0 of 75 questions completed
Questions:
General instruction:
1. The clock will be set at the server. The countdown timer at the top right corner of screen will display the remaining time available for you to complete the examination. When the timer reaches zero, the examination will end by itself. You need not terminate the examination or submit your paper.
2. The Question Palette displayed on the right side of screen will show the status of each question using one of the following symbols.
(White)You have not answered the question
(Green)You have answered the question
(Orange)You have NOT answered the question, but have marked the question for review.
The Mark for Review status for a question simply indicates that you would like to look0 at that question again. If a question is answered, but marked for review, then the answer will be considered for evaluation unless the status is modified by the candidates.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 75 questions answered correctly
Time has elapsed
You have reached 0 of 0 marks, (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which of the following is a sequential circuit?
8085 microprocessor has …………. hardware interrupts.
Which of the following in 8085 microprocessor performs
HL = HL + DE ?
The Register that stores all interrupt requests is:
The …………… addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction.
In …………. method, the word is written to the block in both the cache and main memory, in parallel.
Which of the following statements concerning Object-Oriented databases is FALSE?
In distributed databases, location transparency allows for database users, programmers and administrators to treat the data as if it is at one location. A SQL query with location transparency needs to specify:
Consider the relations R(A,B) and S(B,C) and the following four relational algebra queries over R and S:
I. πA,B(R⋈S)
II. R⋈πB(S)
III. R∩(πA(R) Χ πB(S))
IV. πA,R.B(R Χ S) where R.B refers to the column B in table R.
One can determine that:
Which of the following statements is TRUE?
D1: The decomposition of the schema R(A,B,C) into R1(A,B) and R2(A,C) is always lossless.
D2: The decomposition of the schema R(A,B,C,D,E) having AD→B, C→DE, B→AE, AE→C into R1(A,B,D) and R2(A,C,D,E) is lossless.
Consider the following ORACLE relations:
R(A,B,C) = {<1,2,3>, <1,2,0>, <1,3,1>, <6,2,3>, <1,4,2>, <3,1,4>}
S(B,C,D) = {<2,3,7>, <1,4,5>, <1,2,3>, <2,3,4>, <3,1,4>}
Consider the following two SQL queries SQ1 and SQ2:
SQ1: SELECT R.B, AVG(S.B)
FROM R, S
WHERE R.A = S.C AND S.D < 7
GROUP BY R.B;
SQ2:
SELECT DISTINCT S.B, MIN (S.C)
FROM S
GROUP BY S.B
HAVING COUNT (DISTINCT S.D) > 1;
If M is the number of tuples returned by SQ1 and N is the number of tuples returned by SQ2 then
Semi-join strategies are techniques for query processing in distributed database system. Which of the following is a semi-join technique?
Consider the Breshenham’s circle generation algorithm for plotting a circle with centre (0,0) and radius ‘r’ units in first quadrant. If the current point is (x1,y1) and decision parameter is pi then what will be the next point (xi+1,yi+1) and updated decision parameter pi+1 for pi ≥ 0
A point P(5,1) is rotated by 900 about a pivot point (2,2). What is the coordinate of new transformed point P’ ?
Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping algorithm. The rectangular window has lower left-hand corner at (-5,1) and upper right-hand corner at (3,7). Consider the following three lines for clipping with the given end point co-ordinates:
Line AB: A(-6,2) and B(-1,8)
Line CD: C(-1,5) and D(4,8)
Line EF: E(-2,3) and F(1,2)
Which of the following line(s) is/are candidate for clipping?
In perspective projection, if a line segment joining a point which lies in front of the viewer to a point in back of the viewer is projected to a broken line of infinite extent. This is known as ……………….
Let us consider that the original point is (x,y) and new transformed point is (x’,y’). Further, Shx and Shy are shearing factors in x and y directions. If we perform the y-direction shear relative to x=xref then the transformed point is given by …………
Which of the following statement(s) is/are correct with reference to curve generation?
I. Hermite curves are generated using the concepts of interpolation.
II. Bezier curves are generated using the concepts of approximation.
III. The Bezier curves lies entirely within the convex hull of its control points.
IV. The degree of Bezier curve does not depend on the number of control points.
Given the following statements:
(a) To implement Abstract Data Type, a programming language require a syntactic unit to encapsulate type definition.
