0 ratings0% found this document useful (0 votes) 169 views31 pages2 Computer Science PDF
Scientific Officer Paper for computer science
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
$/$0/2013/02
COMPUTER SCIENCE
Roll_No.
| | BOOKLET NO. 2101
candidate shoulawite hisfherRollNo. nthe box above. Total No. of Questions : 150
ime : 2 Hours} | No. of Printed Pages : 32 [Total Marks : 300
INSTRUCTIONS FOR CANDIDATES
1. All questions are compulsory.
2. All questions carry equal marks
3. The question paper contains 150 questions. The examinee should verify that.
the requisite number of questions are printed in the question paper, otherwise
he should ask for another question paper.
4. The cover page indicates the number of printed pages in the question paper. The
examinee should verify that the requisite number of pages are attached in the question
paper, otherwise he should ask for another question paper.
5. Read carefully the instructions given on the answer sheet supplied and indicate
your answers accordingly.
6. Kindly make necessary entries on the answer sheet only at the places indicated
and nowhere else.
7. Examinees should specially pay attention that 2 marks will be awarded for correct
answer.
8. Examinees should do all rough work on the space meant for rough work on
the last page of the question paper and nowhere else, not even on the answer
sheet.
$/S0/2013/022
Reduced form of the expression AB' + CD' + BC'D' + ABCD + ABC'D
is: .
(A) A+ CD'+ BD' (B) A + BCD' + A'CD'
(C) AD' + AD + CD! (D) A + CD' + BCD’
Push down automata can most conveniently represent :
(A) Context sensitive grammars (B) Context free grammars
(C) Regular grammars (D) Unrestricted grammars
How many switch points are needed in a crossbar switch network that connects
4 processors to 5 memory modules ?
(A) 4x 5 = 20 (BR) 4+5=9
(C) 4x5-4=16 (D) 4x5-5 = 15
A digital computer has common bus system for 16 registers of 32 bits each
The bus is constructed with multiplexers. How many multiplexers of what
size will be needed ?
(A) 4 multiplexers of size 32 x 1
(B) 32 multiplexers of size 16 x 1
(C) 16 multiplexers of size 32 x 1
(D) 8 multiplexers of size 16 x 1
A deterministic finite state automaton that accepts all strings of 0’s and 1’s
which terminate in last two same symbols will contain minimum :
(A) 3 states (B) 4 states
(C) 5 states (D) 6 states
Which of the following circuits can be used as parallel to serial
converter ?
(A) Digital counter (B) Decoder
(C) Demultiplexer (D) Multiplexer
$/SO/2013/0210.
11.
12.
13.
3
Cache memory works on the principle and idea of :
(A) the heuristic 80-20 rule (B) locality of reference
(C) virtual memory (D) segmentation
If A and B are non-terminal symbols and w is a string of terminal symbols
only, then which of the following is a right linear grammar ?
(A) A> Bw (B) A > Buhw
(©) A> wB () A> wBlw
The number of 128 x 8 RAM chips needed to provide a memory capacity
of 2048 bytes will be :
(A) 8 (B) 16
(Cc) 4 (D) None of these
The value of k, in LRtk) can not be :
(A) 0 (B) 1
() 2 () None of these
The language L = {0" 1" 2'|n > 1, i > 1} is generated by the following context
free grammar :
(A) S > AB, A > 0A|0, B > 1B2/12
(B) S > AB, A > 0A1/01| B > 2B/2
(C) S > OA1BIO1B|B, A > 01, B > 2B|2
(D) All of the above
Every symbolic reference to a memory operand has to be assembled as :
(A) offset, index base (B) segment base, offset
(C) index base, offset (D) offset
Which of the following shows the logical state of a digital circuit output for
every possible combination of logical states in the inputs ?
(A) Routing table (B) Function table
(C) Decision table (D) Truth table
$/SO/2013/0214,
15.
16.
17.
18.
