COMPUTER SCIENCE - PAGE 5
1. In the write operation of DMA, the data is transferred
(a). from I/O to memory
(b). from memory to memory
(c). from memory to I/O
(d). from I/O to I/O
Answer: Option-A
2. Which of the following language paradigms allows the programmer to express algorithms derived from a top-down design?
(a). logic
(b). functional
(c). object-oriented
(d). procedural
Answer: Option-D
3. The following is an example of bool-expression.
(a). x=6
(b). m1.setText("Hello")
(c). cause=bYes
(d). 70
Answer: Option-C
4. If every requirement can be checked by a cost-effective process, then the SRS is said to be
(a). verifiable
(b). complete
(c). traceable
(d). modifiable
Answer: Option-A
5. In order to sort a list L consisting of a sorted list followed by a few "random" elements, which one of the following sorting methods would be suitable?
(a). Quick sort
(b). Selection sort
(c). Bubble sort
(d). Insertion sort
Answer: Option-D
6. Quick sort algorithm belongs to the _______________ design technique.
(a). Backtracking
(b). Dynamic programming
(c). Greedy
(d). Divide and Conquer
Answer: Option-C
7. Among the following, which one is NOT a regular expression?
(a). (1+2+0)*(1+2)
(b). [(0+1)-(0b+a1)*(a+b)]*
(c). [(a+b)*(aa+bb)]*
(d). (01+11+10)*
Answer: Option-B
8. Given a 4-input AND gate, how many inputs must be HIGH in order for the output of the logic gate to go HIGH?
(a). any two of the inputs
(b). any one of the inputs
(c). any three of the inputs
(d). all four inputs
Answer: Option-D
9. Let P be the risk probability, L be the loss, then Risk Exposure(RE) is computed as
(a). RE=P+L
(b). RE=P/L
(c). RE=P*L
(d). RE=2*P*L
Answer: Option-C
10. Virtual memory is
(a). less efficient in utilization of memory
(b). used in all major commercial operating systems
(c). simple to implement
(d). useful when fast I/O devices are not available
Answer: Option-B
11. SIMD organization represents
(a). organization of single computer containing a control unit, processor unit and a memory unit
(b). one that includes many processing units under the supervision of a common control unit
(c). a computer system capable of processing several programs at the same time (d). none of the above
Answer: Option-B
12. The view of total database content is
(a). External view
(b). Physical view
(c). Internal view
(d). Conceptual view
Answer: Option-D
13. If we are to debug an implementation of a quicksort that is supposed to sort an array in ascending order, after the first partition step has been completed, the contents of the array are in
2 10 1 14 17 24 22 20
(a). The pivot could have been either 14 or 17
(b). Neither 14 nor 17 could have been the pivot
(c). The pivot could have been 17, but could not have been 14
(d). The pivot could have been 14, but could not have been 17
Answer: Option-A
14. Using Bubble sort, the number of interchanges required to sort 5, 1, 6, 2 and 4 in ascending order is
(a). 7
(b). 5
(c). 8
(d). 6
Answer: Option-B
15. An n-bit microprocessor has
(a). n-bit program counter
(b). n-bit ALU
(c). n-bit address register
(d). n-bit instruction register
Answer: Option-D
16. In the spiral model 'risk analysis' is performed
(a). before using spiral model
(b). in the first and second loop
(c). in every loop
(d). in the first loop
Answer: Option-C
17. Which one of the following is NOT a scripting language?
(a). Javascript
(b). HTML
(c). Postscript
(d). XML
Answer: Option-C
18. Merging four sorted files containing 50, 10, 25 and 15 records respectively takes ________ time
(a). O(200)
(b). O(175)
(c). O(125)
(d). O(100)
Answer: Option-D
19. Which one of the following is NOT a fundamental process state?
(a). blocked
(b). ready
(c). terminated
(d). executing
Answer: Option-A
20. The circuit that is used to store one bit of data is
(a). Decoder
(b). Register
(c). Encoder
(d). Flip Flop
Answer: Option-D
21. Which one of the language paradigms express the addition of two values as (+10 20)?
(a). procedural
(b). object-oriented
(c). logic
(d). functional
Answer: Option-D
22. Average time required to reach a storage location in memory and read its contents is
(a). turnaround time
(b). transfer time
(c). seek time
(d). access time
Answer: Option-D
23. World Computer Literacy Day is celebrated on
(a). July 5
(b). December 2
(c). November 14
(d). September 7
Answer: Option-B
24. The most commonly used input device of a Computer is
(a). Monitor
(b). Printer
(c). Key Board
(d). None of these
Answer: Option-C
25. The large area that we can see when starting windows is called
(a). Documents
(b). Desktop
(c). Title Bar
(d). Menu bar
Answer: Option-B
26. Choose true Statement in context of C++ :
1) If catch statement does not catch exception it generates error
2) catch ( . . . ) is not permitted
3) If try does not throw exception, it generates error
4) One try block may have multiple catch blocks
Ans: 4
(a). from I/O to memory
(b). from memory to memory
(c). from memory to I/O
(d). from I/O to I/O
Answer: Option-A
2. Which of the following language paradigms allows the programmer to express algorithms derived from a top-down design?
(a). logic
(b). functional
(c). object-oriented
(d). procedural
Answer: Option-D
3. The following is an example of bool-expression.
(a). x=6
(b). m1.setText("Hello")
(c). cause=bYes
(d). 70
Answer: Option-C
4. If every requirement can be checked by a cost-effective process, then the SRS is said to be
(a). verifiable
(b). complete
(c). traceable
(d). modifiable
Answer: Option-A
5. In order to sort a list L consisting of a sorted list followed by a few "random" elements, which one of the following sorting methods would be suitable?
