j-87-13-ii (computer science & applications)

Upload: rks

Post on 14-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 J-87-13-II (Computer Science & Applications)

    1/8

    Number of Pages in this Booklet : 8 Number of Questions in this Booklet : 50

    J-87-13 1 P.T.O.

    [Maximum Marks : 100

    PAPER-IICOMPUTER SCIENCE AND APPLICATIONS

    (To be filled by the Candidate)

    Signature and Name of Invigilator

    OMR Sheet No. : ...............................................

    Roll No.

    (In words)

    1. (Signature) __________________________(Name) ____________________________

    2. (Signature) __________________________

    (Name) ____________________________RollNo.________________________________

    (In figures as per admission card)

    Time : 1 1/4hours]

    8 7J 1 3

    1. Write your roll number in the space provided on the top of

    this page.2. This paper consists of fifty multiple-choice type of

    questions.3. At the commencement of examination, the question booklet

    will be given to you. In the first 5 minutes, you are requestedto open the booklet and compulsorily examine it as below :(i) To have access to the Question Booklet, tear off

    the paper seal / polythene bag on the booklet. Do notaccept a booklet without sticker-seal / withoutpolythene bag and do not accept an open booklet.

    (ii) Tally the number of pages and number of questionsin the booklet with the information printed on thecover page. Faulty booklets due to pages/questionsmissing or duplicate or not in serial order or anyother discrepancy should be got replaced immediately

    by a correct booklet from the invigilator within theperiod of 5 minutes. Afterwards, neither theQuestion Booklet will be replaced nor any extratime will be given.

    (iii) After this verification is over, the OMR Sheet Numbershould be entered on this Test Booklet.

    4. Each item has four alternative responses marked (A), (B),(C) and (D). You have to darken the circle as indicated belowon the correct response against each item.Example :

    where (C) is the correct response.5. Your responses to the items are to be indicated in the OMR

    Sheet given inside the Paper I Booklet only. If you markat any place other than in the circle in the OMR Sheet, it willnot be evaluated.

    6. Read instructions given inside carefully.7. Rough Work is to be done in the end of this booklet.8. If you write your Name, Roll Number, Phone Number or

    put any mark on any part of the OMR Sheet, except for thespace allotted for the relevant entries, which may discloseyour identity, or use abusive language or employ any otherunfair means, you will render yourself liable todisqualification.

    9. You have to return the original OMR Sheet to the invigilatorsat the end of the examination compulsorily and must notcarry it with you outside the Examination Hall. You arehowever, allowed to carry duplicate copy of OMR Sheet onconclusion of examination.

    10. Use only Blue/Black Ball point pen.11. Use of any calculator or log table etc., is prohibited.12. There is no negative marks for incorrect answers.

    Instructions for the Candidates 1.

    2. - 3. , -

    - , :(i) - /

    - /

    (ii) - / -

    -

    (iii) OMR -

    4. (A), (B), (C) (D) : (C)

    5. I OMR OMR ,

    6 . 7 . (Rough Work) 8. OMR ,

    , , , ,

    9. OMR OMR

    10. / 11. ()

    12.

  • 7/29/2019 J-87-13-II (Computer Science & Applications)

    2/8

    Paper-II 2 J-87-13

    1. COCOMO stands for(A) COmposite COst MOdel(B) COnstructive COst MOdel(C) COnstructive COmposite

    MOdel(D) COmprehensive COnstruction

    MOdel

    2. Match the following :a. Good quality i. Program doesnot fail for aspecified time ina givenenvironment

    b. Correctness ii. Meets thefunctionalrequirements

    c. Predictable iii. Meets both

    functional andnon-functionalrequirements

    d. Reliable iv. Process is understatisticalcontrol

    Codes :

    a b c d(A) iii ii iv i(B) ii iii iv i

    (C) i ii iv iii(D) i ii iii iv

    3. While estimating the cost ofsoftware, Lines Of Code (LOC) andFunction Points (FP) are used tomeasure which one of the following ?(A) Length of code(B) Size of software

    (C) Functionality of software(D) None of the above

    4. A good software design must have

    (A) High module coupling, Highmodule cohesion

    (B) High module coupling, Lowmodule cohesion

    (C) Low module coupling, Highmodule cohesion

    (D) Low module coupling, Low

    module cohesion

    5. Cyclometric complexity of a flowgraph G with n vertices and e edgesis

    (A) V(G) = e+n2

    (B) V(G) = en+2

    (C) V(G) = e+n+2

    (D) V(G) = en2

    6. When the following code is executedwhat will be the value of x and y ?

    int x = 1, y = 0;

    y = x++;

    (A) 2,1

    (B) 2,2

    (C) 1,1

    (D) 1,2

    7. How many values can be held by anarray A(1,m;1,m) ?

    (A) m

    (B) m2

    (C) m(m+1)(D) m(m+2)

    COMPUTER SCIENCE AND APPLICATIONS

    Paper II

    Note : This paper contains fifty (50) objective type questions of two (2) marks each.All questions are compulsory. The candidates are required to select the most appropriateanswer of each question.

  • 7/29/2019 J-87-13-II (Computer Science & Applications)

    3/8

    J-87-13 3 Paper-II

    8. What is the result of the expression(1&2)+(3/4) ?

    (A) 1

    (B) 2

    (C) 3

    (D) 0

    9. How many times the word printshall be printed by the following

    program segment ?

    for (i=1, i

  • 7/29/2019 J-87-13-II (Computer Science & Applications)

    4/8

    Paper-II 4 J-87-13

    18. In hierarchical routing with 4800routers, what region and cluster sizesshould be chosen to minimize thesize of the routing table for a three-layer hierarchy ?(A) 10 clusters, 24 regions and 20

    routers(B) 12 clusters, 20 regions and 20routers

    (C) 16 clusters, 12 regions and 25routers

    (D) 15 clusters, 16 regions and 20routers

    19. In IPv4 header, the ______ field isneeded to allow the destination hostto determine which datagram a newly

    arrived fragments belongs to.(A) identification(B) fragment offset(C) time to live(D) header checksum

    20. Given L1=L(a*baa*) and L2=L(ab*).The regular expression correspondingto language L3 = L1/L2 (rightquotient) is given by(A) a*b

    (B) a*baa*(C) a*ba*(D) None of the above

    21. Given the production rules of agrammar G1 asS1 AB | aaB

    A a | AaB band the production rules of a

    grammar G2 asS2 aS2bS2 | bS2aS2 |

    Which of the following is correctstatement ?(A) G1 is ambiguous and G2 is not

    ambiguous.(B) G1 is ambiguous and G2 is

    ambiguous.(C) G1 is not ambiguous and G2 is

    ambiguous.(D) G1 is not ambiguous and G2 is

    not ambiguous.

    22. Given a grammar : S1 Sc, S SA | A, A aSb | ab, there is arightmost derivation S1 Sc SAC SaSbc

    Thus, SaSbc is a right sententialform, and its handle is

    (A) SaS

    (B) bc

    (C) Sbc

    (D) aSb

    23. The equivalent production rulescorresponding to the production rules

    S S1 |S2 | 1 | 2 is

    (A) S 1 | 2, A 1A | 2A |

    (B) S 1| 2| 1A | 2A,

    A 1A | 2A

    (C) S 1 | 2, A 1A | 2A

    (D) S 1 | 2 | 1A | 2A,

    A 1A | 2A |

    24. Given a Non-deterministic FiniteAutomation (NFA) with states p and ras initial and final states respectivelyand transition table as given below :

    a b

    p q

    q r s

    r r s

    s r s

    The minimum number of statesrequired in Deterministic FiniteAutomation (DFA) equivalent to

    NFA is

    (A) 5

    (B) 4

    (C) 3(D) 2

  • 7/29/2019 J-87-13-II (Computer Science & Applications)

    5/8

    J-87-13 5 Paper-II

    25. Which is the correct statement(s) forNon Recursive predictive parser ?

    S1 : First() = {t| * t for some

    string } *t

    S2 : Follow(X)={ a| S*Xa forsome strings and}

    (A) Both statements S1 and S2 areincorrect.

    (B) S1 is incorrect and S2 iscorrect.

    (C) S1 is correct and S2 isincorrect.

    (D) Both statements S1 and S2 are

    correct.

    26. Given an open address hash tablewith load factor < 1, the expectednumber of probes in a successfulsearch is

    (A) Atmost1 ln

    1

    (B) Atmost1

    ln

    1

    1

    (C) Atleast1

    ln

    1

    1

    (D) Atleast1

    ln

    1

    27. For a B-tree of height h and degree t,the total CPU time used to insert anode is

    (A) O(h log t)

    (B) O(t log h)

    (C) O(t2h)

    (D) O(th)

    28. The time complexity to build a heapwith a list of n numbers is

    (A) O(log n)

    (B) O(n)

    (C) O(n logn)

    (D) O(n2)

    29. The value of postfix expression :

    8 3 4 + 3 8 2 / + * 2 $ 3 + is

    (A) 17

    (B) 131

    (C) 64(D) 52

    30. Consider the following statements forpriority queue :

    S1 : It is a data structure in whichthe intrinsic ordering of theelements does determine theresult of its basic operations.

    S2 : The elements of a priorityqueue may be complexstructures that are ordered onone or several fields.

    Which of the following is correct ?

    (A) Both S1 and S2 are incorrect.

    (B) S1 is correct and S2 isincorrect.

    (C) S1 is incorrect and S2 iscorrect.

    (D) Both S1 and S2 are correct.

    31. Repository of information gatheredfrom multiple sources, storing underunified scheme at a single site iscalled as

    (A) Data mining

    (B) Meta data(C) Data warehousing

    (D) Database

    32. The task of correcting and preprocessing data is called as

    (A) Data streaming

    (B) Data cleaning

    (C) Data mining(D) Data storming

  • 7/29/2019 J-87-13-II (Computer Science & Applications)

    6/8

    Paper-II 6 J-87-13

    33. Using data p=3, q=11, n=pq, d=7 inRSA algorithm find the cipher text ofthe given plain text SUZANNE

    (A) BUTAEEZ

    (B) SUZANNE

    (C) XYZABCD(D) ABCDXYZ

    34. The relation divides on a set ofpositive integers is ________.

    (A) Symmetric and transitive

    (B) Anti symmetric and transitive

    (C) Symmetric only

    (D) Transitive only

    35. Give as good a bigO estimate aspossible for the following functions :

    (nlogn+n2)(n3+2) and (n!+2n)

    (n3+log(n2+1))

    (A) O(n5+2n2) & O(n3*n!)

    (B) O(n5) & O(n3*2n)

    (C) O(n5) & O(n3* n!)

    (D) O(n5+2n2) & O(n3*2n)

    36. A test contains 100 true/falsequestions. How many different wayscan a student answer the questions onthe test, if the answer may be left

    blank also.

    (A) 100P2

    (B) 100C2

    (C) 2100

    (D) 3100

    37. Which of the following connectedsimple graph has exactly onespanning tree ?

    (A) Complete graph

    (B) Hamiltonian graph

    (C) Euler graph(D) None of the above

    38. How many edges must be removed toproduce the spanning forest of agraph with N vertices, M edges andC connected components ?

    (A) M+NC

    (B) MNC

    (C) MN+C

    (D) M+N+C

    39. Which of the following shall be acompound proposition involving the

    propositions p, q and r, that is true

    when exactly two of the p, q and r aretrue and is false otherwise ?

    (A) (pqr) ( pqr) (pqr)

    (B) (pqr) ( pqr)(qpr)

    (C) (pqr) ( pqr)(pqr)

    (D) (prq) ( pqr)(pqr)

    40. The truth value of the statements :!xP(x) xP(x) and !x P(x) xP(x), (where the notation !xP(x)denotes the proposition There existsa unique x such that P(x) is true) are :

    (A) True and False

    (B) False and True

    (C) False and False

    (D) True and True

    41. How many different Booleanfunctions of degree 4 are there ?

    (A) 24

    (B) 28

    (C) 212

    (D) 216

  • 7/29/2019 J-87-13-II (Computer Science & Applications)

    7/8

    J-87-13 7 Paper-II

    42. A Boolean operators is defined asfollows :1 s 1 = 1, 1 s 0 = 0, 0 s 1 = 0 and0 s 0 = 1What will be the truth value of the

    expression (x s y) s z = x s (y s z) ?(A) Always false(B) Always true(C) Sometimes true(D) True when x, y, z are all true

    43. Which one of the following isdecimal value of a signed binarynumber 1101010, if it is in 2scomplement form ?

    (A) 42(B) 22(C) 21(D) 106

    44. A set of processors P1, P2, , Pkcan execute in parallel if Bernsteinsconditions are satisfied on a pairwise

    basis; that isP1 || P2 || P3 || .. || Pk if and only if :(A) Pi || Pj for all i j(B) Pi || Pj for all i = j+1(C) Pi || Pj for all i < j(D) Pi || Pj for all i > j

    45. When a mobile telephone physicallymoves from one to another cell, the

    base station transfers ownership tothe cell getting strongest signal. This

    process is known as _______.(A) handoff

    (B) mobile switching(C) mobile routing(D) cell switching

    46. A virtual memory based memorymanagement algorithm partiallyswaps out a process. This is anexample of(A) short term scheduling(B) long term scheduling

    (C) medium term scheduling(D) mutual exclusion

    47. Assuming that the disk head islocated initially at 32, find thenumber of disk moves required withFCFS if the disk queue of I/O blockrequests are 98, 37, 14, 124, 65, 67 :

    (A) 310(B) 324(C) 320(D) 321

    48. Let the page fault service time be 10millisecond(ms) in a computer withaverage memory access time being20 nanosecond(ns). If one page fault

    is generated for every 106 memory

    accesses, what is the effective accesstime for memory ?(A) 21 ns(B) 23 ns(C) 30 ns(D) 35 ns

    49. Consider the following UNIXcommand :sort temp; head 30

  • 7/29/2019 J-87-13-II (Computer Science & Applications)

    8/8

    Space For Rough Work

    Paper-II 8 J-87-13