ISRO CS Dec 2017
Questions
Computer Science
Question 1
Consider the following schema:
Sailors (sid, sname, rating, age)
Boats(bid, bname, colour)
Reserves (sid, bid, day)
Two boats can have the same name but the colour differentiates them
The two relations
If / is division operation, the above set of relations represents the query
Sailors (sid, sname, rating, age)
Boats(bid, bname, colour)
Reserves (sid, bid, day)
Two boats can have the same name but the colour differentiates them
The two relations
If / is division operation, the above set of relations represents the query
Question 3
Consider the following table : Faculty (facName, dept, office, rank, dateHired)
(Assume that no faculty member within a single department has same name. Each faculty member has only one office identified in office). 3NF refers to third normal form and BNCF refers to Boyce-Codd normal form
Then faculty is
(Assume that no faculty member within a single department has same name. Each faculty member has only one office identified in office). 3NF refers to third normal form and BNCF refers to Boyce-Codd normal form
Then faculty is
Question 4
Using public key cryptography, adds a digital signature σ to a message encrypts and sends it to where it is decrypted. Which one of the following sequence of keys is used for operations?
- AEncryption : private key followed by private key. Decryption : public key followed by public key CorrectWrong
- BEncryption : private key followed by public key; Decryption : public key followed by private key CorrectWrong
- CEncryption : private key followed by public key. Decryption : private key followed by public key CorrectWrong
- DEncryption : public key followed by private key; Decryption : public key followed by private key CorrectWrong
Question 5
Which of the following are used to generate a message digest by the network security protocols?
P) SHA-256
Q) AES
R) DES
S) MD5
P) SHA-256
Q) AES
R) DES
S) MD5
Question 6
In the IPv4 addressing format, the number of networks allowed under Class B addresses is
Question 7
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it : 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to Organization A, and a quarter to Organization B. while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
Question 8
In a compact one dimensional array representation for lower triangular matrix (all elements above diagonal are zero) of size non zero elements of each row are stored one after another, starting from first row, the index of element in this new representation is
Question 9
Which of the following permutation can be obtained in the same order using a stack assuming that input is the sequence 5, 6, 7, 8, 9 in that order?
Question 10
Quick sort is run on 2 inputs shown below to sort in ascending order
A)
B)
Let C1 and C2 be the number of comparisons made for A and B respectively.
Then
A)
B)
Let C1 and C2 be the number of comparisons made for A and B respectively.
Then
Question 11
A binary search tree is used to locate the number 43. Which one of the following probe sequence is not possible?
Question 12
The characters of the string K R P C S N Y T J M are inserted into a hash table of size of size 10 using hash function
mod 10
If linear probing is used to resolve collisions, then the following insertion causes collision
mod 10
If linear probing is used to resolve collisions, then the following insertion causes collision
Question 13
Which of the following is not true with respect to deadlock prevention and deadlock avoidance schemes?
- AIn deadlock prevention, the request for resources is always granted if resulting state is safe CorrectWrong
- BIn deadlock avoidance, the request for resources is always granted, if the resulting state is safe CorrectWrong
- CDeadlock avoidance requires knowledge of resource requirements a priori CorrectWrong
- DDeadlock prevention is more restrictive than deadlock avoidance CorrectWrong
Question 14
Which one of the following are essential features of object oriented language?
1) Abstraction and encapsulation
2) Strictly-typed
3) Type-safe property coupled with sub-type rule
4) Polymorphism in the presence of inheritance
1) Abstraction and encapsulation
2) Strictly-typed
3) Type-safe property coupled with sub-type rule
4) Polymorphism in the presence of inheritance
Question 15
Which languages necessarily need heap allocation in the run time environment?
Question 16
Consider the following:
Matching A, B, C, D in the same order gives.
Matching A, B, C, D in the same order gives.
Question 17
Consider the results of a medical experiment that aims to predict whether someone is going to develop myopia based on some physical measurements and heredity. In this case, the input dataset consists of the person’s medical characteristics and the target variable is binary: 1 for those who are likely to develop myopia and 0 for those who aren’. This can be best classified as
Question 18
Which of the following related to snowflake schema is true?
