JNU PhD CS 2019
Question 1 
An upperlayer packet is split into 10 frames, each of which has an 80 percent chance of arriving undamaged. If no error control is done by the data link protocol, how many times must the message be sent on average to get the entire thing through (in transmissions)?
18.6  
27.9  
9.3  
None of the above 
Question 1 Explanation:
Total frames=10
Each frame has a chance of 80% undamage which is 0.8 of getting through, the chance of the whole message getting through is (0.8)^{10}, which is about 0.107. Call this value p.
The expected number of transmissions for an entire message is then
Now use a = 1p to get E = 1/p. Thus, it takes an average of 1/0.107, or about 9.3 transmissions.
Each frame has a chance of 80% undamage which is 0.8 of getting through, the chance of the whole message getting through is (0.8)^{10}, which is about 0.107. Call this value p.
The expected number of transmissions for an entire message is then
Now use a = 1p to get E = 1/p. Thus, it takes an average of 1/0.107, or about 9.3 transmissions.
Question 2 
Consider building a CSMA/CD network running at 1Gbps over a 1km cable with no repeaters. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size?
10000 bytes  
100000 bits
 
1250 bits  
None of the above 
Question 2 Explanation:
Question 3 
If two communicating stations X and Y are linked through two intermediate routers, r1 and r2; then determine the number of times each packet visits Network Layer (NL) and Data Link Layer (DLL) for single transmission from X to Y.
NL  4, DLL  4  
NL  4, DLL  3  
NL  4, DLL  6  
NL  2, DLL  6 
Question 3 Explanation:
Each router will contain two DLL since it has two interfaces and one network layer. Each host or station will contain one network layer and one data link layer. So the total no. of data link layer will be 2(from stations) + 4(from routers) = 6. No. of network layers will be 2(from stations) + 2(from routers) = 4.
Question 4 
To deliver a message to the correct application program running on a host, the address must be consulted is
port  
physical  
IP  
None 
Question 4 Explanation:
IP address takes you to the correct host but not to the process in the host. And each host might contain many processes. So the address required to deliver a message to the application program or process within a host is the port address.
Question 5 
Manchester encoding is principally designed to
ensure that the line remains unbalanced  
have more than one symbol per bit period  
increase the bandwidth of a signal transmitted on the medium  
ensure that a transition occurs in the center of each bit period 
Question 5 Explanation:
In Manchester encoding a logic 0 is indicated by a 0 to 1 transition at the centre of the bit and logic 1 by 1 to 0 transition.
Question 6 
The concept of pipelining is most effective in improving performance if the tasks being performed in different stages:
require different amount of time  
require about the same amount of time  
require different amount of time with time difference between any two tasks being same  
require different amount with time difference between any two tasks being different 
Question 6 Explanation:
Case 1:
Consider 4 stages in pipeline P1, P2, P3, P4, with each stage requires 1ns.
For large no. of instructions the time taken by pipeline to execute one task is 1ns.
But for non pipeline the time taken to execute one task is,
Case 2:
Now let’s consider 4 stages pipeline P1, P2, P3, P4, with each stage requiring 1ns, 2ns, 3ns, 4ns.
For large no. of instruction the time taken by pipeline to execute one task is max(1, 2, 3, 4)ns = 4ns
But for non pipeline the time taken to execute one task is,
1 + 2 + 3 + 4 = 10ns
Hence from above it can be clearly seen that the concept of pipelining is most effective in improving performance if the tasks being performed in different stages require about the same amount of time.
Consider 4 stages in pipeline P1, P2, P3, P4, with each stage requires 1ns.
For large no. of instructions the time taken by pipeline to execute one task is 1ns.
But for non pipeline the time taken to execute one task is,
Case 2:
Now let’s consider 4 stages pipeline P1, P2, P3, P4, with each stage requiring 1ns, 2ns, 3ns, 4ns.
For large no. of instruction the time taken by pipeline to execute one task is max(1, 2, 3, 4)ns = 4ns
But for non pipeline the time taken to execute one task is,
1 + 2 + 3 + 4 = 10ns
Hence from above it can be clearly seen that the concept of pipelining is most effective in improving performance if the tasks being performed in different stages require about the same amount of time.
