Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
29 views
Questin
Uploaded by
isrmcchennai1
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save questin For Later
Download
Save
Save questin For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
29 views
Questin
Uploaded by
isrmcchennai1
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save questin For Later
Carousel Previous
Carousel Next
Save
Save questin For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 16
Search
Fullscreen
NCE.4 £2.0.-2018 yeaa duct sider :16 Number of Pages in Booklet : 16 wf duct at den: 120 No. of Questions in Booklet : 120 Paper Code : 13 Sub: Computer Engg. wre: 3.00 Te ‘Time : 3.00 Hours Paper - HI atrees, OF ‘Question Paper Booklet No. Crom Dole = 23.02.01 7175789 afer aa : 200 Maximum Marks : 200 there reac ferent uel sre uaa & dae ete /aiferea dn ai lewd we whhenell ae Affe we A Re TA wea—us gfe oe afl wea—wa yfeet dem sifeea @ si sat caw we siftea eI gad wig farm at at flare ares A gee wea rem we S| Ger fatter wed AY Peart stew A eet | On opening the paper seal/polythene bag of the Question Paper Booklet the candidate should ensure | that Question Paper Booklet No. of the Question Paper Booklet and Answer Sheet must be same. If any difference, candidate must obtain another Question Paper Booklet from In Candidate himself shall be responsible for ensuring this. C were & fare Peer anit oe & ar fer ani oot & te aa E ke oe a aes ew A sae A | a. ea er ane 8c nes ra ere TET Sacto tate ae fe EP ee: 1. 2, 4: Ra en 1 et eh at Fe ge baer niet ae ae wt Te eT Ee er cenfe t & weT E | Jeon see wae sai err are ce 1 aT ve oot ate ah eT ore, at STE Foret saps ae te ge OS Fee 1 sess ss eves fe aT 1/3 MOTTE 1 ‘ore 8 red agg ae rem fre ow a aw cae aE Rah a er athe et ser oe ET see et a eT 1 stent aceon weg so a ht wt te oer aie 81 aie fred area ora Oe if ale aT Fett & ot wee Rr are grr Prager reer et smi Jo. pom aren te eae sie are ore we aera ee eet ae ape et aE EE § aes at anton wet er fier: omre it sean om we est ore Fa I TE a att seep we wd ac bah anal Pree rs sre eo ak Fie Feat ae eet wh rae eh Rr te toe 3B hf oh ren en & fae wr are 1 Warn ‘material INSTRUCTIONS FOR CANDIDATES. ‘Answer all questions All questions carry equal marks. ‘Only ome answer ist be given for each question more than one answers are marked, it would be treated as wronganewer [Each question has four sllemative responses marked serially 1 1, 2,3, 4. You have to darken only one circle or bubble Indicating the corret srswer on the Answor Sheet using BLUE. BALLPOINT PEN, The OMR Answer Sheet is inside this Test Booklet. When you are direeted t0 open the Test Booklet, take out the ect and fill inthe particulars eareflly wth blue ¢ pen only: 4 of the mark(s) of each question will be deducted for each wrong answer. A wrong answer means fan incorrect answer of more than one answers for any ‘qusstion. Leaving al dhe relevant circles or bubbles of any ‘qveston blank will not be considered as wrong answer, Mobile Phone or any other electronic gadget in the ‘examination hall is strictly prohibited. A eandidate found ‘vith any of such objectionable material with hiner will be striclly dealt as per rules Please correctly fill your Roll Number in OMAR. Sheet §5 Marks can be deducted fr filing wrong or incomplete Rell Number If a candidate is found copying rif any unauthorized found in hisher possession, FR. would be lodged ‘gainsthimver inthe Police Station and he'she would liable tobe prosecuted, Department may also debar him/her permanently from all future examinations, 13-0 IIIa Let a table R have three candidate keys A, B and (C, D). Which of the following must not be correct ? (i) A+BC Q) B>aD @) C>AB (@) A+D ‘A relation is in which of the form if it is BCNF and also has no multivalued dependencies (1) Second normal form 2) Third normal form (3) Fourth normal form (4) Domain normal form in which normal depedeney removed ? (1). First normal form (2) Second normal form (3) Third normal form (@)_BCNF form — partial Which of the following creates a virtual relation for storing