Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
K-2413 1 ±Üâ.£.®æãà./P.T.O.
*K2413* Total Number of Pages : 8
Paper II 2 K-2413
*K2413* Total Number of Pages : 8
7. Which of the following input combinations 13. The library function exit ( ) causes an exit
is not allowed in an SR flip-flop ? from
(A) S = 0 R = 0 (A) the loop in which it occurs
(B) S = 0 R = 1 (B) the block in which it occurs
(C) S = 1 R = 1 (C) the program in which it occurs
(D) None of the above (D) the function in which it occurs
8. How many full address are required to 14. A structure brings together a group of
construct an m bit parallel adder ? (A) related data types and variables
(A) m/2 (B) m + 1 (B) items of the same data type and
(C) m (D) m 1 variables
(C) integers with user defined names
9. Which logic family dissipates the (D) variables only
minimum power ?
(A) TTL (B) ECL 15. The most important role of a function is
(C) CMOS (D) DTL (A) provide a name to a block of code
(B) just help in reducing the size of code
10. The remainder obtained from (C) help organise a program into
11011.10 101 is
conceptual units and thereby
(A) 01 (B) 10 possibly to reduce the program size
(C) 11 (D) 00 (D) accept arguments and return a
value
11. A C++ operator that works in a special
16. Classes are useful because they are best
way on a newly defined data type is said known for the following
to be
(A) permit data to be hidden from other
(A) encapsulated (B) classified classes
(C) polymorphed (D) overloaded (B) bring together all aspects of an
entity in one place
12. Consider the following elements 14, d,
(C) can closely models objects in the
3.268, galaxy, galaxy ( ). In that sequence
real world
they represent
(D) all the above (A, B, C)
(A) constant, ASCII, numeral, variable,
function 17. A specialization with a constraint that a
(B) integer constant, character constant subclass can be a subclass in more than
float point constant, identifier or one class/subclass relationship is
variable, function name referred to as
(C) numeral constant, alpha constant, (A) specialization lattice
numeral variable, function name, (B) specialization hierarchy
mathematical function
(C) total specialization
(D) none of the above (D) none of the above
K-2413 3 Paper II
*K2413* Total Number of Pages : 8
18. The data structures used for indexing in 22. Assume a 2 d array having m rows and
multiple key access methods are n columns. It is required to swap ith
column and jth column. Which of the
(A) B tree following statement is not true ?
+
(B) B tree (A) A 1 d array of m elements is
required
(C) hash data structure
(B) A statement such as A (K, i) for
(D) none of the above K
1 to m will be utilised
(C) The computing time is 0 (m)
19. A relation schema R is an 3NF if every
(D) Copy the contents of ith column into
nonprime attribute of R is jth column and vice versa
(A) fully functionally dependent on
23. Assume a square array of size n×n. What
every key of R
should be the algorithmic segment to go
(B) non-transitively dependent on every through lower triangular elements
key of R (A) for i 1 to n do for j
1 to i
(D) for i
1 to n do for j
n down to i
20. The operation that selects certain 24. If the earliest computing time for an
columns from a relational table and unsuccessful search is 1 then the type of
discards the other columns is search and the corresponding data type
could be
(A) PROJECT (A) binary search in 1 d array of sorted
(B) SELECT elements
(B) linear search in 1 d array of
(C) INTERSECTION
unsorted elements
(D) None of the above (C) linear search in 1 d array of sorted
elements
21. The SQL function that specifies universal (D) in all above mentioned three cases
quantifier in relational calculus is
25. The structure of a heap should be
(A) EXISTS
(A) A tree
(B) NOT EXISTS
(B) A complete binary tree
(C) UNION (C) A graph
(D) DIVISION (D) A binary tree
Paper II 4 K-2413
*K2413* Total Number of Pages : 8
26. In-order, Pre-order and Post-order 30. Which best describes a router ?
traversals are associated with (A) Acts as a multi-port repeater and
(A) any graph having n vertices and occupies the center of a star
more than n edges topology network
(B) any graph which is connected and (B) Extends the operating distance of a
in which there is one and only one network by clearing and amplifying
path between any two vertices signals
(C) any graph which is circuitless and (C) Screens network traffic based on
connected and one vertex is root or source and destination MAC
reference vertex addressing
(D) any graph which has n vertices and (D) Forwards packets from one network
less than n edges to another based on network layer
information
27. The total number of pendant vertices in
a full binary tree of n vertices is 31. What does the twisting of the wires do in
a CAT-5 cable ?
(A) (B)
n ( n 1 )
2 2
K-2413 5 Paper II
*K2413* Total Number of Pages : 8
34. Which of the following tool is referred to 38. Suppose a new process in a system
as parser generator ? arrives at an average of six processes per
(A) LEX minute and each process requires an
(B) TeX average of 8 seconds of service time.
Estimate the fraction of time the CPU is
(C) YACC
busy in a system with a single processor
(D) None of the above
(A) 60% (B) 70%
35. The resolution of external references in (C) 80% (D) 90%
an object module generated by a
compiler is done by 39. A file has several lines of data. How can
(A) loader we get the line of data whose following
line has a string pattern AAA in it
(B) compiler
(A) /AAA/ {print j0}
(C) linker
(D) all the above three : (A), (B) and (C) (B) ? AAA/ {print j1}
(C) /AAA ? {print j 0}
36. The automatic garbage collection (D) /AAA/ {print j1}
refers to
(A) allocation of memory to unreachable 40. Thrashing
data (A) is a natural consequence of virtual
(B) deallocation of memory to memory system
unreachable data (B) can always be avoided by swapping
(C) allocation of memory to reachable (C) can be caused by poor paging
data algorithms
(D) deallocation of memory to (D) none of the above
reachable data
41. Addresses in sed can be in one out of
37. In directed acyclic graph for expressions,
how many types
the following is true
(A) one (B) two
(A) leaves correspond to atomic
operands and interior nodes (C) three (D) four
correspond to operators
42. In unix system default permission for a
(B) leaves correspond to operators and
interior nodes correspond to file and directory is
operands (A) 666, 777
(C) operands and operators correspond (B) 555, 666
to alternate nodes on a path (C) 777, 666
(D) none of the above (D) 666, 555
Paper II 6 K-2413
*K2413* Total Number of Pages : 8
43. The linear sequential model in Software 47. Modularity in Software Engineering
Engineering is
(A) is a feature because of top-down
(A) Prototype modeling
design
(B) Waterfall modeling
(B) helps make large programs more
(C) Incremental modeling
understandable
(D) Spiral modeling
(C) both (A) and (B)
44. Top-down divide strategy is employed in (D) neither (A) nor (B)
Software Engineering for
(A) to refine the statement of the 48. A Data-Cube is an example for
problem in terms of decomposed (A) Data Warehouse
partitions of the problem
(B) Data generation
(B) to draw specification requirements
(C) Data transformation
(C) to estimate the software cost
(D) None of the above
(D) to collect the data to test a code
K-2413 7 Paper II
*K2413* Total Number of Pages : 8
bñÜᤠÃÜÖÜPÝRX ÓܧÙÜ
Space for Rough Work
Paper II 8 K-2413