e j k n o p c d g l m h i
(B) a b c d e f j k n o p g l m h i
(C) a b e j k n o p f c d g l m h i
(D) j e n o p k f b c l m g h i d a
Ans: C
93. Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation?
(A) AND, OR, NOT
(B) NAND, NOR
(C) EX-OR, EX-NOR
(D) None of the above
Ans: C
94. The quantification ∃!x P(x) denotes the proposition “There exists a unique x such that P(x) is true”, express the quantification using universal and existential quantifications and logical operators:
(A) ∃x P(x) ∨∀x∀y ((P(x) ∨ P(y)) → x = y)
(B) ∀ x P(x) ∧∀x∀y ((P(x) ∨ P(y)) → x = y)
(C) ∃x P(x) ∧∀x∀y ((P(x) ∧ P(y)) → x = y)
(D) ∃x P(x) ∧∃x∃y ((P(x) ∨ P(y)) → x = y)
Ans: C
95. If F and G are Boolean functions of degree n. Then, which of the following is true?
(A) F ≤ F + G and F G ≤ F
(B) G ≤ F + G and F G ≥ G
(C) F ≥ F + G and F G ≤ F
(D) G ≥ F + G and F G ≤ F
Ans: A
96. Which of the following mode declaration is used in C++ to open a file for input?
(A) ios: : app
(B) In:: ios
(C) ios: : file
(D) ios: : in
Ans: B
97. Data Encryption Techniques are particularly used for ______.
(A) Protecting data in Data Communication System.
(B) Reduce Storage Space Requirement.
(C) Enhances Data Integrity.
(D) Decreases Data Integrity.
Ans: B
98. Let L be a set accepted by a nondeterministic finite automaton. The number of states in non-deterministic finite automaton is |Q|. The maximum number of states in equivalent finite automaton that accepts L is
(A) |Q|
(B) 2|Q|
(C) 2|Q| – 1
(D) 2|Q|
Ans: A
99. What is the result of the following expression?
(1 & 2) + (3 & 4)
(A) 1
(B) 3
(C) 2
(D) 0
Ans: A
100. Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
(A) Forward from source to sink No
(B) Backward from sink to source from position p
(C) Forward from source to hidden nodes
(D) Backward from since to hidden nodes
Ans: C
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15