4
The process of organizing the memory into two banks to allow 8 and 16 bit
data operation is called :
(A) Bank switching
(B) Index mapping
(C) Two-way memory interleaving
(D) Memory segmentation
Turing machine can be used for :
(A) Accepting regular grammars
(B) Accepting unrestricted grammars and computation of integer functions
(C) Design of a mathematical model
(D) Counting number of states in a DFA
Floating point representation with 8-bit fraction and 6-bit exponent of the
binary number + 1001.11 is :
(A) Fraction : 01001110, Exponent : 000100
(B) Fraction : 10011100, Exponent : 000011
(C) Fraction : 00100111, Exponent ; 000100
(D) Fraction : 01001110, Exponent : 100100
The speedup ratio for a k-segment pipeline with a clock cycle time tp used
to execute n tasks, given t,, as the time to complete each task by a non-pipelined
unit, is expressed as :
(A) S = kt/dke +n - Dt, (B) S = ntyik +n ~ Dt,
(C) S = kk +n - It, (D) S = nt fk +n- 1) ty
Let N be the number of bits in the sum obtained by a ripple carry adder.
Then the time required by the adder is :
(A) Constant time (B) O(N) ie. linear time
(C) Olog N) ie, logarithmic time (D) O(N log N)
S/SO/2013/025
Form of production rules given by A> BC| a; where B, A, C are non-terminal
and a is a terminal symbol represents :
(A) CNF grammar
(B) GNF grammar
(C) Left recursive grammar
(D) Left factored grammar
For any two regular expressions r and s over the alphabet 3, the regular
expression (r*s*)* is equal to :
(A) (s)* (B) (r + s)*
(©) + st (D) None of these
The number of symbols necessary to simulate a TM with m symbols and n
states is :
(A) m+n (B) mn
(C) 8mn + 4m @) 4mn+m
A push down machine behaves like a finite state machine when the number
of auxiliary memory it has, is :
(A 1 (B) 0
(C) 2 (D) none of these
Which of the following is more responsible loading operating system from the
FD/HD into RAM ?
(A) Bootstrap loader (B) CPU
(C) Power On Self Test (POST) @) Boot Record
$/$0/2013/0224,
25.
26.
27.
6
Access time of a high speed Cache memory is 40 ns and its hit ratio is 80%
Main memory has an access time of 100 ns. The effective access time for CPU.
to access memory is :
(A) 52 ns (B) 70 ns
(C) 80 ns (D) 60 ns
Minimum number of 2-input NAND gates required to implement the function.
Fe(x'+y)@+twiis:
(A) 6 (B) 4
(C) 6 Mm) 3
P, Q and R are three languages. If P and R are regular and if PQ = R,
then :
(A) Q has to be regular (B) Q can not be regular
(C) Q need not be regular ‘D) Q can not be a CFL
The universal TM influenced the concept of :
(A) Stored program computers
‘B) Computability
\C) Interpretative implementation of programming language
(D) All of the above
The language of all words with at least 2 a’s is described by the regular
expression :
(A) b*ab*a(a + by* (B) (aby*a b* a(ba)*
(C) (a + b)* ab* ala + b)* @) all of these
$/SO/2013/0230.
31
32.
33.
34,
7
Which of the following parsers is the most powerful ?
(A)
(C)
Operator precedence (B) LALR
Canonical LR (D) SLR
Local and loop optimization inturns provide motivation for :
(A)
(B)
(C)
(D)
Data flow analysis
Constant folding
Peephole optimization
DFA and constant folding
A6-MHz channel is used by a digital signalling system utilizing 4-level signals.
The maximum possible transmission rate is :
(A) 1.5 Mbaud/sec (B) 12 Mbaud/sec
(C) 24 Mbaud/sec @) 6 Mbaud/sec
FDDI is :
(A) ring network (B) mesh network
(©) star network (D) bus based network
Indefinite blocking is called :
(A)
(C)
deadlock (B) starvation
both (A) and (B) (D) none of these
A public key encryption system :
(A)
(B)
(C)
(D)
allows only the correct receiver to decode the data
allows any one to decode the data
allows only the correct sender to decode the data
does not encode the data before its transmission
$/S0/2013/0236.
37.
38.
39.
8
A logical addre:
space of 8 pages of 1024 words is mapped to a physical
memory of 32 frames. The number of bits in logical and physical addresses
are:
(A) 3 bits and 5 bits (B) 13 bits and 15 bits
(C) 10 bits and 5 bits (D) 18 bits and 5 bits
The average turn around time by using shortest job. First scheduling
technique for the four jobs with next burst time as 6, 3, 8 and 7 units
respectively will be :
(A) 13 units (B) 15 units
(C) 24 units (D) 16 units
Bit vector is defined as :
(A) The free space list implemented as a bit map or bit vector
(B) No free space list is implemented
(C) Both (A) and (B)
(D) None of the above
Round-Robin scheduling is essentially the pre-emptive version of :
(A) SJF
(B) FIFO
(C) Longest time first
(D) Shortest remaining time first
A packet-switching network :
(A) is free
(B) can reduce the cost of using an information utility
(C) allows communication channel to be shared among more than one
user
(D) both (B) and (C) above
$/$0/2013/0240.
41.
42.
43.
44.
45.
A bridge operates in :
(A) Physical and data link layer
(B) Only data link layer
(©) Only physical layer
@) Network layer
The dotted-decimal notation for the IP address 10000001 00001011 00001011
11101111 is :
(A) 129.11.11.239 (B) 249.155.251.15
(C) 129.11.10.240 (D) none of these
An IP address 227,12.14.87 is in the following class :
(A) E ‘B) D
(Cc) B Di Cc
The signal to noise ratio for a voice grade line is 30.1 dB or a power ratio
of 1028 : 1. The maximum archivable data rate on this line whose spectrum
ranges from 300 Hz to 3400 Hz is :
(A) 6200 bps (B) 34000 bps
(C) 9600 bps (D) 31000 bps
An operating system contains 3 user processes each requiring 2 units of resource
R. The minimum number of units of R such that no deadlock will ever arise
is:
(A) 3 (B) 5
(C) 4 (D) 6
Tf an instruction takes i microseconds and a page fault takes an additional
j microseconds, the effective instruction time if on an average a page fault
occurs every k instruction is :
(A) i+ jk (B) G+ jk
(Cc) i+G*k) M) G+kh*k
$/$0/2013/0246.
47.
48.
49.
50.
51.
10
The main advantage of the concept of interrupt is :
(A) polling
(B) spooling
(C) job scheduling
(D) blocking the currently running process
Thrashing is :
(A) the high paging activity
(B) an activity in which processes spent more time paging than executing
(C) both (A) and (B)
(D) none of the above
The network interface that permits equipment without an ISDN interface to
be connected into an ISDN interface is known as :
(A) TE2 (B) TA
(C) TE () TE1
The number of addresses in block, 200.17.21.128/127 is :
(A) 16 (B) 32
(C) 31 (D) 24
A modem that packs 6 bits into each signal change and operates at 14,400
bps can result in a maximum throughput of :
(A) 14400 bps (B) 9600 bps
(C) 2400 bps () 4800 bps
The probability that a single bit will be in error on a typical telephone line
using 4800 bps modem is 10°. If no error detection mechanism is used, the
residual error rate for a communication line using 9-bit frames is approxi-
mately equal to :
(A) 0.009 (B) 0.008
(©) 0.999 () 0.991
$/SO/2013/0252.
53.
54.
55.
The despatcher :
(A) schedules the tasks into the processor
(B) is always very small and simple
(C) puts tasks in /O wait
(D) never changes task priorities
At a single terminal CPU, 40% of the users do not need to wait and the
average wait time for all users is 50 minutes. The average wait time for those
who wait, is approximately :
(A) 60 (BY 80
(C) 70 ‘Di 100
Ina memory system s is the number of sectors per track, and t is the number
of tracks per cylinder, then a disk address cylinder i, surface j, sector k can
be mapped to one-dimensional block number b as :
(A) b=k+s*@G+i*t)
(B) b=es+k*G+i* t)
(C) b=i+j*(s+k* t)
(D) b=j+i*(s+k* t)
Belady’s anomaly refers to :
(A) The decrease in page faults with increase in no. of frames
(B) Increase in page faults with decrease in frames
(C) Increase in page faults with increase in frames
(D) None of the above
$/SO/2013/0256.
