Journey of a
Thousand Miles begins with One Click!!!
Ans .
B
In Selective Reject (or Selective Repeat), maximum size of window must be half of the maximum sequence number.
Ans .
D
128,0
Ans .
B
Denial-of-service (DoS) attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them.
Ans .
D
4, 24.07 dB
Ans .
A,B
Flow control is local phenomenon whicle congestion control is global phenomenon
Flow control uses timers whicle congetion control uses retransmissions
Ans .
D
As in bubble sort always we swap the adjacent keys if they are not in desired order
Ans .
D
As the first statement is true according to the definition of linear algorithms, the second is false as 30 operations are not needed.
Ans .
C
Worst-case performance :O(n2)
Best-case performance :O(n log n) (simple partition) or O(n) (three-way partition and equal keys)
Average performance :O(n log n)
Ans .
B
Ans .
A
Data member of derived class of X
Ans .
A
Constructors are not virtual
Ans .
B
allm objects are destroid when program is terminated
Ans .
D
In access control in a protected derivation, visibility modes will change as public and protected become protected
Ans .
C
reliability is most important aspect of software design.
Ans .
C
major characteristics of agil process is:document is minimal
Ans .
B
The purpose of a prototype is to allow users of the software to evaluate developers' proposals for
the design of the eventual product by actually trying them out, rather than having to interpret and evaluate the design based on descriptions.
Prototyping can also be used by end users to describe and prove requirements
that have not been considered, and that can be a key factor in the commercial relationship between developers and their clients.
Ans .
D
Henry-Selig
no of attributes flow into a program module
Ans .
B
fan-in is the number of inputs that can be connected to a circuit.
21.
In case of distributed memory parallel System, Which of the techniques used for compile time transformation
for accessing remote data
Cache coherence Schema
Computation Migration
Remote Procedure Call
Message Passing
Ans .
B
computation migration, a new technique that is based on compile-time program transformations, for accesing remote data in a distributed-memory parallel system.
Q 22.
In a system there are several process executives, in this scenario which process can be affected by the execution
Child Process
Parent Process
Cooperative Process
Init Process
Ans .
C
Any process that does not share data with others is independent. Otherwise the process is cooperating.
Cooperation is done to provide information sharing, computational speedups, modularity and convenience.
Q 23.
The Operating System memory management "Compassion" is defined as :
a technique for overcoming internal fragmentation
a technique for overcoming external fragmentation
a paging technique
a technique for overcoming fatal error
Ans .
A
Solution to the problem of external fragmentation is compaction. The process is to shuffle the memory contents so that all free memory is placed together in one large block.
It is only possible if relocation is dynamic and done only at run time.
Q 24.
Consider a following program code fragment
main()
{
if(fork() > 0)
sleep(100);
}
Result in the creation of :
an orphan process
a Zombie Process
a process that executes infinitely
none of these
Ans .
B
a zombie process or defunct process is a process that has completed execution (via the exit system call) but still has an entry in the process table:
it is a process in the "Terminated state".
Q 25.
Suppose there is system consisting of 4 resources of same time that are shared by 3 processes each of which needs
at most 2 resources under this condition whether system will be in ............
Starvation
Dead Lock Free
Dead Lock Sure
Option 1 and 3
Ans .
B
If the system is deadlocked, it implies that each process is holding one resource
and is waiting for one more. Since there are 3 processes and 4 resources, one
process must be able to obtain two resources. This process requires no more
resources and therefore it will return its resources when done.
Q 26.
Prospector is application of :
Medicine application
Geological applications
Biological applications
Chemical applications
Ans .
B
Prospector is application of Geological applications
Which of the following is a knowledge representation
BFS
DFS
Heuristic
Frames
Ans .
D
A frame is an artificial intelligence data structure used to divide knowledge into substructures by representing "stereotyped situations."
Frames are the primary data structure used in artificial intelligence frame language.
Frames are also an extensive part of knowledge representation and reasoning schemes.
Q 31.
In the following FSM
is equivalent to :
(0+1)01*
1*0 (0+1)
0 1* (0+1)
1 1* (0+1)
Ans .
B
L = { 0, 100,101,....} Which is satisfied by RE 1*0(0+1)
Q 32.
Write a regular expression which is starting with 10 followed by any number of 0's and 1's to :?
0 1 (0+1)*
0 0 (0+1)*
1 1 (0+1)*
1 0 (0+1)*
Ans .
D
L={ 10,100,101,...} which is satisfied by RE 10(0+1)*
Q 33.
The regular expression (R+S)* is equivalent to :
R* S*
R* S
R* + S*
R S*
Ans .
C
(R+S)* = R* + S*
Q 34.
The following regular expression P -> 0P1/1/ e will give :
00*1
01*
010*
01*1
Ans .
D
L = {01,011,0111,01111.....} is satisfied by 01*1
Q 35.
The Turing machine used for ............
Lexical Analysis
Syntax Analysis
Editor
Computation
Ans .
D
Turing machine is an application of Theory of Computation.
Q 36.
Which of following are properties of channel capacity for an input alphabet x and output alphabet y ?
(i) c >= 0
(ii) c <= log|x|
(iii) c >= log|y|
(i) and (ii)
(i) and (iii)
(ii) and (iii)
(i),(ii) and (iii)
Ans .
A
c >= 0 and c <= log|x|
Q 37.
The data contains five different symbols whose occurrence are as shown below :
Symbol : A   B   C   D   E
Frequency : 24   12   10   8   8
How much bit of space is required to store above data, when these symbols are coding as per Huffman coding
122
138
142
186
Ans .
B
138
Q 38.
Linear Code is a :
Error Detecting code
Error Correcting Code
Error Transmission Code
Error Detecting and Correcting Code
Ans .
B
ECC (either "error correction [or correcting] code" or "error checking and correcting") allows data that is being read or transmitted to be
checked for errors and, when necessary, corrected on the fly.
It differs from parity-checking in that errors are not only detected but also corrected.
Q 39.
Which of statement is/are correct ?
(i) In Fourier transformed images, at location F(0,0) average value of input image is available
(ii) High pass filter is useful to reduce small dots
(i)
(ii)
Both (i) and (ii)
None of the above
Ans .
A
In Fourier transformed images, at location F(0,0) average value of input image is available
High pass filter is useful to reduce noise
Q 40.
when compressing images
which of the following redundancy/ redundancies need to be addressed ?
Coding Redundancy
Psychological Redundancy
Interpixel Redundancy
All of above
Ans .
D
In compressing images Coding Redundancy, Psychological Redundancy, Interpixel Redundancy are addressed
Q 41 and 42
Consider following Linear Programming Problem :
Maximize : Z = 20 x1 + 10 x2
Subject to : x1 + 2x2 <= 40
        3x1 + x2 >= 30
        4x1 + 3x2 >= 60
        x1, x2 >= 0
Q.41 Which of following points are in feasible region ?
(4,18) ,(20,5)
(6,12) ,(10,0)
(0,30) ,(40,0)
(0,20) ,(15,0)
Ans .
B
Solving linear equations simultaneously graph has to plot and see which points lies in feasible region.
Points (6,12) ,(10,0) lies in feasible region.
Q 42.
The dual of this problem
Will be the maximization problem with 3 variables and 2 constraints
Will not be possible as there are negative coefficient in the constraint and objective function in the standard form
Can not be solved by simplex method because of the negative coefficient in the objective function and constraint in standard form
Will be a minimization problem with 3 variables and 2 constraints.
Ans .
C
Can not be solved by simplex method because of the negative coefficient in the objective function and constraint in standard form
Q 43.
Consider the following Transformation :
Standard formulation of the linear programming problem will have :
6 decision variables and 7 equality constraints
6 decision variables and 14 inequality constraints
12 decision variables and 7 equality constraints
7 decision variables and 7 equality constraints
Ans .
B
6 decision variables and 14 inequality constraints
Q 44.
Consider following assignment problem :
This problem has 2 optimal solutions. But in both solutions following assignment pairs are common :
I-> M1 and I-> M2
II -> M2
I -> M1 and IV-> M4
II -> M2 and III-> M3
Ans .
D
II -> M2 and III-> M3
Q 45.
Consider a following network with origin at O and destination at T
In this network :
There are 2 paths from O to T having shortest length of 16 units
There is only one paths from O to T having shortest length of 16 units
There are more than 2 paths with shortest length
shortest path can not be determined as the edges are not directed
Ans .
B
There is only one paths from O to T having shortest length of 16 units after applying shortest path algorithm.
Q 46.
In case of linear separability problem , the classes of pattern with ........ vector
can be separated with......... Surfaces
Single dimension Single Decision
MutiDimension Single Decision
Single Dimension multi decision
Multi dimension multi decision
Ans .
