Department of Computer Science Admission Test for PhD Program. Part I Time : 30 min Max Marks: 15

Similar documents
Department of Computer Science Admission Test for PhD Program. Part I Time : 30 min Max Marks: 15

ECE 122. Engineering Problem Solving Using Java

Decimal & Binary Representation Systems. Decimal & Binary Representation Systems

CS 2150 Final Exam, Spring 2018 Page 1 of 10 UVa userid:

CSE 373 Spring 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)

Midterm solutions. n f 3 (n) = 3

The type of all data used in a C (or C++) program must be specified

ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, MAY 2018 (First Year) INFORMATION TECHNOLOGY Basics of Information Technology

WYSE Academic Challenge 2002 Computer Science Test (Sectional) SOLUTION

Computer Science E-22 Practice Final Exam

Total Score /1 /20 /41 /15 /23 Grader

Recursion defining an object (or function, algorithm, etc.) in terms of itself. Recursion can be used to define sequences

Department of Computer Science and Technology

: Principles of Imperative Computation Victor Adamchik. Practice Exam - I

ESC101N: Fundamentals of Computing End-sem st semester

Recitation 9. Prelim Review

Operating Systems (2INC0) 2017/18

DATA STRUCTURES AND ALGORITHMS

INSTITUTE OF AERONAUTICAL ENGINEERING

CSE 373 Autumn 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)

Programming and Data Structure Solved. MCQs- Part 2

CS/ENGRD 2110 Object-Oriented Programming and Data Structures Spring 2012 Thorsten Joachims. Lecture 10: Asymptotic Complexity and

Tribhuvan University Institute of Science and Technology Computer Science and Information Technology (CSC. 154) Section A Attempt any Two questions:

Answers. 1. (A) Attempt any five : 20 Marks


Computer Science Foundation Exam. Dec. 19, 2003 COMPUTER SCIENCE I. Section I A. No Calculators! KEY

11/2/2017 RECURSION. Chapter 5. Recursive Thinking. Section 5.1

Algorithm Analysis. CENG 707 Data Structures and Algorithms

R10 SET - 1. Code No: R II B. Tech I Semester, Supplementary Examinations, May

CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators)

Bachelor Level/ First Year/ Second Semester/ Science Full Marks: 60 Computer Science and Information Technology (CSc. 154) Pass Marks: 24

Recursion. Chapter 5

CS 315 Data Structures Spring 2012 Final examination Total Points: 80

Data Structure and Algorithm Homework #1 Due: 1:20pm, Tuesday, March 21, 2017 TA === Homework submission instructions ===

Problem Set 6 Due: 11:59 Sunday, April 29

(DMCA101) M.C.A. DEGREE EXAMINATION, MAY First Year INFORMATION TECHNOLOGY

Draw a diagram of an empty circular queue and describe it to the reader.

Basic Data Structures (Version 7) Name:

Performance and Optimization Issues in Multicore Computing

«Computer Science» Requirements for applicants by Innopolis University

Algorithm Performance Factors. Memory Performance of Algorithms. Processor-Memory Performance Gap. Moore s Law. Program Model of Memory I

General Instructions. You can use QtSpim simulator to work on these assignments.

CSE 120 PRACTICE FINAL EXAM, WINTER 2013

Ph.D. Written Examination Syllabus

Name :. Roll No. :... Invigilator s Signature :.. CS/B.TECH (NEW)/SEM-2/CS-201/ BASIC COMPUTATION & PRINCIPLES OF COMPUTER PROGRAMMING

Sample Examination. Family Name:... Other Names:... Signature:... Student Number:...

1996 ILLINOIS JETS TEAMS DISTRICT COMPUTER FUNDAMENTALS TEST. 1. A computer program is:

MUHAMMAD FAISAL MIT 4 th Semester Al-Barq Campus (VGJW01) Gujranwala

Syllabus for Computer Science General Part I

mywbut.com GATE SOLVED PAPER - CS (A) 2 k (B) ( k+ (C) 3 logk 2 (D) 2 logk 3

DATA STRUCTURE : A MCQ QUESTION SET Code : RBMCQ0305

WYSE Academic Challenge Computer Science Test (State) 2015 Solution Set

CSE373 Winter 2014, Midterm Examination January 29, 2014

Algorithm Efficiency & Sorting. Algorithm efficiency Big-O notation Searching algorithms Sorting algorithms

Mergesort again. 1. Split the list into two equal parts

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder

10.1. Unit 10. Signed Representation Systems Binary Arithmetic

Algorithm Analysis. Applied Algorithmics COMP526. Algorithm Analysis. Algorithm Analysis via experiments

C Language Part 2 Digital Computer Concept and Practice Copyright 2012 by Jaejin Lee

Trees. Reading: Weiss, Chapter 4. Cpt S 223, Fall 2007 Copyright: Washington State University

The type of all data used in a C++ program must be specified

Sorting Pearson Education, Inc. All rights reserved.

