Exam Details
Subject | computer science | |
Paper | ||
Exam / Course | ||
Department | ||
Organization | indian space research organisation | |
Position | ||
Exam Date | 2011 | |
City, State | , |
Question Paper
1. The encoding technique used to transmit the signal in giga ethernet technology over fiber optic medium is
Differential manchester encoding
Non Return to zero
4B/5B encoding
8B/10B encoding
2. Which of the following is an unsupervised neural network
RBS
Hopfield
Back propagation
Kohonen
3. In compiler terminology, reduction in strength means
Replacing run time computation by compile time computation
Removing loop invariant computation
Removing common sub expressions
Replacing a costly operation by a relatively cheaper one
4. The following table shows the processes in the ready queue and
time required for each process for completing its job.
Process Time
P1 10
P2 5
P3 20
P4 8
P5 15
if round robin scheduling with 5ms is used what is the average
waiting time of the processes in the queue?
27 ms
26.2 ms
27.5 ms
27.2 ms
5. MOV AL type of data addressing is called
Register addressing
Immediate addressing
Register indirect addressing
Register relative
6. Evaluate xor xor Y
All
All
X
Y
7. Which of the following is true about the z-buffer algorithm?
It is a depth sort algorithm
No limitation on total number of objects in the scene
Comparison of objects is done
z-buffer is initialized to background colour at start of algorithm
8. What is the decimal value of the floating-point number C1D00000 (hexadecimal notation)? (Assume 32-bit, single precision floating point IEEE representation)
28
-15
-26
-28
9. What is the raw throughput of USB 2.0 technology?
480 Mbps
400 Mbps
200 Mbps
12 Mbps
10. Below is the precedence graph for a set of tasks to be executed on a parallel processing system S. <img src='./qimages/1644-10.jpg'> What is the efficiency of this precedence graph on S if each of the tasks T1,....,T8 takes the same time and the system S has five processors?
25%
40%
50%
90%
11. How many distinct binary search trees can be created out of 4 distinct keys?
5
14
24
35
12. The network protocol which is used to get MAC address of a node by providing IP address is
SMTP
ARP
RIP
BOOTP
13. Which of the following statements about peephole optimizations is False?
It is applied to a small part of the code
It can be used to optimize intermediate code
To get the best out of this, it has to be applied repeatedly
It can be applied to a portion of the code that is not contiguous
14. Which one of the following in place sorting algorithms needs the minimum number of swaps?
Quick-sort
Insertion sort
Selection sort
Heap sort
15. What is the equivalent serial schedule for the following transactions? <img src='./qimages/1644-15.jpg'>
T1-T2-T3
T3-T1-T2
T2-T1-T3
T1-T3-T2
16. Consider a direct mapped cache with 64 blocks and a block size of 16 bytes. To what block number does the byte address 1206 map to?
Does not map
6
11
54
17. A context model of a software system can be shown by drawing a
LEVEL-0 DFD
LEVEL-1 DFD
LEVEL-2 DFD
LEVEL-3 DFD
18. An example of poly-alphabetic substitution is
P-box
S-box
Caesar cipher
Vigenere cipher
19. If node A has three siblings and B is parent of what is the degree of
0
3
4
5
20. The IEEE standard for WiMax technology is
IEEE 802.16
IEEE 802.36
IEEE 812.16
IEEE 806.16
21. Which type of DBMS provides support for maintaining several versions of the same entity?
Relational Data Base Management Systems
Hierarchical
Object Oriented Data Base Management Systems
Network
22. A system is having 8M bytes of video memory for bit-mapped graphics with 54-bit colour. What is the maximum resolution it can support?
800 x 600
1024 x 768
1280 x 1024
1920 x 1440
23. What is the meaning of RD bar signal in Intel 8151A?
Read (when it is low)
Read (when it is high)
Write (when it is low)
Read and Write (when it is high)
24. If the page size in a 32-bit machine is 4K bytes then the size of page table is
1 M bytes
2 M bytes
4 M bytes
4 K bytes
25. A processor takes 12 cycles to complete an instruction I. The corresponding pipelined processor uses 6 stages with the execution times of and 2 cycles respectively. What is the asymptotic speed up assuming that a very large number speed up assuming that a very large number of instructions are to be executed?
1.83
2
3
6
26. The in-order traversal of a tree resulted ill FBGADCE. Then the pre-order traversal of that tree would result in
FGBDECA
ABFGCDE
BFGCDEA
AFGBDEC
27. Which one of the following is <img src='./qimages/1644-27.jpg'>
28. <img src='./qimages/1644-28.jpg'> The above figure represents which one of the following UML diagram for a single send session of an online chat system.
Package Diagram
Activity Diagram
Class Diagram
Sequence Diagram
29. Which 'Normal Form' is based on the concept of 'full functional dependency' is
First Normal Form
Second Normal Form
Third Normal Form
Fourth Normal Form
30. In Boolean algebra, rule
Y+XZ
X+YZ
XY+Z
XZ+Y
31. How many 3-to-8 line decoders with a chip having enable pin are needed to construct a 6-to-64 line decoder without using any other logic gates?
7
8
9
10
32. In which layer of network architecture, the secured socket layer is used?
physical layer
session layer
application layer
presentation layer
33. What is the bit rate of a video terminal unit with 80 character/line, 8 bits/character and horizontal sweep time of 100 mews (including 20 mews of retrace time)?
8 Mbps
6.4 Mbps
0.8 Mbps
0.64 Mbps
34. Black Box software testing method focuses on the
Boundary condition of the software
Control Structure of the Software
Functional Requirement of the Software
Independent paths of the software
35. How many edges are there in a forest with v vertices and k components?
v-k
v+k
36. if A and B are square matrices of the same order and A is symmetric, then BTAB is
Skew symmetric
Symmetric
Orthogonal
Idempotent
37. Find the memory address of the next instruction executed by the microprocessor when operated in real mode for CS=1000 and IP=E000
10E00
1E000
F000
1000E
38. A fast wide SCSI-II disk drive spins at 7200 RPM, has a sector size of 512 bytes, and holds 160 sectors per track. Estimate the sustained transfer rate of this drive.
576000 Kilobytes/ sec
9600 Kilobytes sec
4800 Kilobytes sec
19200 Kilobytes sec
39. Two control signals in microprocessor which are related to Direct Memory Access are
INTR INTA
RD&WR
S0 S1
HOLD HLDA
40. Consider the following pseudocode. <img src='./qimages/1644-40.jpg'> What is the value of i at the end of the pseudocode?
4
5
6
7
41.If a microcomputer operates at 5 MHz with an 8-bit bus and a newer version operates at 20 MHz with a 32-bit bus, the maximum speed-up possible approximately will be
2
4
8
16
42. The search concept used in associative memory is
Parallel search
Sequential search
Binary search
Selection search
43. Which variable does not drive a terminal string in the grammar S A a b B C
A
B
C
S
44. In Java, after executing the following code what are the values of x,y and
int x,y 10, z
x
x 22, z=12
x 24, z=12
x 24, z=13
x 22, z=13
45. The broadcast address for IP network 172.16.0.0 with subnet mask 255.255.0.0 is
172.16.0.255
172.16.255.255
255.255.255.255
172.255.255.255
46. Which RAID level gives block level striping with double distributed parity
RAID 10
RAID 2
RAID 6
RAID 5
47. The output expression of the following gate network is <img src='./qimages/1644-47.jpg'>
X.Y X bar.Y bar
X.Y X.Y
X.Y
X+Y
48. The Hamming distance between the octets of OxAA and Ox55 is
7
5
8
6
49. Consider a 32-bit machine where four-level paging scheme is used. If the hit ratio to TLB is and it takes 20 nanoseconds to search the TLB and 100 nanoseconds to access the main memory what is effective memory access time in nanoseconds?
126
128
122
120
50. Data is transmitted continuously at 2.048 Mbps rate for 10 hours and received 512 bit errors. What is the bit error rate?
