Computer Science Application Paper II SET 2024
Computer Science Application Paper II SET 2024
S/22/2024/A
(SPACE FOR ROUGH WORK)
S/22/2024/A
51. PHHRrlRsid TfrqtfeH 51. Which of the following statements is a
t ■? proposition ?
52. ^SH^Pd+d ^ i^TOT "4* 52. Which of the following is a mandatory step
PdHPdP<sld ■^* ^ 3Tf^T^ t ? in the principle of Mathematical induction ?
53. ■RH epni /srk 53. Let functions /and g are one-to-one, then
54. "Cancellation laws" ^ t : .54. "Cancellation laws" are always satisfied in:
(A) fR ■^* (A) ling.
(8)S/22/2024/A P.T.O.
55. ^Kpuich 55. The group of matrices ' with
determinant is-a subgroup of the
3^?OT*T 31T^* ^ V^ group of invertible matrices under
'S^W^ t I multiplication.
(C) «(«- l)/2 (D) /?(«+ l)/2 (C) n(ri- A)/2 (D) «(« + l)/2
57. PHHPdPsid ^ 41^J|Puid 57. Which of the following is not a valid rule
^ ^t ? of Boolean Algebra ?
(8IS/22/2024/A
59." rHMreiPsld TIN) 59. Consider the following graph :
(C) ■qm 1?^* lfiT^df¥H (C) Hamiltonian path and Hamiltonian circuit
(D) ^ ^ "qiST "q tfTTc^tfro (D) Neither Hamiltonian path nor
Hamiltonian circuit
60, oiig^O ■ mIw- 60. The steps for finding post-order traversal of
.f*, : . a binary tree are :
.(A) "qr «n^, ^ (A)^ Visit root, traverse the left subtree and
"^', 1^ "qi^ ^ ^°Ri ^ traverse the right subtree
■ (B) "qr ^ "^ENzt ^ ^ (B) Visit root, traverse the right subtree
oJiq ^ ' and traverse the left subtree
(C) ^ TET^ ^ "qr (C) Traverse the left subtree, visit root and
' "511^', fqiT "qR ^ traverse the right subtree
(8)S/22/2024/A P.T.O.
61. For an w-variable Boolean function,
WT Csr^ -Rrf^sTf) ^ the maximum number of prime implicants
"I" : is:
63. "q^ •^* 32 fe (bit) "q;^* 63. A computer has 32-bit instructions and
1-2 fe (bit) t I "qf^ 240 12-bit addresses. If there are 240 two-
64. F ("q^T^) Pi^-iRifeia 01^4^ srf^oqRw 64. Consider the following minterm expression
qi Iq^K : for F ;
(B) QS + QS (B) QS + QS •
(C) QRS + QRS +QRS + QRS (C) QRS + QRS+QRS + QRS
(D) PQS + PQS +PQS + P'QS (D) PQS + PQS +PQS PQS
(8)S/22/2024/A
65. ^ (2) FT33 NOR^ 65. What is the minimum number of gates
^ ^f ? NOR gates ?
(A).2 • (A) 2
(B) 3 (B) 3
(O) 4 (C) 4
(D) 5 ■ (D) 5
»
(P + Q)(P.Q+P.R)(P.R + Q) (P + Q)(P.Q-+P.R)(P.R + Q)
,67. 256k ^ WT ^ 67. How many 32k x 1 RAM chips are needed
^ t ? bytes ?
(A) 8 (A) 8
(B) 32 (B) 32 .
(C) 64 , (C) 64
(8)S/22/2024/A P.T.O.
68. [HMfdRsld 3#ToJife x'^ 68. Which one of the following expressions
t ? X and y ?
(B) X 07. p) X © y
(8)S/22/2024/A
71. PiHrdRsld ^ ^ WTt^T 71. Which of the following loop is
^ 1^ ^ used to ensure that the statements
(A) For ^ (B) While^ (A) For loop (B) While loop
N
(C) do-while"^ (D) Next"^ (C) do-while loop (D) Next loop
P.T.O.
(8)S/22/2024/A
75. ^ 75. When we implement the runnabie interface,
f, ^ PHHrrlRsId ^ iFft
. we must define the method :
.(method)^ define f:
(A) start' () (B) run()
(A) start() (B) run()
76. C-H-Trfq^ floor 76. The standard C++ math library function
(- 8.8) PHHRriRsld tef : floor (- 8.8) will letum the following values:
(read) ^ t ? request ?
t? line segment ?
{8)S/22/2.024/A 8
19, (Reflection) x-axis ^ 79. The reflection about x-axis is
(about) rHHPdReld OT ■ represented by the following transformation
^t : matrices :
-1 0 0 -1 0 0
(A) 0 1 0 (A) 0 1 0
0" 0 1 0 0 1
1 0 0 "l- 0 o"
0 0 1 0 0 T
(C) 0 -1 0 (C) 0 -1 0
0 0 1 0 0 1
0 -1 . 0 0 1 0
1 0 0 (D) 1 0 0
(D)
0 0 1 0 0 1
■(8)S/22/2024/A P.T.O.
81. c+i'l'KHI 81. Which level of the three-schema architecture
(^<) ""jt ^ Riy. sftr describes the structure and constraints for
«
(8)S/22/2024/A ^ 10
84. XML ^ t: 84. The purpose of an XML namespace is to :.
85. HI^Pi'M "A* "R^ ^ 85. What is the primary goal of the support
3n«fe ^8?T ^ t ? vector machine in data mining ?
(B) 3#7?T (."feA^) ARn-Ntri ^ TJ^ (B) To predict the value of a dependent
^ilqisqqiuH qiV.il viable
(D) ^mIcI Aqti< ^ ■y'^sqi- '\'iciH (D) To minimize the number of support
vectors
(NULL): (NULL):
frorfer 1^ wr t, ^ ^\66^6 ^ is executed, what will be printed as
^ ■^* TO 1^ ?Ptt ? . output ?
(8)S/22/2024/A 12
\
(A) {A,B}
(A) {A,B}
(B) {A,B,D}
{A, B, D}
(D) {A}
P)' {A}
(D) 400 k
(C) 300 k (D) 400 k
(C) 300 k
13 P.T.O.
(81S/22/2024/A
91. Which is not scheduling criteria for CPU
« ^
92. "OT ^TOT, TT^ W( ■^* 92. Data enciyption standard work on a block
93. Ch^trt ^ Ah1<1 chli^t 93. Which is not memory management function
f ? of kernel?
37TTO ; process
(8)S/22/2024/A 14
94.- ^ 94. Necessary and sufficient conditions for
(A) =ti^d "feqn^ ti'ia ^"-sm (A)■ By delivering the signals to the defeult
97. Rhtfl 3PWri ■^* ^ ainlfe^i R^wh "fe^ 97. In a system where the operating system is
^ ^ t afe ^ ^ stored on disk and the bootstrap loader is
^ t, ^ een^ ^ ^ipT^ in firmware, what is the primary role of the
.w t ? boot; block ?
(A) sfrqy^ f^T^ ^ (A) Load the entire operating system into
"4* ote memory directly ■
p) fs^ ^ Tj;^ RiR'cia ©oiTcti He'll P) Read a single disk block and provide
afR ^ ^ ^ the address and length of the
sfR w^ 31^ ■ remaining boot strap program
(C) amtf^ fwR ^ ^.' (C) Encrypt the operating system files on
■f^ TR T^f%^ disk for security
P) affqtfCT fe^iT ^ ^ -q^ P) Initialize hardware devices before
loading the operating system
{8)S/22/2024/A 16
98. In which disk scheduling policy disk request
^ f^^TTf^ t ? • queue is segmented ?
P, . ■ 10 I'O
P2 , - 29- P2 ■ 29 •
P3 3 P3 3 ■
P4 7 P4 7
P5 12 ■P5 '2
(A) 23 ms (B) 23.25 ms (A) 23 ms (B) 23.25 ms
(8)S/22/2024/A 17 P.T.O.
101. "^rf^ ^ WsfTiT t, 101. If a process is under statistical control, then
it is :
,102. v:m^ ^ PshWd ^TT^TJIT# ^-■"--OT 102. Crystal methodology of agile is indexed
arpTfrm 1^ ^ t .i by: -
(8)S/22/2024/A 18
105. ^ ^ ^ 105. When the functions of a module are
^^ : it is:
106. 37Tf¥^SF^ Ti^ 3Tk 106. Which architectural'style uses one connector
. p) HfWt^;i-^®tishi^q P) Publish-Subscribe
P) ™ ^ ^^ ^ f ?
p) Are we building the product right ?
(C) ^ ^ "Sf^ m WT ^
(C) Are we following a standard
. ■ Tt f.?
process ?
P) ^ ^ TTH^ <iMdi<uiT ^ wiW
P) Are we using standard tools ?
^ Tt t ?
(8)S/22/2024/A 19 P.T.O.
108. 1 ^ 10 feFit 108. What amount of software can be developed
(B) P) Marathon
(D) P) sees
(8)S/22/2024/A 20
111. rHHPeiRsId arsrff ^ ^ ^ ■4* 111. Given the following,list of letters inserted in
^ "TO t : order into an empty binary search tree :
J, R, D, G, T, E, M, H, P, A, F, Q J, R, D, Q T, E, M, H, P, A, F, Q
hR"ii41 ^ ^ 1^-a^ What is the in-order traversal sequence of
% 7 the resulting binary search tree ?
(A) J, R, D, Q T, E,"M, H, P, A, F, Q (A) J, R, D, G, T, E, M, H, P, A, F, Q
(B) A, D, E, F, QH, J, M, P, Q, R,T (B) A, D, E, F, Q H, J, M, P, Q, R, T
(C) Q, P, M, T, R, J* H, Q F, E, D, A (C) Q, P, M, T, R, J, H, Q F, E, D, A
(D) T, R, Q, P, M,J, H, QF, E, D,A (D) T, R, Q, P, M, J, H, Q F, E, D, A
113. V^. ^ UN) ^ (MST) 113. In a weighted graph, ' the Minimum
rHHPdRsid ^ ^ ^ ^ 3FIRT Spanning Tree (MST) tries to
t ? minimize:
(C) hk'Rnt ^ PiR{t>d qJ-w ?N)" (C) the total weight of the edges from the
starting vertex to a specified vertex
(D) qJ-w ^ (D) the total weight of the edges
r
connecting all the vertices
1
{8)S/22/2024/A 21 P.T.O.
114. V 3^ E Trnrr 114. What is the running time complexity of
- (DPS) ^ Tf^ ^T?TT Depth-First Search (DPS) on a graph with
^ t- ? V vertices and E edges ?
115. a + b * c ^ die * h'^ 115.. What is the postfix notation of the infix
m1 WPqi^HJ T33^mFT ^ t ? expression : a + b * c- d I e * h
(B) ab + * c - de I h (B) ah + * c ~ de I h *
116. f («) = + m yP- + 50 116. What is the asymptotic upper bound for the
^ aro function
t ? f{n) + 100 «2 + 50 ?
(A) 0(1) ,(B) 0(«) (A). 0(1) (B) 0(«)
(C);0(«4) (D) 0(«2) (C) 0(«4) ' (D) 0(«2)
117. : 117. What is the time complexity of the
r3T(«-l), ^«>0 . recurrence retation:
T(n)= -^
[ 1,
3T(«-1), if rt >0
T(«)=
^ "SlfH ^t ? 1, otherwise
(8)S/22/2024/A 22
118:.PlHTdRsid ZTfTT '=hTk^[^d1 118. What is the time complexity of the following
■ W t- ?■ - function?
def function («): ' def function (n):
count - 0 count = 0 • .
if/?< = 0: lf«< = 0:
return
return
y- 1 -
■ y=1
while j < n : while j<n :
j=j + i ' j=j-^i ■
count = count + 1
count = count + 1
print (count) print (count) - '
function (20) function (20)
(A) 0(n2) (B) 0(n) (A) 0(«2) (B) 0(/7)
(C) O(nlogn) p) O(log«) (C) 0(« log n) (D) O(log n)
119. -^9^ iFTW Pi^RiRaa ' 119. Consider the following instances of the
knapsack problem :
^3# ^ ^f^sqi rt = 3 Number of items n = 2>
^ m = 20 Knapsack capacity w = 20
m (Pi,P2,P3) = (25, 24, 15) . Profits (P,,P2,P3)== (25, 24, 15) .
(Wj, ^2, W3) = (18, 15, 10) Weight (wj, W2, W3) = (18, 15, 10),
Pi^-iRiRaci ii chln+ii 04=1^14 Which of the following feasible solutions
3TfTOrm ^ t ? gives the maximum profit ?
(A) (1/2,1/3, 1/4) (B) (1,2/15,0) (A) (1/2,1/3, 1/4) (B) (1,2/15,0)
(C) (0, 2/3, 1) (D) (0, 1„ 1/2) (C) (0, 2/3, 1) (D) (0, 1, 1/2)
' 1-20. ^^ ^ ^ 4"' 120. What is the most appropriate data stmcture
^ Rm. dH^cKl ^131 to print elements of a queue in reverse
order ?
(A) (B) %xs (A) Stack (B) Linked list
(C) ^ (D) f (C) Graph , (D) Tree
(8)S/22/2024/A 23 P.T.O. .
121. ^ STRlto (FA) OT 121. Languages that can be accepted by Finite
(8)S/22/2024/A 24
124. ^ ^ ^ TftnW' 124. In analysis part of a compiler information •
t ? notation ?
25 P.T.O.
(8)S/22/2024/A
127. (compilers)^ 127. To build a suit of compilers,
^ Riy. a<1<^ii chi4>1 "4' "a^rra which approach can be used to save
effort. ?,
(A) (A) Syntax Directed Translation
(B) ^*e<Hlfsy.e (B) Intermediate Representation
(C) (^Rrti=h^n snrfMw (C) Lexical Analysis
(D) ^ 3TffteqT?%^ (D) Parallel code optimization
129. Xr^ HNT ^ ^rak ^ chHl^d< 129. A language processor that can usually give
^ a^ll k' <^eu< ^kfcTT f : better .error diagnostics than a compiler is :
(A) idiildi (A) Interpreter
(B) "^1?^ (B) Byte Code
{8)S/22/2024/A 26
131. OSlTffe^ ^ 131. In OSI model, routing of the packets to
P) (D) Transport
133. ite "^ « "^Tt^ ^ ^^ 133. The number of physical links in a fully
. (C) n{n - l)/2 (D) n(« - 1) (C) nin - l)/2 (D) n{n - 1)
27
P.T.O
(8)S/22/2024/A
134. TCP/IP ylilchM ^ ii fer 134. Port address used in an Internet
TT^' ; --fe ^ employing TCP/IP protocol is comprised
f- I of. bits.
135. fe ^ TRs^IT f^RT^* 135. The number of bit positions in which two
t, ; •^. f I codewords differ is called the
(A) ^ (A) Euclidean distance
(B) (B) Cosine distance
(C) tiTFT ^ (C) Hamming distance
(D) ^ (D) Manhattan distance ■ ■' ■
137. Phtil ^dqqi ^ f^iRiichcrl ^ 137. Which protocol is used to fmd the Logical
"5^ eiiPiiq>«n ^ %TT ■address for a network machine from its
tW uVUm ^ 3PjW fen ^ t ? Physical address ?
(A) qi^^ioi ylilchTd , (A) Message Control Protocol
(B) y,4^ fefte^?FT yl-ilqiici (B) Address Resolution Protocol
(C) HiKqi Tt|^ (C) Forward Address Resolution Protocol
(D) "ffe "Q^. feftc^^PT (D) Reverse Address Resolution Protocol
(8)S/22/2024/A 28
138. ^ ^ ^ 138. Domain name space represented as a
139. PHMRrtfeld' dJld-Hl laaS =Kii<JS 139. Which of the following cloud services is an
: "^fRTT f I called.
29 P.T.O,
(8)S/22/2024/A
141. 31^-^ -gpFT ^ 141. The effectiveness of alpha-beta pnmning
is dependent on the order in which
^ "i" ? the states are examined.
(A) 3T?^tT^ (B) (A) highly (B) never
(C) -^-lan (D) (C) minimum (D) always
142. Loves (TFT, T^) V Loves (TFT, 142. Loves (Ram, Shyam) V Loves (Ram,
^15^) '^Ff Pi^HUi oq^ Mohan)expressing knowledge
i I representation.
(A) (B) ^ ■ (A) Incomplete (B) Complete
.(C) 3h^'^cki (D) uq^T (C) Disjoint (D) Type restriction
143. yPd'HHl f^r*5H mfro 3T^?:q 143. -Regressive planning works fiom
^ -qnTT "^tTtTT tfie goal rather than from the initial'
11 state.
{8)S/22/2024/A 30
145. ^ t" ? 145. Which of the following is correct ?
"I" problems
31
P.t.O.
(8)S/22/2024/A
148". ^ ^ 148. A straight forward approach of maintaining
■ ■ y^K etMiy, «2l^ ^ l<cb 'jR^ctiVl a uniform spread of solution in objectives
^ "I" I space is known as
150. 3fee ^ rHMPdRsId 150. Which of the following is not correct in the
(8)S/22/2024/A 32
(SPACE FOR ROUGH WORK)
S/22/2024/A
(SPACE FOR ROUGH WORK)
V
1
/
V
:i
H
f'
}.
n
./
I '
• I
f ]
S/22/2024/A