Recursion. COMS W1007 Introduction to Computer Science. Christopher Conway 26 June 2003

Section 05: Solutions

csci 210: Data Structures Program Analysis

CSC236 Week 5. Larry Zhang

Main Memory and the CPU Cache

Experimental Methods I

DATA STRUCTURES AND ALGORITHMS. Sorting algorithms (insertion sort, bubble sort, selection sort)

Computer Science 50: Introduction to Computer Science I Harvard College Fall Quiz 0 Solutions. Answers other than the below may be possible.

CS:3330 (22c:31) Algorithms

Test 1 SOLUTIONS. June 10, Answer each question in the space provided or on the back of a page with an indication of where to find the answer.

Analysis of Algorithms. Unit 4 - Analysis of well known Algorithms

Sorting Algorithms. + Analysis of the Sorting Algorithms

1) What is the role of Information Technology in modern business? 2) Define computer? Explain the Block Diagram of computer with a neat diagram?

Test Bank Ver. 5.0: Data Abstraction and Problem Solving with C++: Walls and Mirrors, 5 th edition, Frank M. Carrano

Midterm I Exam Principles of Imperative Computation André Platzer Ananda Gunawardena. February 23, Name: Andrew ID: Section:

Introduction to Computer Science-103. Midterm

Recursion. Chapter 7. Copyright 2012 by Pearson Education, Inc. All rights reserved

Midterm I Exam Principles of Imperative Computation André Platzer Ananda Gunawardena. February 23, 2012

Advanced Diploma in Computer Science (907) Computer Systems Architecture

(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75. Paper - I : INFORMATION TECHNOLOGY

Practice Problems for the Final

you open a web page (e.g. xyz.php) which has an image tag?

Information Science 1

CS 525: Advanced Database Organization 04: Indexing

Chapter 8 Search and Sort

Q1 Q2 Q3 Q4 Q5 Q6 Total

L.J. Institute of Engineering & Technology Semester: VIII (2016)

EE/CSCI 451 Midterm 1

Sankalchand Patel College of Engineering - Visnagar Department of Computer Engineering and Information Technology. Assignment

(a) Write code to do this without using any floating-point arithmetic. Efficiency is not a concern here.

Objectives. Recursion. One Possible Way. How do you look up a name in the phone book? Recursive Methods Must Eventually Terminate.

Recursion & Performance. Recursion. Recursion. Recursion. Where Recursion Shines. Breaking a Problem Down

Computer Science Foundation Exam

INTRODUCTION. Objective: - Algorithms - Techniques - Analysis. Algorithms:

COMP171 Data Structures and Algorithms Fall 2006 Midterm Examination

CSE 332, Spring 2010, Midterm Examination 30 April 2010

Introduction to Data Structure

Computer Science Foundation Exam. May 6, Computer Science. Section 1A. No Calculators! KEY. Score: 50

Transcription:

Department of Computer Science Admission Test for PhD Program Part I Time : 30 min Max Marks: 15 Each Q carries 1 marks. ¼ mark will be deducted for every wrong answer. Part II of only those candidates will be evaluated who will score at least 6 marks in Part I. 1. Consider a linked list whose node has two fields: info field containing information and next field containing address of the next node in the list. The code to insert a node pointed to by q, after a node pointed to by p, is 1) for (ptr = list; ptr-> next!= p; ptr = ptr->next) { ptr -> next = q; q->next = ptr->next;} ) for (ptr = list; ptr!= p; ptr = ptr->next) {ptr -> next = q; q->next = ptr->next;} 3) for (ptr = list; ptr-> next!= p; ptr = ptr->next); { ptr ->next = q; q->next = ptr->next;} 4) for (ptr = list; ptr!= p; ptr = ptr->next) { ptr = q; q->next = ptr->next;}. What will be effect of the following code? Int x= -1 ; while (!x) { x++ ; printf(«%d», x) ; } (1) The loop will execute infinitely many times. () The loop will not execute at all. (3) The loop will execute only twice. (4) The loop will execute once. 3. Which of the following is true about the data types char, short, long and int in a typical programming language like C/C++? 1) All of them store an integer value. ) char, short and int store an integer value whereas long stores a real value. 3) char stores only English alphabet, long stores real values and int stores integers. 4) None of the above. 4. Which of the following is true? To compute fn, the nth Fibonacci number, the most efficient technique is 1) Recursive

) Iterative 3) Dynamic 4) Greedy 5. Data of a warehouse of motorparts needs to be stored. Everyday many new motor parts arrive at the warehouse and many are delivered to the client. Which data structure is most suited to store the data so that all these operations (addition of parts and deletion of parts) including search can be performed in O(log n) time? 1) A sorted array with binary search. ) A sorted linked list with binary search. 3) A balanced binary search tree. 4) All of the above. 6. An array of characters needs to be sorted in increasing order. One of the worst case input for insertion sort is f,e,d,c,b,a. Another worst case input for it is 1) a,b,c,d,e,f ) c,b,a,f,e,d 3) a,b,d,c,e,f 4) e,f,d,c,b,a 7. Consider Quick Sort performed on an array of n elements. The number of comparisons performed by the algorithm in the worst case is 1) O(n log n) ) O(n^) 3) O(n) 4) Omega(n log n) 8. Consider the error control function in the Data Link Layer of the OSI stack. Which of the following is true? 1) It checks the error caused during transmission and not the ones caused in the sender s memory. ) It checks the errors caused in the sender s memory but not the ones caused during transmission. 3) It checks both the errors caused in the sender s memory as well as the ones caused during transmission. 4) Error control is not a function of DLL. 9. Consider a data coding scheme QAM -3 in which one bit is an error control bit. How many bits of data is transfered? 1) 3 ) 31 3) 4

4) 5 10. What is the role of DNS (Domain Name Server)? 1) Map a local IP address to the global IP address. ) Map the symbolic URL to an IP address. 3) Map the symbolic URL to its domain. 4) Assign a domain to a new website. 11. A semaphore in operating system solves, 1) thrashing problem of concurrent interacting processes ) thrashing problem of sequential processes 3) mutual exclusion of concurrent interacting processes 4) mutual exclusion of sequential processes 1. Thrashing is 1) Frequent swapping of jobs in the processor? ) Frequent page default? 3) Frequent file swapping from the disk? 4) Frequent overflow message? 5) 13. The binary representation of -16 in signed s complement in 7 bits is 1) 1110000 ) 1010000 3) 1101111 4) None of the above 14. The number of address lines and input-output data lines required for a memory unit consisting of 4 giga words where each word consists of 64 bits are 1) 3, 6 ) 3, 64 3), 6 4), 64 15. Which of the following is true? 1) Access time of cache > access time of RAM > access time of secondary memory. ) Access time of cache > access time of RAM > access time of secondary memory. 3) Access time of RAM < access time of cache < access time of secondary memory. 4) Access time of RAM < access time of secondary memory < access time of cache.

16. A semaphore in operating system solves, 1) thrashing problem of concurrent interacting processes ) thrashing problem of sequential processes 3) mutual exclusion of concurrent interacting processes 4) mutual exclusion of sequential processes 17. Thrashing is 1) Frequent swapping of jobs in the processor? ) Frequent page default? 3) Frequent file swapping from the disk? 4) Frequent overflow message?

Department of Computer Science Admission Test for PhD Program Part II Time : 1 hour Max Marks: 30 18. Write a recursive function in C to search for an element in a binary search tree. 3 19. Consider the following code in C; int a,b; float c; a = 3; b = ; c = -a/b; The value assigned to c is zero. Identify the error. Correct it and explain why your solution will work. 0. Which sorting algorithm is best suited to sort integers in the range [1.. 10^c] where c is a constant. Derive the time complexity of your algorithm? 1. What is the difference between data type and data structure?. What are the main advantages and disadvantages of iterative functions over recursive ones? 3. Write a for-loop in C/C++/Java to insert an element x in a sorted array A containing n elements. 4. Tertiary search in a sorted array finds two elements p and q (p< q) that divide the list into three equal parts. If the key is less than p, the algorithm recursively searches the first part else it compares the key with q. If the key is greater than p and less than q, it searches the middle part else ( key is greater than q) it searches the last part. Write the exact recurrence relation for the number of comparisons performed by the algorithm and solve it exactly. Is it faster or slower than binary search? Please do not use asymptotic notation. 4 1. i. What do you understand by the dotted decimal notation of an IP address? Explain with the help of an example.

ii. How does your computer recognize the remote (google) server when you type http://google.com in the address bar of your browser. 9. When s complement representation is used to store negative numbers, what is the minimum number of bits required to store 16. Justify your answer by explaining why lesser number of bits would not suffice. 10. Discuss the advantages and disadvantages of shortest job first policy for job scheduling. 3 11. Can an application of size 1Gb run on a RAM of size 56Mb. If yes, explain how? If no, explain why? 1. Give the sequence of events that take place when you click on the icon to execute an application.