Professional Documents
Culture Documents
ComputerEngineering(CO) Date:7*August,2011 lnstructions: of onemark each. 1. Thereare 100questions 2. Atternpt all questions.
pm to 4.30pm Time:3.00
l)'
' /
Q: 1 Arrangethe following complexity functions in increasingorderof growth rate? i.2" 1i. nz iii. n log(n) iv. n D) iii, I, ii, iv ii c) iii, iv, ii,I r B) iii, iv,I, iii, ii, feliu, \J of following code Q: 2 What is thetime complexity while (n>1)ll wheren is someinteger>1 initially { n:nl2; ) A) O(n) ' i ElOltog ni
\:.-f
''-
f i.
:'"
{ '
C) O(r/2)
D) noneoithe above
Al otnl
6h(n"r)
c) o(n^:)
D)o(nlogn)
by one passassembler? Q: 4 Whichof the following is not supported Instructions B) Jumpingto Label Conditional N clt D) Invocationof subrouting referencing *!)Fo.*u.d
Q: 5 Which of the following memory allocation techniques avoids internal fragmentation?
paging D) Demand Q: 6 Which of the following is not true? dataregion -g) ett thethreads of a processshares region havedifferent-data of a process B) All thethreads ..Sf An thethreads of a processsharestackregion D) A1l the threadsof a processhave different stack'region has Single Multiple Data (SIMD) Architecture o--Instruction Q: x' 7 *
Multipte cu (A L*tD)
modeis usedin following instruction Q.9 which addressing R1 MOyE [7010H], B) IndirectAddressing Addressing 6o""it D) None of the above g.C')hegisterAddressing in . . . ... remains underexecution Q: l0 A program P6p!e 1'of 10
ComputerEngineering (CO)
/f,\
;A)IRAM
B) Harddisk C) Floppydisk
L8--lfall =.-- R,
D) ' 10A4 ,3a.'a .+_2649
9-?J 4-L
A) 3000
B) 20,44
Q: 12 Which phaseof the compilerwill detecterror in the followin g progfaml " tnt x, y z; x:20: 'b" Y: z: x+ y;
A) Syntax Analysis B) Semantic Analysis (a) (b) and D) None of the above ffiettfr ut'
.... Q.13Memory bufferRegister Holds the address of instructionwhich is to be executed ;\) Holds the data or instruction q$ fetched from memory -e; HotOs the instruction pickedup from memory D) is a special purpose register usedby CPU for temporary storage. processing speed? Q: 14 Which of the following doesnot increase A) Bus speed Pri*ury memory size *s C) Clock Speed ffi Secondary memory size arestored in Q: 15 StatusollBgical operations B) Accumulator qflntug' on Q: i6 PentiumMMX is based A) SISD architecture u) lvllSu arcnltecture Q : 1 7I n C) Memory Butfer
D) All of the above
the programcan be relocatedin main memory. A) DirectAddressing Q) IndirectAddressing C) Base-Indexed Addressing above ffiAlr ofthe
relates subroutines with maiqqtogram? Q: l8 Which systemsoftware A) AssemblerB) Parser .- C) Loader QfLinker Q: 19 Data type mismatchrelatederors areidentified during A)LexicalAnalvsis B) Syntax analysis ,/CISemantic Analvsis D) Code generation -b/{'
Q: 20 DuringDMA operation A) CPUcanaccess *uin *"*ory ifil)ppu canaccess its cache memory pfNone of theabove. C) Both(a)and(b)
n . of thefollowins is network laver device? Y . 2i Which
Q: 23 Which Q$llayer performsencryptionand decryption of message? B) TransportLayer {AFresentationLayer C) Network Layer D) ApplicationLayer of connection lessservice? Q:24 Which of the following is an example A) Telephone@fostal Service C) Mobile services D) Both (a) and (c) for Q: 25 SMTP Stands Mail t ansfo protocol 6fi-pl" B) Simple Mail transportProtocol C) Simple Message TransferProtocol D)Simple}lessage transport Protocol Q: 26. What is VPN? A) A privatenetworkbuilt within LAN B) Apublic networkbuilt within LAN ) A privatenetworkbuilt over Intemet D) A publicnetworkbuilt over Internet
;i{
A) LDAP
i, PJrMAP
e) POP
D) SMTP
address.
