CBSE NET JUNE 2015 COMPUTER SCIENCE AND APPLICATIONS PAPER-II
SOLUTION
1: How
many strings of 5 digits have the property that the sum of their digits is 7?
- 66
- 330
- 495
- 99
2: Consider
an experiment of tossing two fair dice, one black and one red. What is the
probability that the number on the black die divides the number on red die ?
- 22 / 36
- 12 / 36
- 14 / 36
- 6 / 36
3: In
how many ways can 15 indistinguishable fishes be placed into 5 different ponds,
so that each pond contains atleast one fish?
- 1001
- 3876
- 775
- 200
4: Consider the following statements-
(a) Depth - first search is used to
traverse a rooted tree.
(b) Pre - order, Post-order and Inorder are
used to list the vertices of an ordered rooted tree.
(c) Huffman's algorithm is used to find an
optimal binary tree with given weights.
(d) Topological sorting provides a
labelling such that the parents have larger labels than their children.
Which of the above statements are true ?
- (a) and (b)
- (c) and (d)
- (a) , (b) and (c)
- (a), (b) , (c) and (d)
5: Consider
a Hamiltonian Graph (G) with no loops and parallel edges. Which of the
following is true with respect to this Graph (G) ?
(a) deg (v) >= n / 2 for each vertex of
G
(b)
| E(G) | >= 1 / 2 (n-1) (n-2) + 2 edges
(c) deg (v) + deg (w) >= n for every v
and w not connected by an edge
- (a) and (b)
- (b) and (c)
- (a) and (c)
- (a), (b) and (c)
6: Consider
the following statements :
(a) Boolean expressions and logic networks
correspond to labelled acyclic digraphs.
(b) Optimal boolean expressions may not
correspond to simplest networks.
(c) Choosing essential blocks first in a
Karnaugh map and then greedily choosing the largest remaining blocks to cover
may not give an optirnal expression-
Which of these statement(s) is/ are correct
- (a) only
- (b) only
- (a) and (b)
- (a), (b) and (c)
7: Consider
a full - adder with the following input values :
(a) x=1, y=0 and Ci(carry input) = 0
(b) x=0, y=1 and Ci = 1
Compute the values of S(sum) and C0 (carry
output) for the above input values.
- S=1 , C0= 0 and S=0 , C0= 1
- S=0 , C0= 0 and S=1 , C0= 1
- S=1 , C0= 1 and S=0 , C0= 0
- S=0 , C0= 1 and S=1 , C0= 0
8: "lf my computations are correct and
I pay the electric bill, then I will run out of money. If I don't pay the
electric biIl the power will be turned off. Therefore, if I don't run out of
money and the power is still on then my computations are incorrect."
Convert this argument into logical
notations using the variables c, b, r, p for propositions of computations,
electric bills, out of money and the power respectively. (Where ¬ means NOT)
- if (c ∧ b) → r and ¬b → ¬p, then (¬r∧p)→¬c
- if (c ∨ b) → r and ¬b → ¬p, then (r∧p)→c
- if (c ∧ b) → r and ¬p → ¬b, then (¬r ∨ p)→¬c
- if (c ∨ b) → r and ¬b → ¬p, then (¬r∧p)→ ¬c
9: Match
the following:
List - I
|
List - II
|
(a) (p →q) ⇔ (¬q → ¬p)
|
(i) Contrapositive
|
(b) [(p ∧q) →r ]⇔
[p→ (q →r)]
|
(ii) Exportation law
|
(c) (p →q)⇔ [(p ∧
¬q) →o]
|
(iii) Reductio ad absurdum
|
(d) (p⇔q)⇔
[(p →q) ∧(q→p)]
|
(iv) Equivalence
|
(a) (b) (c)
(d)
1.
(i) (ii)
(iii) (iv)
2.
(ii) (iii)
(i) (iv)
3.
(iii) (ii)
(iv) (i)
4.
(iv) (ii)
(iii) (i)
10: Consider
a proposition given as :
" x ≥ 6, if x2 ≥ 25 and its proof as:
If x ≥ 6, then x2 = x· x= 6· 6=36 ≥25
Which of the following is correct w.r.to
the given proposition and its proof ?
(a) The proof shows the converse of what is
to be proved.
(b) The proof starts by assuming what is to
be shown.
(c) The proof is correct and there is
nothing wrong.
- (a) only
- (c) only
- (a) and (b)
- (b) only
11: What is the output of the following
program ?
(Assume that the appropriate preprocessor
directives are included and there is no syntax error)
main ( )
{ char S[ ] =
"ABCDEFGH";
printf ("%C",*
(& S[3]));
printf ("%s", S +
4);
printf ("%u", S);
/* Base address of S is 1000 */
}
- ABCDEFGH1000
- CDEFGH1000
- DDEFGHH1000
- DEFGH1000
12: Which
of the following, in C++, is inherited in a derived class from base class ?
- constructor
- destructor
- data members
- virtual methods
13: Given that x = 7.5, j = -1.0, n = 1.0,
m = 2.0 the value of - - x + j = = x > n >= m is :
- 0
- 1
- 2
- 3
14: Which
of the following is incorrect in C++ ?
- When we write overloaded function we must code the function for each usage.
- When we write function template we code the function only once.
- It is difficult to debug macros
- Templates are more efficient than macros
15: When
the inheritance is private, the private methods in base class are in the
----------- derived class (in C++).
- inaccessible
- accessible
- protected
- public
16: An
Assertion is a predicate expressing a condition we wish database to always
satisfy. The correct syntax for Assertion is :
- CREATE ASSERTION',ASSERTION Name', CHECK',Predicate',
- CREATE ASSERTION 'ASSERTION NAME'
- CREATE ASSERTION, CHECK Predicate
- SELECT ASSERTION
17: Which
of the following concurrency protocol ensures both conflict serializability and
freedom from deadlock ?
(a) z-phase Locking
(b) Time stamp - ordering
- Both (a) and (b)
- (a) only
- (b) only
- Neither (a) nor (b)
18: Drop
Table cannot be used to drop a Table referenced by ------ constraint.
(a) Primary key (b) Sub key (c) Super key
(d) Foreign key
- (a)
- (a), (b) and (c)
- (d)
- (a) and (d)
19: Database
applications were built directly on top of file system to overcome the
following drawbacks of using filesystems
(a) Data redundancy and inconsistency
(b) Difficulty in accessing Data
(c) Data isolation
(d) Integrity problems
- (a)
- (a) and (d)
- (a), (b) and (c)
- (a), (b), (c) and (d)
20: For a weak entity set to be meaningful,
lt must be associated with another entity set in combination with some of their
attribute values, is called as :
- Neighbour Set
- Strong Entity Set
- Owner entity set
- Weak Set
21: Consider the given graph:
Its Minimurn Cost Spanning Tree is --------
- Second
22: The inorder and preorder Traversal of
binary Tree are dbeafcg and abdecfg respectively.The post order traversal is
------
- dbefacg
- debfagc
- dbefcga
- debfgca
23: Level order Traversal of a rooted Tree
can be done by starting from root and performing -
- Breadth First Search
- Depth first search
- Root search
- Deep search
24: The average case occurs in the Linear
Search Algorithm when :
- The item to be searched is in some where middle of the Array
- The item to be searched is not in the array
- The item to be searched is in the last of the array
- The item to be searclred is either in the last or not in the array
25: To determine the efficiency of an
algorithm the time factor is measured by
- Counting micro seconds
- Counting number of key operations
- Counting number of statement
- Counting kilobytes of algorithm
26: which of the following protocols is an
application layer protocol that establishes, manages and terminates multimedis
sessions?
- Session Maintenance Protocol
- Real - time Streaming Protocol
- Real - time Transport Control Protocol
- Session Initiation Protocol
27: Match the following port numbers with
their uses :
List-I
|
List-II
|
(a) 23
|
(i) World wide web
|
(b) 25
|
(ii) Remote Login
|
(c) 80
|
(iii) USENET news
|
(d) 119
|
(iv) Email
|
(a) (b)
(c) (d)
- (iv) (i) (ii) (iii)
- (ii) (i) (iv) (iii)
- (ii) (iv) (iii) (i)
- (ii) (iv) (i) (iii)
28: Which of the following is not
associated with the session layer ?
- Dialog control
- Token management
- Semantics of the information transmitted
- Synchronization
29: What is the size of the'total length'
field in IPv 4 datagram ?
- 4 bits
- 8 bits
- 16 bits
- 32 bits
30: Which of the following isf are
restriction(s) in classless addressing ?
- The number of addresses needs to be a power of 2.
- The mask needs to be included in the address to define the block.
- The starting address must be divisible by lhe number of addresses in the block.
- All of the above
31: Match the following:
List-I
|
List-II
|
(a) Forward Reference Table
|
(i) Assembler directive
|
(b) Mnemonic Table
|
(ii) Uses array data structure
|
(c) Segment Register Table
|
(iii) Contains machine OP code
|
(d) EQU
|
(iv) Uses linked list data structure
|
(a)
(b) (c) (d)
- (ii) (iii) (iv) (i)
- (iii) (iv) (ii) (i)
- (iv) (i) (iii) (ii)
- (iv) (iii) (ii) (i)
32: The translator which performs macro
calls expansion is called :
- Macro processor
- Micro pre-processor
- Macro pre-processor
- Dynamic linker
33: If all the production rules have single
non - terminal symbol on the left side, the grammar defined is:
- context free grammar
- context sensitive grammar
- unrestricted grammar
- phrase grammar
34: Which one from the following is false ?
- LALR parser is Bottom - Up parser
- A parsing algorithm which performs a left to right scanning and a right most deviation is RL (1).
- LR parser is Bottom - Up parser.
- In LL(1), the 1 indicates that there is a one - symbol look - ahead.
35: Which phase of compiler generates
stream of atoms ?
- Syntax analysis
- Lexical Analysis
- Code generation
- Code optimization
36: A disk drive
has 100 cylinders, numbered 0 to 99. Disk requests come to the disk driver for
cylinders 12, 26, 24, 4, 42, 8 and 50 in that order. The driver is currently
serving a request at cylinder 24- A seek takes 6 msec per cylinder moved. How
much seek time is needed for shortest seek time first (SSTF) algorithm?
- 0.984 sec
- 0.396 sec
- 0.738 sec
- 0.42 sec
37: Let Pi and Pj be two processes, R be the set of variables
read from memory, ot and W be the set variables written to memory. For the
concurrent execution of two processes Pi and Pj, which of the following
conditions is not true?
- R(Pi) ∩ W (Pj) = Φ
- W(Pi) ∩ R (Pj) = Φ
- R(Pi) ∩ R (Pj) = Φ
- W(Pi) ∩ W (Pj) = Φ
38: A LRU page replacement is used with
four page frames and eight pages. How many page faults will occur with the
reference string 0172327103 if the four frames are initially empty?
- 6
- 7
- 5
- 8
39: What does the following command do ?
grep − vn
"abc" x
- It will print all of the lines in the file x that match the search string "abc"
- It will print all of the lines in file x that do not match the search string "abc"
- It will print total no of the lines in file x that match the search string "abc".
- It will print the specific line numbers of file x in which there is a match for the string "abc".
40: The Unix Kernel maintains two key data
strucfures related to processes, the progress table and the user structure.
Which of following information is not the part of user
- File descriptor table
- System call state
- Scheduling parameters
- Kernel stack
41: Match the following
List - I
|
List - II
|
(a) Size-oriented metric
|
(i) uses number of external interfaces as
one of the measurement parameters
|
(b) Function-oriented metrics
|
(ii) originally designed to be applied to
business information system
|
(c) Extended Function Point Metrics
|
(iii) derived by normalizing quality and/
or productivity measures by considering the size of the software.
|
(d) Function Point
|
(iv) uses algorithm characteristics as of
the measurement parameter
|
(a)
(b) (c) (d)
- (iii) (iv) (i) (ii)
- (ii) (i) (iv) (iii)
- (iv) (ii) (iii) (i)
- (iii) (i) (iv) (ii)
42: In which testing strategy requirements
established during requirements analysis are validated against developed
software?
- Validation testing
- Integration testing
- Regression testing
- System testing
43: Which process model is also called as
classic life cycle model?
- Waterfall model
- RAD model
- Prototyping model
- Incremental model
44: Cohesion is an extension of :
- Abstraction concept
- Refinement concept
- Information hiding concept (Software Engineering by R. Pressman Page No. 237)
- Modularity
45: Which one from the following is highly
associated activity of project planning?
- Keep track of the project
- Compare actual and planned progress and costs
- Identify the activities, milestones and deliverables produced by a project
- Both (2) and (3)
46: In the case of parallelization,
Amdahl's law states that if P is the proportion of the program that can be made
parallel and (1 - P) is the proportion that cannot be parallelized , then the
maximum speed that can be achieved by using N processors is -
- 1 / (1 - P) + N.P
- 1 / (N – 1) P + P
- 1 / (1 – P) + P / N
- 1 / P + (1 – P) / N
47: Which of the following statements is
incorrect for Parallel Virtual Machine (PVM)?
- The PVM Communication model provides asynchronous blocking send, asynchronous blocking receive and non-blocking receive function
- Message buffers are allocated dynamically
- The PVM communication model assumes that any task that can send a message to any other PVM task and that there is no limit to the size or number of such messages
- In PVM Model, the message order is not preserved
48: Which of the following algorithms sort
n integers, having the range 0 to (n2 - 1), in ascending order in O(n) time ?
- Selection sort
- Bubble sort
- Radix sort
- Insertion sort
49: Which of the following statements is
FALSE about weak entity set ?
- Weak entities can be deleted. automatically when their strong entity is deleted.
- Weak entity set avoids the data duplication and consequent possible inconsistencies caused by duplicating the key of the strong entity
- A weak entity set has no primary keys unless attributes of the strong entity set on which it depends are included
- Tuples in a weak enfity set are not partitioned according to their relationship with tuples in a strong entity set.
50: Which of the following is not valid
with reference to Message Passing Interface (MPI) ?
- MPI can run on any hardware platform
- The programming model is a distributed memory model.
- All parallelism is implicit
- MPI - Comm - Size returns the total number of MPI processes in specified communication.
FEEL FREE TO ASK ANYTHING ABOUT PAPER.
PLEASE PROVIDE YOUR FEEDBACK FOR UPDATIONS.
GOOD LUCK, RAM RAM JI.
No comments:
Post a Comment