Search Your Paper

Sunday, January 11, 2015




punjabtechnicaluniversity.blogspot.in


Dec 2013 Paper 2

01.         
When data and acknowledgement are sent in the same frame, this is called as
(A)          Piggy packing
(B)          Piggy backing
(C)          Back packing
(D)          Good packing
 Answer: B


02.         
Encryption and Decryption is the responsibility of ___ Layer.
(A)          Physical
(B)          Network
(C)          Application
(D)          Datalink
 Answer: C


03.         
An analog signal carries 4 bits in each signal unit.
If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ___ and ___.
(A)          4000 bauds \ sec & 1000 bps
(B)          2000 bauds \ sec & 1000 bps
(C)          1000 bauds \ sec & 500 bps
(D)          1000 bauds \ sec & 4000 bps
 Answer: D



04.         
The VLF and LF bauds use ___ propagation for communication.
(A)          Ground
(B)          Sky
(C)          Line of sight
(D)          Space
 Answer: A



05.         
Using the RSA public key crypto system,
if p = 13, q = 31 and d = 7, then the value of e is
(A)          101
(B)          103
(C)          105
(D)          107
 Answer: B



06.         
FAN IN of a component A is defined as
(A)          Number of components that can call or pass control to component A.
(B)          Number of components that are called by component A.
(C)          Number of components related to component A.
(D)          Number of components dependent on component A.
 Answer: A



07.         
The relationship of data elements in a module is called
(A)          Coupling
(B)          Modularity
(C)          Cohesion
(D)          Granularity
 Answer: C



08.         
Software Configuration Management is the discipline for systematically controlling
(A)          the changes due to the evolution of work products as the project proceeds.
(B)          the changes due to defects (bugs) being found and then fixed.
(C)          the changes due to requirement changes
(D)          all of the above
 Answer: D



09.         
Which one of the following is not a step of requirement engineering ?
(A)          Requirement elicitation
(B)          Requirement analysis
(C)          Requirement design
(D)          Requirement documentation
 Answer: C



10.         
Testing of software with actual data and in actual environment is called
(A)          Alpha testing
(B)          Beta testing
(C)          Regression testing
(D)          None of the above
 Answer: B



11.         
The student marks should not be greater than 100. This is
(A)          Integrity constraint
(B)          Referential constraint
(C)          Over-defined constraint
(D)          Feasible constraint
 Answer: A



12.         
GO BOTTOM and SKIP-3
commands are given one after another in a database file of 30 records. It shifts the control to
(A)          28th record
(B)          27th record
(C)          3rd record
(D)          4th record
 Answer: B



13.         
An ER Model includes
I.             An ER diagram portraying entity types.
II.            Attributes for each entity type
III.           Relationships among entity types.
V.            Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A)          I, II, III & IV
(B)          I & IV
(C)          I, II & IV
(D)          I & III
 Answer: A



14.         
Based on the cardinality ratio and participation ___ associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design.
(A)          Entity
(B)          Constraints
(C)          Rules
(D)          Keys
 Answer: B



15.         
Data Integrity control uses ___
(A)          Upper and lower limits on numeric data.
(B)          Passwords to prohibit unauthorised access to files.
(C)          Data dictionary to keep the data
(D)          Data dictionary to find last access of data
 Answer: B



16.         
What does the following declaration mean ?
int (*ptr) [10];
(A)          ptr is an array of pointers of 10 integers.
(B)          ptr is a pointer to an array of 10 integers.
(C)          ptr is an array of 10 integers.
(D)          none of the above.
 Answer: B



17.         
Which of the following compilation error in C ?
(A)          int n = 32 ;
(B)          char ch = 65 ;
(C)          float f = (float) 3.2 ;
(D)          none of the above
 Answer: D



18.         
Which of the following operators can not be overloaded in C+ + ?
(A)         
(B)          +=
(C)          ==
(D)          ::
 Answer: D



19.         
___ allows to create classes which are derived from other classes, so that they automatically include some of its “parent’s” members, plus its own members.
(A)          Overloading
(B)          Inheritance
(C)          Polymorphism
(D)          Encapsulation
 Answer: B



20.         
The correct way to round off a floating number x to an integer value is
(A)          y = (int) (x + 0.5)
(B)          y = int (x + 0.5)
(C)          y = (int) x + 0.5
(D)          y = (int) ((int)x + 0.5)
 Answer: A



21.         
What is the value of the postfix expression ?
a b c d + – (where a = 8, b = 4, c = 2 and d = 5)
(A)          – 3/8
(B)          - 8/3
(C)          24
(D)          -24
 Answer: D



