Académique Documents
Professionnel Documents
Culture Documents
The smallest integer that can be represented by an 8-bit number in 2s complement form is
(A) -256
(B) -128
(C) -127
(D) 0
2. The transport layer protocols used for real time multimedia, file transfer, DNS and email,
respectively are
(A) TCP, UDP, UDP and TCP
(B) UDP, TCP, TCP and UDP
(C) UDP, TCP, UDP and TCP
(D) TCP, UDP, TCP and UDP
3. Which one of the following expressions does NOT represent exclusive NOR of x and y?
(A) xy+x'y'
(B) xy'
(C) x'y
(D) x'y'
5. Consider a hard disk with 16 recording surfaces (0-15) having 16384 cylinders (0-16383) and
each cylinder contains 64 sectors (0-63). Data storage capacity in each sector is 512 bytes. Data
are organized cylinder-wise and the addressing format is . A file of size 42797 KB is stored in
the disk and the starting disk location of the file is . What is the cylinder number of the last sector
of the file, if it is stored in a contiguous manner?
(A) 1281
(B) 1282
(C) 1283
(D) 1284
7. The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35, 42.
Which one of the following is the postorder traversal sequence of the same tree?
(A) 10, 20, 15, 23, 25, 35, 42, 39, 30
(B) 15, 10, 25, 23, 20, 42, 35, 39, 30
(C) 15, 20, 10, 23, 25, 42, 35, 39, 30
(D) 15, 10, 23, 25, 20, 35, 42, 39, 30
9. The relation R is
(A) in 1NF, but not in 2NF.
(B) in 2NF, but not in 3NF.
(C) in 3NF, but not in BCNF.
(D) in BCNF
15. What item is at the root after the following sequence of insertions into an empty splay tree :
1, 11, 3, 10, 8, 4, 6, 5, 7, 9, 2, ?
(A) 1 (B) 2
(C) 4 (D) 8
16. Suppose we are implementing quadratic probing with a Hash function, Hash (y)5X mode
100. If an element with key 4594 is inserted and the first three locations attempted are
already occupied, then the next cell that will be tried is :
(A) 2 (B) 3
(C) 9 (D) 97
17. Semaphores are used to :
(A) Synchronise critical resources to prevent deadlock
(B) Synchronise critical resources to prevent contention
(C) Do I/o
(D) Facilitate memory management
18. In which of the following storage replacement strategies, is a program placed in the largest
available hole in the memory ?
First
(A) Best fit (B) fit
(C) Worst fit (D) Buddy
19. Which transport class should be used with residual-error network layer ?
(A) TP0, TP2 (B) TP1, TP3
(C) TP1, TP3, TP4 (D) TP0, TP1, TP2, TP3, TP4
24. T is a graph with n vertices. T is connected and has exactly n-1 edges, then :
(A) T is a tree
(B) T contains no cycles
(C) Every pairs of vertices in T is connected by exactly one path
(D) All of these
30. A sum of products expression can be implemented with __________ logic gates.
(A) AND OR (B) NAND OR
(C) AND NOT (D) OR AND
35. Which of the following tools is not required during system analysis phase of system
development life cycle ?
(A) Case tool (B) RAD tool
(C) Reverse engineering (D) None of these
37. Which algorithm has same average, worst case and best case time ?
(A) Binary search (B) Maximum of n number
(C) Quick sort (D) Fibonacci search
(A) 3F2.89
(B) 3F2.98
(C) 2F3.89
(D) 2F3.98
Codes :
a b c d e
(A) iv v ii iii i
(B) v iv i ii iii
(C) i iii ii v iv
(D) i ii iv iii v
45. Main ( )
{ char *str = abcde; printf
(%c, *str);
printf (%c, *str++);
printf (%c, *(str++));
printf (%s, str);}
The output of the above C code will be :
(A) a a c b c d e (B) a a c c c d e
(C) a a b c d e (D) None of these
54. Which of the following is the correct value returned to the operating system upon the
successful completion of a program ?
a. 0
b. 1
c. 1
d. Program do not return a value
55. A computer program selects an integer in the set {k : 1 k 10,00,000} at random and
prints out the result. This process is repeated 1 million times. What is the probability that the
value k = 1 appears in the printout atleast once ?
