Top Banner

of 10

CE AUG-10

Apr 14, 2018

Download

Documents

Patel Punit
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/30/2019 CE AUG-10

    1/10

    Date:8t hAugust

    fs\ocY- gReorf l \ ' \o l - 3o\c'iui I Corputer ngineeringCO)D$j^*2 0 r 0 i i 'ne: 0 pm o4.30pm

    I . If the ecipjent f a messageas o besatisfiedwith the dentity of thesender,heprincipleof __ comes nlo picture.a. Confidentialityb. Authentication2. Whichof the following principles violated f computer ystem s not accessible?AvailabilityAccesscontrol128bits256bits

    a. Confidentiality flQb. Authentication x3. What ssizcof thekcy n original ESalgorith^?E'a. 56bitsb. 64bits

    fo Integrityd. Accesscontrol

    c .d .4. Mrat is true for the symmetric ey encryption?Key should be secretAlgorithm shouldbe knownc. Key should be large o avoidbrute-forceattackd. All of the above5- What is nsed o verify the ntegrityof a message?a. Message igestb. Dccryption algorithm, 6. Which of the tbllowing defines he structureof a digital certificate?a. X.500b, ANS.I

    7. TheCA signs digitalcertificate itha- User's ublickeyb. User'sprivatekey. 8. Kerberosprovides ora. Encryptionb. SSO9. Which datastructure in a compiler s used for managing nformation aboutvariablesand their attributes? c. Semantic stackd. Parse able

    c. Assemblerb. Compiler d. None of the aboveI 1. Which of the following datastructuredoesnot allow reuseof the space, ntil its getempty?a- Stack c. Circular queuelAr(D simplequeue d. None of theabove12.Whiahof the ollowingoperationssperforrned oreefficientlvby doublyinked istthan v sinelv inked ist?

    @- n"flting a nodewhoselocations givenY Searchingnunsoftedist or agir.en temc. Inserting nodeafterhenode ,itha given ocationd. Traversing list toprocessachnode

    @ oigital enveloped. Noneof theabovec. TCP/IP@ x.soq

    @l_ts own privatekeyiil. Its ownpublickey' ,CIRemote logirtFl-ocal login

    a. Abstract syntax tree-\(!,J Symbol table10. Which of the following doesnot needsymbol table?a. Operatingsystem

    Page o l l0

  • 7/30/2019 CE AUG-10

    2/10

    -'----'->

    h>tI 3 How mahy. alues canbe storedby an affayA(- I ..m, ..m)?a ' m q m(m+l )b. m' @ m(rn+z;14.whichof the ollowing ropertysused ybinary ei-rchut gnoredy inearsearch?

    s) Order f the is tTl Lengthof the ist

    /. -!'#- 7e-/ -CompulerngineeringCd . F* alx'e r 1f _l - - t ^ , t - " t l l

    ) , z \ ' \r . , 1 ,5 ) ^ l c. Maximum value n the is td. Mean of datavalues- . r\ 15 .Thegoalofhashings to produce seatchha takesz' ! ry .- ff, g( l ) times c. O(logn) timesI'&n" %i;ij';;;' d- o(n oe ) imes

    (J;g1 16.Whichof the ollowingoperation n binary earchreeproduces ortedist?'/ a. preoderraversal (c) Inorder raversal- q b. Postorderraversal Y top-Oown raversal -" h"ii. In a timesharingOS,when imeslice oraprocesss completed, rocess oes rom{* \o 1^'-JflrrS running tate oI n\M*' ' u. Blockedstate c- Suspendedtatew'- t .,--. (il Readystate d. Terminatecl tate.r,e-r Je" tg. Ei;d-;henurib", of page aultswhenreferenceso pagesoccur n the followingorder- ^.! ; 1,2,4,5,2,1,2,4.is,me that -"*ory canaccommodate pagesand it already/ ,?i - contains ages and2 with I broughtearlierhan2 with LRU policy-'Fr#. ili 9l,o,,"or,r,"above t-' . f ' / \ t19.Mutua lexc lus ionprob lemar isesbetween r , ) L I I , ,1Qilr*iTl;*:"*=,t":::",*:,-":nilt" ff,-t i;. N;;; "i,h" above i' ' t ; 1 I20.Distributed ystemshould f,)rs- ? r otu Meetiheprescribedimeconstraints ;; n gS- I n t t' I'(6) target beiterresource haringY i;;;il;;.r** utilization o '{ P i.-,

    ,,. o,,l;J,Ti,"::"#:f::f;T'ffi;t*main memorynd r28KBcacheith ache t1,n0block size4 KB. if u dit rt mappingschemef cachemanagements usedhow many l)differentmemoryblockscanmapontoaSiven hysical;1cheblock? ^ g fy , -? it:"" orthebove '&, \*:o*. 2s6zz.FixJd llitiuo, schemeorrnemoryanagement - ta ko 3 tg ''\9'a. Is very comrnonn modemOS

    I Is -,.eryeflicient n memoryutilization I ?s' At(} li '1;I ilTcient in11'o'r utilization 6d. Used in mainframesOS | -_r$jfo \ 136:-"-*J,*?_-_ rEZi fliL,,,\: -Xli* "Lsd

    ;r 2 . a Z zg "(S' c \t ??i- I,Qf;T's,4

    Page of l0

  • 7/30/2019 CE AUG-10

    3/10

    ComputerEngineering CO)

    23-Consider6 fi les fl,f2,B,Pl,f5, f6 with coresponding sizes100,200,70,40"?.' 'respectively, he files are to be storedon a sequentialdevice n sucha way i:rloptimizeaccessime.Which hemostsuitableorder?a. f6,i5,f4,B,f2,fl .-g. f5,f2,fl ,R,f6,f4b. fl,{2,8,9,f5,f6 [g) r+.to,n,fl,2,f524. Wild-cardspecifiers/^.( a. Provides n easyway of finding groups of related ilesb. Are onlyusedwhenprinting he contentsof fi lesc- Can be usedwhen writing a filed. Allow severaliles o be readsimultaneouslv

    iL -

    .t,

    25. Parallel printersusea. RS-232-Cnterfaceb. Centronicsinterface

    b- ADD27.MS-DOS-il DoesnotsupportmultiprogrammingEl Supportsmultiprogrammingo someextenlc. Supportsmultiprogramryringullyd- Noneof theabove28. Database anagementystems re ntendedo

    ! - 'c. Handshake oded. All of the above

    d. All of the above

    _ l. .,,,,,.:SfJ,

    26. In memorv manoed/O, which of the following instructionnot is not supported?C nr,oui' c. LDA t 11J0-,tII

    a. Eliminatedata redundancyb. Establish elationship amongrecords in different filesA Manage ile access\L) All of theabove29. A datadictionary s a special ile that containsa. Namesof all fields n all filesb. Data ypesof all fields n all filesg. Width of all fields n all files'l'{JAll of theabove

    ffio,^-'q-*1.- .1

    Ia,IIIj

    t n 0

    > > t t

    4*1 r{b

    30- Manager salary details are hidden from employee. Th,is sa. Conceptualeveldatahiding , ' @ n*t"*al level datahiding rb- Physical evel datahiding I d. None of theabove ,31.A tr igger s aa- Statement hatenables o startany database*b. Statement that is executed by the user when debugging an applicationprogram

    ;9.a Qondition he system ests or the validity of thedatabaseser.(d.) Statement hat is executed automatically by the systemas a side effect of a- modification o the database32. Subschema anbc used oa. Createvery different personalizedview of the sai,ne ata '2'b. Present nformation n different fonlatsj* Hide sensitivenformationby omitting fields from the subschernaesc.r:plion(j l-) al t of th eabove

    .{.;

    Page of 10

  • 7/30/2019 CE AUG-10

    4/10

    ComputersngineeringCO) ._rr\,.,)", 6Qxgr-t \433 . Which of the following is relatedo transactionn DBMS? '. J' , "$ ' 45

    a. Commit . c. Savepoint.

    *o.\;';i,.{"b . R o l l b a c k O A l l o f t h e a b o v e , ( ' / P '34. Which of the following iJ not DDL operation?-- ' ",fr ir"r"lJi"* atable c- Deleting able\+, ;;;;;i;; u ubl" d. Adding columnoa able 4

