Fs/Ocy - G: Reorfl /'/ol - 3O/ C'Iui I Corputer Engineering (Co)

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

fs\ocY--g

R e o rfl \'\o l - 3o\ c'iui I (CO) Corputer Engineering

D$j^*

Date:8thAugust2 0 r 0

ii'ne:

0 pm to 4.30pm

hasto be satisfied I . If the recipjent the of a message with the identity of thesender, comestnlo picture. principle of __ a. Confidentiality fo Integrity b. Authentication d. Access control 2. Which of the following principle is violatedif computersystemis not accessible?

a. Confidentiality flQ x b. Authentication E' 3. Whatis sizcof thekcy in original DESalgorith^? a. 56 bits c. b. 64 bits d.

Availability Accesscontrol 128bits 256 bits

4. Mrat is true for the symmetrickey encryption? Key should be secret Algorithm should be known c. Key should be largeto avoid brute-forceattack d. All of the above What 5is nsedto verify the integrityof a message? a. Messagedigest @ oigital envelope d. Noneof theabove b. Dccryption algorithm the structureof a digital certificate? , 6. Which of the tbllowing defines

a. X.500 b, ANS.I 7. TheCA signsa digitalcertificate with publickey a- User's b. User'sprivatekey

@ x.soq
own privatekey @l_ts iil. Its own public key

c. TCP/IP

. 8. Kerberosprovides for ' a. Encryption ,CIRemote logirt Fl-ocal login b. SSO 9. Which data structure in a compiler is used for managing information aboutvariables and their attributes? c. Semantic stack a. Abstract syntax tree -\ (!,J Symbol table d. Parse table 10. Which of the following doesnot needsymbol table? c. Assembler a. Operating system d. None of the above b. Compiler until its get I 1. Which of the following datastructuredoes not allow reuse of the space, empty? c. Circular queue a- Stack

d. None of theabove (D simplequeue perforrned linkedlist efficientlvby doubly is more 12.Whiahof thefollowing operations thanbv sinelvlinkedlist? is given @- n"flting a nodewhoselocation list for a gir.enitem an unsofted Y Searching thenode u,itha givenlocation c. Inserting a nodeafter process d. Traversing eachnode a list to
P a g eI o l l 0

lAr

. -!'

-'----'->

#Gl --t^,t-"tll -t,o ) ,z '\'\

(Cd . F Engineering Compuler * alx' e r 1f

7e-/ -

h>t
I 3 . How mahy.values can be storedby an affay A(- I ..m,I ..m)? q m(m+l) a' m

b. m' @ m(rn+z; by linear but ignored sei-rch binary used by is property 14.whichof thefollowing

search? c. Maximum value in the list s) Orderof thelist r .r , 1 , 5 ) ^ l d. Mean of data values Tl Lengthof the list takes that a seatch is to produce 15.Thegoalof hashing - . ry r\ z'! ;.c. O(logn) times g(l ff, ) times

-t (J;g1 '/ Yr:52

list? sorted treeproduces search on binary 16.Whichof the followingoperation (c) Inordertraversal traversal a. preoder q Y top-Oownrraversal traversal 6eg' b. Postorder goesfrom process is completed, h"ii. In a timesharingOS,whentime slicefor a process " \o stateto running r ' {* 1^'-JflrrS ' state c- Suspended I n\M*' u. Blockedstate (il Readystate state I w'- t .,--. d. Terminatecl Je" the following order in pages occur .r,e-r to tg. Ei;d-;henurib", of pagefaultswhen references pages and it already 3 Ais,me that -"*ory can accommodate ; 1,2,4,5,2,1,2,4. - ^.! than2 with LRU policypagesI and2 with I broughtearlier contains / ,?i

I'&n"

%i;ij';;;'

n)times d- o(nloe

'Fr#.

a'.f'/

9l,o,,"or,r,"above tili \t19.Mutualexclusionproblemarisesbetween


above ;. N;;; "i,h" should system 20. Distributed time constraints tu Meetihe prescribed '(6) sharing resource beiter target

iulll

Fn ilt" ff,-t i Qilr*iTl;*:"*=,t":::",*:,-":


f,)rs;; i'' ? t ; 1

r ,) L

II,,1

Y i;;;il;;.r**

utilization

n gS- I n '{ P

r t

t'

