mywbut.com GATE SOLVED PAPER - CS (A) 2 k (B) ( k+ (C) 3 logk 2 (D) 2 logk 3

Similar documents
CS Branch GATE Paper 2002 SECTION A

NODIA AND COMPANY. GATE SOLVED PAPER Computer Science Engineering Digital Logic. Copyright By NODIA & COMPANY

Advanced Parallel Architecture Lesson 3. Annalisa Massini /2015

Lecture 5: Computer Organization Instruction Execution. Computer Organization Block Diagram. Components. General Purpose Registers.

Computer Organisation CS303

SECTION A. (i) The Boolean function in sum of products form where K-map is given below (figure) is:

Sunday, April 25, 2010

Main Points of the Computer Organization and System Software Module

Computer Architecture

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register

CHETTINAD COLLEGE OF ENGINEERING AND TECHNOLOGY COMPUTER ARCHITECURE- III YEAR EEE-6 TH SEMESTER 16 MARKS QUESTION BANK UNIT-1

(DMTCS 01) Answer Question No.1 is compulsory (15) Answer One question from each unit (4 15=60) 1) a) State whether the following is True/False:

COMPUTER ORGANIZATION AND ARCHITECTURE

DATA STRUCTURES AND ALGORITHMS

The functional block diagram of 8085A is shown in fig.4.1.

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder

Intel 8086 MICROPROCESSOR. By Y V S Murthy

EC-333 Microprocessor and Interfacing Techniques

Advanced Computer Architecture-CS501

Intel 8086 MICROPROCESSOR ARCHITECTURE

Lecture-12 INTERNAL ARCHITECTURE OF INTEL 8085: The Functional Block Diagram Of 8085 Is Shown In Fig 16.

PART A (22 Marks) 2. a) Briefly write about r's complement and (r-1)'s complement. [8] b) Explain any two ways of adding decimal numbers.

1. INTRODUCTION TO MICROPROCESSOR AND MICROCOMPUTER ARCHITECTURE:

Computer Organization CS 206 T Lec# 2: Instruction Sets

Processing Unit CS206T

Co-processor Math Processor. Richa Upadhyay Prabhu. NMIMS s MPSTME February 9, 2016

The Instruction Set. Chapter 5

Introduction to C. Why C? Difference between Python and C C compiler stages Basic syntax in C

UNIT-II. Part-2: CENTRAL PROCESSING UNIT

Information Science 1

Computer Science Engineering Sample Papers

Material You Need to Know

M. Sc (CS) (II Semester) Examination, Subject: Computer System Architecture Paper Code: M.Sc-CS-203. Time: Three Hours] [Maximum Marks: 60

Midterm 1 topics (in one slide) Bits and bitwise operations. Outline. Unsigned and signed integers. Floating point numbers. Number representation

JNTUWORLD. 1. Discuss in detail inter processor arbitration logics and procedures with necessary diagrams? [15]

Lecture 12 Integers. Computer and Network Security 19th of December Computer Science and Engineering Department

SRI VENKATESWARA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF ECE EC6504 MICROPROCESSOR AND MICROCONTROLLER (REGULATION 2013)

9/25/ Software & Hardware Architecture

Bits, Words, and Integers

CS Branch GATE Paper SECTION A (75 Marks)

60-265: Winter ANSWERS Exercise 4 Combinational Circuit Design

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Digital Computer Arithmetic ECE 666

We can study computer architectures by starting with the basic building blocks. Adders, decoders, multiplexors, flip-flops, registers,...

COMPUTER ORGANIZATION AND ARCHITECTURE

WYSE Academic Challenge 2002 Computer Science Test (Sectional) SOLUTION

SECTION A ONE MARKS QUESTIONS (1-25)

1. Internal Architecture of 8085 Microprocessor

Database Management Systems Paper Solution

CHETTINAD COLLEGE OF ENGINEERING AND TECHNOLOGY COMMUNICATION ENGINEERING REG 2008 TWO MARKS QUESTION AND ANSWERS

Arab Open University. Computer Organization and Architecture - T103

Problems and Solutions to the January 1994 Core Examination

CHAPTER 5 : Introduction to Intel 8085 Microprocessor Hardware BENG 2223 MICROPROCESSOR TECHNOLOGY

1996 ILLINOIS JETS TEAMS DISTRICT COMPUTER FUNDAMENTALS TEST. 1. A computer program is:

STRUCTURE OF DESKTOP COMPUTERS

MARIE: An Introduction to a Simple Computer

VARDHAMAN COLLEGE OF ENGINEERING (AUTONOMOUS) Shamshabad, Hyderabad

Reals 1. Floating-point numbers and their properties. Pitfalls of numeric computation. Horner's method. Bisection. Newton's method.

