Professional Documents
Culture Documents
Fs/Ocy - G: Reorfl /'/ol - 3O/ C'Iui I Corputer Engineering (Co)
Fs/Ocy - G: Reorfl /'/ol - 3O/ C'Iui I Corputer Engineering (Co)
Fs/Ocy - G: Reorfl /'/ol - 3O/ C'Iui I Corputer Engineering (Co)
D$j^*
Date:8thAugust2 0 r 0
ii'ne:
0 pm to 4.30pm
hasto be satisfied I . If the recipjent the of a message with the identity of thesender, comestnlo picture. principle of __ a. Confidentiality fo Integrity b. Authentication d. Access control 2. Which of the following principle is violatedif computersystemis not accessible?
a. Confidentiality flQ x b. Authentication E' 3. Whatis sizcof thekcy in original DESalgorith^? a. 56 bits c. b. 64 bits d.
4. Mrat is true for the symmetrickey encryption? Key should be secret Algorithm should be known c. Key should be largeto avoid brute-forceattack d. All of the above What 5is nsedto verify the integrityof a message? a. Messagedigest @ oigital envelope d. Noneof theabove b. Dccryption algorithm the structureof a digital certificate? , 6. Which of the tbllowing defines
@ x.soq
own privatekey @l_ts iil. Its own public key
c. TCP/IP
. 8. Kerberosprovides for ' a. Encryption ,CIRemote logirt Fl-ocal login b. SSO 9. Which data structure in a compiler is used for managing information aboutvariables and their attributes? c. Semantic stack a. Abstract syntax tree -\ (!,J Symbol table d. Parse table 10. Which of the following doesnot needsymbol table? c. Assembler a. Operating system d. None of the above b. Compiler until its get I 1. Which of the following datastructuredoes not allow reuse of the space, empty? c. Circular queue a- Stack
d. None of theabove (D simplequeue perforrned linkedlist efficientlvby doubly is more 12.Whiahof thefollowing operations thanbv sinelvlinkedlist? is given @- n"flting a nodewhoselocation list for a gir.enitem an unsofted Y Searching thenode u,itha givenlocation c. Inserting a nodeafter process d. Traversing eachnode a list to
P a g eI o l l 0
lAr
. -!'
-'----'->
7e-/ -
h>t
I 3 . How mahy.values can be storedby an affay A(- I ..m,I ..m)? q m(m+l) a' m
b. m' @ m(rn+z; by linear but ignored sei-rch binary used by is property 14.whichof thefollowing
search? c. Maximum value in the list s) Orderof thelist r .r , 1 , 5 ) ^ l d. Mean of data values Tl Lengthof the list takes that a seatch is to produce 15.Thegoalof hashing - . ry r\ z'! ;.c. O(logn) times g(l ff, ) times
list? sorted treeproduces search on binary 16.Whichof the followingoperation (c) Inordertraversal traversal a. preoder q Y top-Oownrraversal traversal 6eg' b. Postorder goesfrom process is completed, h"ii. In a timesharingOS,whentime slicefor a process " \o stateto running r ' {* 1^'-JflrrS ' state c- Suspended I n\M*' u. Blockedstate (il Readystate state I w'- t .,--. d. Terminatecl Je" the following order in pages occur .r,e-r to tg. Ei;d-;henurib", of pagefaultswhen references pages and it already 3 Ais,me that -"*ory can accommodate ; 1,2,4,5,2,1,2,4. - ^.! than2 with LRU policypagesI and2 with I broughtearlier contains / ,?i
I'&n"
%i;ij';;;'
n)times d- o(nloe
'Fr#.
a'.f'/
iulll
r ,) L
II,,1
Y i;;;il;;.r**
utilization
n gS- I n '{ P
r t
t'
I o I
i.-,
l)
'&, \*:o* above ? it:"" orthe b. 2s6 ta ko management forrnemory pllitiuo, scheme zz.FixJd 3 g ''\9'
(} li '1;I ilTcient in11'o'r utilization d. Used in mainframes OS
a. Is very comrnonin modemOS -,.ery eflicient in memoryutilization I Is I ?s' At
136:-
:
Page2 of l0
-_r$jfoz \
"Lsd Zz
s,4
ComputerEngineering(CO) 23- Consider6 files : fl,f2,B,Pl,f5,f6 with coresponding sizes100,200,70,40"?.'' respectively,the files are to be storedon a sequential device in such a way i:rl optimize access time. Which the mostsuitableorder? .-g. f5,f2,fl,R,f6,f4 a. f6,i5,f4,B,f2,fl
L-
b. fl,{2,8,9,f5,f6
.t, 24. Wild-card specifiers /^. ( a.) Providesan easyway of finding groups of relatedfiles b. Are only usedwhen printingthe contentsof files c- Can be usedwhen writing a file d. Allow several files to be readsimultaneouslv 'SfJ, 25. Parallel printersuse ! - ' . .,,,,,.: a. RS-232-Cinterface c. Handshake mode b. Centronicsinterface d. All of the above 026. In memorv manoed I/O, which of the following instructionnot is not supported? t ,t
_ l
[g) r+.to,n,fl,2,f5
b- ADD d. All of the above 27.MS-DOS -il multiprogramming Doesnotsupport El Supports multiprogramming to someextenl c. Supports multiprogramryring fully d- Noneof theabove 28. Database systems areintended management to
C nr,oui'
c. LDA
11
I I
-.1
I
a,
I
I
I
j
tn0
4*
1 r
{b
a. Eliminate data redundancy b. Establishrelationship among records in different files A Managefile access \L) All of the above 29. A data dictionaryis a specialfile that contains a. Namesof all fields in all files b. Data typesof all fields in all files g. Width of all fields in all files 'l'{JAll of the above 30- Manager salary details are hidden from employee. Th,isis ' a. Conceptual level datahiding , @ n*t"*al level datahiding r d. None of the above , b- Physical level data hiding I 31. A triggeris a a- Statementthat enablesto start any database* b. Statement that is executed by the user when debugging an application program usert ;9.a Qonditionthe systemtestsfor the validity of the database .(d.) Statementthat is executed automatically by the system as a side effect of a modificationto the database 32. Subschema canbc usedto '2' a. Createvery different personalizedview of the sai,ne data
ffio,^-'q-*1.
>>tt
b. Presentinformation in different fonlats informationby omitting fields from the subscherna desc.r:plion .{ j* Hide sensitive .; (jl-) alt of theabove
3 of 10 Page
in DBMS? to transaction 33. Which of the following is related . c. Savepoint . a. Commit *o.\;';i,.{" b . R o l l b a c k O A l l o f t h e a b o v e , ( ' / P ' iJ not i DDL operation? 34. Which --' ",fr of the following
._rr\,.,)",
\4 45
of datagramis the-Timeto Live (TTL) field' which I 35. One of the header fields in an IP tt"" for this field? L11L' l-* the following statementsbestexplainsthe need r- x 1' a'v-\ ' '''-6lfu'^'/-^' .* a. It can be used to prioritiie packets ''"' ( {L ' ' VN' ' \ tt" u delays b. It can be used to reduce A,, g. [t can be used to optimizethroughput 36- A and B are the only tosend.BothAandBattempttotransmitaframe,collide,andAw insthefirst by A, both A and B attenrpt tmnsmission successful this of end the Al backoff race. that A wins the secondbackoff raceis ro transmitand collide. The probability 3
looPing to p*::l]f:let @ t, canbeused Eihernet' Each has a steadyqueueof tiames an on statlons two
rrqd Rl
f-=+-t:U !
c' E-mail
@it'* endto enderrti and flow control'/ 3g. Which of the foffo*iig layerperforms c. Datalink layer layer a. Session
*t"#'
A*t
layers' 39. Flow control#r*ion is panof - and ^--r data.link J^+-ri-r. and transporr .)Transport a. Session Y Dutu link andphysical b. Transportand nefwork is pair segment 40. Maximtrmlength of the twisted * 6 100
6ffi;i,t*v",
'd;;;;Y"'
Ho
a ?
