| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q20 | When developing a dynamic programming algorithm, the sequence of steps followed is: A. Constr | 4 | +2.0 |
| Q36 | Which of the following algorithms use Greedy strategy? A. Dijkstra's algorithm B. Kr | 2 | +2.0 |
| Q43 | The longest common subsequence of {1,2,3,2,4,1,2} and {2,4,3,1,2,1} is | 3 | +2.0 |
| Q77 | The tight asymptotic bound for the recurrence T(n) = 2T(n / 4) + sqrt(n) is | 3 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q5 | Given that n refers to learning rate and x_{i} refers to the ith input to the neuron, Which of the | 1 | +2.0 |
| Q10 | Consider the following steps used by a knowledge base designer to represent a world A. Select | 1 | +2.0 |
| Q12 | Considering the following statements: A. Data transformation is involved in Datamining proces | 2 | +2.0 |
| Q17 | Which of the followings is not a valid property over two fuzzy relations 𝑅̃ and 𝑆̃ which must be ob | 3 | +2.0 |
| Q41 | Consider the following table defining the sample inputs and corresponding target values for a perc | 1 | +2.0 |
| Q51 | Consider the following statements regarding Agent systems A. Agent system comprises of an age | 1 | +2.0 |
| Q54 | Consider the following steps involved in the application of Genetic algorithm for a problem A | 2 | +2.0 |
| Q66 | Match List I with List II List I (GA termination criteria) List II (descrip | 1 | +2.0 |
| Q70 | Match List I with List II List I (Operations on Fuzzy Sets) List II (Descri | 3 | +2.0 |
| Q80 | Which of the followings is Not a parent selection technique used in genetic algorithm implementa | 1 | +2.0 |
| Q84 | Consider the following statements regarding STRIPS representation of a Planning problem A. ST | 2 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q57 | Arrange the following parsers in increasing order of their power of handling grammars i.e. from th | 3 | +2.0 |
| Q79 | Which of the following Grammars is/are only Context Free? A) &nbs | 2 | +2.0 |
| Q91 | 📄 What all blocks does Block 3 & Block 5 dominate in the Flow graph for the TAC given in the pas | 1 | +2.0 |
| Q92 | 📄 Which of the followings is the correct Flow graph for the TAC given in the passage? | 1 | +2.0 |
| Q93 | 📄 What are the various LEADERS (leading statements) for the TAC given in the passage? | 4 | +2.0 |
| Q94 | 📄 Which of the following is the Optimized version for the given TAC in the passage | 1 | +2.0 |
| Q95 | 📄 Which of the following is the correct High level code for the given TAC in the passage | 4 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q6 | Match List I with List II List I List II A. Count to infinity | 2 | +2.0 |
| Q9 | Arrange the steps involved when a user enters a URL in a browser and accesses a website. A. D | 4 | +2.0 |
| Q38 | The packet sent by a node to the source to inform it of congestion is called | 3 | +2.0 |
| Q50 | Which of the following are examples of data encoding schemes? A. Non-Return to Zero (NRZ) | 4 | +2.0 |
| Q55 | Which of the following are controlled-access protocols A. Reservation B. Polling C. | 2 | +2.0 |
| Q63 | In a Stop-and-wait system, the bandwidth of the line is 1 Mbps, and 1 bit takes 30 milliseconds to | 3 | +2.0 |
| Q67 | Which of the following is not the characteristics of packet switching? | 3 | +2.0 |
| Q71 | Arrange the process of virtualization in cloud environments. A. Hypervisor installed on physi | 2 | +2.0 |
| Q74 | CB84000D001C001C is the content of a UDP header in hexadecimal format. The source port number is | 1 | +2.0 |
| Q78 | Match List I with List II List I List II A. Digital Signature | 2 | +2.0 |
| Q85 | Which of the following statements is/are TRUE about encryptions techniques? A. In symmetric k | 4 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q7 | The right sequence of suboperations that are performed in arithmetic pipeline is- A. Align th | 1 | +2.0 |
| Q22 | The right sequence of CPU program to input data will be: A. Read status register B. Chec | 3 | +2.0 |
| Q33 | The write operation in I/O operation does the following- | 2 | +2.0 |
| Q53 | Which of the followings shows the correct hierarchy of a layered file system in an operating syste | 3 | +2.0 |
| Q58 | The transformation of data from main memory to cache memory is referred as: | 3 | +2.0 |
| Q73 | The computer needs to process each instruction with the following sequence of steps: A. Calcu | 3 | +2.0 |
| Q75 | Consider the following interrupt protection levels in Linux, and arrange them in the increasing or | 4 | +2.0 |
| Q86 | Which of the following statements are true? A. In the write-through policy, only the cache is | 3 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q21 | Consider the relation T1(A,B,C,D,E) with the dependencies {EB ->C,D ->E, EA->B} and T2(A, | 3 | +2.0 |
| Q35 | Consider R (A,B,C,D,E) be relation with following dependencies: C->F, E-> A, EC->D, | 2 | +2.0 |
| Q42 | In a relational database, which one of the following is CORRECT: | 2 | +2.0 |
| Q83 | Considering the following statements: A. A non-serial schedule is said to be conflict seriali | 3 | +2.0 |
| Q87 | Consider the following three relations Employee (eid, eName), Comp(cid, cName), Own(eid, cid) | 1 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q4 | Which of the following gates do not give output 1 when both the inputs are 0- A. NAND gate | 4 | +2.0 |
| Q26 | Consider the Boolean expression A(x, y, z) = x (y' z)'. Which of the following is complete | 4 | +2.0 |
| Q60 | Gray code equivalent to decimal number 8 is: | 2 | +2.0 |
| Q88 | Binary equivalent to (AOF) 16 is: 1. 111000111 2. 101001111 3. 101000001111 4. | 3 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q1 | In a group of 120 people: 65 eat Rice, 45 eat bread, 42 eat curd, 20 eat both Rice and bread, 25 e | 2 | +2.0 |
| Q3 | Maintaining a graph in memory by means of its adjacency matrix is known as | 4 | +2.0 |
| Q16 | Let P denote "She is intelligent" and let Q denote "She is happy." Given | 3 | +2.0 |
| Q49 | A positive integer selected at random from the set of positive integers not exceeding 200. Which o | 2 | +2.0 |
| Q52 | Let m and n are positive integers. Then (A) If n ≠ 1, then m < mn. (B) If k is com | 1 | +2.0 |
| Q59 | Choose the correct statement for a group G: | 1 | +2.0 |
| Q65 | Match List I with List II List I List II A. If the Indian team | 3 | +2.0 |
| Q89 | In a pack of 42 cards, 3 cards are chosen one after the other. Find the number of ways this can be | 3 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q11 | Identify the correct statement(s) from the followings with respect to Spinlock Semaphores A. | 1 | +2.0 |
| Q13 | Match List I with List II List I List II A. Clustered Page Tab | 2 | +2.0 |
| Q15 | Consider the following table about processes, their burst time and arrival time | 4 | +2.0 |
| Q40 | What is the total swap time (Swap in & Swap out) in a system for a 15 MB process with a transf | 1 | +2.0 |
| Q44 | Which of the following statement is correct for Pthreads? | 3 | +2.0 |
| Q56 | Match List I with List II List I List II A. RAID Level 2 | 1 | +2.0 |
| Q62 | Once the process is allocated CPU and executing which of the following events could not occur? | 4 | +2.0 |
| Q76 | What shall be the average waiting time per process if we know that 10 processes (on average) arriv | 2 | +2.0 |
| Q90 | Match List I with List II List I List II A. Address Space | 1 | +2.0 |
| Q96 | 📄 What will be the total head movement of cylinders for the SSTF disc Scheduling technique? | 3 | +2.0 |
| Q97 | 📄 What shall be the 2nd request being processed by SCAN (LEFT) disc Scheduling technique for the alr | 3 | +2.0 |
| Q98 | 📄 What shall be the total head movement of cylinders if the FCFS disc scheduling method is used? | 3 | +2.0 |
| Q99 | 📄 What shall be the 2nd request being processed by C-LOOK (Right) disc Scheduling technique for the | 1 | +2.0 |
| Q100 | 📄 What shall be the total head movement of cylinders for the C-SCAN disc Scheduling technique if the | 4 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q2 | Match List I with List II List I List II A. Overloading I | 1 | +2.0 |
| Q8 | The correct sequence of constructing Huffman tree is A. Repeat until root formed B. Crea | 3 | +2.0 |
| Q14 | Which of the following trees are height balanced? A. Binary Search Tree B. AVL Tree | 3 | +2.0 |
| Q24 | Consider the following infix expression Q: ((A+B) *D) ↑ (E-F). The equivalent postfix express | 4 | +2.0 |
| Q25 | What would be the equivalent pointer expression for referring the array element ar[m][n][o] | 4 | +2.0 |
| Q28 | What will be the output of the following C programming code: int i, j; for(i | 1 | +2.0 |
| Q31 | Match List I with List II List I (Hashing Collison Handling Method) List II | 3 | +2.0 |
| Q32 | What will be the output of the following C Programming code: void main () { int *i, | 2 | +2.0 |
| Q34 | Match List I with List II List I List II A. Circular Queue | 2 | +2.0 |
| Q39 | Only legal pointer operations: A. pointer + number pointer B. pointer - number number | 4 | +2.0 |
| Q47 | Consider the following statements for XML (Extensible Markup Language): A. The number of tags | 3 | +2.0 |
| Q64 | Consider the following piece of C programming code: int x = 128, y = 110 ; do { | 2 | +2.0 |
| Q72 | Consider the operators used in C Programming given below: A. && B. += C. &g | 3 | +2.0 |
| Q# | Question | Answer | Marks |
|---|---|---|---|
| Q18 | Estimation of software development effort for organic software in basic COCOMO is | 1 | +2.0 |
| Q19 | Match List I with List II List I (Software Quality Characteristic) List II (De | 2 | +2.0 |
| Q27 | Match List I with List II List I List II A. Equivalence Partit | 1 | +2.0 |
| Q30 | The process followed in order to find difficult, unknown and hidden information about a software s | 3 | +2.0 |
| Q37 | Arrange the following in the increasing order of coupling from lowest coupling to highest coupling | 3 | +2.0 |
| Q45 | Which of the following is not a requirement elicitation Technique | 4 | +2.0 |
| Q46 | Which of the following cohesions are better than the Procedural Cohesion A. Functional Cohesi | 2 | +2.0 |
| Q69 | Which of the followings is NOT a software characteristic? | 4 | +2.0 |
| Q81 | Which of the followings belongs to MaCall's quality factors? A. Maintainability B. U | 4 | +2.0 |
| Q82 | Arrange the following types of testing in the order they are usually performed in the software Devel | 2 | +2.0 |