Computer Science /21/2000

Assembly Language Programming Introduction


Number System. Introduction. Decimal Numbers

BACHELOR OF COMPUTER APPLICATIONS (BCA)

Draw a diagram of an empty circular queue and describe it to the reader.

COURSE DESCRIPTION. CS 232 Course Title Computer Organization. Course Coordinators

CHAPTER ASSEMBLY LANGUAGE PROGRAMMING

Lecture 5:8086 Outline: 1. introduction 2. execution unit 3. bus interface unit

Since ESE GATE PSUs ELECTRICAL ENGINEERING COMPUTER FUNDAMENTALS. Volume - 1 : Study Material with Classroom Practice Questions

COMPUTER ARCHITECTURE AND ORGANIZATION Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital

17. Instruction Sets: Characteristics and Functions

The CPU and Memory. How does a computer work? How does a computer interact with data? How are instructions performed? Recall schematic diagram:

1 MALP ( ) Unit-1. (1) Draw and explain the internal architecture of 8085.

Chapter. Computer Architecture

Programming Level A.R. Hurson Department of Computer Science Missouri University of Science & Technology Rolla, Missouri

Class Notes. Dr.C.N.Zhang. Department of Computer Science. University of Regina. Regina, SK, Canada, S4S 0A2

Course Description: This course includes concepts of instruction set architecture,

Introduction to Microprocessor

Architecture & Instruction set of 8085 Microprocessor and 8051 Micro Controller

Syllabus for Computer Science General Part I

Multiple Choice Type Questions

CIS 1.5 Course Objectives. a. Understand the concept of a program (i.e., a computer following a series of instructions)

Advanced Parallel Architecture Lesson 3. Annalisa Massini /2015

ELEG3924 Microprocessor

2c. Content of Computer systems (Component 01)

2. (a) Compare the characteristics of a floppy disk and a hard disk. (b) Discuss in detail memory interleaving. [8+7]

CPU Design John D. Carpinelli, All Rights Reserved 1

More Programming Constructs -- Introduction

Chapter 3 : Control Unit

Chapter 12. CPU Structure and Function. Yonsei University

ELEG3923 Microprocessor Ch.2 Assembly Language Programming

Computer Architecture and Organization

11/22/1999 7pm - 9pm. Name: Login Name: Preceptor Name: Precept Number:

Fundamental of I.T. (c) Application of computer *************

8086 INTERNAL ARCHITECTURE

Sample Exam I PAC II ANSWERS

UPY14602-DIGITAL ELECTRONICS AND MICROPROCESSORS Lesson Plan

ASSEMBLY LANGUAGE MACHINE ORGANIZATION

Propositional Calculus. CS 270: Mathematical Foundations of Computer Science Jeremy Johnson

The ALU consists of combinational logic. Processes all data in the CPU. ALL von Neuman machines have an ALU loop.

Blog -

Internal architecture of 8086

Transcription:

GATE SOLVED PAPER - CS 00 k k-1 Q. 1 The solution to the recurrence equation T( ) = 3T( ) + 1, T( 1) = 1 (A) k (B) ( k+ 1-1 ) is (C) 3 logk (D) logk 3 Q. The minimum number of colours required to colour the vertices of a cycle with n nodes in such a way that no two adjacent nodes have same colour is. (A) (B) 3 (C) 4 (D) n - n 9 + C Q. 3 In the worst case, the number of comparisons needed to search a single linked list of length n for a given element is (A) log n (B) n n (C) log - 1 (D) n Q. 4 Maximum number of edges in a n-node undirected graph without self loops is (A) n nn ( - 1) (B) (C) ( n - 1) (D) ( n + 1 )( n) Q. 5 The number of leaf nodes in a rooted tree of n nodes, with each node having 0 or 3 children is : (A) n (B) ( n - 1 ) 3 (C) ( n - 1 ) (D) ( n + 1 ) 3 Q. 6 Consider the following algorithm for searching for a given number x in an unsorted array A[ 1... n] having n distinct values : (1) Choose an i uniformly at random from [1... n] () If Ai [] = xthen stop else Goto 1; Assuming that x is present A, What is the expected number of comparisons made by the algorithm before it terminates? (A) n (B) n - 1 (B) n (D) n Q. 7 The running time of the following algorithm Procedure An ( ) If n <= return (1) else return ( A( ^ nh)); Is best described by (A) 0 ( n) (B) 0( log n) (C) 0 ( loglog n) (D) 01 ()

