Exam Details

Subject computer science
Paper
Exam / Course
Department
Organization indian space research organisation
Position
Exam Date 2013
City, State ,


Question Paper

COMPUTER SCIENCE -2013 SET-A I

1. Let be a three dimensional array. How many elements are there in the array

1200

1408

33

1050

2. The number of rotations required to insert a sequence of elements into an empty AVL tree is?


0

1

2

3

3. Opportunistic reasoning is addressed by which of the following knowledge representation

Script

Blackboard

Production Rules

Fuzzy Logic

4. The following steps in a linked list p=getnode() info(p)=10 next(p)=list list
result in which type of operation?

pop operation in stack

removal of a node

inserting a node

modifying an existing node


5. Shift reduce parsing belongs to a class of

bottom up parsing

top down parsing

recursive parsing

predictive parsing


6. Which of the following productions eliminate left recursion in the productions given below:

<img src='./qimages/1646-6.jpg'>



7. Consider the following psuedocode:

x:integer 1
y:integer 2

procedure add


procedure second (P:procedure)
x:integer:= 2


procedure first
y:integer:= 3
second(add)

first()
write_integer

What does it print if the language uses dynamic scoping with deep binding?

2

3

4

5

8. Which logic gate is used to detect overflow in complement arithmetic?

OR gate

AND gate

NAND gate

XOR gate

9. In an array of 2N elements that is both 2-ordered and 3-ordered, what is the maximum number of positions that an element can be from its position if the array were 1-ordered?

1

2

N/2

2N-1

10. If the frame buffer has 8 bits per pixel and 8 bits are allocated for 10 each of the B components, what would be the size of the lookup table?

24 bytes

1024 bytes

768 bytes

256 bytes


11. When two BCD numbers 0x14 and 0x08 are added what is the binary representation of the resultant number?

0x22

0x1c

0x16

d results in overflow

12. Which of the following sorting algorithms has the minimum running time complexity in the best and average case?

Insertion sort, Quick sort

Quick sort, Quick sort

Quick sort, Insertion sort

Insertion sort, Insertion sort


13. The number 1102 in base 3 is equivalent to 123 in which base system?

4

5

6

8

14. A processor is fetching instructions at the rate of 1 MIPS. A DMA module is used to transfer characters to RAM from a device transmitting at 9600 bps. How much time will the processor be slowed down due to DMA activity?

9.6 ms

4.8 ms

2.4 ms

1.2 ms

15. A pipeline P operating at 400 MHz has a speedup factor of 6 and operating at 70% efficiency. How many stages are there in the pipeline?

5

6

8

9

16. How much speed do we gain by using the cache, when cache is used 80% of the time? Assume cache is faster than main memory.

5.27

2.00

4.16

6.09



17. Two eight bit bytes 1100 0011 and 0100 1100 are added. What are the values of the overflow, carry and zero flags respectively, if the arithmetic unit of the CPU uses complement form?

1,1

1,0

0,1

1,0


18. How many check bits are required for 16 bit data word to detect 2 bit errors and bit correction using hamming code?

5

6

7

8

19. What is the maximum number of characters bits parity) that can be transmitted in a second on a 19.2 kbps line. This asynchronous transmission requires 1 start bit and 1 stop bit.

192

240

1920

1966


20. IEEE 1394 is related to

RS-232

USB

Firewire

PCI

21. What will be the cipher text produced by the following cipher function for the plain text ISRO with key k =7. [Consider .......'Z' 25] (kM 13) mod 26

RJCH

QIBG

GQPM

XPIN


22. Any set of boolean operators that is sufficient to represent all
boolean expressions is said to be complete. Which of the following is not complete?

OR}



OR}

NOT}


23. Which of the following is the highest isolation level in transaction management?

Serializable

Repeated Read

Committed Read

Uncommitted Read

24. Consider the following relational schema:
Suppliers (sid:integer, sname:string, saddress:string)
Parts (pid:integer, pname:string, pcolor:string)
Catalog (sid:integer, pid:integer, pcost:real)

What is the result of the following query?

(SELECT Catalog.pid from Suppliers, Catalog
WHERE Suppliers.sid =Catalog.pid)
MINUS
(SELECT Catalog.pid from Suppliers, Catalog WHERE Suppliers.sname 'sachin' and Suppliers.sid =Catalog.sid)

pid of Parts supplied by all except sachin

pid of Parts supplied only by sachin

pid of Parts available in catalog supplied by sachin

pid of Parts available in catalogs supplied by all except scahin


25. Consider the following dependencies and the BOOK table in a relational database design. Determine the normal form of the given relation.