the query ? (1) Function 2) View (3) Procedure (4) None of these Which of the join operations do not preserve non matched tuples ? (1) Left Outer Join (2) Right Outer Join (3) Inner Join (4) Full Outer Join Which of the following is a procedural language ? (1) tuple relational calculus (2) domain relational calculus (3) ‘relational algebra (4) None of these 10. i. The content of the data dictionary is (1) DML Commands (2) DDL Commands (3)_ Indexes to user data (4) Metadata Consider the relations rl (A, B, C), 12 (C, D, E) and 13 (E, F), with primary keys A, Cand E, respectively, Assume that rl has 50 tuples, 12 has 15 tuple and 13 has 75 tuples. What is the size ofr par2par3? (1) 56250 @) 15 (2) 50 (4) 75 A B+ tree index is to be built on the attribute of the relation with length 8 bytes, The disk blocks are of size 512 bytes and index pointer is of size 4 bytes. What could be the optimal degree of the B+ tree ? a) 43 @) 15 @) 17 @) 18 ‘What is the constraint the leads to fifth normal form? (1) General Constraints 2) Multivated dependencies (3) Functional dependency (4) Join Dependency Which of the following is false about statie member functions ? () static member functions can access not static members of class. (2) static member functions belong to class, (3) static member functions cannot be called using class object. (4) static member functions cannot be overloaded. 32. 13. 14. 15. 16. 3 The algorithm design technique used in the Quick sort algorithm is (1) Dynamic programing Q) Backtracking (3) Divide and Conquer (4) Greedy Method What will be output by the following code segment ? int sum=0; int count=5; while (count>1) {sum=sum+count; count=count-2; } Print£("8d\n”, sum)? @ 5 @) 6 @G) 7 8 What will be the time complexity of optimally calculating a? ? (2) O() @) O(b/2) (3) Oogb) @) O(b) Which algorithm is used to find the minimal distance from one node to all other nodes in a weighted graph ? (1) Dijkstra’s algorithm (2) Prim’s algorithm (3) Keuskal’s algorithm (4) Allof these Post-order traversal of a binary tree is fa, c, d, b, e} and pre-order traversal of the tree is {e, a, b, ¢, d}. What is the in-order traversal of the binary tree ? () {abcde} @) feb.dae} @) faec.b,d} @) thdcae} 17. 18, 19% | 20. lan. Head An AVL tree is a height balanced binary search tree. Why do we need to balance the height of the AVL tree ? (1) itsaves memory (2) ithelps to avoid skew tress (3) is simplifies storage (4) ithetps in faster memory access A destructor can be (1). virtual (3). static (2) volatile (4) None of these Can operator overloading change the operation performed by an operator ? (1) No (2) Yes (3) Conditionally (4) With restrictions ‘Object slicing can be resolved using (1) Pointer (2) References (3) Abstract class (4) All of these Given a linked list L with head pointing to the first node of L, shown below : Li al} bow What is the output when the following sequence of operations applied on the given list ? P is anode pointer (i) P=head — next -> next; (ii) head — next = P: (ii) printf(“%d", head + next > next — data); (1) 20 @) 30 @) 40 4) 5022. 24, The below code retums decimal value of binary linked list. Identify the code to be replaced with XYZ. int val(struct Node *head) { struct Node *p = head: int val2 while (p! = NULL) { XYZ? p = ponext; ) return val2; Q@) val = (val << 1) + head+data; @) val = (wal2 << 1) + podata; @) val2 = (val2 << 1) + podata; (@) val2 = (val << 1) + headsdata; Consider inserting the keys 11, 23, 32, 5, 16, 29, 18, 89, 60 using open addressing technique into a hash table of length m = 8, with hash function h(K) = K mod 8. What is the number of collisions ? qa) 5 (3) 2 Q) 3 @) 0 Input buffer is cleared and reset by function of istream class. (1) syne() (2) clear() 3) reset( ) (4) None of these 27. Two matrices M1 and M2 are to be stored in arrays A and B respectively. Each array can be stored either in row- major or column-major order _in contiguous memory locations. The time complexity of an algorithm to compute M1 x M2 will be (1) best if A is in row-major, and B is in column-major order (2) best if both are in row-major order best if both are in column-major order independent of the storage scheme @B) ) wi following ? (1) Kruskal’s algorithm is multiple source technique for finding MST. Kruskal’s algorithm is used to find minimum spanning tree of a graph, time complexity of this algorithm is O(EV) Both Kruskal’s multiple source finding MST and Kurskal’s algorithm is used to find minimum spanning tree of a graph, time complexity of this algorithm is O(EV) Kruskal’s algorithm (choose best non-cycle edge) is better than Prim’s (choose best ‘Tree edge) when the graph has relatively few edges true statement in the Q) 3) algorithm is technique for @) The class NP is the set of all decision problems that : (1) Can be solved by polynomial- time algorithms, (2) Cannot be solved by polynomial- time algorithms. (3) Have polynomial-time algorithms. that can verify potential solutions. (4) Allof these 2B28. 29. 30. 31. 32. 3B Sequential search has atime complexity of O(n), and binary search has a time complexity of O(log (n)), What difference in worst case will it make when the size n is 1000? (1) You would not notice much difference because computers run very fast anyway (2) As n is 1000, binary search is twiee as fast as sequential search (3) As nis 1000, binary search is 10 times as fast as sequential search ‘As nis 1000, binary search is 100 times as fast as sequential search @ In a graph if e = (u,v), Then u and v are called (1) endpoints of (2) adjacent nodes (3) neighbours (4) All of these In symmetric key cryptography, for enerypting and decrypting the message, the key is (2) private (2). public (3) different —(4)__same In selective repeat, the size of the sender and receiver window should be at most (if m is the size of sequence numbers fields in bits) : ay 2 Q) 2 @) 2" (4) 2m If network part of Class B address would have used 21 bits instead of 16 bits. How many class B networks would have been possible ? qa 2 @ 216 @) 29 @) 23 In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a Q) (3) increases quadratically (4) does not increase increases linearly increase exponentially Encryption and decryption provide secrecy, or confidentiality, but not (1) Authentication (2) Integrity (3) Frames (4) Allof these In the TCP/IP Protocol suite which one of the following is NOT part of the IP header ? (1) Fragment Offset (2) Source IP address (3) Destination TP address (A) Destination port number Match the following : OSI Layer Responsibilities 1. Network p. Encoding & layer Translation 2. Transport gq. Feedback layer Messaging 3. Data Link r. Transmission layer modes 4, Sessions. Segmentation layer and Reassembly 5. Presentation t. Dialogue layer control 6. Physical uw. Access layer Control 1-8, 2-4, 3-u, 41, 5-p, 6-4 . 28, 3-u, 444, Sep, 6-137. 38. 39. 40. DES and public key algorithm are combined (@ to speed up encrypted message transmission (ii) to ensure higher security by using different key foreach transmission Gi) as a combination is always better than individual system (iv) as it is required in e-Commerce () @and Gi) 2) Gi) and Git) (3) (iii)and (iv) (4) (i) and (iv) Which one of the following routing algorithms can be used for network layer design ? (1). shortest path algorithm (2) distance vector routing (3) link state routing (4) all of the mentioned Which of the following devices runs all seven layers of the OSI model reference ? (1) Router and Gateway 2) Bridge (3) Repeater (4) Hub Shifi reduce parsers are (1) Bottom Up parser (2) Top down Parser | (3) May be Bottom up or Top down | (4) None of the mentioned | A language is regular if and only if (1) Accepted by Pushdown Automata (2) Accepted by Non-deterministic finite Automata (3) Accepted by Deterministic finite Automata, (4) Accepted by Turing machine If L1, L2 are regular and op(L1, L2) is also regular, then L1 and L2 are said tobe under an operation op. (1) Open (2) Closed (3) Decidable (4) None of the mentioned Which normal form amongst the following does not have left recursions (1). Greibach Normal Form (GNF) (2) Chomsky Normal Form (CNF) (3) Backus Naur Form (BNF) (4) None of these Which of the regular expressions corresponds to this grammar ? S— AB/AS, A> a/aA, Bb (1) aatbt Q) aatb (3) atb* (4) atab)* Output of a lexical analyzer is: (1) Parse tree (2) List of tokens (3) Intermediate code (4) Machine code 2416. 47. 48, B Which one of the following is a top- down parser ? (1) Recursive descent parser (2) Operator precedence parser (3) An LR(K) parser (4) An LALR(s) parser Consider the following statements regarding deterministic PDA (DPDA) and nondeterministic PDA (NPDA). st : In both DPDA and NPDA, dead configuration is allowed. $2: In NPDA, two transitions can have same constraints. $3 : Number of sates in DPDA <= NPDA Which option is correct ? (1) Only $1 and $3 (2) Only $3 (3) Allaretrue (4) Only $1 and $2 Identify the correct statement when LR parsers are compared using any particular grammar. (2) If LR (0) has no conflict, then SLR (1) may have conflict. 2) If SLR (1) has no conflict, then LR (0) never contain any conflict (3) If LALR (1) has no conflict CLR (1) never contain any conflict, (4) If CLR (1) has no conflict then LALR (1) may have conflict 49, a 51. 53. Consider the following about the Turing machine : (i) It can be represented using instantaneous description Gi) In one move, the Turing machine can write a symbol on the cell being scanned statements (ii) It can be represented using transition table Which of the above statement(s) is/are true? (1) Only (ii) (2) (ii) and (3) @. Gi) and Gii) (4) @ and ii) ‘The power set of infinite countable set is (1) Countable (2) Not Countable (3) Sometimes Countable (4) None of these Which one is informed search ? (1) Depth First Search (2) Breadth First Search (3) Bi-Directional Search (4) Heuristic Search ‘What is function for A* algorithm ? G) flo) = hay (4) f(a) <= he) A. compound proposition that is always true, no matter what the truth valucs of the propositional variable that is called (1) Tautology (3) Contingency (2) Contradiction (4) None of these54. 55. 57. 58. Give the predicate logic statement for : “Wonder is a name of a dog” (1) dog-wonder (2) dog (wonder) (3) wonder (dog)b (4) wonder-dog Methods are specified in the language by: (1) Syntax (2) Semantics (3) Inference (4) None Which search is similar to minimax search ? (1) Hill-climbing search (2) Depth-first search (3). Breadth-first search (4) All of these What is an example for blind search ? (1) Bidirectional Search (2) Depth-Limited Search (3) Uniform Cost Search (4) All of these What is the Nature of Satisfiability (SAT) problem ? | (1) NP-Hard | 62. (2) NP | @ P | (4) NP—Complete i s | 59. Here are two sentences in the language of first-order logic : A: Wray @2y) B : 3y xv > y) x y over natural numbers 0, 1, (i) Ais true Gi) Bisnottue (ii) A logically entails B (iv) B logically doesn’t entail A Which of the above statement are true ? (1) @and (i) 2) Gi) and iii) (3) @and Git) 4) Only (i) What is the worst-case time complexity of BFS to find the node at depth don 2 uniform tree with n successors to each node except leaf nodes ? @) 0") 2) om @G) Of") (4) 9(@") The operating system keeps the information of files in a table called (1) File Folder Table (FFT) (2) File Index Table (FIT) (3) File Number Table (FNT) (4) File Allocation Table (FAT) When a thread waits indefinitely for some resource, but other threads are actually using it is called (1) Segmentation (2) Demand Paging (3) Starvation 4) All of them 3B63. 64, 65. B What hole will allocate in “Worst-Fit” algorithm of memory management ? (1) It allocates the smaller hole than required memory hole (2) Itallocates the smallest hole from the available memory holes (3) It allocates the exact same size memory hole (4) It allocates the largest hole from the available memory holes Which of the following is advantage of virtual memory ? (1) Faster access to memory on an average, (2) Processes can be given protected address spaces. Linker can assign addresses independent of where the program will be loaded in physical memory @) (4) Programs larger than the physical memory size ean be run In which one of the following p: replacement —_polic Belady’s anomaly may occur ? () FIFO (2) Optimal (3) LRU (@) MRU Metadata contains atleast : (1) the structure of the data. (2) the algorithms used for summarization (3) the mapping from the operational environment to the data warehouse. (4) All of these 68. 