You are on page 1of 10

(3

ComputerEngineering(CO) Date:7*August,2011 lnstructions: of onemark each. 1. Thereare 100questions 2. Atternpt all questions.

pm to 4.30pm Time:3.00
l)'
' /

Q: 1 Arrangethe following complexity functions in increasingorderof growth rate? i.2" 1i. nz iii. n log(n) iv. n D) iii, I, ii, iv ii c) iii, iv, ii,I r B) iii, iv,I, iii, ii, feliu, \J of following code Q: 2 What is thetime complexity while (n>1)ll wheren is someinteger>1 initially { n:nl2; ) A) O(n) ' i ElOltog ni
\:.-f

''-

f i.

:'"

' ' i i \.,

{ '

C) O(r/2)

D) noneoithe above

sort algorithmis-. Q: 3 Time complexityof SeleEiion

Al otnl

6h(n"r)

c) o(n^:)

D)o(nlogn)

by one passassembler? Q: 4 Whichof the following is not supported Instructions B) Jumpingto Label Conditional N clt D) Invocationof subrouting referencing *!)Fo.*u.d
Q: 5 Which of the following memory allocation techniques avoids internal fragmentation?

A) Fixedpartitionmemory allocation partitionmemory allocation Variable


Simple pagedal locatron

paging D) Demand Q: 6 Which of the following is not true? dataregion -g) ett thethreads of a processshares region havedifferent-data of a process B) All thethreads ..Sf An thethreads of a processsharestackregion D) A1l the threadsof a processhave different stack'region has Single Multiple Data (SIMD) Architecture o--Instruction Q: x' 7 *

on" cu'i.tiiii;ff;deALU, ffirraur,ipleALU,


t; one ALU, MultipleCU Ulbg

Multipte cu (A L*tD)

D) one ALU, OneCU (,S -f s'O;

by ALU? process of theinstruction is performed execution Q.8whichof thefollowing


B) DecodePhase A) FetchPhase , .C) Execute Phase . D)All of the Above

modeis usedin following instruction Q.9 which addressing R1 MOyE [7010H], B) IndirectAddressing Addressing 6o""it D) None of the above g.C')hegisterAddressing in . . . ... remains underexecution Q: l0 A program P6p!e 1'of 10

ComputerEngineering (CO)
/f,\

;A)IRAM

B) Harddisk C) Floppydisk

D) None of the above

in following instruction? Q : 1 1lrom which addressdata is accessed

MOVE [BX][Ri] , Rr;


Value of BX is 3000 and value of Ri is 20A4:

L8--lfall =.-- R,
D) ' 10A4 ,3a.'a .+_2649
9-?J 4-L

A) 3000

B) 20,44

Q: 12 Which phaseof the compilerwill detecterror in the followin g progfaml " tnt x, y z; x:20: 'b" Y: z: x+ y;

A) Syntax Analysis B) Semantic Analysis (a) (b) and D) None of the above ffiettfr ut'
.... Q.13Memory bufferRegister Holds the address of instructionwhich is to be executed ;\) Holds the data or instruction q$ fetched from memory -e; HotOs the instruction pickedup from memory D) is a special purpose register usedby CPU for temporary storage. processing speed? Q: 14 Which of the following doesnot increase A) Bus speed Pri*ury memory size *s C) Clock Speed ffi Secondary memory size arestored in Q: 15 StatusollBgical operations B) Accumulator qflntug' on Q: i6 PentiumMMX is based A) SISD architecture u) lvllSu arcnltecture Q : 1 7I n C) Memory Butfer
D) All of the above

B) SIMD architecture D)lVrlIVrlJ archrtecfure

the programcan be relocatedin main memory. A) DirectAddressing Q) IndirectAddressing C) Base-Indexed Addressing above ffiAlr ofthe

relates subroutines with maiqqtogram? Q: l8 Which systemsoftware A) AssemblerB) Parser .- C) Loader QfLinker Q: 19 Data type mismatchrelatederors areidentified during A)LexicalAnalvsis B) Syntax analysis ,/CISemantic Analvsis D) Code generation -b/{'

Q: 20 DuringDMA operation A) CPUcanaccess *uin *"*ory ifil)ppu canaccess its cache memory pfNone of theabove. C) Both(a)and(b)
n . of thefollowins is network laver device? Y . 2i Which

