A Is A Skew Symmetric Matrix, Then A Is A Symmetric Matrix A Is A Skew Symmetric Matrix of Order N, Then A A Z y X Z y X Z y X
A Is A Skew Symmetric Matrix, Then A Is A Symmetric Matrix A Is A Skew Symmetric Matrix of Order N, Then A A Z y X Z y X Z y X
log(1 − x ) + cos x
5. lim =
x →0 x2
1
(A) 0 (B)
2
−1
(C) (D) −1
2
A 3
[P.T.O.]
6. Sum of coefficient in the expansion of (1 − 3x + 2x 3 )512 is :
(A) 0 (B) 2512
(C) −1 (D) −2
(A) 2 2 (B) + 7
(C) 0 (D) 2i
x (1 + x )
99
8. The value of dx is :
0
−1 11
(A) (B)
10100 10100
1 1
(C) (D)
10010 11100
11. A projected stone which is provided to serve as a support for trusses and beams is known as :
(A) Lintel (B) Sill
(C) Cornice (D) Corbel
132/2023 4 A
14. The sensitivity of bubble tube can be increased :
(A) viscosity of liquid is greater
(B) increasing the diameter of tube
(C) surface tension of the liquid is greater
(D) decrease the length of tube
15. The axis about which the lower and upper plates of a theodolite rotate is called :
(A) Trunnion axis (B) Horizontal axis
(C) Vertical axis (D) Level tube axis
18. Which of the following act as a sort of regulating reservoir temporarily in the event of
rejection of load by the turbine in hydro electric power plant?
(A) Penstock (B) Trash rack
(C) Dam (D) Forebay
19. Select correct statements about economiser used in steam power plants :
(i) It reduces the losses of heat with the flue gases
(ii) It is intended for heating the feed water
(iii) It increases the consumption of fuel
(A) (i) only (B) (i) and (ii) are correct
(C) (i) and (iii) are correct (D) (i), (ii) and (iii) are correct
A 5 132/2023
[P.T.O.]
21. A conductor of length 28 meter has a resistance of 0.84 Ω . If the area of cross section of the
conductor is 2 meter square then its specific resistance is ————— Ω − m :
(A) 4.7 × 10–8 (B) 6 × 10–8
(C) 12 × 10–8 (D) 0.06 × 10–8
23. Which of the following statement is / are correct about a Parallel Circuit?
(i) Different branch resistors have their individual currents.
(ii) The branch currents and conductance are additive.
(iii) Same voltage and current acts across all branches of the circuit.
(A) Only (i) (B) Only (i) and (ii)
(C) Only (iii) (D) All of the above (i), (ii) and (iii)
24. If a capacitor is connected across a 100 V dc supply for 0.2 sec with a steady current of 0.3 A,
then its capacity is ————— Micro farad and charge is ————— Coulomb.
(A) 6000 and 0.006 (B) 60 and 0.006
(C) 0.06 and 60 (D) 600 and 0.06
25. The ratio of effective value to mean value of an alternating wave is called :
(A) Form factor (B) Peak factor
(C) Amplitude factor (D) Both (B) and (C)
26. Voltage across the non-conducting diode in a bridge rectifier is —————, where 6V is the
peak value of the input voltage.
(A) 0V (B) 6V
(C) 12V (D) None of the above
132/2023 6 A
29. Pick the statement which does not satisfy for GSM :
(A) Is less secure
(B) Operates on spread spectrum technique
(C) Uses SIM card
(D) Uses TDMA technique
31. The following are pairs of ISO-OSI layers/sub-layers and functionalities in which one of them
is incorrect. Identify the incorrect pair :
(A) Medium Access Control, Channel sharing
(B) Data Link Layer, Bit synchronization
(C) Network Layer, Routing
(D) Transport Layer, End-to-End process communication
32. A sender, which employs Stop and Wait ARQ technique, wants to send 10 packets to a
receiver. Assume that the channel is noisy and every 4th packet sent by the sender is lost.
How many packets the sender will have to send in total so that the receiver receives all the
10 packets correctly?
(A) 21 (B) 12
(C) 13 (D) 20
33. Consider the message M = 1010001101. The cyclic redundancy check (CRC) code for this
message using the divisor (generator) polynomial x 5 + x 4 + x 2 + 1 is :
(A) 10101 (B) 01011
(C) 01110 (D) 10110
34. A sender A, which employs Sliding Window protocol, wants to send 64 byte packets to a
receiver B. Assume that the Round Trip Time is 80 milliseconds, and the maximum
bandwidth of the channel connecting A and B is 64 kbps. What is the optimal window size
that A should use?
