Exam Details
Subject | computer science | |
Paper | ||
Exam / Course | ||
Department | ||
Organization | indian space research organisation | |
Position | ||
Exam Date | 2013 | |
City, State | , |
Question Paper
COMPUTER SCIENCE -2013 SET-A I
1. Let be a three dimensional array. How many elements are there in the array
1200
1408
33
1050
2. The number of rotations required to insert a sequence of elements into an empty AVL tree is?
0
1
2
3
3. Opportunistic reasoning is addressed by which of the following knowledge representation
Script
Blackboard
Production Rules
Fuzzy Logic
4. The following steps in a linked list p=getnode() info(p)=10 next(p)=list list
result in which type of operation?
pop operation in stack
removal of a node
inserting a node
modifying an existing node
5. Shift reduce parsing belongs to a class of
bottom up parsing
top down parsing
recursive parsing
predictive parsing
6. Which of the following productions eliminate left recursion in the productions given below:
<img src='./qimages/1646-6.jpg'>
7. Consider the following psuedocode:
x:integer 1
y:integer 2
procedure add
procedure second (P:procedure)
x:integer:= 2
procedure first
y:integer:= 3
second(add)
first()
write_integer
What does it print if the language uses dynamic scoping with deep binding?
2
3
4
5
8. Which logic gate is used to detect overflow in complement arithmetic?
OR gate
AND gate
NAND gate
XOR gate
9. In an array of 2N elements that is both 2-ordered and 3-ordered, what is the maximum number of positions that an element can be from its position if the array were 1-ordered?
1
2
N/2
2N-1
10. If the frame buffer has 8 bits per pixel and 8 bits are allocated for 10 each of the B components, what would be the size of the lookup table?
24 bytes
1024 bytes
768 bytes
256 bytes
11. When two BCD numbers 0x14 and 0x08 are added what is the binary representation of the resultant number?
0x22
0x1c
0x16
d results in overflow
12. Which of the following sorting algorithms has the minimum running time complexity in the best and average case?
Insertion sort, Quick sort
Quick sort, Quick sort
Quick sort, Insertion sort
Insertion sort, Insertion sort
13. The number 1102 in base 3 is equivalent to 123 in which base system?
4
5
6
8
14. A processor is fetching instructions at the rate of 1 MIPS. A DMA module is used to transfer characters to RAM from a device transmitting at 9600 bps. How much time will the processor be slowed down due to DMA activity?
9.6 ms
4.8 ms
2.4 ms
1.2 ms
15. A pipeline P operating at 400 MHz has a speedup factor of 6 and operating at 70% efficiency. How many stages are there in the pipeline?
5
6
8
9
16. How much speed do we gain by using the cache, when cache is used 80% of the time? Assume cache is faster than main memory.
5.27
2.00
4.16
6.09
17. Two eight bit bytes 1100 0011 and 0100 1100 are added. What are the values of the overflow, carry and zero flags respectively, if the arithmetic unit of the CPU uses complement form?
1,1
1,0
0,1
1,0
18. How many check bits are required for 16 bit data word to detect 2 bit errors and bit correction using hamming code?
5
6
7
8
19. What is the maximum number of characters bits parity) that can be transmitted in a second on a 19.2 kbps line. This asynchronous transmission requires 1 start bit and 1 stop bit.
192
240
1920
1966
20. IEEE 1394 is related to
RS-232
USB
Firewire
PCI
21. What will be the cipher text produced by the following cipher function for the plain text ISRO with key k =7. [Consider .......'Z' 25] (kM 13) mod 26
RJCH
QIBG
GQPM
XPIN
22. Any set of boolean operators that is sufficient to represent all
boolean expressions is said to be complete. Which of the following is not complete?
OR}
OR}
NOT}
23. Which of the following is the highest isolation level in transaction management?
Serializable
Repeated Read
Committed Read
Uncommitted Read
24. Consider the following relational schema:
Suppliers (sid:integer, sname:string, saddress:string)
Parts (pid:integer, pname:string, pcolor:string)
Catalog (sid:integer, pid:integer, pcost:real)
What is the result of the following query?
(SELECT Catalog.pid from Suppliers, Catalog
WHERE Suppliers.sid =Catalog.pid)
MINUS
(SELECT Catalog.pid from Suppliers, Catalog WHERE Suppliers.sname 'sachin' and Suppliers.sid =Catalog.sid)
pid of Parts supplied by all except sachin
pid of Parts supplied only by sachin
pid of Parts available in catalog supplied by sachin
pid of Parts available in catalogs supplied by all except scahin
25. Consider the following dependencies and the BOOK table in a relational database design. Determine the normal form of the given relation.