(a). Quick sort
(b). Selection sort
(c). Bubble sort
(d). Insertion sort
Answer: Option-D
6. Quick sort algorithm belongs to the _______________ design technique.
(a). Backtracking
(b). Dynamic programming
(c). Greedy
(d). Divide and Conquer
Answer: Option-C
7. Among the following, which one is NOT a regular expression?
(a). (1+2+0)*(1+2)
(b). [(0+1)-(0b+a1)*(a+b)]*
(c). [(a+b)*(aa+bb)]*
(d). (01+11+10)*
Answer: Option-B
8. Given a 4-input AND gate, how many inputs must be HIGH in order for the output of the logic gate to go HIGH?
(a). any two of the inputs
(b). any one of the inputs
(c). any three of the inputs
(d). all four inputs
Answer: Option-D
9. Let P be the risk probability, L be the loss, then Risk Exposure(RE) is computed as
(a). RE=P+L
(b). RE=P/L
(c). RE=P*L
(d). RE=2*P*L
Answer: Option-C
10. Virtual memory is
(a). less efficient in utilization of memory
(b). used in all major commercial operating systems
(c). simple to implement
(d). useful when fast I/O devices are not available
Answer: Option-B
11. SIMD organization represents
(a). organization of single computer containing a control unit, processor unit and a memory unit
(b). one that includes many processing units under the supervision of a common control unit
(c). a computer system capable of processing several programs at the same time (d). none of the above
Answer: Option-B
12. The view of total database content is
(a). External view
(b). Physical view
(c). Internal view
(d). Conceptual view
Answer: Option-D
13. If we are to debug an implementation of a quicksort that is supposed to sort an array in ascending order, after the first partition step has been completed, the contents of the array are in
2 10 1 14 17 24 22 20
(a). The pivot could have been either 14 or 17
(b). Neither 14 nor 17 could have been the pivot
(c). The pivot could have been 17, but could not have been 14
(d). The pivot could have been 14, but could not have been 17
Answer: Option-A
14. Using Bubble sort, the number of interchanges required to sort 5, 1, 6, 2 and 4 in ascending order is
(a). 7
(b). 5
(c). 8
(d). 6
Answer: Option-B
15. An n-bit microprocessor has
(a). n-bit program counter
(b). n-bit ALU
(c). n-bit address register
(d). n-bit instruction register
Answer: Option-D
16. In the spiral model 'risk analysis' is performed
(a). before using spiral model
(b). in the first and second loop
(c). in every loop
(d). in the first loop
Answer: Option-C
17. Which one of the following is NOT a scripting language?
(a). Javascript
(b). HTML
(c). Postscript
(d). XML
Answer: Option-C
18. Merging four sorted files containing 50, 10, 25 and 15 records respectively takes ________ time
(a). O(200)
(b). O(175)
(c). O(125)
(d). O(100)
Answer: Option-D
19. Which one of the following is NOT a fundamental process state?
(a). blocked
(b). ready
(c). terminated
(d). executing
Answer: Option-A
20. The circuit that is used to store one bit of data is
(a). Decoder
(b). Register
(c). Encoder
(d). Flip Flop
Answer: Option-D
21. Which one of the language paradigms express the addition of two values as (+10 20)?
(a). procedural
(b). object-oriented
(c). logic
(d). functional
Answer: Option-D
22. Average time required to reach a storage location in memory and read its contents is
(a). turnaround time
(b). transfer time
(c). seek time
(d). access time
Answer: Option-D
23. World Computer Literacy Day is celebrated on
(a). July 5
(b). December 2
(c). November 14
(d). September 7
Answer: Option-B
24. The most commonly used input device of a Computer is
(a). Monitor
(b). Printer
(c). Key Board
(d). None of these
Answer: Option-C
25. The large area that we can see when starting windows is called
(a). Documents
(b). Desktop
(c). Title Bar
(d). Menu bar
Answer: Option-B
26. Choose true Statement in context of C++ :
1) If catch statement does not catch exception it generates error
2) catch ( . . . ) is not permitted
3) If try does not throw exception, it generates error
4) One try block may have multiple catch blocks
Ans: 4
27. In computer Logical operations are performed by
(A) Control Unit (B) ALU (C) Primary Memory (D) CPU
Ans: B
28. _____ is a volatile memory ?
(A) SRAM (B) DRAM (C) Both (A) & (B) (D) None of these
Ans: C
29. Which of the following computing models is not an example of distributed computing environment ?
(A) Cloud computing (B) Parallel computing (C) Cluster computing (D) Peer-to-peer computing _____________
Ans: B
30. Expand GUI.
(A) Graphical User Instance (B) Graphical User Intermediate (C) Graphical User Interface (D) Graphical Used Instance
Ans: C
31. IC chips are used in which generation of computer ?
(A) Second Generation (B) Third Generation (C) Fourth Generation (D) Both (A) & (B)
Ans: B
32. Microsoft PowerPoint is an example of
(A) Operating System (B) Display Device (C) Application Software (D) System Software
Ans: C
33. Website is a collection of
(A) Webpage (B) HTML Page (C) Both (A) & (B) (D) HTTP Page
Ans: C
34. Bing is a
(A) Website (B) Business software (C) Search engine (D) Social Media
Ans: C
35. Moving from one webpage to another webpage is known as
(A) Attaching (B) Changing (C) Downloading (D) Browsing
Ans: D
36. A Trojan horse is
(A) A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation.
(B) A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred.
(C) A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
(D) All of the above
Ans: A
(A) Control Unit (B) ALU (C) Primary Memory (D) CPU
Ans: B
28. _____ is a volatile memory ?
(A) SRAM (B) DRAM (C) Both (A) & (B) (D) None of these
Ans: C
29. Which of the following computing models is not an example of distributed computing environment ?
(A) Cloud computing (B) Parallel computing (C) Cluster computing (D) Peer-to-peer computing _____________
Ans: B
30. Expand GUI.
(A) Graphical User Instance (B) Graphical User Intermediate (C) Graphical User Interface (D) Graphical Used Instance
Ans: C
31. IC chips are used in which generation of computer ?
(A) Second Generation (B) Third Generation (C) Fourth Generation (D) Both (A) & (B)
Ans: B
32. Microsoft PowerPoint is an example of
(A) Operating System (B) Display Device (C) Application Software (D) System Software
Ans: C
33. Website is a collection of
(A) Webpage (B) HTML Page (C) Both (A) & (B) (D) HTTP Page
Ans: C
34. Bing is a
(A) Website (B) Business software (C) Search engine (D) Social Media
Ans: C
35. Moving from one webpage to another webpage is known as
(A) Attaching (B) Changing (C) Downloading (D) Browsing
Ans: D
36. A Trojan horse is
(A) A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation.
(B) A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred.
(C) A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
(D) All of the above
Ans: A
37. A hierarchical memory system that uses cache memory has cache access time of 50 nano seconds, main memory access time of 300 nano seconds, 75% of memory requests are for read, hit ratio of 0.8 for read access and the write-through scheme is used. What will be the average access time of the system both for read and write requests ?
(A) 157.5 n.sec. (B) 110 n.sec. (C) 75 n.sec. (D) 82.5 n.sec.
Ans: A
38. For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate
(A) Internal interrupts (B) External interrupts (C) Software interrupts (D) None of the above
Ans: C
39. In a dot matrix printer the time to print a character is 6 m.sec., time to space in between characters is 2 m.sec., and the number of characters in a line are 200. The printing speed of the dot matrix printer in characters per second and the time to print a character line are given by which of the following options ?
(A) 125 chars/second and 0.8 seconds (B) 250 chars/second and 0.6 seconds
(C) 166 chars/second and 0.8 seconds (D) 250 chars/second and 0.4 seconds
Ans: A
40. Match the following 8085 instructions with the flags : List – I List – II
a. XCHG i. only carry flag is affected.
b. SUB ii. no flags are affected.
c. STC iii. all flags other than carry flag are affected.
d. DCR iv. all flags are affected.
Codes : a b c d (A) iv i iii ii (B) iii ii i iv (C) ii iii i iv (D) ii iv i iii
Ans: D
41. How many times will the following loop be executed ? LXI B, 0007 H LOP : DCX B MOV A, B ORA C JNZ LOP
(A) 05 (B) 07 (C) 09 (D) 00
Ans: B
42. Specify the contents of the accumulator and the status of the S, Z and CY flags when 8085 microprocessor performs addition of 87 H and 79 H.
(A) 11, 1, 1, 1 (B) 10, 0, 1, 0
(C) 01, 1, 0, 0 (D) 00, 0, 1, 1
Ans: D
43. Location transparency allows :
I. Users to treat the data as if it is done at one location.
II. Programmers to treat the data as if it is at one location.
III. Managers to treat the data as if it is at one location. Which one of the following is correct ?
(A) I, II and III (B) I and II only (C) II and III only (D) II only
Ans: A
44. Which of the following is correct ?
I. Two phase locking is an optimistic protocol.
II. Two phase locking is pessimistic protocol
III. Time stamping is an optimistic protocol.
IV. Time stamping is pessimistic protocol.
(A) I and III (B) II and IV (C) I and IV (D) II and III
Ans: D
45. __________ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information.
(A) Write-ahead log (B) Check-pointing (C) Log buffer (D) Thomas
Ans: B
46. Let R = ABCDE is a relational scheme with functional dependency set F = {A → B, B → C, AC → D}. The attribute closures of A and E are
(A) ABCD, φ (B) ABCD, E (C) Φ, φ (D) ABC, E
Ans: B
47. Consider the following statements :
I. Re-construction operation used in mixed fragmentation satisfies commutative rule.
II. Re-construction operation used in vertical fragmentation satisfies commutative rule
Which of the following is correct ?
(A) I (B) II (C) Both are correct (D) None of the statements are correct.
Ans: D
48. Which of the following is false ?
(A) Every binary relation is never be in BCNF.
(B) Every BCNF relation is in 3NF.
(C) 1 NF, 2 NF, 3 NF and BCNF are based on functional dependencies.
(D) Multivalued Dependency (MVD) is a special case of Join Dependency (JD).
Ans: A
49. Which of the following categories of languages do not refer to animation languages ?
(A) Graphical languages (B) General-purpose languages
(C) Linear-list notations (D) None of the above
Ans: D
50. Match the following : List – I List – II
a. Tablet, Joystick i. Continuous devices
b. Light Pen, Touch Screen ii. Direct devices
c. Locator, Keyboard iii. Logical devices
d. Data Globe, Sonic Pen iv. 3D interaction devices
Codes : a b c d
(A) ii i iv iii
(B) i iv iii ii
(C) i ii iii iv
(D) iv iii ii i
Ans: C
51. A technique used to approximate halftones without reducing spatial resolution is known as _________.
(A) Halftoning (B) Dithering (C) Error diffusion (D) None of the above
Ans: B
52. Match the following :
a. Cavalier Projection i. The direction of projection is chosen so that there is no foreshortening of lines perpendicular to the xy plane.
b. Cabinet Projection ii. The direction of projection is chosen so that lines perpendicular to the xy planes are foreshortened by half their lengths.
c. Isometric Projection iii. The direction of projection makes equal angles with all of the principal axis.
d. Orthographic Projection iv. Projections are characterized by the fact that the direction of projection is perpendicular to the view plane. Codes : a b c d
(A) i iii iv ii
(B) ii iii i iv
(C) iv ii iii i
(D) i ii iii iv
Ans: D
53. Consider the following statements S1, S2 and S3 :
S1 : In call-by-value, anything that is passed into a function call is unchanged in the caller’s scope when the function returns.
S2 : In call-by-reference, a function receives implicit reference to a variable used as argument.
S3 : In call-by-reference, caller is unable to see the modified variable used as argument.
(A) S3 and S2 are true.
(B) S3 and S1 are true.
(C) S2 and S1 are true.
(D) S1, S2, S3 are true.
Ans: C
54. How many tokens will be generated by the scanner for the following statement ? x = x ∗ (a + b) – 5;
(A) 12 (B) 11 (C) 10 (D) 07
Ans: A
55. Which of the following statements is not true ?
(A) MPI_Isend and MPI_Irecv are non-blocking message passing routines of MPI.
(B) MPI_Issend and MPI_Ibsend are non-blocking message passing routines of MPI.
(C) MPI_Send and MPI_Recv are non-blocking message passing routines of MPI.
(D) MPI_Ssend and MPI_Bsend are blocking message passing routines of MPI.
Ans: C
56. For n devices in a network, ________ number of duplex-mode links are required for a mesh topology.
(A) n(n + 1)
(B) n (n – 1)
(C) n(n + 1)/2
(D) n(n – 1)/2
Ans: D
57. How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous ? (Assuming 1 start bit and 1 stop bit)
(A) 300 (B) 320 (C) 360 (D) 400
Ans: B
58. Which of the following is not a field in TCP header ?
(A) Sequence number (B) Fragment offset (C) Checksum (D) Window size
Ans: B
59. __________ is a bit-oriented protocol for communication over point-to-point and multipoint links.
(A) Stop-and-wait (B) HDLC (C) Sliding window (D) Go-back-N
Ans: B
60. Which one of the following is true for asymmetric-key cryptography ?
(A) Private key is kept by the receiver and public key is announced to the public.
(B) Public key is kept by the receiver and private key is announced to the public.
(C) Both private key and public key are kept by the receiver.
(D) Both private key and public key are announced to the public.
Ans: A
61. We can show that the clique problem is NP-hard by proving that
(A) CLIQUE ≤ P 3-CNF_SAT
(B) CLIQUE ≤ P VERTEX_COVER
(C) CLIQUE ≤ P SUBSET_SUM
(D) None of the above
Ans: D
62. Dijkstra algorithm, which solves the single-source shortest--paths problem, is a _________, and the Floyd-Warshall algorithm, which finds shortest paths between all pairs of vertices, is a _________
(A) Greedy algorithm, Divide-conquer algorithm
(B) Divide-conquer algorithm, Greedy algorithm
(C) Greedy algorithm, Dynamic programming algorithm
(D) Dynamic programming algorithm, Greedy algorithm
Ans: C
63. Suppose that we have numbers between 1 and 1000 in a binary search tree and we want to search for the number 365. Which of the following sequences could not be the sequence of nodes examined ?
(A) 4, 254, 403, 400, 332, 346, 399, 365
(B) 926, 222, 913, 246, 900, 260, 364, 365
(C) 927, 204,913, 242, 914, 247, 365
(D) 4, 401, 389, 221, 268, 384, 383, 280, 365
Ans: C
64. Which methods are utilized to control the access to an object in multi-threaded programming ?
(A) Asynchronized methods (B) Synchronized methods
(C) Serialized methods (D) None of the above
Ans: B
65. Converting a primitive type data into its corresponding wrapper class object instance is called
(A) Boxing (B) Wrapping (C) Instantiation (D) Autoboxing
Ans: D
66. The behaviour of the document elements in XML can be defined by
(A) Using document object (B) Registering appropriate event handlers
(C) Using element object (D) All of the above
Ans: D
67. What is true about UML stereotypes ?
(A) Stereotype is used for extending the UML language.