B
In case of linear separability problem , the classes of pattern with MutiDimension vector
can be separated with Single Decision Surfaces.
Q 47.
Which of following are true for neural networks ?
(i) Functioning of artificial neural network and biological neuron are similar
(ii) Time required to train a network depends on its size
(iii) Neural networks learn by example
(i) and (ii)
(i) and (iii)
(ii) and (iii)
(i) ,(ii) and (iii)
Ans .
C
Time required to train a network depends on its size and Neural networks learn by example.
Q 48.
In multilayer Perception , hidden nodes are :
Do not do any computation and won't assist in producing the output
have 0 as input value
have no direct connection to the input or output
have no direct connection to any other nodes
Ans .
B
In multilayer Perception , hidden nodes have 0 as input value
Q 49.
Which of following are true for neural networks ?
fuzzy sets defined on inverse of discourse X ={x1, x2, x3 }
and Y = {y1, y2} respectively. Which of following is/are
fuzzy Cartesian products ?
(i)
(iii)
(i) and (iii)
(ii) and (iii)
Ans .
D
(ii) and (iii) are valid
Q 50.
Let X be universe discourse, C be a class of subsets of X, and E, F belongs to C then for a fuzzy measure
g : C->R, Which of the following is additive ?
Ans .
D
g(EUF)= g(E) + g(F)
Q 51.
In a single processor system, there are four units of resource A, B and C, Which are to be shared by 3 processes.
The current scenario is described by allocation matrix, Which gives no of resources of each type allocated to each process and
request matrix, Which gives no of resources requested by each process to complete execution . Which process will complete first and which will be last ?
P1, P2
P0, P2
P1, P0
No processes will complete due to deadlock
Ans .
A
Process P1 completed first and P2 last
Q 52.
The unlink system call is used in UNIX as a unlink (Path name) Which of following statements are true ?
File is no more accessible
Call removes inode entry for that file
Call removes directory entry for that file
Call releases block to that file
(1),(2),(3)
(1),(2),(4)
(3)
(1),(3)
Ans .
C
Call removes directory entry for that file is correct.
Q 53.
Which of the following statements are true for variables in shell programming ?
Variables are declared before assigning value
Variables are case sensitive
To extract contents, variable name should be pressed by $
Clear command is used to clear list of variables
(1),(2) and (3)
(2) and (3)
(2) ,(3) and (4)
(1) ,(3) and (4)
Ans .
B
Variables are case sensitive and To extract contents, variable name should be pressed by $ are true
Q 54.
The first and last message received by Window5 Procedure in Win32 Window5 programming are :
WM_INIT, WM_QUIT
WM_INIT, WM_CLOSE
WM_ACTIVATE, WM_DEACTIVATE
WM_CREATE, WM_DESTROY
Ans .
D
WM_CREATE, WM_DESTROY
Q 55.
Which of following is true for timer messages in WIN32 Window5 programming ?
Timer messages are not queued but sent directly
Window5 combines multiple WM_TIMER messages
Busy application is not guaranteed to receive timer message
Timer messages are asynchronous
(1),(2) and (3)
(2) and (3)
(1) and (4)
(1) ,(2) and (4)
Ans .
B
Window5 combines multiple WM_TIMER messagesWindow5 combines multiple WM_TIMER messages and Busy application is not guaranteed to receive timer message are true
Q 56.
IThe advantages of integrated circuit over discrete device circuit due to following characteristic :
Smaller Size
Lower Cost
Higher reliability
All of the above
Ans .
D
Extremely small size � Thousands times smaller than discrete circuits. It is because of fabrication of various circuit elements in a single chip
of semiconductor material. Very small weight owing to miniaturised circuit. Very low cost because of simultaneous production of hundreds of similar
circuits on a small semiconductor wafer. Owing to mass production of an IC costs as much as an individual transistor. More reliable because of elimination
of soldered joints and need for fewer interconnections.
Lower power consumption because of their smaller size. Easy replacement as it is more economical to replace them than to repair them.
Q 57.
Cyclic code are used when is is required for :
Data Transfer
Arithmetic and logical computation
Continuously varying signal and representation
Counting no of bits
Ans .
C
Continuously varying signal representation
Q 58.
A microprocessor with 12 address lines is capable of addressing up to :
4096 Locations
1024 Locations
64K Locations
2048 Locations
Ans .
A
2^12 locations = 4096.
Q 59.
When RESET is performed in Intel 8085 microprocessor , The first operation is :
Stock Initialization
Instruction fetch from the location 2000H
Instruction fetch from the location 0000H
Memory Read from location 0000H
Ans .
C
After RESET instruction the processor execution will initialize from 0000H.
Q 60.
The Overflow flag is set in 8086 microprocessor when ............
Sum is more that the 16 bits
Carry and sign flag are set
Sign number go out of their range after arithmetic operation
None of the above
Ans .
C
Internally, the overflow flag is usually generated by an exclusive or of the internal carry into and out of the sign bit.
As the sign bit is the same as the most significant bit of a number considered unsigned,
the overflow flag is "meaningless" and normally ignored when unsigned numbers are added or subtracted.
Q 61.
Which of following is a data security threat :
Updation or deletion of data
Fraudulent manipulation of data
Hardware Failure
Privacy invasion
Ans .
A
privacy invasion
Q 62.
Consider situation that the transaction 'P' holds shared key lock X.
Also other transaction 'Q' request for shared key lock X then
Then request will be immediately granted
The deadlock situation is created
Request will be rejected after some time
Request will be granted at it is released by P
Ans .
A
Transaction hold shared lock on data item A .So any number of transaction can read that the data from the requesting item using shared locking .
So transaction B request will immediately granted.
Q 63.
In an Oracle which trigger type is fired during instance start-up :
Database Event
User Event
File Event
Record Event
Ans .
A
A trigger is like a stored procedure that Oracle Database invokes automatically whenever a specified event occurs.
Q 64.
The components of Oracle that contains memory structure and background process :
Database
Database File
Instance
Log File
Ans .
C
The SGA is a group of shared memory structures, known as SGA components, that contain data and control information for one Oracle Database instance.
Q 65.
Redo Log files are used for :
Shut Down
Instance Recovery
Archiving
Instance Start up
Ans .
B
the redo log files are used for instance recovery
Q 66.
Which of the following statements is false for random scan display systems ?
They can be display realistic shaded scenes
They are designed for line drawing applications
Pen plotter is an example of random scan hard-copy device
In a random scan display CRT the electronic beam is directed only to the part of screen where picture is to be drawn
Ans .
A
they can display realistic shaded scenes
Q 67.
The geometric entities like points , lines, curves in computer graphics are called as
Graphics Objects
Basic Objects
Control Objects
Primitives
Ans .
D
The basic geometric objects in computer graphics are usually called primitives or graphics output primitives
Q 68.
Z-Buffer or Depth Buffer algorithm is used for determining.....
Visible surfaces
Shading
Shadow
Transparency
Ans .
A
The basic idea is to test the Z-depth of each surface to determine the closest (visible) surface.
Q 69.
If a region code of a point is 1001 then point is in .........region of window
Top Right
Top Left
Bottom Right
Bottom Left
Ans .
B
Top left
Q 70.
A method for constructive solid geometry operations is ...........
Ray Casting
Ray Tracing
Beam Penetration
Ray Sorting
Ans .
A
Ray Casting is often used to implement CSG operation when objects are described with boundary representation.
Q 71.
Two processor running, one is user process and other one is operating System process later is called :
Kernel Process
Supervisor Process
System Process
Both A and B
Ans .
D
kernel process and supervisor process
Q 72.
............ and .............. are recommended functions to be defined in user program specification of UNIX Systems
return.yyparse() and fprint()
main() and yyerror()
yywrap() and yyerror()
main() and fprint()
Ans .
B
main() and yyerror() are recommended funv=ctions to be defined in user programme specification of Unix System.
Q 73.
Which of following regular expression identity is true ?
r(*)=r*
(r* S*)* = (r+s)*
(r+s)* = r* + s*
r* s* = r* + s*
Ans .
B
(r*s*)* = (r+s)*
Q 74.
For a given context free grammar G, give three string that are L(G)
bba, ab , ab
ab, ba, aab
ba, ba, aab
ab ,ab,abb
Ans .
B
ab, ba, aab
Q 75.
The coroutine is that ........... generalize subroutine to allow multiple entry points for
suspending and resuming execution at certain locations
Computer Programme
Computational Method
Computer Algorithm
Computer Software
Ans .
A
Coroutines are computer-program components that generalize subroutines for non-preemptive multitasking, by allowing multiple entry points for suspending and resuming execution at certain locations.