ISBN->Title
ISBN->Publisher
Publisher->Address
First Normal Form
Second Normal Form
Third Normal Form
BCNF
26. Calculate the order of leaf(pleat) and non leaf(p) nodes of a tree based on the information given below
Search key field =12 bytes
Record pointer =10 bytes
Block pointer bytes
Block size KB
Pleaf=51 P=46
Pleat=47 P=52
Pleaf=46 P=51
Pleaf=52 P=47
27. The physical location of a record determined by a formula that transforms a file key into a record location is
Hashed file
B-Tree file
Indexed file
Sequential file
28. The most simplified form of the boolean function x L (expressed in sum of minterms) is?
A+A'BCD
AB+CD
A+BCD
ABC+D
29. How many programmable fuses are required in a PLA which takes 16 inputs and gives 8 outputs? It has to use 8 OR gates and 32 AND gates.
1032
776
1284
1536
30. In a three stage counter, using RS flip flops what will be the value of 30 the counter after giving 9 pulses to its input? Assume that the value of counter before giving any pulses is 1.
1
2
9
10
31. In which of the following shading models of polygons, the d
interpolation of intensity values is done along the scan line?
Gourard shading
Phong shading
Constant shading
Flat shading
32. Which of the following number of nodes can form a full binary tree?
8
15
14
13
33. What is the matrix transformation which takes the independent vectors[1 and 5]and transforms them to and respectively?
<img src='./qimages/1646-33a.jpg'>
<img src='./qimages/1646-33b.jpg'>
<img src='./qimages/1646-33c.jpg'>
<img src='./qimages/1646-33d.jpg'>
34. In 8086, the jump condition for the instruction JNBE is?
CF or ZF
ZF and SF
CF and ZF
CF
35. How many number of times the instruction sequence below will loop before coming out of the loop? MOV AL, 00H A1: INC AL JNZ A1
1
255
256
Will not come out of the loop
36. In 8085 microprocessor, the ISR for handling trap interrupt is at which location?
3CH
34H
74H
24H
37. The voltage ranges for a logic high and a logic low in RS-232 C standard is
Low is 0.0V to 1.8V, High is 2.0V to 5.0V
Low is -15.0V to -3.0V, High is 3.0V to 15.0V
Low is 3.0V to 15.0V, High is -3.0V to -15.0V
Low is 2.0V to 5.0V, High is 0.0V to 1.8V
38. In the Ethernet, which field is actually added at the physical layer and is not part of the frame
preamble
CRC
address
location
39. Ethernet layer-2 switch is a network element type which gives
different collision domain and same broadcast domain
different collision domain and different broadcast domain
same collision domain and same broadcast domain
same collision domain and different broadcast domain
40. If the frame to be transmitted is 1101011011 and the CRC polynomial
to be used for generating checksum is x4 X then what is the transmitted frame?
11010110111011
11010110111101
11010110111110
11010110111001
41. What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?
20%
25%
40%
66%
42. IPv6 does not support which of the following addressing modes?
unicast addressing
multicast addressing
broadcast addressinq
anycast addressinq
43. What is IP class and number of sub-networks if the subnet mask is
255.224.0.0?
class 3
class 8
class 3
class 32
44. Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate?
solid bucket algorithm
spanning tree algorithm
hocken helm algorithm
leaky bucket algorithm
45. A packet filtering firewall can
deny certain users from accessing a service
block worms and viruses from entering the network
disallow some files from being accessed through FTP
block some hosts from accessing the network
46. Which of the following encryption algorithms is based on the Fiestal struture?
Advanced Encryption Standard
RSA public key cryptographic algorithm
Data Encryption Standard
RC4
47. The protocol data unit for the transport layer in the internet stack is
segment
message
datagram
frame
48. The Guass-Seidal iterative method can be used to solve which of the following sets?
Linear alQebraic equations
Linear and non-linear algebraic equations
Linear differential equations
Linear and non-linear differential eqiJations
49. What is the least value of the function 2X2 -8x in the interval
-15
7
-11
50. Consider the following set of processes, with arrival times and the required CPU-burst times given in milliseconds. <img src='./qimages/1646-50.jpg'> What is the sequence in which the processes are completed? Assume round robin scheduling with a time quantum of 2 milliseconds.