(b) To implement ADT, a programming language requires some primitive operations that are built in the language processor.
(c) C++, Ada, Java 5.0, C#2005 provide support for parameterised ADT.
Which one of the following options is correct?
Match the following types of variables with the corresponding programming languages:
(a) Static variables (i) Local variables in Pascal
(b) Stack dynamic (ii) All variables in APL
(c) Explicit heap dynamic (iii) Fortran 77
(d) Implicit heap dynamic (iv) All objects in JAVA
Which of the following is false regarding the evaluation of computer programming languages?
The symmetric difference of two sets S1 and S2 is defined as
S1⊕S2 = {x | x ϵ S1 or x ϵ S2, but x is not in both S1 and S2}
The nor of two languages is defined as
nor (L1,L2) = {w|w ∉ L1 and w|w ∉ L2}
Which of the following is correct?
The regular expression for the complement of the language L={a ^{n }b ^{m} ∣ n≥4,m≤3} is:
Consider the following two languages:
L1 = {0 ^{i }1 ^{j} | gcd(i,j)=1}
L2 is any subset of 0*.
Which of the following is correct?
If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ……………
Given the following statements:
(a) Frequency Division Multiplexing is a technique that can be applied when the bandwidth of a link is greater than combined bandwidth of signals to be transmitted.
(b) Wavelength Division Multiplexing (WDM) is an analog multiplexing Technique to combine optical signals.
(c) WDM is a Digital Multiplexing Technique.
(d) TDM is a Digital Multiplexing Technique.
Which of the following is correct?
A pure ALOHA Network transmit 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is …………..
Match the following:
(a) Line coding (i) A technique to change analog signal to digital data.
(b) Block coding (ii) Provides synchronization without increasing number of bits
(c) Scrambling (iii) Process of converting digital data to digital signal.
(d) Pulse code modulation (iv) Provides redundancy to ensure synchronization and inherits error detection.
Assume that we need to download text documents at the rate of 100 pages per minute. A page is an average of 24 lines with 80 characters in each line and each character requires 8 bits. Then the required bit rate of the channel is …………….
Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key:
Using ‘Z’ as bogus character.
The number of different binary trees with 6 nodes is ………….
Let A[1…n] be an array of n distinct numbers. If iA[j], then the pair (i,j) is called an inversion of A. What is the expected number of inversions in any permutation on n elements?
Which one of the following array represents a binary max-heap?
Match the following:
(a) Huffman codes (i) O(n ^{2})
(b) Optimal polygon triangulation (ii) θ(n ^{3})
(c) Activity selection problem (iii) O(nlgn)
(d) Quicksort (iv) θ(n)
Suppose that we have numbers between 1 and 1000 in a binary search tree and want to search for the number 364. Which of the following sequences could not be the sequence of nodes examined?
A triangulation of a polygon is a set of T chords that divide the polygon into disjoint triangles. Every triangulation of n-vertex convex polygon has ……………. chords and divides the polygon into …………… triangles.
Implicit return type of a class constructor is:
It is possible to define a class within a class termed as nested class. There are ………… types of nested classes.
Which of the following statements is correct?
Which of the following statements is correct?
Which of the following statements is not correct?
When one object reference variable is assigned to another object reference variable then
A server crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) is 30 days. When this happens, it takes 12 hours to reboot it, that is, the Mean Time to Repair (MTTR) is 12 hours. The availability of server with these reliability data values is approximately:
Match the software maintenance activities in List-I to its meaning in List-II.
List-I List-II
I. Corrective (a) Concerned with performing activities to reduce the software complexity thereby improving program understandability and increasing software maintainability.
II. Adaptive (b) Concerned with fixing errors that are observed when the software is in use.
III. Perfective (c) Concerned with the change in the software that takes place to make the software adaptable to new environment (both hardware and software).
IV. Preventive (d) Concerned with the change in the software that takes place to make the software adaptable to changing user requirements.
Match each application/software design concept in List-I to its definition in List-II.