(B) Stereotyped class must be abstract
(C) The stereotype indicates that the UML element cannot be changed
(D) UML profiles can be stereotyped for backward compatibility
Ans: A
68. Which method is called first by an applet program ?
(A) start( ) (B) run( ) (C) init( ) (D) begin( )
Ans: C
69. Which one of the following is not a source code metric ?
(A) Halstead metric (B) Function point metric (C) Complexity metric (D) Length metric
Ans: B
70. Assume that the software team defines a project risk with 80% probability of occurrence of risk in the following manner : Only 70 percent of the software components scheduled for reuse will be integrated into the application and the remaining functionality will have to be custom developed. If 60 reusable components were planned with average component size as 100 LOC and software engineering cost for each LOC as $ 14, then the risk exposure would be
(A) $ 25,200 (B) $ 20,160 (C) $ 17,640 (D) $ 15,120
Ans: B
71. Maximum possible value of reliability is
(A) 100 (B) 10 (C) 1 (D) 0
Ans: C
72. ‘FAN IN’ of a component A is defined as
(A) Count of the number of components that can call, or pass control, to a component A
(B) Number of components related to component A
(C) Number of components dependent on component A
(D) None of the above
Ans: A
73. Temporal cohesion means
(A) Coincidental cohesion
(B) Cohesion between temporary variables
(C) Cohesion between local variables
(D) Cohesion with respect to time
Ans: D
74. Various storage devices used by an operating system can be arranged as follows in increasing order of accessing speed :
(A) Magnetic tapes → magnetic disks → optical disks → electronic disks → main memory → cache → registers
(B) Magnetic tapes → magnetic disks → electronic disks → optical disks → main memory → cache → registers
(C) Magnetic tapes → electronic disks → magnetic disks → optical disks → main memory → cache → registers
(D) Magnetic tapes → optical disks → magnetic disks → electronic disks → main memory → cache → registers
Ans: D
75. Consider an imaginary disk with 40 cylinders. A request come to read a block on cylinder 11. While the seek to cylinder 11 is in progress, new requests come in for cylinders 1, 36, 16, 34, 9 and 12 in that order. The number of arm motions using shortest seek first algorithm is
(A) 111 (B) 112 (C) 60 (D) 61
Ans: D
76. An operating system has 13 tape drives. There are three processes P1, P2 & P3. Maximum requirement of P1 is 11 tape drives, P2 is 5 tape drives and P3 is 8 tape drives. Currently, P1 is allocated 6 tape drives, P2 is allocated 3 tape drives and P3 is allocated 2 tape drives. Which of the following sequences represent a safe state ?
(A) P2 P1 P3 (B) P2 P3 P1 (C) P1 P2 P3 (D) P1 P3 P2
Ans: A
77. Monitor is an Interprocess Communication (IPC) technique which can be described as
(A) It is higher level synchronization primitive and is a collection of procedures, variables, and data structures grouped together in a special package.
(B) It is a non-negative integer which apart from initialization can be acted upon by wait and signal operations.
(C) It uses two primitives, send and receive which are system calls rather than language constructs.
(D) It consists of the IPC primitives implemented as system calls to block the process when they are not allowed to enter critical region to save CPU time.
Ans: A
78. In a distributed computing environment, distributed shared memory is used which is
(A) Logical combination of virtual memories on the nodes.
(B) Logical combination of physical memories on the nodes.
(C) Logical combination of the secondary memories on all the nodes.
(D) All of the above
Ans: B
79. Equivalent logical expression for the Well Formed Formula (WFF), ~(∀x) F[x] is
(A) ∀x (~F[x])
(B) ~(∃x) F[x]
(C) ∃x (~F[x])
(D) ∀x F[x]
Ans: C
80. An A* algorithm is a heuristic search technique which
(A) is like a depth-first search where most promising child is selected for expansion
(B) generates all successor nodes and computes an estimate of distance (cost) from start node to a goal node through each of the successors. It then chooses the successor with shortest cost.
(C) saves all path lengths (costs) from start node to all generated nodes and chooses shortest path for further expansion.
(D) none of the above
Ans: B
81. The resolvent of the set of clauses (A ∨ B, ~A ∨ D, C ∨ ~B) is
(A) A ∨ B
(B) C ∨ D
(C) A ∨ C
(D) A ∨ D
Ans: B
82. Match the following :
a. Script i. Directed graph with labelled nodes for graphical representation of knowledge
b. Conceptual Dependencies ii. Knowledge about objects and events is stored in record-like structures consisting of slots and slot values.
c. Frames iii. Primitive concepts and rules to represent natural language statements
d. Associative Network iv. Frame like structures used to represent stereotypical patterns for commonly occurring events in terms of actors, roles, props and scenes
Codes : a b c d (A) iv ii i iii (B) iv iii ii i (C) ii iii iv i (D) i iii iv ii
Ans: B
83. Match the following components of an expert system :
a. I/O interface i. Accepts user’s queries and responds to question through I/O interface
b. Explanation module ii. Contains facts and rules about the domain
c. Inference engine iii. Gives the user, the ability to follow inferencing steps at any time during consultation
d. Knowledge base iv. Permits the user to communicate with the system in a natural way
Codes : a b c d
(A) i iii iv ii
(B) iv iii i ii
(C) i iii ii iv
(D) iv i iii ii
Ans: B
84. A computer based information system is needed :
I. as it is difficult for administrative staff to process data.
II. due to rapid growth of information and communication technology.
III. due to growing size of organizations which need to process large volume of data.
IV. as timely and accurate decisions are to be taken.
Which of the above statement(s) is/are true ?