22.         
If the queue is implemented with a linked list, keeping track of a front pointer and a rear pointer, which of these pointers will change during an insertion into a non-empty queue ?
(A)          Neither of the pointers change
(B)          Only front pointer changes
(C)          Only rear pointer changes
(D)          Both of the pointers changes
 Answer: C



23.         
___ is often used to prove the correctness of a recursive function.
(A)          Diagonalization
(B)          Communitivity
(C)          Mathematical Induction
(D)          Matrix Multiplication
 Answer: C



24.         
For any B-tree of minimum degree t ≥ 2, every node other than the root must have atleast ___ keys and every node can have at most ___ keys.
(A)          t – 1, 2t + 1
(B)          t + 1, 2t + 1
(C)          t – 1, 2t – 1
(D)          t + 1, 2t – 1
 Answer: C



25.         
Given two sorted list of size ‘m’ and ‘n’ respectively. The number of comparison needed in the worst case by the merge sort algorithm will be
(A)          m × n
(B)          max (m, n)
(C)          min (m, n)
(D)          m + n – 1
 Answer: D



26.         
Given the following statements :
S1 : SLR uses follow information to guide reductions. In case of LR and LALR parsers, the lookaheads are associated with the items and they make use of the left context available to the parser.
S2 : LR grammar is a larger subclass of context free grammar as compared to that SLR and LALR grammars.
Which of the following is true ?
(A)          S1 is not correct and S2 is not correct.
(B)          S1 is not correct and S2 is correct.
(C)          S1 is correct and S2 is not correct.
(D)          S1 is correct and S2 is correct.
 Answer: D




27.         
The context free grammar for the language
L = {an bm | n ≤ m + 3, n ≥ 0, m ≥ 0} is
(A)          S → aaa A;
A → aAb | B,
B → Bb | λ

(B)          S → aaaA|λ,
A → aAb | B,
B → Bb | λ

(C)          S → aaaA | aa A | λ,
A → aAb | B,
B → Bb| λ

(D)          S → aaaA | aa A | aA | λ,
A → aAb | B,
B → Bb | λ
 Answer: D



28.         
Given the following statements :
S1 : If L is a regular language then the language
{uv | u L, v LR} is also regular.
S2 : L = {wwR} is regular language. Which of the following is true ?
(A)          S1 is not correct and S2 is not correct.
(B)          S1 is not correct and S2 is correct.
(C)          S1 is correct and S2 is not correct.
(D)          S1 is correct and S2 is correct.
 Answer: C



29.         
The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called ___.
(A)          Symbol resolution
(B)          Parsing
(C)          Assembly
(D)          Relocation
 Answer: D



30.         
Which of the following derivations does a top-down parser use while parsing an input string ?
The input is scanned from left to right.
(A)          Leftmost derivation
(B)          Leftmost derivation traced out in reverse
(C)          Rightmost derivation traced out in reverse
(D)          Rightmost derivation
 Answer: A



31.         
The dual of a Boolean expression is obtained by interchanging
(A)          Boolean sums and Boolean products
(B)          Boolean sums and Boolean products or
interchanging 0’s and 1’s
(C)          Boolean sums and Boolean products and
interchanging 0’s & 1’s
(D)          Interchanging 0’s and 1’s
 Answer: C



32.         
Given that (292)10 = (1204)x in some number system x.
The base x of that number system is
(A)          2
(B)          8
(C)          10
(D)          None of the above
 Answer: D



33.         
The sum of products expansion for the function
F(x, y, z) = (x + y)z̄ is given as
(A)          x̄ȳz + xyz̄ + x̄yz̄
(B)          xyz + xyz̄ + xȳz̄
(C)          xȳz̄ + x̄ȳz̄ + xyz̄
(D)          xyz̄ + xȳz̄ + x̄yz̄
 Answer: D



34.         
Let P(m, n) be the statement “m divides n” where the universe of discourse for both the variables is the set of positive integers. Determine the truth values of each of the following propositions :
I.             m n P(m, n),
II.            m n P(m, n)
(A)          Both I and II are true
(B)          Both I and II are false
(C)          I – false & II – true
(D)          I – true & II – false
 Answer: C



35.         
Big – O estimate for
f(x) = (x + 1) log(x2 + 1) + 3x2 is given as
(A)          O(x log x)
(B)          O(x2 )
(C)          O(x3 )
(D)          O(x2 log x)
 Answer: B



