0% found this document useful (0 votes)
190 views80 pages

Ugc Net - Computer Science - Free Solved Paper - English Version

This document provides a mock test paper for the UGC NET exam with 3 sections. Section 1 has 50 objective questions worth 2 marks each. Section 2 also has 50 objective questions worth 2 marks each. Section 3 has 75 objective questions worth 2 marks each. The total marks for the exam are 350 and each section has a time limit of 2.5 hours. The document provides sample questions from Section 1 of the exam on topics like communication, English language, data interpretation from graphs, and environmental sampling techniques. It also provides a passage to read and answer questions on India's challenges after independence regarding economic development, ethnic diversity, and center-state relations.

Uploaded by

Rizwana Abootty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
190 views80 pages

Ugc Net - Computer Science - Free Solved Paper - English Version

This document provides a mock test paper for the UGC NET exam with 3 sections. Section 1 has 50 objective questions worth 2 marks each. Section 2 also has 50 objective questions worth 2 marks each. Section 3 has 75 objective questions worth 2 marks each. The total marks for the exam are 350 and each section has a time limit of 2.5 hours. The document provides sample questions from Section 1 of the exam on topics like communication, English language, data interpretation from graphs, and environmental sampling techniques. It also provides a passage to read and answer questions on India's challenges after independence regarding economic development, ethnic diversity, and center-state relations.

Uploaded by

Rizwana Abootty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 80

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET,

NIMCET, C TET

UGC NET - COMPUTER SCIENCE


MOCK TEST PAPER

PAPER - I This paper contains 50 objective type


questi ons. Each question carries 2 marks.
Attempt al l the questions .

PAPER - II This paper contains 50 objective type


questions . Each question carries 2 marks.
Attempt all the questions.

PAPER -III This paper contains 75 objective type


questions. Each questi on carries 2 marks.
Attempt all the questions.

(According to the NEW PATTERN)


Pattern of questions : MCQs
Total mar ks

: 350

Dur ation of test

: Paper I & II - 2.5 Hour s


Paper III - 2. 5 Hours

For IIT-JAM, JNU, GATE, NET, NIMCET and Other Entrance Exams

1-C-8, Sheela Chowdhary Road, Talwandi, Kota (Raj.) Tel No. 0744-2429714

Web Site www.vpmclasses.com [email protected]

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 1

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

PAPER I
1.

A manager must discover various analy ze the reasons for their occurrence and
take preventive steps.
(A) Cause to communication
(B) Barrier to communication
(C) Both (a) and (b)
(D) None

2.

It is communication of feelings, emotions, attitudes, and thoughts through body movements


/ gestures / eye contact, etc. w hich type of communication is this?
(A) Oral communication
(B) Written communication
(C) Non verbal communication
(D) None

3.

Which of the follow ing is a part of the English language w hich helps us to understand
sounds of various alphabets?
(A) Phonetics
(B) Homophones
(C)Both (a) and (b)
(D) None
Questions 4-8 Study the follow ing graph carefully to answ er the given questions.
PRODUCTION OF TWO COMPANIES A AND B ( IN CRORE UNITS) OV ER THE GIVEN
YEARS

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 2

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

4.

For Company A, how much is the percent increase in production in 2000 from 1999?
(A) 0.25
(B) 2.5
(C) 25
(D)12.5

5.

How many units is the total production of Company A for the giv en years?
(A) 9 crores
(B) 17.75 crores
(C) 12.25 crores
(D) 11 crores

6.

What is the difference in units produced by the tw o companies in 1999?


(A) 1,50,000,000
(B) 15,00,00,000
(C) 15,00,000
(D) 15,000

7.

How many units is the approximate average production of Company B for the given years?
(A) 3 crores

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 3

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(B) 2.55 crores


(C) 2.75 crores
(D) 2.25 crores
8.

In w hich year did both the companies have no change in production from the previous year?
(A) 2000
(B) 2002
(C) 2003
(D) 2004

9.

If sampled in reconnaissance mode, data limitation requires use of


(A) Maximum
(B) Minimum
(C) Both (a) and (b)
(D) None

10.

If estimating average concentrations is planned


(A) Exposure units must be defined
(B) Sufficient samples are required
(C) Both (a) and (b)
(D) None

11.

Which Can be used to evaluate if constituents in subsurface are correlated and have the
same or different sources?
(A) Scatter plots
(B) Ratio plots
(C) Multivariate plots
(D) None

12.

Which of the follow ing Can be used to evaluate if ratios of constituents in subsurface are
similar or different from those in indoor/outdoor air?
(A) Scatter plots

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 4

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(B) Ratio plots


(C) Multivariate plots
(D) None
13.

Which of the follow ing collection techniques w ere used as the primary research methods for
this study?
(A) Qualitativ e
(B) Quantitative
(C) Both (a) and (b)
(D) None

14.

in order to organize, classif y and analyze the gathered information, used


(A) Graphs
(B) Statistics
(C) Both (a) and (b)
(D) None
Direction (15-19) The strength of Indian Democracy lies in its tradition, in the fusion of the
ideas of democracy and national independence w hich w as the characteristic of the Indian
Nationalist Movement long before independence. Although the British retained supreme
authority in India until 1947, the provincial elections of 1937 provided real exercise in
democratic practice before national independence. During the Pacific w ar India w as not
overrun or seriously invaded by the Japanese and after the w ar w as over, the transfer of
pow er to a government of the Indian Congress Party w as a peaceful one as far as Britain
w as concerned. By 1947 'Indianisation' had already gone far in the Indian Civ il Service and
Army, so that the new government could start w ith effective instruments of central control.
After independence, how ever, India w as faced w ith tw o vast problems; the first, that of
economic grow th from a very low level of production and the second w as that of ethnic
diversity and the aspirations of sub nationalities. The Congress leadership w as more aw are
of the former problem than of the second. As a new political elite w hich had
rebelled not only against the Britis h Raj but also against India's old social order, they w ere
conscious of the need to in itiate economic development and undertake social reforms, but

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 5

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

as nationalists w ho had led a struggle against the alien rule on behalf of all parts of India,
they took the cohesion of the Indian nation too much for granted and underestimated the
centrifugal forces of ethnic division, w hich w ere bound to be accentuated rather than
diminished as the popular masses w ere more and more draw n into politics. The Congress
party w as originally opposed to the idea of recognizing any division of India on a linguistic
basis and preferred to retain the old provinces of British India w hich often cut across
linguistic boundaries. How ever, this w as later conceded as the basis for a federal 'Indian
Union'. The rights granted to the States created new problems for the Central Government.
The idea of making Hindi the national language of a united India w as thw arted by the
recalcitrance of the speakers of other important Indian languages and the autonomy of the
States rendered central economic planning extremely difficult. Land reforms remained under
the control of the States and many large-scale economic projects required a degree of
cooperation betw een the Central Government and one or more of the States w hich, it w as
found, w as impossible to achieve. Coordination of policies w as difficult even w hen the
Congress party was in pow er both in the State and at the Centre. When a Congress
Government in Delhi w as confronted w ith non-Congress parties in office in the States, it
became much harder.
15.

Which of the follow ing problems w as India faced w ith after Independence ?
(A) Military attack from a country across the border.
(B) Lack of coordination betw een the Central and State Governments.
(C) Improper coordination of various Government policies
(D) Increasing the production from a very low level

16.

Which of the follow ing issues w as not appropriately realized by the Central Government.
(A) Ethnic div ersity of the people
(B)A national language for the country
(C) Implementation of the formulated policies
(D) Centre -State relations

17.

Why w as central economic planning found to be difficult?

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 6

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(A) Multiplicity of States and Union Territories


(B) Lack of coordination in different Government departments
(C) Autonomy given to the States in certain matters
(D) Lack of w ill in implementing land reforms
18.

Why w as the linguistic reorganization of the State accepted?


(A) The States w ere not cooperating w ith the Central Government
(B) Non- Congress Governments in the States demanded such a reorganization of the
States
(C) No common national language emerged
(D) Strong pressure from the States w as exerted on the Central Government to create such
States

19.

Which, according to the passage, can be cited as an exercise in democratic practice in India
before Independence?
(A) The handing over of pow er by the British to India
(B) The Indianisation of the Indian Civil Service
(C) A neutral role played by the Army
(D) None of the above

20.

The information to be collected in survey method are related to


(A) Present Position
(B) Aims of the research
(C) The attainment of aim of research
(D) All of the above

21.

Research is done for


(A) Know ledge of research process
(B) Solving a business problem
(C) Interest in research
(D) Experience

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 7

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

22.

A research problem is feasible only w hen


(A) It is researchable
(B) It has some utility
(C) It is new
(D) All of the above

23.

One of the essential characteristics of research is


(A) Sensitivity
(B) Generaliz ability
(C) Usability
(D) Replicability

24.

Identify the main Principle on w hich the Parliamentary System operates.


(A) Responsibility of Executive to Legislature
(B) Supremacy of Parliament
(C) Supremacy of Judiciary
(D) Theory of Separation of pow er

25.

The reservation of seats for w omen in the Panchayat Raj Institutions is :


(A) 30% of the total seats
(B) 33% of the total seats
(C) 33% of the total population
(D) None

26.

Match list I w ith list II and select the correct from the code given below :
List I ( Institutions)

List II (Locations)

1. Indian Veterinary Research Institute

i. Pune

2. Institute of Armament Technology

ii. Izat Nagar

3. Indian Institute of Science

iii. Delhi

4. National Institute for Educational Pannesi and Adminis trators

vi. Bangalore

(A) 1-ii, 2-i, 3-iv, 4-iii


(B) 1-ii, 2-iv, 3-ii, 4-iii

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 8

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) 1-ii, 2-iii, 3- I, 4- iv


(D) 1-iv, 2-iii, 3-ii, 4-i
27.

Who w as chairman of the UGC committee 1969 appointed for administrative legislation of
the universities?
(A). Dr. Zakir Hussain
(B) Dr. P B Gajendragadkar
(C) Dr. L S Mudaliar
(D) Dr. Radha Krishnan

28.

UGC has launched career oriented program in


(A) 1964-65
(B) 1994-95
(C) 1997-98
(D) 1980-81

29.

The prime minister of India is appointed from ______


(A) The leading Party in Lok Sabha
(B) The Leading Party in Rajya Sabha
(C) The leading party in Lok Sabha and Rajya Sabha combined
(D) None of the above

30.

The study of interrelations betw een Organism and their environment is called___
(A) Biosphere
(B) Ecology
(C) Synecology
(D) Autecology

31.

The ter m ICT is now also used to refer to the convergence of


(A) Audio vis ual
(B) Telephone netw ork

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 9

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) Both (a) and (b)


(D) None
32

Which w as the first National Park established in India?