6.9 e-9
6.9 e-6
69 e-9
4 e-9
51. Warnier Diagram enables the analyst to represent
Class Structure
Information Hierarchy
Data Flow
State Transition
52. Given X:0 10 16 Y:6 16 28
The interpolated value at X using piecewise linear interpolation is
11
4
22
10
53. in functional dependency, Armstrong's inference rules refers to
Reflexive, Augmentation and Decomposition
Transitive, Augmentation and Reflexive
Augmentation, Transitive, Reflexive and Decomposition
Reflexive, Transitive and Decomposition
54. Number of chips (128 x:8 RAM) needed to provide a memory capacity of 2048 bytes
2
4
8
16
55. There are three processes in the ready queue. When the currently running process requests for I/O how many process switches take place?
1
2
3
4
56. Let be defined by T 10 and for all integers Which of the following represents the order of growth of as a function of
log
57. Which of the following UNIX command allows scheduling a program to be executed at the specified time?
cron
nice
date and time
schedule
58. In DMA transfer scheme, the transfer scheme other than burst mode is
cycle technique
stealing technique
cycle stealing technique
cycle bypass technique
59. nth derivative of xn is
nxn-1
nn.n!
nxn!
60. A total of 9 units of a resource type are available, and given the safe state shown below, which of the following sequence will be a safe state?
Process Used Max
P1 2 1
P2 1 6
P3 2 5
P4 1 4
61. Three coins are tossed simultaneously. The probability that they will fall two heads and one tail is
5/8
1/8
2/3
3/8
62. The averaQe depth of a binary search tree is
O(n0.5)
O(log
O(nlog
63. What is the output of the following C code? <img src='./qimages/1644-63.jpg'>
1245
12345
12245
12354
64. When n=type semiconductor is heated?
number of electrons increases while that of holes decreases
number of holes increases while that of electrons decreases
number of electrons and holes remain same
number of electron and holes increases equally.
65. The Cyclomatic Complexity metric of the following control flow graph is <img src='./qimages/1644-65.jpg'>
3
4
5
6
66. Which of the following algorithm design techniques is used in merge sort?
Greedy method
Backtracking
Dynamic programming
Divide and Conquer
67. The arithmetic mean of attendance of 49 students of class A is 40% and that of 53 students of class B is 35%. Then the of arithmetic mean of attendance of class A and B is
27.2%
50.25%
51.13%
37.4%
68. Which of the following sentences can be generated by S as|bA A d|cA
bccdd
abbcca
abcabc
abcd
69. lightweight Directory Access Protocol is used for
Routing the packets
Authentication
obtaining iP address
domain name resolving
70. Number of comparisons required for an unsuccessful search of an element in a sequential search organized, fixed length, symbol table of length L is
L
L/2
2L
71. One SAN switch has 24 ports. All 24 port supports 8 Gbps Fiber Channel technology. What is the aggregate bandwidth of that SAN switch?
96 Gbps
192 Mbps
512 Gbps
192 Gbps
72. Find the output of the following Java code line System.out.println(math.floor(-7.4))
-7.4
-7.0
73. Belady's anomaly means
Page fault rate is constant even on increasing the number of a allocated frames
Pages fault rate may increase on increasing the number of allocated frames
Pages fault rate may increase on decreasing the number of allocated frames
Pages fault rate may decrease on increasing the number of allocated frames
74. In an RS flip-flop, if the S line (Set line) is set high and the R line (Reset line) is set low then the state of the flip flop is
Set to 1
Set to 0
No change in state
Forbidden
75. In HTML, which of the following can be considered a container?
<SELECT>
<Value>
<INPUT>
<BODY>
76. What is the matrix that represents rotation of an object by theta deg about the origin in 2D?
<img src='./qimages/1644-76.jpg'>
77. In a system having a single processor, a new process arrives at the rate of six processes per minute and each such process requires seven seconds of service time. What is the CPU utilization?