A) Hub Cdil.outer B) repeater D) Bridge 22 Source to destination connection information is maintained at Q:


Page 2 of l0

ComputerEngineering(CO) Layer S",*-t C) Presentation Layer B) Physical Layer D) SessionLayer

Q: 23 Which Q$llayer performsencryptionand decryption of message? B) TransportLayer {AFresentationLayer C) Network Layer D) ApplicationLayer of connection lessservice? Q:24 Which of the following is an example A) Telephone@fostal Service C) Mobile services D) Both (a) and (c) for Q: 25 SMTP Stands Mail t ansfo protocol 6fi-pl" B) Simple Mail transportProtocol C) Simple Message TransferProtocol D)Simple}lessage transport Protocol Q: 26. What is VPN? A) A privatenetworkbuilt within LAN B) Apublic networkbuilt within LAN ) A privatenetworkbuilt over Intemet D) A publicnetworkbuilt over Internet
;i{

Q:27 Which protocol is used.{ manageaddressbook on email server?

A) LDAP

i, PJrMAP

e) POP

D) SMTP
address.

132.18.29.54 is Q: 28 IP address A)ClassA @)try

D)ClassD

Q: 29 What clprQethe maximumnumberof host in one classC network? 1,A)2s4 B) 512 C) 128 D\ 824 mask,if a classB network is divided into 4 subnetworks? Q: 30 What is the subnet

,@zss.zss A)2ss.2ss.128.0 .1s2.a c) 25s.2ss.4.0 D)2ss.zss.2ss.2ss

internetconnection amongdifferenthostsof a Q: 3l Which devicecanbe usedto share network? seryer B) Firewall C) Router D) None of the above {d}f.o*y is Q: 32 RSA aleorithm t eXe*tyption t"chnique f$l,rUtl" 'T) Ignorethis option B) Private key encryptiontechnique D) Ignorethis option

Q: 33 Which of the following is not partof a staticsite? A) HTMLpages B) Images C) u-fr lSp ' Video \-/r Z Q: 34 What is port numberfor theUjjatrttp:/www.eooglffi A) 21 (Qt80 B) 27 D) None of the above Q: 35 Which of the following is not truefor HTTP? Pzige 3 of i0

ComputerEngineering(CO)

@o"""ction

Less

B) Stateful

C) Plain Text D) None sf the above

layerprotocolis usedby HTTP? Q: 36 What h'ansport B) UDP C) Bothja) & (b) sr"t

D) None of the above.

of router? Q: - 37 Which odJhefollowing is not a responsibility checkr"qu"rr"" numberof packet 6To B) To forward the packetusing IP address C) To maintain informationaboutthe path. D) All of the above in behaviorof memberfunctionof a class Q: 38 Which of the following allowschange without changingits declaration A) Method overloading @vletnoA overriding C) Createnew class D) none of the first element in arrayaFoo,an Q: 39 Which of the following givesthememoryaddress arraywith 100 elements? A) aFoo[0]; B) aFoo; C) &aFoo;qpaFoofrl; Q:40 What will be the outputof followingcode? void main0
) printf( " %d ohd o/od",sizeo f(3 . I 4),sizoof(3 . 14 f), sizeof(3 . 1aL)) ; ) A)448
l .

B)4810

c)8810

.,D)Nor,"

Q: 4l What will be the outputof followingcode? int main(int argc,char **argv)

:"-r lttl

*:.-n^:--!. rPr urlr!,

if(*ipPoint:: NULL) printf("Pointer is NULL \n"); else printf("Pointer is Not NULL\n"); j A) Pointeris NULL C) Compilation Error BJ Pointeris Not NULL f..*)n rntitne Error

Q: 42 What will be the outputof followingcode? int main(int argc,char **argv) { int iCount:O; while(iCount++<10) { If(iCount<4&& iCount<9) continue; pri ntf(" 7od\t"riCou.nt) ; )
t J

