Ans .
C
The ternary operators cannot be overloaded,
Ans .
A
Data member of derived class of X
Ans .
A
Constructors are not virtual
Ans .
B
allm objects are destroid when program is terminated
Ans .
D
In access control in a protected derivation, visibility modes will change as public and protected become protected
Ans .
C
reliability is most important aspect of software design.
Ans .
C
major characteristics of agil process is:document is minimal
Ans .
B
Ans .
D
Ans .
B
In case of distributed memory parallel System, Which of the techniques used for compile time transformation for accessing remote data
Ans .
B
In a system there are several process executives, in this scenario which process can be affected by the execution
Ans .
C
The Operating System memory management "Compassion" is defined as :
Ans .
A
Consider a following program code fragment
main()
{
if(fork() > 0)
sleep(100);
}
Result in the creation of :
Ans .
B
Suppose there is system consisting of 4 resources of same time that are shared by 3 processes each of which needs at most 2 resources under this condition whether system will be in ............
Ans .
B
Prospector is application of :
Ans .
B
{7(a-> B), B-> 7 } is for :
Ans .
C
|---t1----|
                          |---t2----|
The two temporal t1 and t2 will :
Ans .
B
Which of the following is a AI search
Ans .
D
Which of the following is a knowledge representation
Ans .
D
In the following FSM
is equivalent to :
Ans .
B
Write a regular expression which is starting with 10 followed by any number of 0's and 1's to :?
Ans .
D
The regular expression (R+S)* is equivalent to :
Ans .
C
The following regular expression P -> 0P1/1/ e will give :
Ans .
D
The Turing machine used for ............
Ans .
D
Which of following are properties of channel capacity for an input alphabet x and output alphabet y ?
(i) c >= 0
(ii) c <= log|x|
(iii) c >= log|y|
Ans .
A
The data contains five different symbols whose occurrence are as shown below :
Symbol : A   B   C   D   E
Frequency : 24   12   10   8   8
How much bit of space is required to store above data, when these symbols are coding as per Huffman coding
Ans .
B
Linear Code is a :
Ans .
B
Which of statement is/are correct ?
(i) In fourier transformed images, at location F(0,0) average value of input image is available
(ii) High pass filter is useful to reduce small dots
Ans .
A
when compressing images which of the following redundancy/ redundancies need to be addressed ?
Ans .
D
Consider following Linear Programming Problem :
Maximize : Z = 20 x1 + 10 x2
Subject to : x1 + 2x2 <= 40
        3x1 + x2 >= 30
        4x1 + 3x2 >= 60
        x1, x2 >= 0
Q.31 Which of following points are in feasible region ?
Ans .
B
The dual of this problem
Ans .
C
Consider the following Transformation :
Ans .
B
Consider following assignment problem :
This problem has 2 optimal solutions. But in both solutions following assignment pairs are common :
Ans .
D
Consider a following network with origin at O and destination at T
In this network :
Ans .
B
In case of linear separability problem , the classes of pattern with ........ vector can be separated with......... Surfaces
Ans .
B
Which of following are true for neural networks ?
(i) Functiong of artificial neural network and biological neuron are similar
(ii) Time required to train a network depends on its size
(iii) Neural networks learn by example
Ans .
C
In multilayer Perception , hidden nodes are :
Ans .
B
Which of following are true for neural networks ?
Ans .
D
Let X be universe discourse, C be a class of subsets of X, and E, F belongs to C then for a fuzzy measure g : C->R, Which of the following is additive ?
Ans .
D
In a single processor system, there are four units of resource A, B and C, Which are to be shared by 3 processes. The current scenario is described by allocation matrix, Which gives no of resources of each type allocated to each process and request matrix, Which gives no of resources requested by each process to complete execution . Which process will complete first and which will be last ?
Ans .
A
The unlink system call is used in UNIX as a unlink (Path name) Which of following statements are true ?
File is no more accessible
Call removes inode entry for that file
Call removes directory entry for that file
Call releases block to that file
Ans .
C
Which of the following statements are true for variables in shell programming ?
Variables are declared before assigning value
Variables are case sensitive
To extract contents, variable name should be pressed by $
Clear command is used to clear list of variables
Ans .
B
The first and last message received by Window5 Procedure in Win32 Window5 programming are :
Ans .
D
Which of following is true for timer messages in WIN32 Window5 programming ?
Timer messages are not queued but sent directly
Window5 combines multiple WM_TIMER messages
Busy application is not guaranteed to receive timer message
Timer messages are asynchronous
Ans .
B
IThe advantages of integrated circuit over discrete device circuit due to following characteristic :
Ans .
D
Cyclic code are used when is is required for :
Ans .
C
Continuously varying signal representatiom
A microprocessor with 12 address lines is capable of addressing up to :
Ans .
A
2^12 locations = 4096
When RESET is performed in Intel 8085 microprocessor , The first operation is :
Ans .