36.         
How many edges are there in a forest of t-trees containing a total of n vertices ?
(A)          n + t
(B)          n–t
(C)          n*t
(D)          nt
 Answer: B



37.         
Let f and g be the functions from the set of integers to the set integers defined by
f(x) = 2x + 3 and g(x) = 3x + 2
Then the composition of f and g and g and f is given as
(A)          6x + 7, 6x + 11
(B)          6x + 11, 6x + 7
(C)          5x + 5, 5x + 5
(D)          None of the above
 Answer: A



38.         
If n and r are non-negative integers and n ≥ r, then p(n + 1, r) equals to
(A)          p(n, r) (n + 1)/(n + 1 – r)
(B)          p(n, r) (n + 1)/(n - 1 + r)
(C)          p(n, r) (n - 1)/(n + 1 – r)
(D)          p(n, r) (n + 1)/(n + 1 + r)
 Answer: A



39.         
A graph is non-planar if and only if it contains a subgraph homomorphic to
(A)          K3, 2 or K5
(B)          K3, 3 and K6
(C)          K3, 3 or K5
(D)          K2, 3 and K5
 Answer: C



40.         
A device that accepts the value of a Boolean variable as input and produces its complement is called an inverter.
I.             A circuit that adds two bits, producing a sum bit and a carry bit is called half adder.
II.            A circuit that adds two bits, producing a sum bit and a carry bit is called full adder.
III.           A circuit that adds two bits and a carry bit producing a sum bit and a carry bit is called full adder.
V.            A device that accepts the value of a Boolean variable as input and produces its complement is called an inverter.
(A)          I & II
(B)          II & III
(C)          I, II, III
(D)          I, III & IV
 Answer: D



41.         
Active X controls are Pentium binary programs that can be embedded in
(A)          Word pages
(B)          URL pages
(C)          Script pages
(D)          Web pages
 Answer: D



42.         
Match the following :
List – I   List – II
a.            Wireless Application Environment            i.              HTTP
b.            Wireless Transaction Protocol    ii.             IP
c.             Wireless Datagram Protocol        iii.            Scripts
d.            Wireless               iv.           UDP
                a              b             c              d
(A)          iii             iv             i               iii
(B)          iv             iii             ii              i
(C)          iv             iii             i               ii
(D)          iii             i               iv             ii
 Answer: D



43.         
Which of the following is widely used inside the telephone system for long-haul data traffic ?
(A)          ISDN
(B)          ATM
(C)          Frame Relay
(D)          ISTN
 Answer: B



44.         
The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation :
(A)          ISO
(B)          ANSI
(C)          ITU-T
(D)          IEEE
 Answer: B



45.         
Electronic Data Interchange Software consists of the following four layers :
(A)          Business application, Internal format conversion, Network translator, EDI envelope
(B)          Business application, Internal format conversion, EDI translator, EDI envelope
(C)          Application layer, Transport layer, EDI translator, EDI envelope
(D)          Application layer, Transport layer, IP layer, EDI envelope
 Answer: B



46.         
Consider a preemptive priority based scheduling algorithm based on dynamically changing priority. Larger priority number implies higher priority.
When the process is waiting for CPU in the ready queue (but not yet started execution), its priority changes at a rate a = 2. When it starts running, its priority changes at a rate b = 1.
All the processes are assigned priority value 0 when they enter ready queue. Assume that the following processes want to execute :
Process Id           Arrival Time        Service Time
P1           0              4
P2           1              1
P3           2              2
P4           3              1
The time quantum q = 1. When two processes want to join ready queue simultaneously, the process which has not executed recently is given priority.
The finish time of processes P1, P2, P3 and P4 will respectively be
(A)          4, 5, 7 and 8
(B)          8, 2, 7 and 5
(C)          2, 5, 7 and 8
(D)          8, 2, 5 and 7
 Answer: B



47.         
The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is
(A)          12 bits
(B)          15 bits
(C)          16 bits
(D)          20 bits
 Answer: C



48.         
Consider a disk queue with request for input/output to block on cylinders
98, 183, 37, 122, 14, 124, 65, 67
in that order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The total number of head movements using Shortest Seek Time First (SSTF) and SCAN algorithms are respectively
(A)          236 and 252 cylinders
(B)          640 and 236 cylinders
(C)          235 and 640 cylinders
(D)          235 and 252 cylinders
 Answer: *



49.         
How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ?
(A)          332.8 KB
(B)          83.6 KB
(C)          266.2 KB
(D)          256.6 KB
 Answer: A



50.         
Linux operating system uses
(A)          Affinity Scheduling
(B)          Fair Preemptive Scheduling
(C)          Hand Shaking
(D)          Highest Penalty Ratio Next

 Answer: B

0 comments:

Post a Comment

North India Campus

Popular

Archive

North India Campus. Powered by Blogger.

