Ans .

D


Extremely small size Thousands times smaller than discrete circuits. It is because of fabrication of various circuit elements in a single chip of semiconductor material. Very small weight owing to miniaturised circuit. Very low cost because of simultaneous production of hundreds of similar circuits on a small semiconductor wafer. Owing to mass production of an IC costs as much as an individual transistor. More reliable because of elimination of soldered joints and need for fewer interconnections. Lower power consumption because of their smaller size. Easy replacement as it is more economical to replace them than to repair them.




Ans .

C
Continuously varying signal representatiom






Ans .

A
2^12 locations = 4096






Ans .

C
After RESET instruction the processor execution will initialize from 0000H.






Ans .

C
Internally, the overflow flag is usually generated by an exclusive or of the internal carry into and out of the sign bit. As the sign bit is the same as the most significant bit of a number considered unsigned, the overflow flag is "meaningless" and normally ignored when unsigned numbers are added or subtracted.






Ans .

A
privacy invasion






Ans .

A
Transaction hold shared lock on data item A .So any number of transaction can read that the data from the requesting item using shared locking .So transaction B request will immediately granted.






Ans .

A
A trigger is like a stored procedure that Oracle Database invokes automatically whenever a specified event occurs.






Ans .

C
The SGA is a group of shared memory structures, known as SGA components, that contain data and control information for one Oracle Database instance.






Ans .

B
the redo log files are used for instance recovery






Ans .

A
they can display realistic shaded scenes






Ans .

D
The basic geometric objects in computer graphics are usually called primitives or graphics output primitives






Ans .

A
The basic idea is to test the Z-depth of each surface to determine the closest (visible) surface.






Ans .

B
Top lef






Ans .

A
Ray Casting is often used to implement CSG operation when objects are described with boundary representation.






Ans .

D
kernel process and supervisor process






Ans .

B
main() and yyerror() are recommended funv=ctions to be defined in user programme specification of Unix System.






Ans .

B
(r*s*)* = (r+s)*





TOC Question


Ans .

B
ab, ba, aab






Ans .

A
Coroutines are computer-program components that generalize subroutines for non-preemptive multitasking, by allowing multiple entry points for suspending and resuming execution at certain locations.






Ans .

B
In Selective Reject (or Selective Repeat), maximum size of window must be half of the maximum sequence number.





Ans .

D
128,0





Ans .

B
Denial-of-service (DoS) attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them.






Ans .

D
4, 24.07 dB






Ans .

A,B
Flow control is local phenomenon whicle congestion control is global phenomenon
Flow control uses timers whicle congetion control uses retransmissions






Ans .

D
As in bubble sort always we swap the adjacent keys if they are not in desired order






Ans .

D
As the first statement is true according to the definition of linear algorithms, the second is false as 30 operations are not needed.






Ans .

C
Worst-case performance :O(n2)
Best-case performance :O(n log n) (simple partition) or O(n) (three-way partition and equal keys)
Average performance :O(n log n)






Ans .

B






Ans .

B
(i)3 COL : Given a graph G can be painted in 3 Colours. : NP complete
(ii) COLO : Given a graph G Find Chromatic Number of G. : NP Hard
(iii) COLC : Given a graph Find Optimal Colouring of G. : NP Hard






Ans .

C
The ternary operators cannot be overloaded,






Ans .

A
Data member of derived class of X






Ans .

A
Constructors are not virtual






Ans .

B
allm objects are destroid when program is terminated







Ans .

D
In access control in a protected derivation, visibility modes will change as public and protected become protected







Ans .

C
reliability is most important aspect of software design.







Ans .

C
major characteristics of agil process is:document is minimal







Ans .

B



The purpose of a prototype is to allow users of the software to evaluate developers' proposals for the design of the eventual product by actually trying them out, rather than having to interpret and evaluate the design based on descriptions. Prototyping can also be used by end users to describe and prove requirements that have not been considered, and that can be a key factor in the commercial relationship between developers and their clients.





Ans .