C
After RESET instruction the processor execution will initialize from 0000H.
The Overflow flag is set in 8086 microprocessor when ............
Ans .
C
Internally, the overflow flag is usually generated by an exclusive or of the internal carry into and out of the sign bit. As the sign bit is the same as the most significant bit of a number considered unsigned, the overflow flag is "meaningless" and normally ignored when unsigned numbers are added or subtracted.
Which of following is a data security threat :
Ans .
A
privacy invasion
Consider situation that the transaction 'P' holds shared key lock X. Also other transaction 'Q' request for shared key lock X then
Ans .
A
Transaction hold shared lock on data item A .So any number of transaction can read that the data from the requesting item using shared locking .So transaction B request will immediately granted.
In an Oracle which trigger type is fired during instance start-up :
Ans .
A
A trigger is like a stored procedure that Oracle Database invokes automatically whenever a specified event occurs.
The components of Oracle that contains memory structure and background process :
Ans .
C
The SGA is a group of shared memory structures, known as SGA components, that contain data and control information for one Oracle Database instance.
Redo Log files are used for :
Ans .
B
the redo log files are used for instance recovery
Which of the following statements is false for random scan display systems ?
Ans .
A
they can display realistic shaded scenes
The geometric entities like points , lines, curves in computer graphics are called as
Ans .
D
The basic geometric objects in computer graphics are usually called primitives or graphics output primitives
Z-Buffer or Depth Buffer algorithm is used for determining.....
Ans .
A
The basic idea is to test the Z-depth of each surface to determine the closest (visible) surface.
If a region code of a point is 1001 then point is in .........region of window
Ans .
B
Top lef
A method for constructive solid geometry operations is ...........
Ans .
A
Ray Casting is often used to implement CSG operation when objects are described with boundary representation.
Two processor running, one is user process and other one is operating System process later is called :
Ans .
D
kernel process and supervisor process
............ and .............. are recommended functions to be defined in user program specification of UNIX Systems
Ans .
B
main() and yyerror() are recommended funv=ctions to be defined in user programme specification of Unix System.
Which of following regular expression identity is true ?
Ans .
B
(r*s*)* = (r+s)*
For a given context free grammar G, give three string that are L(G)
Ans .
B
ab, ba, aab
The coroutine is that ........... generalize subroutine to allow multiple entry points for suspending and resuming execution at certain locations
Ans .
A
Coroutines are computer-program components that generalize subroutines for non-preemptive multitasking, by allowing multiple entry points for suspending and resuming execution at certain locations.
The maximum size of data transmission using selective repeat protocol with 8 bit frame sequence number is :
Ans .
B
In Selective Reject (or Selective Repeat), maximum size of window must be half of the maximum sequence number.
Suppose class based schema used in university computer centre . Class C address with subnet mask is adopted for network is 255.255.255.254 , then how many subnets and systems per subnet possible
Ans .
D
128,0
The Denial of Service (DOS) attacked on
Ans .
B Denial-of-service (DoS) attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them.
The Digital Signal to be designed to permit 160kbps of data rate for bandwidth of 20 kHz. What will be
(i) no of levels and
(ii) S/N ratio
Ans .
D
4, 24.07 dB
The difference between congestion control and flow control .........:
Ans .
A,B
Flow control is local phenomenon whicle congestion control is global phenomenon
Flow control uses timers whicle congetion control uses retransmissions
For Sorting ____________.algorithm scans list by swapping entries whenever pair of adjacent key out of desired order
Ans .
D
As in bubble sort always we swap the adjacent keys if they are not in desired order
For the following :
(i) To solve problem linear algorithm must be faster than quadratic algorithm
(ii) An Algorithm with worst case time behaviour = 3n takes 30 operations for every input of size n=10
Ans .
D
As the first statement is true according to the definition of linear algorithms, the second is false as 30 operations are not needed.
The Best and Worst case Complexity of quick sort is :
Ans .
C
Worst-case performance :O(n2)
Best-case performance :O(n log n) (simple partition) or O(n) (three-way partition and equal keys)
Average performance :O(n log n)
For job sequence problem :
Item : 1     2     3     4     5     6     7
Profit : 3     5     20     18     1     6     30
Deadline : 1     3     4     3     2     1     2
Which is the Optimal Value ?
Ans .
B
For the following Statements :
(i) 3 COL : Given a graph G can be painted in 3 Colours.
(ii) COLO : Given a graph G Find Chromatic Number of G.
(iii) COLC : Given a graph Find Optimal Colouring of G.
Select correct Answer :
Ans .
B
(i)3 COL : Given a graph G can be painted in 3 Colours. : NP complete
(ii) COLO : Given a graph G Find Chromatic Number of G. : NP Hard
(iii) COLC : Given a graph Find Optimal Colouring of G. : NP Hard