Computer Science Engineering Sample Papers

Similar documents
R10 SET - 1. Code No: R II B. Tech I Semester, Supplementary Examinations, May

Operations on Heap Tree The major operations required to be performed on a heap tree are Insertion, Deletion, and Merging.

Code No: R Set No. 1

A6-R3: DATA STRUCTURE THROUGH C LANGUAGE

Final Examination CSE 100 UCSD (Practice)

m ~~I Rt'6"'lcl ati1j4#11'" ~ silttli71 h1 ~

GATE 2004 Computer Science Engineering

GLA University, Mathura

Q: 1 - Q.30 carry one m ark each

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

FINAL May 21, minutes

R10 SET - 1. Code No: R II B. Tech I Semester, Supplementary Examinations, May

9. Heap : Priority Queue

Duke University CompSci 356 Midterm Spring 2016

Section 4 SOLUTION: AVL Trees & B-Trees

COSC 2007 Data Structures II Final Exam. Part 1: multiple choice (1 mark each, total 30 marks, circle the correct answer)

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

Q.1 Q.30 carry one mark each.

===================================================================== Exercises =====================================================================

Department of Computer Science Admission Test for PhD Program. Part I Time : 30 min Max Marks: 15

12 Abstract Data Types

CS 186/286 Spring 2018 Midterm 1

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

CS Branch GATE Paper Q.1 to Q.30 Carry One Mark Each

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Storage hierarchy. Textbook: chapters 11, 12, and 13

CSE 373 Spring 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)

Data Structures Question Bank Multiple Choice

CSE100 Practice Final Exam Section C Fall 2015: Dec 10 th, Problem Topic Points Possible Points Earned Grader

CLO Assessment CLO1 Q1(10) CLO2 Q2 (10) CLO3 Q4 (10) CLO4 Q3a (4)

CSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators)

Computer Network (2012 Spring) Homework Answer. Chapter2

Data Structure. IBPS SO (IT- Officer) Exam 2017

APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY THIRD SEMESTER B.TECH DEGREE EXAMINATION, JULY 2017 CS205: DATA STRUCTURES (CS, IT)

Design and Analysis of Algorithms - - Assessment

CS301 - Data Structures Glossary By

CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators)

End-Term Examination Second Semester [MCA] MAY-JUNE 2006

CSE 530A. B+ Trees. Washington University Fall 2013

Indexing. Jan Chomicki University at Buffalo. Jan Chomicki () Indexing 1 / 25

Expected Time: 90 min PART-A Max Marks: 42

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

Binary Heaps in Dynamic Arrays

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder

Module 4: Index Structures Lecture 13: Index structure. The Lecture Contains: Index structure. Binary search tree (BST) B-tree. B+-tree.

Database Technology. Topic 7: Data Structures for Databases. Olaf Hartig.

Entrance exam - Informatics

Binary Heaps. COL 106 Shweta Agrawal and Amit Kumar

DATA STRUCTURE : A MCQ QUESTION SET Code : RBMCQ0305

DATA STRUCTURES AND ALGORITHMS

Algorithm Design (8) Graph Algorithms 1/2

Faculty of Science FINAL EXAMINATION COMP-250 A Introduction to Computer Science School of Computer Science, McGill University

CSE 100: B+ TREE, 2-3 TREE, NP- COMPLETNESS

CSCE 2014 Final Exam Spring Version A

«Computer Science» Requirements for applicants by Innopolis University

CS 186/286 Spring 2018 Midterm 1

CSE Data Structures and Introduction to Algorithms... In Java! Instructor: Fei Wang. Mid-Term Exam. CSE2100 DS & Algorithms 1

INSTITUTE OF AERONAUTICAL ENGINEERING

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

1) What is information system? Describe the basic concepts of information systems.

mywbut.com GATE SOLVED PAPER - CS (A) 2 k (B) ( k+ (C) 3 logk 2 (D) 2 logk 3

R16 SET - 1 '' ''' '' ''' Code No: R

Priority queues. Priority queues. Priority queue operations

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1

EECE.4810/EECE.5730: Operating Systems Spring 2017 Homework 3 Solution

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

Copyright 2011 Sakun Sharma

Programming II (CS300)

How many leaves on the decision tree? There are n! leaves, because every permutation appears at least once.

Graphs & Digraphs Tuesday, November 06, 2007

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CS 251, LE 2 Fall MIDTERM 2 Tuesday, November 1, 2016 Version 00 - KEY

CSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators)

( ) + n. ( ) = n "1) + n. ( ) = T n 2. ( ) = 2T n 2. ( ) = T( n 2 ) +1

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CS 245 Midterm Exam Winter 2014

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

Section 1: True / False (1 point each, 15 pts total)

CSE 326: Data Structures B-Trees and B+ Trees

EXTERNAL SORTING. Sorting

M.Sc. (CS) Second Semester Examination (Year 2016) Data Structures & Algorithms Subject Code: MSC-201 Paper Code: TMT-141

Priority Queues and Binary Heaps

DC54 DATA STRUCTURES DEC 2014

Some Practice Problems on Hardware, File Organization and Indexing

University of Illinois at Urbana-Champaign Department of Computer Science. Final Examination

( ) n 5. Test 1 - Closed Book

Chapter 6 Heapsort 1

CS 421: COMPUTER NETWORKS FALL FINAL January 12, minutes

Previous Year Questions

Medium Access Protocols

Distributed Algorithms 6.046J, Spring, 2015 Part 2. Nancy Lynch

Introduction. for large input, even access time may be prohibitive we need data structures that exhibit times closer to O(log N) binary search tree

CSE 373 Autumn 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)

9/29/2016. Chapter 4 Trees. Introduction. Terminology. Terminology. Terminology. Terminology

Multiple Choice. Write your answer to the LEFT of each problem. 3 points each

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

1. a) Discuss primitive recursive functions with an example? 15M Or b) Statements and applications of Euler s and Fermat s Theorems?

CS-245 Database System Principles

Transcription:

See fro more Material www.computetech-dovari.blogspot.com Computer Science Engineering Sample Papers 1 The order of an internal node in a B+ tree index is the maximum number of children it can have. Suppose that a child pointer takes 6 bytes, the search field value takes 14 bytes, and the block size is 512 bytes. What is the order of the internal node? A) 24 B) 25 C) 26 D) 27 2 The Boolean function x, y, + xy + x, y A) x, + y, B) x + y C) x + y, D) x, + y 3 In an MxN matrix such that all non-zero entries are covered in a rows and b columns. Then the maximum number of non-zero entries, such that no two are on the same row or column, is A) a + b B) max {a, b} C) min {M-a, N-b} D) min {a, b} 4 The relation scheme Student Performance (name, courseno, rollno, grade) has the following functional dependencies: A) name, courseno -> grade B) rollno, courseno -> grade C) name -> rollno D) rollno -> name The highest normal form of this relation scheme is 5 The minimum number of page frames that must be allocated to a running process in a virtual memory environment is determined by A) the instruction set architecture B) page size C) physical memory size D) number of processes in memory 6 Let G be a simple graph with 20 vertices and 100 edges. The size of the minimum vertex cover of G is 8. Then, the size of the maximum independent set of G is A) 12 B) 8 C) Less than 8 D) More than 12 7 What does the following algorithm approximate? (Assume m > 1, Î > 0). x = m; See For More Material www.computertech-dovari.blogspot.com