57.
58.
59.
12
For a scheduling problem (J,1, Jag» Jag Jaa) = (6, 9, 15, 20) and
Gor» Ina» Ing: Iba) = (12, 3, 17, 28) a task T,1 must be completed before
starting Ty . Which of these is an optimal non-preemptive schedule ?
(A) Jy, Ig, Ig, Jo (B) Js, Ig Jy de
() Ig, In, In, Ig D) Jn Jy Ip Jy
In an operating system, which is the definition of a correct process
transition ?
(A) Wakeup : ready-running (B) Despatch : ready-running
(C) Block : ready-blocked (D) Timer runout : ready-blocked
Six files F,, Fy, Fs, Fy, Fs, Fg with sizes as 100, 200, 70, 40, 250 and 50
are to be stored on a sequential device in such a way as to optimize the access
time. The order of their storage should be :
(A) Fg, Fg Fy Fa. Fo Fy (B) Fy, Fy Fy Fy Fs. Fe
(C) Fo Fo Fy, Py. For Fa D) Fy Fg Fg Fu Fos Fs
A synchronous communication line uses byte oriented protocol with size of
each frame as 100 characters (including control bytes). If the bit error
probability is 104 and each character is 8 bits long without a parity bit,
the probability that the frame will arrive with one or more bit errors is
equal to :
(A) 1 - @.0001% (B) (0.9999)100
(C) (0.0001)1° ) (1 = (1 — 0.0001)
$/$0/2013/0260.
61.
62.
63.
64.
13
Communication protocols always have a :
(A) Set of symbols (B) Start of header
(C) Special flag symbol @) BCC
Which one is the most important feature of the spiral model ?
(A) Quality management (B) Risk management
(©) Performance management —(D)_ Efficiency management
In Putnam resource allocation model, Rayleigh curve is modeled by the
equation :
(A) mit) = ater”
(B) mit) = 2kte*™
(C) m(t) = 2kate-®”
@) mitt) = 2kbtee”
‘The function that sets the position to a desired point in the file is :
(A) feeek« ) (B) getw( )
© ftell() ©) putt)
What does the ‘C’ statement printf ("%d", +45); prints ?
(A) 5 (B) 6
(Cc) 7 (D) an error message
$/S0/2013/0265.
66.
67.
68.
69.
14
What is the result of execution of the following ‘C’ statements ?
int i=5;
do{putchar(i+100); printf("%d", i-—);}
while (i);
(A) ibh4g3f2el (B) 14h3g2fled
(C) an error message (D) none of these
Which of the following is not a size metric ?
(A) LOC (B) FP
(C) Program length (D) Cyclomatic complexity
The failure intensity of a software is 0.005 failures/hour during 10 hours of
its operation. The reliability of software can be expressed as :
(A) 0.90 (B) 0.92
(C) 0.95 (D) 0.98
Assume a class C with objects 01, 02 and 03. For the statement
03 = 01 - 02 to work correctly, the overloaded operator must :
(A) Return a value
(B) Create a named temporary object
(C) Use the object of which it is a member as an operand
(D) Both iA! and (C) above
Virtual functions in C++ allow to :
(A) Use the same function call to execute member function of objects from
different classes
(B) Create functions that have no body
(C) Group objects of different classes so that they can all be accessed by
the same function code
(D) Create an array of type pointer-to-base-class that can hold pointers to
derived class
$/S0/2013/0270
71.
72.
73.
74.
15
Which of the following parsing methods handles left-recursive grammars ?
iA) top-down parsing (B) bottom-up parsing
(C) both (A) and (B) (D) none of these
For a function of n variables, boundary value analysis yields :
(A) 4n + 8 test cases (B) dn + 1 test cases
(C) n+ 4 test cases () none of these
A program requires two 8-bit integers as inputs. If only one second is required
to execute one set of inputs, how much time will it take to execute all possible
combinations of inputs ?
(A) 15 hours (B) 8 x 8 x 2 seconds
(C) 28 x 28 x 2 seconds (D) 18 hours
In Java the difference between break and continue statements is :
(A) break causes the complete termination of the loop whereas continue
terminates only current iteration
(B) break causes the termination of the current iteration of the loop whereas
continue terminates the loop permanently
(C)_ break causes the complete termination of the loop whereas continue does
not terminate the execution at all
(D) none of the above
Which Java package is automatically available when you write a Java
program ?
(A) java.text (B) javalang
(C) java.swing (D) java.util
$/S0/2013/021.
76.
77.
78.
79.
16
Assertions are most closely associated with what type of error ?
(A) run-time (B) compile-time
(C) logic (D) disk
In C++ which of the following is most likely used to convert from a user defined
class to basic type ?
(A) a conversion function that is a member of a class
(B) an overloaded = operator
(C) a one-argument constructor
(D) a built-in conversion function
The purpose of regression testing is to :
(A) increase confidence in the correctness of a modified program
(B) locate errors in a modified program
(C) preserve the quality and reliability of software
(D) all of the above
A program P calls subprograms P1 and P2. If P1, can fail 50% times and
P2 can fail 40% times, then P can fail :
(A) 50% (B) 60%
(C) 10% (D) 70%
The relationship between data elements in a module is called :
(A) coupling (B) cohesion
(C) modularity (D) none of. these
$/SO/2013/0280.
81.
82.
83.
17
Which class in Java provides many methods that you can call to control your
threads, including yield, sleep and set priority ?
(A) Thread (B) Runnable
(C) Group (D) None of these
What is the output of the following ‘C’ program :
main( )
{
int x=10, y=10, z=5, i;
isx BC, B > 6, A > B, AB > C
The canonical cover for this set is :
(A) A> BC and B+ C (B) A> BC and AB > C
() A> BC and A> B ©) A> Band BC
Which of the data model is independent of both hardware and DBMS ?
(A) external (B) internal
(C)_ conceptual (D) all of these
What will be the result of statement SELECT * FROM EMPLOYEE WHERE
SALARY in (4000, 8000) ?
(A) all employees whose salary is either 4000 or 8000
(B) all employees whose salary is between 4000 and 8000
(©) all employees whose salary is not between 4000 and 8000
(D) none of the above
$/$0/2013/02©
=
98.
99.
100.
101.
21
The value of scale-up, if the original system can process 1000 transactions
in a given time and the parallel system can process 300 transactions in the
same time, is :
(A) 2 (B) 3
(C) 4 (D) None of these
Which of the following is not a DDL statement ?
(A) ALTER (B) DROP
(C) CREATE (D) SELECT
Which of the following is a spatial indexing method ?
(A) X-trees (B) R-trees
(C) B-trees (D) None of these
Degree of a table with 5000 rows and 50 columns is :
(A) 50 (B) 500
(C) 5000 (D) None of these
Which of the following clauses is usually used together with aggregate
functions ?
(A) ORDER BY ASC (B) GROUP BY
(C) ORDER BY DESC @) None of these
$/SO/2013/02102.
103.
104.
106.
22
Which of these expresses the specific number of entity occurrences associated
with one occurrence of the related entity ?
(A) degree (B) connectivity
(©) cardinality ) None of these
Which of the following transformation is referred to as commutativity of
projection and join ?
A try (RDM 8) = Ary Ry) My = ms)
®) RUS=SuR
© RAS=SOR
(D) Both (B) and (C)
Which of the following is a statement after which you can not issue a commit
command ?