D)ClassD
Q: 29 What clprQethe maximumnumberof host in one classC network? 1,A)2s4 B) 512 C) 128 D\ 824 mask,if a classB network is divided into 4 subnetworks? Q: 30 What is the subnet
internetconnection amongdifferenthostsof a Q: 3l Which devicecanbe usedto share network? seryer B) Firewall C) Router D) None of the above {d}f.o*y is Q: 32 RSA aleorithm t eXe*tyption t"chnique f$l,rUtl" 'T) Ignorethis option B) Private key encryptiontechnique D) Ignorethis option
Q: 33 Which of the following is not partof a staticsite? A) HTMLpages B) Images C) u-fr lSp ' Video \-/r Z Q: 34 What is port numberfor theUjjatrttp:/www.eooglffi A) 21 (Qt80 B) 27 D) None of the above Q: 35 Which of the following is not truefor HTTP? Pzige 3 of i0
ComputerEngineering(CO)
@o"""ction
Less
B) Stateful
layerprotocolis usedby HTTP? Q: 36 What h'ansport B) UDP C) Bothja) & (b) sr"t
of router? Q: - 37 Which odJhefollowing is not a responsibility checkr"qu"rr"" numberof packet 6To B) To forward the packetusing IP address C) To maintain informationaboutthe path. D) All of the above in behaviorof memberfunctionof a class Q: 38 Which of the following allowschange without changingits declaration A) Method overloading @vletnoA overriding C) Createnew class D) none of the first element in arrayaFoo,an Q: 39 Which of the following givesthememoryaddress arraywith 100 elements? A) aFoo[0]; B) aFoo; C) &aFoo;qpaFoofrl; Q:40 What will be the outputof followingcode? void main0
) printf( " %d ohd o/od",sizeo f(3 . I 4),sizoof(3 . 14 f), sizeof(3 . 1aL)) ; ) A)448
l .
B)4810
c)8810
.,D)Nor,"
:"-r lttl
if(*ipPoint:: NULL) printf("Pointer is NULL \n"); else printf("Pointer is Not NULL\n"); j A) Pointeris NULL C) Compilation Error BJ Pointeris Not NULL f..*)n rntitne Error
Q: 42 What will be the outputof followingcode? int main(int argc,char **argv) { int iCount:O; while(iCount++<10) { If(iCount<4&& iCount<9) continue; pri ntf(" 7od\t"riCou.nt) ; )
t J
F6ge4 of 10 PCCET-11
obs67ss
locking level is alsoknown as: Q.43. In database, B) S lock C) X lock D) Dead lock $*nrrlarity is not involved in deferredrecoverymethod? Q.44.Whichof the following operations A) Undo B) Redo C) Both D) None of the above ;.i . i .. , Passeng erCode, F li ght Code, D e p osi t, TotaIF are ) Which one is th correct query statement to find "the names of the passengersvtho have Bookings (B_pp Ury89il9 bookedticketsfor thefiight with code8A777 and have not paid the.full fare of their tickets yet".
A-) SelectName Iiom Passenser PassenserCode: where (Passenser bookings.PassengerCode) and (TotalFare>: Deposit) and FlightCode: BA777\
of a travel agency includes the following relations Q.45The database Passenger(tpg;CryEe{9dg Name,Address, klephone)
: Name from Passenger, Bookings where(Passenger.PassengerCode @tS"t"", > Deposit)andFlightCode: Bookings.Passenger.Code) and(TotalFare ,B1'77',l') C) SelectName from Passenger, Bookingswhere(Passenger.PassengerCode: >: Deposit)and FlightCode: Bookings.PassengerCode) and(TotalFare P.A777) D) Select Name from Passenger, Bookings where(TotalFare> Deposit) and :'BA7ll') FlightCode that everyprimary attributekey is non-null? Q.46 Which of the following rulesguarantees A) Operationalconstraints B) Domain constraint ntitv integrity constraint D) Referential integrity constraint $f, sal_name,address, city, Q.47 Considerthe following relationsalesman_master(salseman*no, state,pincode, sal-amt, tgt-toget, ytd-salse,remarl<s). Which constraintwill be defined for 'salesman the following ciindiiion: namemust start with salesand sal_amtis greaterthan 0(zero).'? '.nSo*uin A) Requireddata integrity C) Entity integrity of norrnalization? Q.48 What is the advantage A) Reductionof redundant data Q.49 Referentialintegrity refers to Paee 5 of 10 D) Referential integrity
(CO) ComputerEngineering of a row in a table A) The enforceduniqueness B) The enforceduniqueness of a columnin a table \.G)tnsuring that a Foreign Key attributecannotbe NULL of Primary Key and Foreign Key values \P}*The enforcedsynchronization Q: 50 Which of the following is not true for index: ofrecords A) is usedfor fast and randomaccess the spaceoverhead B) increase automatically createdon primary key Q) created on a table on" index @Iu*ttu* "un-b" flow pathof the spiralmodel Q: 5lAs we moveoutwardalong with process with eaih phaseareminimized ..Bltost is increased A) Risks associated ;q Aand B both D) None of the above
is not true: Q: 52 Which of the following statement model is throwaway model A) Protctype definitionis not very clearto customers B) Prototype modei is usedwhensystem model increased the overallsystemdevelopment cost. i-9),.Prototype ' D)'none of the above and systemtestplansaredefinedin: Q: 53 Acceptance A) High level Design .fr ($fReqrritementAnalysis B) DetailDesign D) SystemEngineering
yv4L!r
r4ll
l_ll\JLrlgr.
