6-6L
Entrance Examination
Ph.D. in Computer
(2or4l Science
Time: 2 Hrs.
Hall Ticket Number:
Max. Marks:75
INSTRUCTIONS
1. Write your hall ticket number in the box above and on the OMR sheet.
2. This test is for 2 hours duration carryi ngTlmarks.
3. All answers should be marked clearly in the OMR sheet.
4. Every correct answer gets I(ONE) mark. There is negative marking of 0.33 marks for every wrong answer.
5. Do all the rough work only in the pages provided in the question booklet, nowhere else.
6. Use of non-programmable calculator and log table is allowed.
7. Handover the OMR answer sheet to the lnvigilator before leaving the examination hall.
8. The use of cellphone is strictly prohibited in the examination hall. All
cellphones must be switched off when in you are in examination hall.
G-62-
Entrance
Examination
(2014)!h.D. in
Cornputer Science1.
One wayof
showingthat
onestring is
equalto
anotherstring is to
compare and match them character by character.What
happensif
we allowboth
the stringsto
beof
i,nfinite length?A.
The method fails because we can only show that thetwo
stringsare
not equoJ.B.
The method tails because we can only show that the two strings are equal.C.
The method works correctly and tellsif
the strings are equal or not.D.
The method works onlyif
thestrings
are nurneric.2. In the C
Programming Language, arrays can be definedin two
ways.The first
isstatic: int a[4000] [3000];
the second is dynamic: declare asint *{rdi
and thenallocate memory using
malloc
O. Which
of the following is then TRUE?A. In
thefirst
case, memoryis
cont'iguous whilein
the second ca.se, memoryis
not contiguous.B. In the first
case, elementsmay be
aceessed asa[i] [j], while in the
second,they cannot be accessed so.
C.
Irr thefirst
case, the array elernents are storedin
rour-major order, whilein
the second t-h"y are storedin
column-major order.D.
None ofthe
above.3.
If.fl,edbility
rs defined a.s having ma>cirnum choicein
cache placement, which of the following is correctly orderedin
ascending order offlexibility?
A. Direct
Mapping, Set-Associative Mapping, Associative MappingB.
Set-Associative Mapping,Direct
Mapping, Associative MappingC.
Associative Mapping, Set-Associative Mapping,Direct
MappingD.
None ofthe
above.4.
Heapsort
may be considered asA.
Insertion sort done on a heap data structure insteadof
a list.B.
Selection sort done on a heap data structure insteadof
alist.
C.
Bubblesort
done on a heap data structure instead of a list.D.
None ofthe
above.5. Which
of the following isNOT
a feature of the Von Neumann architecture?A.
Storage spacefor
prograrns.B.
Storage spacefor
dataC.
Uniquenext
instructionfor
execution.D.
Separating intructions from data.t-
q-ez
Entrance Examination (2014)
6.
The correctresult
of. Iedcograph'ically sorting109, 20, LLg, 2,207, 27,
t9 in
ascending order is:A.
19, 109,Llg,
2, 20, 27, 207B.
109, 119, 19,2,2A,27,207
c.
109, 119, 19,2,20,207,27
D.
2, 19, 20, 27, 109, 119,
2077. All IP
addressesin the
range 186.220.64.0to
186.220.71.254 arekept in
aVLAN.
The correct netmask so
that
messages are broadcast onlywithin this VLAN
isA.
186.22A.255.255B.
186.220.248.0c.
186.220.248.255D.
196.220.8.08.
Which sentence can be generatedby:
S+ aS
IbA, A -> d
I ccAA.
aadbB.
bccdddC.
aabccdD.
None of the above9.
Which sort uses features of the keyto
operatein
I'inear time relativeto
the number of elementsin
the array?A.
Quick SortB.
Merge SortC.
Radix SortD.
Bubble Sort10. Convert EAEAEA
in
hexadecimalinto
octal.A.
76767676B.
76737672c.
76727672D.
7657537211.
Which
of the following decision procedures doesNOT
have exponentialtime
com- plexity?A.
Graph-colouringProblemG- f,z-
Entrance
Examination
(20L4 Ph.D.in
Computer ScienceB.
Tbavelling Salesperson ProblemC. Hamiltonian Circuit
ProblemD.
Linear Programming Problem12.
Simplify
the following boolean expressi on:2ryz' + xy'z' + r'yz'?
A. fry + A'z' + r'A
B. fry + frz' + fi'zt C. (y +
z')nD. (r +
U)z'13.
Which
ofthe
following problems is solvable?A.