(A) INSERT (B) SELECT
(C) UPDATE (D) DELETE
VDL is used to specify :
(A) internal schema (B) external schema
(C) conceptual schema (D) none of these
OLAP is :
(A) A dynamic synthesis of multidimensional data
(B) A analysis of multidimensional data
(C) A consolidation of large volume of multidimensional data
(D) All of the above
$/$0/2013/02108.
109.
110.
111.
23
In distributed query processing, semi-join operation is used to :
(A) Reduce the size of a relation that needs to be transmitted
(B) Reduce the communication cost
(C) Both (A) and (B)
(D) None of the above
The time required to insert an element in a stack with linked list
implementation is :
(A) 001) (B) O(ogy n)
(C) 0) 'D) O(n . logs n)
The postfix equivalent of the prefix : ~ - AB - CD
(A) AB + CD -* ‘By ABCD - - *
(C) AB + CD * - (D) AB +- CD *
The worst case time required to search a given element in a sorted linked
list of length n is :
(A) 0d) (B) Oogy n)
(C) O{n) (D) O(n logy n)
The maximum number of binary trees that can be formed with three
unlabelled nodes is :
(A) 1 (B) 5
(Cc) 4 @) 3
$/S0/2013/02112.
113.
115.
116.
24
A full binary tree with n leaf nodes contains :
(A) n nodes (B) logy n nodes
(©) wW-1 (D) 2° nodes
The time complexity of an algorithm with n inputs is expressed as :
Tn) = Ta - 1) + Im ifn > 1
= 1, otherwise
The order of complexity of this algorithm is :
(A) O(log n) (B) 0m)
(C) 0m?) (D) O(n")
Which of the following traversal techniques lists nodes of a biz
tree in ascending order ?
(A) postorder (B) inorder
(©) preorder (D) none of these
Which of the following algorithm design techniques i. n the quicksort
algorithm ?
(A) dynamic programming (B) back-trac’
(C) greedy method (D) divide and conquer
A text is made up of the characters a, b. c. d. ¢ each occurring with the
probabilities 0.12, 0.40, 0.15, 0.08, and 0.25 respeczively. The optimal coding
technique will have the average length of
(A) 2.15 ‘By 3.01
(C) 2.30 Dr 17s
$/SO/2013/02117.
118.
119.
120.
121.
25
The linked list representation of sparse matrices is superior to the generalised
dope vector method because it is :
(A) conceptually easier
(B) completely dynamic
(C) efficient in accessing an entry
(D) efficient if the sparse matrix is a band matrix
Minimum number of colours needed to colour a graph with one vertex and
two edges is :
(A) 4 (B) 3
(Ci 2 (D) 1
An advantage of chained hashing table (external hashing) over the open
hashing is :
(A) Worst case complexity of search operation is less
(B) Space used is less
(C) Deletion is easier
(D) None of the above
The number of interchanges (swap) needed to sort the numbers 8, 22, 7, 9,
31, 19 5, 13 in ascending order, using bubble sort is :
(A) 11 (B) 12
«) 13 (D) 14
The minimum number of edges in a connected cyclic graph of n vertices
is:
(Ay n-1 (Bion
() n+l (D) none of these
$/S0/2013/02122.
123.
124.
125,
26
Heap allocation is required for languages :
(A) that support recursion
(B) that support dynamic data structures
(C) that use dynamic scope rules
(D) none of the above
The number of ‘ADD’ and ‘REMOVE’ operations required to access n/2 th
clement of a queue of ‘n’ elements so that the original queue remains the
same after the access is :
(A) 4*n (B) 8*n
() 4*n-1 @) 8*n-1
‘The following sequence of operations is performed on stack push(1), push(2),
pop, push(1), push(2), pop, pop, pop, push(2), pop. The sequence of popped
values are :
(A) 2,2,1,1,2 (B) 2, 2,1, 2,2
(C) 2, 1, 2, 2,1 (D) 2,1, 2.2.2
If B is the circuit matrix of a graph with k components. e edges, and n vertices,
the rank of B is :
(A) n-k (B) e-n+k
(C) e-n + 2k (D) e+n-k126.