P1, P2, P3
P2, P1, P3
P3, P2, P1
P2, P3, P1
51. In case of a DVD, the speed of data transfer is mentioned in multiples of?
150 KB/s
1.38 MB/s
300 KB/s
2.40 MB/s
52. suppose we have variable logical records of lengths of 5 bytes, 10 bytes, and 25 bytes while the physical block size in disk is 15 bytes. What is the maximum and minimum fragmentation seen in bytes?
25 and 5
15and 5
15and 0
10and 5
53. A CPU scheduling algorithm determines an order for the execution of its scheduled processes. Given processes to be scheduled on one processor, how many possible different schedules are there?
n
n2
2n
54. Which of the following are the likely causes of thrashing?
Page size was very small
There are too many users connected to the system
Least recently used policy is used for page replacement
First in First out policy is used for page replacement
55. Consider a logical address space of 8 pages of 1024 words each,
mapped onto a physical memory of 32 frames. How many bits are there in the physical address and logical address respectively?
5,3
10,10
15, 13
15, 15
56. In a 64-bit machine, with 2 GB RAM, and 8 KB page size, how many 56 entries will be there in the page table if it is inverted?
2 18
2 20
2 33
2 51
57. Which of the following is not a necessary condition for deadlock?
Mutual exclusion
Reentrancy
Hold and wait
No pre-emption
58. Consider the following process and resource requirement of each process. <img src='./qimages/1646-58.jpg'> Predict the state of this system, assuming that there are a total of 5 instances of resource type 1 and 4 instances of resource type 2.
Can go to safe or unsafe state based on sequence
Safe state
Unsafe state
Deadlock state
59. A starvation free job scheduling policy guarantees that no job indefinitely waits for a service. Which of the following job scheduling policies is starvation free?
Priority queing
Shortest Job First
Youngest Job First
Round robin
60. The state of a process after it encounters an I/O instruction is
ready
blocked
idle
runninq
61. Embedded pointer provides
a secondary access path
a physical record key
an inverted index
a prime key
62. A particular parallel program computation requires 100 seconds when executed on a single CPU. If 20% of this computation is strictly sequential, then theoretically the best possible elapsed times for this program running on 2 CPUs and 4 CPUs respectively are
55 and 45 seconds
80 and 20 seconds
75 and 25 seconds
60 and 40 seconds
63. Consider the following C code. <img src='./qimages/1646-63.jpg'> What would the program print?
0 0 0
0 1 0
c)1 0 1
1 1 1
64. What is the output of the following Java program? <img src='./qimages/1646-64.jpg'>
8 2
8 5
8 3
5 3
65. Consider the list of page references in the time line as below: 96234444344258685532339627 What is the working set at the penultimate page reference if delta is
66. What is the cyclomatic complexity of a module which has seventeen edges and thirteen nodes?
4
5
6
7
67. Which of the following types of coupling has the weakest coupling?
Patholoqical couplinq
Control couplinq
Data coupling
Message coupling
68. Which of the following testing methods uses fault simulation technique?
unit testing
beta testing
stress testing
mutation testing
69. If a program P calls two subprograms P1 and P2 and P1 can fail 50% of the time and P2 can fail 40% of the time, what is the failure rate of program P
50%
60%
70%
10%
70. Which of the following strategy is employed for overcoming the priority inversion problem?
Temporarily raise the priority of lower priority level process
Have a fixed priority level scheme
Implement kernel pre-emption scheme
Allow lower priority process to complete its job
71. Let denote the probability of the occurrence of event E. If 0.5 and then the values of and respectively are
0.5,0.25
0.25,0.5
0.5,1
1,0.5
72. How many diagonals can be drawn by joining the angular points of an octagon?
14
20
21
28
73. What are the final states of the DFA generated from the following NFA? <img src='./qimages/1646-73.jpg'>
q0, q1, q2
q0, q2]
q2
74. The number of elements in the power set of the set is
7
8
3
4
75. What is the right way to declare a copy constructor of a class if the name of the class is MyClass?
MyClass (constant MyClass
MyClass (constant MyClass &arg)
MyClass (MyClass arg)
MyClass (MyClass
76. The number of edges in a vertex complete graph is?
n2
77. The binary equivalent of the decimal number 42.75 is
101010.110
100110.101
101010.101
100110.110
78. Which of the following is not provided as a service in cloud computing?
Infrastructure as a service
Architecture as a service
Software as a service
Platform as a service
79. The built-in base class in Java, which is used to handle all exceptions is
Raise
Exception
Error
Throwable
80. In graphics, the number of vanishing points depends on
the number of axes cut by the projection plane
the centre of projection
the number of axes which are parallel to the projection plane
the perspective projections of any set of parallel lines that are not parallel to the projection plane
1. Let be a three dimensional array. How many elements are there in the array
1200
1408
33
1050
2. The number of rotations required to insert a sequence of elements into an empty AVL tree is?
0
1
2
3
3. Opportunistic reasoning is addressed by which of the following knowledge representation
Script
Blackboard
Production Rules
Fuzzy Logic
4. The following steps in a linked list p=getnode() info(p)=10 next(p)=list list
result in which type of operation?
pop operation in stack
removal of a node
inserting a node
modifying an existing node
5. Shift reduce parsing belongs to a class of
bottom up parsing
top down parsing
recursive parsing
predictive parsing
6. Which of the following productions eliminate left recursion in the productions given below:
<img src='./qimages/1646-6.jpg'>
7. Consider the following psuedocode:
x:integer 1
y:integer 2
procedure add
procedure second (P:procedure)
x:integer:= 2
procedure first
y:integer:= 3
second(add)
first()
write_integer
What does it print if the language uses dynamic scoping with deep binding?
2
3
4
5
8. Which logic gate is used to detect overflow in complement arithmetic?
OR gate
AND gate
NAND gate
XOR gate
9. In an array of 2N elements that is both 2-ordered and 3-ordered, what is the maximum number of positions that an element can be from its position if the array were 1-ordered?
1
2
N/2
2N-1
10. If the frame buffer has 8 bits per pixel and 8 bits are allocated for 10 each of the B components, what would be the size of the lookup table?
24 bytes
1024 bytes
768 bytes
256 bytes
11. When two BCD numbers 0x14 and 0x08 are added what is the binary representation of the resultant number?
0x22
0x1c
0x16
d results in overflow
12. Which of the following sorting algorithms has the minimum running time complexity in the best and average case?
Insertion sort, Quick sort
Quick sort, Quick sort
Quick sort, Insertion sort
Insertion sort, Insertion sort
13. The number 1102 in base 3 is equivalent to 123 in which base system?
4
5
6
8
14. A processor is fetching instructions at the rate of 1 MIPS. A DMA module is used to transfer characters to RAM from a device transmitting at 9600 bps. How much time will the processor be slowed down due to DMA activity?
9.6 ms
4.8 ms
2.4 ms
1.2 ms
15. A pipeline P operating at 400 MHz has a speedup factor of 6 and operating at 70% efficiency. How many stages are there in the pipeline?
5
6
8
9
16. How much speed do we gain by using the cache, when cache is used 80% of the time? Assume cache is faster than main memory.
5.27
2.00
4.16
6.09
17. Two eight bit bytes 1100 0011 and 0100 1100 are added. What are the values of the overflow, carry and zero flags respectively, if the arithmetic unit of the CPU uses complement form?
1,1
1,0
0,1
1,0
18. How many check bits are required for 16 bit data word to detect 2 bit errors and bit correction using hamming code?
5
6
7
8
19. What is the maximum number of characters bits parity) that can be transmitted in a second on a 19.2 kbps line. This asynchronous transmission requires 1 start bit and 1 stop bit.
192
240
1920
1966
20. IEEE 1394 is related to
RS-232
USB
Firewire
PCI
21. What will be the cipher text produced by the following cipher function for the plain text ISRO with key k =7. [Consider .......'Z' 25] (kM 13) mod 26
RJCH
QIBG
GQPM
XPIN
22. Any set of boolean operators that is sufficient to represent all
boolean expressions is said to be complete. Which of the following is not complete?
OR}
OR}
NOT}
23. Which of the following is the highest isolation level in transaction management?
Serializable
Repeated Read
Committed Read
Uncommitted Read
24. Consider the following relational schema:
Suppliers (sid:integer, sname:string, saddress:string)
Parts (pid:integer, pname:string, pcolor:string)
Catalog (sid:integer, pid:integer, pcost:real)
What is the result of the following query?
(SELECT Catalog.pid from Suppliers, Catalog
WHERE Suppliers.sid =Catalog.pid)
MINUS
(SELECT Catalog.pid from Suppliers, Catalog WHERE Suppliers.sname 'sachin' and Suppliers.sid =Catalog.sid)
pid of Parts supplied by all except sachin
pid of Parts supplied only by sachin
pid of Parts available in catalog supplied by sachin
pid of Parts available in catalogs supplied by all except scahin
25. Consider the following dependencies and the BOOK table in a relational database design. Determine the normal form of the given relation.