I o I

i.-,
l)

with cache t1,n0 a r28KBcache and ,,. o,,l;J,Ti,"::"#:f::f;T'ffi;t*main memory many


is usedhow of cachemanagement block size4 KB. if u dit rt mappingscheme block? physical a onto differentmemoryblockscanmap Siven ^ g fy ;1che , -

'&, \*:o* above ? it:"" orthe b. 2s6 ta ko management forrnemory pllitiuo, scheme zz.FixJd 3 g ''\9'
(} li '1;I ilTcient in11'o'r utilization d. Used in mainframes OS
a. Is very comrnonin modemOS -,.ery eflicient in memoryutilization I Is I ?s' At
136:-

:
Page2 of l0

rEZi fli L,,,\; "-*J,*?_-_ -Xli*


r2.a g "(S 'c\ t ??i- I ,Qf;T'

-_r$jfoz \

"Lsd Zz

s,4

ComputerEngineering(CO) 23- Consider6 files : fl,f2,B,Pl,f5,f6 with coresponding sizes100,200,70,40"?.'' respectively,the files are to be storedon a sequential device in such a way i:rl optimize access time. Which the mostsuitableorder? .-g. f5,f2,fl,R,f6,f4 a. f6,i5,f4,B,f2,fl
L-

b. fl,{2,8,9,f5,f6

.t, 24. Wild-card specifiers /^. ( a.) Providesan easyway of finding groups of relatedfiles b. Are only usedwhen printingthe contentsof files c- Can be usedwhen writing a file d. Allow several files to be readsimultaneouslv 'SfJ, 25. Parallel printersuse ! - ' . .,,,,,.: a. RS-232-Cinterface c. Handshake mode b. Centronicsinterface d. All of the above 026. In memorv manoed I/O, which of the following instructionnot is not supported? t ,t
_ l

[g) r+.to,n,fl,2,f5

b- ADD d. All of the above 27.MS-DOS -il multiprogramming Doesnotsupport El Supports multiprogramming to someextenl c. Supports multiprogramryring fully d- Noneof theabove 28. Database systems areintended management to

C nr,oui'

c. LDA

11

I I

-.1
I

a,
I
I

I
j

tn0

4*
1 r
{b

a. Eliminate data redundancy b. Establishrelationship among records in different files A Managefile access \L) All of the above 29. A data dictionaryis a specialfile that contains a. Namesof all fields in all files b. Data typesof all fields in all files g. Width of all fields in all files 'l'{JAll of the above 30- Manager salary details are hidden from employee. Th,isis ' a. Conceptual level datahiding , @ n*t"*al level datahiding r d. None of the above , b- Physical level data hiding I 31. A triggeris a a- Statementthat enablesto start any database* b. Statement that is executed by the user when debugging an application program usert ;9.a Qonditionthe systemtestsfor the validity of the database .(d.) Statementthat is executed automatically by the system as a side effect of a modificationto the database 32. Subschema canbc usedto '2' a. Createvery different personalizedview of the sai,ne data

ffio,^-'q-*1.

>>tt

b. Presentinformation in different fonlats informationby omitting fields from the subscherna desc.r:plion .{ j* Hide sensitive .; (jl-) alt of theabove

3 of 10 Page

(CO) tsngineering Computer

in DBMS? to transaction 33. Which of the following is related . c. Savepoint . a. Commit *o.\;';i,.{" b . R o l l b a c k O A l l o f t h e a b o v e , ( ' / P ' iJ not i DDL operation? 34. Which --' ",fr of the following

Qxgr-t '. J' , "$'

._rr\,.,)",

\4 45

of datagramis the-Timeto Live (TTL) field' which I 35. One of the header fields in an IP tt"" for this field? L11L' l-* the following statementsbestexplainsthe need r- x 1' a'v-\ ' '''-6lfu'^'/-^' .* a. It can be used to prioritiie packets ''"' ( {L ' ' VN' ' \ tt" u delays b. It can be used to reduce A,, g. [t can be used to optimizethroughput 36- A and B are the only tosend.BothAandBattempttotransmitaframe,collide,andAw insthefirst by A, both A and B attenrpt tmnsmission successful this of end the Al backoff race. that A wins the secondbackoff raceis ro transmitand collide. The probability 3

a table \+, ir"r"lJi"*u tubl" ;;;;;i;;

a table c- Deleting to a table d. Addinga column

looPing to p*::l]f:let @ t, canbeused Eihernet' Each has a steadyqueueof tiames an on statlons two

. 37. Which a- Internet chat

; ?l' ll,, I one application? client'server a not of the follou.ing is


browsing b. web

rrqd Rl
f-=+-t:U !

c' E-mail

@it'* endto enderrti and flow control'/ 3g. Which of the foffo*iig layerperforms c. Datalink layer layer a. Session

*t"#'
A*t

layers' 39. Flow control#r*ion is panof - and ^--r data.link J^+-ri-r. and transporr .)Transport a. Session Y Dutu link andphysical b. Transportand nefwork is pair segment 40. Maximtrmlength of the twisted * 6 100

6ffi;i,t*v",

'd;;;;Y"'

Ho
a ?

'-'"'
fttS --= A* ='

0'5 *

Vzooob- looom is identified atocation in which d",.ice 4r. A memory *j:*:m*#.fi

_r:# oJ

ff t'*''

&t*

;. "#H:tictape is an example of ^?;,ffi#" logica -g:*xl. L of a staircaseswitch aL 42.Theworking

';:"ffil:"*"""":..:--

t"'';|^*' ,

in ' 43. Negativenumberscannot berepresurted l form c' 2's complement form g Sign-magnitude L / of the above \v'rv vr d' None t t ; f b.) l's complementform to block cache one in put thanone word are 44. MoYe :in a program localityof reference a. Exploit the temporal "s I - --\ in a program ' *J' i s.^\,r /i\ i.ii;n the spatiallocalityof reference {'o-1'.q' rr-' \',-i^'-n| t b\ o c Y R"du"e the misspenalty A V/a d. Noneof the above

*-Hi-T^

Page4 of 10

Va --E-

-z p

=?

5-

--'f- x

/Yt -./

,vk.*\"'
Ir,
L,F
.l-\

u6

<

-l

Computer Engineering (CO)

,1 U-*"ll'

' ,.v'1

g,P

46. An binary instructiongenerally contains a- Informationregardingoperation to be done b. Informationregardingoperands q. Informationregardingthe size of the word [ib all of the above 47. Whlih of the following is nor movable storage?

45.Whichof thefollowingis true? a. Unless a CPU will notbeable enabled, to process theintemrpts b Logpinstructions-.can not be interrupted unriltheycomplete processor checks for intemrpts before executing a newinstruction , f) 1 _p V Only leveltriggerinterrupts arepossible on microprocessors 0

-p

a. Floppydisk b. Pendrive

-t.

N-' {:\,,r
*{-4 4j'4 1
*-.*1.

era .5 u.
t"-:

:*

'3

s.

T".
qt{l

t 49.Whichof rhefollowingneednot necessarily besaved on a conrexr switchbetween L n.\ \ut processes? Mf^l-\. ^, -, purpose registers c. program counter 6)Q;v '/ Xr;to A General (F)Translationlook-asidebuffer d. Ail of theabove r6 99' 50.Whi66of thefollowing is not supporred by 8085processor? artFr,.st^ t' instruclions c. Stackinstructions -a. Rotate ^'.i .)N ?' instruction d. All aresupported @ Uiloirion ""4^*,{".t 51.Ahii adderadds-bits atatime andproduceasumand a_ r1o)'f ",,r c. 8, divide A_ 3, subtraction W ' ,, ..b (Q r,.utry d. Allof theabove Y;+t d.-I'Ty. 'o 4 53.Whatis appropriate for HTTP? t; *11 ,1*{. protocol (a.) Request-Response protocol c. Transport ?: .'r_.1 xy'1' _,-{ : 4.[o-'tl-:[f,*. Y N"t*o.t service d. All oithe uu"u" *r p.'r\.t+ 54-Whlghof the followingprotocol is usedto manage thenetwork? ,*\ " : b. HTTP 55.A socket represents

ryryd#];r* (fl-8 Yn

x I RAMchips are needed toproviVa memory capacity of c. 64 d. nB

c. External HDD Non. of the above 6\

^ A.fa. q'''

or*lton " :)-,

a><a
) l

r . " OVa,

@"'*v.,-==

c. x+y

ti' n+ *e{ l + ^ . . Ji r\,y{Lrl.