Welcome to North India Campus

Search Question Paper

Labels

1st & 2nd Semester BE 1st Semester B.Com 1st Semester BBA 1st Semester BCA (D) 1st Semester Bsc. IT (D) 1st Semester Bsc. IT 1 1ST Semester M.SC IT(D) 1st Semester M.Tech 1ST Semester MBA 1st Semester MCA 1st Semester MCA (D) 2nd Sem B.Com 2nd Sem BB 2nd Sem BBA 2nd Sem BCA 2nd Sem BCA (D) 2nd Sem BSC IT(D) 2nd Sem BSC(IT) 2nd Semester MBA A Foundation Course in Human Values and Professional Ethics Accounting and Financial Management Accounting and Financial Managementm ACCOUNTING FOR MANAGEMENT Adolescence and Family Education B.Ed (2012) Adolescence And Family Education B.Ed (Dec 2013) Adolescence And Family Education B.Ed (Dec 2014) ADVANCE SOFTWARE ENGINEERING Advanced Accounting 2 ADVANCED COMMUNICATION SYSTEMS ADVANCED MATHEMATICS FOR ENGINEERS Aligarh Muslim University Applied Physics 1 B.Ed (Dec 2008) B.Ed (Dec 2009) B.Ed (Dec 2011) B.Ed (Dec 2012) B.Ed (Dec 2013) B.Ed (Dec 2014) B.Ed (June 2008) B.Ed (June 2009) B.Ed (June 2015) BA 1 Syllabus Bachelor in Science Fashion and Technology Basic Accounting Basic Chemistry Basic Electrical Engineering Basic Electronics Basic Mathematics BSC 1 Basoc Accounting BBA 1 BBA 2 BCA Question Papers BCA Syllabus 1 Bridge Course in Mathematics Bsc.IT Business Communication-1 Business Communication-2 Business Communication-I 2 Business Environment 2 Business Laws 1 Business Mathematics Business Organisation and Management Business Statistics 2 C C Programming C Programming Bsc IT 1 C Programming Lecture Videos CADM 1st Semester Communication 2 Communication and Soft Skills Communication Skills Communication Skills 1 Communicative English Computer and Education B.Ed (Dec 2011) Computer and Education B.Ed (Dec 2012) Computer Applications Computer Fundamental Computer Graphics Video Lecture Computer in Education B.Ed (Dec 2008) Computer in Education B.Ed (Dec 2009) Computer In Education B.Ed (Dec 2013) Computer in Education B.Ed (Dec 2014) Computer Mathematical Foundation MCA D Computer Networks 1st Semester Computer Operating System Computer Organization and Assembly Language Computer System Architecture 2 Corporate Accounting Curriculum and Instruction B.Ed (Dec 2009) Curriculum and Instruction B.Ed (Dec 2011) Curriculum and Instruction B.Ed (Dec 2012) Curriculum and Instruction B.Ed (Dec 2013) Curriculum and Instruction B.Ed (Dec 2014) Curriculuman and Instruction B.Ed (Dec 2008) DATA COMMUNICATION NETWORK Data Structure 2 Data Structures 2 data structures 2 BCA D Data Structures Through C 2 Database Management with Microsoft Access Bsc IT 1 Delhi University News Desktop Publishing Tools 2 Digital Circuits and Logic Design 2 Digital Circuits and Logic Design 2 BCA D Digital Electronics 2 Digital Electronics Fundamentals 2 Distance Education B.Ed (Dec 2008) Distance Education B.Ed (Dec 2009) Distance Education B.Ed (Dec 2011) Distance Education B.Ed (Dec 2012) Distance Education B.Ed (Dec 2013) Distance Education B.Ed (Dec 2014) Dot Net Interview Questions & Answers. Education and Evaluation B.Ed (Dec 2009) Education and Society B.Ed (Dec 2008) Education and Society B.Ed (Dec 2009) Education and Society B.Ed (Dec 2011) Education and Society B.Ed (Dec 2012) Education and Society B.Ed (Dec 2013) Education and Society B.Ed (Dec 2014) Education Technology B.Ed (Dec 2009) Educational Evaluation B.Ed (Dec 2008) Educational Evaluation B.Ed (Dec 2011) Educational Evaluation B.Ed (Dec 2012) Educational Evaluation B.Ed (Dec 2013) Educational Evaluation B.Ed (Dec 2014) Educational Technology B.Ed (Dec 2008) Educational Technology B.Ed (Dec 2011) Educational Technology B.Ed (Dec 2012) Educational Technology B.Ed (Dec 2013) ELECTRONICS SYSTEM DESIGN Engineering Drawing and Graphics Engineering