Académique Documents
Professionnel Documents
Culture Documents
5. ±ÜÅÍW
°æ ÚÜ Wæ EñܤÃWÜ ÙÜ ®Ü áÜ ° , ±Ü£ÅPæ III ±ÜâÔ¤PÁ æ ãÙÜWæ PæãqrÃáÜ ÊÜ OMR EñܤÃÜ ÖÝÙæ¿áÈÉ where (C) is the correct response.
ÊÜÞñÜÅÊÜàæ ÓÜãbÓÜñPÜ RÜ ¨áÜ ª. OMR EñܤÃÜ ÖÝÙæ¿áÈÉ®Ü AívÝPÜê£ ÖæãÃÜñáÜ ±ÜwÔ ¸æàÃæ 5. Your responses to the question of Paper III are to be indicated
¿ÞÊÜâ¨æà Óܧ٨ Ü ÈÜ É WÜáÃÜá£Ô¨ÜÃ,æ A¨ÜÃÜ ÊÜåèÆÂÊÜÞ±Ü®Ü ÊÜÞvÜÇÝWÜáÊÜâ©ÆÉ. in the OMR Sheet kept inside the Booklet. If you mark at any
place other than in the ovals in OMR Answer Sheet, it will not be
6. OMR EñܤÃÜ ÖÝÙæ¿áÈÉ Pæãor ÓÜãaÜ®æWÜÙÜ®Üá° hÝWÜÃÜãPÜñæÀáí¨Ü K©Ä. evaluated.
7. GÇÝÉ PÜÃÜvÜá PæÆÓÜÊÜ®Üá° ±ÜâÔ¤Pæ¿á Pæã®æ¿áÈÉ ÊÜÞvÜñÜPÜR¨Ü᪠. 6. Read the instructions given in OMR carefully.
8. ¯ÊÜá¾ WÜáÃÜáñÜ®Üá° ×ÃÜíWܱÜwÓÜÖÜá¨Ý¨Ü ¯ÊÜá¾ ÖæÓÜÃÜá A¥ÜÊÝ ¿ÞÊÜâ¨æà 7. Rough Work is to be done in the end of this booklet.
bÖæ°¿á®Üá° , ÓÜíWÜñÜÊÝ¨Ü ÓܧÙÜ ÖæãÃÜñÜá ±ÜwÔ, OMR EñܤÃÜ ÖÝÙæ¿á ¿ÞÊÜâ¨æà 8. If you write your name or put any mark on any part of the OMR
Answer Sheet, except for the space allotted for the relevant
»ÝWܨÈÜ É Ãæ¨ÃÜ ,æ ¯àÊÜâ A®ÜÖìÜ ñæWæ ¸Ý«ÜÂÃÝXÃÜᣤàÄ.
entries, which may disclose your identity, you will render yourself
9. ±ÜÄàPæÒ¿áá ÊÜááX¨Ü®ÜíñÜÃÜ, PÜvÝx¿áÊÝX OMR EñܤÃÜ ÖÝÙæ¿á®Üá° ÓÜíËàPÜÒPÜÄWæ liable to disqualification.
¯àÊÜâ ×í£ÃÜáXÓܸàæ PÜá ÊÜáñÜᤠ±ÜÄàPÝÒ PæãsÜw¿á ÖæãÃÜWæ OMR ®Üá° ¯Êæã¾í©Wæ 9. You have to return the test OMR Answer Sheet to the invigilators
Pæãívæã¿á PÜãvܨÜá. at the end of the examination compulsorily and must NOT
10. ±ÜÄàPæÒ¿á ®ÜíñÜÃÜ, ±ÜÄàPÝÒ ±ÜÅÍæ° ±Ü£ÅPæ¿á®Üá° ÊÜáñÜᤠ®ÜPÜÆá OMR EñܤÃÜ ÖÝÙæ¿á®Üá° carry it with you outside the Examination Hall.
10. You can take away question booklet and carbon copy of
¯Êæã¾í©Wæ ñæWæ¨ÜáPæãívÜá ÖæãàWÜÖÜá¨Üá.