D/
rlululypg
llluugl
servesas agreement client and the developer? between Q: 55 Which document .r'*\ (SARS B) SystemArchitecture C) TestPlan D) None of the above of analysis? Q: 56 Which of the following artifactsis NOT an outcome Software Requirement Specification A) SRS .J) etgorithm Design Test Plan D) SystemTest Plan C) Acceptance following is a limitation water fall 57 Which of the of model? Q: is, is difiicult to accommodate changingrequirements development time is higherthanthe othermodel. B) Software Projectplanningis difficult C) Software D) None of the above. Q: 58 rVhichof the following is not usedin datamodelingtechnique? ,'n B) DataFlow Diagram glE- R diagram C) ClassDiagram D) Noneof the above PaS 6'of 10
PGCbI-iI
ComputerEngineering (CO)
by usecasediagram? Q: 59 Which of the following is not described A) The input and output actor gives/recieves to/from system. B) The preconditionthat must be satisfiedfor successful executionof process 9d \-D) Thecontrolflow in the process The exceptionconditionsin the process.
to softwaretesting? Q: 60 Which of the following is true with respect A) If unit testing is successfulfor each module than integration testing is not required. /.p)Integration testing is usedto checkthe interfacebetweenthe module. C) Unit testingis carriedout only if the integration testingfails. D) Noneof the above. Q: 6l Whichof thefollowingis a tautology (b---+ A) a v fo--+ c) C) aVb---bnc
B) a -+ S ---+(b -+ c) D) aAb---bvc
techniques is usedin the quick sort Q: 62 Which of the following algorlthmdesign alsorithm?
A) dynamic programming B) backtracking
D) greedy method
Cornponent Interconnect (PCI) cardusedto generate encryption Q: 63 This is a Peripheral keysfor secure transactions on e-commerce Websites. A) PCMCIA card B_) smartcard C) serveraccelerator (p) network interfacecard card of 3 levels,the maximumnumberof leaf nodes Q: 64. For a B* treeof order 101, consisting would be A) 101 B) 10201 C) 1000 D) 303 the grammarG wheretheproductions arenumbered as shown: Q: 65 Consider i. E+E+T 2.8-T 4. T---F *F 5.F---E) 3. T---+T 6. F::a If the shift-reduce (bottom-up)parserwrites the productionnumberusedimmediately after performinganyreduction, what stringyill be printedif theparser input is a*a*a2 A) 62461, C) 6364231, D) 6426463r, iB)V262441 , of stringsthat containsequalnumbersof a's andb's is Q: 66 A language A) Regular B) ContextFree C) ContextSensitiveD) None of the above is true: Q: 67 Which of the following statements A) Determinstic Finite Automatais morepowerfulthannon-deterministic finite automata. B) Non-deterministic Finite automata is morepowerfulthan detenninistic finite automata.
;.
