No. |
Question |
1 |
What does the following algorithm
approximate? (Assume m > 1, Î
> 0).
x = m;
y-i;
while (x - y > Î)
{ x = (x + y) / 2 ;
y = m/x ;
}
print (x) ; |
Options |
A) log m |
B)
m2
|
C) m1/2 |
D) m1/3 |
|
Your Answer |
(Not
Answered) |
Correct Answer |
C |
|
2 |
The problems 3-SAT and 2-SAT are |
Options |
A) both in P
|
B) both NP-complete
|
C) NP-complete and in P respectively |
D) undecidable and NP-complete respectively |
|
Your Answer |
(Not
Answered) |
Correct Answer |
C |
|
3 |
Consider a relation scheme R = (A, B, C,
D, E, H) on which the following functional dependencies hold :
(A ® B, BC ®
D, E ® C, D ®
A). What are the candidate keys of R? |
Options |
A) AE, BE |
B) AE, BE, DE |
C) AEH, BEH, BCH |
D) AEH, BEH, DEH |
|
Your Answer |
(Not
Answered) |
Correct Answer |
D |
|
4 |
A circuit outputs a digit in the form of
4 bits. 0 is represented by 0000,1 by 0001,..., 9 by 1001. A
combinational circuit is to be designed which takes these 4
bits as input and outputs 1 if the digit ³ 5, and 0
otherwise. If only AND, OR and NOT gates may be used, what is
the minimum number of gates required? |
Options |
|
Your Answer |
(Not
Answered) |
Correct Answer |
C |
|
5 |
If 73x (in base-x number
system) is equal to 54y (in base-y number system),
the possible values of x and y are |
Options |
A) 8, 16 |
B) 10, 12
|
C) 9, 13 |
D) 8, 11 |
|
Your Answer |
(Not
Answered) |
Correct Answer |
D |
|
6 |
In a packet switching network, packets
are routed from source to destination along a single path
having two intermediate nodes. If the message size is 24 bytes
and each packet contains a header of 3 bytes, then the optimum
packet size is |
Options |
|
Your Answer |
(Not
Answered) |
Correct Answer |
D |
|
7 |
Consider the following program fragment
for reversing the digits in a given integer to obtain a new
integer. Let n = d1d2... dm.
int n, rev;
rev = 0;
while (n > 0) {
rev = rev * 10 + n % 10 ;
n = n/10;
}
The loop invariant condition at the end of the ith iteration
is: |
Options |
A) n = d1d2... dm-i
and rev = dmdm-1….dm-i+1 |
B) n = dm-i+1...dm-1dm
(or) rev = dm-i...d2d1 |
C) n ¹ rev |
D) n = d1d2...dm
(or) rev = dm...d2d1
|
|
Your Answer |
(Not
Answered) |
Correct Answer |
A |
|
8 |
Consider the following program segment for a hypothetical
CPU having three user registers Rl, R2 and R3.
Instruction |
Operation |
Instruction Size (in words) |
MOV Rl,5000 |
; Rl ¬
Memory[5000] |
2 |
MOV R2,(R1) |
; R2 ¬ Memory[(Rl)] |
1 |
ADD R2,R3 |
; R2 ¬ R2
+ R3 |
1 |
MOV 6000, R2 |
; Memory[6000] ¬ R2 |
2 |
HALT |
; Machine halts |
1 |
Let the clock cycles required for various operations be as
follows:
Register to/from memory transfer :
3 clock cycles
ADD with both operands in register : 1 clock
cycle
Instruction fetch and decode
:
2 clock cycles per word
The total number of clock cycles required to execute the
program is
|
Options |
|
Your Answer |
(Not
Answered) |
Correct Answer |
B |
|
9 |
Consider an operating system capable of
loading and executing a single
sequential user process at a time. The disk head scheduling
algorithm used is First Come First Served (FCFS). If FCFS is
replaced by Shortest Seek Time First (SSTF), claimed by the
vendor to give 50% better benchmark results, what is the
expected improvement in the I/O performance of user programs ? |
Options |
A) 50% |
B) 40%
|
C) 25% |
D) 0%
|
|
Your Answer |
(Not
Answered) |
Correct Answer |
D |
|
10 |
Consider the following statements with
respect to user-level threads and
kernel-supported threads
(i) Context switch is faster with kernel-supported threads
(ii) For user-level threads, a system call can block the
entire process
(iii) Kernel-supported threads can be scheduled independently
(iv) User-level threads are transparent to the kernel
Which of the above statements are true? |
Options |
A) (ii), (iii) and (iv) only |
B) (ii) and (iii) only
|
C) (i), and (iii) only |
D) (i) and (ii) only
|
|
Your Answer |
(Not
Answered) |
Correct Answer |
A |
|
11 |
Consider three decision problems P1,
P2 and P3. It is known that P1
is decidable and P2 is undecidable. Which one of
the following is TRUE? |
Options |
A) P3 is decidable if P1
is reducible to P3 |
B) P3 is undecidable if P3
is reducible to P2
|
C) P3 is undecidable if P2
is reducible to P3
|
D) P3 is decidable if P3
is reducible to P2s complement |
|
Your Answer |
(Not
Answered) |
Correct Answer |
A |
|
12 |
Which one of the following are essential features of an
object-oriented
programming language?