69. 70. Consider the following four processes, with the length of CPU Burst time in milliseconds : Process | Arrival Burst Time PI 0 lg 4 2 P2 1 |4 of P3 2 9 8 3 Pa 3 5 | Using the Round Robin scheduling algorithm, when time quantum is 2 units, the Average Waiting Time (1) 12.15 1.75 (3) 12.50 (4) None In which of the following states, process will be in secondary memory ? (1) New, Ready, Wait/Block (2) New, Wail/Block, Suspend Wait, Suspend Ready (3) WaivBlock, Suspend Wait, Suspend Ready (4) New, Suspend Wait, Suspend Ready Which of the following changes permission to deny write permission to group and others ? (1) Chmod go — w filex (2) Chmod go w filex (3) Chmod go = w filex (4) None of these Indicate which commands syntactically correct (i) Istdatb* (ii) Is-4-datb* (iii) 1s-1-datb* (iv) Is-la*-d b* (1) (and (ii) (3) (@ and (ii) are. 2) Gi) and (iii) (4) Gi) and (iv)1. 2. RB. 74. Which of the following are validation activities + (i) Code Review re (iii) System Testing (iv) Document Verification (v) Boundary Value Testing @) @.@) Q) @.Gv) G) Gi), Gi), (v) @_Allof these Stress Testing Fishbone Diagram is also known as (1) Pareto Diagram (2) Scatter Plot Diagram (3) Line Diagram (4) Ishikawa Diagram Which of the following cyclomatic complexity value range is preferred among the following : (1) 1to 10 Q) 101020 (3) 20t040 (4) Greater than 40 A Software Requirements Specification (SRS) document should avoid discussing which one of the following? (1). User Interface issues (2) Non-functional requirements (3) Design specification (4) Interfaces with third party software Which one is not right in the reference of Black Box Testing ? (1) Intemal workings of an application are not required. (2) Also known = as_— clear box/structural testing. This can only be done by trial and error method. Also known as closed box/data driven testing. @) @) | 10 8. ry | 76. The final form of testing COTS software is? (1) Unit (2) Integration (3) Alpha (4) Beta 77. Match the following : ‘A. Maintainability (ij) Must be usable by the users for which it was designed B. Dependability (ii) Ability to meet the changing needs of customers C. Efficiency ii) Optimal use of resources D. Acceptability (iv) Ability to withstand the events of system failure Matches : A BC D w Gd @ ty) Gi) @ di) dv) Gi) @ 8 @ dy) Gi) Gi) @ Gd) @ Gi ty The system design process does not include (1) modularity (3) coupling (2) cohesion (4) None of these COCOMO (COnstructive COst MOdel) is used to estimate (1) effort and duration based on the size of the software (2) size and duration based on the effort of the software (3) effort and cost based on the duration of the software size, effort and duration based on the cost of the software «480. 81. 82. B ‘The ability of the system to handle incorrect inputs is called as (2) Reliability (4) Robustness (1) Accuracy (3) Correctness Maich the following = List 1 A. Version (i) An instance of a system which is distributed to users outside of the development team B. Release (ii) An instance of a system which is functionally identical bbut non-funetionally distinct from other instances of system. C. Variant (iii) An instance of a system which is functionally distinct in some way from other system instances Mathes : A BoC Q) @ Gi) @ 2 gd @ Gd GB) Gi) @ @) Gi) ) Which transformation is used for undoing the applied transformation : (1) Reverse transformation (2) Rotation transformation (B) Reflection transformation (4) Inverse transformation | a 83. 84. 