(A) I and II
(B) III and IV
(C) II and III
(D) II and IV
Ans: B
85. Match the following :
List – I List – II
a. Context free grammar i. Linear bounded automaton
b. Regular grammar ii. Pushdown automaton
c. Context sensitive grammar iii. Turing machine
d. Unrestricted grammar iv. Deterministic finite automaton
Codes : a b c d (A) ii iv iii i (B) ii iv i iii (C) iv i ii iii (D) i iv iii ii
Ans: B
86. According to pumping lemma for context free languages : Let L be an infinite context free language, then there exists some positive integer m such that any w ∈ L with | w | ≥ m can be decomposed as w = u v x y z
(A) with | vxy | ≤ m such that uvi xyi z ∈ L for all i = 0, 1, 2
(B) with | vxy | ≤ m, and | vy | ≥ 1, such that uvi xyi z ∈ L for all i = 0, 1, 2, …….
(C) with | vxy | ≥ m, and | vy | ≤ 1, such that uvi xyi z ∈ L for all i = 0, 1, 2, …….
(D) with | vxy | ≥ m, and | vy | ≥ 1, such that uvi xyi z ∈ L for all i = 0, 1, 2, …….
Ans: B
87. If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is
(A) Optimum (B) Infeasible (C) Unbounded (D) Degenerate
Ans: B
88. The occurrence of degeneracy while solving a transportation problem means that
(A) total supply equals total demand (B) total supply does not equal total demand
(C) the solution so obtained is not feasible (D) none of these
Ans: C
89. Consider the following statements about a perception : I. Feature detector can be any function of the input parameters. II. Learning procedure only adjusts the connection weights to the output layer. Identify the correct statement out of the following : (A) I is false and II is false. (B) I is true and II is false. (C) I is false and II is true. (D) I is true and II is true.
Ans: D
90. Match the following learning modes w.r.t. characteristics of available information for learning :
a. Supervised i. Instructive information on desired responses, explicitly specified by a teacher.
b. Recording ii. A priori design information for memory storing
c. Reinforcement iii. Partial information about desired responses, or only “right” or “wrong” evaluative information
d. Unsupervised iv. No information about desired responses
Codes : a b c d (A) i ii iii iv (B) i iii ii iv (C) ii iv iii i (D) ii iii iv i
Ans: A
91. Which of the following versions of Windows O.S. contain built-in partition manager which allows us to shrink and expand pre-defined drives ?
(A) Windows Vista (B) Windows 2000 (C) Windows NT (D) Windows 98
Ans: A
(A) Halftoning (B) Dithering (C) Error diffusion (D) None of the above
Ans: B
52. Match the following :
a. Cavalier Projection i. The direction of projection is chosen so that there is no foreshortening of lines perpendicular to the xy plane.
b. Cabinet Projection ii. The direction of projection is chosen so that lines perpendicular to the xy planes are foreshortened by half their lengths.
c. Isometric Projection iii. The direction of projection makes equal angles with all of the principal axis.
d. Orthographic Projection iv. Projections are characterized by the fact that the direction of projection is perpendicular to the view plane. Codes : a b c d
(A) i iii iv ii
(B) ii iii i iv
(C) iv ii iii i
(D) i ii iii iv
Ans: D
53. Consider the following statements S1, S2 and S3 :
S1 : In call-by-value, anything that is passed into a function call is unchanged in the caller’s scope when the function returns.
S2 : In call-by-reference, a function receives implicit reference to a variable used as argument.
S3 : In call-by-reference, caller is unable to see the modified variable used as argument.
(A) S3 and S2 are true.
(B) S3 and S1 are true.
(C) S2 and S1 are true.
(D) S1, S2, S3 are true.
Ans: C
54. How many tokens will be generated by the scanner for the following statement ? x = x ∗ (a + b) – 5;
(A) 12 (B) 11 (C) 10 (D) 07
Ans: A
55. Which of the following statements is not true ?
(A) MPI_Isend and MPI_Irecv are non-blocking message passing routines of MPI.
(B) MPI_Issend and MPI_Ibsend are non-blocking message passing routines of MPI.
(C) MPI_Send and MPI_Recv are non-blocking message passing routines of MPI.
(D) MPI_Ssend and MPI_Bsend are blocking message passing routines of MPI.
Ans: C
56. For n devices in a network, ________ number of duplex-mode links are required for a mesh topology.
(A) n(n + 1)
(B) n (n – 1)
(C) n(n + 1)/2
(D) n(n – 1)/2
Ans: D
57. How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous ? (Assuming 1 start bit and 1 stop bit)
(A) 300 (B) 320 (C) 360 (D) 400
Ans: B
58. Which of the following is not a field in TCP header ?
(A) Sequence number (B) Fragment offset (C) Checksum (D) Window size
Ans: B
59. __________ is a bit-oriented protocol for communication over point-to-point and multipoint links.