70%
30%
60%
64%
78. A symbol table of length 152 is possessing 25 entries at any instant What is occupation density?
0.164
127
8.06
6.08
79. A problem whose language is recursion is called?
Unified problem
Boolean function
Recursive problem
Decidable
80. Logic family popular for low power dissipation
CMOS
ECL
TTL
DTL
Differential manchester encoding
Non Return to zero
4B/5B encoding
8B/10B encoding
2. Which of the following is an unsupervised neural network
RBS
Hopfield
Back propagation
Kohonen
3. In compiler terminology, reduction in strength means
Replacing run time computation by compile time computation
Removing loop invariant computation
Removing common sub expressions
Replacing a costly operation by a relatively cheaper one
4. The following table shows the processes in the ready queue and
time required for each process for completing its job.
Process Time
P1 10
P2 5
P3 20
P4 8
P5 15
if round robin scheduling with 5ms is used what is the average
waiting time of the processes in the queue?
27 ms
26.2 ms
27.5 ms
27.2 ms
5. MOV AL type of data addressing is called
Register addressing
Immediate addressing
Register indirect addressing
Register relative
6. Evaluate xor xor Y
All
All
X
Y
7. Which of the following is true about the z-buffer algorithm?
It is a depth sort algorithm
No limitation on total number of objects in the scene
Comparison of objects is done
z-buffer is initialized to background colour at start of algorithm
8. What is the decimal value of the floating-point number C1D00000 (hexadecimal notation)? (Assume 32-bit, single precision floating point IEEE representation)
28
-15
-26
-28
9. What is the raw throughput of USB 2.0 technology?
480 Mbps
400 Mbps
200 Mbps
12 Mbps
10. Below is the precedence graph for a set of tasks to be executed on a parallel processing system S. <img src='./qimages/1644-10.jpg'> What is the efficiency of this precedence graph on S if each of the tasks T1,....,T8 takes the same time and the system S has five processors?
25%
40%
50%
90%
11. How many distinct binary search trees can be created out of 4 distinct keys?
5
14
24
35
12. The network protocol which is used to get MAC address of a node by providing IP address is
SMTP
ARP
RIP
BOOTP
13. Which of the following statements about peephole optimizations is False?
It is applied to a small part of the code
It can be used to optimize intermediate code
To get the best out of this, it has to be applied repeatedly
It can be applied to a portion of the code that is not contiguous
14. Which one of the following in place sorting algorithms needs the minimum number of swaps?
Quick-sort
Insertion sort
Selection sort
Heap sort
15. What is the equivalent serial schedule for the following transactions? <img src='./qimages/1644-15.jpg'>
T1-T2-T3
T3-T1-T2
T2-T1-T3
T1-T3-T2
16. Consider a direct mapped cache with 64 blocks and a block size of 16 bytes. To what block number does the byte address 1206 map to?
Does not map
6
11
54
17. A context model of a software system can be shown by drawing a
LEVEL-0 DFD
LEVEL-1 DFD
LEVEL-2 DFD
LEVEL-3 DFD
18. An example of poly-alphabetic substitution is
P-box
S-box
Caesar cipher
Vigenere cipher
19. If node A has three siblings and B is parent of what is the degree of
0
3
4
5
20. The IEEE standard for WiMax technology is
IEEE 802.16
IEEE 802.36
IEEE 812.16
IEEE 806.16
21. Which type of DBMS provides support for maintaining several versions of the same entity?
Relational Data Base Management Systems
Hierarchical
Object Oriented Data Base Management Systems
Network
22. A system is having 8M bytes of video memory for bit-mapped graphics with 54-bit colour. What is the maximum resolution it can support?
800 x 600
1024 x 768
1280 x 1024
1920 x 1440
23. What is the meaning of RD bar signal in Intel 8151A?
Read (when it is low)
Read (when it is high)
Write (when it is low)
Read and Write (when it is high)
24. If the page size in a 32-bit machine is 4K bytes then the size of page table is
1 M bytes
2 M bytes
4 M bytes
4 K bytes
25. A processor takes 12 cycles to complete an instruction I. The corresponding pipelined processor uses 6 stages with the execution times of and 2 cycles respectively. What is the asymptotic speed up assuming that a very large number speed up assuming that a very large number of instructions are to be executed?
1.83
2
3
6
26. The in-order traversal of a tree resulted ill FBGADCE. Then the pre-order traversal of that tree would result in
FGBDECA
ABFGCDE
BFGCDEA
AFGBDEC
27. Which one of the following is <img src='./qimages/1644-27.jpg'>
28. <img src='./qimages/1644-28.jpg'> The above figure represents which one of the following UML diagram for a single send session of an online chat system.
Package Diagram
Activity Diagram
Class Diagram
Sequence Diagram
29. Which 'Normal Form' is based on the concept of 'full functional dependency' is
First Normal Form
Second Normal Form
Third Normal Form
Fourth Normal Form
30. In Boolean algebra, rule
Y+XZ
X+YZ
XY+Z
XZ+Y
31. How many 3-to-8 line decoders with a chip having enable pin are needed to construct a 6-to-64 line decoder without using any other logic gates?
7
8
9
10
32. In which layer of network architecture, the secured socket layer is used?
physical layer
session layer
application layer
presentation layer
33. What is the bit rate of a video terminal unit with 80 character/line, 8 bits/character and horizontal sweep time of 100 mews (including 20 mews of retrace time)?
8 Mbps
6.4 Mbps
0.8 Mbps
0.64 Mbps
34. Black Box software testing method focuses on the
Boundary condition of the software
Control Structure of the Software
Functional Requirement of the Software
Independent paths of the software
35. How many edges are there in a forest with v vertices and k components?
v-k
v+k
36. if A and B are square matrices of the same order and A is symmetric, then BTAB is
Skew symmetric
Symmetric
Orthogonal
Idempotent
37. Find the memory address of the next instruction executed by the microprocessor when operated in real mode for CS=1000 and IP=E000
10E00
1E000
F000
1000E
38. A fast wide SCSI-II disk drive spins at 7200 RPM, has a sector size of 512 bytes, and holds 160 sectors per track. Estimate the sustained transfer rate of this drive.
576000 Kilobytes/ sec
9600 Kilobytes sec
4800 Kilobytes sec
19200 Kilobytes sec
39. Two control signals in microprocessor which are related to Direct Memory Access are
INTR INTA
RD&WR
S0 S1
HOLD HLDA
40. Consider the following pseudocode. <img src='./qimages/1644-40.jpg'> What is the value of i at the end of the pseudocode?
4
5
6
7
41.If a microcomputer operates at 5 MHz with an 8-bit bus and a newer version operates at 20 MHz with a 32-bit bus, the maximum speed-up possible approximately will be
2
4
8
16
42. The search concept used in associative memory is
Parallel search
Sequential search
Binary search
Selection search
43. Which variable does not drive a terminal string in the grammar S A a b B C
A
B
C
S
44. In Java, after executing the following code what are the values of x,y and
int x,y 10, z
x
x 22, z=12
x 24, z=12
x 24, z=13
x 22, z=13
45. The broadcast address for IP network 172.16.0.0 with subnet mask 255.255.0.0 is
172.16.0.255
172.16.255.255
255.255.255.255
172.255.255.255
46. Which RAID level gives block level striping with double distributed parity
RAID 10
RAID 2
RAID 6
RAID 5
47. The output expression of the following gate network is <img src='./qimages/1644-47.jpg'>
X.Y X bar.Y bar
X.Y X.Y
X.Y
X+Y
48. The Hamming distance between the octets of OxAA and Ox55 is
7
5
8
6
49. Consider a 32-bit machine where four-level paging scheme is used. If the hit ratio to TLB is and it takes 20 nanoseconds to search the TLB and 100 nanoseconds to access the main memory what is effective memory access time in nanoseconds?
126
128
122
120
50. Data is transmitted continuously at 2.048 Mbps rate for 10 hours and received 512 bit errors. What is the bit error rate?