    I 35. One of the header ields in an P datagrams the-Time o Live (TTL) field' which ofthe following statements estexplainshe need or this field? r- L11L' l-* tt""a. It can be used to prioritiie packets 1' x a'v-\ . *b. It can be used to reduce elays VN'' ( {L '''-6lfu'^'/-^' '' "

    g. [t can be used o optimize hroughput\ ' ' ' A,, tt " u

    @ t, canbeusedop*::l]f:let looPing36- A and B are the only two statlons n an Eihernet' Eachhas a steadyqueueof tiamest o s e n d . B o t h A a n d B a t t e m p t t o t r a n s m i t a f r a m e , c o l l i d e , a n d A w i n s t h e f i r s tbackoff race. Al the end of thissuccessfulmnsmissionby A, both A andB attenrptro transmit ndcollide. Th eprobabil i tyha tA wins th esecond ackoff ac e s 3I ll,, ; ?l' rrqd Rl. 37. Which one of the follou.ing is not a client'serverapplication? f-=+-t:Ua- Internetchat c' E-mail !b. web rowsing @it'* *t"#'3g. Whichof thefoffo*iig layerperforms nd o enderrti and low control'/a. Sessionayer c. Data ink layer - A*t 0'5 *6ffi;i,t*v", 'd;;;;Y"' Ho '-'"'39.Flowcontrol#r*ion is panof- layers' - ^--r J^+- i-r. fttS ='a. Session ndtransporr .)Transport anddata.link a --=b. Transportandnefwork Y Dutu ink andphysical ? A*40. Maximtrm engthof the wisted air segments 6 100* _r:#b- looom Vzooo- oJ ff t '*' '4r. A memory",.icenwhich ocations dentified*j:*:m*#.fi &t*- ;. "#H:tictape ^?;,ffi#" , t"'';|^*',c 42.Theworking of a staircaseswitch s an example of logicaaL;:"ffil:"*"""":..:--g:*xl.

    *-Hi-T^43. Negativenumberscannotbe epresurtedng Sign-magnitudeorm c' 2's complementorm l 'f b.) l's complementorm d' Noneof theabove L /44. MoYehanoneword areput nonecacheblockto \v'rv vr t t ;a. Exploit the temporalocalityof referencen aprogram :- "s/i\ i.ii;n the spatial ocalityof referencen aprogram i s.^\,r I - --\ *J'Y R"du"ethe misspenalty \',-i^'-n| ' {'o-1'.q'd. Noneof the above V/a A t b\ o c rr-Page4 of 10

  • 7/30/2019 CE AUG-10

    5/10

    Va--E- 5--z p =?< /Yt-./--'f- x-l

    ComputerEngineeringCO )vk.*\"'Ir , u 6,F.l-\

    ,1 U-*"ll'g,P, . v '1

    T".q t { la>

  • 7/30/2019 CE AUG-10

    6/10

    ComputerEngineering CO)

    57 . Ho w utanyminimunr lip-t1ops re equired o design lip flop o count th eser'ics ;l O ,0 , 2 , 3 , 5 , 6 ? o , ? , 4 r E ' f ' f

    '\a' 2 c' 4 rl----l Ic ) ; d ' 5 T - ' i ' r i' t . lSg. n h{it synchronousounteruses lip-tlops with propagation elay ime of 25 ns @)each.The maximum ossible im e required or change f statewill be , i " . Ja. 25 ns tQ zs ns l 'bi{ ' L) '1b. 5ons V roon' 2 'T tA59.A 3-birasynchronousounter seslip-flopswith propagationelay ime of l5 ns . ", ,leach.Theminimum ossibleimerequiredor change f state ill be ' :- t: ,la- 15ns c. 45ns ) ^r '9 1d. 60ns a* I5) lo ns60. WhYch f the ollowing epresentserial nterface? ** r Ia. RS-232-C c- COMPort coaa'1ff i USg pon d' All of the above I6l-Cokider the production grammar: S->AB/AS, A->a/aA, B->b- Which of the E Ilbl lowing regular xpression on'espondinso the production rammar? r ab)' ,la. (ab)* ---' S --r Ag f-ft S L U.-lb. a(ab)*b A ;r zr la ll a'P;. I.c. aa*b+ ts -r b ^^^# Ir-\ i

    62.wlH liJlrn."can egeneratediy ->aSlbA,->dlccA I -"-> z"s fb F ' ^ |a. bccddd {c} aabccd A ---q.d lCcn Ib. abbbd Y1 ababccd ' -c;:.r,/b-Cre{ -.163. Context reegrammar anbe recognizeri ya. Finite rateutomata er ibv v c)u!ft! |&- , lb. 2-wayinearboundedautomata 61 -b "c 4lc. Push ownautomata Id. Bothb and I64. Which of the ollowing s supported y C++, but not bVJAVA? Ia. Abstract lass @) Friend lass Ib. Inheiitance X EncaPsulation i65. How canC++compilerdeterminewhetherqlass s abstract?

    6r) F otnabstract eYwordY Frompurevirtual functionc. By notallowingobjectcreationd. Any oneof theabove66. Consider heprogram elow:# include< stdio.h>int fun(intn, int * f-P) {int t, f;if {n slao.-*I @

    ::l-'l

    ,lFlsE;&

    Page of l0

  • 7/30/2019 CE AUG-10

    7/10

    i l r2 i+l 't-rie)

    2 5 4:D ,I.15 ? r 3 " 1. r , 9 { 'r-- |l

    * r 9 l{ o r . 1I* lb D l.b=1- & l$ l\ ; IiccA l

    I;.U"l* r lc c c { J

    f: t+*fjr,*Lp: t ;.retum f,)int main0 {in t x = l5 ;printf ("%od\n",un(5,&x));return 0;

    ComputerEngineeringCO)

    Ltw

    )The valuePrinted sa . 6 c ' 1 46>4 d. ls62. Vlhla"t illbe the output of followingstatements?in t x : 7 ;pri nt ("%od7od7od\n"'x*-t-,x,Hx);fa, g,g,gY 7,8,968- What is output of following statements?

    Putchar(6?);a . Ab . B69. Which ofthe following is not true?

    c.d .

    '7,9,9Noneof theabove 60-

    11c - Cd . D

    a. C++ is object orientedextension o the Cb. Derived objects can use all the constructors f baseclassc. Friend t'unction can access rivate membersof class(f)eil of the above are ttue

    70. ConYder he following C declaration.int x[10], Y'z;What kind of error does following statement ontain?o t ' o 1

    { ' }z : x + y ia. syntaxerror K logical errorb. Semantic rror fd) All I -?1. Whichmodel s useful ounderstandhestaticstruMreof the system? I

    6)OCi""t model ' c' Dynamicrnodel *Vr*t*tion model d' All of the above272.Whichof theschedulingsvery air and nost

    widelyused n modernmultitaskingoperating Ystems?' a.'rtFs c' SRTN

    Oo d' All of theabovefi. IEEFtlefinition of the softwareengineering mphasizesna- QualitYof the softwareb. Economical oftwarec. Timely development of the software@ ett of the,above

    Page of l0

  • 7/30/2019 CE AUG-10

    8/10

    74.Whichof the processmodel is best to understandhe userrequirements? :6 Prototypemodel c' Incrementalmodel /--\\V wu,"riatt moaet d' Noneof the above \'75. ";;;.ir;;:;iilu,. in.tua" T pra. Data o be processed y software Ib. FunctionalitYo be suPPorted {

    E. Performanceo be delivered .- .)], 1 \ft\ ettof he bove I rtl | ' Ize. tVaiagramsanexamplef A. | "/ i Ia. Objectmodel (") Oynurnicmodel ' *b. Functionmodel \a1 ettof the above "\i?. Whichof thesoftware rocessmodel s bestwhenimitedmanpowers available?A n qo model c' SPiralmodel '--* .V il;ental model d' All of theabove q * \ i78.Aggregat::if;[:"*' c. Both I v e+ :!A part-of relation d: None ./ -1 C.. i

    79. \,hYc{of the foltowing is a sofrwaredesignconcept? 0 'd - ia. Abstraction 9' CouPling@ ol,-"ttheaboveb' Cohesion ('d) Al l or rne aDovtt i80.Whichof the following s a technique or qualityas$ance? - Ia- FormalTechnicalReview T- 9 ib- FindingerrorsbYdebugging 3 I I; Oemop-strationf software o cuslomer -' \) |\ ? , lA^ l rnon t ^nn , 1 ' ? o :s) . +A' [rlar reeoeerl ly z o \/ " 1 \'/ \ , tt \ rhevalue f hedeterminantltstz 1993' gl:l is -" - s A 7\ I llees tee6 eeTl\-/ , L r,r ' rrl -1 {dl none of these -t 11 r - 2 (: Oy'o (b)1 tc)-1 (d)noneof these -t \t t - e I\ / t t f t z ' ' t !

    8 2 . l f 3 x + 2 y + z = 0 , x + 4 y + z = o , 2 x + y + 4 2 = o , b e a s y s t e m o f e q u a t i o n s , t h e n - r " . * l . jita) it is nconsistenttbf- i thasthetr iv ialsolut ionx=Y=z=0 '

    lc ' i{c ) i t canbereducedtoas ing |eequat ionandsoaso|u t iondoesnotex is ts t * > l * a 4 l(d) Determinantf hematrixof coefficientszero. ;;'. if * < ._1

    f i l l Le. '1 ': .183 rheeigenvaluesofthernatrixli : :,1'* il]:ljLj I r: l -.--- ;i.:i(a) -r,a,tn ^ (b)2,3,6, lcl2,"'''i /e\ none ffse "._:1^rO. lf lirn(l + a;'7 = e2 wherea andbarenatural umbers,hen / i

    . , n ( a ) a = 4 ' , b = 2 ( b )a = 8 , b = q ( c l a = 1 6 , b = 8 V n o n e o f t h e s e [ . ] ?/ . . . :1 ' Y - \ - ' ' j ; i

    j u,** vr zfx \ 1 ' I\ ,n- x. 1-z I . !\ - - - 5 - / h - { l ( ' ( }mpu te rEng inee r ing (co ) S l -

    ? 5 -- \ ob t1* a '4 ) 'zc -z '1 '2 ' , + f ' h ' t - t i ,( , . v r 6 ) q , L ! ,o . .0 . r '1I 1.1 etlo( i

    Page8 of 10

  • 7/30/2019 CE AUG-10

    9/10

    Computer EngineeringCO)

    85. lf f(x)= {x+1fo" econtinuous t x=0, han (0) sequalo env"(( a ) ' 0 - ( b ) 1 / e . ( c ) e { d } n o n e o f t h e s e f . * ' ), l i , f ( " t t - - >-uo*" 'tfx=acoso,ybsino,trenftf is . (ro-t - .r*:::(a) !"or"rog.o.g (u) 4cos ecalcora \ap\ eva ; o , f to9Ltv

    ' -7 o , . A I , a ,(c) - lg$sgogsslg (d) noneofthese o' , 'ku Vol - - - - - - -J 'u lu ' r rv r g^ r . .t eg t

    " ' '- ,n . f f i ,r(J- f*.eu'"g-,Ftt-*, isequarto 'Z\ Kt*-f*f-^{oJsin0+Jcos0{a} o (b)r (clnla (dln/2 J +6"'! Iv^" .o 'n7 1-

    . , x ' + v ' d u d u . ' / ' - rl fu=s in- ' , thcn x ; -+-P ; rsequa l to - -k ) 'Ox + y d x . d y . r r y(a) tanu (b) -2tanu' (c)2tanu (d) noneof hes" ,.q *. ! . {_r(u.' b1-, *7:-:ijl*l

    F isequarto,o,, (c)-1 (d) oneorthese ,Sf t:-l'+-.\* "- *ry"Theso fu t iono f thed i f f e ren t ia lequa t io " * - :=x2 under thecond i t i on tha ty= lwhenx=1 ' n -11is P' i ' r ct r ' l l i

    87 -

    89-

    91 .(a) 4xy.=x3+3 (b)axy= xa+3 (c)4xy=ya+3(d ) noneoftheseTheparticularntegral P-l}of tOt+1y=sin2xs(a) I ^ , | - ' - I I- -srn/x tb) is in2x (c) -;cos2-r (d) cos2;r8-" ' --- 8 " 8 u t PIlnverse aplace ransform of 1;-;-;; is(a) Lr-" "in3t (b) !"-, sin3t (. )]r-" cos3rd) -1e-" "o'3t3 - 3 J 5

    =_Aq o c r 2 * \ ^ * EY ' + 3d 3 + *rt ,l- ce?''^tJ .. . {s*Lol

    92 .

    93. !Efi:heharmonic onjueateof e'cosy s(a) e.'cosy {b} e'sinYeasltzSingular ointof (z-r)(z z)

    (a ) z=- t , -2 (b lz=-1 ,2,.'.. 1'

    ic! e"siny (d) noneof these I* I . ld c & 7 J r > '

    lc lz=1,-2 (dlz=L,26t;{l7

    + fei"'r;b'Pase of l0e9r r " l

    L:L-/\c) \ 't c*>1 t''tc+4, u)

    94.

  • 7/30/2019 CE AUG-10

    10/10

    \ 2,L-TI1IIl J

    , 95.II:I:

    \Computer Engineering CO) \/ .,/ ;' )rr'Tayloreriesxpansion"f ;+ in lz