57. Which of the following differentiates between overloaded functions and overridden
functions ?
(A) Overloading is a dynamic or runtime binding and overridden is a static or compile
time binding.
(B) Overloading is a static or compile time binding and overriding is dynamic or
runtime binding.
(C) Redefining a function in a friend class is called overloading, while redefining a
function in a derived class is called as overridden function.
(D) Redefining a function in a derived class is called function overloading, while
redefining a function in a friend class is called function overriding.
60. When the inheritance is private, the private methods in base class are __________ in the
derived class (in C++).
(1) inaccessible (2) accessible (3) protected (4) public
63. In the indirect addressing scheme, the second part of an instruction contains :
(A) the operand in decimal form
(B) the address of the location where the value of the operand is stored
(C) the address of the location where the address of the operand is stored
(D) the operand in an encoded form
65. In order to build a MOD - 18 counter, the minimum number of flip flops needed is equal to :
(A) 18 (B) 9
(C) 5 (D) 4
71. If an integer needs two bytes of storage, then the maximum value of unsigned integer is
(E) 216 1
(F) 215 1
(G) 216
(H) 215
72. Interrupts which are initiated by an instruction are
a. Internal
b. External
c. Hardware
d. Software
(A) Microprocessor
(B) Memory
76. In the balanced binary tree given below, how many nodes will become unbalanced when a
node is inserted as a child of the node g ?
(A) 1 (B) 3 (C) 7 (D) 8
77. T is a graph with n vertices. T is connected and has exactly n-1 edges, then :
(E) T is a tree
78. The initial configuration of quaue is a, b, c, d. a is at the front. To get the configuration d, c,
b, a how many deletions and additions required :
(J) A tree is a connected graph with n21 edges where n is the number of vertices in the
graph.
(K) A tree is an acyclic graph with n21 edges where n is the number of vertices in the
graph.
80. Which of the following is true for a sorted list with n elements ?
(C) Searching for a key in a sorted array can be done in O(log n) time.
(D) Searching for a key in a sorted linear linked list can be done in O(log n) time
81. At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in
and park right behind the car in front of them, one behind another. A car cant leave until all the
cars in front of it have left. Is the parking lot more like
82. With regard to linked list, which of the following statement is false ?
(A) An algorithm to search for an element in a singly linked list requires 0(n) operations
in the worst case.
(B) An algorithm for deleting the first element in a singly linked list requires 0(n)
operations in the worst case.
(C) An algorithm for finding the maximum value in a circular linked list requires 0(n)
operations.
(D) An algorithm for deleting the middle node of a circular linked list requires 0(n)
operations.
(G) Disk data transfer rates are much less than memory data transfer rate
84. Leaves of which of the following trees are at the same level ?
a. Binary tree
b. B-tree
c. AVL-tree
d. Expression tree
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the
result of its basic operations.
S2 : The elements of a priority queue may be complex structures that are ordered on one or
several fields.
Which of the following is correct ?
(A)
(B)
(C)
(D)
90. Which is the correct definition of a valid process transition in an operating system ?
(A) Wake up : Ready Running
(B) Dispatch : Ready Running
(C) Block : Ready Running
(D) Timer run out : Ready Blocked
92. Loading operating system from secondary memory to primary memory is called
____________ .
(A) Compiling (B) Booting
(C) Refreshing (D) Reassembling
95. Suppose it takes 100 ns to access a page table and 20 ns to access associative memory with a
90% hit rate, the average access time equals :
(A) 20 ns (B) 28 ns (C) 90 ns (D) 100 ns
98. Given memory partitions of 100 K, 500 K, 200 K, 300 K and 600 K (in order) and processes
of 212 K, 417 K, 112 K, and 426 K (in order), using the first-fit algorithm, in which partition
would the process requiring 426 K be placed ?
(I) 500 K
(J) 200 K
(K) 300 K
(L) 600 K
102. Device on one network can communicate with devices on another network via a
Utility
(A) Hub/Switch (B) server
(C) File server (D) Gateway
109. For a data entry project for office staff who have never used computers before (user
interface and user-friendliness are extremely important), one will use
A Spiral model
B Component based model
C Prototyping
D Waterfall model