Mar 37223 C
Mar 37223 C
C
COMPUTER SCIENCE AND APPLICATIONS
Signature and Name of Invigilator Seat No.
1. (Signature) ......................................... (In figures as in Admit Card)
(Name) ................................................ Seat No. ..............................................................
2. (Signature) ......................................... (In words)
A B D (C)
5. Your responses to the items are to be indicated in the OMR A B D
Sheet given inside the Booklet only. If you mark at any place
other than in the circle in the OMR Sheet, it will not be evaluated. 5.
6. Read instructions given inside carefully.
7. Rough Work is to be done at the end of this booklet. 6.
8. If you write your Name, Seat Number, Phone Number or put 7.
any mark on any part of the OMR Sheet, except for the space
8.
allotted for the relevant entries, which may disclose your
identity, or use abusive language or employ any other unfair
means, you will render yourself liable to disqualification.
9. You have to return original OMR Sheet to the invigilator at the
end of the examination compulsorily and must not carry it with 9.
you outside the Examination Hall. You are, however, allowed
to carry the Test Booklet and duplicate copy of OMR Sheet on
conclusion of examination.
10.
10. Use only Blue/Black Ball point pen.
11.
11. Use of any calculator or log table, etc., is prohibited.
12. There is no negative marking for incorrect answers. 12.
MAR - 37223/II—C
2
MAR - 37223/II—C
Computer Science and Applications
Paper II
Time Allowed : 120 Minutes] [Maximum Marks : 200
Note : This Paper contains Hundred (100) multiple choice questions. Each question
carrying Two (2) marks. Attempt All questions.
3 [P.T.O.
MAR - 37223/II—C
(C) Last-in-first-out
(C) exec
(D) Most-recently-used
(D) dup
6. We need to design a filesystem to
store image files having maximum 9. Which of the following is not an
one block size. Which of the following
Inter-process-communication
disk space allocation methods is
mechanism in Linux ?
most appropriate to meet this
requirement ? (A) Pipe
4
MAR - 37223/II—C
10. Windows operating system use the 12. In software development process,
following two modes to protect user which is not one of the key questions
data : meeting ?
(A) Normal user mode and (A) What did you do since the last
Administrator mode meeting ?
(B) User mode and Kernel mode (B) What obstacles are you
(C) Hardware mode and Software encountering ?
mode
(C) What is the cause of the
(D) Hardware interrupt mode and problems you are
Software interrupt mode encountering ?
11. In software development process,
(D) What do you plan to accomplish
...................... is a design strategy that
at the next team meeting ?
tries to address the design and
13. A user is describing a real-life
implementation complications
example during requirement
associated with such inter-
gathering stage of a software
dependencies by explicitly
development project.
introducing aspects as system
characteristics. This most appropriately represents
which requirement discovery
(A) Agile development model
technique ?
(B) Evolutionary development
model (A) Viewpoint
(iv) Monitoring
(A) LOC
(A) (i), (ii) and (iii)
(B) Function Count
(B) (i), (ii) and (iv)
(C) Program Length (C) (i), (ii), (iii) and (iv)
6
MAR - 37223/II—C
cleanly is known as............ . (B) The leaf nodes have values less
than or equal to their parents
(A) Debugging
(C) The leaf nodes and their parents
(B) Rebugging
have same values
(C) Prebugging (D) The leaf nodes have values
7 [P.T.O.
MAR - 37223/II—C
8
MAR - 37223/II—C
28. Match the algorithms in Group 1 29. Which of the following is not true
with the design strategy used by the for the problem classes P, NP, NP-
(A) P NP
Group 1
(B) NP-complete NP
P. Merge Sort
(C) NP-hard NP
Q. Insertion Sort
(D) NP-complete NP-hard
R. Prim's algorithm
30. Maximum finding algorithm takes
S. Kruskal's algorithm
O(log 2 n) parallel time with
Group 2 p > n/2 processors using P-RAM
9 [P.T.O.
MAR - 37223/II—C
10
MAR - 37223/II—C
11 [P.T.O.
MAR - 37223/II—C
39. Consider the following function with 40. Consider the grammar shown below
line numbers. S AA
2. { The grammar is :
12
MAR - 37223/II—C
42. While virtulizing X-86 architecture, 44. The key length of a 3-key Triple
Data Encryption Standard
type-I hypervisor :
(3TDES) is :
(A) Interact with OS through ABI
(A) 112 bits
and emulate the ISA for Guest (B) 256 bits
OS (C) 512 bits
(D) run directly on top of the travels at 2.4 × 108 m/s. What will
be the transmission time ?
hardware with API exposed
(A) 50 ms
43. The guard interval is provided in
(B) 2 ms
Orthogonal Frequency-Division (C) 0.020 ms
Multiplexing (OFDM). (D) 0.2 ms
(A) To eliminate the need of pulse 46. What is the minimum Hamming
distance for detection of three errors
shaping filter
or correction of two errors ?
(B) To eliminiate Inter Symbol
(A) 2
Interface (ISI)
(B) 3
(C) High symbol rate (C) 4
13 [P.T.O.
MAR - 37223/II—C
47. Match the following OSI layers with 49. In symmetric-key cryptography, how
(D) a-(iii), b-(ii), c-(i), d-(iv) (b) Classs B (2) Reserved for
future use
48. If the frame to be transmitted is
1101011011 and the CRC (c) Class D (3) Large Organi-
14
MAR - 37223/II—C
(B) 4, 3
52. An intermediate form between
(C) 3, 4
syntactic and logical form used in
(D) 5, 2
Natural language processing is
55. Which of the following statements
known as : are true for 'Rational Agents' ?
15 [P.T.O.
MAR - 37223/II—C
(A) 2 l
(A) t-norms & t-conorms
(B) 2p
16
MAR - 37223/II—C
linearly separable ?
(A)
V = {A, B, C, D, E, F, G, H, I}
(A) 2 (B) 3
(C) 42 (D) 43
17 [P.T.O.
MAR - 37223/II—C
62. Group code are generated using 65. Let X and Y be random variable with
is : same
18
MAR - 37223/II—C
19 [P.T.O.
MAR - 37223/II—C
20
MAR - 37223/II—C
(C) (i), (ii) & (iii) (B) (i), (iii) & (iv)
(D) (i), (ii), (iii) & (iv) (C) (i), (ii), (iii) & (iv)
directives can be used to define & 78. Which of the following are
re-define numeric constants ? representative application areas
where vector processing is used ?
(i) EQU
(i) AI & Expert systems
(ii) % assign (ii) Seismic Data Analysis
21 [P.T.O.
MAR - 37223/II—C
79. A computer has 512 KB, 4-way set 81. A normalised heterogeneous
abstract syntax tree must :
associative, write back data cache
(i) Trees with magnitude of node
with block size of 32 bytes. The type are called heterogeneous
processor sends 32 bit addresses to tree
the cache controller. Each cache tag (ii) Normalised heterogeneous tree
use a normalised list of children
directory entry contains, in addition like homogeneous tree
to address tag, 2 valid bits, 1 (iii) Nodes have irregular children
modified bit and 1 replacement bit. (iv) Use more than a single node
The number of bits in the tag field data type but with normalised
child list representation.
of an address is :
(A) (i), (ii) and (iv)
(A) 80 (B) 32 (B) (i) and (ii)
(C) (ii) and (iv)
(C) 64 (D) 15
(D) (iv) only
80. Why do race conditions occur ? 82. Which of the following comparison
between static and dynamic type
(i) Values of memory locations checking is correct ?
replicated in registers during (i) dynamic type checking slow
execution. down execution
(ii) dynamic type checking offers
(ii) Content switches at arbitrary more flexibility to the
times during execution. programmers
(iii) Dynamic type checking is more
(iii) Threads can see stale memory reliable
values in registers. (iv) Unlike static type checking the
dynamic type checking is done
(A) Only (ii)
during compilations.
(B) Only (iii) (A) (i) and (ii)
(B) (i) and (iii)
(C) (i) & (ii)
(C) (ii) and (iii)
(D) (i), (ii) & (iii) (D) (iv) only
22
MAR - 37223/II—C
83. Consider the following ‘C’ program 85. Exception handling is not meant to
fragment : handle problems for which case ?
int i = 5; (i) termination of program
do (ii) handle return value
{ representing error
84. The object-oriented programming 86. The scope rules, especially the rules
23 [P.T.O.
MAR - 37223/II—C
24
MAR - 37223/II—C
91. Data integrity constraints are used 93. Every table with two single valued
for :
attributes is in :
(i) Establishing limits on
allowable property values (A) 2NF
(ii) Specifying a set of acceptable, (B) 3NF
predefined options to property (C) BCNF
values
(D) All of the above
(iii) Ensuring that duplicate values
are not entered in the table 94. Database contains two tables :
(iv) Controlling that data is Employee (id, name, salary, did) and
accessed by authorised users
Dept. (did, dname).
(A) (i) & (ii)
(B) (i), (ii) & (iii) Which of the following is an incorrect
(C) (iii) & (iv) SQL query ?
(D) (i), (ii), (iii) & (iv) (A) Select name, dname from
92. Match the following statements in employee natural join Dept;
Group 1 with database objects in
Group 2 : (B) Delete from employee where did
Group 1 in (Select did from Dept);
P. View (C) Update employee set salary =
Q. Table salary * 1.03 where salary >
R. Role
100000;
S. Function
(D) Insert values into employee
Group 2
I. that which contains data (1, 'vijay', 100000, 12);
II. that which returns a value
95. Which keyword is used to rename
III. that helps in managing groups
of privileges a field name in SQL query ?
IV. that which contains only a (A) AS
stored SQL statement
(A) P I, Q II, R III, S IV (B) ALTER
(B) P II, Q I, R IV, S III
(C) LIKE
(C) P IV, Q I, R III, S II
(D) P IV, Q III, R I, S II (D) FROM
25 [P.T.O.
MAR - 37223/II—C
as...............association rule.
(A) Cassandra
(A) Multivalued
(B) Riak
(B) Ordered
(C) Mango DB
(C) Numeric
26
MAR - 37223/II—C
ROUGH WORK
27 [P.T.O.
MAR - 37223/II—C
ROUGH WORK
28