COMPUTER SCIENCE AND APPLICATIONS- PAGE 3
1. Which one of the following prolog programs correctly implement “if G succeeds then execute goal P else execute goal θ ?”
(A) if-else (G, P, θ) :- !, call(G), call(P). if-else (G, P, θ) :- call(θ).
(B) if-else (G, P, θ) :- call(G), !, call(P). if-else (G, P, θ) :- call(θ).
(C) if-else (G, P, θ) :- call(G), call(P), !. if-else (G, P, θ) :- call(θ).
(D) All of the above
Ans: B
2. The _______ memory allocation function modifies the previous allocated space.
(A) calloc( ) (B) free( ) (C) malloc( ) (D) realloc( )
Ans: D
3. Which is not the correct statement(s) ?
(i) Every context sensitive language is recursive.
(ii) There is a recursive language that is not context sensitive.
(A) (i) is true, (ii) is false. (B) (i) is true and (ii) is true.
(C) (i) is false, (ii) is false. (D) (i) is false and (ii) is true.
Ans: B
4. The mechanism that binds code and data together and keeps them secure from outside world is known as
(A) Abstraction (B) Inheritance (C) Encapsulation (D) Polymorphism
Ans: C
5. Identify the addressing modes of below instructions and match them :
(a) ADI (1) Immediate addressing
(b) STA (2) Direct addressing
(c) CMA (3) Implied addressing
(d) SUB (4) Register addressing
(A) a – 1, b – 2, c – 3, d – 4
(B) a – 2, b – 1, c – 4, d – 3 (a)
(C) a – 3, b – 2, c – 1, d – 4 (d)
(D) a – 4, b – 3, c – 2, d – 1
Ans: A
6. Which one of the following is not a Greibach Normal form grammar ?
(i) S → a | bA | aA | bB A → a B → b
(ii) S → a | aA | AB A → a B → b
(iii) S → a | A | aA A → a
(A) (i) and (ii)
(B) (i) and (iii)
(C) (ii) and (iii)
(D) (i), (ii) and (iii)
Ans: C
7. Which of the following IP address class is a multicast address ?
(A) Class A (B) Class B (C) Class C (D) Class D
Ans: D
8. While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module is
(A) atleast greater than 0.9 (B) equal to 0.9
(C) atmost 0.81 (D) atleast 1/0.81
Ans: C
9. The equivalent grammar corresponding to the grammar G : S → aA, A → BB, B → aBb | ∈ is
(A) S → aA, A → BB, B → aBb
(B) S → a|aA, A → BB, B → aBb | ab
(C) S → a | aA, A → BB | B, B → aBb
(D) S → a | aA, A → BB | B, B → aBb | ab
Ans: D
10. Which one of the following statements is incorrect ?
(A) The number of regions corresponds to the cyclomatic complexity.
(B) Cyclometric complexity for a flow graph G is V(G) = N – E + 2, where E is the number of edges and N is the number of nodes in the flow graph.
(C) Cyclometric complexity for a flow graph G is V(G) = E – N + 2, where E is the number of edges & N is the number of nodes in the flow graph.
(D) Cyclometric complexity for a flow graph G is V(G) = P + 1, where P is the number of predicate nodes contained in the flow graph G.
Ans: B
11. Consider a weighted undirected graph with positive edge weights and let (u, v) be an edge in the graph. It is known that the shortest path from source vertex s to u has weight 53 and shortest path from s to v has weight 65. Which statement is always true ?
(A) Weight (u, v) < 12
(B) Weight (u, v) = 12
(C) Weight (u, v) > 12
(D) Weight (u, v) > 12
Ans: C
12. Number of binary trees formed with 5 nodes are
(A) 32 (B) 36 (C) 120 (D) 42
Ans: D
13. Are we building the right product ? This statement refers to
(A) Verification (B) Validation (C) Testing (D) Software quality assurance
Ans: B
14. The following postfix expression is evaluated using a stack 823^/23* + 51* – The top two elements of the stack after first * is evaluated (A) 6, 1 (B) 5, 7 (C) 3, 2 (D) 1, 5
Ans: A
15. The following CFG S → aB | bA, A → a | as | bAA, B → b | bs | aBB generates strings of terminals that have
(A) odd number of a’s and odd number of b’s (B) even number of a’s and even number of b’s
(C) equal number of a’s and b’s (D) not equal number of a’s and b’s
Ans: C
16. Consider the following pseudo-code : If (A > B) and (C > D) then A = A + 1 B = B + 1 Endif The cyclomatic complexity of the pseudo-code is
(A) 2 (B) 3 (C) 4 (D) 5
Ans: B
17. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol) ?
(A) Transport layer (B) Data link layer (C) Network layer (D) Application layer
Ans: C
18. Which diagram provides a formal graphic notation for modelling objects, classes and their relationships to one another ?
(A) Object diagram (B) Class diagram (C) Instance diagram (D) Analysis diagram
Ans: A
19. A computer system supports 32 bit virtual address as well as 32 bit physical addresses. Since the virtual address space is of same size as that of physical address space, if we want to get rid of virtual memory, which one of the following is true ?
(A) Efficient implementation of multiuser support is no longer possible. (B) The processor cache can be made more efficient.
(C) Hardware support for memory management is not needed. (D) CPU scheduling can be made more efficient.
Ans: C
20. The colour of an object is largely determined by its diffuse reflection coefficient. If Kd = (0.8, 0.4, 0), then what shall be the colour of the object, if the light used is blue and magenta ?
(A) White and Red (B) Red and Blue
(C) Black and White (D) Black and Red
Ans: D
21. If an instruction takes ‘i’ microseconds and a page fault takes an additional ‘j’ microseconds. The effective instruction time, if on the average a page fault occurs every k instructions, is
(A) i + j/k
(B) i + j * k
(C) (i + j)/k
(D) (i + j) * k
Ans: A
22. In any simplex table, if corresponding to any negative ∆j, all elements of the column are negative or zero, the solution under the test is (A) degenerate solution (B) unbounded solution
(C) alternative solution (D) non-existing solution
Ans: B
23. The strategy used to reduce the number of tree branches and the number of static evaluations applied in case of a game tree is
(A) Minmax strategy (B) Alpha-beta pruning strategy
(C) Constraint satisfaction strategy (D) Static max strategy
Ans: B
24. Match the following :
(i) Regular Grammar (a) Pushdown automaton
(ii) Context free Grammar (b) Linear bounded automaton
(iii) Unrestricted Grammar (c) Deterministic finite automaton
(iv) Context Sensitive Grammar (d) Turing machine
(i) (ii) (iii) (iv)
(A) (c) (a) (b) (d)
(B) (c) (a) (d) (b)
(C) (c) (b) (a) (d)
(D) (c) (b) (d) (a)
Ans: B
25. What is the size (in terms of bits) of Header length field in IPV4 header ?
(A) 2 (B) 4 (C) 8 (D) 16
Ans: B
26. Match the following with respect to java.util.* class methods :
(a) Bit Set (i) Time zone getTimezone( )
(b) Calendar (ii) int hashcode( )
(c) Time zone (iii) int nextInt( )
(d) Random (iv) Void setID(String tzName)
(a) (b) (c) (d)
(A) (ii) (i) (iv) (iii) (B) (iii) (iv) (i) (ii)
(C) (iv) (iii) (ii) (i) (D) (ii) (i) (iii) (iv)
Ans: A
27. ______ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.
(A) Windows NT (B) Windows XP (C) Windows VISTA (D) Windows 95/98
Ans: A
28. A user level process in Unix traps the signal sent on a Ctrl + C input and has a signal handling routine that saves appropriate files before terminating the process. When a Ctrl + C input is given to this process, what is the mode in which the signal handling routine executes ?
(A) User mode (B) Kernel mode (C) Superuser mode (D) Privileged mode
Ans: B
29. A CPU generally handles an interrupt by executing an interrupt service routine
(A) as soon as an interrupt is raised
(B) by checking the interrupt register at the end of fetch cycle
(C) by checking the interrupt register after finishing the executing the current instruction
(D) by checking the interrupt register at fixed time intervals
Ans: C
30. Radio signals generally propagate according to the following mechanisms:
(A) Modulation, Amplification, Scattering (B) Reflection, Diffraction, Scattering
(C) Amplification, Diffraction, Modulation (D) Reflection, Amplification, Diffraction
Ans: B
31. Identify the devices given below with their IC numbers :
(i) USART (a) 8251
(ii) Micro controller (b) 8051
(iii) Interrupt controller (c) 8259
(iv) DMA controller (d) 8257
(i) (ii) (iii) (iv)
(A) (a) (b) (c) (d)
(B) (b) (a) (d) (c)
(C) (c) (d) (a) (b)
(D) (d) (a) (b) (c)
Ans: B
32. If a and b are the end points of a line, then which one of the following is true ?
(A) If both end points are left, right, above or below the window, the line is invisible.
(B) If both end points are left, right, above or below the window, the line is completely visible.
(C) If both end points are left, right, above or below the window, the line is trivially visible.
(D) If both end points are left, right, above or below the window, the line is trivially invisible.
Ans: D
33. Match the following with link quality measurement and handoff initiation :
(a) NetworkedControlled Handoff (NCHO)
(i) MS connect to BS
(b) MobileAssisted Handoff (MAHO)
(ii) Process via channel the target BS
(c) Forward Handoff
(iii) First Generation Analog Cellular System
(d) Hard Handoff
(iv) Second Generation Digital Cellular System
(a) (b) (c) (d)
(A) (iii) (iv) (ii) (i)
(B) (ii) (iii) (i) (iv)
(C) (ii) (i) (iv) (iii)
(D) (iv) (iii) (i) (ii)
Ans: A
34. Let a * H and b * H be two cosets of H. (i) Either a * H and b * H are disjoint (ii) a * H and b * H are identical
Then,
(A) only (i) is true
(B) only (ii) is true
(C) (i) or (ii) is true
(D) (i) and (ii) is false
Ans: C
35. HTML is defined using SGML – an _______ standard, information processing-text and office systems (SGML) for text information processing.
(A) ISO – 8878
(B) ISO – 8879
(C) ISO – 8880
(D) ISO – 8881
Ans: B
36. What is the meaning of ‘Hibernate’ in Windows XP/Windows 7 ?
(A) Restart the computers in safe mode.
(B) Restart the computers in normal mode.
(C) Shutdown the computer terminating all the running applications.
(D) Shutdown the computer without closing the running applications.
Ans: D
37. Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?
(A) Derived class constructor followed by Base class constructor.
(B) Base class constructor followed by derived class constructor.
(C) Base class constructor will not be called.
(D) Derived class constructor will not be called.
Ans: B
38. Which one of the following options is not a shell in UNIX system ?
(A) Bourne Shell
(B) C Shell
(C) Net Shell
(D) Korn Shell
Ans: C
39. In which file the compiler manage the various objects, which are used in windows programming ?
(A) Control File
(B) Binary File
(C) Text File
(D) Obj File
Ans: C
40. On a disk with 1000 cylinders
(0 to 999) find the number of tracks, the disk arm must move to satisfy all the requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in FIFO order
contains requests for the following tracks :
123, 874, 692, 475, 105, 376
(Assume SCAN algorithm)
(A) 2013
(B) 1219
(C) 1967
(D) 1507
Ans: B
41. Halftoning is defined as
(A) a technique to obtain increased visual resolution using multiple intensity levels.
(B) a technique for using minimum number of intensity levels to obtain increased visual resolution.
(C) a technique to obtain increased visual resolution using maximum number of intensity levels.
(D) a technique for using appropriate number intensity levels to obtain increased visual resolution.
Ans: B
(A) if-else (G, P, θ) :- !, call(G), call(P). if-else (G, P, θ) :- call(θ).
(B) if-else (G, P, θ) :- call(G), !, call(P). if-else (G, P, θ) :- call(θ).
(C) if-else (G, P, θ) :- call(G), call(P), !. if-else (G, P, θ) :- call(θ).
(D) All of the above
Ans: B
2. The _______ memory allocation function modifies the previous allocated space.
(A) calloc( ) (B) free( ) (C) malloc( ) (D) realloc( )
Ans: D
3. Which is not the correct statement(s) ?
(i) Every context sensitive language is recursive.
(ii) There is a recursive language that is not context sensitive.
(A) (i) is true, (ii) is false. (B) (i) is true and (ii) is true.
(C) (i) is false, (ii) is false. (D) (i) is false and (ii) is true.
Ans: B
4. The mechanism that binds code and data together and keeps them secure from outside world is known as
(A) Abstraction (B) Inheritance (C) Encapsulation (D) Polymorphism
Ans: C
5. Identify the addressing modes of below instructions and match them :
(a) ADI (1) Immediate addressing
(b) STA (2) Direct addressing
(c) CMA (3) Implied addressing
(d) SUB (4) Register addressing
(A) a – 1, b – 2, c – 3, d – 4
(B) a – 2, b – 1, c – 4, d – 3 (a)
(C) a – 3, b – 2, c – 1, d – 4 (d)
(D) a – 4, b – 3, c – 2, d – 1
Ans: A
6. Which one of the following is not a Greibach Normal form grammar ?
(i) S → a | bA | aA | bB A → a B → b
(ii) S → a | aA | AB A → a B → b
(iii) S → a | A | aA A → a
(A) (i) and (ii)
(B) (i) and (iii)
(C) (ii) and (iii)
(D) (i), (ii) and (iii)
Ans: C
7. Which of the following IP address class is a multicast address ?
(A) Class A (B) Class B (C) Class C (D) Class D
Ans: D
8. While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module is
(A) atleast greater than 0.9 (B) equal to 0.9
(C) atmost 0.81 (D) atleast 1/0.81
Ans: C
9. The equivalent grammar corresponding to the grammar G : S → aA, A → BB, B → aBb | ∈ is
(A) S → aA, A → BB, B → aBb
(B) S → a|aA, A → BB, B → aBb | ab
(C) S → a | aA, A → BB | B, B → aBb
(D) S → a | aA, A → BB | B, B → aBb | ab
Ans: D
10. Which one of the following statements is incorrect ?
(A) The number of regions corresponds to the cyclomatic complexity.
(B) Cyclometric complexity for a flow graph G is V(G) = N – E + 2, where E is the number of edges and N is the number of nodes in the flow graph.
(C) Cyclometric complexity for a flow graph G is V(G) = E – N + 2, where E is the number of edges & N is the number of nodes in the flow graph.
(D) Cyclometric complexity for a flow graph G is V(G) = P + 1, where P is the number of predicate nodes contained in the flow graph G.
Ans: B
11. Consider a weighted undirected graph with positive edge weights and let (u, v) be an edge in the graph. It is known that the shortest path from source vertex s to u has weight 53 and shortest path from s to v has weight 65. Which statement is always true ?
(A) Weight (u, v) < 12
(B) Weight (u, v) = 12
(C) Weight (u, v) > 12
(D) Weight (u, v) > 12
Ans: C
12. Number of binary trees formed with 5 nodes are
(A) 32 (B) 36 (C) 120 (D) 42
Ans: D
13. Are we building the right product ? This statement refers to
(A) Verification (B) Validation (C) Testing (D) Software quality assurance
Ans: B
14. The following postfix expression is evaluated using a stack 823^/23* + 51* – The top two elements of the stack after first * is evaluated (A) 6, 1 (B) 5, 7 (C) 3, 2 (D) 1, 5
Ans: A
15. The following CFG S → aB | bA, A → a | as | bAA, B → b | bs | aBB generates strings of terminals that have
(A) odd number of a’s and odd number of b’s (B) even number of a’s and even number of b’s
(C) equal number of a’s and b’s (D) not equal number of a’s and b’s
Ans: C
16. Consider the following pseudo-code : If (A > B) and (C > D) then A = A + 1 B = B + 1 Endif The cyclomatic complexity of the pseudo-code is
(A) 2 (B) 3 (C) 4 (D) 5
Ans: B
17. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol) ?
(A) Transport layer (B) Data link layer (C) Network layer (D) Application layer
Ans: C
18. Which diagram provides a formal graphic notation for modelling objects, classes and their relationships to one another ?
(A) Object diagram (B) Class diagram (C) Instance diagram (D) Analysis diagram
Ans: A
19. A computer system supports 32 bit virtual address as well as 32 bit physical addresses. Since the virtual address space is of same size as that of physical address space, if we want to get rid of virtual memory, which one of the following is true ?
(A) Efficient implementation of multiuser support is no longer possible. (B) The processor cache can be made more efficient.
(C) Hardware support for memory management is not needed. (D) CPU scheduling can be made more efficient.
Ans: C
20. The colour of an object is largely determined by its diffuse reflection coefficient. If Kd = (0.8, 0.4, 0), then what shall be the colour of the object, if the light used is blue and magenta ?
(A) White and Red (B) Red and Blue
(C) Black and White (D) Black and Red
Ans: D
21. If an instruction takes ‘i’ microseconds and a page fault takes an additional ‘j’ microseconds. The effective instruction time, if on the average a page fault occurs every k instructions, is
(A) i + j/k
(B) i + j * k
(C) (i + j)/k
(D) (i + j) * k
Ans: A
22. In any simplex table, if corresponding to any negative ∆j, all elements of the column are negative or zero, the solution under the test is (A) degenerate solution (B) unbounded solution
(C) alternative solution (D) non-existing solution
Ans: B
23. The strategy used to reduce the number of tree branches and the number of static evaluations applied in case of a game tree is
(A) Minmax strategy (B) Alpha-beta pruning strategy
(C) Constraint satisfaction strategy (D) Static max strategy
Ans: B
24. Match the following :
(i) Regular Grammar (a) Pushdown automaton
(ii) Context free Grammar (b) Linear bounded automaton
(iii) Unrestricted Grammar (c) Deterministic finite automaton
(iv) Context Sensitive Grammar (d) Turing machine
(i) (ii) (iii) (iv)
(A) (c) (a) (b) (d)
(B) (c) (a) (d) (b)
(C) (c) (b) (a) (d)
(D) (c) (b) (d) (a)
Ans: B
25. What is the size (in terms of bits) of Header length field in IPV4 header ?
(A) 2 (B) 4 (C) 8 (D) 16
Ans: B
26. Match the following with respect to java.util.* class methods :
(a) Bit Set (i) Time zone getTimezone( )
(b) Calendar (ii) int hashcode( )
(c) Time zone (iii) int nextInt( )
(d) Random (iv) Void setID(String tzName)
(a) (b) (c) (d)
(A) (ii) (i) (iv) (iii) (B) (iii) (iv) (i) (ii)
(C) (iv) (iii) (ii) (i) (D) (ii) (i) (iii) (iv)
Ans: A
27. ______ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.
