Professional Documents
Culture Documents
2012 PGCET
(CO) Technology & Information Computer Engineering
(W
6L 9' t l
i' l '1",
2",
ba 9 L tb'
(A)
(B)
".+{
I{ c
(D)
)^a
L
JD rLrlLLL
,6
111-1000
eightinputs? for selecting are required lines dataselect Q:3Howmany (c) ( B ) 2 (A) L
&,, v:
4t+
.-+D)
the two best methodsof logiccircuit represents e:4 Whichof the followingstatementsaccurately simplification? mapping -4(; aooleanalgebraand Karnaugh analysis waveform circuit and mapping (B) Karnaugh and waveformanalysis (C) Actualcircuittrial and error evaluation (D) Boolean algebraand actualcircuittrial and error evaluation into K-mapgroups? Q:5 Whichof the followingcombinationscannotbe combined (A) Corners in the same row (B) Corners in the samecolumn Oiagonalcorners {9) combinations (D) Overlapping Q:6 Whichof the followingstatementsis false? (A) Arrays are denselistsand staticdata structure spacein memory (B) Dataelementsin linked list need not be storedin adjacent store the next data elementof a list ..{) Pointers listsare collectionof the nodesthat containinformationpart and next pointer (D) Linked algorithmcannot be appliedto search Q: 7 Binary (B) Sortedbinarytrees (C)Sortedlineararray p) Pointerarray (A)Sortedlinkedlist Q: 8 TheWorstcaseoccursin linear searchalgorithmwhen, (A) ltem is somewherein the middle of the array J^Bfttet is not in the arraYat all {C}ltem is the last element in the array (D)ltem is the last element in the arrayor is not there at all of a linearsearchalgorithmis, Q: 9 Thecomplexity
-N otnl
(B) o(logn)
( D ) o ( nl o gn )
( D )l o g ( n ) + 1
,f')'
Page1 of 10
co
2012 PGCET
(CO) Technology & lnformation Engineering Computer whatwill bethe pre ordertraversal? tree is DEBFCA, of a binary e: 11 tf the postordertraversal (D)ABDCEF (B)ADBFEC (A)ABFCDE -ffissEgF
,6
algorithm? is a divide& Conquer of thefollowing I { h e: 12Which sort y, (B) DepthFirstsearch (c) Bubble (A)Binary ,Jp,Quicksort search I \ graph? of bi-partite q, BWhichof thefollowing is an example 16lld \x/^ 9 none of the above B (C) & A both (A)triangte (B)square /&f Yt,,e: of alphabets language {a,b}? is not a regular 14whichof thefollowing 'a' and'b' of number .W Y equal (A)Language that contains 'a' andendswith 'b' / -'>, 'r with I. . starts (B) that Language Ls"ssebL te, .t t) pl with 'b' andendswith'a' starts (C)Languagethat 6b of the above '{-o)none Vgr\( l\ isTRUE? tr\ Q: 15whichof thefollowing by arealsoaccepted finiteautomata by nondeterministic accepted (A)Allthe languages {a) -Y finiteautomata. deterministic r are alsoaccepted push downautomata by nondeterministic accepted (B)Allthe languages it-V, t pushdownautomata' bydeterministic o ^u ( c ) b o t h A & B aretrue ol{t (D)bothA&Barefalse. v h (n
i \ l '( / ) n Yr'
1/?
which of the followingcan be modeled usingFinite q,1G tn contextof C language syntaxcllecking, Automata? propertermination of an instruction' (A) Detecting of parentheses' balance ',ffietecting of a variable' (C) Detecting initialization (D)Noneofthe above. is usedfor protocol (ARP) resolution Q: 17 Theaddress from the DNS (A) Finding the lP address of the default gateway lP address (B) Finding the to a MAC address that corresponds (c) Finding the lP address to an lP address the MACaddressthat corresponds .1BJfinOing database: to a students the followingrelation schemapertaining e: 1g Consider Student(Ig!!no, name, address) Enroll (rollno,courseno,coursename) The number of tuples in the Studentand wherethe primarykeysare shown underlined. What are the maximum and minimum number of tuples Enrolltablesare 120and 8 respectively.
