Courses

# Computer Science And Engineering Past Year Paper - III Dec 2014

## 75 Questions MCQ Test | Computer Science And Engineering Past Year Paper - III Dec 2014

Description
This mock test of Computer Science And Engineering Past Year Paper - III Dec 2014 for Government Jobs helps you for every Government Jobs entrance exam. This contains 75 Multiple Choice Questions for Government Jobs Computer Science And Engineering Past Year Paper - III Dec 2014 (mcq) to study with solutions a complete question bank. The solved questions answers in this Computer Science And Engineering Past Year Paper - III Dec 2014 quiz give you a good mix of easy questions and tough questions. Government Jobs students definitely take this Computer Science And Engineering Past Year Paper - III Dec 2014 exercise for a better result in the exam. You can find other Computer Science And Engineering Past Year Paper - III Dec 2014 extra questions, long questions & short questions for Government Jobs on EduRev as well by searching above.
QUESTION: 1

Solution:
QUESTION: 2

Solution:
QUESTION: 3

### In a dot matrix printer the time to print a character is 6 m.sec., time to space in between characters is 2 m.sec., and the number of characters in a line are 200. The printing speed of the dot matrix printer in characters per second and the time to print a character line are given by which of the following options ?

Solution:
QUESTION: 4

Match the following 8085 instructions with the flags :  Solution:
QUESTION: 5

How many times will the following loop be executed ?

LXI B, 0007 H
LOP : DCX B
MOV A, B
ORA C
JNZ LOP

Solution:
QUESTION: 6

Specify the contents of the accumulator and the status of the S, Z and CY flags when 8085 microprocessor performs addition of 87 H and 79 H.

Solution:
QUESTION: 7

Location transparency allows :

I. Users to treat the data as if it is done at one location.
II. Programmers to treat the data as if it is at one location.
III. Managers to treat the data as if it is at one location.
Which one of the following is correct ?

Solution:
QUESTION: 8

Which of the following is correct ?
I.Two phase locking is an optimistic protocol.
II. Two phase locking is pessimistic protocol

III. Time stamping is an optimistic protocol.
IV. Time stamping is pessimistic protocol.

Solution:
QUESTION: 9

_________ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information.

Solution:
QUESTION: 10

Let R = ABCDE is a relational scheme with functional dependency set F = {A → B, B → C, AC → D}. The attribute closures of A and E are

Solution:
QUESTION: 11

Consider the following statements :

I. Re- construction operation used in mixed fragmentation satisfies commutative rule.
II. Re- construction operation used in vertical fragmentation satisfies commutative rule

Which of the following is correct ?

Solution:
QUESTION: 12

Which of the following is false ?

Solution:
QUESTION: 13

Which of the following categories of languages do not refer to animation languages ?

Solution:
QUESTION: 14

Match the following :  Solution:
QUESTION: 15

A technique used to approximate halftones without reducing spatial resolution is known as _________.

Solution:
QUESTION: 16

Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated by 45 degrees about a point P(–1, –1). The co-ordinates of the new triangle obtained after rotation shall be _______

Solution:
QUESTION: 17

In Cyrus- Beck algorithm for line clipping the value of t parameter is computed by the relation : (Here P1 and P2 are the two end points of the line, f is a point on the boundary, n1 is inner normal)

Solution:
QUESTION: 18

Match the following :   Solution:
QUESTION: 19

Consider the following statements S1, S2 and S3 :

S1 : In call- by- value, anything that is passed into a function call is unchanged in the caller’s scope when the function returns.
S2 : In call- by- reference, a function receives implicit reference to a variable used as argument.
S3 : In call- by- reference, caller is unable to see the modified variable used as argument.

Solution:
QUESTION: 20

How many tokens will be generated by the scanner for the following statement ? x = x * (a + b) – 5;

Solution:
QUESTION: 21

Which of the following statements is not true ?

Solution:
QUESTION: 22

The pushdown automation M = ({q0, q1, q2}, {a, b}, {0, 1}, δ, q0, 0,{q0}) with Accepts the language

Solution:
QUESTION: 23

Given two languages : Solution:
QUESTION: 24

Regular expression for the complement of language L = {an bm | n ≥ 4, m ≤ 3} is

Solution:
QUESTION: 25

For n devices in a network, _____ number of duplex-mode links are required for a mesh topology.

Solution:
QUESTION: 26

How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous ? (Assuming 1 start bit and 1 stop bit)

Solution:
QUESTION: 27

Which of the following is not a field in TCP header ?

Solution:
QUESTION: 28

What is the propagation time if the distance between the two points is 48,000 ? Assume the propagation speed to be 2.4 × 108 metre/second in cable.

Solution:
QUESTION: 29

__________ is a bit- oriented protocol for communication over point- to- point and multipoint links.

Solution:
QUESTION: 30

Which one of the following is true for asymmetric- key cryptography ?

Solution:
QUESTION: 31

Any decision tree that sorts n elements has height

Solution:
QUESTION: 32

Match the following :  Solution:
QUESTION: 33

We can show that the clique problem is NP- hard by proving that

Solution:
QUESTION: 34

Dijkstra algorithm, which solves the single- source shortest- - paths problem, is a _______, and the Floyd- Warshall algorithm, which finds shortest paths between all pairs of vertices, is a ______

Solution:
QUESTION: 35

Consider the problem of a chain <A1, A2, A3> of three matrices. Suppose that the dimensions of the matrices are 10 × 100, 100 × 5 and 5 × 50 respectively. There are two different ways of parenthesization : (i) ((A1 A2)A3) and (ii) (A1(A2 A3)). Computing the product according to the first parenthesization is ________ times faster in comparison to the second parenthesization.