(A) Windows NT (B) Windows XP (C) Windows VISTA (D) Windows 95/98
Ans: A
28. A user level process in Unix traps the signal sent on a Ctrl + C input and has a signal handling routine that saves appropriate files before terminating the process. When a Ctrl + C input is given to this process, what is the mode in which the signal handling routine executes ?
(A) User mode (B) Kernel mode (C) Superuser mode (D) Privileged mode
Ans: B
29. A CPU generally handles an interrupt by executing an interrupt service routine
(A) as soon as an interrupt is raised
(B) by checking the interrupt register at the end of fetch cycle
(C) by checking the interrupt register after finishing the executing the current instruction
(D) by checking the interrupt register at fixed time intervals
Ans: C
30. Radio signals generally propagate according to the following mechanisms:
(A) Modulation, Amplification, Scattering (B) Reflection, Diffraction, Scattering
(C) Amplification, Diffraction, Modulation (D) Reflection, Amplification, Diffraction
Ans: B
31. Identify the devices given below with their IC numbers :
(i) USART (a) 8251
(ii) Micro controller (b) 8051
(iii) Interrupt controller (c) 8259
(iv) DMA controller (d) 8257
(i) (ii) (iii) (iv)
(A) (a) (b) (c) (d)
(B) (b) (a) (d) (c)
(C) (c) (d) (a) (b)
(D) (d) (a) (b) (c)
Ans: B
32. If a and b are the end points of a line, then which one of the following is true ?
(A) If both end points are left, right, above or below the window, the line is invisible.
(B) If both end points are left, right, above or below the window, the line is completely visible.
(C) If both end points are left, right, above or below the window, the line is trivially visible.
(D) If both end points are left, right, above or below the window, the line is trivially invisible.
Ans: D
33. Match the following with link quality measurement and handoff initiation :
(a) NetworkedControlled Handoff (NCHO)
(i) MS connect to BS
(b) MobileAssisted Handoff (MAHO)
(ii) Process via channel the target BS
(c) Forward Handoff
(iii) First Generation Analog Cellular System
(d) Hard Handoff
(iv) Second Generation Digital Cellular System
(a) (b) (c) (d)
(A) (iii) (iv) (ii) (i)
(B) (ii) (iii) (i) (iv)
(C) (ii) (i) (iv) (iii)
(D) (iv) (iii) (i) (ii)
Ans: A
34. Let a * H and b * H be two cosets of H. (i) Either a * H and b * H are disjoint (ii) a * H and b * H are identical
Then,
(A) only (i) is true
(B) only (ii) is true
(C) (i) or (ii) is true
(D) (i) and (ii) is false
Ans: C
35. HTML is defined using SGML – an _______ standard, information processing-text and office systems (SGML) for text information processing.
(A) ISO – 8878
(B) ISO – 8879
(C) ISO – 8880
(D) ISO – 8881
Ans: B
36. What is the meaning of ‘Hibernate’ in Windows XP/Windows 7 ?
(A) Restart the computers in safe mode.
(B) Restart the computers in normal mode.
(C) Shutdown the computer terminating all the running applications.
(D) Shutdown the computer without closing the running applications.
Ans: D
37. Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?
(A) Derived class constructor followed by Base class constructor.
(B) Base class constructor followed by derived class constructor.
(C) Base class constructor will not be called.
(D) Derived class constructor will not be called.
Ans: B
38. Which one of the following options is not a shell in UNIX system ?
(A) Bourne Shell
(B) C Shell
(C) Net Shell
(D) Korn Shell
Ans: C
39. In which file the compiler manage the various objects, which are used in windows programming ?
(A) Control File
(B) Binary File
(C) Text File
(D) Obj File
Ans: C
40. On a disk with 1000 cylinders
(0 to 999) find the number of tracks, the disk arm must move to satisfy all the requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in FIFO order
contains requests for the following tracks :
123, 874, 692, 475, 105, 376
(Assume SCAN algorithm)
(A) 2013
(B) 1219
(C) 1967
(D) 1507
Ans: B
41. Halftoning is defined as
(A) a technique to obtain increased visual resolution using multiple intensity levels.
(B) a technique for using minimum number of intensity levels to obtain increased visual resolution.
(C) a technique to obtain increased visual resolution using maximum number of intensity levels.
(D) a technique for using appropriate number intensity levels to obtain increased visual resolution.
Ans: B
42. Computers can have instruction formats with
(A) only two address and three address instructions
(B) only one address and two address instructions
(C) only one address, two address and three address instructions
(D) zero address, one address, two address and three address instructions
Ans: D
43. Which is not a typical program control instruction ?
(A) BR (B) JMP (C) SHL (D) TST
Ans: C
44. Interrupt which arises from illegal or erroneous use of an instruction or data is
(A) Software interrupt (B) Internal interrupt
(C) External interrupt (D) All of the above
Ans: B
45. The simplified function in product of sums of Boolean function F(W, X, Y, Z) = Σ(0, 1, 2, 5, 8, 9, 10) is
(A) (W' + X') (Y' + Z') (X' + Z)
(B) (W' + X') (Y' + Z') (X' + Z')
(C) (W' + X') (Y' + Z) (X' + Z)
(D) (W' + X') (Y + Z') (X' + Z)
Ans: A
46. Match the following :
a. TTL i. High component density
b. ECL ii. Low power consumption
c. MOS iii. Evolution of “diode- transistor-logic”
d. CMOS iv. High speed digital circuits
Codes : a b c d
(A) iii ii i iv
(B) i iv iii ii
(C) iii iv i ii
(D) i ii iii iv
Ans: C
47. Match the following :
a. Foreign keys i. Domain constraint
b. Private key ii. Referential integrity
c. Event control action model iii. Encryption
d. Data security iv. Trigger
Codes : a b c d
(A) iii ii i iv
(B) ii i iv iii
(C) iii iv i ii
(D) i ii iii iv
Ans: B
48. When an array is passed as a parameter to a function which of the following statements is correct ?
(A) The function can change values in the original array. (B) The function cannot change values in the original array.