85. When 8-way symmetry is used to obtain a full circle from pixel coordinates generated for the 0 to 45 degree octant, some pixels are set or plotted twice. This phenomenon is sometimes referred to as : (1) Interlacing (3) Overstrike (2) Antialiasing (4) Aliasing A cubic Bezier curve segment is described by control points PO, 2), PIG, 8), P28, 8) and P39, 5). Another curve segment is deseribed by QO, b), QI(e, 2), Q2(15, 2) and Q3(18, 2). Determine the values a, b and c so that the two curve segments join smoothly. (1) a=9,b=5 and 2) a=5,b=9ande (3) a=2,b=9 and (4) a=2,b=Sando=9 When the centre of projection is at infinity along the z direction and the plane of projection is the principle plane, itis called (1)_ perspective projection (2) oblique projection (3) orthographic projection (4) diametric projection Which of the following is true for a DCT transform ? (1) As DCT is unitary transform, the energy is conserved (2) DCT has _ excellent energy compaction for highly correlated data (3) Cosine transform is not real part of unitary DCT (4) Allof these87. 88. 89. 90. In image processing, Noise suppression operators are (2) Averaging functions (2) Histogram functions (3) Derivative functions (4) Subtractive functions If a histogram of the image is concentrated on the lower side of the gray scale, then the image is (1) Very Bright (2) Very Dark (3) Equallized (4) White image JPEG is an standard developed by the image compression (1) Joint Photo Editing Group (2) Joint Photographic Experts Group (3) Joint Photo Encapsulation Group (4) Joint Photo Encoding Group Consider a homogenous coordinate system with three coordinates x, y and z All the points in the system with z coordinate zero are called as (1). Cartesian points (2) Parallel points (3) Origin points (4) Points at infinity i | 2 oO. 92. Match the following : A. Cavalier (i) Projection by Projection aligning ——_the projection plane so that it intersects each coordinate axis at the same distance from the origin. B. Cabinet (ii) Projection of, Projection points. —_ along parallel lines that are not perpendicular to the projection plane. C. Isometric (ii) All lines Projection perpendicular to the viewing surface are projected at one~ half their length. D. Oblique (iv) All lines Projection perpendicular to the projection plane are projected with no change in length. Matches : A BC D a ww Gi) © 2 di) Gi) @ Gy) e @) dd @ @ @ @ di Gi) Gy) Consider coordinates of clipping window : x-max = 300; y-max = 200; x-min = 100 and y-min = 100. ‘What are the clipping points for the line Joining (150, 150) and (400, 300) ? (1) (150, 150) and (233, 200) (2) (170, 150) and (233, 200) (3) (150, 150) and (250, 300) (4) (150, 160) and (255, 150)93. 94. 95, 96. 97. B Which algorithm can be used to fill the interior parts of the curved objects ? (@_Scan-line fill algorithm Gi). Scan-tine algorithm (ii) Boundary-fill algorithm (iv) Flood-fill algorithm (Q) @, Gi) and (iv) only (2) Gili) and Gv) only (3) Gand (iv) only ) Allof these The boundary of an image represented by (2) Quad Tree (3) Polygons (2) Projections (4) Chain codes Which of the following is a video compression technique ? () TIF (2) PEG (3) BMP (4) MPEG ‘The parameters of periodic noise are estimated by (1)_ Inspecting the Foi (2) Visual Analysis (3) Patches of intensity (4) All of these ‘er spectrum the — background Given an image of size 1024 x 1024 pixels and the size of each pixel is an 8-bit quality. It requires of storage space if the image is not compressed. (1) One Terabyte (2) One Megabyte @G) SMegabytes (4) 8 Terabytes | | i 1 | i | 98. 99, 100. 101. Which one is not the transformation function ? intensity (1) Log Transformations (2) Image Neg: 3) Gamma Transformations (4) Translation Transformations Most techniques are : (1) Differential coding and Huffman coding common entropy encoding (2) Huffman coding and Arithmetic coding (3) Arithmetic coding and Differential coding (4) Differential coding and Vector coding Which of the following are methods for supervised classification ? (1) Decision tree, K-means (2) Naive Bayes, Decision tree @) K-means Hierarchal (4) Hierarchal, Naive Bayes A distance metric used in cluster analysis must have the following properties = ay 2 @) Always positive Distance from x to x is zero Distance from x to y is same as y tox @) All of these102. 103. 104. Data scrubbing is defined as (1) a process to reject data from the data warehouse and to create the necessary indexes. @) a process to load the data in the data warehouse and to create the necessary indexes (3) aprocess to upgrade the quality of data afier it is moved into a data warehouse. (4) a process to upgrade the quality of data before it is moved into a data warehouse. Match the following A. Enterprise (i) Collection of the Warehouse information about different subjects B, Data Mart (ii) Set of views over operational databases C. Virtual iii) Data that is of Warehouse value to a specific group of users A BC © @® @ Gi 2 Gi) @ @ 6) di) @ a4 @ Gi) Gd) Consider a data set D with n numt attributes and D number of training tuples. What is the worst-case complexity of growing a decision tree ? (1) Of@x Dx log(D)) Q) O(log (n) x D) G) O(n x log(D)) (4) Ox D) | 10s. 107. 108. 109. Match the following = A. Classification (i) Prediction of categorical data B. Regression (ii) Analysis of data objects C. Clustering (iii) Identification of distribution trends A BC @ @ Gi) Gi) 2 dd Gi @ QB) di) @ @ @ @ Gi) Gi) . Identify odd one out (1) K~Mean method (2) Self organising feature map method (3) K~nearest neighbour method (4) Agglomerative method Which approach is used for data clustering ? (1). Single layer perception (2) Selforganisation map (3) Multilayer perception (4) Radial basis function The data can be stored, ret updated in (1) OLAP 2) OLTP (3) SMTP (4) FTP Which of the following step is not involved in data mining ? (1) Knowledge extraction (2) Data archaeology (3) Data exploration (4) Data transformation B110. A Device driver is required by which UL. 112. 113. 14. FE of the following ? (1) Disk @) Cache (@) RAM (4) Register Consider a 4-way set associative cache consisting of 128 lines with a line size of 64 words. The CPU generat 20-bit address of a word in main memory. The number of bits in the TAG, LINE and WORD field are respectively. () 96,5 Q 1.76 @) 75,8 (4) 9,5,6 Which algorithm is used to remove and place new contents into the cache ? (1). Renewal algorithm (2) Updation (3). Replacement algorithm (4) None of these What is the product of maxterms for Boolean function F=xy +3'2? () r0,247 2 7O.24,6) @) 20,3.4,6) @) 2 (0.2.4.5) Consider a multiplier circuit that multiplies a binary number represented by 4 bits by a number represented by 3 bits and produces a 7-bit result. How many AND gates and 4-bit adders are needed to design the circuit ? (1) Wand 4 2) 12and3 (3) 12and2 (4) Gand3 115. 116. 117. 118. 119. 120. ‘A computer uses a memory unit with 256 K words of 32 bits each. A binary instruction code is stored in one word of memory. The instruction has four parts : an indirect bit, an opcode a register code part to specify one of 64 registers, and an address part. What is the size of opcode in number of bits ? @ 6 @7 3) 8 (4) 9 Which of the following is an instruction in pseudo code ? (1) BEGIN @) END (3) Both BEGIN and END (4) None of these What is the size of decoder to select row of the chip with size 128 x 8 RAM, each to address 2048 byte of memory? (1) 4x16 Q) 6x12 Q) 4x12 (4) 8x16 In vectored interrupt, branch address i supplied by (a) CPU (2) Peripheral interrupted (3) WO Service routine (4) None of these ‘The register used by the CPU as working area is called (1) Program counter (2) Accumulator (3)_ Instruction register (4) Index register SQL provides a number of special aggregate functions. Which of the following is not included in SQL ? (@) Count (2) Median @) Min (4) Sum13 ewer & fare SIFT / SPACE FOR ROUGH WORK 16
You might also like
Brain Station 23 Question
PDF
100% (1)
Brain Station 23 Question
24 pages
Computer Science note
PDF
No ratings yet
Computer Science note
16 pages
2024-set-d-paper2 (1)
PDF
No ratings yet
2024-set-d-paper2 (1)
28 pages
Asst Director Paper II
PDF
No ratings yet
Asst Director Paper II
12 pages
PGCET2019
PDF
No ratings yet
PGCET2019
16 pages
Skill Asst Prof CSE IT Ques Paper With Key
PDF
No ratings yet
Skill Asst Prof CSE IT Ques Paper With Key
29 pages
A5-R5 July2023
PDF
No ratings yet
A5-R5 July2023
8 pages
