Академический Документы
Профессиональный Документы
Культура Документы
TarGATE16
www.gateforum.com
General Aptitude
Q. No. 1 5 Carry One Mark Each
1.
Statements: No bumper is suitor. All blazers are suitor. All tunics are bumpers.
Conclusions: I. Some tunics are blazers.
II. Some suitors are blazers.
III Some bumpers are blazers.
(A) Only II
(B) III and II
(C) Only I
(D) I, II and III
2.
It was _______ on the part of the senate that obstructed the adoption of a revolutionary
teaching methodology in the executive MBA program.
(A) propriety
(B) conservatism
(C) anachronism
(D) effrontery
3.
The mole is a nocturnal insectivorous mammal regarded as pests by gardeners because of their
burrowing activity spoiling lawns and gardens.
A. regarded as pests by gardeners because of their burrowing activity spoiling
B. regarded to be pests by gardeners because of their burrowing activity's spoiling
C. considered as a pest by gardeners because of its burrowing activity spoiling
D. regarded as a pest by gardeners because its burrowing activity spoils
4.
The cost of type 1 sugar is Rs.20 per kg and Type 2 sugar is Rs.40 per kg. If both type 1 and
2 are mixed in the ratio of 3:2, then the price per kg of the mixed variety of sugar is
________Rs.
5.
Two squares are chosen at random on a chess board. What is the probability that they have
side common?
(A) 2
(B) 1
(C) 5
(D) 3
36
17
18
17
Q. No. 6 10 Carry Two Marks Each
6.
In Raisin in the Sun, Lorraine Hansberry does not reject integration or the economic and
moral promise of the American dream; rather, she remains loyal to this dream while looking,
realistically, at its incomplete realization. Once we recognize this dual vision, we can accept
the plays ironic nuances as deliberate social commentaries by Hansberry rather than as the
unintentional irony that Bigsby attributes to the work. Indeed, a curiously persistent refusal
to credit Hansberry with a capacity for intentional irony has led some critics to interpret the
plays thematic conflicts as mere confusion, contradiction, or eclecticism. Isaacs, for example,
cannot easily reconcile Hansberrys intense concern for her race with her ideal of human
reconciliation. But the plays complex view of Black self-esteem and human solidarity as
compatible is no more contradictory than Du Boiss famous, well-considered ideal of ethnic
self-awareness coexisting with human unity, or Fanons emphasis on an ideal
internationalism that also accommodates national identities and roles.
This question refers to the third sentence of the passage, which reads as follows: Indeed, a
curiously persistent refusal to credit Hansberry with a capacity for intentional irony has led
some critics to interpret the plays thematic conflicts as mere confusion, contradiction, or
eclecticism.
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
TarGATE16
www.gateforum.com
The author of the passage would probably consider which of the following judgments to be
most similar to the reasoning of the critics described in the third sentence?
(A) The world is certainly flat; therefore, the person proposing to sail around it is
unquestionably foolhardy.
(B) Radioactivity cannot be directly perceived; therefore, a scientist could not possibly
control it in a laboratory.
(C) The painter of this picture could not intend it to be funny; therefore, its humor must result
from a lack of skill.
(D) Traditional social mores are beneficial to culture; therefore, anyone who deviates from
them acts destructively.
7.
A community college is experiencing high turnover rates among its computer science faculty
members. To rectify this problem, the computer science department head has proposed to the
Dean that beginning next year, starting salaries for computer science instructors be increased
by 10 percent to provide a more competitive pay package.
Which of the following indicates a flaw in the department heads plan?
(A) Computer science faculty members generally indicate satisfaction with the number and
type of classes they are given to teach.
(B) The community college is in a relatively safe area of town with affordable housing.
(C) Local technology companies provide good supplemental consulting work to many faculty
members.
(D) Yearly pay increases for instructors in all departments are set at a level below the current
inflation rate.
8.
A jewelry store sells customized rings in which 3 gems selected by the customer are set in a
straight row along the band of the ring. If exactly 5 different gems are available and if at least
2 gems in any given ring must be different, how many different rings are possible?
9.
If n is a positive integer and n^2 is divisible by 72, then the largest positive integer that must
divide n is
(A) 6
(B) 12
(C) 24
(D) 36
10.
In the graduating class of a certain college, 48 percent of the students are male and 52 percent
are female. In this class 40 percent of the male and 20 percent of the female students are 25
years old or older. If one student in the graduating class is randomly selected, approximately
what is the probability that he or she will be less than 25 years old?
Computer Science Engineering
Q. No. 1 25 Carry One Mark Each
1.
2.
Which of the following statement is correct for specifying A pointer to any array of three
characters?
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
TarGATE16
www.gateforum.com
3.
G is a graph with negative edges. On applying Dijkstras, which is the correct option?
(A) Always terminates but results may be incorrect
(B) Result is correct always
(C) May not terminate
(D) None of these
4.
1
2
A D
CB
C B
AD
D CB
A CB
6.
(A) F1 covers F2
(B) F2 covers F1
(C) F1 F2
7.
(C) a n a m | n,m 0
(B) a 2n | n 0
(D) None of these
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
TarGATE16
8.
The determinant p
p3
evaluates to
(A) 0
(C)
9.
www.gateforum.com
(B)
p q q r r p p q r
p q q r r p
(D) p q r
A dice is tossed thrice. If event of getting an even number is a success, then probability of
getting at least, two successes is
(A)
10.
7
8
(B)
1
4
(C)
2
3
(D)
1
2
For the following data a line y = a + bx is to be fitted by the method of least squares, then a
and b are respectively
xi
-2
-1
yi
(A) 1, 0
(D) 0, 2
11.
Assume that we are designing a reliable byte stream protocol that uses SWP running over
10Mbps Network. Propagation delay is 20Ms & maximum segment lifetime is 40seconds.
Then how many bits are needed for the receiver window size in the TCP?
12.
If the initial sequence number is 1 and it increment the counter by 2,56,000 for every 2 sec,
how long does it take for the counter to wrap around in seconds?
13.
Suppose a sub network x has a subnet mask 255.255.255.224 and host address is
130.127.48.130. What is the subnet work address?
(A) 130.127.48.120
14.
(C) 130.127.48.187
In direct mapping, the presence of one block in cache is abstracting the incoming block
even though the cache is having empty blocks is called as____
(A) Conflict hit
15.
(B) 130.127.48.128
(D) None
Consider the disk drive with the following specification 16 surface, 1024 tracks per surface,
1024 sec tors track,1 KB sec tor rotation speed is 3000 rpm. The disk is operated in Burst
Mode. The processor runs at 600 MHZ and takes 300 & 900 clock cycle to initiate &
complete DMA transfer respectively. If the size of transfer is 20 kB.
What is the percentage of processor time consumed for the transfer operation?
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
16.
TarGATE16
www.gateforum.com
27.58 74.48
(A) 101.9 8
(B) 124.116
(C) 124.18
(D) 100 8
17.
An instruction takes 10ms and a page fault takes an additional 5ms.Calculate the effective
access time in ms if page fault occurs once in every 4 instructions?
18.
19.
(B) S2 only
(C) Both
20.
Out of all the possible permutations, how many of them can be obtained using queue if the
input sequence is 1,2,3n in that order?
2n c n
2n cn
(A)
(B)
(C) 1
(D) n
n 1
n 1
21.
The output Qn of a J-K flip-flop is 0. It changes to 1 when a clock pulse is applied. The inputs
J n and K n are respectively
(A) 0, X
23.
(B) X, 0
(C) X, 1
(D) 1, X
The circuit shown implements a two input NAND gate by using two 2x1 multiplexers. What
are the values of X, Y & Z?
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
TarGATE16
(A) 0, 1, A
(C) 1, 0, A
B
25.
C AB
I0
I1
I0
S
Z
I1
(B) 0, 1, B
www.gateforum.com
The negative value of ' ' for which ex .cos y is the real part of an analytic function
f x iy u x, y i.v x, y , is __________.
27.
(C) A C
28.
(B) pin
(D) segment fragmentation
A B A B C
(D) A C
A B A B C
(B) O(22n)
(C) O(2n)
(D) O(n!)
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
TarGATE16
www.gateforum.com
29.
The time complexity to find an element in a sorted array of n elements such that A[i]=i
(A) O(n)
(B) O(logn)
(C) O(n2)
(D) O(nlogn)
30.
Which of the following time stamp ordering protocol(s) allow(s) the following schedules?
T : W1 A ; W2 A ; W3 A ;R 2 A ; R 4 A :
Time stamps : T1 : 5, T2 :10, T3 :15; T4 : 20
(A) Thomas write rule
(C) Basic time stamp
31.
What binary trees produce same sequence of nodes in both inorder and preorder?
(A) Binary trees with left link of every node as NULL value
(B) Binary trees with right link of every node as NULL values
(C) Binary trees with zero or one node
(D) Both (A) and (C)
32.
33.
I : R1 M, N,O , R 2 M, P,Q
II : R1 M, N,O , R 2 O, P,Q
Which of the decomposition(s) is/are lossless join decomposition?
(A) I only
34.
(B) II only
(C) I and II
Use the standard construction to eliminate left recursion by introducing a new variable S'
which of the following would be one of the productions of the new grammar?
(A) S c
35.
(B) S' a
(C) S' aS
a
7
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
TarGATE16
36.
I.
3, a 5, 7, 2, 3, 4
II.
3, a 4, b 2, 3, 4, 7
III.
3,a 2, 3, 4, 5,7,8
IV.
1, 1, 2, 3, 4
37.
www.gateforum.com
a11 h
Consider the matrix A h a 22
g
f
(B) minimum at x
g
f where a11 a 22 a 33 0
a 33
(A) 0
38.
(B) ez .z c
(C) ez z c
(D) ez z c
M is the set of all 22 real matrices f : M R is defined by f(A)=det A for all A M. then f
is ____ .
(A) one-one but not onto
(B) onto but no one-one
(C) neither one-one nor onto
40.
(D) f 2 g 2 h 2
39.
(C) f 2 g 2 h 2
There are two organization designs a system with different cache configuration
Assume1 word 1 byte .
Organization 1:
Use : Cache capacity 4 k words
Mapping technique Direct
Block size 4 words
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
TarGATE16
www.gateforum.com
Organization 2:
Use : Cache capacity 64 k words
Mapping technique 4 way set Associative
Block size 16 words
The No. of bits for offset, set No, tag No in M.M. address for the organization 2 is:
(A) 4,10,16
(B) 4,11,15
(C) 4,12,14
(D) 5,9,16
41.
Assume a register Ri which is specified by 4-bits , then SUB R0,R1,R2 which is two bytes
long then what is the space assigned to the opcode field (in bits)?
42.
Consider a micro programmed control unit which has 128 instructions each of which takes 16
micro operations. The system supports 16 flag conditions and 54 control signals. If vertical
microprogramming control is used then what is the length of control word (bits/word).
43.
The three stage Johnson counter as shown in figure is clocked at a constant frequency of f c
from the starting state of Q2Q1Qo 101 . The frequency of output Q2Q1Qo will be
(A)
fc
8
f
(B) c
6
(C)
fc
3
(D)
fc
2
J22
QQ22
J1
Q
Q11
JJ02
Q
Q00
k
K22
Q22
Kk11
Q
Q1
Kk0 2
Q0
Q
0
clk
44.
Minimum number of 2 input NAND gates used to perform the function of 2 inputs OR gate is
45.
Calculate the TLB miss ratio, given memory access time 90ms, TLB access time 40ms and
efficiency memory access time 148ms.
46.
Consider a set of 5 processes whose arrival time, CPU time needed and the priority are given
below
Process Arrival
CPU
time Priority
Time
needed(in
ms)
P1
0
5
5
P2
1
7
2
P3
2
3
1
P4
4
15
3
P5
5
20
4
Note higher number smaller priority.
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
TarGATE16
www.gateforum.com
If the CPU scheduling policy is priority scheduling with preemption the AWT will
be_________ms.
47.
An operating system having 4 processes with each process requesting 5 instances of resource
type R. Then the minimum no of instances of R that are required for the system to be
deadlock free is _____.
48
49.
It is seen that the number of keys required to communicate for n stations is 28 using
symmetric key cryptography. How many number of keys required using asymmetric key
cryptography having 2n stations?
50.
51.
52.
53.
(C) i, ii & iv
LIST II
(4) Assembler
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
10
54.
TarGATE16
55.
www.gateforum.com
y' y
0, x 0 , y(1) = 0 and
x x2
cos z
dz (counter-clockwise) where C : x 2 2y2 1, is
C z iz 2
________
ICPIntensive Classroom Program eGATE-Live Internet Based Classes DLP TarGATE-All India Test Series
Leaders in Gate Preparation 65+ Centers across India
All rights reserved by Gateforum Educational Services Pvt. Ltd. No part of this booklet may be reproduced or utilized in any form without the written permission.
11