0 of 50 questions completed
Questions:
General instruction:
1. The clock will be set at the server. The countdown timer at the top right corner of screen will display the remaining time available for you to complete the examination. When the timer reaches zero, the examination will end by itself. You need not terminate the examination or submit your paper.
2. The Question Palette displayed on the right side of screen will show the status of each question using one of the following symbols.
(White)You have not answered the question
(Green)You have answered the question
(Orange)You have NOT answered the question, but have marked the question for review.
The Mark for Review status for a question simply indicates that you would like to look0 at that question again. If a question is answered, but marked for review, then the answer will be considered for evaluation unless the status is modified by the candidates.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 50 questions answered correctly
Time has elapsed
You have reached 0 of 0 marks, (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
How many different equivalence relations with exactly three different equivalence classes are there on a set with five elements?
The number of different spanning trees in complete graph, K4 and bipartite graph K2,2 have ………. and …..…. respectively.
Suppose that R1 and R2 are reflexive relations on a set A.
Which of the following statements is correct?
There are three cards in a box. Both sides of one card are black, both sides of one card are red, and the third card has one black side and one red side. We pick a card at random and observe only one side.
What is the probability that the opposite side is the same colour as the one side we observed?
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph. How many cliques are there in the graph shown below?
Which of the following logic expressions is incorrect?
The IEEE-754 double-precision format to represent floating point numbers, has a length of ……….. bits.
Simplified Boolean equation for the following truth table is:
The simplified form of a Boolean equation (AB’+AB’C+AC)(A’C’+B’) is :
In a positive-edge-triggered JK flip-flop, if J and K both are high then the output will be …………. on the rising edge of the clock.
Given i=0, j=1, k=-1
x=0.5, y=0.0
What is the output of the following expression in C language?
x * y < i + j || k
The following statement in ‘C’
int(*f())[];
declares
Which one of the following is correct, when a class grants friend status to another class?
When a method in a subclass has the same name and type signatures as a method in the superclass, then the method in the subclass ……………… the method in the superclass.
What is the value returned by the function f given below when n = 100 ?
int f(int n)
{ if (n==0) then return n;
else
return n + f(n-2);
}
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as:
Which of the following statement(s) is/are FALSE in the context of Relational DBMS ?
I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data in the database.
II. E-R diagrams are useful to logically model concepts.
III. An update anomaly is when it is not possible to store information unless some other, unrelated information is stored as well.
IV. SQL is a procedural language.
Consider the following statements regarding relational database model:
(a) NULL values can be used to opt a tuple out of enforcement of a foreign key.
(b) Suppose that table T has only one candidate key. If Q is in 3NF, then it is also in BCNF.
(c) The difference between the project operator (P) in relational algebra and the SELECT keyword in SQL is that if the resulting table/set has more than one occurrences of the same tuple, then P will return only one of them, while SQL SELECT will return all.
One can determine that:
Consider the following two commands C1 and C2 on the relation R from an SQL database:
C1: drop table R;
C2: delete from R;
Which of the following statements is TRUE?
I. Both C1 and C2 delete the schema for R.
II. C2 retains relation R, but deletes all tuples in R.
III. C1 deletes not only all tuples of R, but also the schema for R.
Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table:
I: {B} II: {B, C} III: {A, D} IV: {C, D}
If different symbols stand for different values in the table (e.g., d1 is definitely not equal to d2), then which of the above could not be the candidate key for the database table?
Consider the following binary search tree:
If we remove the root node which of the node from the left subtree will be the new root?
Consider the following operations performed on a stack of size 5:
Push(a); Pop(); Push(b); Push(c); Pop();
Push(d); Pop(); Pop(); Push(e);
Which of the following statements is correct?
Suppose you are given a binary tree with n nodes, such that each node has exactly either zero or two children. The maximum height of the tree will be
Which of the following is not an inherent application of stack?
In how many ways can the string
A ∩ B – A ∩ B – A
be fully parenthesized to yield an infix expression?
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?
In a fully-connected mesh network with 10 computers, total ………….. number of cables are required and ……………. number of ports are required for each device.
In TCP/IP Reference model, the job of …………… layer is to permit hosts to inject packets into any network and travel them independently to the destination.
If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is …………….. the critical angle.
The number of strings of length 4 that are generated by the regular expression (0|∈) 1+2* (3|∈), where | is an alternation character, {+, *} are quantification characters, and ∈ is the null string, is:
The content of the accumulator after the execution of the following 8085 assembly language program, is:
MVI A, 42H
MVI B, 05H
UGC: ADD B
DCR B
JNZ UGC
ADI 25H
HLT
In ………….., the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other.
Which of the following is not typically a benefit of dynamic linking?
I. Reduction in overall program execution time.
II. Reduction in overall space consumption in memory.
III. Reduction in overall space consumption on disk.
IV. Reduction in the cost of software updates.
Which of the following is FALSE ?
Consider the reference string
0 1 2 3 0 1 4 0 1 2 3 4
If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are ………. and ……….. respectively.
Suppose there are 4 processes in execution with 12 instances of a Resource R in a system:
The maximum need of each process and current allocation are given below:
Process Max. Need Current Allocation
P1 8 3
P2 9 4
P3 5 2
P4 3 1
With reference to current allocation, is system safe? If so, what is the safe sequence?
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are:
98, 37, 14, 124, 65, 67
In UNIX, ………… creates three subdirectories: ‘PIS’ and two subdirectories ‘progs’ and ‘data’ from just created subdirectory ‘PIS’.
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler re-evaluates the process priority for every ‘T’ time units and decides next process to be scheduled. If the process have no I/O operations and all arrive at time zero, then the scheduler implements ………….. criteria.
If S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is:
The ……………. model is preferred for software development when the requirements are not clear.
Which of the following is not included in waterfall model ?
The cyclomatic complexity of a flow graph V(G), in terms of predicate nodes is:
Where P is number of predicate nodes in flow graph V(G).
The extent to which a software tolerates the unexpected problems, is termed as:
An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as …………..
Consider the following two statements:
(a) Business intelligence and Data warehousing is used for forecasting and Data mining.
(b) Business intelligence and Data warehousing is used for analysis of large volumes of sales data.
Which one of the following options is correct?
pipelining improves performance by:
Consider the following two statements :
(a) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse.
(b) Data scrubling is a process of rejecting data from data warehouse to create indexes.
Which one of the following options is correct ?
Given the following statements:
(a) Strategic value of data mining is time stamping
(b) Information collection is an expensive process in building an expert system.
Which of the following options is correct ?