(C) Results in compilation error. (D) Results in runtime error.
Ans: A
49. Suppose you want to delete the name that occurs before “Vivek” in an alphabetical listing. Which of the following data structures shall be most efficient for this operation ?
(A) Circular linked list
(B) Doubly linked list
(C) Linked list
(D) Dequeue
Ans: B
50. Match the following :
a. WatsonFelix model i. Failure intensity
b. Quick-Fix model ii. Cost estimation
c. Putnam resource allocation model iii. Project planning
d. LogarithmeticPoisson Model iv. Maintenance
Codes : a b c d
(A) ii i iv iii
(B) i ii iv iii
(C) ii i iii iv
(D) ii iv iii i
Ans: D
51. Trace the error :
void main( )
{
int *b, &a;
*b = 20
printf(“%d, %d”, a, *b)
}
(A) No error
(B) Logical error
(C) Syntax error
(D) Semantic error
Ans: C
52. Match the following :
a. calloc( ) i. Frees previously allocated space
b. free( ) ii. Modifies previously allocated space
c. malloc( ) iii. Allocates space for array
d. realloc( ) iv. Allocates requested size of space
Codes : a b c d
(A) iii i iv ii
(B) iii ii i iv
(C) iii iv i ii
(D) iv ii iii I
Ans: A
53. Binary symmetric channel uses
(A) Half duplex protocol (B) Full duplex protocol (C) Bit oriented protocol (D) None of the above
Ans: A
54. Hamming distance between 100101000110 and 110111101101 is
(A) 3 (B) 4 (C) 5 (D) 6
Ans: D
55. Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is (
A) 11100010101 (B) 11100010100
(C) 1110001010 (D) 111000101
Ans: A
56. __________ is a process model that removes defects before they can precipitate serious hazards.
(A) Incremental model (B) Spiral model (C) Cleanroom software engineering (D) Agile model
Ans: C
57. If f(x, y) is a digital image, then x, y and amplitude values of f are (
A) Finite (B) Infinite (C) Neither finite nor infinite (D) None of the above
Ans: A
58. Consider the following processes with time slice of 4 milliseconds (I/O requests are ignored) : Process A B C D Arrival time 0 1 2 3 CPU cycle 8 4 9 5 The average turn around time of these processes will be
(A) 19.25 milliseconds (B) 18.25 milliseconds (C) 19.5 milliseconds (D) 18.5 milliseconds
Ans: B
59. A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order : ABACABDBACD Assuming that a page interrupt occurs when a new page is brought in the main memory, irrespective of whether the page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
(A) 9 and 7 (B) 7 and 6
(C) 9 and 8 (D) 8 and 6
Ans: C
60. Equivalence partitioning is a __________ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) White-box testing (B) Black-box testing
(C) Orthogonal array testing (D) Stress testing
Ans: B
61. An operating system using banker’s algorithm for deadlock avoidance has ten dedicated devices (of same type) and has three processes P1, P2 and P3 with maximum resource requirements of 4, 5 and 8 respectively. There are two states of allocation of devices as follows : State 1 Processes P1 P2 P3
Devices allocated 2 3 4
State 2 Processes P1 P2 P3
Devices allocated 0 2 4
Which of the following is correct ?
(A) State 1 is unsafe and state 2 is safe.
(B) State 1 is safe and state 2 is unsafe.
(C) Both, state 1 and state 2 are safe.
(D) Both, state 1 and state 2 are unsafe.
Ans: A
62. Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct ?
(A) T1 < T2
(B) T1 > T2
(C) T1 = T2
(D) Nothing can be said about the relation between T1 and T2.
Ans: A
63. Working set model is used in memory management to implement the concept of
(A) Swapping (B) Principal of Locality
(C) Segmentation (D) Thrashing
Ans: B
64. A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry ?
(A) 30 GB (B) 64 GB (C) 16 GB (D) 1 GB
Ans: C
65. A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following statement is correct ?
(A) OS maintains only scheduling and accounting information for each thread.
(B) OS maintains only CPU registers for each thread.
(C) OS does not maintain a separate stack for each thread.
(D) OS does not maintain virtual memory state for each thread.
Ans: B
66. The versions of windows operating system like windows XP and window Vista uses following file system :
(A) FAT-16 (B) FAT-32
(C) NTFS (NT File System) (D) All of the above
Ans: D
67. Which one of the following is a correct implementation of the metapredicate “not” in PROLOG (Here G represents a goal) ?
(A) not(G):– !, call(G), fail. not(G).
(B) not(G):– call(G), !, fail. not(G).
(C) not(G):– call(G), fail, !. not(G).
(D) not(G):– call(G), fail. not(G):– !.
Ans: B
68. Which one of the following is not an informed search technique ?
(A) Hill climbing search (B) Best first search (C) A* search (D) Depth first search
Ans: D
69. If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as
(A) Simplification (B) Unification
(C) Skolemization (D) Resolution
Ans: C
70. Given two jugs of capacities 5 litres and 3 litres with no measuring markers on them. Assume that there is endless supply of water. Then the minimum number of states to measure 4 litres water will be
(A) 3 (B) 4
(C) 5 (D) 7
Ans: D
71. The map colouring problem can be solved using which of the following technique ?
(A) Means-end analysis (B) Constraint satisfaction
(C) AO* search (D) Breadth first search
Ans: B
72. Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation ?