'-'"'
fttS --= A* ='
0'5 *
_r:# oJ
ff t'*''
&t*
';:"ffil:"*"""":..:--
t"'';|^*' ,
in ' 43. Negativenumberscannot berepresurted l form c' 2's complement form g Sign-magnitude L / of the above \v'rv vr d' None t t ; f b.) l's complementform to block cache one in put thanone word are 44. MoYe :in a program localityof reference a. Exploit the temporal "s I - --\ in a program ' *J' i s.^\,r /i\ i.ii;n the spatiallocalityof reference {'o-1'.q' rr-' \',-i^'-n| t b\ o c Y R"du"e the misspenalty A V/a d. Noneof the above
*-Hi-T^
Page4 of 10
Va --E-
-z p
=?
5-
--'f- x
/Yt -./
,vk.*\"'
Ir,
L,F
.l-\
u6
<
-l
,1 U-*"ll'
' ,.v'1
g,P
46. An binary instructiongenerally contains a- Informationregardingoperation to be done b. Informationregardingoperands q. Informationregardingthe size of the word [ib all of the above 47. Whlih of the following is nor movable storage?
45.Whichof thefollowingis true? a. Unless a CPU will notbeable enabled, to process theintemrpts b Logpinstructions-.can not be interrupted unriltheycomplete processor checks for intemrpts before executing a newinstruction , f) 1 _p V Only leveltriggerinterrupts arepossible on microprocessors 0
-p
a. Floppydisk b. Pendrive
-t.
N-' {:\,,r
*{-4 4j'4 1
*-.*1.
era .5 u.
t"-:
:*
'3
s.
T".
qt{l
t 49.Whichof rhefollowingneednot necessarily besaved on a conrexr switchbetween L n.\ \ut processes? Mf^l-\. ^, -, purpose registers c. program counter 6)Q;v '/ Xr;to A General (F)Translationlook-asidebuffer d. Ail of theabove r6 99' 50.Whi66of thefollowing is not supporred by 8085processor? artFr,.st^ t' instruclions c. Stackinstructions -a. Rotate ^'.i .)N ?' instruction d. All aresupported @ Uiloirion ""4^*,{".t 51.Ahii adderadds-bits atatime andproduceasumand a_ r1o)'f ",,r c. 8, divide A_ 3, subtraction W ' ,, ..b (Q r,.utry d. Allof theabove Y;+t d.-I'Ty. 'o 4 53.Whatis appropriate for HTTP? t; *11 ,1*{. protocol (a.) Request-Response protocol c. Transport ?: .'r_.1 xy'1' _,-{ : 4.[o-'tl-:[f,*. Y N"t*o.t service d. All oithe uu"u" *r p.'r\.t+ 54-Whlghof the followingprotocol is usedto manage thenetwork? ,*\ " : b. HTTP 55.A socket represents
ryryd#];r* (fl-8 Yn
^ A.fa. q'''
a><a
) l
r . " OVa,
@"'*v.,-==
c. x+y
f'rti
J-/
:::.
se. P('
@ sNIr,rr
c. sMTp
d. Atl of theabove
Jtnl,,
;t
{:
56.\Vhichof thefollowingis not true? a- Onemachine canhavetwo IP addresses "'b. packets All'the lbliows samepathin,TCPasit is connection orienteci : ; c. UDPis used in DNS
c. Boih d. None
ffiE4a7 ie
fl { t ^E 'v '
e r. fd'4
ilo lr
"",*"trO
protocol
*y)Page5 oflO
ComputerEngineering(CO) are lequired to designflip flop to count the ser'ics 57. How utanyminimunrtlip-t1ops o,?,4rE'f' 0,2,3,5,6?
