Professional Documents
Culture Documents
K-2418 (Computer Science and Applications) (Paper II)
K-2418 (Computer Science and Applications) (Paper II)
K-2418 (Computer Science and Applications) (Paper II)
Roll No.
(Figures as per admission card)
K-2418 1 ±Üâ.£.®æãà./P.T.O.
*K2418* Total Number of Pages : 16
1. How many 2-digit numbers greater 6. How many flip-flops circuits are needed
than 40 can be formed by using the digits to divide by 16 ?
1, 2, 3, 4, 6, 7 when repetition is allowed ? (A) Two (B) Four
(C) 18 (D) 10
(A) 0, 0 and 0, 1
5. An and gate has 7 inputs. How many
input words are in truth table ? (B) 0, 0 and 1, 0
Paper II 2 K-2418
*K2418* Total Number of Pages : 16
9. What is the output of the following 13. In SQL the word ‘natural’ can be used
program ? with
(A) Inner join
# include < stdio.h >
(B) Full outer join
int main ( )
(C) Right outer join
{
(D) All of the above
printf (“%d”, ‘A’) ;
return 0 ; 14. In 2NF
} (A) No functional dependencies (FDs)
exist
(A) A (B) ‘A’
(B) No multivalued dependencies
(C) 64 (D) 65 (MVDs) exist
(C) No partial FDs exist
10. Given the array declaration
(D) No partial MVDs exist
int myArray [ ] = { 0, 2, 4, 6, 8, 10 }.
What is the value of 15. Relations produced from an E-R model
myArray [myArray[2] ] ; ? will always be
(A) 0 (B) 2 (A) First normal form
(B) Second normal form
(C) 8 (D) 6
(C) Third normal form
11. An C++ operator that works in special (D) Fourth normal form
way on newly defines data type is said
16. In RDBMS, different classes of relations
to be are created using _________ technique
(A) Encapsulated to prevent modification anomalies.
(B) Classified (A) Functional Dependencies
(B) Data integrity
(C) Polymorphed
(C) Referential integrity
(D) Overloaded
(D) Normal forms
12. Local variables are also called as 17. A full binary tree with n leave contains
________ variables. (A) n nodes
Paper II 3 K-2418
*K2418* Total Number of Pages : 16
18. A machine needs a minimum of 23. A bridge has access to which address of
100 sec to sort 1000 names by quick a station on the same network
sort the minimum time needed to sort (A) Physical
100 names will be approximately
(B) Network
(A) 50.2 sec
(C) Service access point
(B) 6.7 sec
(C) 72.7 sec (D) All of these
Paper II 4 K-2418
*K2418* Total Number of Pages : 16
Paper II 6 K-2418
*K2418* Total Number of Pages : 16
44. Which circuit implements the hardware 47. Consider the following relational schema :
priority input unit function to determine Supplier (sid : integer, sname : string,
the highest priority of simultaneously city : string , street : string)
arriving various input signals ? Parts (pid : integer, pname : string,
color : string )
(A) Priority Decoder Catalog (sid : integer, pid : integer,
(B) Priority Selector cost : real)
Assume that in the suppliers relation
(C) Priority maximizer
above, each supplier and each street
(D) Priority Encoder within a city has a unique name and
(sname, city) forms a candiate key. No
45. Every Boyce-Codd Normal form (BCNF) other than those implied by primary and
decomposition is candiate key. Which of the following
TRUE about the above schema ?
(A) Dependency preserving
(A) The schema is in BCNF
(B) Not dependency preserving
(B) The schema is in 3NF but not in
(C) Need to be dependency preserving BCNF
(D) None of these (C) The schema is in 2NF but not in
3NF
46. Match the following : (D) The schema is not in 2NF
a. Secondary index 1. Functional
48. Let R (a, b, c) and S (d, e, f) be two
dependency relations in which d is the foreign key of
b. Non-procedural 2. B-Tree S that refers to the primary key of R.
Query language
Consider following four operations
c. Closure of a set 3. domain R and S
of attributes calculus i. insert into R
d. Natural-join 4. Relation ii. insert into S
algebraic iii. delete from R
operation iv. delete from S
Codes : Which of the following can cause violation
a b c d of the referential integrity constraint
above ?
(A) 2 3 1 4
(A) Both i and iv
(B) 3 2 4 1
(B) Both ii and iii
(C) 3 1 2 4 (C) All of these
(D) 2 1 4 3 (D) None of these
Paper II 7 K-2418
*K2418* Total Number of Pages : 16
49. How many K bytes does a frame buffer 53. The Running time T(n), where (n) is
needs in a 600 × 400 pixel ? the input size of a recursive algorithm is
Paper II 8 K-2418
*K2418* Total Number of Pages : 16
56. What does the following command do ? 59. Match the following :
grep – vn “abc” x P. Smtp 1. Application layer
(A) It will print line number of file x Q. BGP 2. Transport layer
in which there is a match for the
R. TCP 3. Data link layer
string “abc”
S. PPP 4. Network layer
(B) It will print all of the lines in the file
5. Physical Layer
x that do not match the search
string “abc” Codes :
65. Let y = 0 × 1ff ; 70. The two dimensions of spiral model are
Paper II 10 K-2418
*K2418* Total Number of Pages : 16
71. Match the following with various activities 73. Consider a 4-way set associative cache
consisting of 128 lines with a line size
encountered in a software life cycle.
