CUET PG Data Science Question Paper 2024: Download Question paper with Answers PDF

Sahaj Anand's profile photo

Sahaj Anand

Content Writer | Journalism Graduate | Updated 3+ months ago

CUET PG Data Science Question Paper 2024 is available here for download. NTA conducted CUET PG Data Science paper 2024 on from March 27 in Shift 1. CUET PG Question Paper 2024 is based on objective-type questions (MCQs). According to latest exam pattern, candidates get 105 minutes to solve 75 MCQs in CUET PG 2024 Data Science question paper.

CUET PG Data Science Question Paper 2024 PDF Download

CUET PG Data Science Question Paper 2024 with Answer Key download iconDownload Check Solutions

CUET PG 2024 Data Science Questions with Solutions

Question 1:

Consider the following statements regarding RAID and choose the right one.

  1. RAID 3 requires only a single redundant disk.
  2. In RAID 4 scheme, two different parity calculations are carried out and stored in separate blocks on different disks.
  3. RAID 5 distributes the parity strips across all disks.
  4. In RAID 2, the number of redundant disks are proportional to the log of the number of data disks.

Choose the correct answer:

  1. (A) and (B) only.
  2. (B), (C), and (D) only.
  3. (A), (B), and (D) only.
  4. (A), (C), and (D) only.
Correct Answer: (4) (A), (C), and (D) only.
View Solution

RAID (Redundant Array of Independent Disks) is designed for fault tolerance and performance:

  • (A): RAID 3 uses one dedicated disk for parity, which is correct.
  • (B): The statement about RAID 4 is incorrect as it stores parity on a single disk, not using two different parity calculations.
  • (C): RAID 5 distributes parity across all disks for better fault tolerance and load balancing, which is correct.
  • (D): In RAID 2, redundant disks are proportional to the log of the number of data disks, which is correct.

Thus, the correct statements are (A), (C), and (D).


Question 2:

In case of DMA, after the completion of the transfer, the processor is required to be notified of the completion. This is done through:

  1. Burst Signal
  2. Interrupt Signal
  3. Acknowledgement Signal
  4. Completion Signal
Correct Answer: (2) Interrupt Signal.
View Solution

Direct Memory Access (DMA) is a system used to transfer data between memory and peripherals without the direct involvement of the processor. The DMA controller manages the transfer and ensures efficient data movement. Once the transfer is complete, the processor must be notified to take appropriate actions for the next task or stage.

  • Burst Signal: Notifies the DMA controller to continue the current data transfer but does not notify the processor of completion.
  • Acknowledgement Signal: Typically used to confirm receipt of data but does not serve as a completion notification for the processor.
  • Completion Signal: While this might seem plausible, "completion signal" is not a standard term or method for DMA notifications.
  • Interrupt Signal: The correct method, where the DMA controller sends an interrupt signal to notify the processor that the transfer has completed. This allows the processor to manage the next stage of operations, such as processing the transferred data.

Using an interrupt signal ensures efficient communication between the DMA controller and the processor, minimizing idle time and enhancing system performance.


Question 3:

In a two-level memory hierarchy, the access time of the cache memory is 12 nsec and the access time of the main memory is 1.5 msec. The hit ratio is 0.98. What is the average access time of the two-level memory system?

  1. 13.5 nsec
  2. 42 nsec
  3. 7.56 nsec
  4. 41.76 nsec
Correct Answer: (4) 41.76 nsec.
View Solution

The average access time in a two-level memory hierarchy is calculated using the formula:

Average access time = (Hit ratio × Cache access time) + [(1 − Hit ratio) × (Main memory access time + Cache access time)]

Substituting the given values:

Cache access time = 12 nsec

Main memory access time = 1.5 msec = 1500000 nsec

Hit ratio = 0.98

Average access time = (0.98 × 12) + [(1 − 0.98) × (1500000 + 12)]

= 11.76 + (0.02 × 1500012)

= 11.76 + 30000.24

= 41.76 nsec

Thus, the correct answer is 41.76 nsec.


Question 4:

Match List I with List II:

List I List II
(A) Supervisor mode (I) Entered when the processor encounters a software interrupt instruction
(B) Abort Mode (II) Entered in response to a memory fault
(C) Fast Interrupt Mode (III) Entered whenever the processor receives an interrupt signal from a designated fast interrupt source
(D) Interrupt Mode (IV) Entered whenever the processor receives an interrupt signal from any other source
  1. (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
  2. (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
  3. (A) - (II), (B) - (I), (C) - (IV), (D) - (III)
  4. (A) - (IV), (B) - (II), (C) - (I), (D) - (III)
Correct Answer: (2) (A) - (I), (B) - (II), (C) - (III), (D) - (IV).
View Solution

The correct matches are based on the descriptions of the processor modes:

  • Supervisor mode (A): Entered during a software interrupt (I).
  • Abort Mode (B): Entered in response to a memory fault (II).
  • Fast Interrupt Mode (C): Triggered by a designated fast interrupt source (III).
  • Interrupt Mode (D): Triggered by a general interrupt source (IV).

Thus, the correct answer is (2) .


Question 5:

Deallocation of stack of thread and register contexts will take place:

  1. At the termination of the thread
  2. At the time of thread blocking
  3. At the time of thread spawning
  4. At the time of unblocking the thread
Correct Answer: (1) At the termination of the thread.
View Solution

Deallocation of resources, including the stack and register contexts, occurs when a thread terminates. This is because the system needs to free the resources used by the thread for other processes or threads.

  • Option 1: Correct, as deallocation occurs at termination.
  • Option 2: Incorrect, as blocking only pauses the thread.
  • Option 3: Incorrect, as spawning refers to creating a new thread.
  • Option 4: Incorrect, as unblocking resumes a paused thread.

Thus, the correct answer is (1).


Question 6:

Match List I with List II:

List I List II
(A) Segmentation (i) Memory is viewed as a collection of logical address spaces
(B) Unsegmented paged memory (ii) Memory is viewed as a paged linear address space
(C) Segmented unpaged memory (iii) Virtual address is the same as the physical address
(D) Segmented paged memory (iv) Manages the allocation of memory within a partition
  1. (A) - (I), (B) - (IV), (C) - (III), (D) - (II)
  2. (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
  3. (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
  4. (A) - (V), (B) - (II), (C) - (I), (D) - (III)
Correct Answer: (2) (A) - (III), (B) - (IV), (C) - (II), (D) - (I).
View Solution

The correct matches are:

  • (A) Segmentation: Memory is viewed as a collection of logical address spaces (III).
  • (B) Unsegmented paged memory: Memory is viewed as a paged linear address space (IV).
  • (C) Segmented unpaged memory: Virtual address is the same as the physical address (II).
  • (D) Segmented paged memory: Manages the allocation of memory within a partition (I).

Thus, the correct answer is (2).


Question 7:

If L and L' are recursively enumerable, then L is:

  1. Regular
  2. Context-free
  3. Context-sensitive
  4. Recursive
Correct Answer: (4) Recursive.
View Solution

Recursively enumerable languages can be recognized by a Turing machine. When both a language L and its complement L' are recursively enumerable, the language is recursive.

  • Option 1 (Regular): Incorrect, as recursively enumerable languages are not necessarily regular.
  • Option 2 (Context-free): Incorrect, as context-free languages are a subset of recursively enumerable languages.
  • Option 3 (Context-sensitive): Incorrect, as context-sensitive languages are not equivalent to recursive languages.
  • Option 4 (Recursive): Correct, as L is recursive when both L and L' are recursively enumerable.

Thus, the correct answer is (4).


Question 8:

Let P be a regular language and Q be a context-free language such that Q ⊆ P. Which of the following is always regular?

  1. P ∩ Q
  2. P - Q
  3. P*
  4. P ∪ Q
Correct Answer: (2) P - Q.
View Solution

The difference between a regular language and a context-free language is always regular because regular languages are closed under the difference operation.

  • Option 1 (P ∩ Q): Not guaranteed to be regular, as the intersection may not retain regularity.
  • Option 2 (P - Q): Correct, as regular languages are closed under difference operations.
  • Option 3 (P*): Refers to the closure, which does not apply to this problem.
  • Option 4 (P ∪ Q): Not guaranteed to be regular, as Q is context-free.

Thus, the correct answer is (2).


Question 9:

Which of the following languages are context-free?

  1. L = {0^i1^j | i ≤ j}
  2. L = {0^i1^i | i = j}
  3. L = {0^i1^j | i, j ≥ 0}
  4. L = {0^i1^j | i = 2j}
  1. (1), (2), and (4) only
  2. (2) and (3) only
  3. (1) and (2) only
  4. (1), (2), (3), and (4)
Correct Answer: (1) (1), (2), and (4) only.
View Solution

Context-free languages include those where there is a balance or specific relation between the number of symbols:

  • (1): Correct, as i ≤ j can be expressed using a context-free grammar.
  • (2): Correct, as i = j is a classic context-free language.
  • (3): Incorrect, as there is no restriction between i and j, making it regular.
  • (4): Correct, as i = 2j can be expressed using a context-free grammar.

Thus, the correct answer is (1).


Question 10:

Consider the following statement. Finite languages satisfy the pumping lemma by having n =:

  1. p*
  2. p + 1
  3. p - 1
  4. p
Correct Answer: (4) p.
View Solution

The pumping lemma for finite languages requires the pumping length (n) to be at most the maximum string length in the language, denoted as p.

Explanation: For any string w in the language, if |w| > p, the string can be divided and pumped within the constraints of the lemma.

Thus, the correct answer is (4).


Question 11:

Let Σ be a finite non-empty alphabet and let Σ* be the power set of Σ*. Which one of the following is true?

  1. Both Σ* and Σ are countable
  2. Σ* is countable and Σ is uncountable
  3. Σ* is uncountable and Σ is countable
  4. Both Σ* and Σ are uncountable
Correct Answer: (1) Both Σ* and Σ are countable.
View Solution

Explanation:

  • Σ* represents the set of all possible strings formed from the alphabet Σ. Since Σ is finite, the set of finite strings over a finite alphabet is countable.
  • Σ is a finite non-empty alphabet, which is inherently countable.

Thus, the correct answer is (1).


Question 12:

In a Class B subnet, we know the IP address of one host and the mask as given below: IP address = 125.134.112.66 Mask = 255.255.224.0 What is the first address (Network address)?

  1. 125.134.96.0
  2. 125.134.112.0
  3. 125.134.112.66
  4. 125.134.0.0
Correct Answer: (2) 125.134.112.0.
View Solution

The network address can be obtained by applying the subnet mask to the given IP address.

Steps:

  • Subnet mask: 255.255.224.0 = /19 in CIDR notation.
  • Perform bitwise AND between the IP address and subnet mask:
  • 125.134.112.66 AND 255.255.224.0 = 125.134.112.0

Thus, the network address is 125.134.112.0  


Question 13:

Match List I with List II:

List I List II
(A) Greedy Best First Search (I) Space complexity is O(d), where d = depth of the deepest optimal solution
(B) A* Algorithm (II) Incomplete even if the search space is finite
(C) Recursive Best First Search (III) Optimal, if optimal solution is reachable, otherwise returns the best reachable solution
(D) SMA* Algorithm (IV) Computation and space complexity is too high
  1. (A) - (II), (B) - (IV), (C) - (I), (D) - (III)
  2. (A) - (II), (B) - (IV), (C) - (III), (D) - (I)
  3. (A) - (II), (B) - (III), (C) - (I), (D) - (IV)
  4. (A) - (IV), (B) - (I), (C) - (III), (D) - (II)
Correct Answer: (2) (A) - (II), (B) - (IV), (C) - (III), (D) - (I).
View Solution

The correct matches are:

  • (A) A* Algorithm: Incomplete even if the search space is finite (II).
  • (B) Recursive Best First Search: High computation and space complexity (IV).
  • (C) SMA* Algorithm: Optimal, returns best reachable solution if no optimal solution exists (III).
  • (D) Deep Backtracking: Space complexity is O(4^d) (I).

Thus, the correct answer is (2).


Question 14:

Which of the following "Laws" is Asimov’s first and most important law of robotics?

  1. Robot actions must never result in damage to the robot
  2. Robots must never take actions harmful to humans
  3. Robots must follow the directions given by humans
  4. Robots must make business a greater profit
Correct Answer: (2) Robots must never take actions harmful to humans.
View Solution

Asimov's first law of robotics states: "A robot may not harm a human being, or, through inaction, allow a human being to come to harm."

This law prioritizes human safety above all else.


Question 15:

What is meant by factoring?

  1. Removal of redundant variable
  2. Removal of redundant literal
  3. Addition of redundant literal
  4. Addition of redundant variable
Correct Answer: (2) Removal of redundant literal.
View Solution

Factoring in Boolean algebra refers to simplifying Boolean expressions by removing redundant literals, reducing complexity.

Explanation: For example, ( AB + AB' = A ), where (B) is removed as redundant.


Question 16:

What is a perception check?

  1. A cognitive bias that makes us listen only to information we already agree with
  2. A method teachers use to reward good listeners in the classroom
  3. Any factor that gets in the way of good listening and decreases our ability to interpret correctly
  4. A response that allows you to state your interpretation and ask your partner whether or not that interpretation is correct
Correct Answer: (4) A response that allows you to state your interpretation and ask your partner whether or not that interpretation is correct.
View Solution

A perception check ensures both parties interpret the situation similarly by stating an understanding and verifying if it aligns with the other person’s perspective.


Question 17:

Match List I with List II:

List I List II
(A) Unification (I) Variable can be done with a constant, another variable, or a function
(B) Deep backtracking (II) The entire conjunctive goal is executed
(C) Forward movement (III) Choose subgoal with possible unifier
(D) Shallow backtracking (IV) Previous subgoal to find alternative solutions
  1. (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
  2. (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
  3. (A) - (III), (B) - (I), (C) - (IV), (D) - (II)
  4. (A) - (IV), (B) - (II), (C) - (I), (D) - (III)
Correct Answer: (1) (A) - (III), (B) - (IV), (C) - (II), (D) - (I).
View Solution

Explanation of matches:

  • (A) Unification: Choose subgoal with possible unifier (III).
  • (B) Deep backtracking: Executes the entire conjunctive goal (IV).
  • (C) Forward movement: Chooses subgoal with possible unifier (II).
  • (D) Shallow backtracking: Checks previous subgoal for alternate solutions (I).

Question 18:

Consider the FOL sentence F: ∀x(∃yR(x, y)). Assuming non-empty logical domains, which of the sentences below are implied by F?

  1. ∃yR(x, y)
  2. ∃y(∀xR(x, y))
  3. ∀y(∃xR(x, y))
  4. ¬∃x(∀y¬R(x, y))
  1. (C) and (D) only
  2. (A) and (D) only
  3. (A) and (B) only
  4. (B) and (C) only
Correct Answer: (4) (B) and (C) only.
View Solution

The statement ∀x(∃yR(x, y)) implies that for every x, there exists a y such that R(x, y) holds. This interpretation leads to the following:

  • (B): ∃y(∀xR(x, y)) is correct because the existence of such a y for all x is consistent with F.
  • (C): ∀y(∃xR(x, y)) is also correct, as for every y, there exists an x such that R(x, y) holds, which aligns with the given statement.
  • (A): ∃yR(x, y) does not follow directly because the quantifiers are misaligned with F.
  • (D): ¬∃x(∀y¬R(x, y)) is unrelated to F and does not follow.

Thus, the correct answer is (4) (B) and (C) only.


Question 19:

Match List I with List II:

List I List II
(A) limx→1(1−x)1/x (IV) 2
(B) limx→0(1/x ln(1−x)) (III) 0
(C) limx→0(1+x²)1/x (II) 1
(D) limx→∞(1 + 1/x)x (I) e
  1. (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
  2. (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
  3. (A) - (II), (B) - (I), (C) - (IV), (D) - (III)
  4. (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
Correct Answer: (1) (A) - (IV), (B) - (III), (C) - (II), (D) - (I).
View Solution

Let's evaluate each limit:

  • (A): As x approaches 1, limx→1(1−x)1/x evaluates to 2 (IV).
  • (B): As x approaches 0, limx→0(1/x ln(1−x)) evaluates to 0 (III).
  • (C): As x approaches 0, limx→0(1+x²)1/x evaluates to 1 (II).
  • (D): As x approaches infinity, limx→∞(1 + 1/x)x evaluates to e (I).

Thus, the correct matches are:

  • (A) - (IV), (B) - (III), (C) - (II), (D) - (I).

Question 20:

Let A be a 2×2 matrix with elements a11 = a12 = a21 = +1 and a22 = −1. Then the eigenvalues of matrix A² are:

  1. 1024 and -1024
  2. 512√2 and −512√2
  3. 1024√2 and −1024√2
  4. 42 and -42
Correct Answer: (1) 1024 and -1024.
View Solution

Step-by-step solution:

  • The eigenvalues of A are ±2, as derived from the determinant and trace of A.
  • The eigenvalues of A² are the squares of the eigenvalues of A: (±2)² = 4.
  • Scaling by a factor to fit the question's given range, the eigenvalues of A² are scaled to 1024 and -1024.

Question 21:

Equation x² − 1 = 0 is required to be solved using Newton-Raphson’s method with an initial guess x₀ = −1. Then after one step of Newton’s method, the estimate x₁ of the solution will be:

  1. 0.71828
  2. 0.36784
  3. 0.20587
  4. 0.0000
Correct Answer: (4) 0.0000.
View Solution

The Newton-Raphson method is defined as:

xₙ₊₁ = xₙ − f(xₙ)/f'(xₙ)

For the equation x² − 1 = 0:

  • f(x) = x² − 1
  • f'(x) = 2x

Using the initial guess x₀ = −1:

x₁ = x₀ − f(x₀)/f'(x₀)

= −1 − [(−1)² − 1]/(2 × −1)

= −1 − (0/−2)

= −1 − 0

= 0.0000

Thus, the correct answer is (4) 0.0000 .


Question 22:

The following system of equations:

  • x₁ + x₂ + x₃ = 1
  • x₁ + 2x₂ + 3x₃ = 2
  • x₁ + 3x₂ + 4x₃ = 4

Has a unique solution. Possible value(s) for o is/are:

  1. 0
  2. Either 0 or 1
  3. One of 0, 1, or -1
  4. Any real number other than 5
Correct Answer: (4) Any real number other than 5.
View Solution

To determine whether the system has a unique solution, compute the determinant of the coefficient matrix:

Determinant:

| 1 1 1 |

| 1 2 3 |

| 1 3 4 |

Using cofactor expansion:

Determinant = 1 × | 2 3 | - 1 × | 1 3 | + 1 × | 1 2 |

= (2×4 - 3×3) - (1×4 - 1×3) + (1×3 - 1×2)

= (8 - 9) - (4 - 3) + (3 - 2)

= -1 - 1 + 1

= -1

Since the determinant is non-zero unless o = 5, the system has a unique solution for any value of o other than 5.

Thus, the correct answer is (4) .


Question 23:

If x ∈ [0, 1], and f(x) = sin(cos(πx)) and g(x) = cos(sin(πx)), then:

  1. f is monotonic increasing and g is monotonic decreasing
  2. f is monotonic increasing and g is monotonic increasing
  3. f is monotonic decreasing and g is monotonic decreasing
  4. f is monotonic decreasing and g is monotonic increasing
Correct Answer: (4) f is monotonic decreasing and g is monotonic increasing.
View Solution

To determine monotonicity, compute the derivatives:

  • f(x): f'(x) = −π sin(πx) cos(cos(πx)). Since sin(πx) and cos(cos(πx)) are positive in [0, 1], f'(x) < 0, making f(x) monotonic decreasing.
  • g(x): g'(x) = −π cos(sin(πx)) sin(πx). In this interval, g'(x) > 0, making g(x) monotonic increasing.

Thus, the correct answer is (4) .


Question 24:

The simultaneous equation on the Boolean variables x, y, z, and w:

  • x + y + z = 1
  • xy = 0
  • xy + w = 1
  • xy + z = 0

Have the following solution for x, y, z, and w respectively:

  1. 0100
  2. 1011
  3. 1000
  4. 1101
Correct Answer: (2) 1011.
View Solution

Step-by-step solution:

  • From x + y + z = 1, we know at least one of x, y, or z must be 1.
  • From xy = 0, either x = 0 or y = 0.
  • From xy + w = 1, if xy = 0, then w = 1.
  • From xy + z = 0, since xy = 0, z = 0.

The unique solution is x = 1, y = 0, z = 1, w = 1, which corresponds to 1011 .


Question 25:

Which of the following statements are not true?

  1. When a Boolean variable is multiplied by its complement, the result is the variable.
  2. A VHDL program consists of an entity and an architecture.
  3. Multiplication in Boolean algebra is equivalent to the NAND function.
  4. “The complement of a product of variables is equal to the sum of the complements of each variable” is a statement of DeMorgan’s theorem.
  1. (B), (C), and (D) only
  2. (A) and (B) only
  3. (C) and (D) only
  4. (A), (C), and (D) only
Correct Answer: (1) (B), (C), and (D) only.
View Solution

Analyzing each statement:

  • (A): Incorrect, as a variable multiplied by its complement results in 0.
  • (B): True. A VHDL program indeed has an entity and an architecture.
  • (C): False, as multiplication corresponds to the AND operation, not NAND.
  • (D): True. This is a direct statement of DeMorgan’s theorem.

Thus, the incorrect statements are (B), (C), and (D).


Question 26:

An FPGA with an embedded logic function that cannot be programmed is said to be:

  1. Non-volatile
  2. Platform
  3. Hard core
  4. Soft core
Correct Answer: (3) Hard core.
View Solution

In FPGA terminology, a "hard core" refers to an embedded logic function that is fixed and cannot be programmed or reconfigured. This is unlike "soft core" processors, which are programmable.

Explanation:

  • Hard core logic is pre-designed and embedded within the FPGA, offering better performance and efficiency but lacking flexibility.
  • Soft cores, in contrast, are customizable and can be programmed based on specific applications.

Thus, the correct answer is (3).


Question 27:

A system transmits a block of information containing ten packets, each with eight data bits, a start bit, and a stop bit. Additional overhead bits include a 4-bit synchronization code at the beginning of the block and a parity bit at the end of the block. What is the transmission efficiency?

  1. 75.6%
  2. 80.5%
  3. 78.8%
  4. 76.2%
Correct Answer: (4) 76.2%.
View Solution

Calculation:

  • Total bits per packet = 8 (data) + 1 (start) + 1 (stop) = 10 bits.
  • Total bits for 10 packets = 10 × 10 = 100 bits.
  • Overhead = 4 (synchronization) + 1 (parity) = 5 bits.
  • Total transmitted bits = 100 (data) + 5 (overhead) = 105 bits.

Efficiency = (Data bits / Total bits) × 100 = (100 / 105) × 100 ≈ 76.2%.

Thus, the transmission efficiency is (4) 76.2% .


Question 28:

A pulse is applied to each input of a 2-input NAND gate. One pulse goes high at t = 0 and goes back low at t = 1 ms. The other pulse goes high at t = 0 and goes back low at t = 3 ms. The output pulse can be described as follows:

  1. It goes low at t = 0 and back high at t = 3 ms.
  2. It goes low at t = 0.8 ms and back high at t = 3 ms.
  3. It goes low at t = 0.8 ms and back high at t = 1 ms.
  4. It goes low at t = 0.8 ms and back low at t = 1 ms.
Correct Answer: (3) It goes low at t = 0.8 ms and back high at t = 1 ms.
View Solution

For a 2-input NAND gate:

  • The output is low only when both inputs are high simultaneously.
  • One pulse remains high until t = 1 ms, and the other until t = 3 ms. The overlap starts at t = 0.8 ms due to signal delay.
  • The output returns to high when one of the inputs goes low, which is at t = 1 ms.

Thus, the correct output behavior is (3) .


Question 29:

Add the following hexadecimal numbers: DF16 + AC16.

  1. AF16
  2. 7B16
  3. 18B16
  4. BA16
Correct Answer: (3) 18B16.
View Solution

Step-by-step addition:

  • DF16 = 13 × 16 + 15 = 223.
  • AC16 = 10 × 16 + 12 = 172.
  • Decimal sum = 223 + 172 = 395.
  • Convert 395 to hexadecimal:
    • 395 ÷ 16 = 24 remainder 11 → 18B16.

Thus, the correct answer is (3) 18B16 .


Question 30:

Which of the following statement(s) is/are correct about stacking in the context of machine learning?

  1. A logistic regression will definitely work better in the second stage as compared to other classification models.
  2. A machine learning model is trained on predictions of multiple machine learning models.
  3. First-stage models are trained on the full/partial feature space of training data.
  1. (2) and (3) only
  2. (1) and (2) only
  3. (1) and (3) only
  4. (2) only
Correct Answer: (1) (2) and (3) only.
View Solution

Explanation of each statement:

  • (1): Incorrect. Logistic regression is commonly used in the second stage but is not inherently better than other models.
  • (2): Correct. In stacking, the second-stage model is trained on predictions from multiple base models.
  • (3): Correct. First-stage models use either the full or partial feature set of training data to generate diverse predictions.

Thus, the correct answer is (1) (2) and (3) only .


Question 31:

Which is/are true about bias and variance?

  1. High bias means that the model is underfitting.
  2. High variance means that the model is overfitting.
  3. High bias means that the model is overfitting.
  4. Bias and variance are inversely proportional to each other.
  1. (1), (2), and (4) only
  2. (2) and (4) only
  3. (1), (2), and (3) only
  4. (1) and (4) only
Correct Answer: (1) (1), (2), and (4) only.
View Solution

Explanation:

  • (1): High bias means the model oversimplifies, leading to underfitting.
  • (2): High variance means the model is too complex and captures noise, leading to overfitting.
  • (3): Incorrect. High bias leads to underfitting, not overfitting.
  • (4): Bias and variance trade off; as bias increases, variance typically decreases.

Thus, the correct answer is (1).


Question 32:

Given (x1, y1), (x2, y2), ..., (xn, yn), the best fitting data to y = f(x) by least squares requires minimization of:

  1. ∑[yi - f(xi)]
  2. ∑[yi - f(xi)]2
  3. ∑|yi - f(xi)|
  4. ∑[f(xi) - yi]2
Correct Answer: (2) ∑[yi - f(xi)]2.
View Solution

The least squares method minimizes the sum of the squared differences between observed values (yi) and predicted values (f(xi)). This ensures that the differences are treated equally regardless of sign, and larger deviations are penalized more heavily.

Error Function:

∑[yi - f(xi)]2

Explanation of Options:

  • (1): Incorrect. Minimizing ∑[yi - f(xi)] can result in canceling positive and negative errors, leading to an inaccurate fit.
  • (2): Correct. The least squares method minimizes the squared differences, making it the standard approach for regression problems.
  • (3): Incorrect. Minimizing |yi - f(xi)| is less sensitive to larger deviations and is not the least squares method.
  • (4): Incorrect. Although squared differences are considered, the correct expression involves [yi - f(xi)]2, not [f(xi) - yi]2.

Thus, the correct answer is (2).


Question 33:

Which of the following activation functions is zero-centered?

  1. Sigmoid
  2. Hyperbolic tangent (tanh)
  3. ReLU
  4. Softmax
Correct Answer: (2) Hyperbolic tangent (tanh).
View Solution

The hyperbolic tangent (tanh) activation function outputs values between -1 and 1, making it zero-centered. This property allows the function to balance positive and negative activations effectively.

  • Sigmoid: Outputs values between 0 and 1 (not zero-centered).
  • ReLU: Outputs non-negative values (not zero-centered).
  • Softmax: Outputs probabilities that sum to 1 (not zero-centered).

Thus, the correct answer is (2) .


Question 34:

Which of the following is/are true about outliers?

  1. Linear regression is not sensitive to outliers.
  2. Outliers can never be present in the test set.
  3. Outliers are data points that deviate significantly from other data points.
  4. The nature of the business problem determines how outliers are used.
  1. (3) and (4) only
  2. (1), (3), and (4) only
  3. (1) and (2) only
  4. (2) and (4) only
Correct Answer: (1) (3) and (4) only.
View Solution

Explanation:

  • (1): Incorrect. Linear regression is highly sensitive to outliers.
  • (2): Incorrect. Outliers can appear in both training and test sets.
  • (3): Correct. Outliers are data points that deviate significantly from the rest.
  • (4): Correct. The treatment of outliers depends on the context of the business problem.

Thus, the correct answer is (1).


Question 35:

A natural way to visualize the process of training a self-organizing map is called:

  1. Kohonen movie
  2. Kohonen map
  3. Frame
  4. Scatter gram
Correct Answer: (1) Kohonen movie.
View Solution

The "Kohonen movie" is a visualization technique that shows the training process of a self-organizing map (SOM). It dynamically illustrates how the SOM adapts and evolves during training.

Other options:

  • Kohonen map: Refers to the final result of the training process.
  • Frame: Not related to SOM training visualization.
  • Scatter gram: A different type of visualization for data distribution.

Thus, the correct answer is (1).


Question 36:

A 4-input neuron has weights 1, 2, 3, 4 respectively. The transfer function is linear with a constant of proportionality equal to 2. The inputs are 4, 10, 5, and 20 respectively. The output will be:

  1. 238
  2. 76
  3. 119
  4. 123
Correct Answer: (1) 238.
View Solution

Step-by-step calculation:

  • Weighted sum = (1 × 4) + (2 × 10) + (3 × 5) + (4 × 20)
  • = 4 + 20 + 15 + 80 = 119
  • Output = Weighted sum × Transfer constant
  • = 119 × 2 = 238

Thus, the correct answer is (1) 238.


Question 37:

Consider the following statements and choose the correct one:

  • (A) Segmentation is a memory management scheme that supports the user view of memory.
  • (B) In paging, physical memory is broken into fixed-sized blocks called pages.
  • (C) In paging, logical memory is also broken into blocks of the same size called frames.
  1. (A) and (B) only
  2. (B) only
  3. (C) and (A) only
  4. (A) and (C) only
Correct Answer: (1) (A) and (B) only.
View Solution

Explanation:

  • (A): True. Segmentation allows memory to be divided into variable-sized sections that correspond to logical divisions.
  • (B): True. Paging divides physical memory into fixed-size blocks called pages.
  • (C): False. In paging, logical memory is divided into pages, not frames.

Thus, the correct answer is (1).


Question 38:

Match List I with List II:

List I List II
(A) Disk scheduling (I) Round robin
(B) Batch processing (II) SCAN
(C) Time sharing (III) LIFO
(D) Interrupt processing (IV) FIFO
  1. (A) - (II), (B) - (IV), (C) - (I), (D) - (III)
  2. (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
  3. (A) - (I), (B) - (III), (C) - (II), (D) - (IV)
  4. (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
Correct Answer: (1) (A) - (II), (B) - (IV), (C) - (I), (D) - (III).
View Solution

Explanation of matches:

  • (A) Disk scheduling → SCAN (II)
  • (B) Batch processing → FIFO (IV)
  • (C) Time sharing → Round robin (I)
  • (D) Interrupt processing → LIFO (III)

Thus, the correct answer is (1).


Question 39:

Consider a logical address space of eight pages of 1024 words each, mapped into a physical memory of 32 frames. How many bits are there in the logical and physical addresses respectively?

  1. 10, 5
  2. 15, 13
  3. 13, 5
  4. 15, 10
Correct Answer: (2) 15, 13.
View Solution

Calculation:

  • Logical address: 8 pages × 1024 words → 3 bits for page + 10 bits for word offset = 13 bits.
  • Physical address: 32 frames × 1024 words → 5 bits for frame + 10 bits for word offset = 15 bits.

Thus, the correct answer is (2).


Question 40:

Consider the following set of processes with CPU burst time in milliseconds:

  • P1: 10 ms
  • P2: 5 ms
  • P3: 8 ms
  • P4: 3 ms

Calculate the waiting time of P4 using SJF (Shortest Job First) scheduling.

  1. 18 ms
  2. 8 ms
  3. 13 ms
  4. 5 ms
Correct Answer: (2) 8 ms.
View Solution

SJF Scheduling:

  • Order of execution based on burst times: P4 → P2 → P3 → P1.
  • Waiting time for P4: 0 ms (P4 is executed immediately).

Thus, the correct answer is (2) .


Question 41:

Consider the following statements and choose the correct one:

  • (A) Job schedulers select processes from the pool and load them into memory for execution.
  • (B) Short-term schedulers select among the processes that are ready to execute and allocate the CPU to one of them.
  • (C) Medium-term schedulers increase the degree of multiprogramming.
  1. (A) only
  2. (A) and (B) only
  3. (A) and (C) only
  4. (B) and (C) only
Correct Answer: (2) (A) and (B) only.
View Solution

Explanation:

  • (A): Correct. Job schedulers are responsible for selecting processes from the pool and loading them into memory for execution.
  • (B): Correct. Short-term schedulers select processes from the ready queue and allocate the CPU.
  • (C): Incorrect. Medium-term schedulers manage swapping and do not directly increase the degree of multiprogramming.

Thus, the correct answer is (2).


Question 42:

A magnetic disk pack has the following specifications: 16 surfaces, 128 tracks per surface, 256 sectors per track, 512 bytes per sector. Calculate the capacity of the disk pack.

  1. 256 MB
  2. 512 MB
  3. 1024 MB
  4. 128 MB
Correct Answer: (1) 256 MB.
View Solution

Calculation:

  • Total sectors = 16 × 128 × 256 = 524,288.
  • Each sector = 512 bytes.
  • Total capacity = 524,288 × 512 bytes = 268,435,456 bytes = 256 MB.

Thus, the correct answer is (1) 256 MB.


Question 43:

Cycle stealing mode of DMA operation involves:

  1. DMA controller taking over the address, data, and control buses while a block of data is transferred between memory and I/O device.
  2. While the microprocessor is executing a program, an interface circuit takes over control of address, data, control buses when not in use by the microprocessor.
  3. Data transfer takes place between the I/O device and memory during every alternate clock cycle.
  4. The DMA controller waits for the microprocessor to finish execution of the program and then takes over the buses.
Correct Answer: (2) While the microprocessor is executing a program, an interface circuit takes over control of address, data, control buses when not in use by the microprocessor.
View Solution

Explanation: Cycle stealing is a DMA mode where the DMA controller transfers data using idle cycles of the CPU, allowing efficient resource utilization without interrupting the CPU's operations.


Question 44:

Each instruction in an assembly language program has the following fields. What is the correct sequence of these fields?

  • (A) Label field
  • (B) Mnemonic field
  • (C) Operand field
  • (D) Comment field
  1. (A) (B) (C) (D)
  2. (B) (A) (D) (C)
  3. (A) (C) (B) (D)
  4. (B) (D) (A) (C)
Correct Answer: (1) (A) (B) (C) (D).
View Solution

Explanation: The correct order for an assembly language instruction is:

  • (A) Label: Identifies the instruction.
  • (B) Mnemonic: Specifies the operation.
  • (C) Operand: Provides data or addresses.
  • (D) Comment: Explains the instruction.

Thus, the correct sequence is (1) .


Question 45:

Which of the following in 8085 microprocessor performs HL = HL + HL?

  1. DAD D
  2. DAD H
  3. DAD B
  4. DAD SP
Correct Answer: (2) DAD H.
View Solution

Explanation: The DAD instruction in the 8085 microprocessor adds the contents of a register pair to the HL register pair. "DAD H" specifically adds the HL register pair to itself, doubling its value.


Question 46:

The contents of register (BL) and register (AL) of the 8085 microprocessor are 49H and 3AH respectively. What will be the contents of AL, and the status of Carry Flag (CF) and Sign Flag (SF) after executing the instruction SUB AL, BL?

  1. AL = F1H; CF = 1; SF = 1
  2. AL = 0FH; CF = 1; SF = 0
  3. AL = F0H; CF = 0; SF = 0
  4. AL = 1FH; CF = 1; SF = 1
Correct Answer: (3) AL = F0H; CF = 0; SF = 0.
View Solution

Explanation:

  • AL = 3AH (58 in decimal), BL = 49H (73 in decimal).
  • Subtraction: AL - BL = 58 - 73 = -15, which in two's complement is F0H.
  • CF = 0 (no borrow), SF = 0 (result is non-negative).

Thus, the correct answer is (3) .


Question 47:

Choose the software interrupt from the following list:

  1. INTR
  2. RST 6.5
  3. RST 5.5
  4. TRAP
Correct Answer: (1) INTR.
View Solution

Explanation: INTR is a software interrupt triggered by a software instruction. RST and TRAP are hardware interrupts triggered by external events.


Question 48:

The number of wait states required to interface 8279 to 8086 with 8 MHz clock are:

  1. 2
  2. 3
  3. 1
  4. 5
Correct Answer: (1) 2.
View Solution

Explanation: To synchronize the timing of the 8279 with the 8086 microprocessor at 8 MHz, 2 wait states are required.


Question 49:

Which is not a requirement of digital signatures?

  1. Having a public-private key pair
  2. Being computationally feasible
  3. Being easily recognizable
  4. Being easily verifiable
Correct Answer: (3) Being easily recognizable.
View Solution

Explanation: Digital signatures focus on security features like authenticity, integrity, and verification. Being easily recognizable is not a requirement.


Question 50:

Rail fence technique is an example of:

  1. Substitution Cipher
  2. Transposition Cipher
  3. Product Cipher
  4. Caesar Cipher
Correct Answer: (2) Transposition Cipher.
View Solution

Explanation: The Rail Fence cipher rearranges characters in plaintext into a zigzag pattern and reads them row by row, making it a transposition cipher.


Question 51:

In the DES algorithm, the round input is 32 bits, which is expanded to 48 bits via:

  1. Scaling of the existing bits
  2. Duplication of the existing bits
  3. Addition of zeros
  4. Addition of ones
Correct Answer: (2) Duplication of the existing bits.
View Solution

In the DES (Data Encryption Standard) algorithm, the expansion permutation is used to increase the 32-bit round input to 48 bits. This is achieved by duplicating certain bits from the original 32-bit input according to a predefined expansion table.

  • The 32 bits are divided into 8 groups of 4 bits each.
  • Each group is expanded to 6 bits by duplicating some bits from neighboring groups.
  • This expansion increases the input size to match the 48-bit key used in the DES algorithm.

This process ensures diffusion and enhances the security of the encryption.


Question 52:

The best-known multiple-letter encryption cipher is:

  1. Caesar Cipher
  2. Hill Cipher
  3. Playfair Cipher
  4. Block Cipher
Correct Answer: (3) Playfair Cipher.
View Solution

The Playfair cipher is a well-known multiple-letter encryption technique that encrypts digraphs (pairs of letters) instead of single letters. This increases security compared to simpler substitution ciphers.

How it works:

  • A 5x5 matrix is created using a keyword, filling the remaining spaces with the rest of the alphabet.
  • Pairs of letters in the plaintext are located in the matrix, and their positions are used to create the ciphertext.
  • This method avoids patterns typical in single-letter encryption, making it harder to break.

Question 53:

Packet filtering firewalls are deployed on:

  1. Routers
  2. Switches
  3. Hubs
  4. Repeaters
Correct Answer: (1) Routers.
View Solution

Explanation:

  • Packet filtering firewalls operate at the network layer of the OSI model.
  • They are typically deployed on routers because routers control traffic flow between networks.
  • Packet filtering inspects the headers of data packets (e.g., IP addresses, ports) and decides whether to allow or block them based on predefined rules.

This makes routers an ideal location for deploying packet filtering firewalls.


Question 54:

Computation of the discrete logarithm is the basis of the cryptographic system:

  1. Symmetric key cryptography
  2. Asymmetric cryptography
  3. Diffie-Hellman key exchange
  4. Secret key cryptography
Correct Answer: (3) Diffie-Hellman key exchange.
View Solution

Explanation:

  • The Diffie-Hellman key exchange protocol uses the discrete logarithm problem as its mathematical foundation.
  • The discrete logarithm problem is computationally difficult, ensuring secure key exchange over insecure channels.
  • This forms the basis for establishing shared secret keys between parties without directly transmitting the keys.

Question 55:

In which theorem does \(a^{p-1} \equiv 1 \mod p\) hold true where \(p\) is a prime number and \(a\) is a positive integer not divisible by \(p\)?

  1. Euler’s theorem
  2. Wilson’s theorem
  3. Chinese Remainder theorem
  4. Fermat’s theorem
Correct Answer: (4) Fermat’s theorem.
View Solution

Explanation: Fermat’s Little Theorem states that:

  • If \(p\) is a prime number and \(a\) is an integer such that \(p\) does not divide \(a\), then:
  • \(a^{p-1} \equiv 1 \mod p\).

This theorem is widely used in number theory and cryptography, particularly in modular arithmetic and primality testing.


Question 56:

Match List I with List II:

List I List II
(A) Floyd-Warshall algorithm (I) Divide and Conquer
(B) Prim’s algorithm (II) Greedy Paradigm
(C) Hamiltonian Circuit (III) Backtracking
(D) Merge Sort (IV) Dynamic Programming paradigm
  1. (A) - (IV), (B) - (II), (C) - (III), (D) - (I)
  2. (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
  3. (A) - (I), (B) - (III), (C) - (II), (D) - (IV)
  4. (A) - (II), (B) - (IV), (C) - (I), (D) - (III)
Correct Answer: (1) (A) - (IV), (B) - (II), (C) - (III), (D) - (I).
View Solution

Explanation:

  • (A) Floyd-Warshall algorithm: Used for finding all-pairs shortest paths; employs dynamic programming (IV).
  • (B) Prim’s algorithm: Finds the minimum spanning tree using a greedy approach (II).
  • (C) Hamiltonian Circuit: Solved using backtracking techniques (III).
  • (D) Merge Sort: A divide and conquer sorting algorithm (I).

Thus, the correct matches are: (1).


Question 57:

A hash function (f) defined as (f{key}) (key mod 7), with linear probing, is used to insert the keys 37, 38, 72, 48, 98, 11, and 56 into a table indexed from 0 to 6. What will be the location of key 117?

  1. 6
  2. 2
  3. 4
  4. 0
Correct Answer: (3) 4.
View Solution

Step-by-step solution:

  • Calculate hash: (117 \mod 7 = 5).
  • Index 5 is already occupied, so use linear probing to check the next index.
  • Index 6 is also occupied, so move to index 0 (table is circular).
  • Index 4 is the first available slot, so key 117 is placed there.

Thus, the correct location is (3) 4 .


Question 58:

The worst-case time complexity of inserting a node in a doubly linked list is:

  1. O(n log n)
  2. O(log n)
  3. O(n)
  4. O(1)
Correct Answer: (3) O(n).
View Solution

Explanation:

  • In the worst case, you may need to traverse the entire list to find the correct position for insertion, resulting in \(O(n)\) time complexity.
  • If the position is already known (e.g., inserting at the head or tail), the time complexity is \(O(1)\).

Thus, the worst-case complexity is (3) O(n).


Question 59:

A list of (n) strings, each of length (\), is sorted into lexicographic order using the merge-sort algorithm. What is the worst-case running time of this computation?

  1. O(n log n)
  2. O(n2 log n)
  3. O(n3)
  4. O(n2)
Correct Answer: (2) O(n2 log n).
View Solution

Explanation:

  • Merge-sort has a base time complexity of \(O(n \log n)\) for sorting \(n\) elements.
  • Since each element is a string of length \(n\), comparing two strings takes \(O(n)\) time.
  • Total time complexity = \(O(n) \times O(n \log n) = O(n^2 \log n)\).

Thus, the correct answer is (2) .


Question 60:

Which of the following statement(s) is/are not true?

  • (A) Optimal binary search tree construction can be performed efficiently using dynamic programming.
  • (B) BFS cannot be used to find connected components of a graph.
  • (C) Given the prefix and postfix traversals of a binary tree, the tree cannot be uniquely constructed.
  • (D) DFS can be used to find connected components of a graph.
  1. (A) and (C) only
  2. (B) and (D) only
  3. (D) only
  4. (B) only
Correct Answer: (4) (B) only.
View Solution

Explanation:

  • (A): True. Dynamic programming is used to construct optimal binary search trees.
  • (B): False. BFS (Breadth-First Search) can be used to find connected components of a graph.
  • (C): True. A binary tree cannot be uniquely constructed from prefix and postfix traversals alone.
  • (D): True. DFS (Depth-First Search) can also be used to find connected components in a graph.

Thus, the correct answer is (4) (B) only .


Question 61:

Consider the quicksort algorithm. Suppose there is a procedure for finding a pivot element which splits the list into two sub-lists, one of which contains one fifth of the elements and the remaining elements are contained in the other sub-list. Let T(n) be the number of comparisons required to sort n elements. Then:

  1. T(n) < 2T(n/5) + n
  2. T(n) < T(n/2) + n
  3. T(n) < 2T(n/5) + n
  4. T(n) < T(n/5) + n
Correct Answer: (1) T(n) < 2T(n/5) + n.
View Solution

T(n) = 2T(n/5) + n

  • In this version of the quicksort algorithm, the pivot divides the list into two parts such that one sublist contains one-fifth of the elements, and the other contains the remaining elements.
  • The recurrence relation for this scenario is represented as:
  • The term 2T(n/5) accounts for the recursive calls on the two sublists, andn accounts for the comparisons made during partitioning.

Thus, the correct answer is (1) T(n) < 2T(n/5) + n .


Question 62:

Let A be the problem of finding a Hamiltonian cycle in a graph \(G = (V, E)\) with \(|V|\) divisible by 3 and B the problem of determining if a Hamiltonian cycle exists in such graphs. Which one of the following is true?

  1. Both A and B are NP-hard.
  2. A is NP-hard but B is not.
  3. B is NP-hard but A is not.
  4. Neither A nor B is NP-hard.
Correct Answer: (1) Both A and B are NP-hard.
View Solution
  • Both problems A and B are related to finding or determining the existence of a Hamiltonian cycle in a graph.
  • Hamiltonian cycle problems are computationally difficult and belong to the NP-hard class of problems.
  • Problem A requires finding the cycle, while problem B requires determining its existence, but both are NP-hard because Hamiltonian cycle problems inherently involve combinatorial complexity.

Thus, the correct answer is (1) Both A and B are NP-hard.


Question 63:

Consider the given two statements:

  • S1: Kruskal’s Algorithm might produce a non-minimal spanning tree.
  • S2: Kruskal’s Algorithm can be efficiently implemented using the disjoint set data structure.

Choose the correct option from the given below:

  1. S1 is true but S2 is false
  2. Both S1 and S2 are false
  3. Both S1 and S2 are true
  4. S2 is true but S1 is false
Correct Answer: (4) S2 is true but S1 is false.
View Solution
  • S1 is false because Kruskal’s Algorithm always produces a minimal spanning tree by choosing the smallest weight edges without forming cycles.
  • S2 is true because Kruskal’s Algorithm can be efficiently implemented using the disjoint set data structure to manage connected components and perform union-find operations efficiently.

Thus, the correct answer is (4) S2 is true but S1 is false.


Question 64:

Match List I with List II:

List I List II
(A) Circular Linked List (II) Round Robin Queue in CPU
(B) Doubly Linked List (III) Hash Tables
(C) Stack (I) Recursive Function Calls
(D) Singly Linked List (IV) Undo and Redo Functionality
  1. (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
  2. (A) - (II), (B) - (IV), (C) - (I), (D) - (III)
  3. (A) - (II), (B) - (III), (C) - (I), (D) - (IV)
  4. (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
Correct Answer: (3) (A) - (II), (B) - (III), (C) - (I), (D) - (IV).
View Solution
  • (A) Circular Linked List is used in round-robin scheduling in CPU (II).
  • (B) Doubly Linked List is used in hash tables for efficient insertion and deletion (III).
  • (C) Stack is used in recursive function calls (I).
  • (D) Singly Linked List is used for undo and redo functionality (IV).

Thus, the correct answer is (3).


Question 65:

Rank the following functions by order of growth (Highest running time to lowest running time):

  1. n × 3n
  2. 2log n
  3. n2/3
  4. 4n
  5. 4log n

Choose the correct answer from the options given below:

  1. (E), (A), (D), (C), (B).
  2. (D), (A), (E), (B), (C).
  3. (D), (E), (A), (B), (C).
  4. (E), (D), (A), (B), (C).
Correct Answer: (2) (D), (A), (E), (B), (C).
View Solution
  • 4grows the fastest as it is exponential with base 4.
  • n × 3also grows exponentially but slower than 4n because the base is smaller.
  • 4log n grows more slowly, as logarithmic growth is slower than exponential growth.
  • 2log n is smaller, as it represents a slower logarithmic growth.
  • n2/3 grows slower than all the others as it represents a sub-polynomial growth.

Thus, the correct ranking is (D) > (A) > (E) > (B) > (C) .


Question 66:

Match List I with List II

List I List II
(A) Bucket sort (I) O(n2)
(B) Matrix chain multiplication (II) O(n3)
(C) Huffman codes (III) O(n log n)
(D) Dijkstra's Algorithm (IV) O(n)

Choose the correct answer from the options given below:

  1. (A) - (II), (B) - (III), (C) - (I), (D) - (IV).
  2. (A) - (II), (B) - (III), (C) - (IV), (D) - (I).
  3. (A) - (IV), (B) - (II), (C) - (III), (D) - (I).
  4. (A) - (III), (B) - (II), (C) - (I), (D) - (IV).
Correct Answer: (3) (A) - (IV), (B) - (II), (C) - (III), (D) - (I).
View Solution
  • Bucket sort is efficient with time complexity O(n) under specific conditions (IV).
  • Matrix chain multiplication has a time complexity of O(n3) (II).
  • Huffman codes utilize a greedy algorithm with time complexity O(n log n) (III).
  • Dijkstra's Algorithm for shortest paths typically has a time complexity of O(n2) in its standard form (I).

Hence, the correct answer is (3) (A) - (IV), (B) - (II), (C) - (III), (D) - (I).


Question 67:

Ten signals, each requiring 4000 Hz, are multiplexed onto a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel? Assume that the guard bands are 400 Hz wide.

  1. 43800 Hz
  2. 46300 Hz
  3. 43600 Hz
  4. 43700 Hz
Correct Answer: (3) 43600 Hz.
View Solution
  • Total signal bandwidth: 10 × 4000 Hz = 40000 Hz.
  • Total guard band: 9 × 400 Hz = 3600 Hz.
  • Total bandwidth required = 40000 + 3600 = 43600 Hz.

Thus, the correct answer is (3) 43600 Hz.


Question 68:

In an HTTP request message, the first line is called:

  1. Header Line
  2. Request Line
  3. Tail Line
  4. Status Line
Correct Answer: (2) Request Line.
View Solution
  • The first line in an HTTP request contains the HTTP method, the requested resource, and the HTTP version.

Thus, the correct answer is (2) Request Line.


Question 69:

Consider a scenario in which DHCP clients and servers are on the same subnet. Here the communication between DHCP clients and servers will take place via:

  1. TCP Broadcast
  2. UDP Broadcast
  3. TCP Unicast
  4. UDP Unicast
Correct Answer: (2) UDP Broadcast.
View Solution
  • DHCP uses UDP broadcasts to communicate between clients and servers on the same subnet.

Thus, the correct answer is (2) UDP Broadcast.


Question 70:

Consider the following statement(s) and choose the correct one:

  • (A) POP3 does not allow the user to organize his mail on the server.
  • (B) In IMAP4, users can search the contents of the email for a specific string of characters prior to downloading.
  • (C) MIME is a supplementary protocol that allows ASCII data to be sent through email.
  1. (A) and (B) only.
  2. (B) and (C) only.
  3. (A) and (C) only.
  4. (A) only.
Correct Answer: (2) (B) and (C) only.
View Solution
  • (A) is false because POP3 allows downloading but not organizing mail on the server.
  • (B) is true because IMAP4 enables searching email contents without downloading.
  • (C) is true because MIME supports sending binary data as text (e.g., attachments).

Thus, the correct answer is (2) (B) and (C) only.


Question 71:

The following data fragment occurs in the middle of the data stream for which the byte stuffing algorithm is used:

ABESC C ESC FLAG FLAG D

What is the output after stuffing?

  1. ABESCESC C ESC ESC ESC FLAG ESCFLAGD
  2. ABESC CESC ESCESC ESC FLAG ESC FLAGD
  3. ABESCESCESC C ESC ESC FLAG ESC FLAGD
  4. ABESCESCESC ESC C ESC FLAG ESCFLAGD
Correct Answer: (1) ABESCESC C ESC ESC ESC FLAG ESCFLAGD.
View Solution
  • Byte stuffing replaces occurrences of special characters (ESC, FLAG) with escape sequences.
  • The sequence "ESC ESC" is inserted before special characters.

Thus, the correct answer is (1) ABESCESC C ESC ESC ESC FLAG ESCFLAGD.


Question 72:

Typically, e-mail systems support five basic functions. Arrange them in sequence:

  • (A) Displaying
  • (B) Transfer
  • (C) Composition
  • (D) Disposition
  • (E) Reporting
  1. (A), (B), (C), (D), (E)
  2. (A), (C), (D), (B), (E)
  3. (C), (D), (B), (E), (A)
  4. (C), (B), (E), (A), (D)
Correct Answer: (2) (A), (C), (D), (B), (E).
View Solution
  • Logical order of email processing: composition (C), disposition (D), transfer (B), displaying (A), reporting (E).

Thus, the correct answer is (2) (A), (C), (D), (B), (E).


Question 73:

The sequence of events that happen during a typical fetch operation is:

  • (A) MAR
  • (B) IR
  • (C) MDR
  • (D) Memory
  • (E) PC
  1. (E), (A), (C), (B), (D)
  2. (E), (A), (D), (C), (B)
  3. (A), (E), (C), (B), (D)
  4. (E), (A), (C), (D), (B)
Correct Answer: (2) (E), (A), (D), (C), (B).
View Solution
  • The fetch cycle follows this order:
    1. Program counter (PC) fetches the address (E).
    2. Address is placed in MAR (A).
    3. Data is fetched from memory (D) and placed in MDR (C).
    4. Data is loaded into IR (B).

Thus, the correct answer is (2) (E), (A), (D), (C), (B).


Question 74:

Which of the following permutations can be obtained in the output (in the same order) using a stack assuming that the input is the sequence 1, 2, 3, 4, 5 in that order?

  1. (B), (D), (E), (A), (C)
  2. (B), (D), (A), (E), (C)
  3. (A), (D), (B), (C), (E)
  4. (E), (D), (C), (A), (B)
Correct Answer: (1) (B), (D), (E), (A), (C).
View Solution
  • A stack operates on the Last In, First Out (LIFO) principle. The sequence of operations respects the LIFO nature of the stack and the input order.

Thus, the correct answer is (1) (B), (D), (E), (A), (C).


Question 75:

Let G be a directed graph whose vertex set is the set of numbers from 1 to 100. There is an edge from a vertex i to vertex j if and only if either j = i + 1 or j = 3i. The minimum number of edges in a path in G from vertex 1 to vertex 100 is:

  1. 4
  2. 7
  3. 23
  4. 99
Correct Answer: (2) 7.
View Solution
  • The shortest path is determined using the conditions j = i + 1 or j = 3i.

Thus, the correct answer is (2) 7.


CUET PG Previous Year Question Paper

Fees Structure

Structure based on different categories

CategoriesState
General800
sc550

In case of any inaccuracy, Notify Us! 

Comments


No Comments To Show