Long Questions (20*2=40 Marks)
1. Select the data which is given in nominal form.
4, 8, 12, 16
2.1, 3.1, 4.3, 7.6
blue, gray, red, pink
first, last, second, fourth
2. The binary value for decimal number 120 is ……
1111000
1100000
0100000
01FF
3. Which of the following statements best describes the role of a configuration management tool in software engineering?
It helps a graphical user interface for designing software architectures.
It helps the process of generating code from high-level models or specifications.
It helps track, control, and manage changes to software artifacts throughout the development lifecycle.
It helps the testing and debugging software applications to ensure their correctness.
4. What is the correct order of phases in the Object-Oriented Development Cycle?
Analysis, Design, Implementation, Testing, Maintenance
Design, Analysis, Implementation, Maintenance, Testing
Analysis, Design, Implementation, Maintenance, Testing
Design, Analysis, Testing, Implementation, Maintenance
5. Consider ptr
as an integer pointer that stores 1000 as an address. After performing ptr = ptr + 5
, the resultant value in ptr
will be …….
ptr
as an integer pointer that stores 1000 as an address. After performing ptr = ptr + 5
, the resultant value in ptr
will be …….1000 + 5
1000 + sizeof(int) + 5
1000 + sizeof(int) * 5
1000 + 4 * 5
6. Inline functions may not be useful for many embedded systems because, ………….. in embedded systems.
function call overhead is negligible.
overhead of a return call from a function is not important.
thrashing due to inlining does not increase the size of the binary executable file.
code size is more important than speed.
7. What does the following function do for a given Linked List with the first node as head?
Prints all nodes of linked lists
Prints all nodes of linked list in reverse order
Prints alternate nodes of Linked List
Prints alternate nodes in reverse order
8. Consider the following three processes in the FCFS.
P1
3
0
P2
6
3
P3
6
9
What is the average waiting time?
2
3
4
5
9. In 8086 microprocessors, MOV AX, BX
is an example of …………
MOV AX, BX
is an example of …………Immediate addressing mode
Register addressing mode
Based indexed addressing mode
Direct addressing mode
10. Which of the following flags is not a part of the 8085 microprocessor?
Sign Flag, Zero Flag
Auxiliary Carry Flag
Parity Flag
Overflow Flag
11. A typical TCP client application issues a sequence of TCP system calls as follows:
socket, bind, connect, send, receive
socket, bind, listen, send, receive
socket, bind, listen, connect, send
socket, bind, listen, connect, send, receive
12. The macro expansion for the following code in C programming language is …..
if(i>0) then {a=1;b=2}
if(i>0) {a=1;b=2}
if(i>0) then begin a=1; b=2 end
if(i>0) then begin{ a=1; b=2 end}
13. Greedy Best-First Search is an informed search algorithm that:
Expands nodes based on their depth in the search tree
Expands nodes based on their evaluation function value
Expands nodes randomly without any heuristic guidance
Expands nodes in a breadth-first manner
14. Which of the following activation functions is commonly used for the output layer of a binary classification neural network?
Sigmoid activation function
Tanh activation function
ReLU activation function
Softmax activation function
75. What kind of support is provided by the Code Generation CASE tool?
Cross referencing queries and requirements tracing
Transformation of design records into application software
Compiling, interpreting or applying interactive debugging code
Transformation of design records into application software AND Compiling, interpreting or applying interactive debugging code
16. During SSL operation, sometimes padding may have to be appended to the last block of plaintext. Now, estimate the number of bytes which have to be handled by padding for the given case:
Size of Plaintext – 50 bytes; Size of MAC – 20 bytes; Block Length – 8 bytes.
1
2
3
4
17. Select the statement which does not agree with the notion of cloud computing.
The key benefit of cloud computing is ubiquitous access.
Data center operates under average loads.
Private cloud may not employ the same level of virtualization.
Shared resource usage does not fall under the key benefits of cloud computing.
18. CAMA/CA employs ………… approach such that the data transmission channel is first examined and if the channel is not idle, the data sender must wait for an arbitrary amount of time (not continuously), before sending the data via the channel.
1-Persistent
Non-Persistent
P-Persistent
O-Persistent
19. Effective monthly interest rate will be …………., if nominal interest rate of 10% accounted for continuous compounding.
1%
0.84%
1.2%
2%
20. By considering the following activities of a project, determine the project duration:
F
-
6
G
F
4
H
F
5
I
G, H
3
J
G, I
7
13 days
16 days
20 days
25 days
Last updated