Question 7 
Given that (292)_{10} = (1204)_{x} in some number system x. The base x of that number system is
2  
8  
10  
None of the above 
Question 7 Explanation:
Question 8 
Which of the following is not functionally a complete set?
AND, OR
 
NOR  
NAND  
AND, OR, NOT 
Question 8 Explanation:
Functionally complete sets are NOR,NAND,(OR,NOT),(AND,NOT).
Hence Option (a) set in not functionally complete.
Hence Option (a) set in not functionally complete.
Question 9 
Assume that for a certain processor, a read request takes 50 nanoseconds on a cache miss and 5 nanoseconds on a cache hit. Suppose while running a program, it was observed that 70% of the processor’s read requests result in a cache hit. The average read access time in nanoseconds is
10  
12  
13  
18.5 
Question 9 Explanation:
ARAT = Hit rate × cache hit time + miss rate × cache miss time
= 0.7 × 5ns + 0.3 × 50ns
= 3.5ns + 15ns
= 18.5 ns
= 0.7 × 5ns + 0.3 × 50ns
= 3.5ns + 15ns
= 18.5 ns
Question 10 
The number of minterms after minimizing the following Boolean expression is
[D’ + AB’ + A’C + AC’D + A’C’D]’
1  
46  
56  
76 
Question 10 Explanation:
(D’ + AB’ + A’C + AC’D + A’C’D)’
(D’ + A’C’D + AB’ + A’C + AC’D)’
((D’ + D) (D’ + A’C’) + AB’ + A’C + AC’D)’
(D’ + A’C’ + AB’ + A’C + AC’D)’
(D’ + AC’D + AB’ + A’(C + C’))’
(D’ + AC’ + AB’ + A’)
(D’ + AC’ + (B’ + A’) (A + A’)
(D’ + AC’ + B’ + A’)
(D’ + (A + A’) (C’ + A’) + B’)’
(D’ + C’ + A’ + B’)’ = ABCD
(D’ + A’C’D + AB’ + A’C + AC’D)’
((D’ + D) (D’ + A’C’) + AB’ + A’C + AC’D)’
(D’ + A’C’ + AB’ + A’C + AC’D)’
(D’ + AC’D + AB’ + A’(C + C’))’
(D’ + AC’ + AB’ + A’)
(D’ + AC’ + (B’ + A’) (A + A’)
(D’ + AC’ + B’ + A’)
(D’ + (A + A’) (C’ + A’) + B’)’
(D’ + C’ + A’ + B’)’ = ABCD
Question 11 
The speed up of a pipeline processing over an equivalent nonpipeline processing is defined by the ratio:
where n→no. of tasks, T_{n}→time of completion of each task, k→no. of segments of pipeline, T_{p}→clock cycle time, S→speed up ratio.
S = n T_{n}/ (k + n  1) T_{p}  
S = n T_{n}/ (k + n + 1) T_{p}  
S = n T_{n}/ (k  n + 1) T_{p}  
S = (k + n  1) T_{p}/ n T_{n} 
Question 11 Explanation:
Consider a ‘k’ segment pipeline with clock cycle time as ‘Tp’. Let there be ‘n’ tasks to be completed in the pipelined processor. Now, the first instruction is going to take ‘k’ cycles to come out of the pipeline but the other ‘n – 1’ instructions will take only ‘1’ cycle each, i.e, a total of ‘n – 1’ cycles. So, time taken to execute ‘n’ instructions in a pipelined processor:
ET pipeline = k + n – 1 cycles
= (k + n – 1) Tp
In the same case, for a nonpipelined processor, execution time of ‘n’ instructions will be:
ETnonpipeline = n * k * Tp
but in question k * Tp = Tn
Hence ETnonpipeline = n * Tn
So, speedup (S) of the pipelined processor over nonpipelined processor, when ‘n’ tasks are executed on the same processor is:
S = Performance of pipelined processor /
Performance of Nonpipelined processor
As the performance of a processor is inversely proportional to the execution time, we have,
S = ETnonpipeline / ETpipeline
=> S = [n *Tn] / [(k + n – 1) * Tp]
ET pipeline = k + n – 1 cycles
= (k + n – 1) Tp
In the same case, for a nonpipelined processor, execution time of ‘n’ instructions will be:
ETnonpipeline = n * k * Tp
but in question k * Tp = Tn
Hence ETnonpipeline = n * Tn
So, speedup (S) of the pipelined processor over nonpipelined processor, when ‘n’ tasks are executed on the same processor is:
S = Performance of pipelined processor /
Performance of Nonpipelined processor
As the performance of a processor is inversely proportional to the execution time, we have,
S = ETnonpipeline / ETpipeline
=> S = [n *Tn] / [(k + n – 1) * Tp]
Question 12 
Consider a system running ten I/O  bound tasks and one CPU  bound task. Assume that the I/O  bound tasks issue an I/O operation once for every millisecond of CPU computing and that each I/O operation takes 10 milliseconds to complete. Also assume that the context switching overhead is 0.1 millisecond and that all processes are longrunning tasks. The CPU utilization for a roundrobin scheduler when the time quantum is millisecond?
78%  
91%  
98%  
80% 
Question 12 Explanation:
The time quantum is 1 millisecond: Irrespective of which process is scheduled, the scheduler incurs a 0.1 millisecond contextswitching cost for every contextswitch. This results in a CPU utilization of 1/1.1 * 100 = 91%.
Question 13 
Assume we have a demandpaged memory. The page table is held in registers. It takes 8 milliseconds to service a page fault if an empty page is available or the replaced page is not modified, and 20 milliseconds if the replaced page is modified. Memory access time is 100 nanoseconds. Assume that the page to be replaced is modified 70 percent of the time. What is the maximum acceptable pagefault rate for an effective access time of no more than 200 nanoseconds?
0.0006  
0.00006  
0.006  
None of the above 
Question 13 Explanation:
Let p be the page fault rate (the probability that a memory access results in a page fault).
Then (1 − p) is the probability that a memory access costs 100 nsec.
The probability that a page fault costs 20 msec is 0.7 ∗ p and the probability that a page fault costs 8 msec is 0.3 ∗ p.
Since 1 nsec = 1000000 msec, (1 − p) ∗ 100 + 0.7 ∗ p ∗ 20000000 + 0.3 ∗ p ∗ 8000000 = 200 (14000000 + 2400000 − 100)p = 100 p = 100/(16400100) = 6.1 ∗ 10^−6 = .0000061 = .00061%
Then (1 − p) is the probability that a memory access costs 100 nsec.
The probability that a page fault costs 20 msec is 0.7 ∗ p and the probability that a page fault costs 8 msec is 0.3 ∗ p.
Since 1 nsec = 1000000 msec, (1 − p) ∗ 100 + 0.7 ∗ p ∗ 20000000 + 0.3 ∗ p ∗ 8000000 = 200 (14000000 + 2400000 − 100)p = 100 p = 100/(16400100) = 6.1 ∗ 10^−6 = .0000061 = .00061%
Question 14 
Which of the following scheduling algorithms could result in starvation?
i) Firstcome, firstserved
ii) Shortest job first
iii) Round robin
iv) Priority
ii and iv  
i and iii  
iv only  
None of the above 
Question 14 Explanation:
In Shortest job first the job with longest burst time may starve if the process with low burst time keeps coming.
In priority scheduling algorithm the job with lowest priority may starve if the process with highest priority keeps coming.
FCFS and round robin scheduling algorithm will never cause starvation.
In priority scheduling algorithm the job with lowest priority may starve if the process with highest priority keeps coming.
FCFS and round robin scheduling algorithm will never cause starvation.
Question 15 
Overlay is
A part of an operating system  
A specific memory location  
A single contiguous memory that was used in the olden days for running large program by swapping  
Overloading the system with many user files 
Question 15 Explanation:
In a general computing sense, overlaying means "the process of transferring a block of program code or other data into main memory, replacing what is already stored". Overlaying is a programming method that allows programs to be larger than the computer's main memory.
Question 16 
In which of the following directory systems, it is possible to have multiple complete paths for a file, starting from the root directory?
Single level directory  
Two level directory  
Tree structured directory  
Acyclic graph directory 
Question 16 Explanation:
In acyclic graph directory we can provide sharing by making the directory an acyclic graph. In this system, two or more directory entry can point to the same file or sub directory. That file or sub directory is shared between the two directory entries.
Question 17 
A transparent DBMS
Cannot hide sensitive information from users  
Keep its logical structure hidden from users  
Keeps its physical structure hidden from users  
Both (b) and (c) 
Question 17 Explanation:
A transparent DBMS keeps its physical structure hidden from users.
Question 18 
A locked file can be
Accessed by only one user  
Modified by users with the correct password  
Is used to hide sensitive information  
Both (b) and (c) 
Question 18 Explanation:
A locked file can be accessed by only one user at any specific time otherwise there would be race condition.
Question 19 
Let F = {D→AC, A→DB, B→E, E→D} that hold on the attribute set {A, B, C, D, E}, then the highest normal form that hold is
BCNF  
3NF  
2NF  
None of the above 
Question 19 Explanation:
The candidate keys for given functional dependencies are A,B,D,E.
So for the given functional dependencies left side of each functional dependencies is super key which satisfies the condition of BCNF. Hence the given relation is in BCNF.
So for the given functional dependencies left side of each functional dependencies is super key which satisfies the condition of BCNF. Hence the given relation is in BCNF.
Question 20 
Which of the following statements are correct about an array?
1. The array int num[26]; can store 26 elements.
2. The expression num[1] designates the very first element in the array.
3. It is necessary to initialize the array at the time of declaration
4. The declaration num[SIZE] is allowed if SIZE is a macro.
1  
2,4  
2,3  
1,4 
Question 20 Explanation:
Statement 1 is true.
Statement 2 is false because the expression num[0] designates the very first element in the array.
Statement 3 is false ,it is not necessary to initialize the array at the time of initialization.
Statement 4 is true, because the declaration num[SIZE] is allowed if SIZE is a macro. This statement is true, because the MACRO just replaces the symbol SIZE with given value.
Statement 2 is false because the expression num[0] designates the very first element in the array.
Statement 3 is false ,it is not necessary to initialize the array at the time of initialization.
Statement 4 is true, because the declaration num[SIZE] is allowed if SIZE is a macro. This statement is true, because the MACRO just replaces the symbol SIZE with given value.
Question 21 
What is the output of the following statements?
int i=3;
printf(“%d%d”, i,i++);
34  
43  
44  
33 
Question 21 Explanation:
In printf() function we calculate from right to left and then printing is done from left to right.
So first i++ will be calculated but since ++ is post operator here so first i=3 value will be accepted and then value of i will be incremented by 1 .So next time simply i is there which now have value 4 so i=4 will be accepted and the output will be 43.
Question 22 
The following program fragment
int a=4, b=6;
print (“%d”, a==b);
outputs an error message  
prints 0  
prints 1  
none of the above 
Question 22 Explanation:
“==” is a binary operator which either gives value either 1 or 0 depending on whether it is true or false. Since the value of variable ‘a’ and ‘b’ are different so the == operator will be false and the output will be 0.
Question 23 
Consider the following program
float myFunc(float *array, int size)
{
float x=0;
if (size!=0)
X = *array + myFunc(array+1, size1);
return x;
}
void main ( )
{
float array [5] = {0, 0.5, 1.0, 1.5, 2};
printf (“%f\n”, myFunc(array,5));
}
What is the output of the program and how many times that the function “myFunc” is called?
3 and 6  
5 and 5  
5 and 6  
None of the above 
Question 23 Explanation:
Hence the output will be 5 and no. of times the myFunc() function is called is 6.
Question 24 
How many RAM chips of size (256K × 1 bit) are required to build 1M byte memory?
8  
10  
32  
24 
Question 24 Explanation:
Question 25 
Property of locality of reference may fail if a program has
Many conditional jumps  
Many unconditional jumps  
Many operands  
All of these 
Question 25 Explanation:
A R locality of reference, also known as the principle of locality,is the tendency of a processor to access the same set of memory locations repetitively over a short period of time.
Question 26 
The strategy by which algorithms are expressed in terms of general ideas, each of which can be further developed in general terms is called:
TopDown design  
Pseudocoding  
Software engineering  
BottomUp design 
Question 26 Explanation:
Pseudocode is basically just writing down the logic of your solution to a specific coding challenge using plain English. So we can say that the strategy by which algorithms are expressed in terms of general ideas, each of which can be further developed in general terms is called Pseudocoding
Question 27 
What is the output of the following arithmetic expression?
5+3*2%108*6
37  
42  
32  
28 
Question 27 Explanation:
The multiplication, modulus and division are evaluated first in lefttoright order (i.e., they associate from left to right) because they have higher precedence than addition and subtraction. And then addition and subtraction is evaluated in left to right order.
Hence the answer will be 5+3*2%108*6
=5+6%108*6
=5+68*6
=5+648
=542
=37
Hence the answer will be 5+3*2%108*6
=5+6%108*6
=5+68*6
=5+648
=542
=37
Question 28 
What is the expected number of operations needed to examine all the edges terminated at a particular vertex given an adjacency matrix representation of the graph? (assume n vertices are in the graph and m edges terminate at the desired node.)
O(m)  
O(n)  
O(m^{2})  
O(n^{2}) 
Question 28 Explanation:
Given graph with n vertices is represented in adjacency matrix representation so the expected operations are O(n^{2})
Question 29 
Which of the following circuits can be used as parallel to a serial converter?
Multiplexer  
Demultiplexer  
Decoder  
Digital counter 
Question 29 Explanation:
A combinational circuit that selects one from many inputs is known as Multiplexer. In multiplexer, different inputs are inserted parallely and then it gives one output which is in serial form.
Question 30 
The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35, 42. Which one of the following is the post order traversal sequence of the same tree?
10, 20, 15, 23, 25, 35, 42, 39, 30  
15, 10, 25, 23, 20, 42, 35, 39, 30  
15, 20, 10, 23, 25, 42, 35, 39, 30  
15, 10, 23, 25, 20, 35, 42, 39, 30 
Question 30 Explanation:
The given preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35, 42.
Now let’s draw BST from given preorder sequence,
Now let’s draw BST from given preorder sequence,
Question 31 
The minimum number of nodes in a binary tree of depth d (root is at level 0) is
2d  1  
2d + 1  1
 
d + 1  
d 
Question 31 Explanation:
The minimum no. of nodes in a binary tree will be present when the tree is completely skewed tree. Since root is at depth 0 so minimum no. of nodes in a binary tree of depth d will be d+1.
Question 32 
The number of possible parenthesizations of a sequence of n matrices is
(n)  
Ө(n lg n)  
Ω(2^n)  
None of the above 
Question 32 Explanation:
Question 33 
Given a hash table T with 25 slots that stores 2000 elements, the load factor for T is
80  
50  
40  
30 
Question 33 Explanation:
The load factor is no. of elements divided by no. of slots in the hash table.
Hence the value of load factor will be 2000/25 = 80
Question 34 
Consider the following array of elements.
〈89, 19, 50, 17, 12, 15, 2, 5, 7, 11, 6, 9, 100〉
The minimum number of interchanges needed to convert it into a maxheap is
4  
5  
2  
3 
Question 34 Explanation:
The given sequence is
89, 19, 50, 17, 12, 15, 2, 5, 7, 11, 6, 9, 100
89, 19, 50, 17, 12, 15, 2, 5, 7, 11, 6, 9, 100
Question 35 
Consider a complete binary tree where the left and right subtrees of the root are maxheaps. The lower bound for the number of operations to convert it into a heap is
Ω(log n)  
Ω(n)  
Ω(n log n)  
Ω(n2) 
Question 35 Explanation:
Here we can apply the max heapify() function which takes O(logn) time. So the most appropriate answer is option a.
Question 36 
Consider two decision problems Q1, Q2 such that Q1 reduces in polynomial time to 3SAT and 3SAT reduces in polynomial time to Q2. Which one of the following is consistent with the above statement?
Q1 is in NP, Q2 is NP hard  
Q2 is in NP, Q1 is NP hard  
Both Q1 and Q2 are in NP  
Both Q1 and Q2 are NP hard 
Question 36 Explanation:
3SAT ⇒ NPC problem
Q_{1}≤p 3SAT≤p Q_{2} ≤p ≤p hence → Q_{1} is in NP
but Q_{2} is not given in NP
Hence Q_{2} is in NPHard.
Q_{1}≤p 3SAT≤p Q_{2} ≤p ≤p hence → Q_{1} is in NP
but Q_{2} is not given in NP
Hence Q_{2} is in NPHard.
Question 37 
Assume that the algorithms considered here sort the input sequences in ascending order. If the input is already in ascending order, which of the following are TRUE?
I. Quick sort runs in ⊝(n^{2}) time
II. Bubble sort runs in ⊝(n^{2}) time
III. Merge sort runs in ⊝(n) time
IV. Insertion sort runs in ⊝(n) time
I and II only  
I and III only  
II and IV only  
I and IV only 
Question 37 Explanation:
When the input sequence is already in sorted order then
Quicksort runs in worst case complexity of ⊝(n^{2}) time
Bubble sort runs in best case complexity of ⊝(n) time
Merge sort always have same complexity of ⊝(nlogn) both in best case and worst case
Insertion sort runs in best case complexity of ⊝(n) time
Hence statement I and IV are correct.
Quicksort runs in worst case complexity of ⊝(n^{2}) time
Bubble sort runs in best case complexity of ⊝(n) time
Merge sort always have same complexity of ⊝(nlogn) both in best case and worst case
Insertion sort runs in best case complexity of ⊝(n) time
Hence statement I and IV are correct.
Question 38 
The minimum number of nodes in an AVL tree (height balanced binary tree) of height 9 is
54  
64  
87  
None of these 
Question 38 Explanation:
AVL tree is a selfbalancing Binary Search Tree (BST) where the difference between heights of left and right subtrees cannot be more than one for all nodes.
Let minimum no. of nodes in an AVL tree with height h be N(h).
So recursively we can write that ,
N(h) = root node + minimum no of nodes in AVL tree with height (h1) + minimum no. of nodes in AVL tree with height (h2).
N(h) = 1+N(h1)+N(h2)
For base case N(1)=2 and N(2) = 4
So lets now find N(9),
N(3)= 1+ N(2)+N(1)= 1+2+4=7
N(4) = 1+N(3)+N(2)=1+7+4=12
N(5)= 1+N(4)+N(3)= 1+12+7=20
N(6)=1+N(5)+N(4)= 1+20+12= 33
N(7)=N(6)+N(5)+1= 1+33+20=54
N(8)=1+N(7)+N(6)= 1+54+33=88
N(9) = 1 + N(8)+N(7) = 1+88+54=143
Let minimum no. of nodes in an AVL tree with height h be N(h).
So recursively we can write that ,
N(h) = root node + minimum no of nodes in AVL tree with height (h1) + minimum no. of nodes in AVL tree with height (h2).
N(h) = 1+N(h1)+N(h2)
For base case N(1)=2 and N(2) = 4
So lets now find N(9),
N(3)= 1+ N(2)+N(1)= 1+2+4=7
N(4) = 1+N(3)+N(2)=1+7+4=12
N(5)= 1+N(4)+N(3)= 1+12+7=20
N(6)=1+N(5)+N(4)= 1+20+12= 33
N(7)=N(6)+N(5)+1= 1+33+20=54
N(8)=1+N(7)+N(6)= 1+54+33=88
N(9) = 1 + N(8)+N(7) = 1+88+54=143
Question 39 
Every contextfree grammar (CFG) can be converted into an equivalent
Greibach Normal Form (GNF)  
Chomsky Normal Form (CNF)  
(a) and (b) both  
None of these 
Question 40 
The cardinality of the power set of {0, 1, 2, 10, 15} is
8  
10  
32  
14 
Question 40 Explanation:
Since the set contains 5 elements so the power set will contain 2^5 = 32 elements.
Question 41 
Let R be a relation on the set of positive integers such that aRb if and only if a and b are distinct and have a common divisor other than 1. Which of the following statements about R is true?
R is symmetric and reflexive but not transitive  
R is reflexive but not symmetric and not transitive  
R is transitive but not reflexive and not symmetric  
R is symmetric but not reflexive and not transitive 
Question 41 Explanation:
R cannot be reflexive since in aRb and and b are distinct.
R cannot be transitive. Let's take an example. Suppose R contains (2,4) and (4,2) then for transitivity to satisfy R must also contain (2,2) which cannot be present in R since in aRb ‘a’ and ‘b’ must be different.
R is symmetric because if (2,4) have common divisors other than 1 then (4,2) also have common divisors other than 1.
R cannot be transitive. Let's take an example. Suppose R contains (2,4) and (4,2) then for transitivity to satisfy R must also contain (2,2) which cannot be present in R since in aRb ‘a’ and ‘b’ must be different.
R is symmetric because if (2,4) have common divisors other than 1 then (4,2) also have common divisors other than 1.
Question 42 
The FloydWarshall algorithm for allpair shortest paths computation is based on
Greedy paradigm  
DivideandConquer paradigm  
Dynamic Programming paradigm  
Neither Greedy nor DivideandConquer nor Dynamic Programming paradigm 
Question 42 Explanation:
The FloydWarshall algorithm for allpair shortest paths computation is based on Dynamic Programming paradigm.
Question 43 
Let X be a random variable with PDF given by
The value of constant c is
The value of constant c is
1.5  
2.5  
3.5  
4.5 
Question 43 Explanation:
Question 44 
For a Poisson Distribution, if mean(m) = 1, then P(1) is
1.5
 
e  
2/e  
1/e 
Question 44 Explanation:
Question 45 
On a positive edgetriggered SR flipflop, the outputs reflect the input condition when
The clock pulse is LOW  
The clock pulse is HIGH  
The clock pulse transitions from LOW to HIGH  
The clock pulse transitions from HIGH to LOW 
Question 45 Explanation:
On a positive edgetriggered SR flipflop, the outputs reflect the input condition when the clock pulse transitions from LOW to HIGH.
On a negative edgetriggered SR flipflop, the outputs reflect the input condition when the clock pulse transitions from HIGH to LOW.
On a positive leveltriggered SR flipflop, the outputs reflect the input condition when the clock pulse is HIGH.
On a negative leveltriggered SR flipflop, the outputs reflect the input condition when the clock pulse is LOW.
On a negative edgetriggered SR flipflop, the outputs reflect the input condition when the clock pulse transitions from HIGH to LOW.
On a positive leveltriggered SR flipflop, the outputs reflect the input condition when the clock pulse is HIGH.
On a negative leveltriggered SR flipflop, the outputs reflect the input condition when the clock pulse is LOW.
Question 46 
Research ethics do not include
Honesty  
Subjectivity  
Integrity  
Objectivity 
Question 46 Explanation:
Research ethics provides guidelines for the responsible conduct of research. In addition, it educates and monitors scientists conducting research to ensure a high ethical standard. The following is a general summary of some ethical principles:
Honesty:Honestly report data, results, methods and procedures, and publication status. Do not fabricate, falsify, or misrepresent data.
Objectivity:Strive to avoid bias in experimental design, data analysis, data interpretation, peer review, personnel decisions, grant writing, expert testimony, and other aspects of research.
Integrity:Keep your promises and agreements; act with sincerity; strive for consistency of thought and action.
Carefulness:Avoid careless errors and negligence; carefully and critically examine your own work and the work of your peers. Keep good records of research activities.
Openness:Share data, results, ideas, tools, resources. Be open to criticism and new ideas.
Respect for Intellectual Property:Honor patents, copyrights, and other forms of intellectual property. Do not use unpublished data, methods, or results without permission. Give credit where credit is due. Never plagiarize.
Confidentiality:Protect confidential communications, such as papers or grants submitted for publication, personnel records, trade or military secrets, and patient records.
Responsible Publication:Publish in order to advance research and scholarship, not to advance just your own career. Avoid wasteful and duplicative publication.
Responsible Mentoring:Help to educate, mentor, and advise students. Promote their welfare and allow them to make their own decisions.
Respect for Colleagues:Respect your colleagues and treat them fairly.
Social Responsibility:Strive to promote social good and prevent or mitigate social harms through research, public education, and advocacy.
NonDiscrimination:Avoid discrimination against colleagues or students on the basis of sex, race, ethnicity, or other factors that are not related to their scientific competence and integrity.
Competence:Maintain and improve your own professional competence and expertise through lifelong education and learning; take steps to promote competence in science as a whole.
Legality:Know and obey relevant laws and institutional and governmental policies.
Animal Care:Show proper respect and care for animals when using them in research. Do not conduct unnecessary or poorly designed animal experiments.
Human Subjects Protection:When conducting research on human subjects, minimize harms and risks and maximize benefits; respect human dignity, privacy, and autonomy.
Ref:
https://libguides.library.cityu.edu.hk/researchmethods/ethics
Objectivity:Strive to avoid bias in experimental design, data analysis, data interpretation, peer review, personnel decisions, grant writing, expert testimony, and other aspects of research.
Integrity:Keep your promises and agreements; act with sincerity; strive for consistency of thought and action.
Carefulness:Avoid careless errors and negligence; carefully and critically examine your own work and the work of your peers. Keep good records of research activities.
Openness:Share data, results, ideas, tools, resources. Be open to criticism and new ideas.
Respect for Intellectual Property:Honor patents, copyrights, and other forms of intellectual property. Do not use unpublished data, methods, or results without permission. Give credit where credit is due. Never plagiarize.
Confidentiality:Protect confidential communications, such as papers or grants submitted for publication, personnel records, trade or military secrets, and patient records.
Responsible Publication:Publish in order to advance research and scholarship, not to advance just your own career. Avoid wasteful and duplicative publication.
Responsible Mentoring:Help to educate, mentor, and advise students. Promote their welfare and allow them to make their own decisions.
Respect for Colleagues:Respect your colleagues and treat them fairly.
Social Responsibility:Strive to promote social good and prevent or mitigate social harms through research, public education, and advocacy.
NonDiscrimination:Avoid discrimination against colleagues or students on the basis of sex, race, ethnicity, or other factors that are not related to their scientific competence and integrity.
Competence:Maintain and improve your own professional competence and expertise through lifelong education and learning; take steps to promote competence in science as a whole.
Legality:Know and obey relevant laws and institutional and governmental policies.
Animal Care:Show proper respect and care for animals when using them in research. Do not conduct unnecessary or poorly designed animal experiments.
Human Subjects Protection:When conducting research on human subjects, minimize harms and risks and maximize benefits; respect human dignity, privacy, and autonomy.
Ref:
https://libguides.library.cityu.edu.hk/researchmethods/ethics
Question 47 
In the experimental design, the dependent variable is
The one that is not manipulated and in which any changes are observed  
The one that is manipulated in order to observe any effects on the other  
A measure of the extent to which personal values affect research  
An ambiguous concept whose meaning depends on how it is defined 
Question 48 
Research objectives falls into a number of categories that include
planning to get answers for what, why & where type of questions  
formulate, concept, and planning for research methods  
exploratory, descriptive, diagnostic and experimentation research  
considering the logic behind the methods we use in the context of the research 
Question 49 
If a study is “reliable”, this means that
It was conducted by a reputable researcher who can be trusted
 
The measures devised for concepts are stable on different occasions  
The findings can be generalized to other social settings  
The methods are stated clearly enough for the research to be replicated

Question 50 
What is a research design?
A way of conducting research that is not grounded in theory  
A way of conducting research that is not grounded in theory  
The style in which you present your research findings, e.g. a graph  
A framework for every stage of the collection and analysis of data 
There are 50 questions to complete.