6.9 e-9
6.9 e-6
69 e-9
4 e-9
51. Warnier Diagram enables the analyst to represent
Class Structure
Information Hierarchy
Data Flow
State Transition
52. Given X:0 10 16 Y:6 16 28
The interpolated value at X using piecewise linear interpolation is
11
4
22
10
53. in functional dependency, Armstrong's inference rules refers to
Reflexive, Augmentation and Decomposition
Transitive, Augmentation and Reflexive
Augmentation, Transitive, Reflexive and Decomposition
Reflexive, Transitive and Decomposition
54. Number of chips (128 x:8 RAM) needed to provide a memory capacity of 2048 bytes
2
4
8
16
55. There are three processes in the ready queue. When the currently running process requests for I/O how many process switches take place?
1
2
3
4
56. Let be defined by T 10 and for all integers Which of the following represents the order of growth of as a function of
log
57. Which of the following UNIX command allows scheduling a program to be executed at the specified time?
cron
nice
date and time
schedule
58. In DMA transfer scheme, the transfer scheme other than burst mode is
cycle technique
stealing technique
cycle stealing technique
cycle bypass technique
59. nth derivative of xn is
nxn-1
nn.n!
nxn!
60. A total of 9 units of a resource type are available, and given the safe state shown below, which of the following sequence will be a safe state?
Process Used Max
P1 2 1
P2 1 6
P3 2 5
P4 1 4
61. Three coins are tossed simultaneously. The probability that they will fall two heads and one tail is
5/8
1/8
2/3
3/8
62. The averaQe depth of a binary search tree is
O(n0.5)
O(log
O(nlog
63. What is the output of the following C code? <img src='./qimages/1644-63.jpg'>
1245
12345
12245
12354
64. When n=type semiconductor is heated?
number of electrons increases while that of holes decreases
number of holes increases while that of electrons decreases
number of electrons and holes remain same
number of electron and holes increases equally.
65. The Cyclomatic Complexity metric of the following control flow graph is <img src='./qimages/1644-65.jpg'>
3
4
5
6
66. Which of the following algorithm design techniques is used in merge sort?
Greedy method
Backtracking
Dynamic programming
Divide and Conquer
67. The arithmetic mean of attendance of 49 students of class A is 40% and that of 53 students of class B is 35%. Then the of arithmetic mean of attendance of class A and B is
27.2%
50.25%
51.13%
37.4%
68. Which of the following sentences can be generated by S as|bA A d|cA
bccdd
abbcca
abcabc
abcd
69. lightweight Directory Access Protocol is used for
Routing the packets
Authentication
obtaining iP address
domain name resolving
70. Number of comparisons required for an unsuccessful search of an element in a sequential search organized, fixed length, symbol table of length L is
L
L/2
2L
71. One SAN switch has 24 ports. All 24 port supports 8 Gbps Fiber Channel technology. What is the aggregate bandwidth of that SAN switch?
96 Gbps
192 Mbps
512 Gbps
192 Gbps
72. Find the output of the following Java code line System.out.println(math.floor(-7.4))
-7.4
-7.0
73. Belady's anomaly means
Page fault rate is constant even on increasing the number of a allocated frames
Pages fault rate may increase on increasing the number of allocated frames
Pages fault rate may increase on decreasing the number of allocated frames
Pages fault rate may decrease on increasing the number of allocated frames
74. In an RS flip-flop, if the S line (Set line) is set high and the R line (Reset line) is set low then the state of the flip flop is
Set to 1
Set to 0
No change in state
Forbidden
75. In HTML, which of the following can be considered a container?
<SELECT>
<Value>
<INPUT>
<BODY>
76. What is the matrix that represents rotation of an object by theta deg about the origin in 2D?
<img src='./qimages/1644-76.jpg'>
77. In a system having a single processor, a new process arrives at the rate of six processes per minute and each such process requires seven seconds of service time. What is the CPU utilization?
70%
30%
60%
64%
78. A symbol table of length 152 is possessing 25 entries at any instant What is occupation density?
0.164
127
8.06
6.08
79. A problem whose language is recursion is called?
Unified problem
Boolean function
Recursive problem
Decidable
80. Logic family popular for low power dissipation
CMOS
ECL
TTL
DTL