(A) 10 (B) 20
(C) 40 (D) 80
35. A sender A sends an IPv4 packet D to a receiver B. Assume that D reached B without any
error. Which of the following header fields of D would have changed during transit?
(i) TTL
(ii) Checksum
(A) (i) only (B) (ii) only
(C) Both (i) and (ii) (D) None of these
A 7 132/2023
[P.T.O.]
36. Two computers A and B have IPv4 addresses 10.14.2.115 and 10.14.2.90 respectively. Which
of the following should not be used as a subnet mask for both, if both A and B should belong
to the same subnet?
(A) 255.255.255.0 (B) 255.255.255.128
(C) 255.255.255.192 (D) 255.255.255.224
37. Identify the correct sequence in which the following packets are transmitted on the network
by a host when a browser requests a webpage from a remote server, assuming that the host
has just been restarted :
(A) DNS query, HTTP GET, TCP SYN
(B) DNS query, TCP SYN, HTTP GET
(C) HTTP GET, DNS query, TCP SYN
(D) TCP SYN, DNS query, HTTP GET
40. Alice digitally signs a message (say, using RSA digital signature scheme) and sends it to Bob.
Verification of the signature by Bob requires :
(A) Alice’s public key (B) Bob's public key
(C) Alice’s private key (D) Bob’s private key
132/2023 8 A
41. Consider the following two statements :
S1 : A MAC provides both integrity and (data origin) authentication.
S2 : A digital signature provides both integrity and (data origin) authentication.
Which one of the following is correct?
(A) Both S1 and S2 are false (B) S1 is false and S2 is true
(C) S1 is true and S2 is false (D) Both S1 and S2 are true
44. The types of logical channels supported by the protocol L2CAP of Bluetooth are :
(A) Signalling and Connection-less logical channels only
(B) Signalling and Connection-Oriented logical channels only
(C) Connection-less and Connection oriented logical channels only
(D) Signalling, Connection-less and Connection oriented logical channels
45. In a J–K flip-flop, when J = 1 and K = 1, the output toggles continuously between 1 and 0.
This oscillation between 1 and 0 leads to a :
(A) Reset Condition (B) Race-around Condition
(C) Set Condition (D) Preset Condition
47. Which of the following values is to be considered for a “Don’t Care condition"?
(A) 1 (B) 0
(C) Either 1 or 0 (D) None of the above
A 9 132/2023
[P.T.O.]
49. The minimum number of D flip-flops needed to construct a modulo-258 counter is :
(A) 8 (B) 9
(C) 258 (D) 512
50. Which of the following is the corresponding min term when A=1, B=0, C=0 and D=1?
(A) A + B’ + C’ + D (B) A’ . B . C . D’
(C) A’ + B + C + D (D) A . B’ . C’ . D
n
51. A combinational circuit which has a single input, ‘n’ selection lines and a maximum of 2
outputs is a/an :
(A) Encoder (B) Multiplexer
(C) Decoder (D) Demultiplexer
52. A 16-bit address bus can handle a maximum of ————— different addresses.
(A) 25622 (B) 65536
(C) 32766 (D) 65652
53. A controller that takes control of the buses and transfers data directly between source and
destination bypassing the microprocessor is called :
(A) DMA Controller (B) Master-Slave Controller
(C) Disk Controller (D) Read-Write Controller
54. The memory address of the next instruction executed by the microprocessor 8086, when
operated in real mode with value in CS = 1000 and value in IP = E000, is :
(A) 10E00 (B) 1E000
(C) F000 (D) 1000 E
55. In 8086 assembly language, which of the following is not in the category of reserved words?
(A) directive (B) operator
(C) label (D) predefined symbol
56. Identify the addressing mode which is used in the following instruction :
MOV AX, [1562H]
(A) Register addressing mode (B) Register Indirect addressing mode
(C) Direct addressing mode (D) Immediate addressing mode
57. In 8255 PPI, which of the following modes takes only port C bits for set or reset?
(A) BSR Mode (B) Hand Shake I/O Mode
(C) Strobed I/O Mode (D) Bi-directional Data Bus Mode
132/2023 10 A
58. For the 8279 programmable keyboard/display controller, in the ————— mode, the key
matrix can be interfaced using either encoded or decoded scans.
(A) Interrupt Mode (B) Polled Mode
(C) Scanned Keyboard Mode (D) Scanned Sensor Matrix Mode
59. A RAM chip has a capacity of 1024 words of 8 bits each (1K × 8). The number of 2 × 4
decoders with enable line needed to construct a 16K × 16 RAM from 1K × 8 RAM is :
(A) 4 (B) 5
(C) 6 (D) None of the above
62. In an instruction execution pipeline, the earliest that the data TLB (Translation Look a side
Buffer) can be accessed is :
(A) before effective address calculation has started
(B) during effective address calculation
(C) after effective address calculation has completed
(D) after data cache lookup has completed
63. Increasing the RAM of a computer typically increases the performance because :
(A) Virtual Memory increases (B) Fewer Page Faults occur
(C) Larger RAMs are faster (D) All of the above
64. Consider a direct mapped cache of size 32 KB with block size 32 bytes. The CPU generates 32
bit addresses. The number of bits needed for cache indexing and the number of tag bits are
respectively, ————— and —————.