Question 19
Consider the following C function
#include <stdio.h>
int main()
{
char c[] = “ICRBCSIT17”;
char *p=c;
printf(“%s”, c+2[p] – 6[p] -1);
return 0;
}
The output of the program is
#include <stdio.h>
int main()
{
char c[] = “ICRBCSIT17”;
char *p=c;
printf(“%s”, c+2[p] – 6[p] -1);
return 0;
}
The output of the program is
Question 20
Consider the schema
Sailors(sid,sname, rating,age) with the following data
For the query
SELECT.rating, AVG(S.age) AS avgage FROM Sailors S
Where S.age >= 18
GROUP BY S.rating
HAVING 1 < (SELECT COUNT (*) FROM Sailors S2 where S.rating = S2.rating)
The number of rows returned is
Sailors(sid,sname, rating,age) with the following data
For the query
SELECT.rating, AVG(S.age) AS avgage FROM Sailors S
Where S.age >= 18
GROUP BY S.rating
HAVING 1 < (SELECT COUNT (*) FROM Sailors S2 where S.rating = S2.rating)
The number of rows returned is
Question 21
Consider a table that describes the customs :
Customers(custid, name, gender, rating)
The rating value is an integer in the range 1 to 5 and only two values (male and female) arerecorded for gender. Consider the query “how many male customers have a rating of 5”? The best indexing mechanism appropriate for the query is
Customers(custid, name, gender, rating)
The rating value is an integer in the range 1 to 5 and only two values (male and female) arerecorded for gender. Consider the query “how many male customers have a rating of 5”? The best indexing mechanism appropriate for the query is
Question 22
In designing a computer’s cache system, the cache block (or cache line) size is an important parameter. Which one of the following statements is correct in this context?
Question 23
Consider an instruction of the type LW R1, 20(R2) which during execution reads a 32 bit word from memory and stores it in a 32 bit register R1. The effective address of the memory location is obtained by adding a constant 20 and contents of R2. Which one best reflects the source operand
Question 24
Question 25
Match the following and choose answer in the order A, B, C
(Bounds given may or may not be asymptotically tight)
(Bounds given may or may not be asymptotically tight)
Question 26
Let be regular language, be a deterministic context free language and a recursively enumerable language, but not recursive. Which one of the following statements is false?
Question 28
Which of the following are context free?
Question 29
Let S be an NP-complete problem. Q and R are other two problems not known to be NP. Q is polynomial time reducible to S and S is polynomial time reducible to R. Which of the following statements is true?
Question 30
The number of structurally different possible binary trees with 4 nodes is
Question 31
A process executes the following code
For (i = 0; i < n; i++)
fork();
The total number of child processes created is
For (i = 0; i < n; i++)
fork();
The total number of child processes created is
Question 32
Consider the following scheduling:
Matching the table in the order A, B, C gives
Matching the table in the order A, B, C gives
Question 33
A system uses FIFO policy for page replacement. It has 4 page frames with no pages loaded to begin with. The system first accesses 50 distinct pages in some order and then accesses the same 50 pages in reverse order. How many page faults will occur?
Question 34
Which of the following is false?
- AUser level threads are not scheduled by the kernel CorrectWrong
- BContext switching between user level threads is faster than context switching between kernel level threads CorrectWrong
- CWhen a user thread is blocked all other threads of its processes are blocked CorrectWrong
- DKernel level threads cannot utilize multiprocessor systems by splitting threads on different processors or cores CorrectWrong
Question 35
Consider the function
int fun (x: integer)
{
If x > 100 then fun = x – 10;
else
fun = fun (fun (x + 11));
}
For the input x = 95, the function will return
int fun (x: integer)
{
If x > 100 then fun = x – 10;
else
fun = fun (fun (x + 11));
}
For the input x = 95, the function will return
Question 36
Consider the function
int func(int num)
{
int count = 0
while(num)
{
Count++;
Num >>=1;
}
return(count);
}
For func(435) the value returned is
int func(int num)
{
int count = 0
while(num)
{
Count++;
Num >>=1;
}
return(count);
}
For func(435) the value returned is
Question 37
In IEEE floating point representation, the hexadecimal number 0xC0000000 corresponds to
Question 38
Which of the following set of components is sufficient to implement any arbitrary Boolean function?
a) XOR gates, NOT gates
b) 2 to 1 multiplexers
c) AND gates, XOR gates, 1
d) Three-input gates that output (A.B)+C for the inputs A, B and C.
Question 39
Question 40
If denotes is a trigonometric function, denotes is a periodic function and denotes is a continuous function then the statement “It is not the case that some trigonometric functions are not periodic” can be logically represented as
Question 41
The number of elements in the power set of {{1,2},{2,1,1},{2,1,1,2}} is
Question 42
The function f:[0,3]→[1,29] defined by f(x)=2x3−15x2+36x+1 is
Question 43
If vectors and are perpendicular to each other, then value of is
Question 44
Match the following and choose the correct answer for the order A, B, C, D
Question 45
For the regular expression denotes (aa)* (bb)* b
Question 46
Consider the grammar with productions
This grammar is
This grammar is
Question 47
Identify the language generated by the following grammar
Question 48
A CPU has a 32 KB direct mapped cache with 128 byte block size. Suppose A is a 2-dimensional array of size with elements that occupy 8 bytes each. Consider the code segment
for(i = 0; i<512; i++)
{
For(j = 0; j < 512; j++)
{
x + = A[i][j];
}
}
Assuming that array is stored in order A[0][0], A[0][1], A[0][2]…….., the number of cache misses is
for(i = 0; i<512; i++)
{
For(j = 0; j < 512; j++)
{
x + = A[i][j];
}
}
Assuming that array is stored in order A[0][0], A[0][1], A[0][2]…….., the number of cache misses is
Question 49
A computer with 32-bit word size uses 2s compliment to represent numbers. The range of integers that can be represented by this computer is
Question 50
Let M = 11111010 and N = 00001010 be two 8 bit two’s compliment number. their product in two’s complement is
Question 51
For a pipelines CPU with a single ALU, consider the following :
A. The instruction uses the result of jth instruction as an operand
B. Conditional jump instruction
C. jth and instruction require ALU at the same time
Which one of the above causes a hazard?
A. The instruction uses the result of jth instruction as an operand
B. Conditional jump instruction
C. jth and instruction require ALU at the same time
Which one of the above causes a hazard?
Question 52
Consider a disk sequence with 100 cylinders. The request to access the cylinder occur in the following sequence:
4, 34, 10, 7, 19, 73, 2, 15, 6, 20
Assuming that the head is currently at cylinder 50, what is the time taken to satisfy all requests if it takes 2 ms to move from one cylinder to adjacent one and shortest seek time first policy is used?
4, 34, 10, 7, 19, 73, 2, 15, 6, 20
Assuming that the head is currently at cylinder 50, what is the time taken to satisfy all requests if it takes 2 ms to move from one cylinder to adjacent one and shortest seek time first policy is used?
Question 53
A counting semaphore was initialized to 7. Then 20 P (wait) operations and (signal) operations were completed on this semaphore. If the final value of semaphore is 5, then the value will be
Question 54
A 32 bit adder is formed by cascading 4 bit CLA adder. The gate delays (latency) for getting the sum bits is
Question 55
We consider the addition of two 2’s compliment numbers and A binary adder for adding two unsigned binary numbers is used to add two binary numbers. The sum is denoted by The carry out is denoted by The overflow condition is identified by
Question 56
Which one of the following property is correct for a red-black tree?
Question 57
The in-order and pre-order traversal of a binary tree are d b e a f c g and a b d e c f g respectively. The post order traversal of a binary tree is
Question 58
A virtual memory system uses FIFO page replacement policy and allocates a fixed number of frames to the process. Consider the following statements
M : Increasing the number of page frames allocated to a process sometimes increases the page fault rate
N : Some programs do not exhibit locality of reference
Which one of the following is true?
M : Increasing the number of page frames allocated to a process sometimes increases the page fault rate
N : Some programs do not exhibit locality of reference
Which one of the following is true?
Question 59
Consider three CPU intensive processes, which require 10, 20, 30 units and arrive at times 0, 2, 6 respectively. How many context switches are needed if shortest remaining time first is implemented? Context switch at 0 is included but context switch at end is ignored.
Question 60
Suppose is a finite set with elements. The number of elements and the rank of the largest equivalence relation on are
Question 61
Consider the set of integers I. Let D denote “divides with an integer quotient” (e.g. 4D8 but 4D7). Then D is
Question 62
A bag contains 19 red balls and 19 black balls. Two balls are removed at a time repeatedly and discarded if they are of the same colour, but if they are different, black ball is discarded and red ball is returned to the bag. The probability that this process will terminate with one red ball is
Question 63
If and are extreme points of then
Question 64
Let and If is the range of and is the range of then is
Question 65
Consider the following query :
SELECT E.eno, COUNT (*)
FROM Employees E
GROUP BY E.eno
If an index on is available, the query can be answered by scanning only the index if
SELECT E.eno, COUNT (*)
FROM Employees E
GROUP BY E.eno
If an index on is available, the query can be answered by scanning only the index if
Question 66
If is a skew-symmetric matrix of order and is column matrix, then is a
Question 67
Consider the recurrence equation
Then is (in big order)
Then is (in big order)
Question 68
Consider the program
void function(int n)
{
int i, j, count = 0;
for (i = n/2; i <= n; i++)
for(j = 1; j <=n; j = j*2)
count++;
}
The complexity of the program is
void function(int n)
{
int i, j, count = 0;
for (i = n/2; i <= n; i++)
for(j = 1; j <=n; j = j*2)
count++;
}
The complexity of the program is
Question 69
Assume that Source S and Destination D are connected through an intermediate router R. How many times a packet has to visit the network layer and data link layer during a transmission from S to D?
Question 70
Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because
Question 71
Consider the set of activities related to e-mail
A : Send an e-mail from a mail client to mail server
B : Download e-mail headers from mail box and retrieve mails from server to a cache
C : Checking e-mail through a web browser
The application level protocol used for each activity in the same sequence is
A : Send an e-mail from a mail client to mail server
B : Download e-mail headers from mail box and retrieve mails from server to a cache
C : Checking e-mail through a web browser
The application level protocol used for each activity in the same sequence is
Question 72
Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip time delay between A and B is 40 ms and the bottleneck bandwidth on the path A and B is 64 kbps. What is the optimal window size that A should use?
Question 73
A two way set associative cache memory unit with a capacity of 16 KB is built using a block size of 8 words. The word length is 32 bits. The physical address space is 4 GB. The number of bits in the TAG, SET fields are
Question 74
Suppose the numbers 7, 5, 1, 8, 3, 6, 0, 9, 4, 2 are inserted in that order into an initially empty binary search tree. The binary search tree uses the reversal ordering on natural numbers i.e. 9 is assumed to be smallest and 0 is assumed to be largest. The in-order traversal of the resultant binary search tree is
Question 75
A priority queue is implemented as a Max-heap. Initially it has 5 elements. The level order traversal of the heap is 10, 8, 5, 3, 2. Two new elements ‘1’ and ‘7’ are inserted into the heap in that order. The level order traversal of the heap after the insertion of the elements is
Question 76
The minimum number of stacks needed to implement a queue is
Question 77
A strictly binary tree with 10 leaves
Question 78
What is the maximum height of any AVL tree with 7 node? Assume that height of tree with single node is 0.
Question 79
Consider the code segment:
int i, j, x, y, m, n;
n = 20;
for (i = 0; i < n; i++)
{
for (j = 0; j < n; j++)
{
if (i % 2)
{
x + = ((4*j) + 5*i);
}
}
}
m = x + y;
Which one of the following is false?
int i, j, x, y, m, n;
n = 20;
for (i = 0; i < n; i++)
{
for (j = 0; j < n; j++)
{
if (i % 2)
{
x + = ((4*j) + 5*i);
}
}
}
m = x + y;
Which one of the following is false?
Question 80
Consider the following table :
Matching A, B, C, D in the same order gives :
Matching A, B, C, D in the same order gives :