Solution:
QUESTION: 36

Suppose that we have numbers between 1 and 1000 in a binary search tree and we want to search for the number 365. Which of the following sequences could not be the sequence of nodes examined ?

Solution:
QUESTION: 37

Solution:
QUESTION: 38

How to express that some person keeps animals as pets ?

Solution:
QUESTION: 39

Converting a primitive type data into its corresponding wrapper class object instance is called

Solution:
QUESTION: 40

The behaviour of the document elements in XML can be defined by

Solution:
QUESTION: 41

What is true about UML stereotypes ?

Solution:
QUESTION: 42

Which method is called first by an applet program ?

Solution:
QUESTION: 43

Which one of the following is not a source code metric ?

Solution:
QUESTION: 44

To compute function points (FP), the following relationship is used FP = Count – total × (0.65 + 0.01 × ∑(Fi)) where Fi (i = 1 to n) are value adjustment factors (VAF) based on n questions. The value of n is

Solution:
QUESTION: 45

Assume that the software team defines a project risk with 80% probability of occurrence of risk in the following manner : Only 70 percent of the software components scheduled for reuse will be integrated into the application and the remaining functionality will have to be custom developed. If 60 reusable components were planned with average component size as 100 LOC and software engineering cost for each LOC as \$ 14, then the risk exposure would be

Solution:
QUESTION: 46

Maximum possible value of reliability is

Solution:
QUESTION: 47

‘FAN IN’ of a component A is defined as

Solution:
QUESTION: 48

Temporal cohesion means

Solution:
QUESTION: 49

Various storage devices used by an operating system can be arranged as follows in increasing order of accessing speed :

Solution:
QUESTION: 50

How many disk blocks are required to keep list of free disk blocks in a 16 GB hard disk with 1 kB block size using linked list of free disk blocks ? Assume that the disk block number is stored in 32 bits.

Solution:
QUESTION: 51

Consider an imaginary disk with 40 cylinders. A request come to read a block on cylinder 11.While the seek to cylinder 11 is in progress, new requests come in for cylinders 1, 36, 16, 34, 9 and 12 in that order. The number of arm motions using shortest seek first algorithm is

Solution:
QUESTION: 52

An operating system has 13 tape drives. There are three processes P1, P2 & P3. Maximum requirement of P1 is 11 tape drives, P2 is 5 tape drives and P3 is 8 tape drives. Currently, P1 is allocated 6 tape drives, P2 is allocated 3 tape drives and P3 is allocated 2 tape drives.Which of the following sequences represent a safe state ?

Solution:
QUESTION: 53

Monitor is an Interprocess Communication (IPC) technique which can be described as

Solution:
QUESTION: 54

In a distributed computing environment, distributed shared memory is used which is

Solution:
QUESTION: 55

Equivalent logical expression for the Well Formed Formula (WFF), ~( " x) F[x] is

Solution:
QUESTION: 56

An A* algorithm is a heuristic search technique which

Solution:
QUESTION: 57

The resolvent of the set of clauses Solution:
QUESTION: 58

Match the following :   Solution:
QUESTION: 59

Match the following components of an expert system :   Solution:
QUESTION: 60

A computer based information system is needed :
I.as it is difficult for administrative staff to process data.
II. due to rapid growth of information and communication technology.
III. due to growing size of organizations which need to process large volume of data.
IV. as timely and accurate decisions are to be taken.

Which of the above statement(s) is/are true ?

Solution:
QUESTION: 61

Given the recursively enumerable language (LRE), the context sensitive language (LCS), the recursive language (LREC), the context free language (LCF) and deterministic context free language (LDCF).
The relationship between these families is given by

Solution:
QUESTION: 62

Match the following :  Solution:
QUESTION: 63

According to pumping lemma for context free languages :

Let L be an infinite context free language, then there exists some positive integer m such that any w ∈ L with | w | > m can be decomposed as w = u v x y z

Solution:
QUESTION: 64 The Laplacian of an image at all points (x, y) can be implemented by convolving the image with spatial mask. Which of the following can be used as the spatial mask ?

Solution:
QUESTION: 65

Given a simple image of size 10 × 10 whose histogram models the symbol probabilities and is given by The first order estimate of image entropy is maximum when

Solution:
QUESTION: 66

A Butterworth lowpass filter of order n, with a cutoff frequency at distance D0 from the origin, has the transfer function H(u, v) given by

Solution:
QUESTION: 67

If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is

Solution:
QUESTION: 68

The occurrence of degeneracy while solving a transportation problem means that

Solution:
QUESTION: 69

Five men are available to do five different jobs. From past records, the time (in hours) that each man takes to do each job is known and is given in the following table : Find out the minimum time required to complete all the jobs.

Solution:
QUESTION: 70

Consider the following statements about a perception :

I. Feature detector can be any function of the input parameters.
II. Learning procedure only adjusts the connection weights to the output layer.
Identify the correct statement out of the following :

Solution:
QUESTION: 71

A _______ point of a fuzzy set A is a point x ∈ X at which µA(x) = 0.5

Solution:
QUESTION: 72

Match the following learning modes w.r.t. characteristics of available information for learning :  Solution:
QUESTION: 73

Which of the following versions of Windows O.S. contain built- in partition manager which allows us to shrink and expand pre- defined drives ?

Solution:
QUESTION: 74

A Trojan horse is

Solution:
QUESTION: 75

Which of the following computing models is not an example of distributed computing environment?

Solution: