1. If x and y are independent Gaussian random variables with average value 0 and with same variance, their joint probability density function is given by:
- p(x, y)5p(x).p(y)
- p(x, y)5p(x)1p(y)
- p(x, y)5p(x1y)
- p(x, y)5p(x).p(y)1p(x)
2. In order that a code is ‘t’ error correcting, the minimum Hamming distance should be:
- t
- 2t-1
- 2t
- 2t+1
3. The Boolean expression is equivalent to:
- x
- y
- z
- x+y+z
4. The characteristic equation of a JK flip flop is:
5. In order to implement a n variable switching function, a MUX must have:
- 2n inputs
- 2n + 1 inputs
- 2n-1 inputs
- 2n-1 inputs
6. The throughput of pure ALOHA is given by:
- S=G
- S=e2G
- S=Ge2G
- S=Ge-2G
7. The Fiber Distributed Data Interface uses:
- single mode fibers and LEDs
- multimode fibers and LEDs
- single mode fibers and ILDs
- multimode fibers and ILDs
8. To employ multi-access in GSM, users are given different:
- time slots
- bandpass filters
- handsets
- frequency bands
9. With a four programs in memory and with 80% average I/O wait, the CPU utilization is?
- 60%
- 70%
- 90%
- 100%
10. Assume N segments in memory and a page size of P bytes. The wastage on account of internal fragmentation is:
- NP/2 bytes
- P/2 bytes
- N/2 bytes
- NP bytes
11. Assertion (A) : Bit maps are not often used in memory management.
Reason (R) : Searching a bit map for a run of given length is a slow operation.
- Both (A) and (R) are true and (R) is correct explanation for (A)
- Both (A) and (R) are true but (R) is not correct explanation for (A)
- (A) is true (R) is false
- (A) is false (R) is true
12. The complete graph with four vertices has k edges where k is :
- 3
- 4
- 5
- 6
13. The octal equivalent of hexadecimal (A.B)16 is :
- 47.21
- 12.74
- 12.71
- 17.21
14. A reduced state table has 18 rows. The minimum number of Flips flops needed to implement the sequential machine is :
- 18
- 9
- 5
- 4
15. What is the value of b after the execution of the following code statements:
c=10;
b=++c+++c;
- 20
- 22
- 23
- None
16. Which of the following does not represent a valid storage class in ‘C’ ?
- automatic
- static
- union
- extern
17. The friend functions are used in situations where:
- We want to have access to unrelated classes
- Dynamic binding is required
- Exchange of data between classes to take place
- None of the above
18. (i) DML includes a query language based on both relation algebra and tuple calculus
(ii) DML includes a query language based on tuple calculus
(iii) DML includes a query language based on relational algebra
(iv) DML includes a query language based on none of the relational algebra and tuple calculus
Which one is correct?
- i only
- ii only
- iii only
- iv only
19. Suppose it takes 100 ns to access a page table and 20 ns to access associative memory with a 90% hit rate, the average access time equals:
- 20 ns
- 28 ns
- 90 ns
- 100 ns
20. There exists a construct which returns a value true if the argument subquery is:
- empty
- non-empty
- in error
- none of the above
21. Which construct in SQL is used to test whether a subquery has any tuples in its result?
- UNIQUE
- EXISTS
- GROUP BY
- EXCEPT
22. ORACLE supports:
- inner join and outer join only
- outer join and semi join only
- inner join, outer join, semi join only
- inner join, outer join, semi join and anti join
23. Which two of the following are equivalent for an undirected graph G?
(i) G is a tree
(ii) There is at least one path between any two distinct vertices of G
(iii) G contains no cycles and has (n-1) edges
(iv) G has n edges
- (i) and (ii)
- (i) and (iii)
- (i) and (iv)
- (ii) and (iii)
24. In a B tree of order m with p nodes the average number of splits is at most:
- None
25. The propositional formula given by the tree is:
- ∧ ∨ x 2 ∨ x1 ¬ x1 ¬ x1
- ( x2 ∨ ¬ x2 ) ∧ ( x1 ∨ x 2 )
- (¬ x 1 ∨ x 2 ) ∧ (¬ x 1 ∨ x 2 )
- None
26. Queue is a __ list.
- LIFO
- LILO
- FILO
- FIFO
27. In a full binary tree of height k, there are __ internal nodes.
- 2k-1
- 2k-1
- 2k
- 2k+1
28. A binary tree is said to have heap property if the elements along any path :
- from leaf to root are nonincreasing
- from leaf to root are nondecreasing
- from root to leaf are nondecreasing
- from root to leaf are nonincreasing
29. X.25 protocol consists of :
- Physical and Frame levels
- Frame and Packet levels
- Physical, Frame and Packet levels
- None of the above
30. GSM/CDMA systems:
- are limited to very low speed data
- require no local loop wires
- are predominantly used for voice
- all of the above
31. Usually, information security in a network is achieved by:
- Layering
- Cryptography
- Grade of service
- None of the above
32. The linker:
- is similar to interpreter
- uses source code as its input
- is required to create a load module
- none of the above
33. In which addressing mode the operand is given explicitly in the instruction itself?
- Absolute mode
- Immediate mode
- Indirect mode
- Index mode
34. A compiler that runs on one machine and produces code for a different machine is called:
- Cross compilation
- One pass compilation
- Two pass compilation
- None of the above
35. Any syntactic construct that can be described by a regular expression can also be described by a:
- Context sensitive grammar
- Non context free grammar
- Context free grammar
- None of the above
36. Find the odd man out :
- tail
- cut
- wart
- sed
37. Which of the following changes permission to deny write permission to group and others ?
- Chmod go – w filex
- Chmod go w filex
- Chmod go=w filex
- None of the above
38. Variable partition memory management technique with compaction results in :
- Reduction of fragmentation
- Minimal wastage
- Segment sharing
- None of the above
39. Capability Maturity Model is meant for:
- Product
- Process
- Product and Process
- None of the above
40. In the light of software engineering software consists of :
- Programs
- Data
- Documentation
- All of the above
41. Which one of the following ISO standard is used for software process?
- ISO 9000
- ISO 9001
- ISO 9003
- ISO 9000-3
42. Which of the following is used for test data generation?
- White Box
- Block Box
- Boundary value analysis
- All of the above
43. Reverse engineering is the process which deals with:
- Size measurement
- Cost measurement
- Design recovery
- All of the above
44. The spacing between character pairs is called:
- Kerning
- x-height
- intercap
- serif
45. When compared with analog cellular systems, an advantage of digital TDMA cellular system is that:
- it is less complicated
- it requires less of computer memory
- it conserves spectrum bandwidth
- it costs less
46. E-Commerce includes :
- B2C
- BEB
- CEC
- All of the above
47. A clustering technique that permits a convenient graphical display is :
- partition based clustering
- probabilistic model based clustering
- hierarchical clustering
- agglomerative clustering
48. After sending a message ,the sender should not be able to, at a later date, deny having sent the message, is referred to as:
- Authenticity
- Non-Repudiability
- Auditability
- Repudiability
49. The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called:
- Router
- Bridge
- Gateway
- Switch
50. We cannot delete the __ icon but we can made it invisible.
- Recycle
- My computer
- Internet explorer
- None of the above