Wednesday, 15 May 2013

JUNE 2012 - PAPER III

21. A* algorithm uses f' = g + h' to estimate the cost of getting from the initial state to the goal state, where g is a measure of the cost of getting from initial state to the current node and the function h' is an estimate of the cost of getting from the current node to the goal state. To find a path involving the fewest number of steps, we should set
(A) g=1
(B) g=0
(C) h'=0
(D) h'=1

Ans:-A


22. The transform which possesses the highest ‘energy compaction’ property is
(A) Slant transform
(B) Cosine transform
(C) Fourier transform
(D) Karhunen-Loeve transform

Ans:-D


23. Which one of the following prolog programs correctly implement “if G succeeds then execute goal P else execute goal θ ?”
(A) if-else (G, P, θ) :- !, call(G), call(P). if-else (G, P, θ) :- call(θ).
(B) if-else (G, P, θ) :- call(G), !, call(P). if-else (G, P, θ) :- call(θ).
(C) if-else (G, P, θ) :- call(G), call(P), !. if-else (G, P, θ) :- call(θ).
(D) All of the above

Ans:-B

Explanation:- The syntax of If--then---else in prolog goes the following way…
(A->B;C) :-
    call(A),
    !,
    call(B)
(A->B;C) :-
    call(C )
So according to the above syntax option B is correct.


24. The _______ memory allocation function modifies the previous allocated space.
(A) calloc( )
(B) free()
(C) malloc( )
(D) realloc()

Ans:-D


25. Which is not the correct statement(s) ?
(i) Every context sensitive language is recursive.
(ii) There is a recursive language that is not context sensitive.
(A) (i) is true, (ii) is false.
(B) (i) is true and (ii) is true.
(C) (i) is false, (ii) is false.
(D) (i) is false and (ii) is true.

Ans:-B


26. The mechanism that binds code and data together and keeps them secure from outside world is known as
(A) Abstraction
(B) Inheritance
(C) Encapsulation
(D) Polymorphism

Ans:-C


27. Identify the addressing modes of below instructions and match them :
(a) ADI (1) Immediate addressing
(b) STA (2) Direct addressing
(C )CMA (3) Implied addressing
(d) SUB (4) Register addressing
(A) a-1,b-2,c-3,d-4
(B) a-2,b-1,c-4,d-3
(C ) a-3,b-2,c-1,d-4
(D) a-4,b-3,c-2,d-1

Ans:- A

Explanation:- The instruction ADI adds some content to the accumulator. It is an immediate addressing mode instruction.
The instruction STA stores the contents of the accumulator in the particular memory location specified as operand.
CMA instruction takes complement of the contents of the accumulator.
SUB instruction subtracts the contents of the register to the contents of the accumulator.
. So the option is A.


28. Which one of the following is not a Greibach Normal form grammar ?
(i) S → a | bA | aA | bB
A→a B→b
(ii) S→a|aA|AB
A→a
B→b
(iii) S→a|A|aA
A→a
(A) (i) and (ii)
(B) (i) and (iii)
(C) (ii) and (iii)
(D) (i), (ii) and (iii)

Ans:-C

Explanation:- Restriction for GNF:-
The first symbol on the right hand side of the production must be a terminal. It can be followed by zero or more variables. In grammar (ii) of the question, S->AB is a production. AB are two non-terminals and it can be in GNF. In grammar (iii) S->A is given and it is a unit production and that is not allowed in GNF. So the grammar which is not in GNF is (ii) and (iii). So the option is C.


29. Which of the following IP address class is a multicast address ?
(A) Class A
(B) Class B
(C) Class C
(D) Class D

Ans:-D


30. While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module is
(A) atleast greater than 0.9
(B) equal to 0.9
(C) atmost 0.81
(D) atleast 1/0.81

Ans:-C


4 comments: