Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Consider the following statements:(a) Revised simplex method requires lesser computations than the simplex method.(b) Revised simplex method automatically generates the inverse of the current basis matrix.(c) Less number of entries are needed in each table of revised simplex method than usual simplex method.Which of these statements are correct?(A) (a) and (b) only(B) (a) and (c) only(C) (b) and (c) only(D) (a), (b) and (c)

Answer»
2.

The region of feasible solution of a linear programming problem has a _____ property in geometry, provided the feasible solution of the problem exists.(A) concavity(B) convexity(C) quadratic(D) polyhedron

Answer»
3.

Let L = {0n1n|n ≥ 0} be a context free language.Which of the following is correct ?(A) L` is context free and Lk is not context free for any k ≥ 1.(B) L` is not context free and Lk is not context free for any k ≥ 1.(C) Both L` and Lk is for any k ≥ 1 are context free.(D) Both L` and Lk is for any k ≥ 1 are not context free.

Answer»
4.

Given a Turing MachineM = ({q0, q1, q2, q3}, {a, b}, {a, b, B}, δ, B, {q3})Where δ is a transition function defined asδ(q0, a) = (q1, a, R)δ(q1, b) = (q2, b, R)δ(q2, a) = (q2, a, R)δ(q3, b) = (q3, b, R)The language L(M) accepted by the Turing Machine is given as:(A) aa*b(B) abab(C) aba*b(D) aba*

Answer»
5.

Consider a source with symbols A, B, C, D with probabilities 1/2, 1/4, 1/8, 1/8 respectively. What is the average number of bits per symbol for the Huffman code generated from above information ?(A) 2 bits per symbol(B) 1.75 bits per symbol(C) 1.50 bits per symbol(D) 1.25 bits per symbol

Answer»
6.

Which of the following is used for the boundary representation of an image object?(A) Quad Tree(B) Projections(C) Run length coding(D) Chain codes

Answer»
7.

A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as(A) Data dictionary(B) Reference mechanism(C) Inference engine(D) Control strategy

Answer»
8.

Compute the value of adding the following two fuzzy integers :A = {(0.3, 1), (0.6, 2), (1, 3), (0.7, 4), (0.2, 5)}B = {(0.5, 11), (1, 12), (0.5, 13)}Where fuzzy addition is defined asμA+B (z) = max x + y = z(min (μA(x), μB(x)))Then, f (A + B) is equal to(A) {(0.5, 12), (0.6, 13), (1, 14), (0.7, 15), (0.7, 16), (1, 17), (1, 18)}(B) {(0.5, 12), (0.6, 13), (1, 14), (1, 15), (1, 16), (1, 17), (1, 18)}(C) {(0.3, 12), (0.5, 13), (0.5, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}(D) {(0.3, 12), (0.5, 13), (0.6, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}

Answer»
9.

Let R and S be two fuzzy relations defined as:andThen, the resulting relation, T, which relates elements of universe X to elements of universe Z using max-min composition is given by(A) (1)(B) (2)(C) (3)(D) (4)

Answer» None
10.

A perceptron has input weights W1 = – 3.9 and W2 = 1.1 with threshold value T = 0.3.What output does it give for the input x1 = 1.3 and x2 = 2.2 ?(A) – 2.65(B) – 2.30(C) 0(D) 1

Answer»
11.

Given the following statements:(A) To implement Abstract Data Type, a programming language require a syntactic unit to encapsulate type definition.(B) To implement ADT, a programming language requires some primitive operations that are built in the language processor.(C) C++, Ada, Java 5.0, C#2005 provide support for parameterised ADT.Which one of the following options is correct ?(A) (A), (B) and (C) are false.(B) (A) and (B) are true; (C) is false.(C) (A) is true; (B) and (C) are false.(D) (A), (B) and (C) are true.

Answer»
12.

Let us consider that the original point is (x, y) and new transformed point is (x′, y′). Further, Shx and Shy are shearing factors in x and y directions. If we perform the y-direction shear relative to x = xref then the transformed point is given by _______.(A) x′ = x + Shx ⋅ (y – yref)y′ = y(B) x′ = xy′ = y ⋅ Shx(C) x′ = xy′ = Shy (x – xref) + y(D) x′ = Shy ⋅ yy′ = y ⋅ (x – xref)

Answer»
13.

Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping algorithm. The rectangular window has lower left-handcorner at (– 5, 1) and upper right-hand corner at (3, 7). Consider the following three lines for clipping with the given end point co-ordinates:Line AB : A (– 6, 2) and B (–1, 8)Line CD : C (– 1, 5) and D (4, 8)Line EF : E (–2, 3) and F (1, 2)Which of the following line(s) is/are candidate for clipping?(A) AB(B) CD(C) EF(D) AB and CD

Answer»
14.

A point P(5, 1) is rotated by 90° about a pivot point (2, 2). What is the coordinate of new transformed point P′ ?(A) (3, 5)(B) (5, 3)(C) (2, 4)(D) (1, 5)

Answer»
15.

Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata M. Consider the relation RM defined by M. As all states are reachable from the start state, RM has _____ equivalence classes.(A) 2(B) 4(C) 5(D) 6

Answer»
16.

Which of the following option with reference to UNIX operating system is not correct?(A) INT signal is sent by the terminal driver when one types and it is a request to terminate the current operation.(B) TERM is a request to terminate execution completely. The receiving process will clean up its state and exit.(C) QUIT is similar to TERM, except that it defaults to producing a core dump if not caught.(D) KILL is a blockable signal.

Answer»
17.

In Unix operating system, when a process creates a new process using the fork () system call, which of the following state is shared between the parent process and child process?(A) Heap(B) Stack(C) Shared memory segments(D) Both Heap and Stack

Answer»
18.

Which of the following statements is correct?(A) Aggregation is a strong type of association between two classes with full ownership.(B) Aggregation is a strong type of association between two classes with partial ownership.(C) Aggregation is a weak type of association between two classes with partial ownership.(D) Aggregation is a weak type of association between two classes with full ownership.

Answer»
19.

It is possible to define a class within a class termed as nested class. There are _____ types of nested classes.(A) 2(B) 3(C) 4(D) 5

Answer»
20.

Software safety is quality assurance activity that focuses on hazards that(A) affect the reliability of a software component.(B) may cause an entire system to fail.(C) may result from user input errors.(D) prevent profitable marketing of the final product.

Answer»
21.

Which of the following statements is correct?(1) Every class containing abstract method must not be declared abstract.(2) Abstract class cannot be directly initiated with ‘new’ operator.(3) Abstract class cannot be initiated.(4) Abstract class contains definition of implementation.(A) (1)(B) (2)(C) (2) and (3)(D) All are correct.

Answer»
22.

Match the following:(A) (1)(B) (2)(C) (3)(D) (4)

Answer»
23.

Consider the Breshenham’s circle generation algorithm for plotting a circle with centre (0, 0) and radius ‘r’ units in first quadrant. If the current point is (xi , yi ) and decision parameter is pi then what will be the next point (xi + 1, yi + 1 + 1) and updated decision parameter pi + 1 for pi ≥ 0?(A) xi + 1 = xi+ 1yi + 1 = yipi + 1 = pi + 4xi + 6(B) xi + 1 = xi + 1yi + 1 = yi – 1pi + 1 = pi + 4(xi – yi) + 10(C) xi + 1 = xiyi + 1 = yi – 1pi + 1 = pi + 4(xi – yi) + 6(D) xi + 1 = xi – 1yi + 1 = yipi + 1 = pi + 4(xi – yi) + 10

Answer»
24.

In UNIX, processes that have finished execution but have not yet had their status collected are known as _________.(A) Sleeping processes(B) Stopped processes(C) Zombie processes(D) Orphan processes

Answer»
25.

Which of the following statement(s) is/are correct with reference to curve generation?I. Hermite curves are generated using the concepts of interpolation.II. Bezier curves are generated using the concepts of approximation.III. The Bezier curve lies entirely within the convex hull of its control points.IV. The degree of Bezier curve does not depend on the number of control points.(A) I, II and IV only(B) II and III only(C) I and II only(D) I, II and III only

Answer»
26.

Given the following statements:(A) Frequency Division Multiplexing is a technique that can be applied when the bandwidth of a link is greater than combined bandwidth of signals to be transmitted.(B) Wavelength Division Multiplexing (WDM) is an analog multiplexing Technique to combine optical signals.(C) WDM is a Digital Multiplexing Technique.(D) TDM is a Digital Multiplexing Technique.Which of the following is correct?(A) (A), (B), (C) and (D) are true.(B) (A), (B), (C) and (D) are false.(C) (A), (B) and (D) are false; (C) is true.(D) (A), (B) and (D) are True; (C) is false.

Answer»
27.

In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements:I. A mode of 641 (octal) means that the owner can read and write the file, other members of the owner’s group can read it, and users can execute only.II. A mode of 100 (octal) allows the owner to execute the file, but prohibits all other access.Which of the following options is correct with reference to above statements ?(A) Only I is correct.(B) Only II is correct.(C) Both I and II are correct.(D) Both I and II are incorrect.

Answer»
28.

Implicit return type of a class constructor is:(A) not of class type itself(B) class type itself(C) a destructor of class type(D) a destructor not of class type

Answer»
29.

If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ______.(A) 64 Kbps(B) 32 Mbps(C) 32 Kbps(D) 64 MbpS

Answer»
30.

Assume that we need to download text documents at the rate of 100 pages per minute. A page is an average of 24 lines with 80 characters in each line and each character requires 8 bits. Then the required bit rate of the channel is _____.(A) 1.636 Kbps(B) 1.636 Mbps(C) 3.272 Mbps(D) 25.6 Kbps

Answer»
31.