(A) Semantic network (B) Frames
(C) Scripts (D) Conceptual Dependency
Ans: C
(A) only two address and three address instructions
(B) only one address and two address instructions
(C) only one address, two address and three address instructions
(D) zero address, one address, two address and three address instructions
Ans: D
43. Which is not a typical program control instruction ?
(A) BR (B) JMP (C) SHL (D) TST
Ans: C
44. Interrupt which arises from illegal or erroneous use of an instruction or data is
(A) Software interrupt (B) Internal interrupt
(C) External interrupt (D) All of the above
Ans: B
45. The simplified function in product of sums of Boolean function F(W, X, Y, Z) = Σ(0, 1, 2, 5, 8, 9, 10) is
(A) (W' + X') (Y' + Z') (X' + Z)
(B) (W' + X') (Y' + Z') (X' + Z')
(C) (W' + X') (Y' + Z) (X' + Z)
(D) (W' + X') (Y + Z') (X' + Z)
Ans: A
46. Match the following :
a. TTL i. High component density
b. ECL ii. Low power consumption
c. MOS iii. Evolution of “diode- transistor-logic”
d. CMOS iv. High speed digital circuits
Codes : a b c d
(A) iii ii i iv
(B) i iv iii ii
(C) iii iv i ii
(D) i ii iii iv
Ans: C
47. Match the following :
a. Foreign keys i. Domain constraint
b. Private key ii. Referential integrity
c. Event control action model iii. Encryption
d. Data security iv. Trigger
Codes : a b c d
(A) iii ii i iv
(B) ii i iv iii
(C) iii iv i ii
(D) i ii iii iv
Ans: B
48. When an array is passed as a parameter to a function which of the following statements is correct ?
(A) The function can change values in the original array. (B) The function cannot change values in the original array.
(C) Results in compilation error. (D) Results in runtime error.
Ans: A
49. Suppose you want to delete the name that occurs before “Vivek” in an alphabetical listing. Which of the following data structures shall be most efficient for this operation ?
(A) Circular linked list
(B) Doubly linked list
(C) Linked list
(D) Dequeue
Ans: B
50. Match the following :
a. WatsonFelix model i. Failure intensity
b. Quick-Fix model ii. Cost estimation
c. Putnam resource allocation model iii. Project planning
d. LogarithmeticPoisson Model iv. Maintenance
Codes : a b c d
(A) ii i iv iii
(B) i ii iv iii
(C) ii i iii iv
(D) ii iv iii i
Ans: D
51. Trace the error :
void main( )
{
int *b, &a;
*b = 20
printf(“%d, %d”, a, *b)
}
(A) No error
(B) Logical error
(C) Syntax error
(D) Semantic error
Ans: C
52. Match the following :
a. calloc( ) i. Frees previously allocated space
b. free( ) ii. Modifies previously allocated space
c. malloc( ) iii. Allocates space for array
d. realloc( ) iv. Allocates requested size of space
Codes : a b c d
(A) iii i iv ii
(B) iii ii i iv
(C) iii iv i ii
(D) iv ii iii I
Ans: A
53. Binary symmetric channel uses
(A) Half duplex protocol (B) Full duplex protocol (C) Bit oriented protocol (D) None of the above
Ans: A
54. Hamming distance between 100101000110 and 110111101101 is
(A) 3 (B) 4 (C) 5 (D) 6
Ans: D
55. Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is (
A) 11100010101 (B) 11100010100
(C) 1110001010 (D) 111000101
Ans: A
56. __________ is a process model that removes defects before they can precipitate serious hazards.
(A) Incremental model (B) Spiral model (C) Cleanroom software engineering (D) Agile model
Ans: C
57. If f(x, y) is a digital image, then x, y and amplitude values of f are (
A) Finite (B) Infinite (C) Neither finite nor infinite (D) None of the above
Ans: A
58. Consider the following processes with time slice of 4 milliseconds (I/O requests are ignored) : Process A B C D Arrival time 0 1 2 3 CPU cycle 8 4 9 5 The average turn around time of these processes will be
(A) 19.25 milliseconds (B) 18.25 milliseconds (C) 19.5 milliseconds (D) 18.5 milliseconds
Ans: B
59. A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order : ABACABDBACD Assuming that a page interrupt occurs when a new page is brought in the main memory, irrespective of whether the page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
(A) 9 and 7 (B) 7 and 6
(C) 9 and 8 (D) 8 and 6
Ans: C
60. Equivalence partitioning is a __________ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) White-box testing (B) Black-box testing
(C) Orthogonal array testing (D) Stress testing
Ans: B
61. An operating system using banker’s algorithm for deadlock avoidance has ten dedicated devices (of same type) and has three processes P1, P2 and P3 with maximum resource requirements of 4, 5 and 8 respectively. There are two states of allocation of devices as follows : State 1 Processes P1 P2 P3
Devices allocated 2 3 4
State 2 Processes P1 P2 P3
Devices allocated 0 2 4
Which of the following is correct ?
(A) State 1 is unsafe and state 2 is safe.
(B) State 1 is safe and state 2 is unsafe.
(C) Both, state 1 and state 2 are safe.
(D) Both, state 1 and state 2 are unsafe.
Ans: A
62. Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct ?
(A) T1 < T2
(B) T1 > T2
(C) T1 = T2
(D) Nothing can be said about the relation between T1 and T2.
Ans: A
63. Working set model is used in memory management to implement the concept of
(A) Swapping (B) Principal of Locality
(C) Segmentation (D) Thrashing
Ans: B
64. A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry ?
(A) 30 GB (B) 64 GB (C) 16 GB (D) 1 GB
Ans: C
65. A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following statement is correct ?
(A) OS maintains only scheduling and accounting information for each thread.
(B) OS maintains only CPU registers for each thread.
(C) OS does not maintain a separate stack for each thread.
(D) OS does not maintain virtual memory state for each thread.
Ans: B
66. The versions of windows operating system like windows XP and window Vista uses following file system :
(A) FAT-16 (B) FAT-32
(C) NTFS (NT File System) (D) All of the above
Ans: D
67. Which one of the following is a correct implementation of the metapredicate “not” in PROLOG (Here G represents a goal) ?
(A) not(G):– !, call(G), fail. not(G).
(B) not(G):– call(G), !, fail. not(G).
(C) not(G):– call(G), fail, !. not(G).
(D) not(G):– call(G), fail. not(G):– !.
Ans: B
68. Which one of the following is not an informed search technique ?
(A) Hill climbing search (B) Best first search (C) A* search (D) Depth first search
Ans: D
69. If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as
(A) Simplification (B) Unification
(C) Skolemization (D) Resolution
Ans: C
70. Given two jugs of capacities 5 litres and 3 litres with no measuring markers on them. Assume that there is endless supply of water. Then the minimum number of states to measure 4 litres water will be
(A) 3 (B) 4
(C) 5 (D) 7
Ans: D
71. The map colouring problem can be solved using which of the following technique ?
(A) Means-end analysis (B) Constraint satisfaction
(C) AO* search (D) Breadth first search
Ans: B
72. Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation ?
