PHDCS
PHDCS
Note :
(vii) Section B : Comprised of subject specific (computer science) objective type question.
PHDCS 1 P.T.O.
SECTION - A
1. Write the Matrix Multiplication algorithm using Dynamic Programming. Given a chain
of four matrices A i, A2, A3 and A4 with po = 5, p i =4, ID, = 6, p 3 = 2 and p4 = 7. Find
m [1, 4]; using matrix multiplication algorithm through dynamic programming. 4+6=10
OR
Let us assume that a Read - Write (R/W) head of a CD (Compact Disk) player is at a
distance 'r' from the axis of rotation. It rotates in anticlockwise direction, with angular
velocity `ui, to read the data on disk. Say at any time 'T' it substends an angle '0', to the
horizontal axis and positioned at point P(x i, yi). After time AT its new position is
Q(x2, y2), where it substends angle (0 + 6,0) to the horizontal axis. Draw a Diagram for
the situation mentioned above, use it to determine the system of equations. Use the
system of equations to derive the transformation matrix. Use homogeneous system of
coordinates and extend your derivation of transformation matrix to 3 - D system of
coordinates and write transformation matrix when rotations are applied w.r.t x, y and
z axis.
2. What are sparse matrices ? Discuss the techniques to manage the data in sparse matrix, 5
with suitable example. How the identified technique contributes to efficiency ?
3. Two hundred randomly selected adults were asked whether the use of "Whatsapp" is 10
primarily entertaining, educational or waste of time (only one answer could be chosen).
The respondents were categorized by gender. Responses are given below (Given critical
value of X2 = 5.99 at a = 0.05 and df= 2)
Opinion
--- Entertaining Educational Waste of Time Total
Gender
4/
FEMALE 52 28 30 110
MALE 28 12 50 90
TOTAL 80 40 80 200
Is this evidence convincing that there is a relationship between gender and opinion in
the population interest ?
OR
Performance of ten software applications are tested and ranked by using three testing
tools the ranking data is as follows :
Software App
1 2 3 4 5 6 7 8 9 10
Tool
1 1 6 5 10 3 2 4 9 7 8
2 3 5 8 4 7 10 2 1 6 9
3 6 4 9 8 1 2 3 10 5 7
Determine which pair of testing tools has the nearest approach in command to rank
the performance of software application.
PHDCS 2
4. Discriptive statistics of the data of the profits of 100 call centers from two different 5
regions is given below :
Calculate coefficient of skewness and analyse the results. Based on the above analysis
answer the following :
(a) What is the polarity of skewness for region I and II respectively ?
(b) In which region, greater concentration is towards higher profits ?
(c) In which region, greater concentration is towards lower profits •?
(d) Earning of profit in which region is more skewed ?
5. (a) An opaque pot contains 5 red and 4 blue balls. Two balls are withdrawn from
the pot (without replacement). What is the probability that : 3+2=5
(i) the two balls that are drawn are of the same colour
(ii) both the balls are of different colours
(b) Two fair dices are rolled simultaneously. Find the conditional probability that
sum of the scores of the dices will be exactly 7 given that the sum of the throw is
odd number.
6. (a) Differentiate between discrete random variable and continuous random variables
in the context of probability distribution. 2+3=5
(b) A fair coin is tossed 4 times. Draw the probability distribution of getting heads in
the tosses.
7. Explain the term "startified sampling". A car company wants to conduct a survey on 5
popular localities about colour of cars owned by people. How will they create stratified
sample ? Explain.
8. Explain the following with the help of an example of each in the context of statistical 5
testing
(a) NULL hypothesis (b) Level of significance
(c) Degrees of freedom (d) One - tailed test
(e) Type - z errors
PHDCS 3 P.T.O.
SECTION - B
1. Well known database system that use the network database model is :
(1) IBM information management system.
(2) Interbase
(3) Integrated Database Management system
(4) Mimer SQL
3. Transactions are required to have the ACID properties. The property that ensures all
the effects of a transactions are reflected in the database, or none are reflected is :
(1) Atomicity (2) Consistency
(3) Isolation (4) Durability
4. We use heuristics to reduce the number of plans considered and thereby to reduce the
cost of query evaluation. Heuristic rule(s) for transforming relational algebra queries
include.
(1) Perform selection operations as early as possible
(2) Perform projections early
(3) Avoid cartesian products
(4) All of the above
7. is the coincidence of high page traffic and low CPU utilization in operating
systems.
(1) Page fault (2) Disk striping
(3) Thrashing (4) Race condition
8. In scheduling, the average no. of jobs or processes completed by a server in one unit of
time is called :
(1) Weighted turn around time (2) Turn around time
(3) Response time (4) Throughput
PHDCS 4
9. A seperate is provided on the client side for each remote procedure in
RPC.
(1) Process identifier (2) Controller
(3) Stub (4) Name convention
11. Using the extended Euclidean Algorithm, find out the multiplicative inverse of 1234
mod 4321.
(1) 3239 (2) 3237
(3) 3217 (4) There is no multiplicative inverse in this case
12. Which of the following reason is correct to support the statement that AES "f function"
is better than DES "f function" ?
(1) It has mix column step where the different bytes interact with each other.
(2) It has wholesale swapping of row or columns.
(3) It has Byte sub step to contribute non-linearity.
(4) It has shift row step to permute the bytes.
13. Select the primitive operations given below which are used in RC4 algorithm.
(i) XOR operation (ii) Data - dependent rotations
(iii) Round function (iv) Modulo operation
(v) Byte swapping
(1) Only (i) and (ii) (2) Only (ii), (iii) and (iv)
(3) Only (i), (iv) and (v) (4) Only (i), (ii) and (v)
15. If a bit error occurs in the transmission of cipher - text character in 8 bit CFB (Cipher
Feedback) mode, how far does the error propogate ?
(1) 4 characters (2) 8 characters
(3) 9 characters (4) 10 characters
16. Assume the peak voltage value of a signal is 20 times the peak voltage of the noise.
Calculate the SNRdB .
(1) 21.29 (2) 400 (3) 20 (4) 26.02
PHDCS 5 P.T.O.
17. Find out the number of invalid (unused) code sequences '5B/6B encoding' can have ?
(1) 24 (2) 32 (3) 48 (4) 64
18. An IPv4 datagram is carrying 1024 bytes of data. If there is no option information,
what should be the value of the 'Header Length Field' and the value of 'Total Length
Field'.
(1) Header length field =20 and Total length field =1048.
(2) Header length field =10 and Total length field =1048.
(3) Header length field = 20 and Total length field =1044.
(4) Header length field =05 and Total length field =1048.
20. In concext of TCP, to make the initial sequence number (a random number); most systems
start the counter at 1 during bootstrap and increment the counter by 64,000 every
0.5 second. How long does it take for the counter to wrap around ?
(1) 128000 seconds (2) 232533 seconds
(3) 1000000 seconds (4) 33554 seconds
22. What would be the next state of following circuit. Assume that flip-flop 1 is in
Reset/clear (0) state and flip-flop 2 is in set state (1). The J-K flip-flops are used, and
state is represented as the state bits flip flop 1 and then of flip - flop2.
Clock
PHDCS 6
23. Assume the following binary floating point number representation.
Decimal
address. l6 bits—>
0 Decimal
1 address .e-32 bits -->
2 0
1 Block of
cache = 2 1 4 block
memory words 2 cache
21
3
Cache memory
Memory
Assume that the content of memory word 21 is also in the cache, what would be the
cache block number in which memory word 21 is located, if direct main - memory to
cache mapping scheme is used.
(1) Block 0 (2) Block 1 (3) Block 2 (4) Block 3
25. A machine uses stack for subroutine call as well as for passing parameters. It uses
16 bit registers and byte addressible RAM. Assume that stack is to be made in memory
only and only one parameter of 8 bits is to be passed. Also assume that the return
address is 32 bit long and no other register is saved. What would be the position of
parameter from the stack top, if control has moved to the subroutine : (SP represents
stack pointer and points to top of stack)
(1) SP (2) SP - 2 (3) SP - 4 (4) SP - 6
PHDCS 7 P.T.O.
26. The maximum number of nodes on level i of a Binary Tree is . The level of
a Binary Tree is > 1.
27. What are the expected number of comparisons required to find a node chosen at random
in the following Binary Search Tree.
E\
A
H
B D F
/
A G
28. In a lower Triangular Matrix, the maximum number of non-zero terms in row i (i 1)
is
29. Any algorithm which sorts by comparisons only must have a worst case computing
time of atleast where n is number of elements.
30. All connected undirected Graphs with edges are trees where 'n' is the
number of vertices.
PHDCS 8
31. Grammar of odd palindromes over 1= fa, b} is :
(1) S —> asalbsbiA (2) S ----> asalbsbialbl A
(3) S ---> aasibbsIA (4) S —> aasibbslalblA
35. Each regular language is context-free language but converse need not be true.
(1) always true (2) always false
(3 ) sometimes true (4) sometimes false
P --> Q, P
38. refers to which inference rule ?
Q
(1) Modus Ponens (2) Modus Tollens
(3) Syllogism (4) Disjunctive syllogism
PHDCS 9 P.T.O.
40. Unification is a process in which there is :
41. Which of the following is a valid topological sorting of the given graph ?
42. Apply the Greedy Algorithm to solve Krapsack problem to find the optimal solution
for the following problem : There are five objects. For every object weight and value
are given as shown in the table below : The maximum capacity of Knapsack is 60 kg.
43. Total number of companisons made in Quicksort for sorting a file of size n is :
PHDCS 10
44. What is the chromatic number of the complete bipartite graph K o 3, 4 ?
(3) 'Using inheritance new class can be built on top of the old class.
(4) Object oriented applications are built from reusable software components.
48. While using array in Java which exception should be handled to avoid error in access
the array elements ?
PHDCS 11 P.T.O.
49. Which statement is not true about multithreaded programming in Java ?
(1) A synchronized method can be run for a particular object or class by only one
thread at a time.
(2) Deadlock can occur when all threads are in blocked state.
,
0o -
PHDCS 12