Q. 8 A weight-balanced tree is a binary tree in which for each node, the number of nodes in the let sub tree is at least half and at most twice the number of nodes in the right sub tree. The maximum possible height (number of nodes on the path from the root to the furthest leaf) of such a tree on n nodes is best described by which of the following? (A) log n (B) log 4 3 n (C) log 3 n (D) log n Q. 9 To evaluate an expression without any embedded function calls (A) One stack is enough (B) Two stack are needed (C) As many stacks as the height of the expression tree are needed (D) A Turning machine is needed in the general case Q. 10 Dynamic linking can cause security concerns because (A) Security is dynamic (B) The path for searching dynamic libraries is not known till run time. (C) Linking is insecure (D) Cryptographic procedures are not available for dynamic linking Q. 11 A device employing INTR line for device interrupt puts the CALL instruction on the data bus while (A) INTA is active (B) HOLD is active (C) READY is active Q. 1 In 8085 which of the following modifies the program counter? (A) Only PCHL instruction (B) Only ADD instructions (C) Only JMP and CALL instructions (D) All instructions Q. 13 In serial data transmission, every byte of data is padded with a 0 in the beginning and one or two 1 s at the end of byte because (A) Receiver is to be synchronized for byte reception (B) Receiver recovers lost 0 s and 1 from these padded bits (C) Padded bits are useful in parity computation. Q. 14 Which of the following is not a form of memory? (A) Instruction cache (B) Instruction register (C) Instruction opcode (D) Translation-a-side buffer Q. 15 In the C language (A) At most one activation record exists between the current activation record and the activation record for the main. (B) The number of activation records between the current activation record and the activation record for the main depends on the actual function calling sequence. (C) The visibility of global variables depends on the actual function calling sequence. (D) Recursion requires the activation record for the recursive function to be saved on a different stack before the recursive fraction can be called. 3

Q. 16 In the absolute the addressing mode (A) The operand is inside the instruction (B) The address of the operand is inside the instruction (C) The register containing the address of the operand is specified inside the instruction (D) The location of the operand is implicit Q. 17 The performance of a pipelined processor suffers if (A) The pipelined stages have different delays (B) Consecutive instructions are dependent on each other (C) The pipeline stages share hardware resources (D) All the above Q. 18 Horizontal microprogramming (A) Does not require use of signal decoders (B) Results in larger sized microinstructions than vertical microprogramming (C) Uses one bit for each control signal (D) All of the above Q. 19 Relation R with an associated set of functional dependencies, F, is decomposed into BCNF. The redundancy (arising out of functional dependencies) in the resulting set of relations is. (A) Zero (B) More than zero but less than that of an equivalent 3 NF decomposition (C) Proportional to the size of F + (D) Indetermine. Q. 0 With regard to the expressive power of the formal relational query languages, which of the following statements is true? (A) Relational algebra is more powerful than relational calculus. (B) Relational algebra has the same power as relational calculus. (C) Relational algebra has the same power as safe relational calculus.. Q. 1 AB + -tree index is to be built on the Name attribute of the relation STUDENT. Assume that all student names are of length 8 bytes, disk blocks are of size 51 bytes, and index pointers are of size 4 bytes. Given this scenario, what would be the best choice of the degree (i.e. the number of pointers per node) of the B + -tree (A) 16 (B) 4 (C) 43 (D) 44 Q. Relation R is decomposed using a set of functional dependencies, F,and relation S is decomposed using another set of functional dependencies, G. One decomposition is definitely BCNF, the other is definitely. 3 NF, but it is not known which is which. To make a guaranteed identification, which one of the following tests should be used on the decompositions? (Assume that the closures of F and G are available). (A) Dependency-preservation (B) Lossless-join (C) BCNF definition (D) 3 NF definition

Q. 3 From the following instance of relation schema RABC, (,, ) we can conclude that : A B C 1 1 1 1 1 0 3 3 (A) A functionally determines B and B functionally determines C (B) A functionally determines B and B does not functionally determines C. (C) B does not functionally determines C (D) A does not functionally B and B does not functionally determines. Q. 4 Minimum sum of product expression for fwxyz (,,, ) shown in Karnaugh-map below is (A) xz + y' z (B) xz' + zx' (C) xy ' + zx' Q. 5 The decimal value of 0.5 (A) is equivalent to the binary value 0.1 (B) is equivalent to the binary value 0.01 (C) is equivalent to the binary value 0.00111... (D) cannot be represented precisely in binary. Q. 6 The s complement represent representation of the decimal value - 15 is (A) 1111 (B) 11111 (C) 111111 (D) 10001 Q. 7 Sign extension is a step in (A) floating point multiplication (B) signed 16 bit integer addition (C) arithmetic left shift (D) converting a signed integer from one size to another. Q. 8 In s complement addition, overflow (A) is flagged whenever there is carry from sign bit addition (B) cannot occur when a positive value is added to a negative value (C) is flagged when the carries from sign bit and previous bit match.

Q. 9 Consider the following logic circuit whose inputs are functions f1, f, f3 and output is f Given that f1 (,,) x y z = S( 0135,,, ) f (,,) x y z = S(,) 67, and fxyz (,,) = S(,,) 145 f 3 is (A) S ( 145,, ) (B) S(,) 67 (C) S ( 0135,,, ) Q. 30 Consider the following multiplexor where 10, 11, 1, 13 are four data input lines selected by two address line combinations AA 1 0 = 00, 01, 10, 11 respectively and f is the output of the multiplexor. EN is the Enable input. The function fxyz (,,) implemented by the above circuit is (A) xyz' (B) xy + z (C) x+ y Q. 31 Let fab (, ) = A' + B. Simplified expression for function ffx (( + yy, ),) z is (A) x' + z (B) xyz (C) xy' + z Q. 3 What are the states of the Auxiliary Carry (AC) and Carry Flag (CY) after executing the following 8085 program? MIV H, 5DH MIV L, 6BH MOV A, H ADD L (A) AC = 0 and CY = 0 (B) AC = 1 and CY = 1 (C) AC = 1 and CY = 0 (D) AC = 0 and CY = 1

Q. 33 The finite state machine described by the following state diagram with A as starting state, where an arc label is y x and x stands for 1-bit input and y stands for -bit output. (A) Outputs the sum of the present and the previous bits of the input. (B) Outputs 01 whenever the input sequence contains 11 (C) Outputs 00 whenever the input sequence contains 10. Q. 34 Which of the following scheduling algorithms is non-preemptive? (A) Round Robin (B) First-In First-Out (C) Multilevel Queue Scheduling (D) Multilevel Queue Scheduling with Feedback Q. 35 The optimal page replacement algorithm will select the page that (A) Has not been used for the longest time in the past. (B) Will not be used for the longest time in the future. (C) Has been used least number of times. (D) Has been used most number of times Q. 36 Which combination of the following features will suffice to characterize an OS as a multi-programmed OS? More than one program may be loaded into main memory at the same time for execution. (B) If a program waits for certain events such as I/O, another program is immediately scheduled for execution. (C) If the execution of a program terminates, another program is immediately scheduled for execution. (A) A (B) A and B (C) A and C (D) A, B and C Q. 37 In the index allocation scheme of blocks to a file, the maximum possible size of the file depends on (A) The size of the blocks, and the size of the address of the blocks (B) The number of blocks used for the index, and the size of the blocks. (C) The size of the blocks, the number of blocks used for the index, and the size of the address of the blocks.. Q. 38 The results returned by function under value-result and reference parameter passing conventions (A) Do not differ (B) Differ in the presence of loops (C) Differ in all cases (D) May differ in the presence of exception

Q. 39 Consider the following declaration of a two-dimensional array in C : Char a[100][100] Assuming that the main memory is byte-addressable and that array is stored starting form memory address 0, the address of a [40] [50] is (A) 4040 (B) 4050 (C) 5040 (D) 5050 Q. 40 The smallest finite automaton which accepts the language {x length of x is divisible by 3} has (A) states (B) 3 states (C) 4 states (D) 5 states Q. 41 Which of the following is true? (A) The complement of a recursive language is recursive. (B) The complement of a recursively enumerable language is recursively enumerable. (C) The complement of a recursive language is either recursive or recursively enumerable. (D) The complement of a context-free language is context-free. Q. 4 The C language is : (A) A context free language (B) A context sensitive language (C) A regular language (D) Parsable fully only by a Turing machine Q. 43 The language accepted by a Pushdown Automaton in which the stack is limited to 10 items is best described as (A) Context free (B) Regular (C) Deterministic Context free (D) Recursive **********

ANSWER KEY 00 1 3 4 5 6 7 8 9 10 (B) (B) (D) (B) (D) (A) (A) (A) (A) (D) 11 1 13 14 15 16 17 18 19 0 (A) (B) (A) (C) (A) (D) (D) (C) (A) (C) 1 3 4 5 6 7 8 9 30 (A) (B) (A) (B) (B) (D) (A) (B) (A) (A) 31 3 33 34 35 36 37 38 39 40 (D) (C) (A) (B) (B) (D) (B) (B) (B) (C) 41 4 43 (A) (A) (B)