Determiningif
a universalThring
machine and someinput will halt
B. Writing
a universal Ttrring machineC. Determining if a
universalThring
machinecan be written in
fewerthan
/cinstructions for some /c
D.
Determiningif
anarbitrary T[ring
machine is a universalTtrring
machine How many possible bytes have exactly threebits on
(i.e.,bit :
true)?A. 8*7 B. 8*.7*6 C. 8x3
D.
None ofthe
aboveWhat
isthe
valueof
^F'()
usingthe
following procedure?function F(k: integer) : integer;
begin
if
(t<else F := F(k-l) * f(k-2) + F(k-3);
end;
A.5 El.6
c.7
D.8
Queues serve a
major
role in:A.
simulation of recursion 14.15.
16.
q-6,
Entrance Examination (2014) Ph.D.
in
Computer ScienceB.
simulation ofarbitrary
linked listsC.
expression evaluationD.
simulation oflimited
resource allocation17.
What is
T|aefor
a completebipartite
graph K(3,3)?A. it
is a planar graphB. it
requires three coloursto
beminimally
colouredC. it
is non-planarD. it
is isomorphicto
K(2,4)18.
A
complete binary tree of level 5 has how many nodes?A.
15B.
63c.
25D.
7L19.
In the
following Karnaugh rnapwith don't
care states, which valuesof X
andY
would minirnize the final function's expression length?
0 0 x
00110 lY 10 0 0 00 A. X_\rY:0 B. X : 0,Y -
1C. X : I,Y :
0D. X : L,Y :
120.
Thegrarnma,rG: <{S},{0, 1},P,5 >,whereP: {S-+,9,9, S+0^91, S->
1,S0, S
+ empty\ will
generate a:A.
Context-free languageB.
Context-sensitive languageC.
Regular languageD.
Recursively enumerable language 2L.In
Question 20, the language generated is?A. {0"1"
wheren )
0}B.
{0'n1" wheren > 0} U {1"0"
wheren >
0}C. {0-10
whereffi,k > 0} U {1*0u
wherem,k > 0}
D. {I4l
whereW
has an equal number of 0's andI's}
-t
G- Gz
Entrance
Examination
(20L4)Ph.D. in
Computer ScienceAnswer Questions 22
-
25 usingthe
following reading.passage:Since
the
Hawaiian Islands have never been connectedto other land
masses, thegreat variety of plants in Hawaii must be a result of the
long-distance dispersalof
seeds,a
processthat
requiresboth a method of transport and an
equi"ralence betweenthe
ecology ofthe
source area andthat
ofthe
recipient area.There is
sornedispute about the method of transport involved.
Some biologists arguethat
ocean andair
currents are responsiblefor the transport of plant
seedsto Hawaii. Yet
the results offlotation
experiments andthe
low temperatures ofair
currents castdoubt on
these hypotheses.More
probableis bird transport,
eitherexternally by
accidental attachmentof the
seedsto
feathers,or internally, by
the swallowingof fruit
and subsequent excretionof the
seeds.While it is likely that
fewer varieties
of plant
seeds have reached Hawaiiexternally than internally
more varieties are knownto
be adaptedto
externalthan to internal transport.
22.
The author
ofthe
passage ismainly
concernedwith
A.
discussingdifferent
approaches biologists have takento
testing theories aboutthe distribution
of plantsin
HawaiiB.
discussing different theories about thetransport
of pla,nt seedsto
HawaiiC.
discussingthe
extentto
whichair
currents are responsiblefor the
dispersalof plant
seedsto
HawaiiD.
resolving a dispute aboutthe adaptability
ofplant
seedsto bird transport 23. The author
mentionsA.
two methods oftransport
of seedsto
Hawaii, namelg currents (ocean and air) and birdsB. that
Hawaiian ecology doesnot
matchwith
any other ecology ofthe
worldC. that the plant
variety is dueonly to the
ecology innateto
HawaiiD.
None ofthe
above 24.The author
assertsthat
A.
Hawaiianplant variety
evolved independentlyfrom flora in other parts of
the worldB. birds
cannot carry plant
seeds long distancesC. bird transport
happens more dueto
swallowing and subsequent excretionof
seeds
D. bird transport is more likely due to
accidentalattachment of the
seedsto
feathers
25.
The author
mentionsthe
results of fl,otation experiments onplant
seed,s most prob-ably in
orderto
26.
G- (u
A.
support the claimthat
thedistribution
of plantsin
Hawaii isthe
result of the long-distance dispersal of seedsB. lend credibility to the
thesisthat air
currents providea
methodof transport for plant
seedsto
HawaiiC.
suggestthat
the long-distance dispersal of seeds is a processthat
requires long periods of timeD.
challengethe claim that
oceanplant
seedsto
Hawaiicurrents are.responsible
for the transport
ofConsider a schema
R(A, B, C, D)
andfunctional
dependenciesA -+ B
andC ->
D.