i .'l
Computer Engineering(CO) of palindrome is accepted by PushDown Automata {) Language palindrome of is accepted by Finite Automata $Language C) Language palindrome of is accepted by LinearBoundAutomata D) Language of palindrome is accepted by Turing Machine by pushdown automata Q: 69 which of the following langugggisNor accepted A) anb" B) a"Xcn (C;$"b"c" D) all of the above lines are G[-uired to address64 KB of memory? Q: 70 How many address
A) l0
B) 12
c) 14
is used to senddatacoming from urnffit" sources to one output line Q: 71 sequentially. A A) decoder B) encoder f,Cftnultiplexer D) demultiplexer of Ll1010 is Q: 72 The octalequivalent A) 81 c) 71 D) None of the above Q: 73 Which of the following GATE is usedfor parity checking? , I I lll A) NAND $).NOR D) None of the above \*g) XOR -l to "polynorphism"? Q:74 Which oneof thefollowingtermsmust relate A) Static allocation B)Static typing .9)Dynurnic binding D) Dynamicallocation to an objectonly throughits member functions, while keepingthe Q: 75 Providingaccess detpi$ privateis called { J}Dinformation hiding B) encapsulation e ) modularitv D) inheritance
\h;f
6}}o
$z
L-)
when a child process is terminated? Q: 76 What will happen A) Parent process will receiveSIGCHLD B) Parent process will receiveSIGTERM process C) Parent will receiveSIGKILL D) None of the above Q:77 Which of the to{::llg IPC ogH:t is kernelpersistent? n) iipc r1 Fiio (-ilrvressagequeue u) All or rneabove Which 78 of the following is chard'Iteristic of goodsoftware design? Q: A) Hieh coupling andHigh cohesion B) High couplingand Low cohesion @t-ow couplingand High cohesion D) Low couplingand Low cohesion networkpartitioning? Q: 79 Which deviceis usefulfor restrictingbroadcagf.and A) Hub B) Bridge C) Switch p$one of the above are createdin followingf,rogram? Q: 80 How many processes Int main${ fork0; fork$; ) A) I B)2 D)8 81 The function2x - x2+ pf is Mrmonic if p : (a) 0 (b) 1 (c) 2 (d) 3
@a
82
ax
; \a) * ."
COS AX
Page I of 10
PGCET-i i
Computel Engineering(CO)
83
Iterativeformula for finding the squareroot of a positive integerN by Newton-Raphson methodis -rl ( r - - - N )| 2[ ', (a) *i+t: )(i:0,1,2,...) (c) xi+l: *i (2-N xt) (i :0,1 ,2,...) -tl ( x ' * - N )| ' 2t. *, (b) xt+l: )(i:0,1,2,...) (d) none of these
85
The partial differentialequationformed from z: f(x2 + y2) is (d) noneof these (a) xq: yp (b) xp: yq (c) z: pq if A is a skew- slmmeiric,then sum of its eigenvaiuesis (a) 3i (b) 0 (c) l (d) none ofthese
du du
do
87 88
(c) o
\ ' i
If x : rcos0 (a) l lr 89
x+01-l
t r i
l i m^ t/ r r \l i -cos jr
)L
(a) I
90 Ifu:tan-l
(b) 0 ( z . 2 \
[ "-Y
l"*' I
Jth",r" (b) 0
(") i
du
d x ;.t , J
(d) 7t
.du
'
uY -
)t'
1
(a) 2 cos2u
er
[r
-2]
(c) tan2u
(d) z sin2u
<-l t-'
a I i, (c) 6, -1
(d) -2,3
92
(u) i
93
"zt
x (c) 24 e2x
Phee9 of 10
PGC!,I-II
1a5y:x2+2x is
(a) I
94
(b) 2
"(gD3
(d) noneofthese
The ParticularIntegral of (D3 - 6D + 5 ) y: 4e-x is _ . (a) 4xe-x (b) 4xex (c) xe-x (d) noneofthese
tinn' The complernentary function of theequa
95
d 3' v+ d 2 v d-v - V | d"3 ,1"2 fu :cos2x is _-_ (a) cl ex + c2 e2x* c3 e3x (c) cl cosx+ c2 sinx * c3 ex 96
Z l ' ) i| o -Jtherral " L0 If a,b,cale the eigenvaiues of -utri* b- ciscqua t t!r (a)2 (b)6 ( c ) -2 (d) -.6
l o3
9'7
[r 231
'l-he rlnk crirnatrixA:
l:orl
l o r'o 'Jl L' is
(a) I
98
1ui1z
(c) 3
(d)o
li P{A) : A.25 , P(B): 0 .50ancl P(A fl B) : 0.14,then P1A'a I}' 1: (a) 0.25
(b) 0.s0
(c) o.8o
{o}0.:r
f'lrree identical dice are rolled. The prc.bability that the same numtrer wili appear on each cofthern is
1
I
I I
(a) E
'fr 36
1 ( c) l8
(d) 28
ircct'r- i i
" .tla,a.'....,r;, .. ,*..;.t,,,*
,.
1 . . , i ; ; , - i r - * 0 , 1 ; .,.,