f'rti
J-/

:::.

se. P('

@ sNIr,rr

c. sMTp

d. Atl of theabove

Jtnl,,
;t

{:

56.\Vhichof thefollowingis not true? a- Onemachine canhavetwo IP addresses "'b. packets All'the lbliows samepathin,TCPasit is connection orienteci : ; c. UDPis used in DNS

a. IPaddress @ rort number

c. Boih d. None

ffiE4a7 ie
fl { t ^E 'v '

e r. fd'4

ilo lr

"",*"trO

protocol

*y)Page5 oflO

ComputerEngineering(CO) are lequired to designflip flop to count the ser'ics 57. How utanyminimunrtlip-t1ops o,?,4rE'f' 0,2,3,5,6?
a' 2 c' 4

rl----l

;l f

O , '

\
I

delay time of 25 ns counter usesflip-tlops with propagation Sg. n h{it synchronous of state will be possibletime requiredfor change each.The maximum ,i ' l'bi{ ' zs ns a. 25 ns tQ

c);

d'5

T ' - 't i t ' .r i

delaytime of l5 ns flip-flopswith propagation counteruses 59. A 3-bir asynchronous will be of state for change time required possible each.The minimum c . 4 5 n s a - 1 5n s

b. 5ons

V roon'

2 'T tA
' .:- t: ", f,l ,l ) ^r'9 1

@) '1 . J L) "

** r I serial interface? 60. WhYchof thefollowingrepresents coaa' c- COMPort a. RS-232-C 1 d' All of the above pon ffi USg I the production grammar: S->AB/AS, A->a/aA, B->b- Which of the 6l-Cokider E I grammar? to the production con'espondins expression ---' lbllowing regular r ,l --r Ag f-ft S L ab)' S a. (ab)* U.-l

(5) lo ns

d. 60ns

a* I

.c. aa*b+ r-\

b. a(ab)*b

A ;r zr la ll

a'P;. I

ts -r b

^^^#
I -"-> z"s fb F '

I i
^|

A->dlccA S->aSlbA, begeneratediy 62.wlH liJlrn." can

A ---q.d lCcn I a. bccddd {c} aabccd ' -c;:.r,/ ababccd Y1 b. abbbd b-Cre{ -.1 eriby bv canbe recognizeri 63. Context freegrammar | v c)u!ft! automata srate a. Finite &-,l 61 a-b 4l b. 2-waylinearboundedautomata "c automata down c. Push I d. Bothb andc I I by C++, but not bVJAVA? 64. Which of thefollowingis supported class Friend class a. Abstract @) I X EncaPsulation b. Inheiitance i qlass abstract? is whether determine 65. How canC++ compiler keYword 6r) F otn abstract a\>slao.-*I @ Y Frompurevirtual function c. By not allowingobject creation d. Any oneof the above below: 66. Considertheprogram # include< stdio.h> int fun(int n, int * f-P) { int t, f; if {n <=l) { *i-p:l; rerurnl; ) 1: fun(n- l, f-P); Page 6 of l0
,l

Fl s E;
::l-'l

&

(CO) ComputerEngineering

i l r2
j

f: t+*fjr,

+l

't-r i

*L p : t;

.retum f, ) int main0 { int x = l5; fun(5,&x)); printf ( "%od\n", return 0;


'

Lt

e)
5 ?r3"1 .r,9 {

:D ,I .1

254

' r-- |l
*r9l {or. 1

) The valuePrinted is a.6 willbe the output of following statements? 62. Vlhla"t int x: 7; pri nt f("%od7od 7od\n"'x*-t-,x,Hx);

c' 14

6>4

d. ls

=1 .b -&l
$ \'; l I i

b D l

*l

fa, g,g,g Y 7,8,9

c. d.