(A) Stop-and-wait (B) HDLC (C) Sliding window (D) Go-back-N
Ans: B
60. Which one of the following is true for asymmetric-key cryptography ?
(A) Private key is kept by the receiver and public key is announced to the public.
(B) Public key is kept by the receiver and private key is announced to the public.
(C) Both private key and public key are kept by the receiver.
(D) Both private key and public key are announced to the public.
Ans: A
61. We can show that the clique problem is NP-hard by proving that
(A) CLIQUE ≤ P 3-CNF_SAT
(B) CLIQUE ≤ P VERTEX_COVER
(C) CLIQUE ≤ P SUBSET_SUM
(D) None of the above
Ans: D
62. Dijkstra algorithm, which solves the single-source shortest--paths problem, is a _________, and the Floyd-Warshall algorithm, which finds shortest paths between all pairs of vertices, is a _________
(A) Greedy algorithm, Divide-conquer algorithm
(B) Divide-conquer algorithm, Greedy algorithm
(C) Greedy algorithm, Dynamic programming algorithm
(D) Dynamic programming algorithm, Greedy algorithm
Ans: C
63. Suppose that we have numbers between 1 and 1000 in a binary search tree and we want to search for the number 365. Which of the following sequences could not be the sequence of nodes examined ?
(A) 4, 254, 403, 400, 332, 346, 399, 365
(B) 926, 222, 913, 246, 900, 260, 364, 365
(C) 927, 204,913, 242, 914, 247, 365
(D) 4, 401, 389, 221, 268, 384, 383, 280, 365
Ans: C
64. Which methods are utilized to control the access to an object in multi-threaded programming ?
(A) Asynchronized methods (B) Synchronized methods
(C) Serialized methods (D) None of the above
Ans: B
65. Converting a primitive type data into its corresponding wrapper class object instance is called
(A) Boxing (B) Wrapping (C) Instantiation (D) Autoboxing
Ans: D
66. The behaviour of the document elements in XML can be defined by
(A) Using document object (B) Registering appropriate event handlers
(C) Using element object (D) All of the above
Ans: D
67. What is true about UML stereotypes ?
(A) Stereotype is used for extending the UML language.
(B) Stereotyped class must be abstract
(C) The stereotype indicates that the UML element cannot be changed
(D) UML profiles can be stereotyped for backward compatibility
Ans: A
68. Which method is called first by an applet program ?
(A) start( ) (B) run( ) (C) init( ) (D) begin( )
Ans: C
69. Which one of the following is not a source code metric ?
(A) Halstead metric (B) Function point metric (C) Complexity metric (D) Length metric
Ans: B
70. Assume that the software team defines a project risk with 80% probability of occurrence of risk in the following manner : Only 70 percent of the software components scheduled for reuse will be integrated into the application and the remaining functionality will have to be custom developed. If 60 reusable components were planned with average component size as 100 LOC and software engineering cost for each LOC as $ 14, then the risk exposure would be
(A) $ 25,200 (B) $ 20,160 (C) $ 17,640 (D) $ 15,120
Ans: B
71. Maximum possible value of reliability is
(A) 100 (B) 10 (C) 1 (D) 0
Ans: C
72. ‘FAN IN’ of a component A is defined as
(A) Count of the number of components that can call, or pass control, to a component A
(B) Number of components related to component A
(C) Number of components dependent on component A
(D) None of the above
Ans: A
73. Temporal cohesion means
(A) Coincidental cohesion
(B) Cohesion between temporary variables
(C) Cohesion between local variables
(D) Cohesion with respect to time
Ans: D
74. Various storage devices used by an operating system can be arranged as follows in increasing order of accessing speed :
(A) Magnetic tapes → magnetic disks → optical disks → electronic disks → main memory → cache → registers
(B) Magnetic tapes → magnetic disks → electronic disks → optical disks → main memory → cache → registers
(C) Magnetic tapes → electronic disks → magnetic disks → optical disks → main memory → cache → registers
(D) Magnetic tapes → optical disks → magnetic disks → electronic disks → main memory → cache → registers
Ans: D
75. Consider an imaginary disk with 40 cylinders. A request come to read a block on cylinder 11. While the seek to cylinder 11 is in progress, new requests come in for cylinders 1, 36, 16, 34, 9 and 12 in that order. The number of arm motions using shortest seek first algorithm is
(A) 111 (B) 112 (C) 60 (D) 61
Ans: D
76. An operating system has 13 tape drives. There are three processes P1, P2 & P3. Maximum requirement of P1 is 11 tape drives, P2 is 5 tape drives and P3 is 8 tape drives. Currently, P1 is allocated 6 tape drives, P2 is allocated 3 tape drives and P3 is allocated 2 tape drives. Which of the following sequences represent a safe state ?
(A) P2 P1 P3 (B) P2 P3 P1 (C) P1 P2 P3 (D) P1 P3 P2
Ans: A
77. Monitor is an Interprocess Communication (IPC) technique which can be described as
(A) It is higher level synchronization primitive and is a collection of procedures, variables, and data structures grouped together in a special package.