Mathematics Engineering Question Paper set 1 Engineering Syllabus English and Communication Skills English and Communication Skills 2 Environmental Science 2 Finaicial Accounting Financial Accounting Financial Management 2 Sem Fundamentals of Information Technology Bsc 1 Guidance and Counseling B.Ed (Dec 2008) Guidance and counseling B.Ed (Dec 2009) Guidance and Counseling B.Ed (Dec 2011) Guidance and Counseling B.Ed (Dec 2012) Guidance and Counseling B.Ed (Dec 2013) HIV and Aids Education B.Ed (Dec 2011) HIV and Aids Education B.Ed (Dec 2012) HIV and Aids Education B.Ed (Dec 2013) Hotel Management and Air Lines Syllabus HP University News Human Resource Management Human Resource Management 2 Information Management Information Technology for Management Intoduction to microprocessor 2 BCA D Introduction of Computers BBA1 Introduction to Computers 2 Introduction to I.T MCA D Introduction to Information Technology Introduction to Information Technology(BCA) Kurukshetra University News Lecture 20 Clipping -- Lines And Polygons Macro Economics 2 Management Syllabus Managerial Economics Marketing Management 2 Master Of Technology M-Tech Syllabus MBA Papers MCA Notes MCA Question Papers Mercantile Law 2 Metal Cutting Question Paper Metal Forming Question Paper Micro Economics Network Security NEURAL NETWORKS & FUZZY LOGIC Object Oriented Programming in C++ Object Oriented Programming in Cpp OOP CPP 2 Operating system (BCA) Operating System Bsc IT 1 Organisational Behaviour Organization Behaviour 2 Other Universities Others Panjab University News PCM 2 BCA D PGDCA Pharmacy Syllabus Principles and Practices of Management principles of management 2 Production and Operations Management 2 Programming in C Programming in C MCA D Programming Logic Development with C Psychology of Learning and Development B.Ed (Dec 2013) Psychology of Learning and Development B.Ed (Dec 2008) Psychology of Learning and Development B.Ed (Dec 2009) Psychology of Learning and Development B.Ed (Dec 2011) Psychology of Learning and Development B.Ed (Dec 2012) PTU Affiliated Colleges of Integerated College PTU Affiliated Colleges of Management College PTU Affiliated Colleges of Architecture PTU Affiliated Colleges of Engineering PTU Affiliated Colleges of Pharmacy College PTU Forms Download PTU News and Events Quantitative Techniques RDBMS 2 RDBMS-I 2 Relational Database Management System Research Methodology 2 SAD 2 BCA D Syllabus of Computer Applications Syllabus of Journalism and Mass Communication Syllabus of Medical Laboratory Science System Analysis and Design System Analysis and Design 2 System Analysis and Design MCA D Teacher and School B.Ed (Dec 2008) Teacher and School B.Ed (Dec 2009) Teacher and School B.Ed (Dec 2011) Teacher and School B.Ed (Dec 2012) Teacher and School B.Ed (Dec 2013) Teacher of English B.Ed (Dec 2009) Teaching of English B.Ed (Dec 2008) Teaching of English B.Ed (Dec 2011) Teaching of English B.Ed (Dec 2012) Teaching of English B.Ed (Dec 2013) Teaching of Mathematics B.Ed (Dec 2009) Teaching of Mathematics B.Ed (Dec 2011) Teaching of Mathematics B.Ed (Dec 2012) Teaching of Mathematics B.Ed (Dec 2013) Teaching of Science B.Ed (Dec 2008) Teaching of Science B.Ed (Dec 2009) Teaching of Science B.Ed (Dec 2011) Teaching of Science B.Ed (Dec 2012) Teaching of Science B.Ed (Dec 2013) Teaching of Social Studies B.Ed (Dec 2008) Teaching of Social Studies B.Ed (Dec 2011) Teaching of Social Studies B.Ed (Dec 2012) Teaching of Social Studiess B.Ed (Dec 2013) Teaching of Social Study B.Ed (Dec 2009) Technical Communication UGC NET Computer Science Question Paper Uttarakhand Open University Video Lecture Web Technologies 1st Semester Web Technologies 2 Welding Technology Question Paper Workshop on IT and E-Commerce 2