Wbslet 15798-CompScApp - (X) - 19-Final
Wbslet 15798-CompScApp - (X) - 19-Final
1. Write your Roll Number in the space provided on the top of this page as well as on the OMR Sheet provided.
2. At the commencement of the examination, the question booklet will be given to you. In the first 5 minutes, you
are requested to open the booklet and verify it:
(i) To have access to the Question Booklet, tear off the paper seal on the edge of this cover page.
(ii) Faulty booklet, if detected, should be got replaced immediately by a correct booklet from the invigilator
within the period of 5 minutes. Afterwards, neither the Question Booklet will be replaced nor any extra time
will be given.
(iii) Verify whether the Question Booklet No. is identical with OMR Answer Sheet No.; if not, the full set is
to be replaced.
(iv) After this verification is over, the Question Booklet Series and Question Booklet Number should be entered
on the OMR Sheet.
3. This paper consists of One hundred (100) multiple-choice type questions. All the questions are compulsory. Each
question carries two marks.
4. Each Question has four alternative responses marked: A B C D . You have to darken the circle as
indicated below on the correct response against each question.
Example: A B C D , where C is the correct response.
5. Your responses to the questions are to be indicated correctly in the OMR Sheet. If you mark your response at
any place other than in the circle in the OMR Sheet, it will not be evaluated.
6. Rough work is to be done at the end of this booklet.
7. If you write your Name, Roll Number, Phone Number or put any mark on any part of the OMR Sheet, except
in the space allotted for the relevant entries, which may disclose your identity, or use abusive language or employ
any other unfair means, such as change of response by scratching or using white fluid, you will render yourself
liable to disqualification.
8. Do not tamper or fold the OMR Sheet in any way. If you do so, your OMR Sheet will not be evaluated.
9. You have to return the Original OMR Sheet to the invigilator at the end of the examination compulsorily and must
not carry it with you outside the Examination Hall. You are, however, allowed to carry question booklet and
duplicate copy of OMR Sheet after completion of examination.
10. Use only Black Ball point pen.
11. Use of any calculator, mobile phone, electronic devices/gadgets etc. is strictly prohibited.
12. There is no negative marks for incorrect answer.
9. The cylomatic complexity of the following 12. Cosider the following table of arrival time and
program is: burst time for three processes P0, P1 and P2.
f = 1;
Process Arrival time Burst time
sum = 0;
for(i=1;i<=n;i++) P0 0 mSec. 9 mSec.
{
if(grade[i] <7) P1 1 mSec. 4 mSec.
f = o;
P2 2 mSec. 9 mSec.
sum = sum + grade[i];
} Pre-emptive shortest job first scheduling algorithm is
average = sum/n; used. Scheduling is carried out only at arrival or
if(averge > = 8 && f = = 1) completion of processes. What is the average waiting
printf (“Excellent”);
time for the three processes?
(A) 4
(A) 5·0 mSec.
(B) 6
(B) 4·33 mSec.
(C) 8 (C) 6·33 mSec.
(D) None of the above (D) 7·33 mSec.
X-5 22-II
13. Which of the following transformation is 16. Suppose n processes, P1, ...., Pn share m identical
referred to as commutativity of projection and join? resource units, which can be reserved and released one
at a time. The maximum resource requirement of
(A) R S S R
process Pi is Si, where Si > 0. Which one of the
following is a sufficient condition for ensuring that
(B) R S S R deadlock does not occur?
(B) i, Si n
(D) Both (A) and (B)
m
(C) Si m n
i 1
n
(D) Si m n
i 1
(A) Excess – 2
n1
1 Code
24. In multi-level index
(B) Excess – 2 1 Code
n
(A) the datafile is ordered by the attribute that is
also the search key in the index file.
(C) Excess – 2 Code
n
(B) the datafile is ordered by an attribute that is
different from the search key in the index file.
(D) Excess – 2 1 Code
n1
(C) an index structure consisting of two or more
where n = 8 . tires of records where an upper tier’s records
point to the associated index records of the
tier below.
27. If f is _________ and g is _________ and non- 31. A file system with 300 GBytes uses a file
descriptor with 8 direct block address, 1 indirect block
increasing then h(x) = g (f (x) ) is convex. address and 1 doubly indirect block address. The size of
(A) Concave, Concave each disk block is 128 Bytes and the size of each disk
(B) Convex, Concave block address is 8 Bytes. The maximum possible file
size in this file system is
(C) Concave, Convex
(A) 3 Kbytes
(D) Convex, Convex
(B) 35 Kbytes
(C) 280 Bytes
(D) Dependent on the size of the disk
(C) Depth First Search (B) no objective function co-efficients are allowed
to change.
(D) None of the above
(C) the value of objective function must not
change.
(D) All of the above
(C) 9 (C) uL
(D) 3 (D) oL
22-II X-8
35. For a K-nn classifier, as the value of K increases 39. The number of leaf nodes in a complete binary
tree of depth d is
(A) bias increases and variance decreases.
(A) 2d
(B) bias decreases and variance increases.
(B) 2d+1 + 1
(C) bias and variance both increases. (C) 2d–1 + 1
(D) bias and variance both decreases. (D) 2d + 1
(A) (a + b)*a
(B) (a + b) a*
(C) a* b* + a
45. The time complexity of a Turning machine to
recognize L over {0, 1} such that L = {0n 1n n > 0} is (D) None of the above
of the order of
(A) n
(B) n2
A B C
61. To implement top-down parsing the grammer
should be of the type 5 5 5
(A) LL (1) 5 7 8
(B) LL (2) 7 7 9
(C) LL (3)
Assume the above data are valid, which of the following
(D) All of the above functional dependencies must be false?
