OCET-2012
Question Booklet Series : A Sr. No. :
Important :Please consult your Admit Card / Roll No. Slip before filling your Roll Number on the Test Booklet and Answer Sheet.
Roll No.
Answer Sheet Serial No.
Signature of the Candidate :
Subject : M.E. (Computer Science and Engineering/Information Technology)
Time : 90 minutes Number of Questions : 75 Maximum Marks : 75
DO NOT OPEN THE SEAL ON THE BOOKLET UNTIL ASKED TO DO SO
INSTRUCTIONS
1. Write your Roll No. on the Question Booklet and also on the OMR Answer Sheet in the space provided and nowhere else.
2. Enter the Subject and Series Code of Question Booklet on the OMR Answer Sheet. Darken the corresponding bubble with Black Ball Point /Black Gel pen.
3. Do not make any identification mark on the Answer Sheet or Question Booklet.
4. To open the Question Booklet remove the paper seal (s) gently when asked to do so.
5. Please check that this Question Booklet contains 75 questions. In case of any discrepancy, inform the Assistant Superintendent within 10 minutes of the start of test.
6. Each question has four alternative answers (A, B, C, D) of which only one is correct. For each question,
darken only one bubble (A or B or C or D), whichever you think is the correct answer, on the Answer Sheet
withBlack Ball Point / Black Gel pen.
7. If you do not want to answer a question, leave all the bubbles corresponding to that question blank in the
Answer Sheet. No marks will be deducted in such cases.
8. Darken the bubbles in the OMR Answer Sheet according to the Serial No. of the questions given in the
Question Booklet.
9. Negative marking will be adopted for evaluation i.e., 1/4th of the marks of the question will be deducted for each
wrong answer. A wrong answer means incorrect answer or wrong filling of bubble.
10. For calculations, use of simple log tables is permitted. Borrowing of log tables and any other material is not allowed.
11. For rough work only the sheets marked “Rough Work” at the end of the Question Booklet be used.
12. The Answer Sheet is designed for computer evaluation. Therefore, if you do not follow the instructions
given on the Answer Sheet, it may make evaluation by the computer difficult. Any resultant loss to the
candidate on the above account, i.e., not following the instructions completely, shall be of the
candidate only.
13. After the test, hand over the Question Booklet and the Answer Sheet to the Assistant Superintendent on duty.
14. In no case the Answer Sheet, the Question Booklet, or its part or any material copied/noted from this
Booklet is to be taken out of the examination hall. Any candidate found doing so, would be expelled from
the examination.
15. A candidate who creates disturbance of any kind or changes his/her seat or is found in possession of any
paper possibly of any assistance or found giving or receiving assistance or found using any other unfair
means during the examination will be expelled from the examination by the Centre Superintendent /
Observer whose decision shall be final.
16. Telecommunication equipment such as pager, cellular phone, wireless, scanner, etc., is not
permitted inside the examination hall. Use of calculators is not allowed.
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 2
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 3 [Turn over
M.E.(Computer Science and Engineering / Information Technology)/A
1. To implement Dijkastra's shortest path algorithm on unweighted graphs so that it runs
in linear time, the data structure to be used is :
(A) Queue (B) Stack
(C) Heap (D) B-Tree
2. The following numbers are inserted into an empty binary search tree in the given order :
10, 1, 3, 5, 15, 12, 16. What is the height of the binary search tree (the height is the
maximum distance of a leaf node from the root) ?
(A) 2 (B) 3
(C) 4 (D) 6
3. How many distinct binary search trees can be created out of 4 distinct keys ?
(A) 5 (B) 14
(C) 24 (D) 42
4. A Priority-Queue is implemented as a Max-Heap. Initially, it has 5 elements. The levelorder
traversal of the heap is given below : 10, 8, 5, 3, 2. Two new elements 1 and 7 are
inserted in the heap in that order. The level-order traversal of the heap after the
insertion of the elements is :
(A) 10,8,7,5,3,2,1, (B) 10,8,7,2,3,1,5
(C) 10,8,7,1,2,3,5 (D) 10,8,7,3,2,1,5
5. Give a 16 bit value 1001101011001101. What operation must be applied in order to
complement middle 8 bits ?
(A) XOR 0000111111110000 (B) AND 1111000000001111
(C) OR 1111101010101111 (D) None of these
6. Number of swaps required to sort n elements using selection sort in the worst case :
(A) (n2) (B) (n log n)
(C) (n) (D) (n2 log n)
7. Suppose an unpipelined processor with 25ns cycle time is divided into 5 pipeline stages
with latencies of 5,7,3,6 and 4 ns. If pipeline latch latency is 1 ns, what is cycle time of
resulting processor ?
(A) 8 ns (B) 9 ns
(C) 10 ns (D) 12 ns
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 4
8. Consider the following C function :
int f(int n)
{ staticinti = 1;
if (n > = 5) return n;
n = n + i;
i ++;
return f(n);
}
The value returned by f(1) is
(A) 5 (B) 6
(C) 7 (D) 8
9. If the following program is executed and user entered number 4 as input, then output is :
#include <stdio.h
void main( )
{ int a, b = 8 ;
scanf("%d", & a);
if (a = 0) b*=2; else b/=2;
printf("%d",b++);
}
(A) 16 (B) 8
(C) 4 (D) 5
10. If in a program it is required that a local variable must retain its value during various
function calls to it, its storage must be :
(A) Static (B) Register
(C) Auto (D) Extern
11. The output of the following program will be :
#include<stdio.h
void main ( )
{ char *ptr;ptr="OCET";putchar(*ptr);}
(A) T (B) O
(C) OCET (D) Syntax error
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 5 [Turn over
12. Consider the following C program :
main ( )
{ int x, y, m, n ;
scanf ("%d %d", &x, &y); / * Assume x > 0 and y > 0* /
m = x; n = y ;
while (m ! = n)
{ if (m >n)
m = m — n;
else n = n - m ;
}
printf("%d",n); }
The program computes
(A) x + y, using repeated subtraction (B) x mod y using repeated subtraction
(C) the greatest common divisor of x and y (D) the least common multiple of x and y
13. A computer has 32 bit instructions and 12 bit address. If there are 250 two address
instructions how many maximum one address instructions can be formulated ?
(A) 26576 (B) 27456
(C) 24576 (D) 25476
14. Booth's coding in 8 bits for (-57)10 is :
(A) 0-100+1000 (B) 0-100+100-1
(C) 0-1+100-10+1 (D) 00-10+100-1
15. If (73)x(in base-x number system) is equal to (54)y (in base-y number system), the possible
values of x and y are :
(A) 8,16 (B) 10,12
(C) 9,13 (D) 8,11
16. A machine stores floating point numbers in 7-bit word. The first bit is stored for sign of
the number, the next three for the biased exponent and the next three for the magnitude
of the mantissa. In order to represent 35.35 in the above representation, the error would
be :
(A) underflow (B) overflow
(C) NaN (D) No error will be registered
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 6
17. The probability that two friends share the same birth month is :
(A) 1/6 (B) 1/12
(C) 1/144 (D) 1/24
18. Suppose A is a finite set with n elements. The number of elements in the largest
equivalence relation of A is :
(A) 1 (B) n
(C) n + 1 (D) n2
19. The number of distinct relations on a set of 3 elements is :
(A) 8 (B) 9
(C) 18 (D) 512
20. In a population of N families, 50% of the families have three children, 30% of the
families have two children and the remaining families have one child. What is the
probability that a randomly picked child belongs to a family with two children ?
(A) 3/23 (B) 6/23
(C) 3/10 (D) 3/5
21. Two 16:1 and one 2:1 multiplexers can be connected to form a :
(A) 8:1 multiplexer (B) 16:1 multiplexer
(C) 32:1 multiplexer (D) 64:1 multiplexer
22. If P1 is NP complete and there is polynomial time reduction of P1 to P2, then P2 is :
(A) NP complete (B) Not necessarily NP complete
(C) Can not be NP complete (D) None of these
23. A PDM behaves like a TM when the number of auxiliary memory it has, is :
(A) 0 (B) 1 or more
(C) 2 or more (D) None of the above
24. A grammar that is both left and right recursive for a non-terminal, is :
(A) Ambiguous
(B) Unambiguous
(C) Information is not sufficient to decide whether it is ambiguous or not
(D) None of the above
25. Which one of the following regular expressions is NOT equivalent to the regular
expression (a + b + c)* ?
(A) (a* + b* + c*)* (B) (a* b* c*)*
(C) ((ab)* + c*)* (D) (a*b* + c*)*
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 7 [Turn over
26. A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum
number of hosts that can belong to this subnet ?
(A) 14 (B) 30
(C) 62 (D) 126
27. The address resolution protocol (ARP) is used for :
(A) Finding the IP address from the DNS
(B) Finding the IP address of the default gateway
(C) Finding the IP address that corresponds to a MAC address
(D) Finding the MAC address that corresponds to an IP address
28. One of the header fields in an IP datagram is the time to live(TTL) field. Which of the
following best explains the need for the field ?
(A) It can be used to prioritize the packets
(B) It can be used to reduce delays
(C) It can be used to optimize throughput
(D) It can be used to prevent packet looping
29. Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming
signal is 46.4 ms. The minimum frame size is :
(A) 94 (B) 416
(C) 464 (D) 512
30. In a network of LANs connected by bridges, packets are sent from one LAN to another
through intermediate bridges. Since more than one path may exist between two LANs,
packets may have to be routed through multiple bridges. Why is the spanning tree algorithm
used for bridge-routing ?
(A) For shortest path routing between LANs (B) For avoiding loops in the routing paths
(C) For fault tolerance (D) For minimizing collisions
31. Which one of the following statements is FALSE ?
(A) Any relation with two attributes is in BCNF
(B) A relation in which every key has only one attribute is in 2NF
(C) A prime attribute can be transitively dependent on a key in a 3NF relation
(D) A prime attribute can be transitively dependent on a key in a BCNF relation
32. Assume transaction A holds a shared lock R. If transaction B also requests for a shared
lock on R, it will :
(A) result in a deadlock situation (B) immediately be granted
(C) immediately be rejected (D) be granted as soon as it is released
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 8
33. The fourth normal form (4NF) is concerned with dependencies between the elements of
compound keys composed of :
(A) one attribute (B) two attributes
(C) three or more attributes (D) any number of attributes
34. If a table has Functional dependency from A to B and A is not the candidate key, then
which of the following is true ?
(A) Table is not in 2NF (B) Table involves some redundancy
(C) Data is not correct (D) None of the above
35. Let E1 and E2 be the two entities in an ER diagram with simple single valued attributes.
R1 and R2 are the relationships between E1 and E2, where R1 is one-to-many and R2 is
many-to-many. R1 and R2 do not have any attributes of their own. What is the maximum
number of tables required to represent this situation in the relational model ?
(A) 2 (B) 3
(C) 4 (D) 5
36. Consider the following where clause
WHERE A.no=B.no(+)
The above outer join lists :
(A) All matching & non-matching rows of table B
(B) All matching & non-matching rows of table A
(C) All non-matching rows of table B
(D) All non-matching rows of table A
37. After executing an UPDATE statement, the developer codes a PL/SQL block to perform
an operation based on SQL%ROWCOUNT. What data is returned by the
SQL%ROWCOUNT operation ?
(A) A numeric value representing the number of rows updated
(B) A Boolean value representing the success or failure of the update
(C) A VARCHAR2 value identifying the name of the table updated
(D) A LONG value containing all data from the table
38. Which of the following concurrency control protocols ensure both conflict serializability
and freedom from deadlock ?
(i) 2-phase locking
(ii) Time Stamp ordering
(A) (i) only (B) (ii) only
(C) both (i) and (ii) (D) neither (i) nor (ii)
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 9 [Turn over
39. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :
(A) a B-tree file (B) an indexed file
(C) a hashed file (D) A sequential file
40. Which of the following is true concerning open-source DBMS ?
(A) Is not competitive against PC-oriented packages and is fully SQL compliant
(B) Is competitive against PC-oriented packages and is not fully SQL compliant
(C) Is free or nearly free database software whose source code is not publicly available
(D) Is free or nearly free database software whose source code is publicly available
41. Which of the following types of maintenance takes the maximum chunk of total
maintenance effort in typical commercial application ?
(A) Adaptive maintenance (B) Corrective maintenance
(C) Preventive maintenance (D) Perfective maintenance
42. What is the output of the following program :
#include<stdio.h
main( )
{
enum status {low, medium, high};
enum status rain; rain = 1 ;
if(rain = = low)
printf("Rain =%d", rain);
}
(A) 0 (B) 1
(C) No output (D) Error
43. What is the availability of a software with the following reliability figures ? Mean Time
Between Failure (MTBF) = 25 days, Mean Time To Repair (MTTR) = 6 hours :
(A) 1% (B) 24%
(C) 99% (D) 99.009%
44. Which of the following statements are valid in C, if p is a pointer ?
(A) p = &x (B) &x++
(C) &x=&y (D) &x--
45. An abstract data type is :
(A) Same as abstract class
(B) A data type which can not be instantiated
(C) A data type for which only the operations defined on it can be used but none else
(D) All of the above
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 10
46. C++ encourages structuring a software as a collection of components that are :
(A) Highly cohesive and loosely coupled
(B) Not highly cohesive but loosely coupled
(C) Highly cohesive and tightly coupled
(D) Not highly cohesive but tightly coupled
47. Disk scheduling is used to decide :
(A) Which disk should be accessed next
(B) The order in which disk access requests must be serviced
(C) The physical location where files should be accessed in the disk
(D) None of these
48. A system has 6 tape drives, with N processes competing for them. Each process may
need 3 tape drives. The maximum value of N for which the system is guaranteed to be
deadlock free is :
(A) 4 (B) 3
(C) 2 (D) None of the above
49. The size of the decoder to select all memory devices of capacity 256 × 4 each to make a
memory of 4K × 8-bit memory is :
(A) 3:8 (B) 4:16
(C) 5:32 (D) None of the above
50. Which of the following keyword is used to achieve run time polymorphism ?
(A) const (B) explicit
(C) mutable (D) virtual
51. Which one of these will be handled at the HIGHEST priority ?
(A) Interrupt from Hard Disk (B) Interrupt from Mouse
(C) Interrupt from Keyboard (D) Interrupt from CPU temperature sensor
52. Which languages need heap allocation in the run-time environment ?
(A) Those that support recursion (B) Those that use dynamic scoping
(C) Those that allow dynamic data structures (D) Those that use global variables
53. HTML has language elements which permit certain actions other than describing the
structure of the web document. Which one of the following actions is NOT supported by
pure HTML (without any server or client side scripting) pages ?
(A) Embedding web objects from different sites into the same page
(B) Refresh the page automatically after a specified interval
(C) Automatically redirect to another page upon download
(D) Display the client time as part of the page
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 11 [Turn over
54. How much time would it take to transmit a 1024*1024 image with 256 gray levels using a
56K baud modem ? Transmission is accomplished in packets consisting of a start bit, a
byte (8 bits) of information, and a stop bit :
(A) 157.25 sec (B) 167.25 sec
(C) 177.25 sec (D) 187.25 sec
55. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps. What
is throughput of a system (all stations together) produces 250 frames per second ?
(A) 80% (B) 70.4%
(C) 15.2% (D) 8.4%
56. Which one of the following is NOT shared by the threads of the same process ?
(A) Stack (B) Address Space
(C) File Descriptor Table (D) Message Queue
57. A software organization has been assessed at SEI CMM Level 4. Which of the following
does the organization need to practice beside Process Change Management and
Technology Change Management in order to achieve Level 5 ?
(A) Defect Detection (B) Defect Prevention
(C) Defect Isolation (D) Defect Propagation
58. Suppose that two parties A and B wish to setup a common secret key (D-H key) between
themselves using the Diffle-Hellman key exchange technique. They agree on 7 as the
modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their
respective secrets. Their D-H key is :
(A) 3 (B) 4
(C) 5 (D) 6
59. Consider the following message M = 1010001101. The cyclic redundancy check (CRC)
for this message using the divisor polynomial x5 + x4 +x2 + 1 is :
(A) 01110 (B) 01011
(C) 10101 (D) 10110
60. Which of the following statements is FALSE regarding a bridge ?
(A) Bridge is a layer 2 device
(B) Bridge reduces collision domain
(C) Bridge is used to connect two or more LAN segments
(D) Bridge reduces broadcast domain
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 12
61. A host is transmitting a video over the network. How does the transport layer allow this
host to use multiple applications to transmit other data at the same time as the video
transmission ?
(A) It uses error control mechanisms
(B) It uses a connectionless protocol only for multiple simultaneous transmissions
(C) It uses multiple Layer 2 source addresses
(D) It uses multiple port numbers
62. Which of the following statements is TRUE about CSMA/CD ?
(A) IEEE 802.11 wireless LAN runs CSMA/CD protocol
(B) Ethernet is not based on CSMA/CD protocol
(C) CSMA/CD is not suitable for a high propagation delay network like satellite network
(D) There is no contention in a CSMA/CD network
63. A system uses FIFO policy for page replacement. It has 4 page frames with no pages
loaded to begin with. The system first accesses 100 distinct pages in some order and
then accesses the same 100 pages but now in the reverse order. How many page faults
will occur ?
(A) 196 (B) 192
(C) 197 (D) 195
64. Which of the following is the programmable internal timer ?
(A) 8250 (B) 8251
(C) 8253 (D) 8275
65. The clock interrupt handle on computer requires 2 msec per clock tick. The clock runs at
60hz. What percent of CPU time is devoted to the clock ?
(A) 1.2 (B) 7.5
(C) 12 (D) 18.5
66. Memory access in RISC architecture is limited to instructions :
(A) CALL and RET (B) PUSH and POP
(C) STA and LDA (D) MOV and JMP
67. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/on the :
(A) stack pointer (B) accumulator
(C) program counter (D) stack
68. The main memory of a computer has 2m blocks while the cache has 2c blocks. If the
cache uses set associative mapping scheme with two blocks per set, then block k of the
main memory maps to the set :
(A) (k mod m) of cache (B) (k mode c) of cache
(C) (k mod 2c) of cache (D) (k mod 2m) of cache
M.E.(Comp. Sc. and Engg./Inf. Tech.)FRH-41350-A 13 [Turn over
69. Registers which are partially visible to users and used to hold conditional codes are
known as :
(A) PC (B) Memory address registers
(C) General purpose registers (D) Flags
70. The access time of a cache memory is 100 ns and that of main memory is 1000 ns. It is