S4
(D)960,120
generates 32 a directmappedcacheof size32 KBwith blocksize32 bytes.The CPU e: 19 Consider and the number of tag bits are The numberof bits neededfor cacheindexing bit addresses. respectively, (D) 5, 17 (B)to,22 l.z\ts,tt (A)10,17 Q: 20 Thegoalof structuredprogrammingis to Page2 of 10
co
PGCET 2OL2 ComputerEngineering & InformationTechnology (CO) (A) havewell indentedprograms (B) be ableto inferthe flow of control from the compiledcode (C)be ableto inferthe flow of control from the programtext (D) avoidthe useof GOTO statements
Q: 21 The tightestlower boundon the number of comparisons, in the worst case, for comparisonbasedsortingis of the orderof (A)n (B)n' (C)n log n nt6l n log2n
graph with 20 vertices Q: 22 LetG be a simple and L00edges. Thesize of the minimum vertexcover of G is 8. Then, the size of the maximum independent set of G is (A) 12 (B)8 (C)Less than 8 -{D)Morethan 12 Q: 23 A andB aretheonlytwo stations on an Ethernet. queue Each hasa steady of frames to send. BothA and B attempt to transmit a frame,collide, andA wins thefirstbackoff race. At the endof this successful transmission byA, bothA and B attemptto transmit andcollide. Theprobabilitythat A winsthe second backoff raceis, (B )0 .62s (c)0.7s (D)1.0 JElo.s
of 8 distinctintegerssorted in ascending Q: 24 Let A be a sequence order.How many distinct pairs of sequences, B and C are there suchthat (i) each is sorted in ascending order,(ii) B has 5 and C has 3 elements,and (iii)the resultof ryergidgB and C givesA?
(A) 2
zo ,-t6l
(c)s6
(D)2s6
connectedby bridges,packets Q: 25 ln a networkof LANs are sentfrom one LANto another through intermediate bridges. Since more than one path may exist between packetsmay haveto two LANs, be routed throughmultiplebridges. Why is the spanningtree algorithm usedfor bridge-routing? gXffor shortestpath routing between LANs (B) Foravoiding loopsin the routingpaths (C)Forfault tolerance (D) For minimizing collisions is implemented Q: 26 A Priority-Queue as a Max-Heap. Initially, it has5 elements. The level-order l't ' traversalof the heapis givenbelow: IO,8,5,3,2Two new elements 1 and 7 are insertedin the heap - ' v in that order. The level-order traversal of the heap after the insertion of the elementsis, / \ (A\ LO,8,7,5,3,2,1 (Bl 10,8,7,2,3,L,5 ,t!4 70,9,7,1,,2,3,5 (D) 10,9,7,3,2,L,5 l \ 1 t 1 / '* ? Q: 27 An organizatton hasa classB network and wishes to form subnetsfor 64 departments. The subnetmaskwouldbe
(A) 2ss.2ss.0.0
tr..(.
the roundtrip propagation Q: 28 Suppose delayfor a 10 Mbps Ethernet having 48-bitjamming signal
lel +a+
( D)s12
3-SAT Q: 29 The problems and 2-SAT are (A) both in P J9 both NP-complete
{i:':-'j?