'7,9,9 None of theabove 11

60-

68- What is output of following statements? Putchar(6?); a . A

b.B

c - C d . D

ccAl

;.U" "l
*rl
ccc{J

69. Which ofthe following is not true? a. C++ is object oriented extensionto the C b. Derived objects can use all the constructorsof base class private membersof class c. Friend t'unction can access (f)eil of the above are ttue 70. ConYder the following C declaration. int x[10], Y'z; contain? What kind of error does following statement

o t'o1
{ ' }

z: x+ yi logical error a. syntax error K error b. Semantic fd) All of the system? struMre static the understand to ?1. Whichmodelis useful rnodel * ' c' Dynamic 6)OCi""t model d' All of the above 2 model Vr*t*tion modernmultitasking 72.Whichof the schedulingis very fair andrnostwidelyusedin sYstems? operating ' d' All of the above Oo on emphasizes fi. IEEFtlefinition of the softwareengineering a- QualitYof the software software b. Economical
c. Timely development of the software

I I

a.'rtFs

c' SRTN

ett of the,above

7 of l0 Page

j u,**vr zfx \ \ ,n- x. 1-z I


\--5-/ h-{l ('(}mputerEngineering(co)
the user requirements? 74. Which of the processmodel is best to understand c' Incrementalmodel Prototypemodel 6 d' None of the above V wu,"riatt moaet

1 .
S
: /--\\ \'

' I !
l-

75. s";;;.ir;;:;iilu,. in.tua"


above ft\ ettofthe
a. Object model b. Functionmodel

by software a. Data to be processed suPPorted to be b. FunctionalitY be delivered to Performance E.

TI
I
(") Oynurnic model \a1 ettof the above

pr
'
\

{ .- .)], 1

of is anexample ze.stVaiagram

A.

| '

rtl |
"/
*

I
I

"\

is available? whenlimitedmanpower modelis best process i?. Whichof thesoftware '--* model c' SPiral A n qo model d' All of the above model q * V il;ental

. \

Aggregat::if;[:"*' 78.
part-of relation

c. Both

v e+ :!
./ -1 C.. 0 'd

i
i i
i

d: None A concept? design 79. \\,hYc{of the foltowing is a sofrware a. Abstraction 9' CouPling
b' Cohesion ('d)

80.Whichof the following is a techniquefor Review a- FormalTechnical b- FindingerrorsbYdebugging of softwareto cuslomer Oemop-stration ;
\A^

above ol,-"tthe All or rne aDovtt @ qualityas$ance?


T- 9 I 3 -' \)
1'

-s)
/ '/ " 1

. +A' \
:

lrnon

tt \ , \

\ \-/ I
\/

of thedeterminant rhevalue ltstz


Oy'o
, L r,r 1 ' (b)

[rlar

reerl reeo
t^nn ,

\?

,l
:

I i I |

1993'tgl:l

is

ly -"-

z o
s A
-t

\
7

llees tee6 teeTl


rrl -1 tc)-1

{dl none none of of these these (d)

r - 2 e( I \t t 11 t z ' ' t ! ttf

82.lf3x+2y+z=0,x+4y+z=o,2x+y+42=o,beasystemofequations,then-r".*l.j i ta) it is inconsistent lc' i ' tbf-ithasthetrivialsolutionx=Y=z=0 { c ) i t c a n b e r e d u c e d t o a s i n g | e e q u a t i o n a n d s o a s o | u t i o n d o e s n o t e x io ss tt *>l*a 4l

(d)

iszero. of the matrixof coefficient Determinant

;;'.

83

; i ll f '* rheeigenvaluesofthernatrix
(a) -r,a,t n ^ (b)2,3,6,

*':.1 +'1 Le.


il]:lj ;i.:i
"._:1
i [. ] 'j; ? i

if

* < ._1

li :I :,1 r:l Lj

lcl2,"'''i /e\

-.--of none
fse
/ Vnoneofthese

^rO. .,n /

then numbers, lf lirn(l + a;'7 = e2,wherea and barenatural (cla=16,b=8 b =2 ( (a) a=4 1 '' ,Y \b - ') a = 8 , b = q ...: Page8 of 10

bt1* 2'

o a ' 4- \ ) ' z c

5-z'1'

t-ti, , +f'h' (,.vr 6) q, L!,o..0.r'1


I 1.1 etlo( i

(CO) Computer Engineering

85.

to at x=0,thanf(0)is equal be continuous lf f(x)= {x+1fo" ( c ) e ( b ) 1 / e . {d}noneofthese (a)'0-

env"( f.*')

,l i , =bsino, is ttren tfx = acoso,y ftf (a) 0 (u)-4cos ecalcora !"or"rog.o.g o, a;


