0% found this document useful (0 votes)
22 views45 pages

Computer Applications Computer Science

The document is a question paper for Paper II in Computer Application and Computer Science, consisting of 150 multiple-choice questions. Each question has a correct and incorrect marking scheme, and the total marks for the paper is 300. The paper includes various topics related to computer science concepts, probability, and programming.

Uploaded by

kiran.bore.8555
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views45 pages

Computer Applications Computer Science

The document is a question paper for Paper II in Computer Application and Computer Science, consisting of 150 multiple-choice questions. Each question has a correct and incorrect marking scheme, and the total marks for the paper is 300. The paper includes various topics related to computer science concepts, probability, and programming.

Uploaded by

kiran.bore.8555
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

Question Paper Preview

Notations :
1.Options shown in green color and with icon are correct.
2.Options shown in red color and with icon are incorrect.

PaperII ComputerApplicationandComputerScience
Question Paper Name :
TRAKES1
Subject Name : Paper II Computer Application and Computer Science
Duration : 150
Change Font Color : No
Change Background Color : No
Change Theme : No
Help Button : No
Show Reports : No
Show Progress Bar : No

Paper II Computer Application and Computer Science


Group Number : 1
Group Id : 441009719625
Group Maximum Duration : 0
Group Minimum Duration : 150
Show Attended Group? : No
Edit Attended Group? : No
Break time : 0
Group Marks : 300

Paper II Computer Application and Computer Science


Section Id : 441009725126
Section Number : 1
Section type : Online
Mandatory or Optional : Mandatory
Number of Questions : 150
Number of Questions to be attempted : 150
Section Negative Marks : 0.66
Maximum Instruction Time : 0
Sub-Section Number : 1
Sub-Section Id : 441009727547
Question Shuffling Allowed : Yes
Question Number : 1 Question Id : 441009864130 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following is NOT an example of a proposition?
Options :
1. The fan is on.
2. The bird is flying.
3. Ram is going to the market.
4. Are you going to the market?

Question Number : 2 Question Id : 441009864131 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is the mean of a random variable?
Options :
1. It is the long-term average of the random variable.
2. It is the short-term average of the random variable.
3. It is the long-term sum of the random variable.
4. It is the short-term sum of the random variable.

Question Number : 3 Question Id : 441009864132 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What will be the conditional probability if the events X and Y are independent?
Options :
1. Conditional probability of event Y, given event Y is the probability of event X
2. Conditional probability of event Y, given event X is the probability of some event other than X and Y
3. Conditional probability of event X, given event Y is the probability of event Y
4. Conditional probability of event Y, given event X is the probability of event X

Question Number : 4 Question Id : 441009864133 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What will be the probability density function of a continuous random variable ‘x’ if it has a uniform distribution U(a, b) for two
constants ‘a’ and ‘b’ such that a < x < b?
Options :

1.

2.

3.

4.
Question Number : 5 Question Id : 441009864134 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is INCORRECT?
Options :
1. A is a proper subset of B if A is a subset of B, but A is not equal to B.
2. A is equal to B if A and B contain exactly the same number of elements and the same elements.
3. A is a subset of B if every element of A is an element of B.
4. A is a power set of B if A is a subset of B, but A is not equal to B.

Question Number : 6 Question Id : 441009864135 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
For a discrete random variable ‘X’, a function can act as the probability distribution if and only if its values, pX (x), satisfy the
following requirements:
Options :

1.

2.

3.

4.
Question Number : 7 Question Id : 441009864136 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.

Question Number : 8 Question Id : 441009864137 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is/are true?

Statement A: Many natural occurrences can be very well approximated by the normal distribution.
Statement B: Normal distribution has grown to become an accepted reference for a wide range of probability issues.
Options :
1. Only Statement A is true
2. Only Statement B is true
3. Both Statements A and B are true
4. Neither Statement A nor Statement B is true

Question Number : 9 Question Id : 441009864138 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Select the option that is true regarding the following two statements labelled Assertion (A) and Reasoning (R).

Assertion (A): A Boolean algebra is a set B that has elements ‘0’ and ‘1’, two binary operations ‘∗’ and ‘+’ and a unary operation ‘-’.

Reasoning (R): The following properties hold for any x, y and z ∈ B.


x ∗ (y + z) = (x ∗ y) + (x ∗ z) and
x + (y ∗ z) = (x + y) ∗ (x + z)
Options :
1. Both Assertion (A) and Reasoning (R) are correct and Reasoning (R) is the correct explanation of Assertion (A)
2. Both Assertion (A) and Reasoning (R) are correct, but Reasoning (R) is not the correct explanation of Assertion (A)
3. Assertion (A) is correct, but Reasoning (R) is incorrect
4. Assertion (A) is incorrect, but Reasoning (R) is correct
Question Number : 10 Question Id : 441009864140 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following syntaxes in C contains an error?
Options :
1. printf(“a=%d”,a);
2. printf(“%d”,a);
3. scanf(“%d”,&a);
4. printf(“%f”,&a);

Question Number : 11 Question Id : 441009864141 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which keyword is used for the data items that are made visible to the class inherited from the class that contains the data?
Options :
1. private
2. protected
3. public
4. static

Question Number : 12 Question Id : 441009864142 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
The method call stack contains the memory for local variables on each invocation of a method during the execution of a program.
This data, stored as a portion of the method call stack, is known as the ______ or the ______ of the method call.
Options :
1. stack frame; activation record
2. Stack Overflow; activation frame
3. Stack Underflow; activation field
4. stack field; activation overflow

Question Number : 13 Question Id : 441009864143 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is/are true?

Statement A: It is possible for a class to have several constructors with different parameter counts and/or kinds.
Statement B: It is feasible to have two constructors in a class, with identical arguments.
Options :
1. Only Statement A is true
2. Only Statement B is true
3. Both Statements A and B are true
4. Neither Statement A nor Statement B is true
Question Number : 14 Question Id : 441009864144 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is/are true?

Statement A: When a variable of one data type has a value of another data type, the compiler in C++ carries out implicit type
conversion automatically.
Statement B: In an object-oriented programming language, polymorphism is achieved through the use of inheritance, interfaces and
method overriding.
Options :
1. Only Statement A is true
2. Only Statement B is true
3. Both Statements A and B are true
4. Neither Statement A nor Statement B is true

Question Number : 15 Question Id : 441009864145 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.

Question Number : 16 Question Id : 441009864146 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
The ______ or mathematical model of a particular organisation of data is called a data structure.
Options :
1. pictorial
2. graphical
3. symbolic
4. logical
Question Number : 17 Question Id : 441009864147 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Fields of a file are also called ______.
Options :
1. entities
2. attributes
3. tuples
4. records

Question Number : 18 Question Id : 441009864148 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following formulas should be used to calculate any element of the array ‘LA’ at the Kth position, where ‘w’ is the
number of words per memory cell of the array and ‘Base’ is the base address?
Options :
1. LA[K] = Base(LA) + w(K)
2. LA[K] = Base(LA) + w(K − Lower bound)
3. LOC(LA[K]) = Base(LA) + w(K − Lower bound)
4. LOC(LA[K]) = Base(LA) + w(K)

Question Number : 19 Question Id : 441009864149 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
A ______ is a linear list to which elements can be added (or from which elements can be removed) at either end, but not in the
middle.
Options :
1. circular queue
2. linear queue
3. priority queue
4. deque

Question Number : 20 Question Id : 441009864150 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is a disadvantage of using the indexed sequential access method?
Options :
1. Searching a record in a huge database is a very slow process.
2. It does not support partial retrieval of records.
3. On the insertion of new records, the files have to be reconstructed to maintain the sequence.
4. It does not support range retrieval of records.

Question Number : 21 Question Id : 441009864151 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What will be the equivalent postfix notation of the infix notation given below?

Q: A+(B*C−(D/E^F)*G)*H
Options :
1. P:A B C * D E F ^ /G * − H * +
2. P:A C B * D E F ^ /G * − H * +
3. P:B C A * D E F ^ /G * − H * +
4. P:A B * C D E F ^ /G * − H * +
Question Number : 22 Question Id : 441009864152 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following is an advanced method of the indexed sequential access method and is a method that uses a tree-like structure
to store records in a file?
Options :
1. Pile file method
2. Sorted file method
3. Hash file organisation
4. B+ file organisation

Question Number : 23 Question Id : 441009864153 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is/are true?

Statement A: To search an item in a binary tree, we proceed down a single path of the tree, where the number of comparisons is
bounded by the depth of the tree.
Statement B: The number of leaf nodes in a binary tree is the number of leaf nodes of the left subtree minus the number of leaf nodes
of the right subtree.
Options :
1. Only Statement A is true
2. Only Statement B is true
3. Both Statements A and B are true
4. Neither Statement A nor Statement B is true
Question Number : 24 Question Id : 441009864154 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.
Question Number : 25 Question Id : 441009864155 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.

Question Number : 26 Question Id : 441009864156 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is correct about the omega notation?
Options :
1. f(n) = Ω(g(n)) iff there exist positive constants c and n0 such that f(n) <= c*g(n) for all n, n >= n0
2. f(n) = Ω(g(n)) iff there exist positive constants c and n0 such that f(n) >= c*g(n) for all n, n <= n0
3. f(n) = Ω(g(n)) iff there exist positive constants c and n0 such that f(n) >= c*g(n) for all n, n >= n0
4. f(n) = Ω(g(n)) iff there exist positive constants c and n0 such that f(n) <= c*g(n) for all n, n <= n0
Question Number : 27 Question Id : 441009864157 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
In the greedy method, we need to find a feasible solution that either maximises or minimises a given objective function. What do you
call the feasible solution that will accomplish this task?
Options :
1. Optimal solution
2. Final solution
3. Feasible solution
4. Greedy solution

Question Number : 28 Question Id : 441009864159 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
A dynamic programming formulation for a k-stage graph problem is obtained by first noticing that every s-to-t path is the result of a
sequence of ______ decisions.
Options :
1. k
2. k+1
3. k−1
4. k−2

Question Number : 29 Question Id : 441009864160 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is correct about an arbitrarily traceable graph?
Options :
1. A Euler graph ‘G’ is arbitrarily traceable from vertex ‘v’ in ‘G’ if and only if every circuit in ‘G’ contains ‘v’.
2. A Euler graph ‘G’ is arbitrarily traceable from vertex ‘v’ in ‘G’ if and only if every circuit in ‘G’ contains all the adjacent
vertices of ‘v’.
3. A Euler graph ‘G’ is arbitrarily traceable from vertex ‘v’ in ‘G’ if and only if every edge in ‘G’ is incident on ‘v’.
4. All the Euler graphs are arbitrarily traceable graphs.

Question Number : 30 Question Id : 441009864161 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
A spanning tree ‘T’ of a given weighted connected graph ‘G’ is the shortest spanning tree of ‘G’ if and only if ______.
Options :
1. there exists another spanning tree of ‘G’ at a distance of one from ‘T’, whose weight is less than that of ‘T’
2. there exists no other spanning tree of ‘G’ at a distance of one from ‘T’, whose weight is less than that of ‘T’
3. there exists no other spanning tree of ‘G’ at a distance of two from ‘T’, whose weight is less than that of ‘T’
4. there exists no other spanning tree of ‘G’ at a distance of one from ‘T’, whose weight is greater than that of ‘T’
Question Number : 31 Question Id : 441009864162 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :
1. an + n log n
2. an + 2n log n
3. an + n log cn
4. an + cn log n

Question Number : 32 Question Id : 441009864163 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is/are true?

Statement A: The theta notation is less precise than both big O and omega notations.
Statement B: f(n) = ϴ(g(n)) if g(n) is both an upper bound and a lower bound on f(n).
Options :
1. Only Statement A is true
2. Only Statement B is true
3. Both Statements A and B are true
4. Neither Statement A nor Statement B is true

Question Number : 33 Question Id : 441009864165 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is true about Dijkstra’s algorithm in Graph theory?
Options :
1. It can handle only fully connected graphs.
2. It fails for graphs with negative weight cycles.
3. It works for unweighted graphs only.
4. It always finds the longest path.
Question Number : 34 Question Id : 441009864166 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.

Question Number : 35 Question Id : 441009864167 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In which addressing mode are the operands specified implicitly in the definition of the instruction?
Options :
1. Implied mode
2. Immediate mode
3. Register mode
4. Register indirect mode

Question Number : 36 Question Id : 441009864168 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
The dynamic RAM stores the binary information in the form of electric charges that are applied to ______.
Options :
1. transistors
2. registers
3. capacitors
4. magnetic tapes
Question Number : 37 Question Id : 441009864170 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.

Question Number : 38 Question Id : 441009864171 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements are true?

Statement A: The next address generator (sequencer) is used as a component of the microprogrammed control unit.
Statement B: The control address register is used as a component of the microprogrammed control unit.
Statement C: The control memory (ROM) is used as a component of the microprogrammed control unit.
Options :
1. Only Statements A and B are true
2. Only Statements B and C are true
3. Only Statements A and C are true
4. All of the Statements A, B and C are true
Question Number : 39 Question Id : 441009864172 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.

Question Number : 40 Question Id : 441009864173 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
The behaviour of an individual process can be characterised by listing the sequence of instructions that execute that process. What is
such a listing referred to as?
Options :
1. State
2. Task
3. Trace
4. Model

Question Number : 41 Question Id : 441009864174 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
How many entries does a directory file contain for every file and the subdirectory that it houses in a UNIX file system?
Options :
1. One
2. Two
3. Three
4. Four
Question Number : 42 Question Id : 441009864175 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
The threads within the same process can exchange information through the shared ______ and have access to the shared ______ of
the process.
Options :
1. memory; resources
2. I/O; memory
3. resources; I/O
4. resources; memory

Question Number : 43 Question Id : 441009864176 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which process is immediately set up by the kernel system when you log on to the UNIX system?
Options :
1. System process
2. Shell process
3. Batch process
4. Hash process

Question Number : 44 Question Id : 441009864177 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is the function of ‘2’ in the following command?$a.out | pr –t -2
Options :
1. Prints in 2 numbers of columns
2. Prints in 2 numbers of rows
3. Prints the first 2 numbers of files
4. Prints in 2 numbers of words

Question Number : 45 Question Id : 441009864178 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
For the purpose of modularity or to exploit parallelism, a user program can dictate the creation of a number of processes. What is the
method of creation of a process by the operating system upon request of another process?
Options :
1. Swapping
2. Spawning
3. Dispatching
4. Originating

Question Number : 46 Question Id : 441009864179 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What will be the output of the following command?

$echo “\007”
Options :
1. Display “0 0 7”
2. Display “07”
3. Display “\007”
4. Sound of beep
Question Number : 47 Question Id : 441009864180 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is/are true?

Statement A: Four conditions, which are mutual exclusion, hold and wait, circular wait and no pre-emption, must be present for a
deadlock to occur in an operating system.
Statement B: When a process in an operating system waits endlessly for the resource it needs, then a condition called starvation
occurs.
Options :
1. Only Statement A is true
2. Only Statement B is true
3. Both Statements A and B are true
4. Neither Statement A nor Statement B is true

Question Number : 48 Question Id : 441009864181 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements are true?

Statement A: Use tail –f option when you are running a program that continuously writes to a file.
Statement B: To see how a file is growing, you have to terminate the command with the interrupt key.
Statement C: For the command “tail +n file_name”, the data will start printing from line number ‘n’ till the end of the file specified.
Options :
1. Only Statements A and B are true
2. Only Statements B and C are true
3. Only Statements A and C are true
4. All of the Statements A, B and C are true

Question Number : 49 Question Id : 441009864182 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Select the option that is true regarding the following two statements labelled Assertion (A) and Reasoning (R).

Assertion (A): In case of independent parallelism, each process represents a separate, independent application or job.

Reasoning (R): With independent parallelism, there is no explicit synchronisation among processes.
Options :
1. Both Assertion (A) and Reasoning (R) are correct and Reasoning (R) is the correct explanation of Assertion (A)
2. Both Assertion (A) and Reasoning (R) are correct, but Reasoning (R) is not the correct explanation of Assertion (A)
3. Assertion (A) is correct, but Reasoning (R) is incorrect
4. Assertion (A) is incorrect, but Reasoning (R) is correct
Question Number : 50 Question Id : 441009864183 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.

Question Number : 51 Question Id : 441009864184 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
A relation is said to be in 1NF if and only if all the underlying domains contain ______ values only.
Options :
1. atomic
2. vector
3. positive
4. negative
Question Number : 52 Question Id : 441009864185 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following commands is used to specify primary and foreign key constraints and to perform modifications in the table?
Options :
1. Modify
2. Alter
3. Update
4. Change

Question Number : 53 Question Id : 441009864187 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following SQL commands inserts a set of values in a table named ‘Student’?
Options :

1.

2.

3.

4.

Question Number : 54 Question Id : 441009864188 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is INCORRECT about the views?
Options :
1. Views are named derived relations.
2. Views are virtual.
3. Views have independent existence of their own.
4. Views are customised queries that retrieve data from one or more relations.

Question Number : 55 Question Id : 441009864189 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is a requirement for a relation to be in 4NF?
Options :
1. It should be in 3NF and should not have partial dependency.
2. It should be in BCNF and should not have transitive dependency.
3.

4. It should be in BCNF and should not have multivalued dependency.


Question Number : 56 Question Id : 441009864191 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements are true?

Statement A: The synonym serves as an alias or alternative name for database objects, allowing them to be referred to by various
names, without requiring the use of previously specified complicated names.
Statement B: A synonym is a member of the schema; its name needs to be distinct.
Statement C: A synonym can refer to a user-defined function or to the initial object of another synonym.
Options :
1. Only Statements A and B are true
2. Only Statements B and C are true
3. Only Statements A and C are true
4. All of the Statements A, B and C are true

Question Number : 57 Question Id : 441009864192 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements are true?

Statement A: DDL commands are CREATE TABLE, DROP INDEX, etc., which are used to create database tables, to delete a table,
to modify a table, etc.
Statement B: DML commands are INSERT, DELETE, etc., which are used to insert, delete and update the data in tables.
Statement C: System privilege may be granted with DDL commands.
Options :
1. Only Statements A and B are true
2. Only Statements B and C are true
3. Only Statements A and C are true
4. All of the Statements A, B and C are true

Question Number : 58 Question Id : 441009864194 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following characteristics of software includes responsiveness, processing time and memory utilisation?
Options :
1. Maintainability
2. Dependability
3. Efficiency
4. Usability

Question Number : 59 Question Id : 441009864195 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
A theoretical model known as a/an ______ makes it possible to precisely and in-depth analyse how a computer system operates. It is
comparable to a mathematical function in that it takes in inputs and, by using predetermined rules, outputs data.
Options :
1. abstract machine model
2. client–server model
3. repository model
4. centralised control model
Question Number : 60 Question Id : 441009864196 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following shapes in the UML is used to represent a process that is a set of activities which have some coherence and
whose objective is generally agreed within an organisation in software engineering?
Options :
1. A round-edged rectangle with no drop shadow
2. A round-edged rectangle with a drop shadow
3. A rectangle with a drop shadow
4. A parallelogram

Question Number : 61 Question Id : 441009864197 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is NOT a goal of the coding phase in the development of software?
Options :
1. To translate the design of a system into the computer language format
2. To reduce the cost of phases following the coding phase
3. To enhance the readability of a program
4. To collect business information for the client

Question Number : 62 Question Id : 441009864198 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is NOT included in the process standards?
Options :
1. Design review conduct
2. Version release process
3. Project plan format
4. Test recording process

Question Number : 63 Question Id : 441009864200 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following types of testing is NOT related to an approach wherein tests are derived from knowledge of the structure and
implementation of a software?
Options :
1. White-box testing
2. Glass box testing
3. Clear box testing
4. Black-box testing
Question Number : 64 Question Id : 441009864201 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is/are true?

Statement A: The Defect Removal Efficiency (DRE) formula acts as a compass in determining and quantifying the quality of a
software product.
Statement B: We need the quantity of bugs during software testing and the quantity of bugs found by the user to find the Defect
Removal Efficiency.
Options :
1. Only Statement A is true
2. Only Statement B is true
3. Both Statements A and B are true
4. Neither Statement A nor Statement B is true

Question Number : 65 Question Id : 441009864202 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.
Question Number : 66 Question Id : 441009864203 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :

1.

2.

3.

4.

Question Number : 67 Question Id : 441009864204 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What will be the cardinality of A if A = {1, 2, 4, 5, 1, 2, 7, 9, 5}?
Options :
1. 4
2. 5
3. 6
4. 7
Question Number : 68 Question Id : 441009864206 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following algorithms is of the 'divide and conquer' type, wherein the problem of sorting a set is reduced to the problem
of sorting two smaller sets?
Options :
1. Quick sort
2. Selection sort
3. Bubble sort
4. Insertion sort

Question Number : 69 Question Id : 441009864207 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is/are true?

Statement A: The secondary memory, also known as the auxiliary memory, is used to store data and information permanently.
Statement B: Cache is an intermediate memory present between the main memory and the secondary memory, which is smaller in
size as compared to the main memory.
Options :
1. Only Statement A is true
2. Only Statement B is true
3. Both Statements A and B are true
4. Neither Statement A nor Statement B is true

Question Number : 70 Question Id : 441009864210 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
A ______ has a property that, if two points are inside or on the polygon, then the entire line segment between those points is also
inside or on the polygon.
Options :
1. regular polygon
2. concave polygon
3. convex polygon
4. non-convex polygon

Question Number : 71 Question Id : 441009864211 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following types of coordinates is commonly used to represent points in computer graphics transformations?
Options :
1. Cartesian coordinates
2. Polar coordinates
3. Spherical coordinates
4. Homogeneous coordinates

Question Number : 72 Question Id : 441009864212 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In the Cohen–Sutherland line clipping algorithm, how many regions are defined by the clipping window?
Options :
1. 2
2. 4
3. 8
4. 9
Question Number : 73 Question Id : 441009864213 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
What is the purpose of texture mapping in 3-D graphics?
Options :
1. To add colour to objects
2. To add details and realism to surfaces
3. To create wireframe models
4. To remove hidden surfaces

Question Number : 74 Question Id : 441009864214 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is the primary advantage of using spline curves over polynomial curves?
Options :
1. Spline curves require fewer control points.
2. Spline curves provide smoother interpolation.
3. Spline curves are easier to compute.
4. Spline curves can only represent straight lines.

Question Number : 75 Question Id : 441009864215 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the given conclusions is correct based on the following statement?

Statement:
The midpoint line drawing algorithm is efficient for drawing lines on raster displays.

Conclusion 1: The statement is true because the midpoint algorithm reduces the computational complexity by using integer
arithmetic and efficiently handles all the cases of the line drawing.
Conclusion 2: The statement is false because the midpoint algorithm is only suitable for drawing horizontal lines and vertical lines.
Conclusion 3: The statement is false because the midpoint algorithm suffers from round-off errors and is less accurate as compared to
other line drawing algorithms.
Conclusion 4: The statement is true because the midpoint algorithm calculates pixel positions by considering the symmetry and
minimises the number of pixels to be computed.
Options :
1. Conclusion 1
2. Conclusion 2
3. Conclusion 3
4. Conclusion 4

Question Number : 76 Question Id : 441009864217 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
The OSI reference model contains ______ layers.
Options :
1. 8
2. 9
3. 6
4. 7
Question Number : 77 Question Id : 441009864218 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Suppose Token rings have cropped up as MAC protocols with some consistency. An early token ring protocol is called:
Options :
1. IEEE 802.9
2. IEEE 802.7
3. IEEE 802.5
4. IEEE 802.1

Question Number : 78 Question Id : 441009864219 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following pairs is correctly matched?

i) Error-correction code – Checksum


ii) Protocols in which the sender waits for a negative acknowledgement before advancing to the next data item – Automatic repeat
request
iii) Error-correction code – Hamming code
iv) Bidirectional data transfer – Stop-and-wait
Options :
1. i
2. ii
3. iii
4. iv

Question Number : 79 Question Id : 441009864220 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In which technique is every incoming packet sent out on every outgoing line, except the one on which it arrived?
Options :
1. Static routing
2. Routing
3. Flooding
4. Shortest path

Question Number : 80 Question Id : 441009864222 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following system calls is used by the server to accept a connection request from a client?
Options :
1. connect()
2. accept()
3. listen()
4. bind()
Question Number : 81 Question Id : 441009864224 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the given conclusions is correct based on the following statement?

Statement:
The Internet Control Message Protocol (ICMP) is primarily used for network diagnostics and error reporting in IP networks.
Conclusion 1: The ICMP is responsible for establishing and terminating connections between network devices.
Conclusion 2: The ICMP operates at the transport layer of the OSI model.
Conclusion 3: The ICMP messages are encapsulated within IP datagrams.
Conclusion 4: The ICMP is primarily used for transferring the user data between hosts on the network.
Options :
1. Conclusion 1
2. Conclusion 2
3. Conclusion 3
4. Conclusion 4

Question Number : 82 Question Id : 441009864225 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1-D, 2-C, 3-A, 4-B
2. 1-A, 2-B, 3-C, 4-D
3. 1-C, 2-A, 3-D, 4-B
4. 1-D, 2-A, 3-B, 4-C
Question Number : 83 Question Id : 441009864226 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1.c, 2.b, 3.d, 4.a
2. 1.c, 2.d, 3.b, 4.a
3. 1.c, 2.b, 3.a, 4.d
4. 1.b, 2.c, 3.d, 4.a

Question Number : 84 Question Id : 441009864227 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is the difference between data warehousing and traditional database systems?
Options :
1. Data warehousing focuses on transaction processing, while traditional databases focus on data analysis.
2. Data warehousing stores the historical data for analysis, while traditional databases store the current operational data.
3. Data warehousing uses a distributed architecture, while traditional databases use a centralised architecture.
4. Data warehousing supports real-time processing, while traditional databases support batch processing.

Question Number : 85 Question Id : 441009864228 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which OLAP operation allows the user to view a subset of data along a single dimension?
Options :
1. Slice
2. Dice
3. Roll-up
4. Drill-down

Question Number : 86 Question Id : 441009864232 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which data mining functionality aims to identify outliers or anomalies in a dataset, which deviate significantly from the norm?
Options :
1. Classification
2. Clustering
3. Outlier detection
4. Association analysis
Question Number : 87 Question Id : 441009864234 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following options best describes the validity of the given conclusion based on the given statement?

Statement: The Principal Component Analysis (PCA) is a powerful technique for dimensionality reduction in data mining.

Conclusion: Therefore, the PCA can effectively capture the main features and reduce the complexity of high-dimensional datasets.
Options :
1. The conclusion is valid because the PCA is commonly used to reduce the dimensionality of datasets while preserving the main
features.
2. The conclusion is invalid because the PCA is primarily used for clustering similar data instances together.
3. The conclusion is valid because the PCA is ineffective in reducing the complexity of high-dimensional datasets.
4. The conclusion is invalid because the PCA does not have any impact on the features of a dataset.

Question Number : 88 Question Id : 441009864235 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Select the option that is true regarding the following two statements labelled Assertion and Reasoning.

Assertion: Association mining is a data mining technique used to discover interesting relationships between variables or items in a
dataset.

Reasoning: Association mining involves identifying frequent item sets and generating association rules that describe the correlations
or co-occurrences between different items or variables. It is commonly used in the market basket analysis, wherein the goal is to
uncover patterns, such as, ‘If item X is purchased, then item Y is also likely to be purchased’.
Options :
1. The assertion is true, but the reasoning is false.
2. Both the assertion and the reasoning are true and the reasoning provides a valid explanation for the assertion.
3. The assertion is false, but the reasoning is true.
4. Both the assertion and the reasoning are false.

Question Number : 89 Question Id : 441009864236 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Match the following regression techniques with their corresponding descriptions in the context of data mining.

Regression Techniques:
1. Linear regression
2. Polynomial regression
3. Ridge regression
4. Decision trees

Descriptions:
a. This technique extends the linear models by using polynomial features of the input variables to fit in a non-linear relationship.
b. This technique uses a linear approach to model the relationship between a dependent variable and one or more independent
variables.
c. This technique is a regularisation method that introduces a penalty for larger coefficients so as to reduce overfitting.
d. This technique uses a tree-like model of decisions to predict continuous outcomes based on the input features.
Options :
1. 1.d, 2.a, 3.b, 4.c
2. 1.a, 2.d, 3.b, 4.c
3. 1.b, 2.a, 3.c, 4.d
4. 1.d, 2.b, 3.a, 4.c
Question Number : 90 Question Id : 441009864238 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following is a valid way to declare a namespace prefix in XML?
Options :
1. xmlns:prefix=namespaceURI
2. xmlns:prefix='namespaceURI”
3. xmlns:prefix="namespaceURI"
4. xmlns:prefix :'namespaceURI'

Question Number : 91 Question Id : 441009864239 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is correct about client-server computing?
Options :
1. In client-server computing, a single computer performs roles of both the client and the server simultaneously.
2. Client-server computing involves multiple independent computers collaborating to process data and to perform tasks.
3. A client-server architecture consists of a central server that stores all the data and performs all the processing tasks.
4. In client-server computing, clients initiate requests for services or resources from servers, and server responds to these requests.

Question Number : 92 Question Id : 441009864240 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is a characteristic of static web technologies?
Options :
1. Dynamic content generation based on the user input
2. Server-side scripting to process user requests
3. Predefined content served to users, without modification
4. Real-time interaction with databases and external APIs

Question Number : 93 Question Id : 441009864241 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following options accurately describes the difference between dynamic and active web pages?
Options :
1. Dynamic web pages require server-side processing, while active web pages require client-side scripting.
2. Dynamic web pages allow user interaction and customisation, while active web pages are static and unchanging.
3. Active web pages use server-side technologies to generate content dynamically, while dynamic web pages use client-side
technologies.
4. Dynamic web pages change the content in response to user interactions or database updates, while active web pages use client-
side scripts to provide real-time updates and interactivity.

Question Number : 94 Question Id : 441009864242 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In the light of the following statement and conclusion, select the correct answer from the options given below.

Statement: Client-side scripting is preferable for the tasks that require immediate user interaction and responsiveness.

Conclusion: Server-side scripting is not suitable for handling real-time user interactions.
Options :
1. Both the statement and the conclusion are true.
2. The statement is true, but the conclusion is false.
3. The statement is false, but the conclusion is true.
4. Both the statement and the conclusion are false.
Question Number : 95 Question Id : 441009864243 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Select the option that is true regarding the following two statements labelled Assertion and Reasoning.

Assertion: The HTML provides a structure for creating web pages by defining the layout and the content of a webpage by using
elements and tags.

Reasoning: HTML tags are used to mark up the content, such as headings, paragraphs, images and links, to provide structure and
semantics to web documents.
Options :
1. Both the assertion and the reasoning are true and the reasoning is the correct explanation of the assertion.
2. Both the assertion and the reasoning are true, but the reasoning is not the correct explanation of the assertion.
3. The assertion is true, but the reasoning is false.
4. Both the assertion and the reasoning are false.

Question Number : 96 Question Id : 441009864244 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1.d, 2.c, 3.a, 4.b
2. 1.c, 2.d, 3.a, 4.b
3. 1.d, 2.c, 3.b, 4.a
4. 1.d, 2.a, 3.b, 4.c

Question Number : 97 Question Id : 441009864246 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is the main benefit of media convergence in e-commerce?
Options :
1. Higher shipping speed
2. Improved quality in production of goods
3. Enhanced user experience and broader engagement
4. Reduced cost of raw materials
Question Number : 98 Question Id : 441009864247 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following is a challenge in securing consumer applications in electronic commerce?
Options :
1. Ensuring compatibility with legacy systems and infrastructure
2. Implementing multi-factor authentication to protect the user accounts
3. Addressing privacy concerns related to collection and use of the personal data
4. Optimising the user experience through responsive web design and mobile optimisation

Question Number : 99 Question Id : 441009864248 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
The fundamental goal of cryptography in e-commerce and security is ______.
Options :
1. to ensure high availability of online services and resources
2. to prevent unauthorised access to sensitive data and information
3. to optimise network performance and to reduce latency in data transmission
4. to enhance the user experience through personalised content and recommendations

Question Number : 100 Question Id : 441009864249 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What role does a firewall typically play in e-commerce and security?
Options :
1. It encrypts the data transmitted between the client and the server.
2. It protects against physical security threats, such as theft and vandalism.
3. It monitors and controls network traffic to prevent unauthorised access.
4. It manages user authentication and access control for online services.

Question Number : 101 Question Id : 441009864250 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements accurately describes the role of smart cards in electronic payment systems?
Options :
1. Smart cards are primarily used for physical authentication in brick-and-mortar stores.
2. Smart cards store payment credentials securely and facilitate transactions in electronic payment systems.
3. Smart cards rely on magnetic stripes to store the payment information.
4. Smart cards are compatible with contactless payment terminals only.

Question Number : 102 Question Id : 441009864251 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In the light of the following statement and conclusion, select the correct answer from the options given below.

Statement: Credit cards are widely used in electronic payment systems to facilitate online transactions and purchases.

Conclusion: Electronic payment systems that accept credit cards are inherently secure and free from frauds.
Options :
1. Both the statement and the conclusion are true.
2. The statement is true, but the conclusion is false.
3. The statement is false, but the conclusion is true.
4. Both the statement and the conclusion are false.
Question Number : 103 Question Id : 441009864252 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
In the light of the following statement and conclusion, select the correct answer from the options given below.

Statement: Electronic payment systems are vulnerable to various security risks, including fraud, identity theft and unauthorised
access.

Conclusion: Therefore, electronic payment systems are inherently insecure and should be avoided whenever possible.
Options :
1. Both the statement and the conclusion are true.
2. The statement is true, but the conclusion is false.
3. The statement is false, but the conclusion is true.
4. Both the statement and the conclusion are false.

Question Number : 104 Question Id : 441009864253 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Select the option that is true regarding the following two statements labelled Assertion and Reasoning.

Assertion: When designing electronic payment systems, implementing strong encryption mechanisms is crucial to ensure the security
of sensitive payment data.

Reasoning: Encryption helps protect the payment data by converting it into unreadable ciphertext, which can only be decrypted by
using appropriate cryptographic keys.
Options :
1. Both the assertion and the reasoning are true and the reasoning is the correct explanation of the assertion.
2. Both the assertion and the reasoning are true, but the reasoning is not the correct explanation of the assertion.
3. The assertion is true, but the reasoning is false.
4. Both the assertion and the reasoning are false.

Question Number : 105 Question Id : 441009864254 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements about the ISA (Interchange Control Header) segment in Electronic Data Exchange (EDI) is true?
Options :
1. It provides shipment details.
2. It marks the end of a transaction.
3. It identifies sender, receiver and control information.
4. It handles encryption of EDI files.

Question Number : 106 Question Id : 441009864255 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In a deterministic finite automaton (DFA), how many transitions does each state have for each input symbol?
Options :
1. Zero
2. One
3. Multiple
4. It depends on the input string.
Question Number : 107 Question Id : 441009864256 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
In a push-down automaton (PDA), the stack:
Options :
1. follows a Last-In-First-Out (LIFO) order
2. follows a First-In-First-Out (FIFO) order
3. can only push symbols onto it
4. can only pop symbols from it

Question Number : 108 Question Id : 441009864257 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is a characteristic of recursively enumerable (RE) languages?
Options :
1. They can be recognised by deterministic finite automata (DFAs).
2. They can be recognised by a Turing machine.
3. They are not closed under complementation.
4. They can be recognised by regular expressions.

Question Number : 109 Question Id : 441009864258 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which famous theorem states that there are problems for which no algorithm exists to solve them?
Options :
1. Pumping lemma
2. Rice’s theorem
3. Kleene’s theorem
4. Myhill–Nerode theorem

Question Number : 110 Question Id : 441009864259 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is a token in the context of lexical analysis?
Options :
1. A data structure used to store the symbol table information
2. A rule specifying the syntax of a programming language
3. An intermediate representation of the source code
4. A sequence of characters that represents a single lexical unit in the source code

Question Number : 111 Question Id : 441009864261 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In a syntax-directed translation, which component is responsible for associating semantic actions with productions in the grammar?
Options :
1. Lexical analyser
2. Parser
3. Semantic analyser
4. Code generator
Question Number : 112 Question Id : 441009864262 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Statement: Runtime environments in compiler design are responsible for managing memory, supporting execution of programs, and
handling runtime errors.

Conclusion 1: Runtime environments are concerned with memory management.


Conclusion 2: Runtime environments are not involved in error handling.
Conclusion 3: Runtime environments play a crucial role in program execution.
Which of the following conclusions are valid based on the statement?
Options :
1. Conclusion 1 and Conclusion 2
2. Conclusion 1 and Conclusion 3
3. Conclusion 2 and Conclusion 3
4. Conclusion 1, Conclusion 2, and Conclusion 3

Question Number : 113 Question Id : 441009864263 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Select the option that is true regarding the following two statements labelled Assertion and Reasoning.

Assertion: Runtime environments are responsible for managing memory allocation and de-allocation during the execution of a
program.

Reasoning: Runtime environments ensure that variables and data structures are properly initialised and maintained throughout the
execution of a program.
Options :
1. Both the assertion and the reasoning are true and the reasoning provides a valid explanation for the assertion.
2. The assertion is true, but the reasoning is false.
3. Both the assertion and the reasoning are false.
4. The assertion is false, but the reasoning is true.
Question Number : 114 Question Id : 441009864264 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1.c, 2.a, 3.b, 4.d
2. 1.b, 2.a, 3.d, 4.c
3. 1.d, 2.a, 3.b, 4.c
4. 1.a, 2.c, 3.b, 4.d

Question Number : 115 Question Id : 441009864265 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which encryption algorithm is commonly used for securing electronic communication and data storage?
Options :
1. DES
2. RSA
3. MD5
4. SHA-1

Question Number : 116 Question Id : 441009864266 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following best describes the operation of DES?
Options :
1. Feistel network
2. ECB mode
3. Stream cipher
4. Diffie–Hellman key exchange
Question Number : 117 Question Id : 441009864268 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following is an electronic, encrypted stamp of authentication on digital information, such as email messages, macros or
electronic documents?
Options :
1. Symmetric encryption
2. Key exchange
3. Digital signature
4. Certificate authority

Question Number : 118 Question Id : 441009864269 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is the main advantage of RSA over symmetric encryption algorithms?
Options :
1. Faster encryption and decryption
2. Simpler key management
3. Support for secure key exchange
4. Ability to encrypt large volumes of data

Question Number : 119 Question Id : 441009864270 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which protocol is commonly used for secure authentication over networks?
Options :
1. HTTP
2. FTP
3. SSH
4. Telnet

Question Number : 120 Question Id : 441009864271 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following options best describes the validity of the given conclusion based on the given statement?

Statement: Firewalls and VPNs are essential components of network security.

Conclusion: Implementing both firewalls and VPNs is unnecessary redundancy in network security measures.
Options :
1. The conclusion contradicts the statement by suggesting that firewalls and VPNs are not essential for network security.
2. The conclusion aligns with the statement by emphasising the importance of implementing both firewalls and VPNs for network
security.
3. The conclusion extends the statement by proposing that firewalls and VPNs are interchangeable in network security.
4. The conclusion is unrelated to the statement, as it discusses the redundancy of network security measures.
Question Number : 121 Question Id : 441009864272 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1.b, 2.c, 3.d, 4.a
2. 1.c, 2.b, 3.a, 4.d
3. 1.a, 2.c, 3.b, 4.d
4. 1.c, 2.a, 3.d, 4.b

Question Number : 122 Question Id : 441009864273 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which AI approach learns to perform tasks by receiving feedback from the environment, without explicit programming of rules?
Options :
1. Genetic algorithm
2. Expert system
3. Neural network
4. Reinforcement learning

Question Number : 123 Question Id : 441009864274 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In the state space search, what does the term ‘State space’ refer to?
Options :
1. The physical space where the problem is defined
2. The set of all the possible problem states reachable from the initial state by any sequence of actions
3. The set of all the possible actions that can be taken to solve the problem
4. The space complexity of the problem-solving algorithm

Question Number : 124 Question Id : 441009864275 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
A problem wherein the outcome of the action is uncertain or has a degree of randomness is classified as:
Options :
1. deterministic
2. observable
3. probabilistic
4. static
Question Number : 125 Question Id : 441009864278 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
In the context of A* search, what does the heuristic function estimate?
Options :
1. The cost of the cheapest path from the initial state to the goal state
2. The exact cost of reaching the goal state from the current state
3. The remaining cost of reaching from the current state to the goal state
4. The number of steps required to reach the goal state from the initial state

Question Number : 126 Question Id : 441009864279 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is NOT a step in the resolution refutation method for theorem proving in predicate logic?
Options :
1. Apply the resolution rule iteratively until either the empty clause is derived or no further resolutions are possible.
2. Convert the knowledge base and the negation of the goal into conjunctive normal form (CNF).
3. Apply unification to resolve clauses.
4. Use forward chaining to derive new clauses.

Question Number : 127 Question Id : 441009864280 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following options best describes the validity of the given conclusion based on the given statement?

Statement:
An expert system uses a set of rules to represent knowledge about a specific domain.

Conclusion:
Therefore, the knowledge in an expert system can be effectively represented using rule-based systems.
Options :
1. The conclusion is true, because rule-based systems allow for explicit representation of knowledge and reasoning.
2. The conclusion is false, because expert systems primarily rely on neural networks for knowledge representation.
3. The conclusion is true, but only if the domain knowledge is simple and deterministic.
4. The conclusion is false, because rule-based systems are too rigid for representing complex knowledge.

Question Number : 128 Question Id : 441009864281 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is a "frame" in Artificial Intelligence?

Options :
1. A control structure for looping in programming
2. A way of scheduling processes
3. A data structure for representing knowledge in stereotypical situations
4. A graphical representation of an AI algorithm
Question Number : 129 Question Id : 441009864282 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1-b, 2-a, 3-c, 4-d
2. 1-a, 2-b, 3-c, 4-d
3. 1-d, 2-b, 3-a, 4-c
4. 1-b, 2-c, 3-d, 4-a

Question Number : 130 Question Id : 441009864283 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1-b, 2-a, 3-c, 4-d
2. 1-a, 2-b, 3-c, 4-d
3. 1-d, 2-b, 3-a, 4-c
4. 1-b, 2-c, 3-d, 4-a
Question Number : 131 Question Id : 441009864284 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
In 3-D computer graphics, which of the following transformations is NOT typically applied in the process of rendering a scene?
Options :
1. Shearing
2. Compression
3. Translation
4. Scaling

Question Number : 132 Question Id : 441009864285 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following options best describes the validity of the given conclusion based on the given statement?

Statement:
Flow control mechanisms ensure efficient and reliable data transfer between the sender and the receiver in a computer network.

Conclusion:
Therefore, flow control techniques eliminate the need for error control mechanisms.
Options :
1. The conclusion is true, because flow control techniques automatically correct any errors that occur during data transfer.
2. The conclusion is false, because flow control and error control are two distinct mechanisms addressing different aspects of data
transfer.
3. The conclusion is true, because efficient flow control prevents errors from occurring in the first place.
4. The conclusion is false, because error control mechanisms are essential for detecting and correcting errors in data transmission,
even with efficient flow control.

Question Number : 133 Question Id : 441009864286 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Select the option that is true regarding the following two statements labelled Assertion and Reasoning.

Assertion: HTTP is a stateless protocol used for communication between web browsers and web servers.

Reasoning: ‘Stateless’ implies that the server does not retain information about the state of each client session between requests.
Options :
1. Both the assertion and the reasoning are true and the reasoning correctly explains the assertion.
2. Both the assertion and the reasoning are true, but the reasoning does not correctly explain the assertion.
3. The assertion is true, but the reasoning is false.
4. The assertion is false, but the reasoning is true.
Question Number : 134 Question Id : 441009864287 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1-d, 2-c, 3-b, 4-a
2. 1-a, 2-b, 3-c, 4-d
3. 1-b, 2-d, 3-a, 4-c
4. 1-c, 2-a, 3-d, 4-b

Question Number : 135 Question Id : 441009864288 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66

Options :
1. 1.c, 2.a, 3.b, 4.d
2. 1.c, 2.b, 3.a, 4.d
3. 1.d, 2.a, 3.b, 4.c
4. 1.a, 2.c, 3.b, 4.d
Question Number : 136 Question Id : 441009927517 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements is true about Binary Search?
Options :
1. It works on both sorted and unsorted arrays.
2. It takes constant time for all inputs.
3. Its worst-case time complexity is O(log n).
4. It cannot be implemented using recursion.

Question Number : 137 Question Id : 441009934392 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In a Binary Search Tree (BST), which of the following tree traversal methods produce the node values in ascending order?
Options :
1. Preorder
2. Postorder
3. Inorder
4. Breadth-First (Level Order)

Question Number : 138 Question Id : 441009938664 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following SQL statements is used to define and create a new table structure within a database?
Options :
1. INSERT
2. SELECT
3. CREATE TABLE
4. UPDATE

Question Number : 139 Question Id : 441009938703 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following SQL statements will update the salary of all employees in the "Employees" table by 10% where the
department is 'HR'?
Options :
1. UPDATE Employees SET salary = salary * 1.10 WHERE department = 'HR';
2. MODIFY Employees SET salary = salary + 10% WHERE department = 'HR';
3. ALTER TABLE Employees SET salary = salary * 1.10 WHERE department = 'HR';
4. SET salary = salary * 1.10 FROM Employees WHERE department = 'HR';

Question Number : 140 Question Id : 441009938735 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following statements about updatable views in SQL is correct?
Options :
1. A view that includes a GROUP BY clause is always updatable.
2. A view based on a single base table, without aggregate functions or joins, can be updatable.
3. Views that contain DISTINCT can always be updated if indexed.
4. All views in SQL are inherently updatable regardless of their definition.
Question Number : 141 Question Id : 441009938952 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
Which of the following is true regarding input buffering in lexical analysis?
Options :
1. It reduces parsing speed.
2. It helps in backtracking and lookahead.
3. It avoids removing whitespaces.
4. It adds semantic information to tokens.

Question Number : 142 Question Id : 441009939003 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following best describes the purpose of cyclomatic complexity in software metrics?
Options :
1. It measures how many bytes the source code occupies.
2. It counts the total number of code statements in a module.
3. It quantifies the number of independent control flow paths in a program.
4. It estimates how efficiently a program uses memory during execution.

Question Number : 143 Question Id : 441009939068 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following algorithms is most commonly used in computer graphics for drawing a straight line using only integer
calculations?
Options :
1. Dijkstra's Algorithm
2. Bresenham’s Line Algorithm
3. Flood Fill Algorithm
4. Midpoint Circle Algorithm

Question Number : 144 Question Id : 441009940158 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following best describes the three-tier architecture of a data warehouse and the role of each layer?
Options :
1. User Interface Layer – provides physical storage; Business Logic Layer – cleans data; Presentation Layer – performs OLAP
analysis
2. Data Source Layer – manages metadata; Transformation Layer – hosts the data mart; Front-End Layer – stores raw data
3. Bottom Tier – holds the data warehouse server, Middle Tier – contains OLAP servers, Top Tier – provides the front-end tools
for querying and reporting
4. First Tier – is responsible for client interaction; Second Tier – performs data mining; Third Tier – implements indexing and
hashing functions

Question Number : 145 Question Id : 441009940174 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following best represents a data mining primitive that defines the type of knowledge to be mined?
Options :
1. Data integration
2. Background knowledge
3. Presentation of results
4. Task-relevant data specification
Question Number : 146 Question Id : 441009940181 Question Type : MCQ
Correct Marks : 2 Wrong Marks : 0.66
In data mining, how does classification differ from regression, in terms of the nature of the target variable?
Options :
1. Classification predicts a continuous output, while regression predicts a discrete category.
2. Classification is used only when there are no input features, while regression requires multiple inputs.
3. Classification predicts categorical labels, whereas regression predicts continuous numeric values.
4. Both classification and regression always use the same algorithms but differ only in evaluation metrics.

Question Number : 147 Question Id : 441009940199 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
In the context of client-server architecture, what is the primary function of the client in a networked system?
Options :
1. To store and manage databases while handling requests from multiple clients
2. To passively listen for incoming requests over the network
3. To initiate communication by sending requests to the server and processing the responses
4. To control data routing between different servers in the network

Question Number : 148 Question Id : 441009943142 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
What is the primary feature that distinguishes a smart card from a traditional magnetic stripe card in electronic payment systems?
Options :
1. Smart cards require physical punching to authorise transactions.
2. Smart cards store and process data using an embedded microprocessor.
3. Smart cards are only used for contactless payments, while magnetic cards are not.
4. Smart cards are used exclusively for loyalty points, not for monetary transactions.

Question Number : 149 Question Id : 441009943291 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following best describes how a digital signature ensures both authentication and non-repudiation in a secure
communication system?
Options :
1. By encrypting the entire message with the sender's public key to prevent modification
2. By using a symmetric key to create a hash that only the sender and receiver understand
3. By hashing the message and encrypting the hash with the sender's private key, allowing the recipient to verify the sender and
the message integrity
4. By encrypting the hash with the receiver’s public key to ensure the message is authentic

Question Number : 150 Question Id : 441009943308 Question Type : MCQ


Correct Marks : 2 Wrong Marks : 0.66
Which of the following is the most fundamental characteristic of an AI-based problem-solving approach?
Options :
1. It relies on exact mathematical solutions for every scenario.
2. It always requires complete information and perfect data.
3. It attempts to mimic human reasoning by using heuristics and knowledge representation.
4. It avoids learning from experience and sticks to fixed rules.

You might also like