(A) Anshi National Park
(B) Gir National Park

(C) Kanha National Park


(D) Jim Corbett National Par k
33

Fossil Fuels include


(A) Oil
(B) Natural Gas
(C) Coal
(D) All of the above

34

Noise in excess of ______ is called noise pollution


(A) 40-65 db
(B) 60-70 db
(C) 80-100 db
(D) None of the above

35

Effectiveness of teaching depends on ____


(A) Handw riting of Teacher
(B) Speaking ability of Teacher
(C) Qualification of the Teacher
(D) Subject Understanding of the Teacher

36

Verbal Guidance is least effective in the learning of ____


(A) Aptitudes
(B) Skills

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 10

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) Attitudes
(D) Relationship
37

The participation of students w ill be maximum if ____ method is used for teaching.
(A) Text Books
(B) Discussion Method
(C) Conference Method
(D) Lectures

38

The primary responsibility of the teachers adjustment lies w ith


(A) The Students
(B) The Principal
(C) The Community
(D) The Teacher himself

39.

The First Kindergarten w as started by


(A) William James
(B) A D Clinton
(C) Freidrich Forebel
(D) J H Hills

40.

In follow ing questions, number series is given. One of the numbers in each series is w rong.
After searching w rong number find the correct number in its place.
510, 254, 126, 64, 30, 14, 6
(A) 252
(B) 62
(C) 130
(D) 9

41.

Which reasoning deter mines w hether the truth of a conclusion can be determined for that
rule, based solely on the truth of the premises?
(A) Deductive
(B) Inductive

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 11

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) Abductive
(D) All
42.

Insert the missing number or letter from among the given alternatives.

(A) 140
(B) 280
(C) 875
(D) 925
43.

In the follow ing question assuming the given statements to be true, find out w hich of the tw o
assumptions I and II given below them is/are definitely true give answ er as.
(A) Only assumption I is implicit
(B) Only assumption II is implicit
(C) Either I or II is implicit
(D) Neither I nor II is implicit
(E) Both I and II are implicit
Statement: The State government has decided to appoint four thousand primary school
teachers during the next financial year.
Assumptions:
I. There are enough schools in the state to accommodate four thousand additional pr imary
school teachers.
II. The eligible candidates may not be interested to apply as the government may not finally
appoint such a large number of primary school teachers.

44.

What is the latest w rite-once optical storage media?


(A) Digital paper
(B) Magneto-optical disk

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 12

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) WORM disk


(D) CD- ROM disk
45.

Which of the follow ing identifies a specific w eb page and its computer on the Web?
(A) Web site
(B) Web site address
(C) URL
(D) Domain Name
Direction (46-47) In the follow ing figure, rectangle, square, circle and triangle represents
the regions of w heat gram, maize and rice cultivation respectively. On the basis of the
figure, answer the follow ing questions.

2
4
5

9
7
6 10

11
46.

Which of the area is cultivated for w heat and maize only?


(A) 8
(B) 6
(C) 5
(D) 4

47.

Which of the area is cultivated for maize only?


(A) 10
(B) 2
(C) 3
(D) 4

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 13

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

48.

Pointing to a photograph. Bajpai said, He is the son of the only daughter of the father of my
brother. How Bajpai is related to the man in the photograph?
(A) Nephew
(B) Brother
(C) Father
(D) Maternal Uncle

49.

Light Year is a unit of:


(A) Intensity of light
(B) Distance
(C) Time
(D) Planetary motion

50.

Tsunamis are huge sea w aves caused by :


(A) Earthquakes
(B) Volcanoes
(C) Winds
(D) Icebergs

PAPER II
1.

The output of a logic gate is 1 when all its inputs are at logic 0. The gate is either
(A) A N AND or an EX-OR
(B) An OR or an EX-NOR
(C) An AND or an EX-OR
(D) A NOR or an EX-NOR

2.

What is the s implification of the following Boolean expression in a Product-Of-Sum form ?

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 14

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(A) Out = (A+B+ NOT(C)) (A+NOT(C)+ D) (C+NOT(D))


(B) Out = (A+B) (A+NOT(D)) (B+NOT(C)+D)
(C) Out = (B+C+ NOT(D)) (A+C+ NOT(D)) ( NOT(C)+D)
(D) Out = (A+NOT(B)+D) (C+D) (B+NOT(C)+D)
3.

What is the appropriate form for the given k-map?

Z
WX

1 0 0 1
0 1 0 1
0 1 1 1
1 0 0 1

(A) F(W,X,Y,Z) = m (0,3,4,6,8,10,11,12,14)


(B) F(W,X,Y,Z) = m (0,2,5,6,8,10,13,14,15)
(C) F(W,X,Y,Z) = m (1,2,5,6,8,9,11,14,15)
(D) F(W,X,Y,Z) = m (1,2,3,7,9,10,11,14,15)
4.

How m any fibres are required by a unidirectional and bidirectional ring res pectively,

to s upport their working traffic?


(A) 1 and 1
(B) 2 and 1
(C) 2 and 2
(D) 1 and 2

5.

Find odd one out related to transm ission m edia cables ?


(A) Bas ic rate ISDN can transmit data at a rate of 512 kilobits per second on an
existing local telephone line.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 15

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(B) A T1 line is a dedicated telephone connection of 24 channels .


(C) A T1 channel can be configured to carry either voice or data traffic.
(D) Cable modems provide high-s peed transmiss ion over cable TV lines and are
s hared by many us ers .
6.

Mechanism to protect private networks from outside attack is


(A) Firewall
(B) Anti virus
(C) Digital signature
(D) Form atting

7.

What does a metric of 16 hops represent when using RIP?


(A) Num ber of hops to the des tination
(B) Des tination unreachable
(C) Num ber of routers
(D) Bandwidth

8.

If the 8085 adds 87H and 79H, s pecify the contents of the accumulator and the
s tatus of the S, Z, and CY flag?
(A) 10H; S =1, Z = 0, C Y = 1
(B) 01H; S =0, Z = 0, C Y = 1
(C) 00H; S =0, Z = 1, C Y = 1
(D) 11H; S =1, Z = 1, C Y = 0

9.

If the s tack pointer is initialized with (4FEB) H, then after execution of Push operation
in 8085 microprocess or, the Stack Pointer s hall be
(A) 4FE A
(B) 4FEC
(C) 4FE9
(D) 4FED

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 16

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

10.

If an input and output port can have the sam e 8-bit address how does the 8085
differentiate between the ports ?
(A) The input port requires the WR and the output port requires the RD s ignal
(B) The input port requires the RD and the output port requires the WR s ignal
(C) The input port and output port requires low I/O
(D) None of the above

11.

Cons ider the grammar given below


E E+E | E*E | E-E | E /E | E^E | (E) | id

As s ume that + and have the sam e but leas t precedence, * and / have the next higher
precedence but the same precedence and finally ^ has the highes t precedence. Assum e +
and associate to the left like * and / and that ^ ass ociates to the right. Choose the correct
s tatem ent with res pect to relations for the ordered pairs (^,^) , (-,-) , (+,+) , (*,*) in the
operator precedence table constructed for the gramm ar
(A) all <
(B) all >
(C) <,>,=,<
(D) <,>,>,>
12.

P, Q, R are three languages . If P and R are regular and if PQ=R, then


(A) Q has to be regular
(B) Q cannot be regular
(C) Q need not be regular
(D) Q has to be a CFL

13.

Which of the following conversion is not poss ible (algorithm ically)?


(A) regular grammar to context-free gramm ar
(B) nondeterm inis tic FSA to determ inis tic FSA
(C) nondeterminis tic PDA to determinis tic PDA
(D) nondeterminis tic TM to determ inistic TM

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 17

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

14.

The following are the set of processes with their res pective CPU burs t time (in
m illiseconds ).
Processes CPU

Burst time

P1

10

P2

P3

What will be the average waiting time if the process arrived in the order: P1, P2 &
P3?
(A) 6.82 unit
(B) 7.56 unit
(C) 8.33 unit
(D) 9.97 unit
15.

Match the following:


Column I

Column II

p)

tim e s haring (1) Program firs t executed when a computer is turned on

q)

process

(2) Part of an operating s ys tem that comm unicates with the us er

r)

boots trap

(3) Technique that allows m ultiprocessing on a computer with a s ingle

s)

s hell

(4) Acti vity of executing a program

(p)

(q)

(r)

(s )

(A)

(4),

(1),

(2),

(3)

(B)

(3),

(4),

(1),

(2)

(C)

(2),

(3),

(4),

(1)

(D)

(1),

(4),

(2),

(3)

CPU

16.

In Priority Scheduling a priority number is ass ociated with each process. The CPU is
allocated to the process with the highes t priority. The problem of s tarvation is
resolved by which of the following?

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 18

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(A) Term inating the process .


(B) Aging
(C) Mutual Exclusion
(D) Semaphore
17.

Which of the following does not support for Page-Stealer process ?


(A) It is a kernel process that makes room for the incom ing pages
(B) It is created by the Kernel at the s ys tem initialization and invokes it throughout
the lifetim e of the s ys tem.
(C) Kernel locks a region when a process faults on a page in the region, s o that
page s tealer cannot s teal the page, which is being faulted in.
(D) All are correct.

18.

If you type cat prog.c at a UNIX comm and prompt, which of the following

s equences of s ys tem calls would be invoked?


(A) The s hell calls fork(); the child process calls exec() and the parent calls wait()
(B) The s hell calls fork(); the child calls wait() and the parent calls exec()
(C) The s hell calls exec() and then wait() and then fork()
(D) The s hell calls wait() then fork(), creating a child which calls exec()
19.

The 4.3BSD operating sys tem is the vers ion of:(A) UNIX
(B) C
(C) C#
(D) C++

20.

The m echanism of unders tanding what cus tom er wants , analyzing needs , assess ing

feasibility are provided by


(A) Analyzing process
(B) Requirem ent engineering
Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 19

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) Sys tem m odeling


(D) Checkin g process
21.

Which of these des cribe the activity of a contract review?


(A) Evaluation of the target m arket
(B) Evaluation of the development ris ks
(C) Evaluation of the weather during the s oftware developm ent.
(D) Evaluation of the s taffs personal background

22.

Ins ufficient identification is a


(A) Technology-related problem
(B) Process-related problem
(C) People-related problem
(D) Product-related problem

23.

Which of the following is a formal reference point that measures s ys tem

characteristics at a s pecific time?


(A) Benchmark
(B) Bas eline
(C) Functional
(D) Control
24.

Five nines of reliability refers to


(A) Fi ve s oftware engineering practices that m us t be in place and assess ed at level
9 in order to ensure reliability
(B) A product that is operational 99.999% of the time
(C) A product that fails one tim e in 10,000 days
(D) A product which fails only five tim es in 99,999 days

25.

Which of the following is not a static tes ting tool?


(A) Static analyzers
(B) Code inspectors

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 20

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) Output com parators


(D) Standard enforces
26.