(i) Abstraction and encapsulation
(ii) Strictly-typedness
(iii) Type-safe property coupled with sub-type rule
(iv) Polymorphism in the presence of inheritance
|
Options |
A) (i) and (ii) only |
B) (i) and (iv) only |
C) (i), (ii) and (iv) only |
D) (i), (iii) and (iv) only |
|
Your Answer |
(Not
Answered) |
Correct Answer |
B |
|
13 |
Consider the following relation schema
pertaining to a students database:
Student (rollno, name, address)
Enroll (rollno, courseno, coursename)
where the primary keys are shown underlined. The number of
tuples in the Student and Enroll tables are 120 and 8
respectively. What are the maximum and minimum number of
tuples that can be present in (Student * Enroll), where
‘*’denotes natural join? |
Options |
A) 8, 8 |
B) 120, 8
|
C) 960, 8 |
D) 960, 120
|
|
Your Answer |
(Not
Answered) |
Correct Answer |
C |
|
14 |
Assume
the following C variable declaration
int *A [10], B [10][10];
Of
the following expressions
I
A[2]
II
A [2] [3]
III
B
IV B[2][3]
which
will not give compile-time errors if used as left hand sides
of assignment statements in a C program ?
|
Options |
A) I, II, and IV only |
B) II, III, and IV only
|
C) II and IV only |
D) IV only
|
|
Your Answer |
(Not
Answered) |
Correct Answer |
D |
|
15 |
How many distinct binary search trees can
be created out of 4 distinct keys? |
Options |
|
Your Answer |
(Not
Answered) |
Correct Answer |
B |
|
16 |
Given the following input (4322, 1334,
1471, 9679, 1989, 6171, 6173, 4199) and the hash function x
mod 10, which of the following statements are true ?
(i) 9679, 1989, 4199 hash to the same value
(ii) 1471, 6171 hash to the same value
(iii) All elements hash to the same value
(iv) Each element hashes to a different value |
Options |
A) (i) only |
B) (ii) only
|
C) (i) and (ii) only |
D) (iii) or (iv) |
|
Your Answer |
(Not
Answered) |
Correct Answer |
C |
|
17 |
Packets of the same session may be routed
through different paths in |
Options |
A) TCP, but not UDP |
B) TCP and UDP
|
C) UDP, but not TCP |
D) Neither TCP, nor UDP
|
|
Your Answer |
(Not
Answered) |
Correct Answer |
B |
|
18 |
The following numbers are inserted into
an empty binary search tree in the given order: 10, 1, 3, 5,
15, 12, 16. What is the height of the binary search tree (the
height is the maximum distance of a leaf node from the root)? |
Options |
|
Your Answer |
(Not
Answered) |
Correct Answer |
B |
|
19 |
Postorder traversal of a given binary
search tree, T produces the following sequence of keys
10, 9, 23, 22, 27, 25, 15, 50, 95, 60, 40, 29
Which one of the following sequences of keys can be the result
of an inorder traversal of the tree T? |
Options |
A) 9, 10, 15, 22, 23, 25, 27, 29, 40, 50, 60,
95 |
B) 9, 10, 15, 22, 40, 50, 60, 95, 23, 25, 27,
29 |
C) 29, 15, 9, 10, 25, 22, 23, 27, 40, 60, 50,
95
|
D) 95, 50, 60, 40, 27, 23, 22, 25, 10, 9, 15,
29 |
|
Your Answer |
(Not
Answered) |
Correct Answer |
A |
|
20 |
Let f: B ®
C and g: A ® B be two
functions and let h = f o g. Given that h is an onto function.
Which one of the following is TRUE? |
Options |
A) f and g
should both be onto functions. |
B) f should be onto
but g need not be onto |
C) g should be onto
but f need not be onto |
D) both f and g
need not be onto |
|
Your Answer |
(Not
Answered) |
Correct Answer |
B |
Post Resume: Click here to Upload your Resume & Apply for Jobs |