0

Computer Science

Description: gate for computer science & informatio technology
Number of Questions: 16
Created by:
Tags: entrance gate Computer Science & Information Technology - CS Digital Logic Computer Networks Engineering Mathematics
Attempted 0/16 Correct 0 Score 0

In a software project, COCOMO (Constructive Cost Model) is used to estimate

  1. effort and duration based on the size of the software

  2. size and duration based on the effort of the software

  3. effort and cost based on the duration of the software

  4. size, effort and duration based on the cost of the software

  5. None of these


Correct Option: C
Explanation:

This is the correct answer.

Which of the following is NOT shared by the threads of the same process?

  1. Address space

  2. Stack

  3. Queue

  4. File descriptor table

  5. None of these


Correct Option: B
Explanation:

Threads only share their code section, data section and operating system.

A software configuration management tool helps in

  1. keeping track of schedule based on the milestones reached

  2. maintaining different versions of the configurable items

  3. managing manpower distribution by changing the project structure

  4. maintaining the logs of activities completed

  5. All of the above


Correct Option: B
Explanation:

Correct answer

A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet?

  1. 14

  2. 30

  3. 62

  4. 126

  5. 254


Correct Option: C
Explanation:

Correct answer; subnet is of class E. Required answer = 254 - 192 = 62

The diagram that helps in understanding and representing user requirement for a software project using UML (Unified Modelling Language) is

  1. entity relationship diagram

  2. deployment diagram

  3. data flow diagram

  4. activity diagram

  5. use case diagram


Correct Option: A
Explanation:

E-R diagrams are helpful in understanding and representing user requirement for software project using UML.

What is the number of vertices in an undirected connected graph with 27 edges, 6 vertices of degree 2, 3 vertices of degree 4 and the remaining of degree 3?

  1. 10

  2. 11

  3. 18

  4. 19

  5. 16


Correct Option: A
Explanation:

Correct answer; the number of vertices will be 10.

A software organisation has been assessed at SEI CMM Level 4. Which of the following does the organisation need to practice besides process change management and technology change management in order to achieve Level 5?

  1. Defect detection

  2. Defect prevention

  3. Defect isolation

  4. Defect propagation

  5. None of these


Correct Option: B
Explanation:

It is required to be practiced to achieve CMM Level 5.

A 20 kbps satellite link has a propagation delay of 400 ms. The transmitter employs the go back nARQ scheme with n set to 10. Assuming that each frame is 100 bytes long, what is the maximum data rate possible?

  1. 5 kbps

  2. 10 kbps

  3. 15 kbps

  4. 20 kbps

  5. 25 kbps


Correct Option: D
Explanation:

Maximum data rate possible = Speed of the satellite transmission rate, i.e. = 20 kbps

Using Booth's algorithm for multiplication, the multiplier -57 will be recorded as

  1. 0-100+00-1

  2. 11000111

  3. 0-1001000

  4. 0100-1001

  5. 0111-1000


Correct Option: A
Explanation:

Correct answer; -57 expressed as its two's complement is 11000111, whose Booth's form is 0-100+00-1.

In a sliding window ARQ scheme, the transmitter's window size is N and the receiver's window size is M. The minimum number of distinct sequence numbers required to ensure correct operation of the ARQ scheme is

  1. min(M, N)

  2. max(M, N)

  3. M + N

  4. MN

  5. M/N


Correct Option: B
Explanation:

Correct answer; minimum number of distinct sequence numbers required to execute correct operation of ARQ scheme is maximum of M, N.

Let G be a simple connected planar graph with 13 vertices and 19 edges. Then, the number of faces in the planar embedding of the graph is

  1. 12

  2. 10

  3. 8

  4. less than 8

  5. more than 12


Correct Option: C
Explanation:

Correct answer; applying the formula e - n + 2, we get 19 - 13 + 2 = 8.

An organisation has a class B network and wishes to form a subnet for 64 departments. The subnet mask would be

  1. 255.255.0.0

  2. 255.255.64.0

  3. 255.255.128.0

  4. 255.255.252.0

  5. None of these


Correct Option: D
Explanation:

Correct answer; since we have to support 64 departments, so our subnet mask comes out to beĀ 255.255.252.0.

The address resolution protocol (ARP) is used for

  1. finding the IP address from the DNS

  2. finding the IP address of the default gateway

  3. finding the IP address that corresponds to a MAC address

  4. finding the MAC address that corresponds to an IP address

  5. All of the above


Correct Option: D
Explanation:

Correct answer; it resolves the IP address and finds its corresponding MAC address.

The number (123456)8 is equivalent to

  1. (A72E)16 and (22130232)4

  2. (A72E)16 and (22131122)4

  3. (A73E)16 and (22130232)4

  4. (A62E)16 and (22120232)4

  5. (A64E)16 and (22120232)4


Correct Option: A
Explanation:

Binary equivalent of (123456)8 = (00 001 010 011 100 101 110)2 and converting it into hexadecimal by pairing a group of four bits, we get (A72E)16.

A common property of logic programming languages and functional languages is that

  1. both are procedural languages

  2. both are based on I-calculus

  3. both are declarative

  4. both use Horn-clauses

  5. None of these


Correct Option: C
Explanation:

Correct answer; both of them are declarative.

An Abstarct Data Type (ADT) is

  1. the same as an abstract class

  2. a data type that cannot be instantiated

  3. a data type which can be used only by the defined operation

  4. a data type on which operation defined can not use it

  5. All of the above


Correct Option: C
Explanation:

Correct answer; only the operation defined can use it.

- Hide questions