D


Henry-Selig





Ans .

B


fan-in is the number of inputs that can be connected to a circuit.





Ans .

B


computation migration, a new technique that is based on compile-time program transformations, for accesing remote data in a distributed-memory parallel system.




Ans .

C


Any process that does not share data with others is independent. Otherwise the process is cooperating. Cooperation is done to provide information sharing, computational speedups, modularity and convenience.




Ans .

A


Solution to the problem of external fragmentation is compaction. The process is to shuffle the memory contents so that all free memory is placed together in one large block. It is only possible if relocation is dynamic and done only at run time.




Ans .

B


a zombie process or defunct process is a process that has completed execution (via the exit system call) but still has an entry in the process table: it is a process in the "Terminated state".




Ans .

B


If the system is deadlocked, it implies that each process is holding one resource and is waiting for one more. Since there are 3 processes and 4 resources, one process must be able to obtain two resources. This process requires no more resources and therefore it will return its resources when done.




Ans .

B


Prospector is application of Geological applications




Ans .

C


a OR 7




Ans .

B


The two temporal t1 and t2 will meet




Ans .

D


BFS




Ans .

D


A frame is an artificial intelligence data structure used to divide knowledge into substructures by representing "stereotyped situations." Frames are the primary data structure used in artificial intelligence frame language. Frames are also an extensive part of knowledge representation and reasoning schemes.




Ans .

B


L = { 0, 100,101,....} Which is satisfied by RE 1*0(0+1)




Ans .

D


L={ 10,100,101,...} which is satisfied by RE 10(0+1)*




Ans .

C


(R+S)* = R* + S*




Ans .

D


L = {01,011,0111,01111.....} is satisfied by 01*1




Ans .

D


Turing machine is an application of Theory of Computation.




Ans .

A


c >= 0 and c <= log|x|




Ans .

B


138




Ans .

B


ECC (either "error correction [or correcting] code" or "error checking and correcting") allows data that is being read or transmitted to be checked for errors and, when necessary, corrected on the fly. It differs from parity-checking in that errors are not only detected but also corrected.




Ans .

A


In Fourier transformed images, at location F(0,0) average value of input image is available High pass filter is useful to reduce noise




Ans .

D


In compressing images Coding Redundancy, Psychological Redundancy, Interpixel Redundancy are addressed




Ans .

B


Solving linear equations simultaneously graph has to plot and see which points lies in feasible region. Points (6,12) ,(10,0) lies in feasible region.




Ans .

C


Can not be solved by simplex method because of the negative coefficient in the objective function and constraint in standard form



KMAP
Standard formulation of the linear programming problem will have :


Ans .

B


6 decision variables and 14 inequality constraints




Ans .

D


II -> M2 and III-> M3




Ans .

B






Ans .

B


There is only one paths from O to T having shortest length of 16 units after applying shortest path algorithm.


  1. (i) Functiong of artificial neural network and biological neuron are similar


  2. (ii) Time required to train a network depends on its size


  3. (iii) Neural networks learn by example




Ans .

C


In case of linear separability problem , the classes of pattern with MutiDimension vector can be separated with Single Decision Surfaces.




Ans .

B


Time required to train a network depends on its size and Neural networks learn by example.


SET THEORY Question
fuzzy sets defined on inverse of discourse X ={x1, x2, x3 }
and Y = {y1, y2} respectively. Which of following is/are
fuzzy Cartesian products ?
SET THEORY Question
SET THEORY Question
SET THEORY Question


Ans .

D


In multilayer Perception , hidden nodes have 0 as input value




Ans .

D






Ans .

A


(ii) and (iii) are valid




Ans .

C


Process P1 completed first and P2 last




Ans .

B


Variables are case sensitive and To extract contents, variable name should be pressed by $ are true




Ans .

D


WM_CREATE, WM_DESTROY




Ans .

B


Window5 combines multiple WM_TIMER messagesWindow5 combines multiple WM_TIMER messages and Busy application is not guaranteed to receive timer message are true