(A) 10, 17 (B) 10, 22
(C) 15, 17 (D) 15, 22
A 11 132/2023
[P.T.O.]
65. Consider the following two resource allocation policies (to processes) :
P1: Make a process to release all resources before requesting a new resource.
P2: Make a process to request and get allocated all the required resources before execution.
Which of the policies will lead to deadlock prevention?
(A) Both P1 and P2 (B) P1 only
(C) P2 only (D) Neither P1 nor P2
66. In a uniprocessor system, three processes P1, P2, and P3 having overall execution time of 10,
20 and 30 units respectively, arrive at the zeroth instant. Each process spends the first 20%
of the overall execution time doing I/O operations, the next 70% of time doing computation,
and the last 10% of time doing I/O operations again. The operating system employs Shortest
Remaining Time First scheduling algorithm and schedules a new process either when the
running process gets blocked due to its I/O operations or when the running process finishes
its computing. Assume that all I/O operations of the processes can be overlapped. For what
percentage of the total time (from the zeroth instant till all processes finish) does the CPU
remain idle?
(A) 0% (B) 4.26%
(C) 10.64% (D) 30.03%
67. Which of the following scheduling algorithms is most suitable for a time-sharing operating
system?
(A) First Come First Serve (B) Shortest Job First
(C) Shortest Remaining Time First (D) Round Robin
68. A process executes the equivalent executable code of the following code:
for(i = 0; 1< n; i++) fork();
The number of child processes created which do not further create any child processes is :
(A) 2n − 1 (B) 2n
(C) 2n −1 − 1 (D) 2n −1
69. The arrival time and processing time of four processes, in the pattern (Process name, Arrival
time, Processing time) are as follows: (P1, 0, 6), (P2, 2, 12), (P3, 8, 8), (P4, 12, 4). Which of the
following process scheduling algorithms will give the lowest average turnaround time?
(A) First Come First Serve
(B) Shortest Job First (Without Preemption)
(C) Shortest Remaining Time First
(D) Round Robin with slot size of four time units
70. Belady's anomaly may occur if ————— page replacement policy is employed.
(A) FIFO (B) LRU
(C) MRU (D) Optimal
132/2023 12 A
71. There are three processes in a system. Each requires access to four units of a non-sharable
I/O device for their computation. What is the minimum number of instances of the I/O device
required so that the processes will never face a deadlock?
(A) 4 (B) 10
(C) 12 (D) None of these
72. Consider the following two statements regarding Magnetic Disks with concentric circular
tracks :
S1 : The highest share of Disk Service Time is contributed by rotational latency.
S2 : All tracks have the same storage capacity.
Which of the following is correct?
(A) Both S1 and S2 are false (B) S1 is false and S2 is true
(C) S1 is true and S2 is false (D) Both S1 and S2 are true
74. Which of the following statements is true in case of multiple catch blocks in JAVA?
(A) Either of the superclass or subclass can be caught first
(B) The superclass exception must be caught first
(C) The superclass exception cannot be caught first
(D) None of these
A 13 132/2023
[P.T.O.]
76. Which is/are valid constructor(s) for Thread in JAVA?
1. Thread (Runnable r, String name)
2. Thread ( )
3. Thread (int priority)
4. Thread (Runnable r, int priority)
(A) 1 only (B) 3 and 4
(C) 2 and 4 (D) 1 and 2
78. What is the time complexity of the algorithm to check whether an edge exists between a
given pair of nodes, if the graph is represented as an adjacency list?
(A) O(V) (B) O(E)
79.
If the post order traversal of the above graph gives pq + rs∗ – then the label of the nodes 1, 2,
3, 4, 5, 6, 7 will be :
(A) –, +, ∗, p, q, r, s (B) p, +, q, –, r, ∗, s
(C) p, q, r, s, +, ∗, – (D) +, p, q, –, ∗, r, s
132/2023 14 A
80. A priority queue is implemented using a binary max heap. Which of the following is a valid
level order traversal of the heap and the content of the heap after two delete operations?
(A) [35, 22, 26, 23, 20, 18, 24] & [26, 23, 20, 18, 24]
(B) [35, 24, 23, 26, 20, 18, 22] & [24, 23, 20, 18, 22]
(C) [35, 24, 26, 23, 20, 18, 22] & [24, 23, 22, 18, 20]
(D) [35, 24, 22, 23, 20, 18, 26] & [24, 23, 22, 20, 18]
82.
