Professional Documents
Culture Documents
Paper 1 PDF
Paper 1 PDF
Section-1
(1) If P(A) = 0.3, P(B) = 0.4, P(C) =0.8 , P(AB) = 0.08, P(AC) = 0.28, P(ABC) =0.09,
P(A+B+C) 0.75 and P(BC) = x then
(2) Three of the six vertices of a regular hexagon are chosen at random. The probability that the
triangle with these three vertices is equilateral, is equal to
1 1
(a) (b)
2 5
1 1
(c) (d)
10 20
x x+4
(3) If 2 .3 = 7 x , then x =
4 log e 3 4 log e 3
(a) (b)
log e 7 − log e 6 log e 6 − log e 7
2 log e 4 2 log e 4
(c) (d)
log e 7 − log e 6 log e 7 + log e 6
1 1 1 1
(4) + + 3+ + .......... =
2
3 2.3 3.3 4.34
sin 8 x − cos8 x
(6) 1 − 2sin 2 x cos2 x dx =
1
(a) sin2x+c (b) - sin2x + c
2
1
(c) sin2x + c (d) –sin2x + c
2
dx
(7) x (x 2 4
+ 1)3/ 4
=
1/ 4 1/ 4
1 1
(a) 1 + 4 +c (b) − 1 + 4 +c
x x
3/ 4 3/ 4
1 1
(c) 1 + +c (d) − 1 + +c
x4 x4
(8) If y = a log | x | + bx2 + x has its extreme values at x = -1 and x = 2 , then
(a) a = 2, b = -1 (b) a = 2, b = -1/2
(c) a = -2 b = 1/2 (d) None of these
(9) Let [x] denotes the greatest integer less than or equal to x. If f(x) = [x Sinπ x] then f(x) is
(a) Continous at x=0 (b) Continous in (-1,0)
(c) Differentiable in (-1,1) (d) All the above
1+ i
m
1 1
Fc f ( s − a ) − Fc f ( s + a ) Fc f ( s + a ) + Fc f ( s − a )
2 2
(c) (d)
2a (3s 2 + a 2 ) 2a(3s 2 − a 2 )
(a) (b) (c)
( s 2 − a 2 )3 ( s 2 + a 2 )3
2a (3s 2 + a 2 ) 2a(3s 2 − a 2 )
(d)
( s 2 + a 2 )3 ( s 2 − a 2 )3
1
(14) L−1 n
=
( s + a)
t n −1 t n −1
(a) e − at (b) e at
(n − 1)! (n − 1)!
tn − at at t
n
(c) e (d) e
n! n!
2x −
(15) lim =
cos x
x→
2
(a) 2 (b) 1
(c) -2 (d) None of these
3 2
(a) K I (b) K I
(c) − K I (d) − K I
3 2
If e = 1 , e = 2.72 , e = 7.39 , e = 20.09 and e = 54.60 , then by Simpon’s Rule, the value
0 1 2 3 4
(17)
4
e dx is
x
of
0
(a) 5.387 (b) 53.87
(c) 52.78 (d) 53.17
The positive root of the equation e + x − 3 = 0 lies in the interval
x
(18)
(a) (0,1) (b) (1,2)
(c) (2,3) (d) (2,4)
(x − x) 2
= 25 , ( y − y) 2
= 256 , ( x − x )( y − y) = 80 , the Pearson’s coeff. of correlation is
(a) 0.2 (b) 0.8
(c) 1 (d) 0.1
Section-2
(21) In a PCM system, if the code word length is increased from 6 to 8 bits, the signal to quantization
noise ratio improves by the factor
(a) 8/6 (b) 12
(c) 16 (d) 8
(25) A fair coin is tossed three times in succession. If the first toss produces a head, then the probability
of getting exactly two heads in three tosses is
(a) 1/8 (b) 1/2
(c) 3/8 (d) 3/4
(27) Noise with uniform power spectral density of N0W/Hz is passed through a filter H ( ) = 2 exp(-j
td) followed by an ideal low pass filter of bandwidth BHz. The output noise power in Watts is
(a) 2N0B (b) 4N0B
(c) N0B (d) 16 N0B
(28) Which of the following function could be valid PSD of a real random process
2
(a) (b)
+ 16
2
+ 16
2
j 2
(c) (d) all of the above
2 + 16
(29) Value of intrinsic impedance of free space is
(a) 120 Ω (b) 377 Ω
(c) 250 Ω (d) 325 Ω
(31) A 2 m parabolic reflector is used at 3 GHz then gain of parabolic reflector antenna is
(a) 14.52 dB (b) 22.35 dB
(c) 34.07 dB (d) 42.28 dB
(32) Which of the following statements related to the reflex klystron oscillator is correct?
(a) Lower the mode number, higher the repeller voltage
(b) Higher the mode number, shorter the DC transit time
(c) Higher the mode number, lower the repeller voltage
(d) Lower the mode number, longer the DC transit time
(33) Two identical directional couplers are used in a waveguide to sample the incident and reflected
powers. The output of the two couplers is found to be 2.5 mW and 0.15 mW. The value of VSWR in the
waveguide is
(a) 1.6 (b)1.54
(c) 1.64 (d) 1.7
(34) The semiconductor diode which can be used in switching circuits at microwave range is
(a) PIN diode (b) Varactor diode
(c) Tunnel diode (d) Gunn diode
(35) The CE current gain of a PNP transistor whose CB current gain is 0.99 will be:-
(a) 99 (b) 97
(c) 98 (d) 1
(36) A flip flop has a 10 nanosec delay from the time its clock pulse goes from 1 to 0 to the time the
output is complemented. The maximum delay in a 10-bit binary ripple counter that uses these flip-flops is:
(a) 10 nanosec (b) 100 nanosec
(c) 10 millisec (d) 100 millisec
(38) A non blocking folded network of N subscriber line will have _____________no. of switching
networks.
(a) 2N (b) N/2
(c) N2 (d) N
(39) During a two hour busy period 2400 calls arrive at an exchange. Average holding time per calls is
two minutes. What is the traffic load in erlang.
(a) 2400 E (b) 40E
(c) 60 E (d) 80E
(40) Determine the switch advantage ratio of three stage network with N inlets and N outlelts for for the
case N =128
(a) 2.13 (b) 1.75
(c) 2.81 (d) None of the above
(42) If is the region of convergence of x (n) and is the region of convergence of y(n), then the
region of convergence of x (n) convoluted y (n) is
(a) . (b)
(c) . (d) .
(43) The Discrete Time Fourier transform of the exponential signal ejw0n is
(a) a constant (b) a rectangular gate
(c) an impulse (d) a series of impulses
(44) is
(a) an energy signal. (b) a power signal.
(c) neither an energy nor a power signal. (d) an energy as well as a power
signal.
(45) To compute the DFT of x(n)= {1,2,1}, the minimum number of complex multiplications required
will be
(a) 3 . (b) 6.
(c) 9. (d) 4
(46) Which ATM Adaptation Layer (AAL) is usually used for voice service?
(a) AAL1 (b) AAL3
(c) AAL4 (d) AAL5
(47) In IEEE 802.11, the access method used in the DCF sublayer is _________.
(a) CSMA/CD (b) CSMA
(c) CSMA/CA (d) DSSS
(51) In modes for which the Ez and Hz fields are non zero are called as :-
(a) TE mode (b) TM mode
(c) Hybrid mode (d) None of the above
(52) In case of Evanescent field, exponential decay of field will take place in :-
(a) Core (b) Cladding
(c) No exponential delay (d) In both core & cladding
(53) Fresnel reflection loss occurs when a ray passes from one medium to another medium having :-
(a) a different RI (b) Same RI
(c) Both of the above (d) None of the above
(55) In eye-pattern technique, the height of the eye opening at specified sampling time gives the :-
(a) Noise margin (b) Fade margin
(c) Frequency (d) Wavelength
Section-3
(61) A network in which there are multiple network links between computers to provide multiple paths
for data to travel is defined as a
(a) Mesh network (b) star network
(c) hybrid network (d) bus network
(62) Method of allocating memory that can be used instead of or in conjunction with paging is
defined as
(a) fragmentation (b) segmentation
(c) memory protection (d) none of the above
(64) For the network 131.107.2.0 with a subnet mask of 255.255.255.0, the range of IP addresses is
(a) 131.107.2.1–131.107.2.254 (b) 131.107.255.1–131.107.255.254
(c) 131.107.2.0 –131.107.2.254 (d) 131.107.2.1–131.107.2.255
(65) Suppose you are doing RSA encryption with p = 13, q = 7, and e = 5. Find the decryption exponent
d.
(a) d=22 (b) 29
(c) 27 (d) 32
(66) The IEEE convention for wireless communication is
(a) 802.3 (b) 802.11
(c) 802.16 (d) 802.13
(67) The two basic building blocks of all encryption techniques are
(a) substitution and transposition (b) substitution
(c) transposition (d) all of the above
(70) Which layer in OSI model encodes and decodes as well as encrypts and decrypts data,
compresses and decompresses data
(a) Application Layer (b) Session layer
(c) Presentation Layer (d) Transport layer
(71) Which of the following is not a command of Data Definition Language (DDL) in SQL.
(a) Drop (b) Insert
(c) Truncate (d) Alter
(a) Both (i) and (ii) are false (b) Both (i) and (ii) are true
(c) (i) is true and (ii) is false (d) is false and (ii) is true
(73) ________________ is a compiled collection of programs or SQL statements that live in the
database and it can access and modify data present in many tables.
(a) Command (b) Stored procedure
(c)Trigger (d) None of the above.
(75) A candidate key is an attribute (or set of attributes) that uniquely identifies a row. A candidate key
must possess the following properties:
(a) Unique identification and Non redundancy (b) Relationship and Non redundancy
(c) Unique identification atomicity (d) Unique identification and redundancy
(76) For referential integrity to hold, any field in a table that is declared a foreign key can contain only
values from a parent table's primary key or ________.
(a) Candidate key (b) Super key
(c) Any correct filed (d) None of the above.
(77) __________ is usually the key selected to identify a row when the database is physically
implemented
(a) Primary key (b) Super key
(c) Foreign key (d) None of the above
(79) In database theory, a ___________ is a virtual or logical table composed of the result set of a
query.
(a) Macro (b)Form
(c) View (d) None of the above.
(80) _________ is defined as a set of attributes of a relation variable upon which all attributes of the
relation variable are functionally dependent.
(a) Primary key (b) Super key
(c) Foreign key (d) None of the above
(81) When you turn on the computer the boot routine will perform this test:
(a) power- on self- test (b) RAM test
(c) Disc drive test (d) Memory test
(82) The part of the operating system that manages the essential peripherals such as disc drives,
parallel and serial ports:
(a) secondary input / output system (b) peripheral input / output system
(c) marginal input / output system (d) basic input / output system
(83) _____ file table contains a copy of FCB of each open file as well as other information
(a) per process open file table (b) system wide open file table
(c) master file table (d) super block file table
(87) High speed memory where tasks or instructions are lined up for subsequent execution is called:
(a) cache (b) registers
(c) main memory (d) disc storage
(88) The run time mapping from virtual to physical address is done by a hardware device called:
(a) relocation register (b) physical address register
(c) memory management unit (d) logical register
(89) Program that wraps around the operating system kernel to give an interface between user and
the kernel is :
(a) Application program interface (b) System call interface
(c) Command line interface (d) None
(90) The memory management scheme that supports user view of memory is:
(a) paging (b) fragmentation
(c) segmentation (d) none
(93) What is the output in case you write int i = 128; i <<= 2; cout << i;
(a) 256 (b) 128
(c) 512 (d) None of the above
(94) What is the output in case you write cout << (char)(67-2);
(a) C (b) A
(c) 65 (d) None of the above
(98) If a Binary tree has Pre Order and Post order traversals as follows
Pre Order: A B D F C E G
In Order: B F D A E G C
Which of the following is the Post order traversal of the tree?
(a) F D B G A C E (b) F D B E G C A
(c) F D B G E C A (d) F D B A G E C A
(99) What happens when you allocate memory at run time but forget to release it?
(a) The program crashes (b) The program behaves erratically
(c) The program behaves normally (d) None of the above
0 1 2 3 4 5 6 7 8 9
0 D C A B A B B B D
1 B C A B A C B B A C
2 C C C A C D D B A B
3 D C A C A A B A B D
4 A A C C A C A C B A
5 D C B A A A B A A B
6 B A B C A B B A C C
7 B B B B D A A A D C
8 B A D B D A C A C B
9 C C A,B C B A B B C C
10 B