Professional Documents
Culture Documents
11 04 2019 Asea P1
11 04 2019 Asea P1
11 04 2019 Asea P1
: ASEAl/19
Register
Number
PAPER-I
CS, ECE, EEE AND IT
(Deg. Std.)
Time Allowed: 3 Hours] [Maximum Marks: 200
Read the following instructions carefully before you begin to answer the questions.
IMPORTANT INSTRUCTIONS
1. The applicant will be supplied with Question Booklet 15 minutes before commencement of the examination.
2. This Question Booklet contains 140 questions. Prior to attempting to answer the carHlidates are requested
to check whether all the questions are there in series and ensure there are no blank pages in the question
.booklet. In case any defect in the Question Paper is noticed it shall be reported to the Invigilator
within first 10 minutes and get it replaced with a complete Question Booklet. If any defect is
. noticed in the Question Booklet after the commencement of examination, it will not be replaced.
3. Answ'er all questions. Question Nos. l-,. 80 carry one mark each and question Nos. 81 '- 140 carry
2 marks each.
4. . You must write your Register Number in the space provided on the top right side of this page. Do not
write anything else on the Question Booklet.
5. An answer sheet v:,ill be supplied to you, separately by the Room Invigilator to mark the answers.
6. You will also encode your Question Booklet Number with Blue or Black ink Ball point pen in the space
provided on the side 2 of the Answer Sheet. If you do not encode properly or fail to encode the above
information, action will be taken as per commission's notification.
7. Each question comprises four responses (A), (B), (C) and (D). You are to select ONLY ONE correct
"response and mark in your Answer Sheet. In case you feel that there are more than one correct.
response, mark the response which you consider the besLIn any case, choose ONLY ONE response for
each question. Your total marks will depend on the number. of correct responses marked by you in the
Answer Sheet.
8. In the AnSWer Sheet there are four circles @ '@' @ and @ against each question. To answer the
questions you are to mark with Blue or Black ink Ball point pen ONLY ONE circle of your choice for
each question. Select one response for each question in the Question Booklet and mark in the Answer
Sheet. If you mark more than one answer for one question, the answer will be treated as wrong. e.g. If
for any item, @ is the correct answer, you have to mark as follows:
@.@@
9. You should not remove or tear off any sheet from this Question Booklet. You are not allowed to take
this Question Booklet and the Answer. Sheet out of the Examination Hall during the time of
. examination. After the examination is concluded, you must hand over your Answer Sheet to the
Invigilator. You are 'allowed to take the Question Booklet with you only after the Examination is over.
10. . Do not mark any marking in the question booklet except in the sheet before the last page of
the question booklet, which can be used' for rough work. This should be strictly adhered.
11. Applicants have to write and shade the total number of answer fields left blank on the boxes provided
at side 2 of OMR Answer Sheet. An extra time of 5 minutes will be given to specify the number of
answer fields left blank.
12. Failure to comply with any of the above instructions will render you' liable to such action or penalty as
the Commission may decide at their discretion. .
1
SPACE FOR ROUGH WORK
ASEAl/19 2 1
1. The Time period of IC 555 Monostable multivibrator operation is
1 3 ASEAl/19
[Turn over
6. A flip-flop whose state changes on the rising or falling edge of a clock pulse is said to be
(D) Triggering
(A) 00 ...tL1
(C) -1 • (D) 0
(A) 2 (B) 3
~4 (D) 6
ASEAll19 4 1
10. is the separation of user logical memory from physical memory.
11. -----
system.
(A) . Unknown
access allows a user to transfer files without having an account on the remote
••
(B). Arbitrary
12. ----- consists of all processes residing on disk .awaiting allocation of main memory.
13. .A cloud environment available via the internet to anyone willing to pay is
1 5 ASEAl/19
[Turn over.
14. Which RAID level represents. an Error - correcting codes (ECC) can be used directly in disk
•• 15. An index that is based on a uniform distribution of values across a range of brackets is called
16. The storage class used for global and local variables are
17. If the array is declared as int a(5)[5]' how many elements it can store?
(A) 10 '\jIf( 25
(C) 15 (D) 20
ASEAll19 6 1
18. A method that is declared ----- cannot be overridden in a sub-class .
"
20. ----- is an example of compile time polymorphism.
~ HLandDE
(B) HLandBC
(C) BC and DE
1- 7 ASEA1I19
[Turn over
22. What is the immediate super class of Applet Class?
23. An applet can play an audio file by Audioclip interface, which method is used to replay
continually?
25. A file that records information al,lOutevery HTTP request processed by the server
(A) We1Y
Server Log ..,JIll{" Access Log
ASEAll19 8 1
26. Which6f the following is a more sophisticated load balance?
~ Workload Managers
, 27. The process of preventing or inhibiting. the normal use or management of communication
facilities is called as
'" (C)
(D)
(i) - False, (ii) - True
1 9 ASEAlI19
[Turn over
30. Time series prediction is an example for
K .
32..P(x;l8) = L1tKPK(x;l8) is the -----model.
K=l
ASEAlI19 10 1
34. Which phase ofthe unified process transfers the software from the developer to the end-user
35. The risks that threaten the viability of the software to be built are
I
(A) .project risks (B) process risks
~. response tim~
(B). extensibility
37. The testing approach that begins with the atomic modules is referred to as •
1 11 ASEAl/19
[Turn over'
38. The capacitance of a varactor diode increases when reverse voltage across it
(B) physical
.. strength
.
..JIf!f". isolation.
ASEAl/19 12 1
42. ----- is an almost complet~ binary tree such that the chntent of each node is greater
(B) RAM
"~
"(D)
Dynamic Microprogramming
Cache Memory
••
44. The un'iversallogic gates are
45. In canonical sum of products, a sum of product form of logic expression consisting of only
(A) Maxterms
~" Minterms
(D) Variables
1 13 ASEAl/19
[Turn. over
46. In a birth-death process transition occur
47. In the probability distribution of arrivai and departures, the probability distribution of
number of arrivals in a fixed time interval follows
48. In a single server queuing system with Poisson input and exponential serVIce time with
limited queue'the steady state probability distributi~n of 'the n number of customers in the
system is given by
p
" p=-
A
(A)
1+ pN+! ' Ii
(1+ p)p" A
(B) Pn = I N+!
p=-
+p Ii
(1- p)p" .A
Pn = I N+!
p=-
-p Ii
1+ p A
(D) N"'l '
p=-
1+p Ii
ASEAl/19 14 1
49. The task of terminatin:g a thread before it has completed is known as
50.. The execution of a single query in parallel on multiple processors and disk is called
~ Intraquery Parallism
51. Special type of table, which can only be accessed and updated by the database system itself
called.
52. Which construct can be used to test for the absence of Duplicate Tuples in a relation?
I 15 . ASEAll19
[Turn over
53. Which header file is used for dynamic memoryallocationin C?
. (A) * (B) II
(D) %
."'" #
ASEAlI19 . 16 1
58. The 8086 instruction, MOV AX, (DI + 06) is
microcomputer.
60. . The multiplexed bus AD, - ADo is demultiplexed in 8085 using a signal
61. If the task executes the service codes and gets the system resources at that instance, it is
. said to be in
•
(A) idle (B) ready
1 17 .ASEAl/19
[Turn over
62. The method that handle the request made by the client
(Al 3 GL ,(B) 4 GL
.;jI( 5 GL (D) 10 GL
66. ----- is a cloud computing service model in which hardware is virtualized in the
cloud.
ASEAl/19 18 1
67. The key size of AES algorithm is
68: Which of the followingis true for Euler's theorem? If 0 and n are relatively prIme
.(A) Entropy
(i) Forward selection starts. with full set of attributes and removes attribute In
remaining set
(ii) Backward elimination start'Ywith empty set and adds attributes In subsequent
iterations.
1 19 ASEAll19
[Turn over
71. ~---~--is an open source project of the Apache foundation ..
¥ Hadoop (D) C
74. R is tooL
.75. MongoDB is
(A) RDBMS
ASEAlI19 20 1
76. . A connection that 'allows traffic only one way is called
(A) ISBN~Simplex
77. PPP is a byte-oriented protocol using byte stuffing with the escape byte
80. Software is .
(A) instructions that when executed provide desired features, function andperformance
(B) data structures that enable the programs to adequately manipulate information
(C) documents that describe the operation and use of the programs
1. 21 ASEAlI19
[Turn over
l .
81. The postfix form of given infix expression A - BI (C * D $ E) is
82. Two basic methods of dealing with a hash. clash are ------- and _
83. Convert the binary number 110.111 into its equivalent decimal number
(A) 17210
""" 17310
.ASEAl/19 22 1
J
'. . . ' .. '{ -'1 , 0 ~' x ~5, 0 ~ y ~ 3
85. Random vanables X and Y have Jomt PDF !x,y(x, y) = 15
,.' 0 otherwise
5
$' 3
-
10
(B) -
10
8 9
-
. (C) - (D)
10 10
(B) P(l- P)
"'" nP(I- P)
87. If a program's physical memory address is 300040 and the limit is 120900, then the program
can legally access all addresses between -------and -------
88. ,Algorithm Evaluation of CPU scheduling, Little's formula is used to evaluate algorithm.
Because of it is valid for
1 23 ASEAl/19
[Turn over
89. If you want to store a set of polygons in a database and to query the database to find all the
polygons thatintersects a given polygon. Which data is suitable for storing this information?
~ spatial database
90. The retrieval of audio and Videotypes of data has the requirement that data delivery must
,
proceed at a guaranteed steady state, .such data. are called some times
.~isochronous data
91. A traveller's information system that provides data on hotels, roadside service and the like
to motorist. What type of queries is suitable for processing such type of information?
~ location-dependent queries
ASEAl/19 24 1
. "
92., Main ()
, {
int * ptr; !
ptr = arr;
(A) 20 (B) 40
~30 (D) 10
(d) , double 4. 4
(A) 3 1 4 2
""2
(C) 3
4
.4
'I
~,
3
2
.•
(D) 2 1 4 3
1 25 ASEAll19
,[Turn over
94. In an 8051 programming, given below, find the data stored in A register and over flow flag
after addition operation.
MOV A, # 80 H
ADDA,#81 H
95. . The 8 KB EPROM is interfaced with 8085. Calculate the number of address lines needed and
the range of memory address.
97. The method that returns the value of the initialization parameter
ASEAlI19. 26 1
98. A ------- is one where the cloud has been organized to serve a common function
or purpose.
. "
99. Which of the following is a standard for interoperable cloud based key management?
(B) PMIK
100. Which of the following is the simplest unmanaged cloud storage device?'
~
'.,' ¥ file transfer utility "(B) antivirus utility
101. In RSA algorithm ifp = 17, q = 11 and d = 23. What is the plain text for the cipher text 11?
(A) 86 (B) 96
¥88 (D) 98
" .
1 27 ASEAl/19
[Turn over
102. Which of the following are advantages of large value of Kin K-NN algorithm?
/
(A) Less sensitive to noise
(iv) If the prediction does not match the output change the weight
v/. (ii), (i), (iv), (iii) (B) .. (i), (ii), (iii), (iv)
(C) (i), (iv), (iii), (ii) (D) (ii), (iii), (iv), (i)
104. Which of the following statement is true about different types of learning?
ASEAlI19 28 1
'105. ,Fundamental activities common to all software process are
'107. One of the advantages of using the "Lines of Code" metric is that
(C) it is poor software design may lead to exces'siveand unnecessary lines of code
# it is simple to measure
1 29 ASEAl/19
[Turn over
109. A JFET has loss = 32 rnA, Vas (oll) = -8V, Vas = -4.5 V. The value of drain current is
110. The dynamic resistance of a pn junction diode that has '1 = 1, VT =25. rnV and forward
current of 2 rnA is
R
~ Ie
VCE VCC
(A) next node, real node (B) free node, get node
ASEAl/19 30 1
113. The characteristic equation ofT-Flip flop is
114. The transition probability matrix of a Markov chain {X,,}, n = I, 2,3'" having 3 states I, 2, 3
is
P=
0.1 0.5
0.6 0.2 0.2
0.4] and the initial distribution IS p(O) = (0.7, 0.2, 0.1). The value of
[
0.3 0.4 0.3
P{X2 =3} is
1 31 ASEA'/
(Turr
116. In file system mounting, a mount point is
.¥ empty directory
117. Consider the following 4 processes, with the length of the CPU-burst time gwen In
milliseconds. What will be the average waiting time, if the processes are scheduled using
P, > 0 > 8
P2 > 1 > 4
.•.
P3 > 2 > 9
P4 > 3 > 5
.~ 6.5 milliseconds
32 1
ASEAl/19
118, FLWOR (for, let, where, order by and return) expressionsis represented in
(A) 3 2 4 1
(B) 3 4 2 1
~4 3 2 1
(D) 4 2 3 '1
large = (x > y) ? x ; y ;
(C) 25 (D) 5
1 33 ASEAlI19
[Turn over
121. Private data are accessible to
.'
(A), objects directly
122. In the multiple 'catch' statement, the number of the 'throw' statement is
.123. Which of the following component is not used to act as a input/output stream in Java?
ASEAlI19 34 1
125. <!DOCTYPE= rss
126. The method the return substring of string' started at given location
127. The file that allows a user to specify a value for the cookie
128. -------is a virtual machine technology presently owned by'Oracle that can run
1 35 ASEAll19
[Turn over
129. Which of the following is not present in Authentication header?
131. In Diffie Hellman key exchange, if q = 353 ; a = 3; XA = 97 and XB = 233. (XA and XB are
secret keys of user A and user B respectively) what is the public key of user B.
(A) 40 ~48
132.. What would be the ideal complexity of the cur,,:ewhich can be used for separating the two
classes in the image below?
**
* o* *
/linear (B). quadratic
ASEAlI19 36 1
•
136. Eventually consistency is a ~onsistency model used in distributed computing to achieve high .
1 37 ASEAl/19
[Turn over
137. ------- internet serVice providers provide direct service to the end users III
•
internet.
138. In ethernet, the MAC sublayer governs the operation of the access
method.
140. Which OSPF message is.used to discover who the neighbors are?
,-
ASEAl/19 38 1
SPACE FOR ROUGH WORK
1 39 ASEAl/l
, [Turn ove
. .
,.
40 1