OMR Answer Sheet soon after the examination.
11. ¯àÈ/PܱâÜ ³ ¸ÝÇ
±ÝÀáíp
±æ®
ÊÜÞñÜÅÊæà E±ÜÁãàXÔÄ. 11. Use only Blue/Black Ball point pen.
12. PÝÂÆáRÇàæ oÃ
A¥ÜÊÝ ÇÝW
pæàÇ
CñÝ©¿á E±ÜÁãàWÜ樆 áÜ ° ¯ÐæàÓÜÇÝX¨æ. 12. Use of any calculator or log table etc., is prohibited.
13. ÓÜÄ AÆÉ¨Ü EñܤÃÜWÜÚWæ Má| AíPÜ CÃÜáÊÜâ©ÆÉ . 13. There is no negative marks for incorrect answers.
K-2413 1 ±Üâ.£.®æãà./P.T.O.
*K2413* Total Number of Pages : 16
(iii) First ICW is initialized and then of chips needed and type of multiplexor
OCW required are
(iv) It has three status registers
(A) 16 and 2 : 4
(A) All above statements are true
(B) 32 and 3 : 8
(B) First three statements are true
(C) Only last three are true (C) 8 and 3 : 8
(D) Only (ii) and (iii) are true (D) 256 and 3 : 8
6. Create, Alter and Drop are the examples of 10. When a transaction never progresses
then we say that it is
(A) DDL
(D) Locked
7. What is the cardinality of a table with 50
rows and 5 coloums ?
11. The phenomenon of having a continuous
(A) 5 glow of a beam on the screen even after
(B) 50 it is removed is called as ?
13. The format for storing digital audio in 15. Match the following :
(i) Homogeneous (a) Shading
multimedia application
Coordinate
(A) JPEG (ii) Phong model (b) Clipping
(iii) BSP Tree (c) Translation
(B) TIFF (iv) Cyrus Beck (d) Back to front
ordering
(C) WAV
(A) (i b) (ii a) (iii d) (iv c)
(D) BMP (B) (i d) (ii c) (iii b) (iv a)
(C) (i c) (ii b) (iii d) (iv a)
14. The following statements are made with (D) (i c) (ii a) (iii d) (iv b)
19. Which falls under regular paradigm ? 23. Flow control takes place at what level in
(A) Java (B) Lisp OSI model ?
26. The order of time complexities from most 29. A hash table of length 10 uses open
efficient to least efficient is addressing with hash function h(K) = K
mod 10, and linear probing. After inserting
(A) O(2n), O(n2), O(nlogn), O(n), O(logn)
6 values into an empty hash table, the
2 n
(B) O(n), O(n ), O(2 ), O(logn), O(nlogn) table is as shown below
(C) O(logn), O(n), O(nlogn), O(n2), O(2n)
2 n
(D) O(nlogn), O(logn), O(n ), O(n), O(2 )
"
for i = 1 to n # #
insert (i2, s)
$ " $
for i = 1 to n
% ! !
remove (s)
&
28. What is the maximum height of any (D) 42, 46, 33, 23, 34, 52
AVL-tree with 7 nodes ? Assume the
length of the tree with a single node is 30. Which of the following sorting algorithms
0(zero) has the lowest worst-case complexity ?
31. What does the statement 34. Forcing variable type to become another
type before accessing an appropriate
import Java.util. ;
function is known as
Import ?
(A) Regression
(A) All the classes in the package
(B) Recursion
Java.util
(C) Conversion
(B) All the methods in the class Java.util
(D) Coercion
(C) All the packages starting with
Java.util 35. The type to be used in an instantiation of
a class template follows
(D) None of these
(A) The generic class name
prints
36. Which of the following is NOT desired in
(A) 0 a good SRS document ?
(B) Not highly cohesive but loosely (B) Often used for the development of
coupled client/server applications
(C) Only used for development of
(C) Highly cohesive and tightly coupled
parallel and distributed systems
(D) Not highly cohesive but tightly (D) Used whenever a large number of
coupled change requests are anticipated
38. Project risk factor is considered in 42. Assume IBM machine consists of 24-bit
logical address. The page size is 2 KB.
