General Aptitude
Q. No. 1 – 5 Carry One Mark Each
1.
Statements: No bumper is suitor. All blazers are suitor. All tunics are bumpers.
Conclusions: I. Some tunics are blazers.
II. Some suitors are blazers.
III Some bumpers are blazers.
(A) Only II
(B) III and II
(C) Only I
(D) I, II and III
2.
It was _______ on the part of the senate that obstructed the adoption of a revolutionary
teaching methodology in the executive MBA program.
(A) propriety
(B) conservatism
(C) anachronism
(D) effrontery
3.
The mole is a nocturnal insectivorous mammal regarded as pests by gardeners because of their
burrowing activity spoiling lawns and gardens.
A. regarded as pests by gardeners because of their burrowing activity spoiling
B. regarded to be pests by gardeners because of their burrowing activity's spoiling
C. considered as a pest by gardeners because of its burrowing activity spoiling
D. regarded as a pest by gardeners because its burrowing activity spoils
4.
The cost of type 1 sugar is Rs.20 per kg and Type 2 sugar is Rs.40 per kg. If both type 1 and
2 are mixed in the ratio of 3:2, then the price per kg of the mixed variety of sugar is
________Rs.
5.
Two squares are chosen at random on a chess board. What is the probability that they have
side common?
(A) 2
(B) 1
(C) 5
(D) 3
36
17
18
17
Q. No. 6 – 10 Carry Two Marks Each
The author of the passage would probably consider which of the following judgments to be
most similar to the reasoning of the critics described in the third sentence?
(A) The world is certainly flat; therefore, the person proposing to sail around it is
unquestionably foolhardy.
(B) Radioactivity cannot be directly perceived; therefore, a scientist could not possibly
control it in a laboratory.
(C) The painter of this picture could not intend it to be funny; therefore, its humor must result
from a lack of skill.
(D) Traditional social mores are beneficial to culture; therefore, anyone who deviates from
them acts destructively.
7.
A community college is experiencing high turnover rates among its computer science faculty
members. To rectify this problem, the computer science department head has proposed to the
Dean that beginning next year, starting salaries for computer science instructors be increased
by 10 percent to provide a more competitive pay package.
Which of the following indicates a flaw in the department head‟s plan?
(A) Computer science faculty members generally indicate satisfaction with the number and
type of classes they are given to teach.
(B) The community college is in a relatively safe area of town with affordable housing.
(C) Local technology companies provide good supplemental consulting work to many faculty
members.
(D) Yearly pay increases for instructors in all departments are set at a level below the current
inflation rate.
8.
A jewelry store sells customized rings in which 3 gems selected by the customer are set in a
straight row along the band of the ring. If exactly 5 different gems are available and if at least
2 gems in any given ring must be different, how many different rings are possible?
9.
If n is a positive integer and n^2 is divisible by 72, then the largest positive integer that must
divide n is
(A) 6
(B) 12
(C) 24
(D) 36
10.
In the graduating class of a certain college, 48 percent of the students are male and 52 percent
are female. In this class 40 percent of the male and 20 percent of the female students are 25
years old or older. If one student in the graduating class is randomly selected, approximately
what is the probability that he or she will be less than 25 years old?
Computer Science Engineering
Q. No. 1 – 25 Carry One Mark Each
1.
What is the output of the following snippet correct to 2 decimal places:_______________
float m=10/3+8.0/7+2.0+1;
printf(“%f”,m);
G is a graph with negative edges. On applying Dijkstras, which is the correct option?
(A) Always terminates but results may be incorrect
(B) Result is correct always
(C) May not terminate
(D) None of these
4.
Table Schema R(A,B,C,(D) is given.
A
B
C
D
1
1
2
1
2
4
3
2
1
2
2
The empty slot cannot have the value__________.
5.
Consider the following FD sets over the relation R(ABCD)
F2 {AD CD
F1 {AD C
A D
CB
C B
AD
D CB
A CB
}
}
Then which of the following is true?
6.
(A) F1 covers F2
(B) F2 covers F1
(C) F1 F2
(D) None of these
Which of the following is not CFL
(A) oi 1j 2k : k ij wherei, j, k 0
(B) oi 1j 2k :max i,l wherei, j, k 0
(C) o P 1 : Pis prime number
(D) Allof theabove
7.
Let L1 a n | n 0 then L1.L2 is
(A) a n a n | n 0
A dice is tossed thrice. If event of getting an even number is a success, then probability of
getting at least, two successes is
(A)
10.
7
8
(B)
1
4
(C)
2
3
(D)
1
2
For the following data a line y = a + bx is to be fitted by the method of least squares, then a
and b are respectively
xi
-2
-1
0
1
2
yi
1
2
3
3
4
(A) 1, 0
(B) 0.7, 2.6
(C) 2.6, 0.7
(D) 0, 2
11.
Assume that we are designing a reliable byte stream protocol that uses SWP running over
10Mbps Network. Propagation delay is 20Ms & maximum segment lifetime is 40seconds.
Then how many bits are needed for the receiver window size in the TCP?
12.
If the initial sequence number is 1 and it increment the counter by 2,56,000 for every 2 sec,
how long does it take for the counter to wrap around in seconds?
13.
Suppose a sub network x has a subnet mask 255.255.255.224 and host address is
130.127.48.130. What is the subnet work address?
(A) 130.127.48.120
14.
(C) 130.127.48.187
(D) None of these
In direct mapping, the presence of one block in cache is abstracting the incoming block
even though the cache is having empty blocks is called as____
(A) Conflict hit
15.
(B) 130.127.48.128
(B) Conflict miss
(C) Hit ratio
(D) None
Consider the disk drive with the following specification 16 surface, 1024 tracks per surface,
1024 sec tors track,1 KB sec tor rotation speed is 3000 rpm. The disk is operated in Burst
Mode. The processor runs at 600 MHZ and takes 300 & 900 clock cycle to initiate &
complete DMA transfer respectively. If the size of transfer is 20 kB.
What is the percentage of processor time consumed for the transfer operation?
An instruction takes 10ms and a page fault takes an additional 5ms.Calculate the effective
access time in ms if page fault occurs once in every 4 instructions?
18.
Which of the following is true?
(A) Overlays are used to increase the size of physical memory
(B) Overlays are used to increase the logical address space
(C) When overlays are used , the size of process is not limited to the size of physical memory
(D) Overlays are used whenever the physical address space is smaller than the logical address
space
19.
Which of the following statement is/are TRUE?
S1: The circuit switched network, congestion possible at the time of connection setup.
S2: The packet switched network, congestion is possible on every packet
(A) S1 only
(B) S2 only
(C) Both
(D) None of these
20.
Out of all the possible permutations, how many of them can be obtained using queue if the
input sequence is 1,2,3…n in that order?
2n c n
2n cn
(A)
(B)
(C) 1
(D) n
n 1
n 1
21.
The grammar „G1‟, S aSa bSb a b and
Grammar G2 is S 0S 0S1 A
A A0 0
Which is the correct statement?
(A) G1 is ambiguous, G2 is unambiguous
(B) G1 is unambiguous, G2 is ambiguous
(C) Both G1 and G2 are ambiguous
(D) Both G1 and G2 are unambiguous
22.
The output Qn of a J-K flip-flop is 0. It changes to 1 when a clock pulse is applied. The inputs
J n and K n are respectively
(A) 0, X
23.
(B) X, 0
(C) X, 1
(D) 1, X
The circuit shown implements a two input NAND gate by using two 2x1 multiplexers. What
are the values of X, Y & Z?
If f x 2y az i (bx 3y 4z) j (2x cy 5z)k is irrotational then a, b, c are ___
(A) a=2, b=-2, c=4
(B) a=2, b=2, c=4
(C) a=4, b=2, c=-2
(D) a=4, b=-2, c=2
The negative value of ' ' for which ex .cos y is the real part of an analytic function
f x iy u x, y i.v x, y , is __________.
Q. No. 26 – 55 Carry Two Marks Each
26.
Consider the following program
int main ( )
{
static char s[ ] = {“black”, “white”, “pink,” “violet”};
char ptr [ ] = {s + 3, s + 2, s + 1, s}, P;
P = ptr;
++P;
printf (“%s”, P + 1);
return 0;
}
What is the output of above program?
(A) pink
(C) ink
27.
Minimized form of expression F A'B'C AB AB'C' is
(A) A'B BC B'C
(C) A C
28.
(B) pin
(D) segment fragmentation
(B) A'B'C AB AC'
A B A B C
(D) A C
A B A B C
T(n)=T(n-1)+2n and T(1)=1.Then T(n) is
(A) O(n.2n)
The time complexity to find an element in a sorted array of n elements such that A[i]=i
(A) O(n)
(B) O(logn)
(C) O(n2)
(D) O(nlogn)
30.
Which of the following time stamp ordering protocol(s) allow(s) the following schedules?
T : W1 A ; W2 A ; W3 A ;R 2 A ; R 4 A :
Time stamps : T1 : 5, T2 :10, T3 :15; T4 : 20
(A) Thomas write rule
(C) Basic time stamp
(B) Multiversion time stamp protocol
(D) All of these
31.
What binary trees produce same sequence of nodes in both inorder and preorder?
(A) Binary trees with left link of every node as NULL value
(B) Binary trees with right link of every node as NULL values
(C) Binary trees with zero or one node
(D) Both (A) and (C)
32.
No. of essential prime implicant for expression
F m 2,3, 5, 6, 7, 9, 11, 13, 15
33.
Consider the relation R (MNOPQ) with the set of FDs
F M NO,OP Q, N P,Q M
Relation R is decomposed in two ways as follows
I : R1 M, N,O , R 2 M, P,Q
II : R1 M, N,O , R 2 O, P,Q
Which of the decomposition(s) is/are lossless join decomposition?
(A) I only
34.
(B) II only
(C) I and II
(D) Neither I nor II
Here is a left – recursive grammar
A Aa Ab c d
Use the standard construction to eliminate left recursion by introducing a new variable S'
which of the following would be one of the productions of the new grammar?
(A) S c
35.
Which of the following is correct?
(A) I, II, IV are correct
(B) I, III, are both wrong
(C) Only III is correct
(D) Only I is wrong
In the interval 0 x , the function f (x) e x cos x has
2
(A) Minimum at x=0
(C) Minimum at x
37.
www.gateforum.com
3
a11 h
Consider the matrix A h a 22
g
f
(B) minimum at x
4
(D) min imum at x
2
g
f ‟ where a11 a 22 a 33 0
a 33
Then sum of the cofactors of the leading diagonal elements
is ______
(B) f g h
(A) 0
38.
(B) ez .z c
(C) ez z c
(D) ez z c
M is the set of all 2×2 real matrices f : M R is defined by f(A)=det A for all A M. then f
is ____ .
(A) one-one but not onto
(B) onto but no one-one
(C) neither one-one nor onto
40.
(D) f 2 g 2 h 2
If u ex x cos y ysin y , then the analytic function f(z) =
(A) ez c
39.
(C) f 2 g 2 h 2
(D) bit exact
There are two organization designs a system with different cache configuration
Assume1 word 1 byte .
Organization 1:
Use : Cache capacity 4 k words
Mapping technique Direct
Block size 4 words
Organization 2:
Use : Cache capacity 64 k words
Mapping technique 4 way set Associative
Block size 16 words
The No. of bits for offset, set No, tag No in M.M. address for the organization 2 is:
(A) 4,10,16
(B) 4,11,15
(C) 4,12,14
(D) 5,9,16
41.
Assume a register Ri which is specified by 4-bits , then SUB R0,R1,R2 which is two bytes
long then what is the space assigned to the opcode field (in bits)?
42.
Consider a micro programmed control unit which has 128 instructions each of which takes 16
micro operations. The system supports 16 flag conditions and 54 control signals. If vertical
microprogramming control is used then what is the length of control word (bits/word).
43.
The three stage Johnson counter as shown in figure is clocked at a constant frequency of f c
from the starting state of Q2Q1Qo 101 . The frequency of output Q2Q1Qo will be
(A)
fc
8
f
(B) c
6
(C)
fc
3
(D)
fc
2
J22
QQ22
J1
Q
Q11
JJ02
Q
Q00
k
K22
Q22
Kk11
Q
Q1
Kk0 2
Q0
Q
0
1
clk
44.
Minimum number of 2 input NAND gates used to perform the function of 2 inputs OR gate is
45.
Calculate the TLB miss ratio, given memory access time 90ms, TLB access time 40ms and
efficiency memory access time 148ms.
46.
Consider a set of 5 processes whose arrival time, CPU time needed and the priority are given
below
Process Arrival
CPU
time Priority
Time
needed(in
ms)
P1
0
5
5
P2
1
7
2
P3
2
3
1
P4
4
15
3
P5
5
20
4
Note higher number smaller priority.
If the CPU scheduling policy is priority scheduling with preemption the AWT will
be_________ms.
47.
An operating system having 4 processes with each process requesting 5 instances of resource
type R. Then the minimum no of instances of “R” that are required for the system to be
deadlock free is _____.
48
In an IP datagram header length field contain a number 7. 5 bytes information added in to
header as option bits. How many bits require for padding.
49.
It is seen that the number of keys required to communicate for n stations is 28 using
symmetric key cryptography. How many number of keys required using asymmetric key
cryptography having 2n stations?
50.
Consider “Additive – increase, multiplicative decrease” approach of TCP congestion control.
Assume 1MSS = 512 byte.
What will be congestion window size after 3RTTs provided the congestion window is
assigned 1MSS initially.
(A) 1024B
(B) 1536B
(C) 2048B
(D) None
51.
52.
53.
What are the code optimization techniques?
(i) Code Hoisting
(ii) Loop unrolling
(iii) Code Motion
(iv) dead code elimination
(A) (i) & iv
(B) ii, iii & iv
(C) i, ii & iv
(D) All of these
Match the following:
LIST I
LIST II
(P) Activation record
(1) Linking loader
(Q) Location counter
(2) Garbage collection
(R) Reference counts
(3) Subroutine call
(S) Address relocation
(4) Assembler
(A) P-3, Q-4, R-1, S-2
(B) P-4, Q-3, R-1, S-2
(C) P-4, Q-3, R-2, S-1
(D) P-3, Q-4, R-2, S-1
Let R={(3,3),(6,6)(9,9)(12,12)(6,12)(3,9)(3,12)(3,6)} be a relation on the set A ={3,6,9,12}.
The relation R is
(A) reflexive and symmetric only
(B) an equivalence relation
(C) reflexive only
(D) reflexive and transitive only