Then the clecomposition ofR into R1 (A, B)
and R2(C,D)
isA.
losslessjoin but not
dependency preservingB.
dependency preservingbut not
losslessjoin
C. not
dependency preserving andnot
loss lessjoin
D. part
dependency preserving and losslessjoin
Given relations
R(*, x)
and S(V,,), the
resultof
selectdistinct w,
Xfrom R,
S is guaranteedto
be same asR,
ProvidedA. R
and S have no duplicatesB.
S has no duplicates andR
is non-emptyC. R
and S have the same number of tuplesD. R
has no duplicates and S is non-empty28.
Suppose(A, B) and (C,D) *r two relation
schemas.Let r1
andr2
bethe
corre- sponding relation instances.B is
a foreign keythat
refersto C in
12.If
.datain
11 and 12 satisfy referentialintegrity
constraints, whichof the
followingis
ALWAYS TRUE?A. IIc(rz) -
IIa(rt) * o B. Ilr(rt) : [Ic(rz) - a
C. Ila(rr) - fIc(rz) # s
D. tlr(rt) - IIc(rr) - s
29. Consider
the
following relationsA, B, C.
How many tuples doesthe result of
the following relational algebra expression contain? Assumethat the
schema ofA
U B isthe
same asthat
of A.27.
Entrance
Examination
(2014in
Computer ScienceA.7
(AuB) * A.Id>
40vc.Id,.sC
I
Entrance
Examination
(2014)q-6u
Ph.D.
in
Computer ScienceId Name Ag Id Name Ag"
Shreya
Hari Rohit Rohit
Table
1:
TableA
Table2:
Table BId Name
Age22A2
022100
01Table
3:
Table B8.4 c.5
D.9
30.
Considerthe
above tablesA, B and C. How many tuples
doesthe result of
thefollowing
SQL query contains?SELECT A.id FROM A
WHERE
A.age> ALL (SELECT
B.ageFROM
BWHBRE
B.name- "Arun")
4.3
E}.0
c.
1D.4
Relation
R is decomposed using a set offunctional
dependencies,F,
andrelation
Sisdecomposed using another set of
functional
dependencies,G.
One decgmpositign is defirriielyBCNF,
the other isdefinitely
3NF,but it
isnot
known which is which.To make a guaranteedidentification, which one of the following tests should be used on
the
decompositions?(Assumethat the
closuresof F
andG
are available).A.
Lossless-joinB. BCNF
definitionC. 3NF definition
D.
Dependency-PreservationConsider a table
T in
a relational databasewith
a key fieldK. A
B-tree of order p is used as an access structure onK,
wherep
denotes themurimum
number of tree pointersin
a B-tree index node. Assumethat K is
10 bytes long; diskblock
size isitz
Uyt.s; each data pointerD
is 8 bytes long and each blockpointer PB
is 5 bytesT2 15 99
Arun
ShreyaRohit
60 24 11
24 40 20 11 15
25 98 99
10 99
31.
32.
G -G2-
Entrance
Examination
(2014)Ph.D. in
Computer Sciencelong. In
orderfor
each B-tree nodeto fit in
a single disk block, the mrucimurn valueofpis A.
22B.
23c.
32D.
2Agg. A B+-
tree index isto
bebuilt
onthe
Nameattribute of the relation STUDENT.
Assume
that all student
names areof length 8
bytes,disk
blocks areof
size5I2
bytes, and index pointers areof
size 4bytes.
Giventhis
scenario,what would
be the best choice of the degree(i.e.
the number of pointers per node) of the B+- tree?A.
42B.
43c.
44D.
1684.
Consider a hashtable of
size seven,with starting index
zero, and a hash function (3r +a)
mod 7.
Assuming the hash table isinitially empty
which of the following isthe
contents ofthe
table whenthe
sequence 1, 3,8,
10 is insertedinto the
table using closed hashing? Notethat -
denotes an empty locationin the
tableA.
1,g,
10, _,_,_, 3B.
1,-,-,-,-,-,
3c.
1, 10, 8, _,_,_, 3D.
g, _,_,_,_,_, 1o35. Which
ofthe
following best describes sourcerouting
concept?A.
The source sends packets for next hop router for forwarding according to router's tablesB.
The source relies on OSPFoptimal
approach for finding the route to destinationfrom the
OSPF routersC. A
sequence of forwarding router's addresses is generatedat
source and enclosedin
theIP
packet header.D.
None ofthe
above.30. CSMA/CA is
usedin IEEE
802.11 seriesof
standards.Which of the
following is most appropriateto
describeits
function?A.
Set up medium access control using a token.B.
Set up medium access controlin
which hosts maytransmit
on the same channel simultaneously.q- Qz- I
Entrance Examination
QAU
Ph.D.in
Computer Science37.
C.
Establish a sequence of RTS and CTS packetsto
sense the channelutilisation.
D.
To reduce transmission errorsin
a network.Congestion collapse
in
a network refers mainlyto
whichof
these?A. A
denial-of-service attackB. The
uncontrolled cycle of increased retransmissions dueto
dropped packets by routersC. A
problem caused dueto
hacking of webserversD.
The uncontrolled injection of packetsinto
firewall Network Address Tlanslation ismainly
used forA.
Separation of host addressesfrom
the outer networkB. Finding the
next hostfor
forwarding packetsfrom
a domainC. To
increase the speed of accessing the InternetD.
Accessing a39.
Three-way handshake is used forA.
Dropping aTCP
connectionB.
Reliable establishmentof
a connectionin theInternet tansport
layerC. Multiplexing
between three hosts on the sameLAN
D.
Exchange of packetsat
datalink
layer 40.A
DNS server is most useful forA,
Findingthe
address of a host given atext
queryB.
Send anHTTP
error messageC.
Send anICMP
error messageD. Finding the
address ofthe
next forwarding router4L TcP
is often referredto
a^s slef-clocking becauseA. TCP
encodes a clock signalin
each packetit
sendsin the TCP
headerB. TCP
allows special encoding of clock signalin
packet bodyC. TCp
uses acknowledgmentsto trigger
increasein
congestion window sizeD. TCp
allowsfor
adjustmentof time
for retransmissionsin
packet networks 42. To seethat
a sender's data mayfit into
the receiver's buffgr,TCP
adopts a methodknown as
A.
RetransmissionB.
DropPing of Packets38.
G -6u
Entrance Examination (2014) Ph.D.
in
Computer ScienceC.
Congestion controlD.
Flow control43.
It is
knownthat SMTP
protocol usesonly ASCII data. Which of the
following allows for sending anykind
of data?A. MIME
B. TIFF
C.
MIPSD.
JPEG44. Software consists
of
A.
Set of instructions*
Operating SysternB.
Programs*
Docurnentation*
Operating ProceduresC.
Programs*
Hardware ManualsD.
Set of programs45.
Project risk
factor is consideredin
A.
Waterfall modelB. Prototyping
modelC.
Spiral modelD. Iterative
enhancement rnodel46. The outcome of construction phase may be treated as
A.
Product releaseB.
Beta releaseC.
Alpha releaseD. All
of the above47.
EAST stands forA.
Functional Application Specification TechniqueB.
Facilitated Application Specification TechniqueC.
FastApplication
Specification TechniqueD.
None of the above.48. Which
of the following isNOT
a size measurefor
software?A.
LOCB.
Rrnction countC.
Cyclomatic complexity10
Entrance
Examination
(20L4)G- 6L
Ph.D.
in
Computer Science51.
49.
50.
52,
53.
D.
Holstead's program lengthThe most desirable form of coupling is
A. Control
couplingB. Data
couplingC.
Common couplingD.
Content couplingFor a function of
n
variables, boundary value analysis yieldsA.
4n*
2test
casesB.
4n*
1 test casesC.n*4testcases D.
None of the above.The process of transforming a model
into
source code isA.
Forward engineeringB.
Re.engineeringC. Restructuring
D.
Reverse engineeringWhich
of the following isNOT TRUE with
respectto
a simple graph?A.
Everyfully
connected graph is a treeB.
Everyminimally
connected graph is a treeC.
Every graphwith n
nodes and n- I
edges is a treeD.
Every connected graphwith
no cycles is a treeThe number of sub-strings
that
can be obtained from a string of lengthn
isA. xnl
B. x2n C. *n2 D. Nnn
When data to
be sortedis
largerthan the
mainalgorithm
would you prefer?A.
Heap sortB.
Inserticin sortC.
Quick sortD.
Merge sort54. memory capacity, which sorting
G -6>
Entrance Examination (2014) Ph.D.
in
Computer Science55.
VFAT, EXT2, EXT3
a,re examplesof
A. File
system typesB.
Hard diskformatting
commandsC.
CPU architecturesD. Instruction
set design formats56.
Which
of the following is EALSEwith
respectto
regular languages?A.
Regular languages form a subset of context free languagesB.
Some regular languages can beinfinite
C.
Everyfinite
language is regularD.
Context free languages form a subset of regular languages 57. Putnam resource allocation model is based onA.
Putnam theory of software managementB.
F\rnction pointsC.
Norden/Rayleigh curveD.
Bochm's observations on man58,
Consider the fiveletters with
percentage of occurrencein the text
as a:
35To, b-
20To,c -
20Yo, cl:
L|Yo, e-
L}To.If
abinary
tree is generated using Huffrnarr code algorithm,with
assigning 0to
everyleft
"dge and 1
to
everyright
edge, then the codefor letter
e is:A.
10B.
110c.
trl1D.
01159.
Which
design paradigm is based on Principle of Optimality?A. Divide
and conquerB.
Greedy techniqueC.
BacktrackingD.
Dynamic Programming60.
Given SL: AAACCGTGAGTTATTCGTTCTAGAA
and 52-
CACCCCTAAG-GTACCTTTGGTTC,
Longest Comrnon Subsequence (LCS) is:A. ACCTAGTACTTG
B. ACCTAGTACGTTG
C. ACCTAGTACTGTG
L2
q-Qz^
Entrance
Examination
(2014)Ph.D. in
Computer ScienceD. ACCTAGTACTTTG
61.
Consider thejoin of
arelation R with relation
,S.If R
hasrn
tuples andS
has n tuples,then the
mocimum size ofjoin
is:A.
n'LnB. m*L
C.
(m+
n)12D. 2(* + n)
62.
If text T
is of size n and patternP
of size rn then theKnuth-Morris-Pratt Algorithm for pattern
matching runsin time
A. O(^' + n) B. O(rlogrn) C. O(* *
n)D. O(*")
03. The Big-Oh
estimatefor
analgorithm that
takes 8n log n*
4nB steps isA. O(r
logn)
B.
O@81c. o(")
D.
None ofthe
above.64.
Which
command is usedto
remove an indexfrom the
databasein
SQL?A. DROP INDEX
B. REMOVE INDEX
C. ROLL BACK INDEX
D. DELBTE INDEX
6b. A relational
scheme isin ... if it
isin lNF
andif
aII non primeattributes
arefully functionally
dependent on therelation
key'A.
SecondNormal
FormB.
Boyce Codd Normal FormC.
F-ourthNormal
FormD. First Normal
Form66. A binary
tree has n leaf nodes. The number of nodes of degree 2in this
tree is?A. n-L
B.n
Entrance Examination (2014)
Q-62
Ph.D.
in
Computer Science67.
c.
2nD.
log2nA
databasetrigger
is:A. A
statementthat
is executed by user when debugging an application programB. A
condition the system tests forthe validity
of the database userC. A
statementthat is
executedautomatically by the
system asa
side eft'ectof
rnodification on the databaseD. A
statementthat
enablesto start
any DBMS The naturaljoin
is equalto
:A. Comtination
of Union and Cartesian productB.
Combination of selection and Cartesian productC.
Combination of projection and Cartesian productD.
Cartesian ProductConsider
the
followingmultiplicative
loop of some program.What
isthe
runningtime
ofthis
loopin
terms of big-oh notations:m
for i:= t to n do begin
n:=
m* 3;
for j:= 1 to n
do{Sonething that is 0(1)}
end;
A.
O(n * rn3)B.
O(rrt)c. o(3")
D.
O(3-,)A
logical schema isA.
standard way of organizing informationinto
accessible partsB.
depends on physical storageC.
describes how data is actually stores on the diskD.
the entire databaseWhich one is a
virtual
tablethat
draws its data from the result of an SQL StrLECT statement.A.
Synonym 68.69.
70.
7L.
T4
-1
q-62-
Entrance Examination (2014) Ph.D.
in
Computer ScienceB.
ViewC.
TfansactionD,
Sequence72.
A Btree
of order rn haq ma:<imum of...
childrenA. m*l
B. rn-L c, m/2
D.m
73' If
Cache Size is 64K8, Block size is 328 and the cache is Two-Way Set Associative.For a 32-bit physical address, the division between Block Ofiset, Index and Tag are:
A.
10bits,
10bits,
10bits
B.
17bits,
32bits,
16bits
C,
32bits,
64bits,
22bits
D.
5bits,
10bits ,
17bits
:, 74. RAID
is usedfor
A. Fault
tolerance and Performancein multiple
disksB.
Usedfor
generating speed of data accessC.
Resource sharing toolD. Rotating
disks for access75. When a process is created using
forkQ, what
is shared between parent process andchild
process?A.
StackB.
Code segmentsC. VA
handlesD.
Heap