079-2024-A
079-2024-A
5. If the cache memory is divided into 1024 cache lines. What will be the width of the address
bit to fetch a word from the cache line if the size of the cache line is 8 bytes in a byte
addressable memory organization?
(A) 10 bit (B) 13 bit
(C) 3 bit (D) 12 bit
7. The register which hold the address of control memory in micro-programmed control :
(A) MAR (B) CAR
(C) Micro-program sequencer (D) PC
A 3
[P.T.O.]
8. What is the width of the address bus in a 8086 processor?
(A) 16 bit (B) 8 bit
(C) 20 bit (D) None of the above
13. The word ‘BEAUTIFUL’ is stored in a memory location with a starting of 1500 in little
endian notation. If the processor is a 16 bit and it wants to fetch a word from the memory
1502, what is the word?
(A) BE (B) LU
(C) AU (D) FI
15. Register which is hold the stating address information of a segment in segmented memory
organization :
(A) Index register (B) Off_set register
(C) Segment register (D) Pointer register
079/2024 4 A
16. Which of the following is also known as half adder?
(A) EXCLUSIVE OR (B) EXCLUSIVE AND
(C) NAND circuit (D) INCLUSIVE OR
17. From which processor onwards the segmented memory concept implemented :
(A) 8088 (B) 8085
(C) 80286 (D) 8086
18. Time taken for the execution of M instruction with N stages in a pipelined system is :
(A) M×N (B) M+N
(C) N+(M–1) (D) (N+1)+M
21. In order to transfer huge amount of data which data transfer scheme is suitable :
(A) Program driven (B) Interrupt Driven
(C) DMA (D) Synchronous
A 5 079/2024
[P.T.O.]
25. _________ is the fastest logic family, it’s used in high speed applications.
(B) Number the resources uniquely and never request a lower numbered resource
than the last one requested.
27. Consider the following statements about process state transitions for a system using
pre-emptive scheduling :
28. In the context of operating systems, which of the following statements is/are correct with
respect to paging?
079/2024 6 A
29. Consider six memory partitions of size 200 KB, 400 KB, 600 KB, 500 KB, 300 KB, and
250 KB, where KB refers to kilobyte. These partitions need to be allotted to four processes of
sizes 357 KB, 210 KB, 468 KB and 491 KB in that order. If the best fit algorithm is used,
which partitions are NOT allotted to any process?
(A) 200 KB and 300 KB (B) 200 KB and 250 KB
(C) 250 KB and 300 KB (D) 300 KB and 400 KB
31. A common issue that needs to be avoided while using binary semaphores:
(A) stack overflow (B) buffer overflow
(C) infinite loops (D) deadlock
32. Which of the following stage triggers the CPU switch from user program to interrupt
processing?
(A) I/O request (B) transfer done
(C) interrupt signalled (D) interrupt handled
33. In the context of fork ( ), what does the term “orphan process” refer to?
(A) A process that has terminated but still occupies space in the process table
(B) A process that has been killed by the parent process
(C) A child process whose parent has terminated
(D) A process that has no parent processes
A 7 079/2024
[P.T.O.]
35. Which of the following statement is true?
36. Which of the following statement is false about critical section problems?
(B) Dekker’s algorithm can handle more than two processes efficiently
37. In a timeshare operating system, when the time slot assigned to a process is completed, the
process switches from the current state to?
39. If a page number is not found in the translation lookaside buffer, then it is known as :
40. A CPU scheduling algorithm determines an order for the execution of its scheduled processes.
Given ‘n’ processes to be scheduled on one processor, how many different schedules are
possible in terms of ‘n’ :
(A) n +1 (B) n (n − 1)
(C) n! (D) n (n + 1)
079/2024 8 A
41. An object that groups operations that are all used by some superior level of control, or
operations that all use some junior–level set of operations, is a kind of :
(A) Entity abstraction (B) Action abstraction
(C) Virtual Machine abstraction (D) Coincidental abstraction
42. Which of the following statements are correct about Class in JAVA programming?
I. You can put the two classes into one file, but only one class in the file can be a public
class.
II. The public class must have the same name as the file name.
III. Each class in the source code is compiled into a .exe file.
(A) I and II (B) I and III
(C) I, II and III (D) II and III
45. Variables can be declared inside interface declaration. Following are the statements
regarding the variables in an interface in JAVA :
I. They are static.
II. They cannot be changed by the implementing class.
III. Variables are implicitly public.
Which of the statements are true?
(A) I and II (B) II and III
(C) I and III (D) I, II and III
A 9 079/2024
[P.T.O.]
46. Exception is a subclass of :
(A) Throwable class (B) Error class
(C) IO class (D) ClassCast Exception
50. To determine the initial effort Ei in person-months, the equation used is of the type
Ei = a* (KLOC)b . The value of the constants ‘a’ and ‘b’ depends on the project type and KLOC
is the measure of size. IN COCOMO, projects are categorized into three types- organic,
semi detached and embedded. The value of constants ‘a’ and ‘b’ for embedded systems are :
(A) (3.2, 1.05) (B) (2.8, 1.20)
(C) (3.4, 1.15) (D) (2.6, 1.01)
51. The inflow refers to input sources and outflow refers to output destinations. The module
design complexity (in term of the total amount of data flowing in and out of the module and
the module size) Dc is defined as :
(A) Dc = size * (inflow * outflow)2 (B) Dc = size * (inflow + outflow)2
(C) Dc = size * (inflow – outflow)2 (D) Dc = size * (inflow + outflow)
079/2024 10 A
52. The McCabe Cyclomatic number for a given set of code is :
0. {
1. i = 1;
2. while (i <= n) {
3. j = 1;
4. while (j <= i) {
5. if (A[i] < A[j])
6. swap (A[i], A[j]);
7. j = j+1; }
8. i = i+1; }
9. }
(A) 4 (B) 5
(C) 3 (D) 6
This is an example of
A 11 079/2024
[P.T.O.]
54. Test Oracle is a mechanism used to :
(D) Check the correctness of the output of the program for the test case
55. The Jelinski-Maranda model is known reliability model. The reference procedure for
Jelinski-Maranda model is called
56. Which data structure is having the feature “First In Last Out” ?
57. How many items will be there in a circular queue implemented using array (of maximum
size 7) with front = 5 and rear = 2?
(A) 3 (B) 2
079/2024 12 A
59. Write the inorder traversal of a binary search tree whose preorder traversal is 8, 4, 3, 6, 10,
9, 15 :
60. Which data structure is used for performing the Breadth First Search in a graph?
61. What is the number of leaf nodes in a full binary tree, if number of internal nodes is N?
62. If a node having two children is to be deleted from binary search tree then it will be replaced
by its :
63. How many edges will be there in a complete graph with 7 nodes?
(A) 49 (B) 28
(C) 21 (D) 42
A 13 079/2024
[P.T.O.]
65. Which data structure is used for implementing recursion?
(A) stack (B) queue
(C) binary tree (D) none
67. Consider an ER diagram with 3 entity sets A, B and C and two relationship sets X and Y
where, A & B are strong entity sets and C is a weak entity set. X is a one to many binary
relationship from A to B and the participation is total in many side. Y is an identifying
relationship set between B and C. The attributes for A are {A1, A2, A3}, B are {B1, B2}, C are
{C1, C2}. Which of the following is a correct attribute set for one of the tables while
converting to minimum number of tables?
(A) {B1, B2, A1} (B) {A1, B1, C1, C2}
(C) {A1, A2, A3, B1} (D) {A1, B1}
079/2024 14 A
68. Which of the following is false with respect to weak entity sets?
(A) Weak entity set do not have key attributes of their own
(B) The strong entity set which the weak entity set depends upon is identifying entity
set
(C) The relationship set between weak entity set and strong entity set is identifying
entity set
(D) The relationship set between weak entity set and strong entity set is identifying
relationship set
Lending:
Branch-name branch-city assets customer-name loan-number amount
Downtown Brooklyn 9000000 Jones L-17 1000
Redwood Palo Alto 2100000 Smith L-23 2000
Perryridge Horseneck 1700000 Hayes L-15 1500
Downtown Brooklyn 9000000 Jackson L-14 1500
Mianus Horseneck 400000 Jones L-93 500
Round Hill Horseneck 8000000 Turner L-11 900
Pownal Bennington 300000 Williams L-29 1200
North Town Rye 3700000 Hayes L-16 1300
Downtown Brooklyn 9000000 Johnson L-18 2000
Perryridge Horseneck 1700000 Glenn L-25 2500
Brighton Brooklyn 7100000 Brooks L-10 2200
How many tuples do Lending Full outer Join loan have?
(A) 5 (B) 7
(C) 9 (D) 12
A 15 079/2024
[P.T.O.]
70. Consider the following ER diagram: Identify where a new attribute Access date that
describes the date on which the loan has been accessed recently, could be placed without null
values?
72. Which of the following is not the functions of Query processor in database system
architecture?
(A) Interprets DDL statements and records definitions in data dictionary
(B) Manages allocation of space on disk, data structures used to represent
information
(C) Translates DML into several alternate evaluation plans
(D) Execute low level instructions generated by DML compiler
079/2024 16 A
73. The relation schema R has attributes name A, B, C, D and E. If R has the following
functional dependencies, then find the most appropriate normal form?
ABC –> E
DB –> E
CD –> A
(A) 1NF (B) 2NF
(C) 3NF (D) 4NF
74. For the relational schema R (A, B, C), and the functional dependencies A –>B, B –>C, find
the number of nontrivial functional dependencies :
(A) 1 (B) 2
(C) 3 (D) 4
76. The Accounts Department in a University has 10 employees, and each has a desktop
computer to run the financial software. All 10 desktop computers are connected to a single
printer to optimize operational expenses. What type of network would you recommend to this
department?
(A) SAN (B) LAN
(C) WAN (D) MAN
77. What is one of the key differences between features of ISO/OSI and TCP/IP network models?
(A) Describe logical ways of networking and the processing of information using a
layered approach.
(B) More number of layers in OSI model makes better troubleshooting and improving
network performance more straightforward.
(C) Uses the concept of encapsulation, in which data is packaged into a series of
headers and trailers that contain information about the data being transmitted
and how it should be handled by the receiver node.
(D) Framework is designed to encompass various network communication methods
with naming the protocols used in each layer.
78. In a sliding window protocol, the receiver window ––––––––– in size when new frames are
received and the receiver window ––––––––– in size when the acknowledgments are sent.
(1) increases
(2) decreases
(3) remains the same
(A) 1 and 2 respectively (B) 2 and 1 respectively
(C) 3 and 3 respectively (D) 2 and 2 respectively
A 17 079/2024
[P.T.O.]
79. Automatic Repeat Request (ARQ) protocols and piggybacking are used for improving –––––––
and ––––––––– respectively.
(1) Link utilization
(2) Error detection
(3) Error control
(4) Connection establishment
(A) 2 and 1 (B) 3 and 1
(C) 4 and 1 (D) 2 and 3
80. Which of the following delays are faced when a sender host sends data to a receiver host
through the internet when using packet switching?
(1) path establishment
(2) transmission
(3) propagation
(4) queuing
(5) processing
(A) 1, 2, 3 and 4 (B) 1, 3, 4 and 5
(C) 2, 3, 4 and 5 (D) all of these
82. Cyclic Redundancy Code (CRC) is used for error checking with Modulo-2 arithmetic. If the
data transmitted is 11001001 with the generator polynomial x 3 + 1 , the data transmitted is:
(A) 11001001011 (B) 110010010011
(C) 11001001110 (D) 1100100111
83. If a node in a network transmits 4000 frames per second, and each node has 8-bits
multiplexing slot, then which multiplexing technique is used in this case?
(A) Frequency Division Multiplexing (FDM)
(B) Wavelength Division Multiplexing (WDM)
(C) Time Division Multiplexing (TDM)
(D) Code Division Multiplexing (CDM)
079/2024 18 A
84. If Tp is the maximum possible propagation delay between 2 most widely separated stations
and Tfr is the average time required to send out a frame, the vulnerable time (in which there
is a possibility of collision) for CSMA is:
(A) Tp (B) Tfr
85. In the Asynchronous Transfer Mode (ATM) network, the cells follow the same path and the
cells do not usually arrive out of order because ATM:
(A) is asynchronous (B) uses virtual circuit routing
(C) is multiplexed (D) is a network
87. Assume that a network system has an n-layer protocol hierarchy. Applications generate
messages of length M bytes. At each of the layers, an h -byte header is added. What fraction
of the network bandwidth is utilized for data transmission?
(A)
(M − h ) (B)
(h ∗ n )
M M
(C)
(M − h ∗ n ) (D) None of these
M
88. A small organization has a class C address (196.125.56.0) and needs 5 sub-networks, each
with 25 hosts. What is the subnet mask?
(A) 255.255.255.224 (B) 196.125.56.192
(C) 196.125.56.224 (D) 255.255.255.192
89. In Additive Increase Multiplicative Decrease (AIMD) congestion control of TCP/IP network, if
rwnd is the flow control’s receiver window size and cwnd is the congestion control’s window
size, what is the flow control’s sender window size?
(A) sum(rwnd, cwnd (B) diff((rwnd, cwnd))
(C) max(rwnd, cwnd) (D) min(rwnd, cwnd)
A 19 079/2024
[P.T.O.]
90. With respect to OSPF routing protocol, select the feature it has:
(A) Each router exchanges routing tables with only its neighbors
(B) Utilizes event-triggered updates
(C) Used to route between autonomous systems
(D) Provides high network overhead due to flooding
91. Which devices receive packets from the network layer and transmit them into the datalink
layer after the formation of frames?
(1) Gateway
(2) Hub
(3) Router
(4) Switch
(5) Bridge
(6) Modem
(7) NIC
(8) Repeater
(A) 1, 4, 7 (B) 2, 4, 8
(C) 3, 5, 6 (D) 4, 5, 7
93. A certificate authority (CA) is a trusted entity that issues digital certificates. From the
certificate, the certificate authority authenticates the:
(A) Signature of the certificate holder
(B) Private key of a certificate holder
(C) Public key of a certificate holder
(D) Secret key used by RSA
079/2024 20 A
94. nslookup command queries the ––––––––– in order to find the IP address for a given fully
qualified domain name.
(A) Address Resolution Protocol (ARP)
(B) Network Address Translation (NAT)
(C) Domain Name Service (DNS)
(D) Media Access Control (MAC)
95. ––––––––– HTTP request method performs a message loop-back test along the path to the
target resource and returns a copy of the complete HTTP request message, including start
line, header fields and body, received by the server.
(A) GET (B) POST
(C) PUT (D) TRACE
2. Style 2:
<h3 style = “font.family = Arial ; color = red”>
3. Style 3:
<HEAD>
<STYLE TYPE = “TEXT/CSS”>
h3 { font.family : Arial ; color : red ; }
</STYLE>
</HEAD>
The CSS styles used in these 3 are respectively:
(A) Internal, External, Inline (B) External, Internal, Inline
(C) Inline, External, Internal (D) External, Inline, Internal
A 21 079/2024
[P.T.O.]
97. Multiple Style Sheets can be defined on one HTML page. What is the order in which style
sheets precedence is defined?
(A) Important > Inline > Internal > External
(B) External > Inline > Important > Internal
(C) External > Important > Internal > Inline
(D) Inline > Important > External > Internal
98. Which one of the following functions is used to kill only the specified session variable in PHP?
(A) session_destroy() (B) unset()
(C) session_kill() (D) session_set()
What will be the output of the following JavaScript code from the functions compare1 and
compare2 respectively?
(A) true, false (B) true, true
(C) false, true (D) false, false
100. With My SQL, how do you select all the records from a table named “school” with the value of
the column “name” starts with “A”?
(A) SELECT * FROM school WHERE name = ‘A%’
(B) SELECT * FROM school WHERE name LIKE ‘%A%’
(C) SELECT * FROM school WHERE name = ‘%A%’
(D) SELECT * FROM school WHERE name LIKE ‘A%’
————————
079/2024 22 A
SPACE FOR ROUGH WORK
A 23 079/2024
[P.T.O.]
SPACE FOR ROUGH WORK
079/2024 24 A