Sei sulla pagina 1di 5

Course Code: IT352

Course name: COMPREHENSIVE EXAM


Max. Marks: 50 Duration: 1 Hour
PART A- COMMON COURSES

3.
The resultant of two equal forces has the same magnitude as either of the forces, then the angle
between the two forces is
a) 1200 b) 300 c) 900 d) 600
4.
Two bodies of masses m1 and m2 are dropped from the top of a tower of same height. When these
bodies reach the ground, their kinetic energies will be in the ratio
1:2 b) 1: √2 c) 1: 4 d) 1:1
5.
The top view of a pentagonal prism with axis perpendicular to the vertical plane and parallel to
horizontal plane will be a
a. Pentagon b) Rectangle c) Trapezoid d) Straight line
6.
In perspective projection the object is assumed to be kept on which of these planes.
a. Picture plane b) Horizon plane c) Ground plane d) Central plane

7.
Which is the most abundant element available in the atmosphere?
a. Oxygen b) Nitrogen c) Argon d) Carbon di oxide
8.
The total amount of greenhouse gases produced to directly and indirectly support human activities,
usually expressed in equivalent tons of carbon dioxide
a. Carbon Dating b) Carbon Trading c) Carbon Footprint d) Carbon Factor
9.
One of the pins in a 3 pin plug top is bigger than the rest. This is most closely related to design for
‘X’, where ‘X’ is
a. Assembly b) Manufacturing c) Life cycle Cost d) Environment

Page 1 of 5
10. Which of the following can be most appropriately associated with the design space of a ball?
a) Speed b) Velocity c) Diameter d) Height
PART B- CORE COURSES
11. At the beginning of an instruction cycle , the contents of the instruction register is 5 and that of
program counter is 320.When the instruction is read, the address part of the instruction is the
number 7 .Then the effective address in relative address mode is :
a) 328 b) 327 c) 325 d) 342
12. The technique where the controller is given complete access to main memory is
a) Cycle stealing b) Memory stealing c) Burst mode d) Bus master-ship
13. CPU as two modes privileged and non-privileged. In order to change the mode from privileged
to non-privileged
a) A hardware interrupt is needed b) A software interrupt is needed
c) Either hardware or software interrupt is d)
A non-privileged instruction (which
needed does not generate an interrupt)is
needed
14. A CPU has 16 bit program counter.This means that the CPU can address :
a) 16K memory b) 32 K memory c) 64 K memory d) 256 K memory
locations locations locations locations
15. A processor has 40 distinct instructions and 24 general purpose registers. A 32-bit instruction
word has an opcode, two register operands and an immediate operand. The number of bits
available for the immediate operand field is .
a) 16 b) 8 c) 4 d) 32
16. Arrange the following configurations for CPU in decreasing order of operating speeds;
a) Hardwired control, Vertical b)Hardwired control, Horizontal
microprogramming, Horizontal microprogramming, Vertical
microprogramming. microprogramming.
c) Horizontal microprogramming, Vertical d) Vertical microprogramming,
microprogramming, Hardwired control. Horizontal microprogramming,
Hardwired control.
17. Consider a 4-way set associative cache consisting of 128 lines with a line size of 64 words. The
CPU generates a 20-bit address of a word in main memory. The number of bits in the TAG,
LINE and WORD fields are respectively:
a) 9,6,5 b) 7,7,6 c) 7,5,8 d) 9,5,6
18. Which of the following are decidable?
I. Whether the intersection of two regular languages is infinite
II. Whether a given context-free language is regular
III. Whether two push-down automata accept the same language
IV. Whether a given grammar is context-free
a) I and II b) II and III c) I and IV d) II and IV