Which is the correct DFS search sequence of the above graph if the search starts from node
5 and reverse lexicographic ordering of the adjacent vertices are chosen for search?
(A) 5, 4, 3, 2, 1, 0 (B) 5, 1, 2, 3, 0, 4
(C) 5, 4, 2, 3, 1, 0 (D) 5, 4, 3, 1, 2, 0
83. A software project involves execution of FIVE tasks T1 , T2 , T3 , T4 and T5 each of duration
8, 10, 13, 25 and 30 hours respectively. The tasks T2 and T4 can start only after T1 is
complete. Task T3 can start only after T2 is complete. Task T5 can start only after both T3
and T4 are complete :
(A) 0 (B) 3
(C) 13 (D) 18
84. What is the primary determinant of selecting activities in each iteration in the Spiral model
of software development?
(A) Risk (B) Iteration size
(C) Cost (D) Adopted process
A 15 132/2023
[P.T.O.]
85. In a software project COCOMO is used to estimate :
(A) effort and duration based on the size of the software
(B) effort and cost based on the duration of the software
(C) size and duration based on the effort of the software
(D) size, effort and duration based on the cost of the software
87. Which of the following statement are TRUE about an SQL query?
(i) An SQL query can contain a HAVING clause even if it does not have a GROUP BY
clause
(ii) An SQL query can contain a HAVING clause only if it has GROUP BY clause
(iii) All attributes used in the GROUP BY clause must appear in the SELECT clause
(iv) Not all attributes used in the GROUP BY clause need to appear in the SELECT clause
(A) (i) and (iii) (B) (i) and (iv)
(C) (ii) and (iii) (D) (ii) and (iv)
89. When a transaction Ti requests a data item currently held by T j ,Ti is allowed to wait only if
it has a timestamp larger than that of T j (that is Ti is younger than T j ). Otherwise, T j is
rolled back. The scheme is :
(A) Wait-die (B) Wait-wound
(C) Wound-wait (D) Wait
132/2023 16 A
90. Which of the following is the correct way to register a jdbcOdbcDriver?
(A) jdbc . odbc . JdbcOdbcDriver obj = new
sun . jdbc . odbc . JdbcOdbcDriver ( ) ;
(B) odbc . JdbcOdbcDriver obj = new
sun . odbc . JdbcOdbcDriver ( ) ;
(C) jdbc . JdbcOdbcDriver obj = new
sun . jdbc . JdbcOdbcDriver ( ) ;
(D) jdbc . odbc . JdbcOdbc obj = new
sun . jdbc. odbc . JdbcOdbc ( ) ;
91. Given the basic ER and relational models, which of the following is correct?
(A) An attribute of an entity can have only one value
(B) An attribute of an entity cannot be composite
(C) In a row of a relational table, an attribute can have more than one value
(D) In a row of a relational table, an attribute can have exactly one value or a NULL
value
92. If a join operation J1 preserves those tuples which might get lost in join operation J2 :
(A) J1 is Natural Join and J2 is Outer Join
(B) J1 is Outer Join and J2 is Natural Join
(C) J1 is Left Outer Join and J2 is Right Outer Join
(D) J1 is Left Outer Join and J2 is Natural Join
93. Which of the following file organizations helps in fast retrieval of data?
(A) Sequential (B) B-Tree
(C) Heap (D) Hash
95. Which of these tags is used for embedding CSS in an HTML page?
(A) <css> (B) <!DOCTYPE css>
(C) <script> (D) <style>
A 17 132/2023
[P.T.O.]
96. What is the correct output for the following JavaScript code snippet?
var a=6
var b = 1
var obj = {a : 50}
with (obj)
{
alert (b)
}
(A) Error (B) 1
(C) 50 (D) 6
97. <?php :
$var1 = 10;
$var2 = 20;
$var3 = 1;
if ($var1 > $var2 && $var3|| $var 3)
print “TRUE”;
else
print “FALSE”
?>
(A) No Output (B) TRUE
(C) FALSE (D) Syntax Error
99. The right to use domain names delegated by the domain name registrars are accredited by :
(A) Internet Society (ISOC)
(B) Internet Research Task Force
(C) Either (A) or (B)
(D) Internet Corporation for Assigned Names and Numbers
100. Which port number does FTP use for a data connection?
(A) 20 (B) 21
(C) 22 (D) 23
————————
132/2023 18 A
SPACE FOR ROUGH WORK
A 19 132/2023
[P.T.O.]
SPACE FOR ROUGH WORK
132/2023 20 A