F6ge4 of 10 PCCET-11

(CO) Computer Engineering A)456789t0 B)5678 D) CompilationError

obs67ss

locking level is alsoknown as: Q.43. In database, B) S lock C) X lock D) Dead lock $*nrrlarity is not involved in deferredrecoverymethod? Q.44.Whichof the following operations A) Undo B) Redo C) Both D) None of the above ;.i . i .. , Passeng erCode, F li ght Code, D e p osi t, TotaIF are ) Which one is th correct query statement to find "the names of the passengersvtho have Bookings (B_pp Ury89il9 bookedticketsfor thefiight with code8A777 and have not paid the.full fare of their tickets yet".
A-) SelectName Iiom Passenser PassenserCode: where (Passenser bookings.PassengerCode) and (TotalFare>: Deposit) and FlightCode: BA777\

of a travel agency includes the following relations Q.45The database Passenger(tpg;CryEe{9dg Name,Address, klephone)

: Name from Passenger, Bookings where(Passenger.PassengerCode @tS"t"", > Deposit)andFlightCode: Bookings.Passenger.Code) and(TotalFare ,B1'77',l') C) SelectName from Passenger, Bookingswhere(Passenger.PassengerCode: >: Deposit)and FlightCode: Bookings.PassengerCode) and(TotalFare P.A777) D) Select Name from Passenger, Bookings where(TotalFare> Deposit) and :'BA7ll') FlightCode that everyprimary attributekey is non-null? Q.46 Which of the following rulesguarantees A) Operationalconstraints B) Domain constraint ntitv integrity constraint D) Referential integrity constraint $f, sal_name,address, city, Q.47 Considerthe following relationsalesman_master(salseman*no, state,pincode, sal-amt, tgt-toget, ytd-salse,remarl<s). Which constraintwill be defined for 'salesman the following ciindiiion: namemust start with salesand sal_amtis greaterthan 0(zero).'? '.nSo*uin A) Requireddata integrity C) Entity integrity of norrnalization? Q.48 What is the advantage A) Reductionof redundant data Q.49 Referentialintegrity refers to Paee 5 of 10 D) Referential integrity

B) Data consistency within the database {O}aff of the above

C) A betterhandleon database security

(CO) ComputerEngineering of a row in a table A) The enforceduniqueness B) The enforceduniqueness of a columnin a table \.G)tnsuring that a Foreign Key attributecannotbe NULL of Primary Key and Foreign Key values \P}*The enforcedsynchronization Q: 50 Which of the following is not true for index: ofrecords A) is usedfor fast and randomaccess the spaceoverhead B) increase automatically createdon primary key Q) created on a table on" index @Iu*ttu* "un-b" flow pathof the spiralmodel Q: 5lAs we moveoutwardalong with process with eaih phaseareminimized ..Bltost is increased A) Risks associated ;q Aand B both D) None of the above

is not true: Q: 52 Which of the following statement model is throwaway model A) Protctype definitionis not very clearto customers B) Prototype modei is usedwhensystem model increased the overallsystemdevelopment cost. i-9),.Prototype ' D)'none of the above and systemtestplansaredefinedin: Q: 53 Acceptance A) High level Design .fr ($fReqrritementAnalysis B) DetailDesign D) SystemEngineering

model is suitablefor a system with high userinteractionand changing Q: 54 Whichprocess requirements?


^,,
l \ \ t t - , a - l t

yv4L!r

r4ll

l_ll\JLrlgr.

D/

rlululypg

llluugl

/-\ { C)} Spiral model


\=l

D) None of the above

servesas agreement client and the developer? between Q: 55 Which document .r'*\ (SARS B) SystemArchitecture C) TestPlan D) None of the above of analysis? Q: 56 Which of the following artifactsis NOT an outcome Software Requirement Specification A) SRS .J) etgorithm Design Test Plan D) SystemTest Plan C) Acceptance following is a limitation water fall 57 Which of the of model? Q: is, is difiicult to accommodate changingrequirements development time is higherthanthe othermodel. B) Software Projectplanningis difficult C) Software D) None of the above. Q: 58 rVhichof the following is not usedin datamodelingtechnique? ,'n B) DataFlow Diagram glE- R diagram C) ClassDiagram D) Noneof the above PaS 6'of 10
PGCbI-iI

ComputerEngineering (CO)

by usecasediagram? Q: 59 Which of the following is not described A) The input and output actor gives/recieves to/from system. B) The preconditionthat must be satisfiedfor successful executionof process 9d \-D) Thecontrolflow in the process The exceptionconditionsin the process.