Page 2 of 5
19. Turing machine (TM) is more powerful than FMS (Finite State Machine) because
a) tape movement is confined to one direction b) it has the capability to remember
arbitrarily long sequences of input
symbols
c) it has no finite state d) none of these
20. Which of the following remarks the given statement?
Statement: “Any function whose values can be computed by an algorithm, can be computed by
a Turing machine”.
a) Ardens theorem b) Structured Program theorem
c) Church-Turing thesis d) None of the mentioned
21. Which of the following languages over {a,b,c} are accepted by a DPDA?
a) {wcwR | w {a,b}*} b) {wwR | w {a,b,c}*}
c) {anbncn | n ≥ 0} d) {w | w is a palindrome over {a,b,c}}
22. Choose the correct statement
1. An FSM with one stack is more powerful than a FSM with no stack
2. An FSM with two stack is more powerful than a FSM with one stack
3. An FSM with three stack is more powerful than a FSM with two stack
a) Only 1 is true b) 1 and 2 are true c) 2 and 3 are true d) All are true.
23. Choose the correct statement:
a) all languages can be generated by CFG’s
b) any regular language has an equivalent CFG’s
c) Some non-regular languages can’t be generated by any CFG’s
d) Some regular languages can’t be generated by any CFG’s
a) a,b are correct b) b,c are correct c) b,d are correct d) a and d are correct
24. An FA with all final states is unreachable will accept
a) All the strings from the alphabet set b) Null string
c) Empty string d) The language of above FA depends on
number of final states
25. Fork () is
a) Process control b
File c) Protection d) Communicati
system call )
manipulation system call on system call
system call
26. In which of the following scheduling policies context switching never takes place
a) Round Robin b Priority c) SRTF d) FCFS
) scheduling
27. A situation where several processes access and manipulate the same data concurrently and the
outcome of the execution depends on the particular order in which access takes place is called :

Page 3 of 5
a) data consistency b race condition c) aging d) starvation
)
28. Virtual Memory is
a) Part of Main b Part of c)
A technique to d) None of the
Memory only used ) Secondary allow a above
for Swapping storage used in program, of
program size more than
execution the size of the
main memory,
to run
29. Which one of the following is the deadlock avoidance algorithm?
a) banker’s algorithm b round-robin c) elevator d) karn’s
) algorithm algorithm algorithm
30. Link directory operation is used for
a) Link one directory to b Link one file to c) Allow file to d) Allow to view
another ) another file in appear in more all related
another than one files in
directory directory directory

31. Which of the following is not a necessary condition for deadlock?


a) Hold and Wait b Mutual c) Circular wait d) None of the
) Exclusion above
32. describe the characteristics of an entity.
a) Attribute b Constraints c) Cardinality d) Relation
)
33. Which of the following data type is not supported by SQL?
a) Char (n) b String (n) c) Varchar(n) d) Float(n)
)
34. For each attribute of a relation, there is a set of permitted values, called the of that attribute
a) Domain b Relation c) Set d) Schema
)
35. The rule that a value of a foreign key must appear as a value of some specific table is called a
a) Integrity Constraint b Index c) Referential d) Functional
) Integrity dependency
36. To search for a record, in a database with k blocks, using primary indexing, what is the
maximum number of block accesses required?
a) log2(k) block b log2(k) + 1 c) k/2 block d) log2(k/2)
accesses ) block accesses accesses block accesses
37. Checkpoints are a part of
a) Recovery b Concurrency c) Isolation d) Durability
)
38. The search value which is present on each node in search tree diagram of order 'p' is as
a) p-1 b p-2 c) p+1 d) p+2
)

Page 4 of 5
39. Which one of the following task is not done by data link layer?
a) Framing b) Error control c) Flow control d) Channel coding
40. In OSI network architecture, the routing is performed by
a) Network layer (b) Data link layer c) Transport layer d) Session layer

41. In which of the following protocol(s) it is possible for sender to receive acknowledgement for a
packet that falls outside its current window?
a) Selective repeat b) Stop and wait c) Go back N d) All of the
protocol protocol protocol above
42. What is the size of Source and Destination IP address in IP header?
a) 4 Bits b) 8 Bits c) 16 Bits d) 32 Bits

43. Which frames are used to transport user data and control information relating to user data
(piggybacking)?
a) I-frames b) V-frames c) S-frames (d) H-frames
44. Which is a connectionless protocol?
a) SMTP b) TELNET c) IP d) FTP
45. Which algorithm will be faster according to given options of their time
complexities
a) O(n2) (b) O(n logn) c) O(n) (d) O(1)
46. The concatenation of two lists is to be performed in O(1) time. Which of the following
implementations of a list should be used?
a) singly linked list b) circular doubly c)
array d) doubly linked
linked list implementation list
of lists
47. The data structure required to check whether an expression contains balanced parenthesis is.....
a) Queue b) Stack c) Array d) Tree
48. Quick sort is an example of
a) Greedy approach b) Improved binary c) Dynamic d) Divide and
search programming conquer
49. A full binary tree with n leaves contains
a) n nodes (b) 2n-1 nodes n
c) (d) log2 n nodes
2 nodes
50. A hash function f defined as f(key)=key mod 13, with linear probing is used to insert key
55,58,68,91,27,145. What will be the location of 79?
a) 1 b) 2 c) 3 d) 5

Page 5 of 5

Potrebbero piacerti anche