Match the followingColum n I

Column II

p)

Dis parate data

(i) Archive data

q)

Non volatile data

(ii) Level of detail

r)

Data granularity

(iii) Query and analys is


(iv) Production data

27.

(p)

(q)

(r)

(A)

(i),

(iv),

(ii)

(B)

(iii),

(ii),

(iv)

(C)

(ii),

(i),

(iii)

(D)

(iv),

(iii),

(ii)

Select the options due to which credit theft is im possible with smart card
I.

Key to unlock encrypted information required

II.

No phys ical s ignature on the card

III.

There is no external account num ber on the card

IV.

Sm art cards can be us ed with only acquainted merchants

(A) Only I and II


(B) Only II and III
(C) Only I and III
(D) Only I and IV
28.

Am azon.com comes under the following m odel(A) B2B


(B) B2C
(C) C2C
(D) C2B

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 21

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

29.

30.

Match the following:


Column I

Column II

p)

FAT12

(i) 1996 (Windows 95 OSR2)

q)

FAT16

(ii) 1977 (Micros oft Dis k BASIC)

r)

FAT32

(iii) 1988 (MS-DOS 4.0)

(p)

(q)

(r)

(A)

(iii),

(i),

(ii)

(B)

(iii),

(ii),

(i)

(C)

(ii),

(iii),

(i)

(D)

(i),

(iii),

(ii)

Which macro s ends an output message to the debug window of compile r:


(A) COUT
(B) FOUT
(C) TRACE
(D) Dis play

31.

In windows95 which tool is us ed to kill errant hidden process es?


(A) Tas k Manager
(B) Process Manager
(C) PVIEW
(D) Explorer

32.

Which ques tion corres ponds bes t to the following query?


SELECT CID, CDUR - 1,' = PRICE'
FROM COURSES
ORDER BY 2
(a) Select three colum ns from the COURSES table, of which the third one has a constant
value, i.e. = PRICE. Leave an em pty line after every s econd line.
(b) Select two columns from the COURSES table, the s econd one gets as title = PRICE.
Sort the data according to the second column, in ascending order.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 22

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(c) Select three colum ns from the COURSES table, of which the third one has a cons tant
value, i.e. = PRICE. Sort the data according to the s econd column, in as cending order.
(d) Select two columns from the COURSES table, of which the second one has a cons tant
value, i.e. = PRICE. Sort the data according to the s econd column, in as cending order.
33.

. A modification to the databas e express ed in terms of a view m us t be translated to the


(A) Actual relation in the conceptual model of the database
(B) Queries in the actual database
(C) Relations of all the views of that database
(D) Need not be translated and the view of a databas e accommodates the modification

34.

If D 1, D 2 .. D n are domains in relational m odel then the relation is a table which is a s ubset of

--(A) { D 1, D2 .. Dn}
(B) D 1 x D 2 x . Dn
(C) D 1 U D2 U ..Dn
(D) Ma ximum { D1, D 2 .. Dn}
35.

If the in order and pre order travers al of a binary tree are DBFEGHAC and

ABDEFGHC res pectively then, the post order traversal of that tree is
(A) DFGABCHE
(B) FHDGEBCA
(C) DFHGEBCA
(D) CGHFEDBA
36.

n elem ents of a queue are to be revers ed using another queue. The number of

ADD and REMOVE required to do so is ,


(A) 2*n
(B) 4*n
(C) n
(D) the task cannot be done

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 23

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

37.

Prims algorithm is a m ethod available for finding out the minimum cost of a

s panning tree. Its tim e com plexity is given by:


(A) O(n*n)
(B) O(n logn)
(C) O(n)
(D) O(1)
38.

Which of the following is a collis ion res olution technique with open address ing in the

context of has hing?


(A) Linear probing
(B) Separate chaining
(C) Folding
(D) Mid-s quare method
39.

Ma xim um num ber of children in a node in a B-tree of order m is :


(A) m
(B) m/2-1
(C) m/2+1
(D) m/2

40.

A has one share in a lottery in which there is 1 prize & 2 blanks; B has three s hares

in a lottery in which there are 3 prizes & 6 blanks : compare the probability of As s uccess to
that of Bs success as
(A) 7 : 16
(B) 16 : 7
(C) 6 : 14
(D) 14 : 6
41.

The following C code : # include < s tdio.h >


m ain ( )
{ file * FP ;

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 24

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

FP = fopen ( trial , r );
}
FP points to :(A) Firs t character in the file
(B) A s tructure which contains a char pointer to the firs t character in the file.
(C) Nam e of the file.
(D) None.
42.

The eccentricity of node labeled 5 in the graph s hown below is :

(A) 6
(B) 7
(C) 8
(D) 5
43.

Let M be a 3 3 , adjacent m atrix corres ponding to a given graph of 3 nodes labeled

1, 2, 3. If entry (1, 3) in M3 is 2, then the graph could be

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 25

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(A)

(B)

(C)

(D)

44.

Error detection at the data link level is achieved by:(A) Bit s tuffing
(B) Cyclic redundancy check.
(C) Hamm ing codes
(D) Equalization

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 26

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

45.

How m any characters per second (7 bits + 1 parity) can be transmitted over a 2400

bps line if the trans fer is s ynchronous (1 s tart and 1 s top bit)?
(A) 300
(B) 240
(C) 250
(D) 275
46.

Represent (54.78)10 in norm alized binary floating num ber.


(A) S = 1 . M = 011011000110, E = 11010011
(B) S = 0. M = 101101100011, E = 10000100
(C) S = 0, M = 1010011 10010, E = 10011011
(D) S =1, M = 101101100011, E = 10000100

47.

Which of the following s tatem ents are true?


(i) Cons tructors may be declared in private, public or protected section.
(ii) An object with a cons tructor or des tructor can not be used as a m em ber of a
union.
(iii) There can be virtual cons tructors .
Choose the correct option:
(A) Only (i) is true
(B) Both (i) and (ii) are true
(C) Only (iii) is true
(D) Only (ii) is true

48.

What happens when an exception is not caught?


(A) Code in the catch block is generated.
(B) An error occurs .
(C) The program is aborted.
(D) The program executes normally.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 27

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

49.

______ is the abstraction process of introducing new characters to an exis ting class
of objects to create one or m ore new class es of objects .
(A) Specialization
(B) Generalization
(C) Abs traction
(D) Aggregation

50.

What will be the result of the following addition?


(3BCA.5078)16 + (9EBD.97F3)16 + (5FB .E2C)16
(A) (E082.CB2C)16
(B) (14916.9241)16
(C) (E083.CB2B)16
(D) (E916.9241)16

PAPER III
1.

As s ertion (A): A digital multiplexer can also be us ed to implement combinational


logic functio n
Reas on (R): In a com binational circuit, the current output depends on the previous
outputs also
(A) Both A and R are individually true and R is the correct explanation of A
(B) Both A and R are individually true, but R is not the correct explanation of A
(C) A is true, but R is false
(D) A is fals e, but R is true

2.

'n' Flip flops will divide the clock frequency by a factor of


2

(A) n

(B) n

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 28

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) 2

(D) log (n)


3.

The content of a 4-bit regis ter is initially 1101. The regis ter is shifted 2 tim es to the
right with the serial input being 1011101. What is the content of the regis ter after
each s hift?
(A)1110, 0111
(B) 0001, 1000
(C)1101, 1011
(D) 1001, 1001

4.

As s ume that there are 32 input-output s toring units , 32 functions to select and 16

data routes to s elect. As s ume control memory of 16384. How m any encoded bits are
required ass um ing that there is a next address field at the microins tructions ? Two MUX are
used one at input and one at output for a s et of 8 regis ters.
(A) 26
(B) 27
(C) 28
(D) 29
5.

Match the following categories with res pect to 8085 ins tructions :
Colum n I

Column II

p) Data trans fer ins truction

(i) CALL

q) Arithm etic Ins truction

(ii) CMP

r) Logical Ins truction

(iii) STA

s ) Branch Ins truction

(iv) DCR

(p)

(q)

(r)

(s )

(A)

(ii),

(iii),

(iv),

(i)

(B)

(iii),

(ii),

(i),

(iv)

(C)

(i),

(iii),

(ii),

(iv)

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 29

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(D)
6.

(iii),

(iv),

(ii),

(i)

Find odd one out:


(A) AN AR
(B) PCHL
(C) ORAR
(D) CMA

7.

The PCI bus is the important bus found in all the new Pentium s ys tems becaus e
I.It has plug and play characteris tics
II.It has ability to function with a 64 bit data bus
III.Any Microprocessor can be in terfaced to it with PCI controller or bridge
(A) Only I and II
(B) Only II and III
(C) Only I and III
(D) All of the above

8.

A s ingle regis ter to clear the lower four bits of the accum ulator in 8085 ass embly
language is?
(A) XRI 0FH
(B) ANI F0H
(C) XRI F0H
(D) ANI 0FH

9.

For correct behaviour during recovery, undo and redo operation m us t be


(A) Com mutative
(B) As s ociative
(C) Idempotent
(D) Dis tributive

10.

The part of a databas e management s ys tem which ensures that the data remains in
a cons is tent s tate is ,

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 30

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(A) Authorization and integrity manager


(B) Buffer manager
(C) Transaction manager
(D) File manager
11.

Is olation of the trans actions is ensured by


(A) Trans action management
(B) Application programmer
(C) Concurrency control
(D) Recovery m anagement

12.

Which of the following are factors in deciding on databas e dis tribution strategies?
I.Organizational forces
II.Frequency of data access
III.Reliability needs
(A) Only I and II
(B) Only II and III
(C) Only I and III
(D) All of the above

13.

One way to generate, s tore and forward mess ages for completed transactions to be
broadcas t across a network is through the use of
(A)Stored procedures
(B) Triggers
(C) Functions
(D) SQL s tatem ents

14.

Evaluate these two SQL s tatements and determine what is true about them ?
I.SELECT las t_nam e, salary , hire_date
FROM E MPLOYEES
ORDER BY s alary DESC;

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 31

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

II.SELECT las t_name, salary, hire_date


FROM E MPLOYEES
ORDER BY 2 DESC;
(A) The two s tatements produce identical results .
(B) The s econd statem ent returns a syntax error.
(C) There is no need to specify DESC becaus e the results are sorted in des cending
order by default.
(D) The two s tatements can be m ade to produce identical res ults by adding a
colum n alias for the s alary column in the s econd SQL s tatement.
15.

Which s yntax turns an exis ting cons traint on?


(A)ALTER TABLE table_nam e
ENABLE cons train t_name;
(B)ALTER TABLE table_name
STATUS = EN ABLE CONSTRAINT cons traint_name;
(C)ALTER TABLE table_nam e
ENABLE CONSTRAINT cons traint_nam e;
(D)ALTER TABLE table_nam e
STATUS ENABLE CONSTR AINT cons traint_name;

16.

What is the type of Oracle backup in which all uncommitted changes have been
removed from the data files ?
(A) Full backup
(B) Cons istent backup
(C) Incons is tent backup
(D) Differential backup

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 32

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

17.

Cons ider the diagram

A Euler circuit is ,
(A) FDCABF
(B) FDBACDF
(C) FDCACF
(D) None of thes e
18.

If Flags are individual flip-flops , they can be observed on


(A) Multiplexer
(B) Os cilloscope
(C) Stack mem ory
(D) None of thes e

19.

When a C/SDK program in message handling begins , it immediately registers at


least one window class using.
(A) Regis ter class ( ) API function and a RGSCLASS data s tructure
(B) Regis ter class ( ) API function and a WNDCLASS data s tructure
(C) Window Register class ( ) AP I function and a RGSCLASS data s tructure
(D) Window Register class ( ) AP I function and a WNDCLASS data s tructure

20.

For window message com ponents , which one is not correct.?


(A) Window m essage has an uns igned integer containing the actual m ess age.
(B) LPAR AM is a 4-byte parameter
(C) WPAR AM is a 32-Bits param eter in win 32.
(D) WPAR AM contains additional data, required to handle the mess age.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 33

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

21.

Which one of the following is not a s ubdirectory directly under the root?
(A) de v
(B) var
(C) include
(D) None of thes e

22.

What is /are false about UNIX operating s ys tem ?


(i) Unix consider all files to be a continuous sequence of characters .
(ii) Unix treat phys ical devices as if they are files & hence programs can access

devices with sam e s yntax as files .


(iii) Unix is multi us er, multi-programmed but not time s cheduled operating s ystem .
(iv) Programs written using UNIX can not be run on a variety of architecture.
(A) (i), (ii), (iv)
(B) (ii), (iii), (iv)
(C) (iii), (iv)
(D) (ii), (iv)
23.

Given LPP

m ax z = 6x1 + 4 x2

Subject to

x1 + 2x2 720
2x1 + x2 780
x1 320
x1, x2, x3 0

The optional value of objective function will be


(A) 2550
(B) 2560
(C) 2540
(D) None of thes e

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 34

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

24.

The s et {(x, y) : y < x2 + 2x + 1} is


(A) Conve x s et
(B) Non convex set
(C) Convex polyhedron
(D) None of thes e

25.

A D MS X has four s ymbols x1, x2 , x3 , and x4 with P(x1) =

P(x4) =

1
. What is the entropy for Shannon fano coding?
8

1
1
, P(x2) = , and P(x3) =
2
4

(A) 2.75
(B) 1.75
(C) 0.75
(D) 1.05
26.

A pus h down autom ation has


(A) Infinite s et of pus hdown s ymbols
(B) Only one s pecial pushdown s ym bol
(C) Finite set of input s ymbols
(D) all of thes e

27.

In TM, the tape has k-tuple of tape s ym bol, where k is ,


(A) Num ber of tracks
(B) Number of alphabets
(C) Set of tape s ym bols
(D) None of thes e

28.

The given language


L = { a m b m : m positive} is ,
(A) Regular
(B) Not regular

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 35

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(C) unpredictable
(D) None of thes e
29.

XML content is s tructured as ,


(A) Acces sible by Application
(B) Inaccessible by us er
(C) Containing formatted content
(D) None of thes e

30.

The Breadth - first s earch Tree are used in,


(A) Banking
(B) Defense
(C) Law
(D) All of thes e

31.

Which of the following pars er is m ore powerful and expensive?


(A) Sim ple LR
(B) Look ahead LR
(C) Canonical LR
(D) None of thes e

32.

Which of the following is not the required condition for binary s earch algorithm?
(A) The lis t m us t be s orted
(B) there should be the direct access to the m iddle elem ent in any s ublis t
(C) There mus t be mechanism to delete and/or ins ert elements in lis t
(D) none of above

33.

A BCNF is
(A) Los s less join and dependency pres erving
(B) Loss less join and not dependency pres erving
(C) Not loss less join and dependency preserving
(D) None of thes e

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 36

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

34.

Functional dependencies are generalization of


(A) Ke y dependencies
(B) Relational dependencies
(C) Database dependencies
(D) Functional dependencies

35.

The network of the given figure is :


(A) a s ingle layer feed-forward neural network
(B) an autoass ociative neural network
(C) a m ultiple layer neural network
(D) a m ultiple layer feed-forward neural network

36.

What can we find by us ing the following formula?


Total Fixed Cos ts
Contribution per unit
(A) Budgeted Profit
(B) Margin of Safety
(C) Break-Even Output
(D) Budgeted Output

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 37

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

37.

The network s hown in the following Figure is trained to recognize the characters H

and T as s hown below:

If the following pattern was given

What would be the output of the network?

(a)

(b)

(c)

(d)

38.

OR

_________protocol is typically used for error reposing.


(A) DNS

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 38

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(B) ICMP
(C) POP-3
(D) IMCP
39.

Macrom edia Dream weaver, Micros oft Frontpage are the exam ples of which type of

Authoring tools ?
(A) Pure code based editor
(B) Pure WYS IWYG editor
(C) Com pound editor
(D) None of thes e
40.

_______ is appropriate to use as m ultipurpos e input device when combined with a

program for character recognition.


(A) Stylus & grid
(B) light pen
(C) Joys tick & track ball
(D) Mous e
41.

When a disk is form atted, the OS creates areas on its s urface:


(i) FAT (File Allocation Table)
(ii) Root Folder
(iii) Page Allocation Table
(iv) Data Area
(v) Data Sector
Choose the correct code.
(A) (ii), (iii), (i v)
(B) (i), (ii), (iii), (iv), (v)
(C) (i), (ii), (iv)
(D) (i), (ii), (iii), (iv)

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 39

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

42.

In contiguous memory allocation, each process is contained


(A) In a s ingle contiguous section of mem ory
(B) In a double contiguous s ection of memory
(C) In a m ultiple contiguous s ection of m emory
(D) Both (A) and (B)

43.

When processing on output in XML, new line s ymbols are


(A) Copied into output as is , i.e. CR + LF for window, CR for macintosh, LF for
Unix.
(B) Converted to single CR s ymbol
(C) Converted to s ingle LF s ymbol
(D) Dis carded

44.

How can you open a link in a new brows er window?


(A) < a hrsf = url new>
(B) < a href = url target = -blank >
(C) <a href = url target = new>
(D) None of thes e

45.

Using which tag we ins ert a Java s cript in HTML page?


(A) < s ave s cript type = te xt/javes cript > </javas cript>
(B) < s cript type = te xt/javas cript></js cript>
(C) <Js cript type = text/javas cript> </js cript>
(D) <HTML s cript type = text/javas cript> </HTML script>

46.

Which of the following aggregate m ethods does not work if hiring and lay off are
possible?
(A) The linear rule
(B) Sim ulation
(C) The m anagement coefficients model
(D) The transportation method.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 40

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

47..(i) DPSH with eight phases will enable the bit rate to be tripled over the corres ponding
two phas e modulation.
(ii) The diam eter of a s ingle m ode fiber is generally greater than the diameter of a multi
m ode fiber.
Which of the following option is correct w.r.t the above s tatem ent?

48.

(A) (i) T

(ii) F

(B) (i) F

(ii) F

(C) (i)F

(ii) T

(D) (i) T

(ii) T

If the . Bit in X.25 s tandard is set to 1, it means that there is more than

one packet.
(A) Q
(B) D
(C) M
(D) P
49.

Match the following


(a) Time domain reflectometry

(i) transmission

(b) Frequency hopping and spread spectrum


techniques are inv olv ed in

(ii) A technique that detects cable breaks bad


taps or loose cannectors

(c) 10 base 2

(iii) Multiplexing

(d) Sharing of communication channel.

(iv) thin ethernet

Which of the following option is correct for the given m atch-ups ?


(A) (a) (ii)

(b) (i)

(c) (iv)

(d) (iii)

(B) (a) (i)

(b) (ii)

(c) (iv)

(d) (iii)

(C) (a) (iii) (b) (ii)

(c) (i)

(d) (iv)

(D) (a) (iv) (b) (i)

(c) (iii)

(d) (ii)

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 41

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

50.

What is the m aximum burs t length on a 155.52 Mbps ATM ABR connection whos e

PCR value 200,000 and whose L value is 25 s ec?


(A) 13
(B) 12
(C) 14
(D) 15
51.

Solve the minim um -span problem for the network given in Fig. The num bers on the

branches represent the cos ts of including the branches in the final network.

B 1

1
A

10

F
3

10

3
G

Find the minimum cos t for connecting the network.


(A) 16
(B) 15
(C) 17
(D) 18
52.

Cons ider the following CFG


S OB

S bA

Bb

Aa

B bS

A aS

B aBB

A b AA

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 42

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

Cons ider the following derivation


S aB
aaBB
aaBb
aabSb
aabbAb
aabbab
This derivation is
(A) A leftmos t derivation
(B) A rightmos t derivation
(C) Both leftm os t and rightm ost derivation
(D) Neither leftm os t nor rightm os t derivation
53.

Which of the following regular expression identity is true


(A) r(*) = r*
(B) (r* s *)* = (r + s)*
(C) (r + s )* = r* + s *
(D) r*s* = r* + s *

54.

Cons ider following grammar


S gA
A a A/eB/g
B gA
Equivalent left linear grammar will be
S Ag
A Aa /Bg/ g
(A) B Ag

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 43

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

S gA
A aA / gB / g
(B) B gA
S AB
A aA / gB / g
(C) B gA

(D) None of above


55.

A s elf relocating program is one which


(A) Cannot be m ade to execute in any area of s torage other than the one designated
for it at the tim e of its coding or trans lation.
(B) Cons ists of a program and relevant information for its relocation.
(C) Can itself perform the relocation of its address -sens itive portions
(D) All of the above

56.

Arrange the following s teps of structured design methodology in the correct order
(i) Firs t level factoring
(ii) Res tate the problem as a data flow diagram
(iii) Identify the input and output data elem ents
(iv) Factoring of input, output and trans form branches .
(A) (ii)-(iii)-(iv)-(i)
(B) (ii)-(iii)-(i)-(iv)
(C) (ii)-(iv)-(iii)-(i)
(D)(i)-(ii)-(iii)-(iv)

57.

Which of the following options is true for the given statem ent?
(i) On line data capture is preferable to batch data entry because it reduces human
effort in entering data.
(ii) Prototyping motivates the end us er and required his active participation.
(A) (i) T (ii) F

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 44

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

(B) (i) F (ii) T


(C) (i) F (ii) F
(D) (i) T (ii) T
58.

Software metrics cannot be applied in


(A) Cos t and size es tim ation techniques .
(B) Controlling s oftware development projects
(C) Prediction of quality levels
(D) None of thes e

59.

Which of the following s ys tems are relatively independent?


(A) Loos ely couple d s ystems
(B) Uncoupled s ystems
(C) Highly coupled s ys tems
(D) None of thes e

60.

Representation of lis t in PROLOG is


(A) {2, 4, 8, 10, 12}
(B) [2, 4, 8, 10, 12], [jack, jill, jane 1]
(C) [2, 4, 8, 10, 12]
(D) {jack, jill, jane 1}

61.

In which of the following language variables m ust begin with a capital letter and

could be followed by other letters , digits unders cores or hyphenations but no blanks ?
(A) C
(B) C++
(C) PROLOG
(D) JAVA
62.

Which of the following is a control s tructure in PROLOG?


p:- a, b, c;
(A) p:- d, e, f;

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 45

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

p:- a; b; c;
(B) p:- d; e; f;
p:- a, b, c;
(C) p:- d, e, f;

(D) None of thes e


63.

___________ is the number of arguments in a predicate form .


(A) Atom
(B) Arity
(C) Param eter
(D) Clause

64.

Which of the following is not a graphic s tandard?


(A) MHEG
(B) PREMO
(C) OAD
(D) Acrobat

65.

Arrange the following s teps of anim ation in the correct s equence.


(i) Object definitions
(ii) Generation of in-between frames
(iii) Storyboard layout
(iv) Ke yframe specifications
(A) (iii), (i), (i v), (ii)
(B) (iii), (iv), (ii), (i)
(C) (i), (ii), (iii), (iv)
(D) (iv), (ii), (i), (iii)

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 46

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

66.

__________ allow object m otion characteristics to be s pecified as part of the object


definitions
(A) Ke y fram e s ystems
(B) Parameterized s ys tems
(C) Scripting s ys tems
(D) None of thes e

67.

Which of the following s tatem ent is true?


(A) Macro definition can not appear within other m acro definition in ass embly
language programs
(B) Overlaying is us ed to run a program which is longer than the address space of
computer.
(C) Mutual m em ory can be used to accommodate a program which is longer than
the address s pace of computer.
(D) It is not poss ible to write interrupt service routines in a high level language.

68.

In anom aly detection, to detect anomalous login time for a user we us e,


(A) Monitoring s ystem calls comm ands
(B) Linux based comm ands
(C) Monitoring s hell comm ands
(D) Monitoring kernel comm ands

69.

A cus tomer is running Windows NT and has 20 GB of unform atted hard dis k space.
The cus tomer wants to format the 20 GB drive, move the data from his 5 GB drive
and label the 20 GB drive as drive B. What Windows NT applet can perform all thes e
tas ks for him ?
(A) File Adminis trator
(B) Partition Magic
(C) Drive Adm inistrator
(D) Dis k Adm inis trator

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 47

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

70.

Which of the following MPI call determines number of processes in a group


associated within?
(A) MP I_Init( )
(B) MP I_Comm_Size( )
(C) MPI_Comm _Rank( )
(D) MPI_Processes

71.

m ain( )
{
int x = 4, y = 0, z;
while(x > = 0)
{
if (x = = y)
break;
els e
printf(\n %d%d, x, y);
x- -;
y++;
}
}
What will be the output of the given program
3 1
(A) 4 0
4 0

(B) 3 1
1 3
(C) 0 4

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 48

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

3 3
(D) 4 0

72.

___________ and ______________ are the two advantages of high level


programming language
(A) Readability, Robus tness
(B) Portability, Robus tness
(C) Readability, Portability
(D) None of thes e

73.

Which of the following options is correct for the given s tatem ents?
(i) A PROLOG program does not involve a num ber of facts and rules
(ii) PROLOG is known for its in-built depth firs t s earch engine and for its cas e
in quick prototyping.
(iii) A m atching in PROLOG is performed argum ent to argum ent only.
(A) Only (i) is correct
(B) Only (ii) is correct
(C) (i) and (ii) both are correct
(D) All are correct

74.

For passing m essage buffers , which of the following encoding option follows?
(A) Pvm data in
(B) Pvm data flow
(C) Pvm data default
(D) None of thes e

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 49

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

75.

Expression
Expression

MR

Expression

10

Expression

Expression

M+

+/

Above abstract s yntax tree is for expression


(A) 10 M* / + 6 = X = M

(B) 10 M* + 6*/ = X M =
(C) 10M* + 6 / X M = =
R

(D) 10M* / + 6 X M = =
R

ANSWER KEY
PAPER- I
Question 1
2 3
4 5
6 7
8 9 10 11 12 13 14 15 16 17 18 19 20
Answer
B C A C D A B D A C A B A C D A C D B D
Question 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Answer
B D C A D A B B A B C D D C D D B D C B
Question 41 42 43 44 45 46 47 48 49 50
Answer
A D A D D D C D B A

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 50

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

PAPER - II
Question
Answer
Question
Answer
Question
Answer

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
D C B D A A B C D B D C C C B B D A A B
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
A B B B C D C B C C C C A B C D A A A A
41 42 43 44 45 46 47 48 49 50
D B A B A B D C A C

PAPER - III
Question
Answer
Question
Answer
Question
Answer
Question
Answer

1 2 3 4 5 6 7 8 9 10
C C A D D B D B C C
21 22 23 24 25 26 27 28 29 30
C C B B B C A B A D
41 42 43 44 45 46 47 48 49 50
C A C B B D A C A B
61 62 63 64 65 66 67 68 69 70
C A B C A B B C D B

11
C
31
C
51
C
71
B

12
D
32
C
52
D
72
C

13
B
33
B
53
B
73
B

14
A
34
A
54
A
74
C

15 16 17 18 19 20
C B A C B D
35 36 37 38 39 40
A C B B C A
55 56 57 58 59 60
C B C D A B
75
B

HINTS AND SOLUTIONS


PAPER I
1. (B) An effective and efficient communication system requires managerial proficiency in
delivering and receiving messages. A manager must discover various barriers to
communication, analyze the reasons for their occurrence and take preventive steps to avoid
those barriers. Thus, the primary responsibility of a manager is to develop and maintain an
effective communication system in the organization.
2. (C) non verbal communication is communication of feelings, emotions, attitudes, and thoughts
through body movements / gestures / eye contact, etc.
Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 51

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

3. (A) Phonetics is a part of the English language w hich helps us to understand sounds of various
alphabets. How an alphabet should sound is taught to us w ith the help of Phonetics.
0.25crore
100
1 crore

4.(C) % increase =

= 25 %
5.(D) for company A
1 + 1.25 + 1.5 +1.75 + 1.75 + 1.75 +2
= 11 crore
6.(A) (2.5 1) crores = 1.5 100 00 000
= 150 00 000
7.(B) Total production of B
= 2.5 + 2.5 + 3 + 2.75 +2.25 + 2.25 +2.5
= 17.75
Average production =

17.75
= 2.55
7

8.(D) In year 2004.


9.(A) If sampled in reconnaissance mode, data limitation requires use of maximums. Results are
screening level- not definitiv e.
10.(C)If estimating average concentrations is planned
Exposure units must be defined Must be considered in developing DQOs for project, or
results may not be accepted.
Suffic ient samples are required 8-10 samples w hen contaminant concentrations vary w ithin
a narrow range 10-15 sample w hen concentrations are less predictable
Calculate 90th Upper Confidence Limit ( UCL)
11.(A) Scatter plots Can be used to evaluate if constituents in subsurface are correlated and have
the same or different sources.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 52

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

12.(B) Ratio plots Can be used to evaluate if ratios of constituents in subsurface are similar or
different from those in indoor/outdoor air, potentially informing decisions about confounding
ambient sources.
13.(A) Qualitative data collection techniques w ere used as the primary research methods for this
study. Participant and direct observation plus note taking w ere the most important
techniques used.
14.(C) qualitative data collection techniques w ere used as primary research methods. How ever in
order to organize, classify and analyze the gathered information, w e used graphs and
statistics as a w ay to measure the students level of improvement through the use of reading
strategies
15.(D) Production w as at very low level.
16.(A) Ethnic diversity of the people w as not appropriately realized by the Central Government.
17.(C) Central economic planning found to be difficult because autonomy w as given to the States
in certain matters
18.(D) Because that time no common language emerged.
19.(B) The Indianisation of the Indian Civil Service , can be cited as an exercise in democratic
practice in India before Independence
20.(D) The information to be collected in survey method are related to present position, aims of the
research &the attain ment of aim of research
21. (B) Research is done for solving a business problem
22. (D) A research problem is feasible only w hen it is researchable, it has some utility, and it is
new .
23. (C) One of the essential characteristic s of research is usability.
24.(A)A parliamentary system is a system of democratic government in w hic h the ministers of the
Executive Branch derive their legitimacy from and are accountable to a Legislature or
parliament; the Executive and Legislativ e branches are interconnected. It is a political

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 53

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

system in w hich the supreme pow er lies in a body of citizens w ho can elect people to
represent them.
25.(D) The Cabinet approved the proposal for enhancing reservation for w omen in Panchayats on
from the present 33 per cent to 50 per cent w ith the provision being applicable to all seats
filled through direct election, office of chairpersons and of offic es reserved for SC/ST.
26.(A) IVRI is situated in Izat Nagar.
IAT is situated in Pune
IISc is situated in Banglore
NIEPA is situated in Delhi.
27.(B) Dr. P B Gajendragadkar w as chairman of the UGC committee 1969 appointed for
administrative legislation of the universities.
28.(B) UGC has launched career oriented program in 1994-95.
29.(A)The prime minister of India is appointed from the leading Party in Lok Sabha.
30.(B) The study of interrelations betw een Organism and their environment is called ecology.
31.(C)The ter m ICT is now also used to refer to the convergence of audio-visual and tele phone
netw orks w ith computer netw orks through a single cabling or link system.
32.(D) Jim Corbett National Park w as the first National Park established in India.
33.(D) Fossil fuels are fuels made by natural processes such as anaerobic decomposition of
buried dead organisms.
Ex. Oil, Natural gas, coal etc.
34.(C) Noise in excess of 80-100DB is called noise pollution.
35.(D) Effectiveness of teaching depends on Subject Understanding of the Teacher
36.(D) Verbal Guidance is least effective in the learning of Relationship.
37. (B) The participation of students w ill be maximum if Discussion Method is used for teaching.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 54

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

38.(D) The primary responsibility of the teachers adjustment lies w ith The Teacher himself
39.(C)The First Kindergarten w as started by Freidrich Forebel
40.(B)

62

256

128

64

32
2

16
2

8
2

30, 64 is w rong & must be replaced by 62.


41.(A) Deductive reasoning determines w hether the truth of a conclusion can be determined for

that rule, based sole ly on the truth of the premises.


42.(D) (2) 2 = 4, (5)2 = 25 425

(2) 2 = 4, (4)2 = 16 416


(3) 2 = 9, (5)2 = 25 925.
43. (A) Such decisions as given in the statement are taken only after taking the existing vacancies

into consideration. So, I implicit w hile II does not implicit.


44.(D) CD-ROM disk is the latest w rite-once optical storage media
45.(D) Domain Name identifies a specific w eb page and its computer on the Web.
46.(D) The required region is the one w hich is common only to the rectangle and circle and is not a

part of either the triangle or square


47.(C) The required region is the one which lies inside the circle but outside the rectangle, square

and triangle,
48.(D) The man in the photo is the son of the sister of Bajpai. Hence, Bajpai is the maternal uncle

of the man in the photograph.


49.(B) Light Year is a unit of distance.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 55

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

50.(A) Tsunamis are huge sea w aves caused by earthquakes.

PAPER- II
1.(D) The output of a lo gic gate is 1 when all inputs are at logic 0. The gate is either a
NOR or an EX-

NOR.
Input

Output

Truth Table for NOR Gate


Input
A
B
0
0
0
1
1
0
1
1
Truth Table for EX-NOR Gate

Output
Y
1
0
0
1

2. (C) Trans fer the seven m axterms to the map below as 0s .

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 56

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

Map the 0s as they appear left to right top to bottom on the map above. Now form groups of
cells.

The final res ult is product of the three s ums i.e.


Out = (B+C+ NOT(D)) (A+C+ NOT(D)) ( NOT(C)+D)
3.(B)

F(W,X,Y,Z) = m (0,2,5,6,8,10,13,14,15)
4.(D) SONET rings can be class ified by the routing principle and the SONET overhead
used for triggering protection switching. A ring is called a unidirectional ring if bidirectional
working s ignals follow opposite phys ical routes around a ring , while bidirectional working
s ignals in a bidirectional ring follow the sam e route. Due to this routing principle, a
unidirectional and a bidirectional ring, require one and two fibers res pectively, to support
their working traffic.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 57

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

5.(A) Each ISDN line is m ade up of separate 64-Kbps "channels " for s ending and
receiving calls , plus a channel that is used primarily for s ignaling.
6.(A) Firewall is the mechanism to protect private networks from outside attack. It is a
s oftware or hardware us ed to isolate a private network from a public network.
7.(B) Routing Inform ation Protocol is a dis tance vector routing protocol that uses hop
count as its metric. The m aximum hop count is 15. 16 hops are considered unreachable.
RIP updates are broadcas t every 30 s econds by default. RIP has an adm inistrative
dis tance of 120.
8.(C) The s um of 87H and 79H =100H. Therefore, the accum ulator will have 00H, and the
flags will be S =0, Z = 1, C Y = 1
9.(D) If the s tack pointer is initialized with (4FEB) H , then after execution of push operation
in 8085 microprocess or, s tack pointer shall be 4FED.
10.(B) The 8085 differentiates between the input and output ports of the s ame address by
the control signal. The input port requires the RD and the output port requires the WR
s ignal.
11.(D) Relations for the ordered pairs (^,^),(-,-) , (+,+), (*,*) in the operator precedence table
constructed for the gramm ar will be <,>,>,> as exponent is of right ass ociative to its elf and
+ , , * and / are left ass ociative
12. (C) Proof as follows :
1. Let P=Q=R=EMP TY SET. The equation is s atis fied. So this rules out (B).
2. Let P=R be * then any Q will satisfy the equatio n. The demands of (A) & (D) are
invalid.
3. So the answer is (C).
13. (C) It is not poss ible to convert nondeterminis tic PDA to determinis tic PDA
14. (C) CPU burs t time indicates the tim e for which the process needs the CPU.
Cons idering FCFS s cheduling
Processes CPU

Burst time

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 58

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

P1

10

P2

P3

For process es arriving in the order: P1 , P2 , P3


The Gantt Chart for the schedule is :.

P1
0

P2
10

P3
15

20

Waiting time for P1 = 0; P2 = 10; P3 = 15


Average waiting time: (0 + 10 + 15)/3 = 8.33 unit of tim e
15.(B) p) tim e s haring-Technique that allows multiprocess ing on a computer with a single
CPU
q) process-Activity of e xecuting a program
r) boots trap-Program first executed when a com puter is turned on
s ) shell-Part of an operating s ys tem that comm unicates with the user
16. (B) Aging resolves or avoids the problem of s tarvation.
17. (D) Option (A), (B) and (C) all are correct.

Page-Stealer process is the Kernel process that makes room for the incom ing

pages , by s wapping the memory pages that are not the part of the working set of a
process .

It is created by the Kernel at the s ystem initialization and invokes it throughout the

lifetime of the s ys tem .

Kernel locks a region when a process faults on a page in the region, s o that page

s tealer cannot s teal the page, which is being faulted in.


18.(A) The s hell calls fork(); the child process calls exec() and the parent calls wait(). The
s hell is jus t another process that can take a s tring as s tandard input, look for the program

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 59

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

referenced by the s tring, and then run this program . Unless the program is put in the
background, the shell will wait until the program has finis hed.
19.(A) 4.3BSD was releas ed in June 1986. Its m ain changes were to im prove the
perform ance of many of the new contributions of 4.2BSD that had not been as heavily
tuned as the 4.1BSD code.
20.(B) The m echanism of unders tanding what cus tom er wants , analyzing needs , assess ing
feasibility are provided by Requirement engineering
21.(A) Evaluation of the target market is an activity of a contract review
22.(B) Ins ufficient identification is a process -related problem . Unidentified, partially
identified, and unplanned ris ks pos e a threat to the success of a s oftware project. You need
to intensively identify risks and evolve a ris k m anagement plan s uch that the project is
completed success fully, on tim e
23.(B) Baseline is a form al reference point that m easures sys tem characteris tics at a
s pecific time.
24.(B) Five nines of reliability refer to a product that is operational 99.999% of the time.
25. (C)

Static analyzers A s tatic analyzer operates from a pre-computed database of

des criptive information derived from the s ource text of the program .

Code inspectors A code ins pector does a sim ple job of enforcing standards in a

uniform way for many programs . These can be s ingle s tatement or m ultiple s tatem ent
rules.

Output comparators These are us ed in dynam ic tes ting-both single-m odule and

m ultiple-m odule varieties to check that predicted and actual outputs are equivalent.

Standard enforces This tool is like a code inspector. The m ain dis tribution is that a

full-blown static analyzer looks at whole programs, whereas a s tandard enforcer looks at
only s ingle s tatements .
26.(D)
Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 60

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

Dis parate data-

Production data

Non volatile data-

Query and analysis

Data granularity-

Level of detail

27.(C) Credit theft is im poss ible with sm art card as key to unlock encrypted information is
required and als o due to the abs ence of external account number on the card.
28.(B) Am azon.com comes under B2C m odel where the cons umer access es the s ystem of
the supplier. It is still a two-way function but is us ually done s olely through the Internet. In
B2C e-commerce, companies s ell goods to cons um ers online in a dynam ic environm ent.
Each trans action under B2C repres ents an individual buying online.
29.(C)

FAT12 is a12-bit vers ion developed by Micros oft in1977 for Micros oft Dis k BASIC

FAT16 is a 16-bit vers ion introduced in July 1988 for MS-DOS 4.0

FAT32 is a 32-bit vers ion introduced in Augus t 1996 for Windows 95 OSR2

30.(C) TRACE m acro s ends an output m essage to the debug window of com piler. User can
als o s ee the trace m essages without the debugger running using DebugView.
31.(C) PVIEW is us ed to kill errant hidden processes in windows 95. With PView, user can
m odify s tatus of process es running on the s ystem . As a res ult the entire s ys tem s
process es can be s topped and potentially halt.
32.(C) Select three columns from the COURSES table, of which the third one has a cons tant
value, i.e. = PRICE. Sort the data according to the s econd column, in as cending order
33.(A) It mus t be trans lated to the actual relation in the conceptual m odel of the databas e
34.(B) Becaus e it may have the values from all the dom ains .
35.(C) In order travers al is left->root->right and pre order is root->left-> right so it can used
to find the pos t order traversal. firs t check the node in preorder and then find the root in in
order, check left and right nodes and create a tree and then find the post order
36.(D) The queue can not be reversed as it is bas ed on the concept of FIFO.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 61

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

37.(A) The tim e com plexity of Prim s Algorithm is O(n*n).


38.(A) Linear probing is a s cheme in com puter programming for resolving hash collisions of
values of has h functions using two values - one as a s tarting value and one as an interval
between s uccess ive values in modular arithmetic. The second value, which is the s ame for
all keys and known as the s tepsize, is repeatedly added to the starting value until either the
entire table is travers ed, or until a free s pace is found. This algorithm, which is us ed in
open-address ed has h tables , provides good m emory caching, through good locality of
reference, but also res ults in clus tering, an unfortunately high probability that where there
has been one collision there will be m ore
39.(A) If a B-tree is created with order m then the node may have m ax. of m children and
then it s plits into two and middle child becomes the root
40.(A) A can draw a ticket in 3C1 = 3 ways .
Number of cas es in which A can get a prize is 1. Probability of As s uccess =
B can draw a ticket in 9C3 ways =

1
3

9.8.7
= 84 ways.
3.2.1

Number of ways in which B gets all bla nks = 6C 3 =

6.5.4
= 20
32.1

Number of ways of getting a prize = 84 20 = 64


Thus the probabili ty of Bs s uccess =9

64 16
=
84 21
1 16
3 21

So As probability of s uccess : Bs probability of s uccess = :

41.(D) Here P repres ents file pointer. It points to the s tructure, in which char pointer exis ts
which points to the firs t character of file.
42.(B) Eccentricity of a given node is the maximum of minim um path from other nodes to
the given node.
Cost of m inim um path from 1 to 5 is 7.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 62

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

Cost of m inim um path from 2 to 5 is 6


Cost of m inim um path from 3 to 5 is 4
Cost of m inim um path from 4 to 5 is 7
43.(A) If (1, 3) entry in M3 is 2, it means there are 2 path of length 3, connecting nodes 1
and 3. If you s ee the graphs in option (a) then we have two paths ( 2 3 3 & 1 3
3 3)
44.(B) At Data link layer there are 3 techniques for error detection:(1) Parity check
(2) Check summ ing m ethod
(3) Cyclic redundancy check.
45.(A) Start and stop bits are not needed in s ynchronous trans fer of data, s o it is 2400/ 8 =
300.
46.(B) (54.78)10 = (110110.1100011)2
= 1.1011011000112

M = 101101100011
E = 5 + 127 = (132)10 = (10000100)2
and s = 0 (pos itive)

s = 0, M = 101101100011, E = 10000100

47.(D) A cons tructor is a s pecial m ember function whose tas k is to initialize the objects of
its class . It is s pecial because its nam e is s ame as that of the class .
A des tructor is used to des troy the objects that have been created by a cons tructor.
Cons tructors s hould be declared in the public section. An object with a cons tructor or
des tructor cannot be us ed as a m ember of a union. Cons tructors can never be virtual.
48.(C) When an exception is not caught, the program is aborted. Whenever an exception is
generated (in the code which is placed in the try block), it is thrown using a throw
s tatem ent in the try block which is caught by the catch block where it is handled
appropriately.
Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 63

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

49.(A) Abs traction is simplification mechanism us ed to hide s uperfluous details of a set of


objects . It allows one to concentrate on the properties that are of interest to the application.
Generalization is the abs traction process of viewing sets of objects as a single
general class by concentrating on the general characteristics of the cons tituent s ets while
s uppressing or ignoring their difference.
Specialization is the abs traction process of introducing new characteris tics to an
exis ting class of objects to create one or more new class es of objects .
Aggregation is the process of compiling inform ation on an object, thereby abstracting
a higher-level object.
50.(C) Addition in hexadecim al num ber s ystem is sam e as other num ber sys tem. Since
hexadecimal number, upto 15(F) are defined, a carry will be generated if addition is larger
than F. Another way is to convert the hexadecimal num bers into equivalent binary numbers
and then add the numbers .
2
3
+
9
+
0
Sum E

2
B
E
5
0

2 1
C A
B D
F B
8 3

5
9
E
C

2 0
Carry
0 7 8
7 F 3
2 C 0
B 2 B

Starting from least significant digit


8 + 3+ 0 = 11 10 = B16

(Sum =B

0 + 7 + F + C = 7 10 + 15 10 + 12 10 = 34 10 = 2216

(Sum = 2 Carry

2 + 0 + 7 +2 =11 10 = B16

(Sum =B Carry

0 + 5 + 9 + E = 5 10 + 9 10 + 14 10 = 28 10 = 1C 16

(Sum = C Carry

1 + A + D + B = 110 + 1010 + 1310 + 1110 = 3510 = 2316

(Sum = 3 Carry

2 + C + B + F = 2 10 + 1210 + 1110 + 1510 + = 40 10 = 28 16

(Sum = 8 Carry

Carry

=0)
= 2)
= 0)
= 1)
= 2)
= 2)

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 64

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

2 + B +E + 5 = 2 10 + 11 10 + 14 10 + 5 10 = 32 10 = 20 16

(Sum = 0 Carry

2 + 3 + 9 + 0 = 1410 = E 16

(Sum = E Carry

=2)
= 0)

PAPER- III
1.(C) A digital multiplexer can also be used to implem ent combinational logic function True
In a com binational circuit, the current output depends on the previous outputs als o False
2.(C) The divis ion is in the frequency of the clock puls e input. Since each FF divides the
frequency by factor of 2, the FF is called a divide-by-two circuit. Since each FF divides the
n

clock frequency by 2, n FFs will divide the clock frequency by 2 .


3.(A) The content of the regis ter after firs t shift will be -> 1110 , as
101110

1 1 1 0

The content of the regis ter after second shift will be -> 0111 , as
10111

0 1 1 1

01

4.(D)

32 functions need 5 bit encoding in control m emory m icroins truction to enable

s election of one of the function.

16 data routes need 4 bit encoding in control memory m icroins truction to enable

s election of one of the data route.

32 2 8 = 22 independent s toring units . Num ber of control signals, 22 * 2 = 44.

Two control signals are needed for two MUXs . Total number of control s ignals 46 signals

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 65

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

for storing input-output regis ter. Since 44 > 2 , 6 bit encoding is required in control mem ory
m icroins truction to enable s election of one of the unit.

14

16384 (= 2 ) address es are there in control m emory. 14-bits are thus required from

next-address field in the control m emory.


Therefore, for all the 4 fie lds the control m emory need (5 + 4 + 6 + 14) encoding bits
in each m icroins truction.
5.(D) Categories of 8085 ins tructions that manipulate data:

STA is a data trans fer ins truction

DCR is a arithmetic Ins truction

CMP is a logical Ins truction

CALL is a branch Ins truction

6 (B)

AN AR - logical group instructions for 8085- AND accumulator with register

PCHL - unconditional branch ins tructions . PCHL ins truction exchange the contents

of the program counter with the contents of the H and L regis ters.

ORAR - logical group instructions for 8085- OR accumulator with regis ter

CMA - logical group ins tructions for 8085- Com plement the Accum ulator

7.(D) The PCI bus is found in all the new Pentium sys tems as it has plug and play
characteristics , has the ability to function with a 64 bit data bus and any microprocess or
can be interfaced to it with PCI controller or bridge.
8. (B) ANI s tands for Logical AND with Accum ulator Using Imm ediate Data. This ANDs
the accum ulator with immediate. F leaves the high nibble whatever it is, 0 clears the lower
nibble
9. (C) In a s ys tem the undo and redo operations are required to be idempotent to cope up
with a record crash when recovery is going on after the cras h.
10.(C) A trans action manager is the part of an application that is responsible for
coordinating transactions across one or more res ources . Trans action managers are
Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 66

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

responsible for ens uring that res ources are not left in an incons is tent s tate, if there is a
s ys tem failure and the applicatio n crashes .
11.(C) Is olation of the trans actions is ensured by Concurrency control. Even though
m ultiple trans actions m ay execute concurrently, the s ys tem guarantees that for every pair
of trans action Ti and Tj, it appears to Ti that either Tj finished execution before Ti s tarted or
Tj started execution after Ti finis hed. Thus each transaction is unaware of other
transactions executing concurrently in the s ys tem .
12.(D) Organizational forces , frequency of data access , need for growth and expansion,
technological capabilities and need for reliable service are the factors for deciding on
database dis tribution s trategies
13.(B) For real-tim e requirements , s tore and forward m essages for each completed
transaction can be broadcas t across the network informing all nodes to update data as
s oon as poss ible, without forcing a confirm ation to the originating node before the databas e
at the originating node is updated. One way to generate s uch m essages is by us ing
triggers . A trigger can be s tored at each local database so that when a piece of replicated
data is updated, the trigger executes corres ponding update commands agains t rem ote
database replicas.
14.(A) These two s tatements produce identical results , becaus e it is possible even to us e
numbers to indicate the column position where Oracle should order the output from a
s tatem ent.
15.(C) ALTER TABLE s tatement with ENABLE CONSTRAINT keyword is correct ans wer to
enable an exis ting cons traint.
16.(B) A cons is tent backup is one in which the files being backed up contain all changes up
to the s am e s ys tem change num ber. This means that the files in the backup contain all the
data taken from a sam e point in tim e. Unlike an incons is tent backup, a cons is tent whole
database backup does not require recovery after it is res tored. An inconsis tent backup is a

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 67

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

backup of one or m ore databas e files that us er make while the databas e is open or after
the database has s hut down abnorm ally.
17.(A) Hamm ing code is error correcting code, to transm it 4 data bits 3 parity bits located at
pos ition 2 0, 2 1 & 2 2 from left are added as
P1 P2 D 3 D 4 D 5 D 6 D7
When P Party & D Data bit
P1 is s et to be a or a1 where bits are 1, 3, 5, 7
P2 is s et to be a or a1 where bits are 2, 3, 6, 7
P1 is s et to be a or a 1 where bits are 1, 3, 5, 7
P4 is s et to be a or a 1 where bits are 4, 5, 6, 7

P3
0
0
0
0
1
1
1

P2
0
0
1
1
0
0
1
1

P1
0
1
0
1
0
1
0
1

So here
Bits 1, 3, 5, 7 ( P1 1 1 1) mus t be even parity (1).
Bits 2, 3, 6, 7 (P2 1 0 1) mus t be even parity (0)
Bits 2, 3, 6, 7 (P4 1 0 1) m us t be even parity (0)
18.(C) They cannot be obs erved on an os cillos cope and m ultiplexer. The flag regis ter is
internal to the microprocess or. However, they can be tes ted through conditional branch
ins tructions, and they can be exam ined by s toring them on the s tack m emory.
19.(B) WNDCLASS data s tructure include a pointer to a class() function for handling the
windows message.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 68

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

20.(D) WPAR AM is of 32 Bits in win-32 & is not us ed in handling the m ess age.
21.(C) Include is a s ubdirectory which comes under the subdirectory user.
22.(C) Unix is also a time s hared OS & programs us ing UNIX can be run on variety of
architecture as it ass umes to have no knowledge of architectures.
23.(B)
Basic x1

x2

s1

s2

s3

Solution

Ratio

z1
s2

0
0

2
1

1
0

0
1

1
2

400
140

200

s3
z

1
0

0
4

0
0

0
0

1
6

320
320

140

Entering variable = x2, Leaving variable s 2.


Basic

x1

x2

s1

s2

s3

Solution

s3
s2

0
0

0
1

1/ 3
2/3

2/3
1/ 3

1
0

40
220

s1
z

1
0

0
0

1/ 3
2/3

2/3
8/3

0
0

280
2560

Ratio

24.(B) y < x2 + 2x + 1

Hence given s et is non convex s et

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 69

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

25.(B)
xi

P(xi)

Step 1

x1
x2

1/2

1/4

x3

1/8
1/8

1
1

1
1

x4

Step 2

Step 3

Code
0
10

0
1

I(x1)

1
= log 2 2 = 1 = n 1

I(x2)

1
= log 2 4 = 2 n 2

I(x3)

1
= log 2 8 = 3 = n 3

I(x4)

1
8
= log 2 = 3 = n 4

110
111

P(x )I(x )
We know that,
Or

H(X)
H(X)

=
=

i =1

1
1
1
1
(1) + (2) + (3) + (3) = 1.75
2
4
8
8

26.(C) A pus hdown automation cons is ts of


i. a finite nonempty s et of s tates denoted by Q,
ii. a finite nonem pty s et of input s ymbols denoted by ,
iii. a finite nonem pty s et of pus hdown sym bols denoted by ,
iv. a s pecial s tate called the initial s tate denoted by q 0,
v. a s pecial pus hdown sym bol called the initial s ymbol on the pus hdown s tore denoted by
Z0.
27.(A) In a m ultiple track TM, a s ingle tape is assumed to be divided into several tracks.
Now the tape alphabet is required to consis t of k-tuples of tape s ym bols, k being the

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 70

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

number of tracks . Hence the only difference between the s tandard TM and the TM with
m ultiple tracks is the s et of tape s ym bols .
28.(B) Suppose L is regular. Then, there exists a finite s tate autom ation M which accepts L.
Suppose M has K s tates . Let w = akb k . Then |w| > k. By the pum ping Lemm a w = xyz
where y is not empty and w 2 = xy2 z is also accepted by M. If y cons is ts of only a' s or only
b's , then w2 will not have the s ame num ber of a's as b's . If y contains both a's and b's , then
w 2 will have a's following b's. In either cas e w2 does not belong to L, which is a
contradiction. Thus L is not regular.
29(A) XML content are s tored with out formatting and accessible to us er, Applicatio n and
platform .
30.(D) Breadth firs t s earch are heuris tic technique us ed in medicine, law, biology and
chemis try etc.
31.(C) 1. Sim ple LR (SLR for short), is the easiest to implement, but the leas t powerful of
the three. It m ay fail to produce a parsing table for certain gramm ars on which the other
m ethods s ucceed.
2. Canonical LR is the mos t powerful and the m os t expensive.
3. Look ahead LR (LALR for short), is interm ediate in power and cost between the
other two. The LALR method will work on mos t programming-language grammars and,
with s ome effort, can be implemented efficiently
32(C) Deletion and ins ertion of elements is not required in binary s earch.
33(B) Dependency preserving is not condition for BCNF.
34.(A) In key dependencies as in Functional dependencies there is the dependency of keys.
35.(A) The network of the given figure is a s in gle layer feed-forward neural network
because

there is only one neuron between any input and output. The network is not

autoass ociative i.e. doesn't have feedback becaus e there are no loops in it.
36.(C) Break-Even Output

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 71

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

The contribution per unit is defined as Average Revenue m inus Average Variable Cost
and tells us how much each unit is contributing over and above its variable (running) cos ts
to the fixed cos ts already incurred. When enough units are produced to cover all thes e
fixed cos ts , then we have reached the break-even output.
37 (B). The top s quare of the output is black because the top pattern differs in two squares
from a T and in 3 squares from an H.
The m iddle square is not defined becaus e the m iddle row of the input defers the s ame
amount from both T and H(differs in 1). Therefore, the output can be either black or white.
The bottom s quare is black becaus e it differs from a T and in 2 from an H
38.(B) ICMP is the Internet control Message protocol. It is an application layer protocol. It is
used by hos ts , routers , & gateways to comm unicate network layer information to each
other. The mos t typical us e of ICMP is for error reporting.
39.(C) Compound editor is one of the type of Authoring tools . With a com pound editor, you
can accomplis h mos t tas ks in a WYSIWYG editing mode but s witch from the word
process or-style editing window to a s ource code view to modify the pages underlying
HTML.
40.(A) Stylus & grid is appropriate to use as a multipurpose input device for character
recognition. Grid & s tylus devices may be transparent media placed directly on a vis ual
indicator.
41.(C) When a disk is form atted, the OS creates four areas on its s urface:
Boot s ector

File allocation table

Root folder

Data area

42.(A) In contiguous m em ory allocation, each process is contained in a s ingle contiguous


s ectio n of mem ory.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 72

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

43.(C) For process ing an output in XML, new line s ymbol are firs t converted to single LF
s ym bol.
44.(B) If you want to open a link in a new brows er then it will be opened with <a href = url
target =-blank> syntax.
45.(B) <Script type = text/javas cript></js cript> using this tag , we insert a javascript in
HTTH page. In all project this can be used.
46.(D) The trans portation m ethod does not work if hiring and layoff is possible. This is an
aggregate method.
3

47.(A) Eight phase digital transmiss ion implies 2 bits /s econd. Hence, the bit rate can be
tripled over corresponding two phas e modulation.
Multi m ode fiber allows m ore than one ray of light at a m oment. It is generally
greater in diam eter than a single m ode fiber.
48.(C) If the M bit in X.25 s tandard is s et to 1, it m eans that there is m ore than one packet.
The M-bit or More Data indicates whether this particular packet is carrying the total
intended mess age or whether there is m ore data to follow as part of this transmission.
49.(A) Multiplexing is sharing of comm unication channel. Multiplexing involves multiple
s ignals or s treams of information on a carrier at the sam e time in the form of a s ingle,
complex s ignal.
10Bas e2 cabling is als o popula rly known as thin Ethernet. It s upports transmiss ion
up to a m aximum dis tance of 20m ts . Such Cables are cheaper and used for sm aller lowcos t LANs .
Frequency hopping and s pread s pectrum techniques are involved in transmission.
Spread Spectrum is the wide range of frequencies during transmission.
Tim e Domain Reflectometry is a technique that detects cable breaks, bad taps or
loos e connectors . The TDR measures the tim e it takes for the signal to travel down the
cable and reflect back. The TDR then converts this time to dis tance and dis plays the
information as a waveform and/or dis tance reading.
Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 73

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

N=

50.(B) Use the formula

1+ L
( T )

T = 5 s es

Here

L = 25 s ec, and
D = 2.73 s ec.
Putting the values and solving, we get
N = 12.01 which round down to 12 cells .
51.(C) We arbitrarily choos e A as our s tarting node and cons ider all branches incident on it;
they are AE, AB , AD, and AC, with cos ts 10, 2, 1, and 4 respectively. Since AD is the
cheapes t, we add this branch to the solution, as shown in Fig.(a) Nodes A and D are now
connected.
We next cons ider all branches incident on either A or D that connect to other nodes.
Such branches are AE, AB , AC, DB, DE, DF, DG, and DC, with cos ts 10, 2, 4, 1, 7, 10, 7,
and 4, res pectively. Since DB is the cheapes t to include, we adjoin it to Fig-(a) and obtain
Fig-(b). The connected nodes are now A, B , and D.

E
B
1

D
C

F
G

(a)

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 74

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

E
B

(b)

E
B

1
4

(c)

E
B

1
4

F
3

(d)

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 75

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

E
B

F 3
3

(e)

1
4

B
1

F 3
3

(f)

We next cons ider all branches incident on A, B, or D that connect to other nodes.
These are AE, AC, DE, DF, DG, with cos ts 10, 4, 7, 10, 7, and 4. The cheapes t branch of
interes t is either AC or DC. We arbitrarily s elect DC and adjoin it to Fig. (b) to obtain Fig-(c).
Continuing in this manner, we obtain sequentially Fig-(d) through Fig(f). Fig(f)
contains all the nodes; hence it is a minim al-span network. The m inimum cos t for
connecting the network is
Z* = 1+ 1 + 4 + 3 + 3 + 5 = 17
52.(D) Given derivation is neither leftmos t nor rightm ost derivation because this is not
res tricted for left-right recurs ion/replacement.
53.(B) (r*s*)* = (r + s )* = (r* + s *)* this is the one of the identity from the 12 identities of
regular gramm ar.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 76

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

54.(A) A gramm ar is called left m os t grammar if and only if all steps involved in derivation
have leftm os t variable replacement only. From the definition it is clear that for the given
gramm ar option (A) is correct.
55.(C) A self relocating program is one which can itself perform the relocation of its
address -sens itive portions .
56.(B) The basic principle behind the s tructured des ign methodology in problem partitioning
the four m ajor s teps are
1. Res tate the problem
2. Identify the input and output
3. Firs t level factoring
4. Factoring of input, output and transform branches .
57.(C) None of the given s tatements are true.
58.(D) Areas of application of software metrics are :
1. Prediction of quality levels for software in terms of reliability
2. Cos t and size es tim ation techniques
3. Controlling s oftware development projects through m easurement.
59.(A) Coupling is the meas ure of the degree of inter-dependence between modules . With
respect to coupling, s ys tems are divided into three parts :
1. Loos ely coupled s ys tems
2. Highly coupled s ys tems
3. Uncoupled s ystems
Loosely coupled sys tems are made up of m odules which are relatively independent.
60.(B) Lis ts in PROLOG constitute elements separated by comm as and enclosed within
s quare brackets . The elem ents could compris e of any data type.
eg [2, 4, 8, 10, 12] and [jack, jill, jane 1]
61.(C) Option C is correct
Example of few valid variables in PROLOG are
Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 77

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

My_favourite-food_item s
Menu-Items-1
Neha
Does _Neha_like_coffee
p:- a, b, c
62.(A) p:- d, e, f , This represents the control s tructure in PROLOG. Given representation

m eans that p is true if either (a and b and c) is true or (d and e and f) is true the comm a
implies an AND.
63.(B) Arity is the num ber of argum ents in a predicate form . It is represented by a/n placed
after the predicate nam e. n is the number of argum ents for ins tance the predicate relishes /2
takes two argum ents .
64.(C) Some of the im portant standards for providing s tructure to multim edia applications
are
1. MHEG
2. PREMO
3. ODA
4. Acrobat
5. Hytim e
6. SGML
65.(A) The s teps involved in the animation are(i) Storyboard layout
(ii) Object definitions
(iii) Keyframe s pecifications
(iv) Generation of in-between fram es

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 78

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

66.(B) Param eterized s ys tems allow object motion characteris tics to be s pecified as part of
the object definitio ns . The adjus table param eters control s uch object characteristics as
degrees of freedom, motion limitations and allowable s hape changes .
67.(B) All (a), (c) and (d) are fals e. The difference between (B) and (C) is vital.
80386 processor has 32 bit address capacity (32 pins for address) hence it its
capable of access ing 232 = 22 2 30 = 4GB = 4096 MB of main memory. Pres ent day
computers have atm os t 32 MB RAM. The address s pace of 386 process or is 4GB and
hence virtual memory can be atm os t 4 GB. If a program is of 5 GB, we ha ve to use only
overlying technique.
68.(C) Monitoring shell comm ands is an exam ple of anom aly detection. Monitoring s hell
commands is us ed to detect anomalous commands for a given user or detecting an
anomalous login time for a user.
69.(D) Dis k Adm inis trator perform all the given tas ks of form atting the 20 GB drive, moving
the data from the 5 GB drive and labeling the 20 GB drive as drive B.
70.(B) MPI_Comm_Size( ) determ ines num ber of processes in a group ass ocia ted within
MPI_Comm_Size (Comm.s ize)
71.(B) Option (B) gives the correct O/P for the program
72.(C) Readability Programs written in high level languages are more readable than
assem bly and m achine language.
Portability Programs could be run on different machines with little or no change.
73.(B) A PROLOG program compris es a description of the problem us ing a num ber of facts
and rules . Matching in PROLOG is perform ed predicate to predicate and argument to
argum ent.
74.(C) Pvm data default involves XDR encoding which is us ed by default because PVM
cannot know whether the user is going to add a heterogeneous machine before this
m essage is s ent.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 79

C SIR NET, GA TE, IIT-JA M, UGC NET , TIFR , IISc , JEST , JNU, BHU , ISM , IBPS , C SAT, SLET, NIMCET, C TET

75.(B) Option B is correct. Most of the operations associate to the left because of the way
keystrokes are process ed from left to right.

Phone: 0744-2429714
Mobile: 9001297111, 9829567114, 9001297243
W ebsit e: www.vpmclasses.co m
E-Mail: vpmclasse [email protected] / inf [email protected] m
A ddress: 1-C-8, Shee la Chowdhary Road, SFS, TA LWANDI, KOTA , RAJA STHA N, 324005

Page 80

You might also like