(c) -lg$sgogsslg - -J'u ol----(d) rvr noneofthese l u' r

f( "tt- (ro-t .
f o, 7 o' g ^ r . .t e g

>- uo* " ' .r*::: ev \ap\ 'I,a, .ffi,

87-

+g-,Ftt-*,
Jo Jsin0 +Jcos0

r(J'Z\

to9Ltv . A V 'ku , t "'' ,n -

isequarto
(b)r (clnla (dln/2 J

f*.eu'"
Kt*-f*f-^{
+6"'!
v^".o'n7 1' - -/k')-' r O . r !. ry

{a} o

du. du . ,x'+v' rsequalto ,thcn x;-+-P; lfu=sin-' dx x+y .dy (d) noneofthes" (c) 2tanu (b) -2tanu' (a) tanu
89-

F isequarto,o,, ijl*l

(c)-1

*. {_r( b1 -, *7:-: u.' (d) noneorthese ,Sf t:-l'+-. ,.q ^

\* "- *ry"
P'i'r n-11 ctr'l li

Thesofutionofthedifferentialequatio"*-:=x2 is

undertheconditionthaty=lwhenx=1'

(a) 91.

4xy.=x3+3

(b) axy= xa+3 (c)4xy=ya+3 (d) noneofthese

= sin2x is integral{P-l}of tOt+1y Theparticular I | ' (a) I ^ , -;cos2-r (c) --srn/x tb) isin2x "

=_A qocr 2*\^*E Y'+3 d 3+ *

8 -" '---

I (d) -cos2;r

ce?''^t K t P rt ,l- J ... {s*Lol


"o'3t

92.

lnversetaplacetransform of 1;-;-;;

is

(a)

Lr-"
3

"in3t

(b)-!"-,
-

sin3t
3

(d) -1e-" (.) ]r-" cos3r


J 5

93.

conjueateof e'cosyis Theharmonic (a) e.'cosy {b} e'sinY point of Singular ' (a) z=-t,-2 easltz

ic! e"siny
* I

(d) none of these

!Efi::
I

94.

(z-r)(z-z)
(blz=-1,2

c&7Jr> ' (dlz=L,2

6t;{l7

lclz=1,-2 Pase 9 of l0

+ fei"'r;b'
c*> 1 4, u) + t''tc

,.'..,1'

e9rr" l \ '
L:L-/\c)

T
, - 1.,
I 1
I

,L'

\2

\
' ,

I
i

t
t

Computer Engineering(CO)

\ \/

/ ;'
,o

.,

)rr'

I I

95.

Taylor expansion ;+ -2) in lzt < 1 is series "f (z


{a) zr I z'

U
zo

: :
i

-;(r -T.i-!a-z*+-as*.........) (b) *+"""""') *ri" 2 ' 2 4 8 r / 5


1 z ,2 ,r -:(l+i+1+=+........) 2 2 4 8 (d)noneo f ese th i"O * l.N

(c)

' l
I

' l
-.

iq Themedian of numbers 11,1O,12,13,9

\.;i

(a) e

(b) 13

f)t

{d) noneofthese

40,45,55 of threebatsmenA, B,C andtheir standard scores are respectively Theaverage is moreconsistent? 9,11,16.Whichbatsman are respectively deviations (b)B (d) noneofthese (c)c (a) A , if 2P(x= 1) = P(x= 2),thenthe variance is distribution ln a Poisson -i (c) 2 (a) o 4 tb) {d}
I J.-

98.
-/l

^ii," ^?.J
a\'

s'

bne-thirdruleis bySimpson's Thevalue of | ,* Jo l+x (c)o.6s3s1 (a) 0.9631s tb)o.6391s 100" fix) is givenby 1 x : 0 O . 5 f(x): 1 0.8 0.5
I

td) 0.6931s

h 4 - rli 2."11

Thenthe valueof (a) 0.775

J.n*,
0

by Trapezoidal ruleis tcl77.S (dl noneof these

(b)7.75

).*rl
i
I

,,1

4 .l =_{
z l t
I

il

i +? ' 11 l

;:i

rD(

*11 r'j
I

t t

t x r. l
Page l0 oflO
1

)
?,1,

4 .c,

: : -

I I

You might also like