(A) Semantic network (B) Frames
(C) Scripts (D) Conceptual Dependency
Ans: C
73. The following three golden rules :
(i) Place the user in control
(ii) Reduce the user’s memory load
(iii) Make the interface consistent are for
(A) User satisfaction (B) Good interface design
(C) Saving system’s resources (D) None of these
Ans: B
74. Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
(A) Risk mitigation, monitoring and management
(B) Software quality assurance
(C) Software cost estimation
(D) Defect removal efficiency
Ans: B
75. The “PROJECT” operator of a relational algebra creates a new table that has always
(A) More columns than columns in original table (B) More rows than original table
(C) Same number of rows as the original table (D) Same number of columns as the original table
Ans: C
76. The employee information of an Organization is stored in the relation : Employee (name, sex, salary, deptname) Consider the following SQL query Select deptname from Employee Where sex = ‘M’ group by deptname having avg (salary) > {select avg (salary) from Employee} Output of the given query corresponds to
(A) Average salary of employee more than average salary of the organization.
(B) Average salary less than average salary of the organization.
(C) Average salary of employee equal to average salary of the organization.
(D) Average salary of male employees in a department is more than average salary of the organization.
Ans: D
77. For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation
(A) In 1NF not in 2NF
(B) In 2NF not in 3NF
(C) In 3NF
(D) In 1NF
Ans: A
78. In a fully connected mesh network with n devices, there are ________ physical channels to link all devices.
(A) n(n–1)/2
(B) n(n+1)/2
(C) 2n
(D) 2n+1
Ans: A
79. The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is ________.
(A) 3600 (B) 100
(C) 6/600 (D) None of the above
Ans: A
80. Match the following :
a. Data link layer i. Flow control
b. Network layer ii. Node to node delivery
c. Transport layer iii. Mail services
d. Application layer iv. Routing
Codes : a b c d
(A) ii i iv iii
(B) ii iv i iii
(C) ii i iii iv
(D) ii iv iii I
Ans: B
81. An image is 1024∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ?
(A) 196.6 seconds (B) 19.66 seconds
(C) 1.966 seconds (D) 0.1966 seconds
Ans: C
82. The ________ measures the relative strengths of two signals or a signal at two different points.
(A) frequency (B) attenuation
(C) throughput (D) decibel
Ans: D
83. Which one of the following media is multidrop ?
(A) Shielded Twisted pair cable (B) Unshielded Twisted pair cable
(C) Thick Coaxial cable (D) Fiber Optic cable
Ans: C
84. What is the baud rate of the standard 10 Mbps Ethernet ?
(A) 10 megabaud (B) 20 megabaud
(C) 30 megabaud (D) 40 megabaud
Ans: B
85. At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any non-basic variable Xj is obtained as zero, the solution under the test is
(A) Degenerate solution (B) Unbounded solution
(C) Alternative solution (D) Optimal solution
Ans: C
86. A basic feasible solution to a m-origin, n-destination transportation problem is said to be _________ if the number of positive allocations are less than m + n – 1.
(A) degenerate (B) non-degenerate
(C) unbounded (D) unbalanced
Ans: A
87. An actor in an animation is a small program invoked _______ per frame to determine the characteristics of some object in the animation. (A) once (B) twice
(C) 30 times (D) 60 times
Ans: A
88. Bresenham line drawing algorithm is attractive because it uses
(A) Real arithmetic only (B) Integer arithmetic only
(C) Floating point arithmetic (D) Real and integer arithmetic
Ans: B
89. The refresh rate above which a picture stops flickering and fuses into a steady image is called _________.
(A) Crucial fusion frequency (B) Current frequency fusion
(C) Critical fusion frequency (D) Critically diffused frequency
Ans: C
90. In homogenous coordinate system (x, y, z) the points with z = 0 are called
(A) Cartesian points (B) Parallel points
(C) Origin point (D) Point at infinity
Ans: D
91. If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
(A) 40 line-pairs per inch (B) 80 line-pairs per inch
(C) 1600 lines per inch (D) 40 lines per inch
Ans: A
92. Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is
(A) n × 8 MB
(B) n / 8 MB
(C) (1024 × 1024) / 8 MB
(D) 1024 MB
Ans: B
93. Arrays in C language can have _________ with reference to memory representation.
(A) n-subscripts
(B) two-subscripts
(C) only one subscript
(D) three subscripts only
Ans: C
94. Refer the points as listed below :
(a) What are the operator precedence rules ?
(b) What are the operator associativity rules ?
(c) What is the order of operand evaluation ?
(d) Are there restrictions on operand evaluation side effects ?
Which of the above must be considered as primary design issues for arithmetic expressions ?
(A) (a), (b) and (c)
(B) (a), (c) and (d)
(C) (a), (b) and (d)
(D) (a), (b), (c) and (d)
Ans: D
95. Horn clauses are special kinds of propositions which can be described as
(A) Single atomic proposition on left side.
(B) Single or multiple atomic proposition on left side.
(C) A single atomic proposition on left side and a single atomic proposition on right side.
(D) A single atomic proposition on left side or an empty left side.
Ans: D
96. Which of the following is/are the fundamental semantic model(s) of parameter passing ?
(A) in mode (B) out mode
(C) in-out mode (D) all of the above
Ans: D
97. Match the following :
a. Context sensitive language i. Deterministic finite automation
b. Regular grammar ii. Recursive enumerable
c. Context free grammar iii. Recursive language
d. Unrestricted grammar iv. Pushdown automation
Codes : a b c d
(A) ii i iv iii
(B) iii iv i ii
(C) iii i iv ii
(D) ii iv i iii
Ans: C
98. The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism.
s2 : Context free languages are closed under complementation, substitution and homomorphism.
Which of the following is correct statement ?
(A) Both s1 and s2 are correct.
(B) s1 is correct and s2 is not correct.
(C) s1 is not correct and s2 is correct.