A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ______.(A) 0.384(B) 0.184(C) 0.286(D) 0.586

Answer»
32.

In perspective projection, if a line segment joining a point which lies in front of the viewer to a point in back of the viewer is projected to a broken line of infinite extent. This is known as _______.(A) View confusion(B) Vanishing point(C) Topological distortion(D) Perspective foreshortening

Answer»
33.

Match the software maintenance activities in List – I to its meaning in List – II.(A) (1)(B) (2)(C) (3)(D) (4)

Answer»
34.

Which one of the following array represents a binary max-heap?(A) [26, 13, 17, 14, 11, 9, 15](B) [26, 15, 14, 17, 11, 9, 13](C) [26, 15, 17, 14, 11, 9, 13](D) [26, 15, 13, 14, 11, 9, 17]

Answer»
35.

Match each application/software design concept in List – I to its definition in List – II.(A) (1)(B) (2)(C) (3)(D) (4)

Answer»
36.

Consider the following two languages :L1 = {0i1j| gcd (i, j) = 1}L2 is any subset of 0*.Which of the following is correct ?(A) L1 is regular and L2* is not regular(B) L1 is not regular and L2* is regular(C) Both L1 and L2* are regular languages(D) Both L1 and L2* are not regular languages

Answer»
37.

The number of different binary trees with 6 nodes is ______.(A) 6(B) 42(C) 132(D) 256

Answer» None
38.

Match the following:(A) (1)(B) (2)(C) (3)(D) (4)

Answer»
39.

Let A[1…n] be an array of n distinct numbers. If i < j and A[i] > A[j], then the pair (i, j) is called an inversion of A. What is the expected number of inversions in any permutation on n elements ?(A) n(n-1)/2(B) n(n-1)/4(C) n(n+1)/4(D) 2n[logn]

Answer»
40.

The regular expression for the complement of the language L = {anbm|n ≥ 4, m ≤ 3} is:(A) (λ + a + aa + aaa) b* + a* bbbb* + (a + b)* ba(a + b)*(B) (λ + a + aa + aaa) b* + a* bbbbb* + (a + b)* ab(a + b)*(C) (λ + a + aa + aaa) + a* bbbbb* + (a + b)* ab(a + b)*(D) (λ + a + aa + aaa)b* + a* bbbbb* + (a + b)* ba(a + b)*

Answer»
41.

A server crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) is 30 days. When this happens, it takes 12 hours to reboot it, that is, the Mean Time to Repair (MTTR) is 12 hours. The availability of server with these reliability data values is approximately :(A) 96.3%(B) 97.3%(C) 98.3%(D) 99.3%

Answer»
42.

When one object reference variable is assigned to another object reference variable then(A) a copy of the object is created.(B) a copy of the reference is created.(C) a copy of the reference is not created.(D) it is illegal to assign one object reference variable to another object reference variable.

Answer»
43.

Suppose that we have numbers between 1 and 1,000 in a binary search tree and want to search for the number 364. Which of the following sequences could not be the sequence of nodes examined ?(A) 925, 221, 912, 245, 899, 259, 363, 364(B) 3, 400, 388, 220, 267, 383, 382, 279, 364(C) 926, 203, 912, 241, 913, 246, 364(D) 3, 253, 402, 399, 331, 345, 398, 364

Answer»
44.

Which of the following is false regarding the evaluation of computer programming languages ?(A) Application oriented features(B) Efficiency and Readability(C) Software development(D) Hardware maintenance cost

Answer»
45.

Match the following types of variables with the corresponding programming languages:(A) (1)(B) (2)(C) (3)(D) (4)

Answer»
46.

Which of the following statements is not correct?(A) HTML is not screen precise formatting language.(B) HTML does not specify a logic.(C) DHTML is used for developing highly interactive web pages.(D) HTML is a programming language.

Answer»
47.

Which of the following statement is not correct with reference to cron daemon in UNIX O.S. ?(A) The cron daemon is the standard tool for running commands on a pre-determined schedule.(B) It starts when the system boots and runs as long as the system is up.(C) Cron reads configuration files that contain list of command lines and the times at which they invoked.(D) Crontab for individual users are not stored.

Answer»
48.

Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing order of maturity ?(A) Initial, Defined, Repeatable, Managed, Optimized.(B) Initial, Repeatable, Defined, Managed, Optimized.(C) Initial, Defined, Managed, Repeatable, Optimized.(D) Initial, Repeatable, Managed, Defined, Optimized.

Answer»
49.

A multicomputer with 256 CPUs is organized as 16 × 16 grid. What is the worst case delay (in hops) that a message might have to take ?(A) 16(B) 15(C) 32(D) 30

Answer»
50.

Which of the following information about the UNIX file system is not correct?(A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks.(B) An i-node contains accounting information as well as enough information to locate all the disk blocks that holds the file’s data.(C) Each i-node is 256-bytes long.(D) All the files and directories are stored in data blocks.

Answer»