ISBN->Title

ISBN->Publisher

Publisher->Address

First Normal Form

Second Normal Form

Third Normal Form

BCNF

26. Calculate the order of leaf(pleat) and non leaf(p) nodes of a tree based on the information given below

Search key field =12 bytes
Record pointer =10 bytes
Block pointer bytes
Block size KB

Pleaf=51 P=46

Pleat=47 P=52

Pleaf=46 P=51

Pleaf=52 P=47


27. The physical location of a record determined by a formula that transforms a file key into a record location is

Hashed file

B-Tree file

Indexed file

Sequential file

28. The most simplified form of the boolean function x L (expressed in sum of minterms) is?


A+A'BCD

AB+CD

A+BCD

ABC+D

29. How many programmable fuses are required in a PLA which takes 16 inputs and gives 8 outputs? It has to use 8 OR gates and 32 AND gates.

1032

776

1284

1536

30. In a three stage counter, using RS flip flops what will be the value of 30 the counter after giving 9 pulses to its input? Assume that the value of counter before giving any pulses is 1.

1

2

9

10

31. In which of the following shading models of polygons, the d
interpolation of intensity values is done along the scan line?


Gourard shading

Phong shading

Constant shading

Flat shading

32. Which of the following number of nodes can form a full binary tree?

8

15

14

13

33. What is the matrix transformation which takes the independent vectors[1 and 5]and transforms them to and respectively?


<img src='./qimages/1646-33a.jpg'>


<img src='./qimages/1646-33b.jpg'>


<img src='./qimages/1646-33c.jpg'>


<img src='./qimages/1646-33d.jpg'>


34. In 8086, the jump condition for the instruction JNBE is?

CF or ZF

ZF and SF

CF and ZF

CF

35. How many number of times the instruction sequence below will loop before coming out of the loop? MOV AL, 00H A1: INC AL JNZ A1

1

255

256

Will not come out of the loop


36. In 8085 microprocessor, the ISR for handling trap interrupt is at which location?

3CH

34H

74H

24H


37. The voltage ranges for a logic high and a logic low in RS-232 C standard is


Low is 0.0V to 1.8V, High is 2.0V to 5.0V

Low is -15.0V to -3.0V, High is 3.0V to 15.0V

Low is 3.0V to 15.0V, High is -3.0V to -15.0V

Low is 2.0V to 5.0V, High is 0.0V to 1.8V


38. In the Ethernet, which field is actually added at the physical layer and is not part of the frame

preamble

CRC

address

location

39. Ethernet layer-2 switch is a network element type which gives

different collision domain and same broadcast domain

different collision domain and different broadcast domain

same collision domain and same broadcast domain

same collision domain and different broadcast domain

40. If the frame to be transmitted is 1101011011 and the CRC polynomial
to be used for generating checksum is x4 X then what is the transmitted frame?


11010110111011

11010110111101

11010110111110

11010110111001

41. What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?

20%

25%

40%

66%

42. IPv6 does not support which of the following addressing modes?

unicast addressing

multicast addressing

broadcast addressinq

anycast addressinq

43. What is IP class and number of sub-networks if the subnet mask is
255.224.0.0?

class 3

class 8

class 3

class 32


44. Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate?

solid bucket algorithm

spanning tree algorithm

hocken helm algorithm

leaky bucket algorithm

45. A packet filtering firewall can

deny certain users from accessing a service

block worms and viruses from entering the network

disallow some files from being accessed through FTP

block some hosts from accessing the network

46. Which of the following encryption algorithms is based on the Fiestal struture?

Advanced Encryption Standard

RSA public key cryptographic algorithm

Data Encryption Standard

RC4

47. The protocol data unit for the transport layer in the internet stack is

segment

message

datagram

frame

48. The Guass-Seidal iterative method can be used to solve which of the following sets?

Linear alQebraic equations

Linear and non-linear algebraic equations

Linear differential equations

Linear and non-linear differential eqiJations

49. What is the least value of the function 2X2 -8x in the interval

-15

7

-11




50. Consider the following set of processes, with arrival times and the required CPU-burst times given in milliseconds. <img src='./qimages/1646-50.jpg'> What is the sequence in which the processes are completed? Assume round robin scheduling with a time quantum of 2 milliseconds.

P1, P2, P3

P2, P1, P3

P3, P2, P1

P2, P3, P1


51. In case of a DVD, the speed of data transfer is mentioned in multiples of?

150 KB/s

1.38 MB/s

300 KB/s

2.40 MB/s


52. suppose we have variable logical records of lengths of 5 bytes, 10 bytes, and 25 bytes while the physical block size in disk is 15 bytes. What is the maximum and minimum fragmentation seen in bytes?

25 and 5

15and 5

15and 0

10and 5


53. A CPU scheduling algorithm determines an order for the execution of its scheduled processes. Given processes to be scheduled on one processor, how many possible different schedules are there?

n

n2



2n


54. Which of the following are the likely causes of thrashing?

Page size was very small

There are too many users connected to the system

Least recently used policy is used for page replacement

First in First out policy is used for page replacement



55. Consider a logical address space of 8 pages of 1024 words each,
mapped onto a physical memory of 32 frames. How many bits are there in the physical address and logical address respectively?

5,3

10,10

15, 13

15, 15

56. In a 64-bit machine, with 2 GB RAM, and 8 KB page size, how many 56 entries will be there in the page table if it is inverted?

2 18

2 20

2 33

2 51

57. Which of the following is not a necessary condition for deadlock?

Mutual exclusion

Reentrancy

Hold and wait

No pre-emption


58. Consider the following process and resource requirement of each process. <img src='./qimages/1646-58.jpg'> Predict the state of this system, assuming that there are a total of 5 instances of resource type 1 and 4 instances of resource type 2.

Can go to safe or unsafe state based on sequence

Safe state

Unsafe state

Deadlock state

59. A starvation free job scheduling policy guarantees that no job indefinitely waits for a service. Which of the following job scheduling policies is starvation free?

Priority queing

Shortest Job First

Youngest Job First

Round robin


60. The state of a process after it encounters an I/O instruction is

ready

blocked

idle

runninq

61. Embedded pointer provides

a secondary access path

a physical record key

an inverted index

a prime key

62. A particular parallel program computation requires 100 seconds when executed on a single CPU. If 20% of this computation is strictly sequential, then theoretically the best possible elapsed times for this program running on 2 CPUs and 4 CPUs respectively are

55 and 45 seconds

80 and 20 seconds

75 and 25 seconds

60 and 40 seconds

63. Consider the following C code. <img src='./qimages/1646-63.jpg'> What would the program print?

0 0 0

0 1 0

c)1 0 1

1 1 1




64. What is the output of the following Java program? <img src='./qimages/1646-64.jpg'>

8 2

8 5

8 3

5 3


65. Consider the list of page references in the time line as below: 96234444344258685532339627 What is the working set at the penultimate page reference if delta is







66. What is the cyclomatic complexity of a module which has seventeen edges and thirteen nodes?

4

5

6

7

67. Which of the following types of coupling has the weakest coupling?

Patholoqical couplinq

Control couplinq

Data coupling

Message coupling


68. Which of the following testing methods uses fault simulation technique?

unit testing

beta testing

stress testing

mutation testing

69. If a program P calls two subprograms P1 and P2 and P1 can fail 50% of the time and P2 can fail 40% of the time, what is the failure rate of program P


50%

60%

70%

10%

70. Which of the following strategy is employed for overcoming the priority inversion problem?

Temporarily raise the priority of lower priority level process

Have a fixed priority level scheme

Implement kernel pre-emption scheme

Allow lower priority process to complete its job


71. Let denote the probability of the occurrence of event E. If 0.5 and then the values of and respectively are

0.5,0.25

0.25,0.5

0.5,1

1,0.5

72. How many diagonals can be drawn by joining the angular points of an octagon?

14

20

21

28

73. What are the final states of the DFA generated from the following NFA? <img src='./qimages/1646-73.jpg'>

q0, q1, q2



q0, q2]

q2


74. The number of elements in the power set of the set is

7

8

3

4

75. What is the right way to declare a copy constructor of a class if the name of the class is MyClass?

MyClass (constant MyClass

MyClass (constant MyClass &arg)

MyClass (MyClass arg)

MyClass (MyClass


76. The number of edges in a vertex complete graph is?



n2





77. The binary equivalent of the decimal number 42.75 is

101010.110

100110.101

101010.101

100110.110

78. Which of the following is not provided as a service in cloud computing?

Infrastructure as a service

Architecture as a service

Software as a service

Platform as a service

79. The built-in base class in Java, which is used to handle all exceptions is

Raise

Exception

Error

Throwable

80. In graphics, the number of vanishing points depends on

the number of axes cut by the projection plane

the centre of projection

the number of axes which are parallel to the projection plane

the perspective projections of any set of parallel lines that are not parallel to the projection plane


Other Question Papers

Subjects

  • computer science
  • electronics and communication engineering
  • mechanical engineering