y-i; while (x - y > Î) { x = (x + y) / 2 ; y = m/x ; } print (x) ; A) log m B) m 2 C) m 1/2 D) m 1/3 8 Consider the following C program main () { int x, y, m, n ; scanf ("%d %d", &x, &y); / * Assume x > 0 and y > 0 * / m = x; n = y ; while ( m! = n) { if (m > n) m = m n; else n = n - m ; } printf("%d",n); } The program computes A) x + y, using repeated subtraction B) x mod y using repeated subtraction C) the greatest common divisor of x and y D) the least common multiple of x and y 9 The best data structure to check whether an arithmetic expression has balanced parentheses is a A) queue B) stack C) tree D) list 10 A Priority-Queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal of the heap is given below: 10, 8,5,3,2 Two new elements 1 and 7 are inserted in the heap in that order. The level-order traversal of the heap after the insertion of the elements is A) 10,8,7,5,3,2,1 B) 10,8,7,2,3,1,5 C) 10,8,7,1,2,3,5 D) 10,8,7,3,2,1,5 11 An organization has a class B network and wishes to form subnets for 64 departments. The subnet mask would be A) 255.255.0.0 B) 255.255.64.0 C) 255.255.128.0 D) 255.255.252.0

See fro more Material www.computetech-dovari.blogspot.com 12 Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal is 46.4 ms. The minimum frame size is: A) 94 B) 416 C) 464 D) 512 13 The following numbers are inserted into an empty binary search tree in the given order: 10, 1, 3, 5, 15, 12, 16. What is the height of the binary search tree (the height is the maximum distance of a leaf node from the root)? A) 2 B) 3 C) 4 D) 6 14 Consider the following C function: int f (int n) { static int i = 1; if (n >= 5) return n; n = n + i; i ++; return f (n); } The value returned by f(1) is A) 5 B) 6 C) 7 D) 8 15 The minimum number of page frames that must be allocated to a running process in a virtual memory environment is determined by A) the instruction set architecture B) page size C) physical memory size D) number of processes in memory 16. The address resolution protocol (ARP) is used for A) Finding the IP address from the DNS B) Finding the IP address of the default gateway See For More Material www.computertech-dovari.blogspot.com

C) Finding the IP address that corresponds to a MAC address D) Finding the MAC address that corresponds to an IP address 17. Consider the following relation schema pertaining to a students database: Student (rollno, name, address) Enroll (rollno, courseno, coursename) where the primary keys are shown underlined. The number of tuples in the Student and Enroll tables are 120 and 8 respectively. What are the maximum and minimum number of tuples that can be present in (Student * Enroll), where * denotes natural join? A) 8, 8 B) 120, 8 C) 960, 8 D) 960, 120 18. Consider a direct mapped cache of size 32 KB with block size 32 bytes. The CPU generates 32 bit addresses. The number of bits needed for cache indexing and the number of tag bits are respectively A) 10, 17 B) 10, 22 C) 15, 17 D) 5, 17 19. The goal of structured programming is to A) have well indented programs B) be able to infer the flow of control from the compiled code C) be able to infer the flow of control from the program text D) avoid the use of GOTO statements 20. The tightest lower bound on the number of comparisons, in the worst ease, for comparisonbased sorting is of the order of A) n B) n 2 C) n log n D) n log 2 n 21. Let G be a simple graph with 20 vertices and 100 edges. The size of the minimum vertex cover of G is 8. Then, the size of the maximum independent set of G is A) 12 B) 8 C) Less than 8 D) More than 12 22. WA and B are the only two stations on an Ethernet. Each has a steady queue of frames to send. Both A and B attempt to transmit a frame, collide, and A wins the first backoff race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The

See fro more Material www.computetech-dovari.blogspot.com probability that A wins the second backoff race is A) 0.5 B) 0.625 C) 0.75 D) 1.0 23. Let A be a sequence of 8 distinct integers sorted in ascending order. How many distinct pairs of sequences, B and C are there such that (i) each is sorted in ascending order, (ii) B has 5 and C has 3 elements, and (iii) the result of merging B and C gives A? A) 2 B) 30 C) 56 D) 256 24. In a network of LANs connected by bridges, packets are sent from one LAN to another through intermediate bridges. Since more than one path may exist between two LANs, packets may have to be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-routing? A) For shortest path routing between LANs B) For avoiding loops in the routing paths C) For fault tolerance D) For minimizing collisions 25. A Priority-Queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal of the heap is given below: 10, 8,5,3,2 Two new elements 1 and 7 are inserted in the heap in that order. The level-order traversal of the heap after the insertion of the elements is A) 10,8,7,5,3,2,1 B) 10,8,7,2,3,1,5 C) 10,8,7,1,2,3,5 D) 10,8,7,3,2,1,5 26. An organization has a class B network and wishes to form subnets for 64 departments. The subnet mask would be A) 255.255.0.0 B) 255.255.64.0 C) 255.255.128.0 D) 255.255.252.0 27. Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal is 46.4 ms. The minimum frame size is: A) 94 B) 416 C) 464 D) 512 See For More Material www.computertech-dovari.blogspot.com

28. The problems 3-SAT and 2-SAT are A) both in P B) both NP-complete C) NP-complete and in P respectively D) undecidable and NP-complete respectively 29.2 Consider the following relation schema pertaining to a students database: Student (rollno, name, address) Enroll (rollno, courseno, coursename) where the primary keys are shown underlined. The number of tuples in the Student and Enroll tables are 120 and 8 respectively. What are the maximum and minimum number of tuples that can be present in (Student * Enroll), where * denotes natural join? A) 8, 8 B) 120, 8 C) 960, 8 D) 960, 120 30. Consider a relation scheme R = (A, B, C, D, E, H) on which the following functional dependencies hold : (A -> B, BC -> D, E -> C, D -> A). What are the candidate keys of R? A) AE, BE B) AE, BE, DE C) AEH, BEH, BCH D) AEH, BEH, DEH 31. The goal of structured programming is to A) have well indented programs B) be able to infer the flow of control from the compiled code C) be able to infer the flow of control from the program text D) avoid the use of GOTO statements 32. The tightest lower bound on the number of comparisons, in the worst ease, for comparisonbased sorting is of the order of A) n B) n 2 C) n log n D) n log2 n

See fro more Material www.computetech-dovari.blogspot.com 33. A circuit outputs a digit in the form of 4 bits. 0 is represented by 0000,1 by 0001,..., 9 by 1001. A combinational circuit is to be designed which takes these 4 bits as input and outputs 1 if the digit ³ 5, and 0 otherwise. If only AND, OR and NOT gates may be used, what is the minimum number of gates required A) 2 B) 3 C) 4 D) 5 34. WA and B are the only two stations on an Ethernet. Each has a steady queue of frames to send. Both A and B attempt to transmit a frame, collide, and A wins the first backoff race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The probability that A wins the second backoff race is A) 0.5 B) 0.625 C) 0.75 D) 1.0 35. If 73x (in base-x number system) is equal to 54y (in base-y number system), the possible values of x and y are A) 8, 16 B) 10, 12 C) 9, 13 D) 8, 11 36. In a packet switching network, packets are routed from source to destination along a single path having two intermediate nodes. If the message size is 24 bytes and each packet contains a header of 3 bytes, then the optimum packet size is A) 4 B) 6 C) 7 D) 9 See For More Material www.computertech-dovari.blogspot.com

37. A Priority-Queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal of the heap is given below: 10, 8,5,3,2 Two new elements 1 and 7 are inserted in the heap in that order. The level-order traversal of the heap after the insertion of the elements is A) 10,8,7,5,3,2,1 B) 10,8,7,2,3,1,5 C) 10,8,7,1,2,3,5 D) 10,8,7,3,2,1,5 38. Consider an operating system capable of loading and executing a single sequential user process at a time. The disk head scheduling algorithm used is First Come First Served (FCFS). If FCFS is replaced by Shortest Seek Time First (SSTF), claimed by the vendor to give 50% better benchmark results, what is the expected improvement in the I/O performance of user programs? A) 50% B) 40% C) 25%br> D) 0% 39. How many distinct binary search trees can be created out of 4 distinct keys? A) 5 B) 14 C) 24 D) 42