(D) Both s1 and s2 are not correct.
Ans: B
99. Which one of the following is not an addressing mode ?
(A) Register indirect (B) Autoincrement
(C) Relative indexed (D) Immediate operand
Ans: C
(i) Place the user in control
(ii) Reduce the user’s memory load
(iii) Make the interface consistent are for
(A) User satisfaction (B) Good interface design
(C) Saving system’s resources (D) None of these
Ans: B
74. Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
(A) Risk mitigation, monitoring and management
(B) Software quality assurance
(C) Software cost estimation
(D) Defect removal efficiency
Ans: B
75. The “PROJECT” operator of a relational algebra creates a new table that has always
(A) More columns than columns in original table (B) More rows than original table
(C) Same number of rows as the original table (D) Same number of columns as the original table
Ans: C
76. The employee information of an Organization is stored in the relation : Employee (name, sex, salary, deptname) Consider the following SQL query Select deptname from Employee Where sex = ‘M’ group by deptname having avg (salary) > {select avg (salary) from Employee} Output of the given query corresponds to
(A) Average salary of employee more than average salary of the organization.
(B) Average salary less than average salary of the organization.
(C) Average salary of employee equal to average salary of the organization.
(D) Average salary of male employees in a department is more than average salary of the organization.
Ans: D
77. For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation
(A) In 1NF not in 2NF
(B) In 2NF not in 3NF
(C) In 3NF
(D) In 1NF
Ans: A
78. In a fully connected mesh network with n devices, there are ________ physical channels to link all devices.
(A) n(n–1)/2
(B) n(n+1)/2
(C) 2n
(D) 2n+1
Ans: A
79. The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is ________.
(A) 3600 (B) 100
(C) 6/600 (D) None of the above
Ans: A
80. Match the following :
a. Data link layer i. Flow control
b. Network layer ii. Node to node delivery
c. Transport layer iii. Mail services
d. Application layer iv. Routing
Codes : a b c d
(A) ii i iv iii
(B) ii iv i iii
(C) ii i iii iv
(D) ii iv iii I
Ans: B
81. An image is 1024∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ?
(A) 196.6 seconds (B) 19.66 seconds
(C) 1.966 seconds (D) 0.1966 seconds
Ans: C
82. The ________ measures the relative strengths of two signals or a signal at two different points.
(A) frequency (B) attenuation
(C) throughput (D) decibel
Ans: D
83. Which one of the following media is multidrop ?
(A) Shielded Twisted pair cable (B) Unshielded Twisted pair cable
(C) Thick Coaxial cable (D) Fiber Optic cable
Ans: C
84. What is the baud rate of the standard 10 Mbps Ethernet ?
(A) 10 megabaud (B) 20 megabaud
(C) 30 megabaud (D) 40 megabaud
Ans: B
85. At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any non-basic variable Xj is obtained as zero, the solution under the test is
(A) Degenerate solution (B) Unbounded solution
(C) Alternative solution (D) Optimal solution
Ans: C
86. A basic feasible solution to a m-origin, n-destination transportation problem is said to be _________ if the number of positive allocations are less than m + n – 1.
(A) degenerate (B) non-degenerate
(C) unbounded (D) unbalanced
Ans: A
87. An actor in an animation is a small program invoked _______ per frame to determine the characteristics of some object in the animation. (A) once (B) twice
(C) 30 times (D) 60 times
Ans: A
88. Bresenham line drawing algorithm is attractive because it uses
(A) Real arithmetic only (B) Integer arithmetic only
(C) Floating point arithmetic (D) Real and integer arithmetic
Ans: B
89. The refresh rate above which a picture stops flickering and fuses into a steady image is called _________.
(A) Crucial fusion frequency (B) Current frequency fusion
(C) Critical fusion frequency (D) Critically diffused frequency
Ans: C
90. In homogenous coordinate system (x, y, z) the points with z = 0 are called
(A) Cartesian points (B) Parallel points
(C) Origin point (D) Point at infinity
Ans: D
91. If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
(A) 40 line-pairs per inch (B) 80 line-pairs per inch
(C) 1600 lines per inch (D) 40 lines per inch
Ans: A
92. Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is
(A) n × 8 MB
(B) n / 8 MB
(C) (1024 × 1024) / 8 MB
(D) 1024 MB
Ans: B
93. Arrays in C language can have _________ with reference to memory representation.
(A) n-subscripts
(B) two-subscripts
(C) only one subscript
(D) three subscripts only
Ans: C
94. Refer the points as listed below :
(a) What are the operator precedence rules ?
(b) What are the operator associativity rules ?
(c) What is the order of operand evaluation ?
(d) Are there restrictions on operand evaluation side effects ?
Which of the above must be considered as primary design issues for arithmetic expressions ?
(A) (a), (b) and (c)
(B) (a), (c) and (d)
(C) (a), (b) and (d)
(D) (a), (b), (c) and (d)
Ans: D
95. Horn clauses are special kinds of propositions which can be described as
(A) Single atomic proposition on left side.
(B) Single or multiple atomic proposition on left side.
(C) A single atomic proposition on left side and a single atomic proposition on right side.
(D) A single atomic proposition on left side or an empty left side.
Ans: D
96. Which of the following is/are the fundamental semantic model(s) of parameter passing ?
(A) in mode (B) out mode
(C) in-out mode (D) all of the above
Ans: D
97. Match the following :
a. Context sensitive language i. Deterministic finite automation
b. Regular grammar ii. Recursive enumerable
c. Context free grammar iii. Recursive language
d. Unrestricted grammar iv. Pushdown automation
Codes : a b c d
(A) ii i iv iii
(B) iii iv i ii
(C) iii i iv ii
(D) ii iv i iii
Ans: C
98. The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism.
s2 : Context free languages are closed under complementation, substitution and homomorphism.
Which of the following is correct statement ?
(A) Both s1 and s2 are correct.
(B) s1 is correct and s2 is not correct.
(C) s1 is not correct and s2 is correct.
(D) Both s1 and s2 are not correct.
Ans: B
99. Which one of the following is not an addressing mode ?
(A) Register indirect (B) Autoincrement
(C) Relative indexed (D) Immediate operand
Ans: C
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15