Cs 2017
Cs 2017
Cs 2017
SET
Recruitment Entrance Test for Scientist/Engineer
SC 2017 A
1. If A is a skew symmetric matrix, then A t
(a) diagonal matrix (b) A
(c) 0 (d) A
(c) P( A / B) = P( A B) + P( B) (d) P( A B) P( A) + P( B)
5. Which of the following concurrency control protocol ensures both conflict serializability
and free from deadlock?
(a) Time stamp ordering (b) 2 Phase locking
(c) Both (a) and (b) (d) None of the above
14. The recurrence relation that arises in relation with the complexity of binary search is
(a) T (n ) = 2T (n / 2) + k , where k is constant
(b) T (n ) = T (n / 2) + k , where k is constant
(c) T (n ) = T (n / 2) + log n
(d) T (n ) = T (n / 2) + n
15. Which one of the following in-place sorting algorithms needs the minimum number of
swaps?
(a) Insertion Sort (b) Quick Sort
(c) Heap Sort (d) Selection Sort
16. Given two statements
17. Which of the following data structure is useful in traversing a given graph by breadth
first search?
(a) Stack (b) Queue
(c) List (d) None of the above
18. How many 128 8 bit RAMs are required to design 32K 32 bit RAM?
(a) 512 (b) 1024
(c) 128 (d) 32
(a) X 3, Y 2, Z 1 (b) X 2, Y 3, Z 1
(c) X 3, Y 1, Z 2 (d) X 2, Y 1, Z 3
21. A cache memory needs an access time of 30 ns and main memory 150 ns, what is the
average access time of CPU (assume hit ratio = 80%)?
(a) 60 ns (b) 30 ns
(c) 150 ns (d) 70 ns
23. What is the minimum number of two-input NAND gates used to perform the function
of two input OR gate?
(a) One (b) Two
(c) Three (d) Four
24. When two n-bit binary numbers are added the sum will contain at the most
(a) n bits (b) (n + 3) bits
(c) (n + 2) bits (d) (n + 1) bits
25. The 2-input XOR has a high output only when the input values are
(a) low (b) high
(c) same (d) different
31. Which of the following protocol is used for transferring electronic mail messages from
one machine to another?
(a) TELNET (b) FTP
(c) SNMP (d) SMTP
32. Which media access control protocol is used by IEEE 802.11 wireless LAN?
(a) CDMA (b) CSMA/CA
(c) ALOHA (d) None of the above
33. An Ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
(a) Short frame (b) Small frame
(c) Mini frame (d) Runt frame
35. MD5 is a widely used hash function for producing hash value of
(a) 64 bits (b) 128 bits
(c) 512 bits (d) 1024 bits
39. Estimation of software development effort for organic software in basic COCOMO is
(a) E = 2.0(KLOC)1.05PM (b) E = 3.4(KLOC)1.06PM
(c) E = 2.4(KLOC)1.05PM (d) E = 2.4(KLOC)1.07PM
43. Which of the following UML 2.0 diagrams capture behavioural aspects of a system?
(a) Use Case Diagram, Object Diagram, Activity Diagram, and State Machine
Diagram
(b) Use Case Diagram, Activity Diagram, and State Machine Diagram
(c) Object Diagram, Communication Diagram, Timing Diagram, and Interaction diagram
(d) Object Diagram, Composite Structure Diagram, Package Diagram, and
Deployment Diagram
49. The number of swappings needed to sort the numbers 8, 22, 7, 9, 31, 5, 13 in ascending
order, using bubble sort is
(a) 11 (b) 12
(c) 13 (d) 10
2 3
4 5 6 7
If the post order traversal gives ab-cd*+ then the label of the nodes 1,2,3, will be
(a) +,-,*,a,b,c,d (b) a,-,b,+,c,*,d
(c) a,b,c,d,-,*,+ (d) -,a,b,+,*,c,d
53. In a doubly linked list, the number of pointers affected for an insertion operation will
be
(a) 4
(b) 0
(c) 1
(d) Depends upon the nodes of the doubly linked list
(b) A function that takes an integer as argument and returns an integer pointer
(c) A pointer to a function that takes an integer pointer as argument and returns an
integer
(d) A function that takes an integer pointer as argument and returns a function
pointer
(d) Between two processes that uses different resources of different machine
59. The best data structure to check whether an arithmetic expression has balanced
parenthesis is a
X Y X
(a) 21 (b) 19
(c) 20 (d) 10
66. Consider a disk system with 100 cylinders. The request to access the cylinders occur in
the following sequences
4, 37, 10, 7, 19, 73, 2, 15, 6, 20
Assuming the head is currently at cylinder 50, what is the time taken to satisfy all
requests if it takes 1 ms to move from one cylinder to adjacent one and shortest seek
time first algorithm is used
(a) 95 ms (b) 119 ms
(c) 233 ms (d) 276 ms
67. A B-Tree used as an index for a large database table has four levels including the root
node. If a new key is inserted in this index, then the maximum number of nodes that
could be newly created in the process are
(a) 5 (b) 4
(c) 1 (d) 2
71. At particular time, the value of a counting semaphore is 10, it will become 7 after
(a) 3 V operations (b) 3 P operations
(c) 5 V operations and 2 P operations (d) 2 V operations and 5 P operations
74. Which of these is a super class of all errors and exceptions in the Java language?
(a) RunTimeExceptions (b) Throwable
(c) Catchable (d) None of the above
75. Choose the most appropriate HTML tag in the following to create a numbered lists.
(a) <dl> (b) <list>
(c) <ul> (d) <ol>
77. If L and P are two recursively enumerable languages, then they are not closed under
78. In the context of modular software design, which one of the following combinations is
desirable?
80. The time complexity of computing the transitive closure of a binary relation on a set of
n elements is known to be