1)Which one of the following is Not necessarily a property of a Group?
a)Commutativity
b)Associativity
c)Existance of inverse for every element
d)Existance of identity
2)External Interrupt may not arise because of:
a)Illegal or erroneous use of an instruction
b)a timing device
c)external source
d)I/O device
3)Which of the following need not be a binary tree?
a)Search tree
b)Heap
c)AVL tree
d)B tree
4)A top down parser generates:
a)Left most derivation
b)Right most derivation
c)Left most derivation in reverse
d)Right most derivation in reverse
5)What will be the Excess-3 code for 1001?
a)1001
b)1010
c)1011
d)1100
6)Syntax directed translation scheme is desirable because:
a) it is based on syntax
b)it is easy to modify
c)its description is independent of any implementation
d)all of these
7)The output of lexical analyzer is:
a)A set of regular expressions
b)Strings of character
c)Syntax tree
d)Set of tokens
8) Which of the following is not defind in a good software requirement specification(SRS )document?
a)Functional requirement
b)Goals of implementation
c)Non functional requirement
d)Algorithm for software implementation
9)T1 carrier system is used:
a)For delta modulation
b)Industrial noise
c)for frequency modulated signals
d)None of the above
10) What is described by means of DFDs as studied earlier and represented in algebraic form?
a)Data flow
b)Data storage
c)Data structures
d)Data elements
11)The IOS class member function used for formatting I/O is :
a)width(),precision(),read()
b)width(),precision(),setf()
c)getch(),width(),Io()
d)unsetf(),setf(),write()
12)The knapsack problem belongs to which domain of problems?
a)Optimization
b)NP Complete
c)Linear Solution
d)Sorting
13)The structure or format of data is called:
a)Syntax
b)Struct
c)Semantic
d) None of the above
14)What is the solution to the recurrence T(n)= T(n/2)+n?
a)O(log(n))
b)O(n)
c)O(nlogn)
d)None of these
15)Let A,B,C,D be n*n matrices,each with non-zero determinant. if ABCD=1, then B^-1 is :
a)D^-1C^-1A^-1
b)CDA
c)ADC
d)Does not necessarily exist
16) Rule which states that addition of same attributes to right side and left side will result in other valid dependency is classified as :
a) referencial rule
b)inferencial rule
c)augmentation rule
d)reflexive rule
17)If L1 is CFL and L2 is regular language which of the following is false?
a)L1-L2 is not context free
b)L1 intersection L2 is context free
c)- L1 is context free
d) Both a) and c)
18) The sequence of operations in which PCM is done is :
a) Sampling,quantizing,encoding
b)Quantizing,sampling,encoding
c)Quantizing,encoding,sampling
d)None of the above
19)What will be the output if you will compile and execute the following c code?
void main(){
printf("%d",sizeof(5.2));
}
a)4
b)8
c)2
d)16
20)The graph that shows basic blocks and their successor relationship is called:
a)DAG
b)Control graph
c)Flow graph
d)Hamiltonion graph
21)Where does the swap space reside?
a) ram
b)rom
c)disk
d)on-chip cache
22)How many onto(or surjective) fuctions are there from an n-element(n>=2) set to a 2-element set?
a)2^n
b)2^n-1
c)2^n-2
d)2(2^2-2)
23)Let G be a simple undirected planar graph on 10 vertices with 15 edges. If G is a connected graph, then the number of bounded faces in any embedding of G on the plane is equal to:
a)3
b)4
c)5
d)6
24)A nonpipeline system takes 50ns to process a task. The same task can be processed in a six-segment pipeline with a clock cycle of 10ns.Determine the speedup ration of the pipeline for 100 tasks. What is the maximum speedup that can be achieved?
a)4.90,5
b)4.76,5
c)3.90,5
d)4.30,5
25)Consider the function f(x)=sin(x) in the interval {pi/4,7pi/4}. The number and locations of the local minima of this function are:
a) one,at pi/2
b)one,at 3pi/2
c)two, at pi/2 and 3pi/2
d)two,at pi/4 and 3pi/2
26)If every functional dependency in set E is also in closure of F then this is classified as:
a)FD is covered by E
b)E is covered by F
c)F is covered by E
d)F plus is covered by E
27)Communication between a computer and a keyboard involves ............... transmission
a)Simplex
b)Half duplex
c)Automatic
d)Full-duplex
28)A low pass filter is:
a)Passes the frequencies lower than the specified cut off frequency
b)Used to recover signal from sampled signal
c)Rejects higher frequencies
d)All of the above
29)Consider a system with m resources of same type being shared by n processes. Resources can be requested and released by processes only one at a time. The system is deadlock free if and only if:
a)The sum of all max needs is <m+n
b)Both of above
c)The sum of all max need is>m+n
d)None
30)What will be the final output of D-flipflop, if the output string is 11010011
a)1
b)0
c)Don't care
d)None of above
31) The IETF standard documents are called:
a)RFC
b)RCF
c)ID
d)none of the above
32)Process that periodically checks status of an I/O devices is known as:
a) Cold swapping
b) I/O instructions
c)polling
d)Dealing
33)The decimal equivalent of the Hexadecimal number(A09D)16 is :
a)31845
b)41117
c)41052
d)32546
34)The first Network:
a)ARPANET
b)NFSNET
c)CNNET
d)ASAPNET
35)(00+01+10)(0+1)* represents:
a)Strings not starting with 11
b)String of odd length
c)String starting with 00
d)String of even length
36) Which of the following is wrong?