ISBN->Title
ISBN->Publisher
Publisher->Address
First Normal Form
Second Normal Form
Third Normal Form
BCNF
26. Calculate the order of leaf(pleat) and non leaf(p) nodes of a tree based on the information given below
Search key field =12 bytes
Record pointer =10 bytes
Block pointer bytes
Block size KB
Pleaf=51 P=46
Pleat=47 P=52
Pleaf=46 P=51
Pleaf=52 P=47
27. The physical location of a record determined by a formula that transforms a file key into a record location is
Hashed file
B-Tree file
Indexed file
Sequential file
28. The most simplified form of the boolean function x L (expressed in sum of minterms) is?
A+A'BCD
AB+CD
A+BCD
ABC+D
29. How many programmable fuses are required in a PLA which takes 16 inputs and gives 8 outputs? It has to use 8 OR gates and 32 AND gates.
1032
776
1284
1536
30. In a three stage counter, using RS flip flops what will be the value of 30 the counter after giving 9 pulses to its input? Assume that the value of counter before giving any pulses is 1.
1
2
9
10
31. In which of the following shading models of polygons, the d
interpolation of intensity values is done along the scan line?
Gourard shading
Phong shading
Constant shading
Flat shading
32. Which of the following number of nodes can form a full binary tree?
8
15
14
13
33. What is the matrix transformation which takes the independent vectors[1 and 5]and transforms them to and respectively?
<img src='./qimages/1646-33a.jpg'>
<img src='./qimages/1646-33b.jpg'>
<img src='./qimages/1646-33c.jpg'>
<img src='./qimages/1646-33d.jpg'>
34. In 8086, the jump condition for the instruction JNBE is?
CF or ZF
ZF and SF
CF and ZF
CF
35. How many number of times the instruction sequence below will loop before coming out of the loop? MOV AL, 00H A1: INC AL JNZ A1
1
255
256
Will not come out of the loop
36. In 8085 microprocessor, the ISR for handling trap interrupt is at which location?
3CH
34H
74H
24H
37. The voltage ranges for a logic high and a logic low in RS-232 C standard is
Low is 0.0V to 1.8V, High is 2.0V to 5.0V
Low is -15.0V to -3.0V, High is 3.0V to 15.0V
Low is 3.0V to 15.0V, High is -3.0V to -15.0V
Low is 2.0V to 5.0V, High is 0.0V to 1.8V
38. In the Ethernet, which field is actually added at the physical layer and is not part of the frame
preamble
CRC
address
location
39. Ethernet layer-2 switch is a network element type which gives
different collision domain and same broadcast domain
different collision domain and different broadcast domain
same collision domain and same broadcast domain
same collision domain and different broadcast domain
40. If the frame to be transmitted is 1101011011 and the CRC polynomial
to be used for generating checksum is x4 X then what is the transmitted frame?
11010110111011
11010110111101
11010110111110
11010110111001
41. What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?
20%
25%
40%
66%
42. IPv6 does not support which of the following addressing modes?
unicast addressing
multicast addressing
broadcast addressinq
anycast addressinq
43. What is IP class and number of sub-networks if the subnet mask is
255.224.0.0?
class 3
class 8
class 3
class 32
44. Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate?
solid bucket algorithm
spanning tree algorithm
hocken helm algorithm
leaky bucket algorithm
45. A packet filtering firewall can
deny certain users from accessing a service
block worms and viruses from entering the network
disallow some files from being accessed through FTP
block some hosts from accessing the network
46. Which of the following encryption algorithms is based on the Fiestal struture?
Advanced Encryption Standard
RSA public key cryptographic algorithm
Data Encryption Standard
RC4
47. The protocol data unit for the transport layer in the internet stack is
segment
message
datagram
frame
48. The Guass-Seidal iterative method can be used to solve which of the following sets?
Linear alQebraic equations
Linear and non-linear algebraic equations
Linear differential equations
Linear and non-linear differential eqiJations
49. What is the least value of the function 2X2 -8x in the interval
-15
7
-11
50. Consider the following set of processes, with arrival times and the required CPU-burst times given in milliseconds. <img src='./qimages/1646-50.jpg'> What is the sequence in which the processes are completed? Assume round robin scheduling with a time quantum of 2 milliseconds.
P1, P2, P3
P2, P1, P3
P3, P2, P1
P2, P3, P1
51. In case of a DVD, the speed of data transfer is mentioned in multiples of?
150 KB/s
1.38 MB/s
300 KB/s
2.40 MB/s
52. suppose we have variable logical records of lengths of 5 bytes, 10 bytes, and 25 bytes while the physical block size in disk is 15 bytes. What is the maximum and minimum fragmentation seen in bytes?
25 and 5
15and 5
15and 0
10and 5
53. A CPU scheduling algorithm determines an order for the execution of its scheduled processes. Given processes to be scheduled on one processor, how many possible different schedules are there?
n
n2
2n
54. Which of the following are the likely causes of thrashing?
Page size was very small
There are too many users connected to the system
Least recently used policy is used for page replacement
First in First out policy is used for page replacement
55. Consider a logical address space of 8 pages of 1024 words each,
mapped onto a physical memory of 32 frames. How many bits are there in the physical address and logical address respectively?
5,3
10,10
15, 13
15, 15
56. In a 64-bit machine, with 2 GB RAM, and 8 KB page size, how many 56 entries will be there in the page table if it is inverted?
2 18
2 20
2 33
2 51
57. Which of the following is not a necessary condition for deadlock?
Mutual exclusion
Reentrancy
Hold and wait
No pre-emption
58. Consider the following process and resource requirement of each process. <img src='./qimages/1646-58.jpg'> Predict the state of this system, assuming that there are a total of 5 instances of resource type 1 and 4 instances of resource type 2.
Can go to safe or unsafe state based on sequence
Safe state
Unsafe state
Deadlock state
59. A starvation free job scheduling policy guarantees that no job indefinitely waits for a service. Which of the following job scheduling policies is starvation free?
Priority queing
Shortest Job First
Youngest Job First
Round robin
60. The state of a process after it encounters an I/O instruction is
ready
blocked
idle
runninq
61. Embedded pointer provides
a secondary access path
a physical record key
an inverted index
a prime key
62. A particular parallel program computation requires 100 seconds when executed on a single CPU. If 20% of this computation is strictly sequential, then theoretically the best possible elapsed times for this program running on 2 CPUs and 4 CPUs respectively are
55 and 45 seconds
80 and 20 seconds
75 and 25 seconds
60 and 40 seconds
63. Consider the following C code. <img src='./qimages/1646-63.jpg'> What would the program print?
0 0 0
0 1 0
c)1 0 1
1 1 1
64. What is the output of the following Java program? <img src='./qimages/1646-64.jpg'>
8 2
8 5
8 3
5 3
65. Consider the list of page references in the time line as below: 96234444344258685532339627 What is the working set at the penultimate page reference if delta is
66. What is the cyclomatic complexity of a module which has seventeen edges and thirteen nodes?
4
5
6
7
67. Which of the following types of coupling has the weakest coupling?
Patholoqical couplinq
Control couplinq
Data coupling
Message coupling
68. Which of the following testing methods uses fault simulation technique?
unit testing
beta testing
stress testing
mutation testing
69. If a program P calls two subprograms P1 and P2 and P1 can fail 50% of the time and P2 can fail 40% of the time, what is the failure rate of program P
50%
60%
70%
10%
70. Which of the following strategy is employed for overcoming the priority inversion problem?
Temporarily raise the priority of lower priority level process
Have a fixed priority level scheme
Implement kernel pre-emption scheme
Allow lower priority process to complete its job
71. Let denote the probability of the occurrence of event E. If 0.5 and then the values of and respectively are
0.5,0.25
0.25,0.5
0.5,1
1,0.5
72. How many diagonals can be drawn by joining the angular points of an octagon?
14
20
21
28
73. What are the final states of the DFA generated from the following NFA? <img src='./qimages/1646-73.jpg'>
q0, q1, q2
q0, q2]
q2
74. The number of elements in the power set of the set is
7
8
3
4
75. What is the right way to declare a copy constructor of a class if the name of the class is MyClass?
MyClass (constant MyClass
MyClass (constant MyClass &arg)
MyClass (MyClass arg)
MyClass (MyClass
76. The number of edges in a vertex complete graph is?
n2
77. The binary equivalent of the decimal number 42.75 is
101010.110
100110.101
101010.101
100110.110
78. Which of the following is not provided as a service in cloud computing?
Infrastructure as a service
Architecture as a service
Software as a service
Platform as a service
79. The built-in base class in Java, which is used to handle all exceptions is
Raise
Exception
Error
Throwable
80. In graphics, the number of vanishing points depends on
the number of axes cut by the projection plane
the centre of projection
the number of axes which are parallel to the projection plane
the perspective projections of any set of parallel lines that are not parallel to the projection plane