to softwaretesting? Q: 60 Which of the following is true with respect A) If unit testing is successfulfor each module than integration testing is not required. /.p)Integration testing is usedto checkthe interfacebetweenthe module. C) Unit testingis carriedout only if the integration testingfails. D) Noneof the above. Q: 6l Whichof thefollowingis a tautology (b---+ A) a v fo--+ c) C) aVb---bnc
B) a -+ S ---+(b -+ c) D) aAb---bvc

techniques is usedin the quick sort Q: 62 Which of the following algorlthmdesign alsorithm?
A) dynamic programming B) backtracking

,nd ffildivide L."',/ "Jnqr"r

D) greedy method

Cornponent Interconnect (PCI) cardusedto generate encryption Q: 63 This is a Peripheral keysfor secure transactions on e-commerce Websites. A) PCMCIA card B_) smartcard C) serveraccelerator (p) network interfacecard card of 3 levels,the maximumnumberof leaf nodes Q: 64. For a B* treeof order 101, consisting would be A) 101 B) 10201 C) 1000 D) 303 the grammarG wheretheproductions arenumbered as shown: Q: 65 Consider i. E+E+T 2.8-T 4. T---F *F 5.F---E) 3. T---+T 6. F::a If the shift-reduce (bottom-up)parserwrites the productionnumberusedimmediately after performinganyreduction, what stringyill be printedif theparser input is a*a*a2 A) 62461, C) 6364231, D) 6426463r, iB)V262441 , of stringsthat containsequalnumbersof a's andb's is Q: 66 A language A) Regular B) ContextFree C) ContextSensitiveD) None of the above is true: Q: 67 Which of the following statements A) Determinstic Finite Automatais morepowerfulthannon-deterministic finite automata. B) Non-deterministic Finite automata is morepowerfulthan detenninistic finite automata.

6 D) Finite automatacannot accept regularlanguages.


Finite automata doesn't have memory.

is NOT true: Q: 68 Which of the following statements Pase 7 of10

;.

i .'l

Computer Engineering(CO) of palindrome is accepted by PushDown Automata {) Language palindrome of is accepted by Finite Automata $Language C) Language palindrome of is accepted by LinearBoundAutomata D) Language of palindrome is accepted by Turing Machine by pushdown automata Q: 69 which of the following langugggisNor accepted A) anb" B) a"Xcn (C;$"b"c" D) all of the above lines are G[-uired to address64 KB of memory? Q: 70 How many address

A) l0

B) 12

c) 14

is used to senddatacoming from urnffit" sources to one output line Q: 71 sequentially. A A) decoder B) encoder f,Cftnultiplexer D) demultiplexer of Ll1010 is Q: 72 The octalequivalent A) 81 c) 71 D) None of the above Q: 73 Which of the following GATE is usedfor parity checking? , I I lll A) NAND $).NOR D) None of the above \*g) XOR -l to "polynorphism"? Q:74 Which oneof thefollowingtermsmust relate A) Static allocation B)Static typing .9)Dynurnic binding D) Dynamicallocation to an objectonly throughits member functions, while keepingthe Q: 75 Providingaccess detpi$ privateis called { J}Dinformation hiding B) encapsulation e ) modularitv D) inheritance
\h;f

6}}o

$z

L-)

when a child process is terminated? Q: 76 What will happen A) Parent process will receiveSIGCHLD B) Parent process will receiveSIGTERM process C) Parent will receiveSIGKILL D) None of the above Q:77 Which of the to{::llg IPC ogH:t is kernelpersistent? n) iipc r1 Fiio (-ilrvressagequeue u) All or rneabove Which 78 of the following is chard'Iteristic of goodsoftware design? Q: A) Hieh coupling andHigh cohesion B) High couplingand Low cohesion @t-ow couplingand High cohesion D) Low couplingand Low cohesion networkpartitioning? Q: 79 Which deviceis usefulfor restrictingbroadcagf.and A) Hub B) Bridge C) Switch p$one of the above are createdin followingf,rogram? Q: 80 How many processes Int main${ fork0; fork$; ) A) I B)2 D)8 81 The function2x - x2+ pf is Mrmonic if p : (a) 0 (b) 1 (c) 2 (d) 3

@a

82

Tiie particular integralof (D2 + a2)y: sinaxis


r

x cos ax (b) 2a cos ax (c)

ax

; \a) * ."

COS AX

(d) none of these

Page I of 10

PGCET-i i

Computel Engineering(CO)

83

Newton formula converges if


t x

(a) | f (x). f (x) l< { f(x) }2 (c)lf(x).f (x)l<{f (x)}2 84

( b) | f ( x) .f ( x) l" { f ( x) } 2 (d) none ofthese

Iterativeformula for finding the squareroot of a positive integerN by Newton-Raphson methodis -rl ( r - - - N )| 2[ ', (a) *i+t: )(i:0,1,2,...) (c) xi+l: *i (2-N xt) (i :0,1 ,2,...) -tl ( x ' * - N )| ' 2t. *, (b) xt+l: )(i:0,1,2,...) (d) none of these

85

The partial differentialequationformed from z: f(x2 + y2) is (d) noneof these (a) xq: yp (b) xp: yq (c) z: pq if A is a skew- slmmeiric,then sum of its eigenvaiuesis (a) 3i (b) 0 (c) l (d) none ofthese
du du

do

87 88

' tJ , o l If u: x2 * y2, thenx d x + (a) 2u (b) u

(c) o

(d) none of these

\ ' i

If x : rcos0 (a) l lr 89

3( ",y) y : r s i n 0 , then 3 : D(r,9): (n) (c) 1 (d) 0 r

x+01-l
t r i

l i m^ t/ r r \l i -cos jr

)L

(a) I
90 Ifu:tan-l

(b) 0 ( z . 2 \
[ "-Y

l"*' I
Jth",r" (b) 0

(") i
du
d x ;.t , J

(d) 7t

.du
'

uY -

)t'

1
(a) 2 cos2u

er

The eigen valueofA: L- 5 (a) 1,-6 (b) 1,6

[r

-2]

(c) tan2u

(d) z sin2u

<-l t-'

a I i, (c) 6, -1

(d) -2,3

92

Particular solutionof (D3 - 3D2 + 4) y: e2x is


j

(u) i
93

"zt

"2 (b) 6 e2x

x (c) 24 e2x

(d) noneof these

The degree of the differential equation

Phee9 of 10
PGC!,I-II

(CO) Computer Engineering


. . 1

( a2, \( av\ -- | +cosl -i I I | ,l--| t d,T I


\"'^ ) '

1a5y:x2+2x is

(a) I
94

(b) 2

"(gD3

(d) noneofthese

The ParticularIntegral of (D3 - 6D + 5 ) y: 4e-x is _ . (a) 4xe-x (b) 4xex (c) xe-x (d) noneofthese
tinn' The complernentary function of theequa

95

d 3' v+ d 2 v d-v - V | d"3 ,1"2 fu :cos2x is _-_ (a) cl ex + c2 e2x* c3 e3x (c) cl cosx+ c2 sinx * c3 ex 96

(b) c1 ex + (c2 + c3x) e2r (d) noneofthese I r 2 -31


i t

Z l ' ) i| o -Jtherral " L0 If a,b,cale the eigenvaiues of -utri* b- ciscqua t t!r (a)2 (b)6 ( c ) -2 (d) -.6

l o3

9'7

[r 231
'l-he rlnk crirnatrixA:

l:orl
l o r'o 'Jl L' is

(a) I
98

1ui1z

(c) 3

(d)o

li P{A) : A.25 , P(B): 0 .50ancl P(A fl B) : 0.14,then P1A'a I}' 1: (a) 0.25

(b) 0.s0

(c) o.8o

{o}0.:r

It A & u are mutually exclusrve evcnt lhen P(A t; u)

(a) F(A)- P(B) - P (A . B) {e) P(A)+ P(B)


100

mP(A) t P@) ol'these T{) none

f'lrree identical dice are rolled. The prc.bability that the same numtrer wili appear on each cofthern is
1
I

I I

(a) E

'fr 36

1 ( c) l8

(d) 28

ircct'r- i i
" .tla,a.'....,r;, .. ,*..;.t,,,*

,.

1 . . , i ; ; , - i r - * 0 , 1 ; .,.,

.; "r rsgnsifijj,t'.;{ffi{}.$,f r.}i,. i;,

You might also like