co
t ' ;S, '" . r
2012 PGCET (CO) Computer Engineering & lnformationTechnology (C) NP-complete and in P respectively (D) undecidable and NP-complete respectively R = (A, B, C, D, E, H) on which the followingfunctional a relationscheme Q: 30 Consider -> -> keysof R? hold : (A B, BC D, E -> C, D -> A). What are the candidate dependencies
(A)AE, BE
(D)AEH , E HD B , EH
9 by 1001. by0000,1 by0001,..., outputs a digitin theformof 4 bits.0 is represented Q: 31 A circuit 1 if the digit3 isto bedesigned whichtakesthese4 bitsasinputandoutputs A combinational circuit gatesmaybe used, whatisthe minimum numberof lf onlyAND, ORandNOT 5, andOotherwise. gatesrequired? (D)s (c)4 (A)2
Jtl3
alonga single are routed from source to destination network,packets Q: 32 In a packetswitching path havingtwo intermediate sizeis 24 bytesand eachpacketcontainsa nodes.lf the message headerof 3 bytes,then the optimumpacketsizeis
(A)4
_lwo
(cl7
(D)e
The level-order is implemented as a Max-Heap.Initially,it has5 elements. Q: 33 A Priority-Queue traversalof the heapis givenbelow:IO,8,5,3,2Two new elements! andT are insertedin the heap of the elementsis traversal of the heap after the insertion in that order. The level-order (C) LO,8,7,1,2,3,5 (D) 10,8,7,3 ( Bl LA,8,7 ( Al to,g,7,5,3,2,1, ,2,L,5 ,2,3,7,5 a single sequential user an operating system.apanteof loadingand executing Q: 34 Consider (FCFS). processat a time. The diskheadscheduling lf FCFS algorithm usedis FirstComeFirstServed Time First(SSTF), claimed by the vendorto give50%better benchmark is replacedby Shortest Seek in the l/O performance of userprograms? improvement results,what is the expected
(A)so%
(A)s
J9t4o%
(B)14
(clzs%
,Kl zq
(Dlo%
(Dl42
as Arraypassed as an argumentto a function is interpreted Q: 36 In C language, (A) Address of the array (BlValuesof the first elements of the array (C)Address of thefirstelement,ofthe array Number of elementof the array JP) can be determinedby Q: 37 The sizeof a structure vatriable name sizeof &xf (B) sizeof (struqt tag) {IBoth A a1d B (D) Noneof theseoptions Q:38objectorientedTechno|ogy.suseof-faci|itatesthereuseofthecodeand as a smallchangein feature providessystemswith stability, architectureand its in the system: changes requirementsdoes not requiremassive (A) Encapsulation; inheritance (B) lnheritance; polymorphism Page 4of10 CO
PGCET 201.2 (CO) Computer Engineering Technology & lnformation (C)Inheritance; encapsulation abstraction {D} Polymorphism; 39 A relation is in this form if it is in BCNF dependencies andhasno multivalued Q: (A)second normalform normalform JBltfrirO (C)fourth normalform (D)domain/key,normal form in oneor moreattributes beingusedasa foreign keymustexist in another Q: 40 Whenthe values setof one or moreattributes in another table, we havecreated a(n): (B) nsitive Tra dependency Insertion anomaly -JiA) (C)Referential (D)NormalForm Integrity constraint the following complexity functions in increasing orderof growth rate? Q: 41 Arrange i. 2" ii. nt iii. n.log(n) _ iv.n .lXl iv, iii, ii, i
(B)iii,iv, i, ii (C)iii,iv, ii, i
(Dliii,i, ii, iv
left column)andthe hardware systemabstraction(in Q:42 Listedbelow are someoperating components(in rightcolumn). Matchthem. ------\. (1) Interrupt 3 (A)Thread : ,, 'L (B) Virtual address space Memory ;-...'-I2) (c) )13)cPU File system ,=_.a'_ -tl (D)Signal (a) Disk \ (A) ,J9 (A)-2,(B)-4,(C)-3,(D)-L (A)-3,(q)-2,(C)-4,(D)-1 (B) (A)-L,( B)-2,(C)-3,(D)-4 (D) (A)-4,(B)-L,(C)-2,(D)-3
(. \\ '.n )r\ II
t
I
algorithm willselectthe pagethat, Q:43 The optimal pagereplacement has not been usedfor the longesttime in the past llnK'1 (B) will not be usedfor the longest time in the future (C) hasbeenusedleastnumberof times (D) has been usedmost numberof times Q: 44 Which of the followingis a tautology? { A )a v b ) b n c ( B ) a n b ) b v c
(c)avb)(b)c)
-(D)a)b)(b)c)
requires the most memory accesses? Q: 45 Which of the followingoperations (A)register (B) to register adds branch (C)condition (D)shiftregisterleft code test Q: 46 At which OSIlayer routersoperate? (A)Datalink (ClApplication (D) Presentation "lSiletwork the lP addressof a system? Q: 47 Which protocol is usedto resolve (A)ARP (B)rcMP (C)IGMP .jDf ltone of a, b, c
between a dense index indexisthat, anda sparse Q: 48 Thedifference index keys andpointers for a subset whereas a sparse index contains of the records 4A) a dense keys contains andpointers for every record
Page5 of 10
co
PGCET 2012 ComputerEngineering (CO) & lnformationTechnology (B) a dense index can only be a primaryindexwhereasa sparseindexcanonly be a secondary index (C) a dense index containskeysand pointersfor each record whereasa sparse indexcontains keysand pointersfor a subset ofthe records (D) No difference objects can be usedonly between processes Q: 49 Which of the following IPC that havea parent process in common? (A) pipe (B) FIFO (C)message queue (Dlnone of a,b,c Q: 50 This is dividingthe amountof work that a computer has to do betweentwo or more computersso that more work getsdone in the sameamount of time and end users get served faster. (A)clustering (B)routing (D) peering Jgl loadbalancing Q: 51 UDPis acronymof: (A) Unified DeliveryProtocol -tEl User DatagramProtocal (B) UniversalDatagramprotocol (D) Urgent DatagramProtocol
by one passassembler? Q: 52 Which of the followingis not supported (A) Conditional (B)Jumping Instructions to Label (C) Forward referencing of sub routing olDYtTivocation techniquesavoidsinternalfragmentation? Q: 53 Which of the followingmemoryattocation partition jD'Fixed (B) memory allocation Variablepartition memoryallocation , "(C) Simplepagedallocation (D) Demandpaging Q: 54 SinglelnstructionMultiple Data(SIMD)Architecture has -{4) MultipleALU,OneCU (B)MultipleALU,MultipleCU (C)One ALU,MultipleCU (D)OneALU,One CU process of the instructionis performedby ALU? Q.55which of the followingexecution (A) FetchPhase (B) DecodePhase (C )Execute Phase M AlloftheAbove mode is usedin followinginstruction Q.56which addressing MOVE[7010H], R1 (A)DirectAddressing egister Addressing ".jGfi (B) Indirect Addressing (D) Noneofthe above
in ...... Q: 57 A program under executionremains (B) Hard disk -(Al RAM (C)Floppydisk (D) Noneof the above in followinginstruction? Q: 58 From which addressdata is accessed M O V E[ B X ] [ R i ]R 1 ; , , Value of BX ii 3000 and valueof Ri is 2044;
Page6 of 10
co
PGCET 2012 (eO) Computer Engineering Technology & lnformation (A)3000 (c)s0A4
JEr
(D)
2OA4
10A4
+gf-(D)
bufferRegister.... Q.60Memory (A)Holds whichisto be executed the address of instruction fetched from memory $Uodsthe dataor instruction (C)Holds picked the instruction upfrommemory (D)is a special purpose register used byCPU for temporary storage. processing of the following doesnot increase speed? Q:61Which (A)Bus (B) Primary memory size speed (C)Clock memorysize Speed -{Df Secondary
Q: 62 Statusof logicaloperationsare storedin
-/Xfrlag
(C)Memory Buffer MMX is basedon Q:63 Pentium (A) SISD architecture (C) MISDarchitecture
the program in mainmemory. canbe relocated Q:64ln (B) Addressing lndirect -{AfDirect Addressing (C)Base-lndexed (D)All of the above Addressing
with main program? Q: 65 Which systemsoftware relatessubroutines (B)Parser (C)Loader ,ffi Assembler during Q: 66 Datatype mismatchrelatederrorsare identified
(D)Linker
.,(<JsemanticAnalysis (D)Codegeneration
Q: 68 Which of the following is networklayerdevice? (A) Hub (B) repeater JGI'Router to destinationconnection information is maintainedat Q: 69 Source Layer Physical Layer -{A}Network JB)
(D) Bridge
Page 7 of 1O
co
PGCET 2012 ComputerEngineering & InformationTechnology (CO) Q: 70 Which OSIlayer performsencryption and decryptionof message? (B)TransportLayer -{A}-PresentationLayer (C)NetworkLayer (D)ApplicationLayer Q: 71 Which of the following is an example of connection lessservice? (A)Telephone -EfPostal Service (C) Mobile services (D) Both (a) and (c) Q: 72 SMTPStandsfor
(A) LDAP
(A) Class A
--FrruAP
--{&fClass B
(c)PoP
address. (C)Class C
(D)sMrP ( D) Class D
(D)824
)kr2s4
(A)2ss.2ss.L28.O
(B ) s12
(c) 128
lpyfSS.ZSS.7s2.O
(C) 2ss.2ss.4.0
(D)2ss.2ss.2ss.2ss
can be usedto shareinternetconnection Q: 78 Which-devicg among different hostsof a network? (B) server Firewall (D) Noneof the above 1*Ybrory @Routgr Q: 79 Which of the following is not part of a staticweb site? (A) HTMLpages (B)lmages
(C)Video
_IDISP
' 8 1 . I nu s u a l n o t a t i o n As - . . . . - . . - -
Q: 80 Which of the following allowschange in behavior of member function of a class without changing its declaration (A) Method overloading (D)none .gYfrethodoverriding C) Createnew class
82.
( d )E 4 - L
(a)[0,1]
(b)[1.s, 2]
, ol JEYI+
(d) t3, sl
84'
co
PGCET 2012 Computer Engineering & Information (CO) Technology approximate root xo is the convergence criterion of ..........
85. ByGausselimination method thesolutionof x+ y=2and2x+ 3y -- 5 is...... (a) (2,0) (b) (0,2) J g - - ( 1 , 1) ( d ) ( 3 , - 1)
86.
[r 3 4 5l
2 6 7 [is..................
8e.
l-2
"fis................ -
5l
( a lA ' - 4 A + 1 = 0 ( b ) A z+ 4 A + t = \ J e f A , - 4 A . - 1 = 0 t d ) A 2+ 4 A - 1 = 0 +
90. A squarematrix A is calledorthogonalif ............. (al42=A 9L. lblA:'=A-t (clAA-t=I (dlA=A-l
Theorderof e" dx + evdy = 0 is ............... (a) 0 (b) 1 gz (d) does not exist
92.
diZ, dx'
9 3 ' / , ' 0) e q u a ts
Page9 of 10
co
,6:
L{sin2tsin3t} =
(b);
tc)d(r)
(d) noneofthese
(') l2s md
(b) G+lrcd
l
(b) Invariant
a-
(c)Critical
(d)noneofthese
I Q+D"
-,
dz=................
8qti 3
lal
8ni
e'?
(bt
8ri 3
rfrftnt
(d)
97.
0x
(al x' ' l f z = sl n
' ,FYYx''
u-1
(rl y x'*t
(d) 0
(a)sinz 99.
J44
(d) tan z
(a)Solenoidal
-ffiot.tionrl
(c)lrrotational
(d) Scalarfield
)zYrr
(b) e
(c) e.s
(d)10.s
t \ *t>
,ro *tl'
P4e-x&of 10
co