Lbs QP
PDF
No ratings yet
Lbs QP
13 pages
Pgcet Cse-2011
PDF
No ratings yet
Pgcet Cse-2011
14 pages
Computer Sc. & App. II - 0001
PDF
No ratings yet
Computer Sc. & App. II - 0001
16 pages
Computer Sce. and Applic. - 0001
PDF
No ratings yet
Computer Sce. and Applic. - 0001
24 pages
Lect Tech Computer Engg
PDF
No ratings yet
Lect Tech Computer Engg
16 pages
Instructions For Candidates:: A5-R5: Data Structure Through Object Oriented Programming Language
PDF
No ratings yet
Instructions For Candidates:: A5-R5: Data Structure Through Object Oriented Programming Language
8 pages
18 CSC201 Ja
PDF
No ratings yet
18 CSC201 Ja
2 pages
A5-R5 July22
PDF
No ratings yet
A5-R5 July22
8 pages
Wbslet 15798-CompScApp - (X) - 19-Final
PDF
No ratings yet
Wbslet 15798-CompScApp - (X) - 19-Final
20 pages
CSE205 End Term Question Paper
PDF
No ratings yet
CSE205 End Term Question Paper
4 pages
PtsEwMMEkvAPRWnbEeaB
PDF
No ratings yet
PtsEwMMEkvAPRWnbEeaB
28 pages
M. SC Computer SC (BHU)
PDF
No ratings yet
M. SC Computer SC (BHU)
22 pages
a5-r5
PDF
No ratings yet
a5-r5
8 pages
Old Paper - 202201 - A5-R5 - DATA STRUCTURE THROUGH OBJECT ORIENTED PROGRAMMING
PDF
No ratings yet
Old Paper - 202201 - A5-R5 - DATA STRUCTURE THROUGH OBJECT ORIENTED PROGRAMMING
8 pages
APDCL JM IT Paper 1 Series C JobAssam - in
PDF
No ratings yet
APDCL JM IT Paper 1 Series C JobAssam - in
15 pages
D 8706 Paper Ii
PDF
No ratings yet
D 8706 Paper Ii
8 pages
Mar-37223-D Paperii Pune
PDF
No ratings yet
Mar-37223-D Paperii Pune
28 pages
CS X 22
PDF
No ratings yet
CS X 22
20 pages
Bseb Ual Question Paper 2023
PDF
No ratings yet
Bseb Ual Question Paper 2023
32 pages
Question Booklet
PDF
No ratings yet
Question Booklet
16 pages
1674821097phpgXA5Ux
PDF
No ratings yet
1674821097phpgXA5Ux
14 pages
Linear Regression
PDF
No ratings yet
Linear Regression
14 pages
FIT2004 Past Year Paper
PDF
No ratings yet
FIT2004 Past Year Paper
19 pages
PU MSC Computer Science Entrance Paper PDF
PDF
50% (2)
PU MSC Computer Science Entrance Paper PDF
14 pages
24 ComputerScience Final
PDF
No ratings yet
24 ComputerScience Final
14 pages
DSA Presentstio
PDF
No ratings yet
DSA Presentstio
65 pages
Paper-2-Computer-Science
PDF
No ratings yet
Paper-2-Computer-Science
26 pages
Computer Science Application Paper II SET 2024
PDF
No ratings yet
Computer Science Application Paper II SET 2024
36 pages
CSET243-R23_questionpaper
PDF
No ratings yet
CSET243-R23_questionpaper
3 pages
2019 Fall Final
PDF
No ratings yet
2019 Fall Final
26 pages
Previous Midterm
PDF
No ratings yet
Previous Midterm
9 pages
2017- kcet old question papers
PDF
No ratings yet
2017- kcet old question papers
11 pages
Isro CS 2018
PDF
No ratings yet
Isro CS 2018
21 pages
PU Affiliated BS CS 5th Semester All Papers
PDF
0% (1)
PU Affiliated BS CS 5th Semester All Papers
6 pages
A5-R5.1 English
PDF
No ratings yet
A5-R5.1 English
8 pages
Compsc III
PDF
No ratings yet
Compsc III
32 pages
Computer 2013 cOMPETATIVE
PDF
No ratings yet
Computer 2013 cOMPETATIVE
16 pages
For of Kcet
PDF
No ratings yet
For of Kcet
16 pages
Lecturers in GDC (Computer Science) Notification No.43-11
PDF
No ratings yet
Lecturers in GDC (Computer Science) Notification No.43-11
24 pages
PGCET2017
PDF
No ratings yet
PGCET2017
16 pages
Easy Teach Exam: (For Diploma Holders in Engk, Llech.)
PDF
No ratings yet
Easy Teach Exam: (For Diploma Holders in Engk, Llech.)
8 pages
11 04 2019 Asea P1
PDF
No ratings yet
11 04 2019 Asea P1
40 pages
301 Past Questions
PDF
No ratings yet
301 Past Questions
24 pages
2024_Data_Structures
PDF
No ratings yet
2024_Data_Structures
5 pages
Advance Java Mock Question
PDF
No ratings yet
Advance Java Mock Question
53 pages
COMP90038 Practice Exam Paper (2) : Dit?usp Sharing
PDF
No ratings yet
COMP90038 Practice Exam Paper (2) : Dit?usp Sharing
15 pages
A6 R4 PDF
PDF
No ratings yet
A6 R4 PDF
5 pages
Question Papers of Two Year M. Tech I Semester Regular Examinations April - 2013
PDF
No ratings yet
Question Papers of Two Year M. Tech I Semester Regular Examinations April - 2013
49 pages
Final With Solutions 2021
PDF
No ratings yet
Final With Solutions 2021
36 pages