(A) Spiral model
How many bits are adequate to address
(B) Waterfall model the bytes in pages ?
(C) Prototyping model (A) 11
(D) Iterative enhance model (B) 13
(C) 15
39. The testing technique that requires
devising test cases to demonstrate that (D) 17
each program function is operational is
called 43. CPU generates
46. When the prolog system is entered we 50. Match the following terms to their
are at top level. The system is waiting for meaning
us to initiate a (I) Turing test (a) S o f t w a r e
designed to
(A) Conversation replicate the
knowledge of
(B) Translation
human expert
(C) Procedure (II) Expert system (b) Spanish hola
for English
(D) Conversion hello
(III) Automatic (c) First Area of
47. The method known for variation on hill translation A.I. Research
climbing and the idea to include a (IV) Checkers and (d) If it acts
general survey of scene to avoid quest intelligent, It is
intelligent
climbing false foot hills
(I) (II) (III) (IV)
(A) Best first search
(A) (d) (a) (b) (c)
(B) Simulated annealing
(B) (d) (a) (c) (b)
(C) Worst case search (C) (d) (b) (c) (a)
(D) Blind search (D) (a) (b) (c) (d)
52. A formal grammar is a __________ for 55. Which of the following regular
rewriting string. expression denotes a language
comprising of all possible strings over
(A) Set rules
= {a, b} of length n where n is multiple
(B) Set of functions of 3.
(C) Both (A) and (B) (A) (a + b + aa + bb + aba + bba)
59. The mutual information I(x; y) and joint 61. Which of the following is valid objective
entropy H(x; y) are related as function for a linear programming
problem ?
(A) I(x; y) = H(x) H(x/y)
(A) Max 5xy
(B) I(x; y) = H(x) H(y/x)
2 2
(B) Max 5x + y
(C) I(x; y) = H(y) H(x/y)
(C) Max 4x + 3y + (2/3)z
(D) I(x; y) = H(y) H(y/x)
(D) Min (x1 + x2)/x3
All Symbols have their usual meaning
62. A constraint that does not affect the
60. Four classes of signals and their spectral feasible region is a
characteristics are given below. Match
(A) Non-negativity constraint
them as per their characteristics
(B) Redundant constraint
Signal Type Spectral
(C) Standard constraint
characteristics
(1) Continuous, (a) Continuous, (D) Slack contraint
aperiodic aperiodic
63. Slack is
(2) Continuous, (b) Continuous,
(A) Difference between left and right
periodic periodic
sides of constraint
(3) Discrete, (c) Discrete,
aperiodic aperiodic (B) The amount by which left side
a< constraint is smaller than the right
(4) Discrete, (d) Discrete,
side
periodic periodic
(C) The amount by which left side of
(A) (1 a) (2 b) (3 c) (4 d) a > constraint is larger than right side
(B) (1 a) (2 c) (3 b) (4 d) (D) Exists for each variable in a linear
(C) (1 d) (2 a) (3 c) (4 b) programming problem
(D) (1 b) (2 a) (3 d) (4 c)
(C) x
0 69. What are the following sequence of steps
(D) x + y 20
taken in designing fuzzy logic machine ?
(A) Fuzzification Rule evaluation
70. Considering a graphical representation 73. In unix file system and represents
of the tallness of a people using its
(A) Parent, current
appropriate member function, which of
the following combinations are true (B) Parent, parent
(i) TALL is usually the fuzzy set (C) Current, parent
(ii) HEIGHT is usually the fuzzy set
(D) Current, current
(iii) PEOPLE is usually the universe of
discourse 74. In unix, the command j chmod 664 file
(A) (i), (ii) and (iii) represent
(B) (i) and (ii) only
(A) User and group read + write, others
(C) (i) and (iii) only write only
(D) (ii) and (iii) only
(B) User and group read + write, others
read only
71. In vi editor which of the following
keystrokes can delete the current line ? (C) User and group read, others read
(A) d only
_________________