127.
128.
129.
130.
27
Gantt charts may be prepared with :
(A) spread sheet (B) database management system
(C) word processor (D) (A) and (C) both
Which is normally used where a high degree of interaction is necessary ?
(A) batch mode processing
(B) remote terminal processing
(C) intelligent terminal processing
(D) online processing
If the logical interaction intersection of the 4-bit codes for end points of a
line is not zero, the line lies :
(A) entirely on the screen (B) entirely off the screen
(C) partially on the screen (D) none of these
An exploded slice is a feature of a :
(A) bar chart (B) pie chart
(C) line graph (D) none of these
Animation is nothing but running of :
(A) scenes . (B) blocks
(C) bits (D) scan-lines
$/$0/2013/0228
181. If a point (x, y) is first scaled by a factor S, = S, = 2, then translated by
ty = 10, ty = 0. The resultant transformation matrix will be :
2 00 20 0
0 20 02 0
(A) (B)
10 01 010 1
10 0 1
0 20
(C) (D) none of these
0 02
132. XML documents can be created using :
(A) Wizards (B) Editors
(C) Operating system (D) HTML
133. Javascript is mainly used with :
(A) database (Bi text
(C) web pages (D) VB
134. Which of the following colour graphics display adapter has the highest
resolution ?
(A) HGA (B) CGA
(Cc) VDA (D) SVGA
135. Which one is the fastest driver of JDBC ?
(A) type 1 (B) type 2
(C) type 3 (D) type 4
S/SO/2013/02136.
138.
139.
140.
29
How many instances of a servelet can be created ?
(A) 1 (B) 2
(Cc) 3 (D) none of these
Which one of the following is not a responsibility of the stub in RMI ?
(A) Initiating remote calls
(B) Marshalling arguments to be sent
(C) Informing the remote reference layer that the call is complete
@) Calling the actual remote object implementation
How many types of lists are supported by HTML ?
(A) 2 'B) 3
© 5 (D) none of these
An alternative protocol to the TCP is :
(A) UDP (B) SMTP
(©) EDP (D) None of these
P < Q is logically equivalent to :
A PrQ>PvV®
B) PAQeKPV®
© PvQ+ePrAQ
(D) None of the above
$/S0/2013/02141.
142.
143.
144,
30
If there exists exactly one production deriving every non-terminal in a context
free Grammar, then L(G) is
(A) A finite set
{B) A set containing only one string
(C) An infinite set
(D) None of the above
Which of the following is not true about dynamic type checking ?
(A) All the type errors are detected
(B) Type checking is done during the execution
(C) It increases the cost of execution
() None of the above
Which of the following does the parent and child process share after
a fork( ) ?
(A) The same PCB
(B) The same stack
(©) Data declared global to the program
) None of the above
Which of the following statements are true of (hard and soft) real-time sched-
uling ?
(A) They minimize the average weight time
(B) They maximize CPU utilization
(C) They use multi-level queues
(D) None of the above
$/S0/2013/02145
146.
147.
148.
149.
150.
31
~ (P > Q) is equivalent to :
(A) ~PAaQ (B) PvQ
© Pa~Q (D) ~Pa~Q
Embedded computers typically run on which operating system ?
(A) Windows XP (B) Clustered
(©) Real-time (D) None of these
Block Cache and Buffer Cache are used :
(A) to improve disk performance
(B) to handle interrupts
(C) to increase the capacity of main memory
(D) to speed up main memory read operation
Which of the following is not a part of CRT ?
(A) Phosphor screen (B) Shadow mask
(©) Gas plasma (D) Electron gun
A synthesized attribute is an attribute whose value at a parse tree node depends
on:
(A) Attributes at siblings level only
(B) Attributes at children nodes only
(C) Attributes at parent nodes only
(D) None of the above
How many bits are required to encode all 26 letters, 10 symbols and
10 numerals ?
(A) 5 (B) 6
(©) 7 (@) 46
$/$0/2013/02