a' 2 c' 4
rl----l
;l f
O , '
\
I
delay time of 25 ns counter usesflip-tlops with propagation Sg. n h{it synchronous of state will be possibletime requiredfor change each.The maximum ,i ' l'bi{ ' zs ns a. 25 ns tQ
c);
d'5
delaytime of l5 ns flip-flopswith propagation counteruses 59. A 3-bir asynchronous will be of state for change time required possible each.The minimum c . 4 5 n s a - 1 5n s
b. 5ons
V roon'
2 'T tA
' .:- t: ", f,l ,l ) ^r'9 1
@) '1 . J L) "
** r I serial interface? 60. WhYchof thefollowingrepresents coaa' c- COMPort a. RS-232-C 1 d' All of the above pon ffi USg I the production grammar: S->AB/AS, A->a/aA, B->b- Which of the 6l-Cokider E I grammar? to the production con'espondins expression ---' lbllowing regular r ,l --r Ag f-ft S L ab)' S a. (ab)* U.-l
(5) lo ns
d. 60ns
a* I
b. a(ab)*b
A ;r zr la ll
a'P;. I
ts -r b
^^^#
I -"-> z"s fb F '
I i
^|
A ---q.d lCcn I a. bccddd {c} aabccd ' -c;:.r,/ ababccd Y1 b. abbbd b-Cre{ -.1 eriby bv canbe recognizeri 63. Context freegrammar | v c)u!ft! automata srate a. Finite &-,l 61 a-b 4l b. 2-waylinearboundedautomata "c automata down c. Push I d. Bothb andc I I by C++, but not bVJAVA? 64. Which of thefollowingis supported class Friend class a. Abstract @) I X EncaPsulation b. Inheiitance i qlass abstract? is whether determine 65. How canC++ compiler keYword 6r) F otn abstract a\>slao.-*I @ Y Frompurevirtual function c. By not allowingobject creation d. Any oneof the above below: 66. Considertheprogram # include< stdio.h> int fun(int n, int * f-P) { int t, f; if {n <=l) { *i-p:l; rerurnl; ) 1: fun(n- l, f-P); Page 6 of l0
,l
Fl s E;
::l-'l
&
(CO) ComputerEngineering
i l r2
j
f: t+*fjr,
+l
't-r i
*L p : t;
Lt
e)
5 ?r3"1 .r,9 {
:D ,I .1
254
' r-- |l
*r9l {or. 1
) The valuePrinted is a.6 willbe the output of following statements? 62. Vlhla"t int x: 7; pri nt f("%od7od 7od\n"'x*-t-,x,Hx);
c' 14
6>4
d. ls
=1 .b -&l
$ \'; l I i
b D l
*l
c. d.
60-
b.B
c - C d . D
ccAl
;.U" "l
*rl
ccc{J
69. Which ofthe following is not true? a. C++ is object oriented extensionto the C b. Derived objects can use all the constructorsof base class private membersof class c. Friend t'unction can access (f)eil of the above are ttue 70. ConYder the following C declaration. int x[10], Y'z; contain? What kind of error does following statement
o t'o1
{ ' }
z: x+ yi logical error a. syntax error K error b. Semantic fd) All of the system? struMre static the understand to ?1. Whichmodelis useful rnodel * ' c' Dynamic 6)OCi""t model d' All of the above 2 model Vr*t*tion modernmultitasking 72.Whichof the schedulingis very fair andrnostwidelyusedin sYstems? operating ' d' All of the above Oo on emphasizes fi. IEEFtlefinition of the softwareengineering a- QualitYof the software software b. Economical
c. Timely development of the software
I I
a.'rtFs
c' SRTN
ett of the,above
7 of l0 Page
1 .
S
: /--\\ \'
' I !
l-
TI
I
(") Oynurnic model \a1 ettof the above
pr
'
\
{ .- .)], 1
of is anexample ze.stVaiagram
A.
| '
rtl |
"/
*
I
I
"\
is available? whenlimitedmanpower modelis best process i?. Whichof thesoftware '--* model c' SPiral A n qo model d' All of the above model q * V il;ental
. \
Aggregat::if;[:"*' 78.
part-of relation
c. Both
v e+ :!