(B) It is a non-negative integer which apart from initialization can be acted upon by wait and signal operations.
(C) It uses two primitives, send and receive which are system calls rather than language constructs.
(D) It consists of the IPC primitives implemented as system calls to block the process when they are not allowed to enter critical region to save CPU time.
Ans: A
78. In a distributed computing environment, distributed shared memory is used which is
(A) Logical combination of virtual memories on the nodes.
(B) Logical combination of physical memories on the nodes.
(C) Logical combination of the secondary memories on all the nodes.
(D) All of the above
Ans: B
79. Equivalent logical expression for the Well Formed Formula (WFF), ~(∀x) F[x] is
(A) ∀x (~F[x])
(B) ~(∃x) F[x]
(C) ∃x (~F[x])
(D) ∀x F[x]
Ans: C
80. An A* algorithm is a heuristic search technique which
(A) is like a depth-first search where most promising child is selected for expansion
(B) generates all successor nodes and computes an estimate of distance (cost) from start node to a goal node through each of the successors. It then chooses the successor with shortest cost.
(C) saves all path lengths (costs) from start node to all generated nodes and chooses shortest path for further expansion.
(D) none of the above
Ans: B
81. The resolvent of the set of clauses (A ∨ B, ~A ∨ D, C ∨ ~B) is
(A) A ∨ B
(B) C ∨ D
(C) A ∨ C
(D) A ∨ D
Ans: B
82. Match the following :
a. Script i. Directed graph with labelled nodes for graphical representation of knowledge
b. Conceptual Dependencies ii. Knowledge about objects and events is stored in record-like structures consisting of slots and slot values.
c. Frames iii. Primitive concepts and rules to represent natural language statements
d. Associative Network iv. Frame like structures used to represent stereotypical patterns for commonly occurring events in terms of actors, roles, props and scenes
Codes : a b c d (A) iv ii i iii (B) iv iii ii i (C) ii iii iv i (D) i iii iv ii
Ans: B
83. Match the following components of an expert system :
a. I/O interface i. Accepts user’s queries and responds to question through I/O interface
b. Explanation module ii. Contains facts and rules about the domain
c. Inference engine iii. Gives the user, the ability to follow inferencing steps at any time during consultation
d. Knowledge base iv. Permits the user to communicate with the system in a natural way
Codes : a b c d
(A) i iii iv ii
(B) iv iii i ii
(C) i iii ii iv
(D) iv i iii ii
Ans: B
84. A computer based information system is needed :
I. as it is difficult for administrative staff to process data.
II. due to rapid growth of information and communication technology.
III. due to growing size of organizations which need to process large volume of data.
IV. as timely and accurate decisions are to be taken.
Which of the above statement(s) is/are true ?
(A) I and II
(B) III and IV
(C) II and III
(D) II and IV
Ans: B
85. Match the following :
List – I List – II
a. Context free grammar i. Linear bounded automaton
b. Regular grammar ii. Pushdown automaton
c. Context sensitive grammar iii. Turing machine
d. Unrestricted grammar iv. Deterministic finite automaton
Codes : a b c d (A) ii iv iii i (B) ii iv i iii (C) iv i ii iii (D) i iv iii ii
Ans: B
86. According to pumping lemma for context free languages : Let L be an infinite context free language, then there exists some positive integer m such that any w ∈ L with | w | ≥ m can be decomposed as w = u v x y z
(A) with | vxy | ≤ m such that uvi xyi z ∈ L for all i = 0, 1, 2
(B) with | vxy | ≤ m, and | vy | ≥ 1, such that uvi xyi z ∈ L for all i = 0, 1, 2, …….
(C) with | vxy | ≥ m, and | vy | ≤ 1, such that uvi xyi z ∈ L for all i = 0, 1, 2, …….
(D) with | vxy | ≥ m, and | vy | ≥ 1, such that uvi xyi z ∈ L for all i = 0, 1, 2, …….
Ans: B
87. If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is
(A) Optimum (B) Infeasible (C) Unbounded (D) Degenerate
Ans: B
88. The occurrence of degeneracy while solving a transportation problem means that
(A) total supply equals total demand (B) total supply does not equal total demand
(C) the solution so obtained is not feasible (D) none of these
Ans: C
89. Consider the following statements about a perception : I. Feature detector can be any function of the input parameters. II. Learning procedure only adjusts the connection weights to the output layer. Identify the correct statement out of the following : (A) I is false and II is false. (B) I is true and II is false. (C) I is false and II is true. (D) I is true and II is true.
Ans: D
90. Match the following learning modes w.r.t. characteristics of available information for learning :
a. Supervised i. Instructive information on desired responses, explicitly specified by a teacher.
b. Recording ii. A priori design information for memory storing
c. Reinforcement iii. Partial information about desired responses, or only “right” or “wrong” evaluative information
d. Unsupervised iv. No information about desired responses
Codes : a b c d (A) i ii iii iv (B) i iii ii iv (C) ii iv iii i (D) ii iii iv i
Ans: A
91. Which of the following versions of Windows O.S. contain built-in partition manager which allows us to shrink and expand pre-defined drives ?
(A) Windows Vista (B) Windows 2000 (C) Windows NT (D) Windows 98
Ans: A
Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15