a)Turing machine is a simple mathematical model of general purpose computer
b)Turing machine is more powerful than finite Automata
c)Turing machine can be simulated by a general purpose computer
d)All of these
37)Two main measures for the efficiency of an algorithm are:
a)Processor and Memory
b)Complexity and Capacity
c)Time and Space
d)Data and Space
38)The noise due to random behavior of charge carrier is:
a)Partition noise
b)Industrial noise
c)Shot noise
d)Flicker noise
39)The running time of Quick sort algorithm depends heavily on the selection of:
a)No of inputs
b)Arrangements of elements in an array
c)Size of elements
d)Pivot Element
40)Palindromes can't be recognized by any Finite State Automata because:
a)FSA cannot remember arbitrarily large amount of information
b)FSA cannot deterministically fix the midpoint
c)Even if the midpoint is known an FSA cannot find whether the second half of the string matches the first half
d) All of the above
41)A sinusoidal signal is analog signal, because:
a)it can have a number of values between the negative and positive peaks
b)it is negative for one half cycle
c)it is positive for one half cycle
d)it has positive as well as negative values
42)The principle of locality of reference justifies the use of:
a)Non reusable
b)Cache memory
c)Virtual memory
d)None
43)Considering relational database, functional dependency between two attributes A and B is denoted by:
a)A->B
b)B<-A
c)AB->R
d)R<-AB
44)The concept of order Big O is important because:
a)It can be used to decide the best algorithm that solves a given problem
b)It is the lower bound of the growth rate of algorithm
c)It determines the maximum size of a problem that can be solved in a given amount of time
d)Both a) and b)
45)CPU consist of ...................
a)ALU and control unit
b)ALU , Control unit and Monitor
c) ALU, Control unit and Hard disk
d)ALU , Control unit and register
46) What will be output if you will compile and execute the following c code?
void main()
{
char c =125;
c=c+10;
printf("%d",c);
}
a)135
b)115
c)-121
d)-8
47)The addressing mode used in an instruction of the form ADD X,Y is...........
a)Direct
b)Absolute
c)Indirect
d)indexed
48) If there is more than one key for relation schema in DBMS then each key in relation schema is classified as:
a)prime key
b)super key
c)candidate key
d)primary key
49)In which one of the following pages replacement policies, Belady's anomaly may occur?
a)FIFO
b)LRU
c)Optimal
d)MRU
50) Bluetooth is an example of :
a)personal area network
b)virtual private network
c)local area network
d)none
51) Software Requirement Specification(SRS) is also known as specification of :
a)White box testing
b)Integrated testing
c)Acceptance testing
d)black box testing
52)A process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication is called............
a)Local procedure call
b)Remote procedure call
c)Inter Process Communication'
d)Remote machine invocation
53)What is the testing to ensure the WebApp properly interfaces with other applications or databases?
a)Compatibility
b)Interoperability
c)Performance
d)Security
54)The maximum number of nodes in a binary tree of level ,k k>=1 is:
a)2^k+1
b)2^(k-1)
c)2^k - 1
d)2^(k-1) - 1
55)The identification of common sub-expression and replacement of run-time computations by compile-time computation is :
a)Local optimization
b)Constant folding
c)Loop optimization
d)Data flow analysis
56)Process of analysing relation schemas to achieve minimal redundancy and insertion or update anomalies is classified as:
a)normalization of data
b)denomination of data
c)isolation of data
d)de-normalization of data
57)Line of code(LOC) of product comes under which type of measures?
a)Indirect measures
b)Coding
c)Direct measures
d)None
58)
The circuit is equivalent to:
a)OR gate
b) NOR gate
c)AND gate
d)Ex-Or gate
59)Given two DFA's M1 and M2.They are equivalent if:
a)M1 and M2 has the same number of state
b)M1 and M2 accepts the same language ie L(M1) =L(M2)
c)M1 and M2 has the same number of final states
d)None
60)
What will be the equation of simplification of the given K-Map?
a)~A~B~D+~CD+A~B~C
b)~BC~D+A~B~C+~A~C
c)~B~D+~C~D
d)~CD+~BC~C