of 64 words. The CPU generates a
P. Requirements 1. Module 20-bit address of a word in main memory.
capture development and The number of bits in the TAG, LINe and
word fields are respectively.
integration
(A) 9, 6, 5 (B) 7, 7, 6
Q. Design 2. Domain analysis (C) 7, 5, 8 (D) 9, 5, 6
R. Implementation 3. Structural and
74. Consider the methods used by
behavioral processes P1 and P2 for accessing their
modeling critical sections whenever needed,
as given below. The initial values of
S. Maintenance 4. Performance
shared boolean variables S1 and S2 are
tuning randomly assigned.
method used by P1
Codes :
while (S1 = S2) ;
(A) P – 3, Q – 2, R – 4, S – 1 critical section
S1 = S2 ;
(B) P – 2, Q – 3, R – 1, S – 4
method used by P2
(C) P – 3, Q – 2, R – 1, S – 4
while (S1 ! = S2);
(D) P – 2, Q – 3, R – 4, S – 1 critical section
S2 = not (S1) ;
72. IEEE 830-1993 is a IEEE Which one of the following statements
recommended standard for describes the properties achieved ?
(A) Mutual exclusion but not progress
(A) Software requirement specification
(B) Progress but not mutual exclusion
(B) Software design (C) neither mutual exclusion nor
progress
(C) Testing
(D) Both mutual exclusion and
(D) Maintenance progress
Paper II 11 K-2418
*K2418* Total Number of Pages : 16
75. Which of the following features will 78. Match the following knowledge
characterize an OS as multi-programmed representation techniques with their
OS ?
application.
a. more than one program may be
loaded into main memory at the List – I List – II
same time.
a. Frames i. Pictorial
b. If a program waits for certain event
another program is immediately representation
scheduled. of objects, their
c. If the execution of a program attributes and
terminates, another program is
relationships
immediately scheduled.
(A) (a) only b. Conceptual ii. To describe real
(B) (a) and (b) only dependencies world stereotype
(C) (a) and (c) only events
(D) (a), (b) and (c) only c. Associative iii. Record like
Paper II 12 K-2418
*K2418* Total Number of Pages : 16
79. In an expert system, the expertise is 83. Which of the following is TRUE for the
contained in a language ?
(A) Data base { aq | q is a prime }
(B) Model base
(A) It is not accepted by a Turing
(C) Knowledge base
machine
(D) Content base
(B) It is context-free but not regular
80. What is a manager’s primary use of a (C) It is regular but not context-free
MIS ?
(D) It is neither regular nor context-
(A) to facilitate problem solving and
free, but accepted by a Turing
decision making
machine
(B) To facilitate quality control
(C) To monitor inventory 84. The language accepted by a pushdown
(D) To evaluate productivity automaton in which the stack is limited
to 8 items is best described as
81. Let w be any string of length n in {0, 1}*.
Let L be the set of all substrings of w. (A) context-free
What is the minimum number of states (B) Regular
in a non-deterministic finite automaton
(C) Deterministic context-free
that accepts L ?
(D) Recursive
(A) n –1
(B) n 85. Huffman coding is an encoding algorithm
(C) n + 1 used for
(D) 2n +1 (A) files greater than 1m bit
82. Which one of the following is FALSE ? (B) lossy data compression
Paper II 13 K-2418
*K2418* Total Number of Pages : 16
87. What is the sum of all components of a 91. The Hungarian method for solving an
normalized histogram ? assignment problem can also be used
(A) 1 to solve
89. The dual simplex method is applicable 93. Back propagation is a learning technique
provided that adjusts weights in the neural network
by propagating weight changes
(A) Optimality remains satisfied
(A) Forward from source to sink
(B) feasibility remains satisfied
(B) Backward from sink to source
(C) Both remain satisfied
(C) forward from source to hidden
(D) Optimality is satistified but nodes
feasibility is disturbed (D) Backward from sink to hidden
nodes
90. In an unweighted, undirected connected
94. Epoch is a term used to describe in
graph, the shortest path from a node S
neural network for
to every other node is computed most
(A) 25% of data in the training set is
efficiently in terms of time complexity presented to the neural network
by
(B) 50% of data in the training set is
(A) Dijkstra’s algorithm starting from S presented to the neural network
(B) Warshall’s algorithm (C) No data in the training set is
presented to the neural network
(C) Performing a DFS starting from S
(D) All of the data in the training set is
(D) Performing a BFS starting from S
presented to the neural network
Paper II 14 K-2418
*K2418* Total Number of Pages : 16
Paper II 15 K-2418
*K2418* Total Number of Pages : 16
Paper II 16 K-2418