Professional Documents
Culture Documents
(Name) ____________________________
Roll No.
2. (Signature) __________________________
(Name) ____________________________
87
Roll No.________________________________
(In words)
1 1
Time : 1 /4 hours]
D-87-11
1.
2. -
3. , -
-
, :
(i) -
-
(ii) -
/
-
-
(iii) OMR -
4. (A), (B), (C) (D)
B
C
A
:
D
(C)
5. I -
,
6.
7. (Rough Work)
8. - ,
,
, ,
,
9. - OMR -
10. /
11. ()
12.
1
P.T.O.
5.
data
(A) Strings
(B)
(C)
(B)
n(n 1)
(C)
(D)
n(n 1)
2
Lists
Stacks
n(n + 1)
0(n log n)
(C)
0(n)
7.
3.
(B)
(C)
(D) .30
.35
.20
(B)
(C)
(A) Factorial
(B)
Fibonacci numbers
(C)
Tower of Hanai
8.
4.
(B)
A Ring Networks
(C)
A Router
(D) A Bridge
Paper-II
3
x 2, y 0
(B)
9.
3
x > 2, y 0
3
(D) x 2, y 0
2
(B)
(C)
(D) Quantum
Loss
Entropy
D-87-11
10.
11.
14.
(B)
(C)
(D) X.75
X.25
X.21
Flooding
(C)
Static routing
15.
(C)
12.
(B)
An SRS
(B)
(C)
en+p
(D) e n + 2p
Error correction
(C)
Synchronization
(D) Slowing
down
communication
13.
16.
the
(B)
perfective maintenance
(C)
corrective maintenance
17.
(B)
(B)
re-engineering
(C)
Prototyping
(C)
reuse
Paper-II
18.
22.
Path testing
(C)
Stress testing
CLOSE DATABASE
(C)
CLOSE ALTERNATE
20.
(B)
(C)
(D) ABDCEF
ABDECF
24.
25.
(C)
ZAP
(B)
? BOF ( ) Prints F
(C)
? BOF ( ) Prints T
(B)
(C)
(D) PACK
Paper-II
(A) ERASE
DELETE
(B)
(C)
21.
hardware failure
(C)
(B)
ADBFEC
(B)
D-87-11
26.
30.
deadlock recovery
(C)
mutual exclusion
(A) e15
(C)
28.
31.
(B)
(A) 9 bits
(B)
(C)
(D) 15 bits
13 bits
11 bits
e5
(B)
logic operation
(C)
arithmetic operation
(D) 1 e10
32.
(A) SSI
(B)
(B)
(C)
(D) VLSI
(C)
33.
LSI
MSI
(B)
215 1
(C)
216
(D) 215
The
maximum
amount
of
information that is available in one
portion of the disk access arm for a
removal disk pack (without further
movement of the arm with multiple
heads)
34.
Negative numbers
represented in
cannot
a cylinder of data
(B)
1s complement form
(C)
a track of data
(C)
2s complement form
be
Paper-II
35.
39.
(A) Hackers
(A) N
(B)
N2
(B)
Spam
(C)
1
N
(C)
Viruses
(D)
1
N2
40.
36.
X = Y + 1 means
(A) X = X Y + 1
(B)
(C)
(B)
X = X Y 1
(C)
X = X + Y + 1
(D) = X Y 1
37.
(B)
(C)
38.
Which one of
statement is false ?
the
following
are
(B)
(C)
Context-free languages
closed under intersection.
and
risk
(B)
Risk probability
impact
and
risk
(C)
42.
are
(A) 16
(B)
(C)
(D) 128
D-87-11
64
32
43.
47.
to
(A) p q
(B)
(C)
(D) p q
p q
q p
(B)
(C)
(C)
is inexpensive to implement.
48.
(B)
(C)
49.
963
(A) 1000
(B)
973
1000
(C)
983
1000
It is inexpensive to implement.
(D) It
provides
and
access
information in a real-time
environment.
46.
To compare, overlay
analyze to maps in GIS
or
953
(D) 1000
cross
50.
(B)
(A) 20 + 21 + .. 2h
(C)
20 + 21 + .. 2h 1
(C)
20 + 21 + .. 2h + 1
(D) 21 + .. 2h + 1
(B)
Paper-II
D-0109
Paper-II
P.T.O.
D-87-11