./ -1 C.. 0 'd
i
i i
i
d: None A concept? design 79. \\,hYc{of the foltowing is a sofrware a. Abstraction 9' CouPling
b' Cohesion ('d)
80.Whichof the following is a techniquefor Review a- FormalTechnical b- FindingerrorsbYdebugging of softwareto cuslomer Oemop-stration ;
\A^
-s)
/ '/ " 1
. +A' \
:
lrnon
tt \ , \
\ \-/ I
\/
[rlar
reerl reeo
t^nn ,
\?
,l
:
I i I |
1993'tgl:l
is
ly -"-
z o
s A
-t
\
7
(d)
;;'.
83
; i ll f '* rheeigenvaluesofthernatrix
(a) -r,a,t n ^ (b)2,3,6,
if
* < ._1
li :I :,1 r:l Lj
lcl2,"'''i /e\
-.--of none
fse
/ Vnoneofthese
^rO. .,n /
then numbers, lf lirn(l + a;'7 = e2,wherea and barenatural (cla=16,b=8 b =2 ( (a) a=4 1 '' ,Y \b - ') a = 8 , b = q ...: Page8 of 10
bt1* 2'
o a ' 4- \ ) ' z c
5-z'1'
85.
env"( f.*')
f( "tt- (ro-t .
f o, 7 o' g ^ r . .t e g
87-
+g-,Ftt-*,
Jo Jsin0 +Jcos0
r(J'Z\
isequarto
(b)r (clnla (dln/2 J
f*.eu'"
Kt*-f*f-^{
+6"'!
v^".o'n7 1' - -/k')-' r O . r !. ry
{a} o
du. du . ,x'+v' rsequalto ,thcn x;-+-P; lfu=sin-' dx x+y .dy (d) noneofthes" (c) 2tanu (b) -2tanu' (a) tanu
89-
F isequarto,o,, ijl*l
(c)-1
\* "- *ry"
P'i'r n-11 ctr'l li
Thesofutionofthedifferentialequatio"*-:=x2 is
undertheconditionthaty=lwhenx=1'
(a) 91.
4xy.=x3+3
= sin2x is integral{P-l}of tOt+1y Theparticular I | ' (a) I ^ , -;cos2-r (c) --srn/x tb) isin2x "
8 -" '---
I (d) -cos2;r
92.
lnversetaplacetransform of 1;-;-;;
is
(a)
Lr-"
3
"in3t
(b)-!"-,
-
sin3t
3
93.
conjueateof e'cosyis Theharmonic (a) e.'cosy {b} e'sinY point of Singular ' (a) z=-t,-2 easltz
ic! e"siny
* I
!Efi::
I
94.
(z-r)(z-z)
(blz=-1,2
6t;{l7
lclz=1,-2 Pase 9 of l0
+ fei"'r;b'
c*> 1 4, u) + t''tc
,.'..,1'
e9rr" l \ '
L:L-/\c)
T
, - 1.,
I 1
I
,L'
\2
\
' ,
I
i
t
t
Computer Engineering(CO)
\ \/
/ ;'
,o
.,
)rr'
I I
95.
U
zo
: :
i
(c)
' l
I
' l
-.
\.;i
(a) e
(b) 13
f)t
{d) noneofthese
40,45,55 of threebatsmenA, B,C andtheir standard scores are respectively Theaverage is moreconsistent? 9,11,16.Whichbatsman are respectively deviations (b)B (d) noneofthese (c)c (a) A , if 2P(x= 1) = P(x= 2),thenthe variance is distribution ln a Poisson -i (c) 2 (a) o 4 tb) {d}
I J.-
98.
-/l
^ii," ^?.J
a\'
s'
bne-thirdruleis bySimpson's Thevalue of | ,* Jo l+x (c)o.6s3s1 (a) 0.9631s tb)o.6391s 100" fix) is givenby 1 x : 0 O . 5 f(x): 1 0.8 0.5
I
td) 0.6931s
h 4 - rli 2."11
J.n*,
0
(b)7.75
).*rl
i
I
,,1
4 .l =_{
z l t
I
il
i +? ' 11 l
;:i
rD(
*11 r'j
I
t t
t x r. l
Page l0 oflO
1
)
?,1,
4 .c,
: : -
I I