List-I List-II
I. Coupling (a) Easy to visually inspect the design of the software and understand its purpose.
II. Cohesion (b) Easy to add functionality to a software without having to redesign it.
III. Scalable (c) Focus of a code upon a single goal.
IV. Readable (d) Reliance of a code module upon other code modules.
Software safety is quality assurance activity that focuses on hazards that
Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing order of maturity?
The number of function points of a proposed system is calculated as 500. Suppose that the system is planned to be developed in Java and the LOC/FP ratio of Java is 50. Estimate the effort (E) required to complete the project using the effort formula of basic
COCOMO given below:
E = a(KLOC)b
Assume that the values of a and b are 2.5 and 1.0 respectively.
In UNIX, processes that have finished execution but have not yet had their status collected are known as …………….
In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process?
Which of the following information about the UNIX file system is not correct?
Which of the following option with reference to UNIX operating system is not correct?
A Multicomputer with 256 CPUs is organized as 16×16 grid. What is the worst case delay (in hops) that a message might have to take?
Suppose that the time to do a null remote procedure call (RPC) (i.e, 0 data bytes) is 1.0 msec, with an additional 1.5 msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K RPCs?
Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata M. Consider the relation RM defined by M. As all states are reachable from the start state, RM has ……………. equivalence classes.
Let L = {0 ^{n }1 ^{n} | n≥0} be a context free language.
Which of the following is correct?
Given a Turing Machine
M = ({q0,q1,q2,q3}, {a,b}, {a,b,B}, δ, B, {q3})
Where δ is a transition function defined as
δ(q0,a) = (q1,a,R)
δ(q1,b) = (q2,b,R)
δ(q2,a) = (q2,a,R)
δ(q2,b) = (q3,b,R)
The language L(M) accepted by the Turing Machine is given as:
Consider a discrete memoryless channel and assume that H(x) is the amount of information per symbol at the input of the channel; H(y) is the amount of information per symbol at the output of the channel; H(x|y) is the amount of uncertainty remaining on x knowing y; and I(x;y) is the information transmission.
Which of the following does not define the channel capacity of a discrete memoryless channel?
Consider a source with symbols A, B, C, D with probabilities 1/2, 1/4, 1/8, 1/8 respectively. What is the average number of bits per symbol for the Huffman code generated from above information?
Which of the following is used for the boundary representation of an image object?
The region of feasible solution of a linear programming problem has a …………… property in geometry, provided the feasible solution of the problem exists.
Consider the following statements:
(a) Revised simplex method requires lesser computations than the simplex method.
(b) Revised simplex method automatically generates the inverse of the current basis matrix.
(c) Less number of entries are needed in each table of revised simplex method than usual simplex method.
Which of these statements are correct?
The following transportation problem:
The above solution of a given transportation problem is
Let R and S be two fuzzy relations defined as:
Then, the resulting relation, T, which relates elements of universe x to elements of universe z using max-min composition is given by
Compute the value of adding the following two fuzzy integers:
A = {(0.3,1), (0.6,2), (1,3), (0.7,4), (0.2,5)}
B = {(0.5,11), (1,12), (0.5,13)}
Where fuzzy addition is defined as
μA+B(z) = maxx+y=z (min(μA(x), μB(x)))
Then, f(A+B) is equal to
A perceptron has input weights W1 = -3.9 and W2 = 1.1 with threshold value T = 0.3. What output does it give for the input x1 = 1.3 and x2 = 2.2?
What is the function of following UNIX command?
WC – l b&
Which of the following statement is not correct with reference to cron daemon in UNIX O.S?
In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements:
I. A mode of 641 (octal) means that the owner can read and write the file, other members of the owner’s group can read it, and users can execute only.
II. A mode of 100 (octal) allows the owner to execute the file, but prohibits all other access.
Which of the following options is correct with reference to above statements?
Consider the statement,
“Either -2 ≤ x ≤ -1 or 1 ≤ x ≤ 2”
The negation of this statement is
Which of the following is characteristic of an MIS?
How does randomized hill-climbing choose the next move each time?
Consider the following game tree in which root is a maximizing node and children are visited left to right. What nodes will be pruned by the alpha-beta pruning?
Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an adjacent empty space. Given the initial state
which of the following state cannot be reached?
A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as: