Long Questions (20*2=40 Marks)
1. Select the data which is given in nominal form.
- 4, 8, 12, 16 
- 2.1, 3.1, 4.3, 7.6 
- blue, gray, red, pink 
- first, last, second, fourth 
2. The binary value for decimal number 120 is ……
- 1111000 
- 1100000 
- 0100000 
- 01FF 
3. Which of the following statements best describes the role of a configuration management tool in software engineering?
- It helps a graphical user interface for designing software architectures. 
- It helps the process of generating code from high-level models or specifications. 
- It helps track, control, and manage changes to software artifacts throughout the development lifecycle. 
- It helps the testing and debugging software applications to ensure their correctness. 
4. What is the correct order of phases in the Object-Oriented Development Cycle?
- Analysis, Design, Implementation, Testing, Maintenance 
- Design, Analysis, Implementation, Maintenance, Testing 
- Analysis, Design, Implementation, Maintenance, Testing 
- Design, Analysis, Testing, Implementation, Maintenance 
5. Consider ptr as an integer pointer that stores 1000 as an address. After performing ptr = ptr + 5, the resultant value in ptr will be …….
ptr as an integer pointer that stores 1000 as an address. After performing ptr = ptr + 5, the resultant value in ptr will be …….- 1000 + 5
- 1000 + sizeof(int) + 5
- 1000 + sizeof(int) * 5
- 1000 + 4 * 5
6. Inline functions may not be useful for many embedded systems because, ………….. in embedded systems.
- function call overhead is negligible. 
- overhead of a return call from a function is not important. 
- thrashing due to inlining does not increase the size of the binary executable file. 
- code size is more important than speed. 
7. What does the following function do for a given Linked List with the first node as head?
void fun1(struct node* head) 
{ 
  if (head == NULL) 
    return; 
  fun1(head->next); 
  printf("%d ", head->data); 
}
- Prints all nodes of linked lists 
- Prints all nodes of linked list in reverse order 
- Prints alternate nodes of Linked List 
- Prints alternate nodes in reverse order 
8. Consider the following three processes in the FCFS.
P1
3
0
P2
6
3
P3
6
9
What is the average waiting time?
- 2 
- 3 
- 4 
- 5 
9. In 8086 microprocessors, MOV AX, BX is an example of …………
MOV AX, BX is an example of …………- Immediate addressing mode 
- Register addressing mode 
- Based indexed addressing mode 
- Direct addressing mode 
10. Which of the following flags is not a part of the 8085 microprocessor?
- Sign Flag, Zero Flag 
- Auxiliary Carry Flag 
- Parity Flag 
- Overflow Flag 
11. A typical TCP client application issues a sequence of TCP system calls as follows:
- socket, bind, connect, send, receive 
- socket, bind, listen, send, receive 
- socket, bind, listen, connect, send 
- socket, bind, listen, connect, send, receive 
12. The macro expansion for the following code in C programming language is …..
#define then  
#define begin { 
#define end ;} 
if( i>0) then begin a=1; b=2 end- if(i>0) then {a=1;b=2} 
- if(i>0) {a=1;b=2} 
- if(i>0) then begin a=1; b=2 end 
- if(i>0) then begin{ a=1; b=2 end} 
13. Greedy Best-First Search is an informed search algorithm that:
- Expands nodes based on their depth in the search tree 
- Expands nodes based on their evaluation function value 
- Expands nodes randomly without any heuristic guidance 
- Expands nodes in a breadth-first manner 
14. Which of the following activation functions is commonly used for the output layer of a binary classification neural network?
- Sigmoid activation function 
- Tanh activation function 
- ReLU activation function 
- Softmax activation function 
75. What kind of support is provided by the Code Generation CASE tool?
- Cross referencing queries and requirements tracing 
- Transformation of design records into application software 
- Compiling, interpreting or applying interactive debugging code 
- Transformation of design records into application software AND Compiling, interpreting or applying interactive debugging code 
16. During SSL operation, sometimes padding may have to be appended to the last block of plaintext. Now, estimate the number of bytes which have to be handled by padding for the given case:
Size of Plaintext – 50 bytes; Size of MAC – 20 bytes; Block Length – 8 bytes.
- 1 
- 2 
- 3 
- 4 
17. Select the statement which does not agree with the notion of cloud computing.
- The key benefit of cloud computing is ubiquitous access. 
- Data center operates under average loads. 
- Private cloud may not employ the same level of virtualization. 
- Shared resource usage does not fall under the key benefits of cloud computing. 
18. CAMA/CA employs ………… approach such that the data transmission channel is first examined and if the channel is not idle, the data sender must wait for an arbitrary amount of time (not continuously), before sending the data via the channel.
- 1-Persistent 
- Non-Persistent 
- P-Persistent 
- O-Persistent 
19. Effective monthly interest rate will be …………., if nominal interest rate of 10% accounted for continuous compounding.
- 1% 
- 0.84% 
- 1.2% 
- 2% 
20. By considering the following activities of a project, determine the project duration:
F
-
6
G
F
4
H
F
5
I
G, H
3
J
G, I
7
- 13 days 
- 16 days 
- 20 days 
- 25 days 
Last updated