I. A B
II. A C
III. AB C
62. Which of the ANN can be used to recover a clean (A) I only
version of a stored image given a noisy version of that (B) II only
image? (C) I and II
(A) Linear feedforward network (D) II and III
(B) Multi-layer feedforward network
(C) Simple recurrent network
(D) Hopfield network
66. Which of the following ANN would you use for
weather forecasting?
(A) Simple Recurrent Network (SRN)
(B) Self-Organizing Map (SOM)
63. Group 1 contains some CPU scheduling algorithms (C) Hopfield Network
and Group 2 contains some applications. Match entries in (D) Multi-layer feed forward network
Group I to entries in Group II.
Group I Group II
(P) Gang Scheduling (1) Guaranteed Scheduling
(Q) Rate Monotonic (2) Real-time Scheduling 67. Which one of the following is not correct?
Scheduling (A) If L1 and L2 are CFLs, then the language
(R) Fair Share (3) Thread Scheduling L1 V L2 is also a CFL.
Scheduling (B) If L1 and L2 are CFLs, then the language L1 L2
(A) (P) – (3) (Q) – (2) (R) – (1) is also a CFL.
(B) (P) – (1) (Q) – (2) (R) – (3) (C) If L1 is a CFL, then the language L = L1 * is
(C) (P) – (2) (Q) – (3) (R) – (1) also a CFL.
(D) (P) – (1) (Q) – (3) (R) – (2) (D) None of the above
22-II X-12
68. Consider a relation R (A, B, C, D, E) is in Third 74. Which of the following phase of the software
Normal Form. Which of the following functional development life cycle, regression testing is normally
dependencies must be FALSE? used?
(A) A, B C (A) Design
(B) A, C E (B) Coding
(C) A, B D (C) Testing
(D) C, D E (D) Maintenance
73. Which of the following is a facility provided by 79. The expression ‘Deleyed Load’ is used in the
DBMS to assist the recovery process? context of
(A) Recovery Manager (A) Processor–Printer Communication
(B) Logging facilities (B) Memory–Monitor Communication
(C) Backup mechanism (C) Pipelining
(D) All of the above (D) None of the above
X-13 22-II
80. What is the outpur of the following Prolog 85. In an indexed file organization, which is true?
program? (A) Index files must be direct access storage files.
fib (0,0). (B) Each key is associated with an index.
fib (1,1). (C) Each primary key value should not be changed
fib (N,R): N>1, during updation.
N1 is N–1, (D) All of the above
N2 is N–2,
fib (N1, R1),
fib (N2, R2), 86. Consider three CPU-intensive processes, which
R is R1+R2. require 10, 20 and 30 time units and arrive at times 0, 2
and 6 respectively. How many context switches are
?– fib (3,R)
needed if the operating system implements a shortest
(A) R = 0, 1, 1 remaining time first scheduling algorithm? Do not count
(B) R = 1, 1, 2 the context switches at time zero and at the end.
(C) R=2 (A) 1
(D) R=3 (B) 2
(C) 3
81. In object-oriented programming language, (D) 4
‘generalization’ is implemented using
(A) Overloading
87. Consider the following function:
(B) Encapsulation
int f()
(C) Data Hiding
{
(D) Inheritance int i, s;
s=0;
82. Consider a machine with 64 MB physical memory for (i=0;i<5; i++)
and a 32-bit virtual address space. If the page size is 4KB,
{ if (i%3==1)
what is the approximate size of the page table?
(A) 16 MB s+=i;
(B) 8 MB else
(C) 2 MB s++;
(D) 24 MB .}
return s;
83. In JavaScript which of the following is used to }
declare variable?
The return value of f() is
(A) function
(B) var (A) 5
(C) dim (B) 7
(D) None of the above (C) 6
(D) 8
84. Fourth Normal Form (4NF) is concerned with
dependencies between the elements of compound keys
composed of 88. A proxy firewall filters at
(A) one attribute (A) Physical Level
(B) two attributes (B) Data Link Layer
(C) three or more attributes (C) Transport Layer
(D) None of the above (D) Application Layer
22-II X-14
89. In UML the diagram used in describing the system 93. A software requirement specification is
behaviour during execution is
I. a contact between client and software developers
(A) State Chart Diagram
and clients specifying what the developers will
(B) Deployment Diagram
develop for the clients.
(C) Implementation Diagram
(D) All of the above II. a specification of the features that the software to
be developed must have.
III. a specification of the resources along with man
power that will be required for the development of
the software.
(A) I only
(B) II only
(C) I and II only
90. Basic components of IOT consist of
(A) Sensor Nodes (D) I, II and III
(B) Sensor Nodes and Gateways
(C) Gateways and Cloud
(D) Sensor Nodes, Gateways and Cloud
94. Y 1
Original position
2 3
( X
91. Which of the following is not the metric for object- / /
2 3
oriented testing?
Reflected position
(A) Number of key classes
/
(B) Fan In (FIN) 1
(C) Lack of Cohesion in methods
The above reflection is accomplished with the
(D) Public Access to Data members (PAD)
transformation matrix:
1 0 0
(A) 0 1 0
0 0 1
1 0 0
(B) 0 1 0
0 0 1
92. Which Protocol assigns IP address to the client
connected in the internet? 1 0 0
(A) DHCP (C) 0 1 0
(B) IP 0 0 1
(C) RPC
(D) None of the above (D) None of the above
X-15 22-II
95. In the Slow-start algorithm, the size of the 98. Traffic intensity is given by, where L = n of bits
Congestion window increases _______ until it reaches a in a packet, a = Average rate, R = transmission rate.
threshold value.
(A) Multiplicatively (A) LR
(B) Exponentially a
(C) Additively (B) L
(D) Randomly Ra
(C) La
R
(D) R
La