Академический Документы
Профессиональный Документы
Культура Документы
Paper-III 2 D-87-12
8. Using RSA algorithm, what is the 11. The time complexities of some
value of cipher text C, if the plain text standard graph algorithms are given.
M = 5 and p = 3, q = 11 & d = 7 ? Match each algorithm with its time
(A) 33 complexity ? (n and m are no. of nodes
(B) 5 and edges respectively)
(C) 25 a. Bellman Ford 1. O (m log n)
(D) 26 algorithm
b. Kruskals algorithm 2. O (n3)
9. You are given an OR problem and a c. Floyd Warshall 3. O(mn)
XOR problem to solve. Then, which algorithm
one of the following statements is
true ? d. Topological sorting 4. O(n + m)
(A) Both OR and XOR problems Codes :
can be solved using single layer a b c d
perception. (A) 3 1 2 4
(B) OR problem can be solved using
(B) 2 4 3 1
single layer perception and XOR
problem can be solved using self (C) 3 4 1 2
organizing maps. (D) 2 1 3 4
(C) OR problem can be solved using
radial basis function and XOR
problem can be solved using 12. Let V1 = 2I J + K and V2 = I + J K,
single layer perception. then the angle between V1 & V2 and a
(D) OR problem can be solved using vector perpendicular to both V1 & V2
single layer perception and XOR shall be :
problem can be solved using
radial basis function. (A) 90 and (2I + J 3K)
(B) 60 and (2I + J + 3K)
10. Match the following : (C) 90 and (2I + J 3K)
List I List II (D) 90 and (2I J + 3K)
a. Application 1. TCP
layer
b. Transport 2. HDLC 13. Consider a fuzzy set A defined on the
layer interval X = [0, 10] of integers by the
membership Junction
c. Network 3. HTTP
layer x
A(x) = x + 2
d. Data link 4. BGP
layer Then the cut corresponding to
Codes : = 0.5 will be
a b c d (A) {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
(A) 2 1 4 3
(B) {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
(B) 3 4 1 2
(C) {2, 3, 4, 5, 6, 7, 8, 9, 10}
(C) 3 1 4 2
(D) 2 4 1 3 (D) { }
D-87-12 3 Paper-III
14. Let T(n) be the function defined by 19. Identify the following activation
T(n) = 1 and T(n) = 2T (n/2) + n, function :
which of the following is TRUE ? 1
(V) = Z + 1 + exp ( x V + Y) ,
(A) T(n) = O( n) *
(B) T(n) = O(log2n) Z, X, Y are parameters
(C) T(n) = O(n) (A) Step function
(D) T(n) = O(n2) (B) Ramp function
(C) Sigmoid function
15. In classful addressing, an IP address (D) Gaussian function
123.23.156.4 belongs to ______ class
format. 20. The no. of ways to distribute n
(A) A distinguishable objects into k
(B) B distinguishable boxes, so that ni objects
(C) C are placed into box i, i = 1, 2, . k
(D) D equals which of the following ?
n!
16. The Mandelbrot set used for the (A) n ! + n ! + ..... + n !
1 2 k
construction of beautiful images is
n1! + n2! + ..... + nk!
based on the following transformation : (B) n1! n2! n3! ..... nk!
xn + 1= x2n + z
Here, n!
(C) n1! n2! n3! ..... nk!
(A) Both x & z are real numbers.
(B) Both x & z are complex numbers. n1! n2! ..... nk!
(D) n1! n2! n3! ..... nk!
(C) x is real & z is complex.
(D) x is complex & z is real.
21. How many solutions do the following
17. Which of the following permutations equation have
can be obtained in the output using a
x1 + x2 + x3 = 11
stack of size 3 elements assuming that
input, sequence is 1, 2, 3, 4, 5 ? where x1 1, x2 2, x3 3
(A) 3, 2, 1, 5, 4 (A) C(7, 11)
(B) 5, 4, 3, 2, 1 (B) C(11, 3)
(C) 3, 4, 5, 2, 1 (C) C(14, 11)
(D) 3, 4, 5, 1, 2 (D) C(7, 5)
26. Which are the classifications of data (B) x11 = 20, x12 = 20, x13 = 10,
used in Mobile Applications ?
x22 = 20, x23 = 20, x24 = 10,
(A) Private data, User data, Shared
data. Total cost = 180
(B) Public data, User data, Virtual
(C) x11 = 20, x13 = 10, x22 = 20,
data.
x23 = 20, x24 = 10, x32 = 10,
(C) Private data, Public data, Shared
data. Total cost = 180
(D) Public data, Virtual data, User
data. (D) None of the above
D-87-12 5 Paper-III
29. 58 lamps are to be connected to a single 33. The Z-buffer algorithm is used for
electric outlet by using an extension Hidden surface removal of objects. The
board each of which has four outlets. maximum number of objects that can
The number of extension boards needed be handled by this algorithm shall
to connect all the light is (A) Depend on the application
(A) 29 (B) be arbitrary no. of objects
(B) 28 (C) Depend on the memory
(C) 20 availability
(D) 19 (D) Depend on the processor
30. Match the following with respect to the 34. The power set of AUB, where
Mobile Computing Architecture. A = {2, 3, 5, 7} and B = {2, 5, 8, 9} is
a. Downlink 1. 100 Mbps (A) 256
control (B) 64
b. Radio 2. Residency (C) 16
communication latency (RL) (D) 4
data rate
c. The average 3. Sending data
duration of users from a BS to 35. In Win32, which function is used to
create Windows Applications ?
stay in cell MD
(A) Win APP
d. FDDI 4. 2-Mbps
bandwidth (B) Win API
Codes : (C) Win Main
a b c d (D) Win Void
(A) 2 1 4 3
(B) 3 4 2 1 36. Suppose a processor does not have any
stack pointer registers, which of the
(C) 4 1 2 1
following statements is true ?
(D) 4 3 1 2
(A) It cannot have subroutine call
instruction.
31. Which of the following flags are set (B) It cannot have nested subroutine
when JMP instruction is executed ? calls.
(A) SF and CF (C) Interrupts are not possible.
(B) AF and CF (D) All subroutine calls and
(C) All flags interrupts are possible.
(D) No flag is set
37. Everything below the system call
32. A thread is a light weight process. In interface and above the physical
the above statement, weight refers to hardware is known as ______.
(A) time (A) Kernel
(B) number of resources (B) Bus
(C) speed (C) Shell
(D) All the above (D) Stub
Paper-III 6 D-87-12
38. Which is not the correct statement ? 42. The grammar G1
(A) The class of regular sets is closed S OSO| ISI | 0|1| and the grammar
under homomorphisms. G2 is
S as |asb| X, X Xa | a.
(B) The class of regular sets is not
Which is the correct statement ?
closed under inverse
homomorphisms. (A) G1 is ambiguous, G2 is
unambiguous
(C) The class of regular sets is closed (B) G1 is unambiguous, G2 is
under quotient. ambiguous
(D) The class of regular sets is closed (C) Both G1 and G2 are ambiguous
under substitution. (D) Both G1 and G2 are
unambiguous
39. When a programming Language has 43. Consider n processes sharing the CPU
the capacity to produce new datatype, in round robin fashion. Assuming that
it is called as, each process switch takes s seconds.
(A) Overloaded Language What must be the quantum size q such
that the overhead resulting from
(B) Extensible Language
process switching is minimized but, at
(C) Encapsulated Language the same time each process is
guaranteed to get its turn at the CPU at
(D) Abstraction Language
least every t seconds ?
t ns
(A) q n 1
40. Which of the following operating
system is better for implementing t ns
(B) q n 1
client-server network ?
(A) Windows 95 t ns
(C) q n + 1
(B) Windows 98 t ns
(D) q n + 1
(C) Windows 2000
(D) All of these
44. The Default Parameter Passing
Mechanism is called as
41. Consider a system having m resources (A) Call by Value
of the same type. These resources are (B) Call by Reference
shared by 3 processes A, B and C (C) Call by Address
which have peak demands of 3, 4 and 6 (D) Call by Name
respectively. For what value of m
deadlock will not occur ?
45. Which of the following regular
(A) 7 expression identities are true ?
(B) 9 (A) (r + s)* = r* s*
(B) (r + s)* = r* + s*
(C) 10
(C) (r + s)* = (r*s*)*
(D) 13 (D) r* s* = r* + s*
D-87-12 7 Paper-III
46. Two graphs A and B are shown below : 50. Which of the following definitions
Which one of the following statement generates the same Language as L,
is true ? where L = {WWR | W {a, b}*}
(A) S asb|bsa|
(B) S asa|bsb|
(C) S asb|bsa|asa|bsb|
(D) S asb|bsa|asa|bsb
64. If the Fourier transform of the function 67. An expert system shell is an expert
f(x, y) is F(m, n), then the Fourier system without
transform of the function f(2x, 2y) is : (A) domain knowledge
1 m n (B) explanation facility
(A) 4 F 2 , 2
(C) reasoning with knowledge
1 (D) all of the above
(B) 4 F (2m, 2n)
(B) I2
74. A* algorithm is guaranteed to find an
(C) I3 optimal solution if
(A) h' is always 0.
(D) I4 (B) g is always 1.
(C) h' never overestimates h.
(D) h' never underestimates h.
72. A cryptarithmetic problem of the type
SEND 75. Let (x, y, z) be the statement x + y = z
and let there be two quantifications
+ MORE
given as
MONEY (i) x y Z (x, y, z)
Can be solved efficiently using (ii) Z x y (x, y, z)
Where x, y, z are real numbers. Then
(A) depth first technique which one of the following is correct ?
(B) breadth first technique (A) (i) is true and (ii) is true.
(B) (i) is true and (ii) is false.
(C) constraint satisfaction technique (C) (i) is false and (ii) is true.
(D) bidirectional technique (D) (i) is false and (ii) is false.
D-87-12 11 Paper-III
Space For Rough Work
Paper-III 12 D-87-12
PracticeheretheQuestion Papers in orderto excel in theUGC NET/ JRF/SLET eligibility examination
Find detailsabout NET, SLET, ARSexams, news, awards, fellowship, exam tips, previousyearquestion
papers, hereat UGC | SLET | CSIR| ICAR