>
CUET (PG)
>
Data Science A.I Cyber Security and Computer Sci.
List of top Data Science A.I Cyber Security and Computer Sci. Questions asked in CUET (PG)
Let A be the problem of finding a Hamiltonian cycle in a graph G = (V, E) with |V| divisible by 3, and B be the problem of determining if a Hamiltonian cycle exists in such graphs. Which one of the following is true?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
Consider the following statements and choose the correct one:
(A) Job schedulers select processes from the pool and load them into memory for execution.
(B) Short term scheduler selects among the processes that are ready to execute and allocates the CPU to one of them.
(C) Medium term scheduler increases the degree of multiprogramming.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Operating Systems
Rank the following functions by order of growth (Highest running time to lowest running time):
1. $n \times 3^n$
2. $2^{\log(n)}$
3. $n^{2/3}$
4. $4^n$
5. $4^{\log(n)}$
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
A hash function f defined as f(key) = key mod 7, with linear probing, is used to insert the keys 37, 38, 72, 48, 98, 11, 56 into a table indexed from 0 to 6. What will be the location of key 11?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Programming and Data Structures
The following data fragment occurs in the middle of the data stream for which the byte stuffing algorithm is used: A B ESC C ESC FLAG ESC FLAG D. What is the output after stuffing?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Networks
Consider the given two statements:
S1: Kruskal’s Algorithm might produce a non-minimal spanning tree.
S2: Kruskal’s Algorithm can be efficiently implemented using the disjoint set data structure.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Programming and Data Structures
Let A be a 2 × 2 matrix with elements
\(a_{11} = a_{12} = a_{21} = +1\)
and
\(a_{22} = −1\)
. Then the eigenvalues of matrix A
2
are
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Set Theory & Algebra
Choose the correct answer from the options given below:
(A). RAID 3 requires only a single redundant disk.
(B) In RAID 4 scheme, two different parity calculations are carried out and stored in separate blocks on different disks.
(C) RAID 5 distributes the parity strips across all disks.
(D) In RAID 2, the number of redundant disks are proportional to the log of the number of data disks.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Organization and Architecture
Ten signals, each requiring 4000 Hz, are multiplexed onto a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel? Assume that the guard bands are 400 Hz wide.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Networks
A magnetic disk pack has the following specifications: 16 surfaces, 128 tracks per surface, 256 sectors per track, and 512 bytes per sector. Calculate the capacity of the disk pack.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Organization and Architecture
If x ∈ [0, 1], and f(x) and g(x) are defined as: f(x) = sin(cos(πx/4)) and g(x) = cos(sin(πx/4)) then:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Set Theory & Algebra
Which is not a requirement of digital signatures:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Cryptography & Network Security
Deallocation of stack of thread and register contexts will take place.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Operating Systems
In the DES algorithm, the round input is 32 bits, which is expanded to 48 bits via:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Cryptography & Network Security
Match List I with List II.
LIST I
LIST II
(A) A* Algorithm
(I) Space complexity is O4, where d = depth of the deepest optimal solution.
(B) Recursive Best First Search
(II) Incomplete even if the search space is finite.
(C) Recursive Best First Search
(III) Optimal, if the optimal solution is reachable, otherwise returns the best reachable optimal solution.
(D) SMA* Algorithm
(IV) Computation and space complexity is too high.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
Computation of the discrete logarithm is the basis of the cryptographic system:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Cryptography & Network Security
A system transmits a block of information containing ten packets each with eight data bits, a start bit, and a stop bit. Additional 'overhead' bits include a 4-bit synchronization code at the beginning of the block and a parity bit at the end of the block. What is the transmission efficiency?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Networks
If L and L are recursively enumerable, then L is:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Equation x
2
− 1 = 0 is required to be solved using Newton Raphson’s method with an initial guess x0 = −1. Then after one step of Newton’s method, the estimate x1 of the solution will be given by
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
Which of the following languages are context-free?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Consider the following statements and choose the correct one:
(A) Segmentation is a memory management scheme that supports user view of memory.
(B) In paging, physical memory is broken into fixed-sized blocks called pages.
(C) In paging, logical memory is also broken into blocks of the same size called frames
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Operating Systems
In a Class B subnet, we know the IP address of one host and the mask as given below: IP address = 125.134.112.66 Mask = 255.255.224.0 What is the first address (Network address)?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Networks
Packet filtering firewalls are deployed on:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Networks
Consider the following statement(s) and choose the correct one.
1. PoP3 does not allow the user to organize his mail on the server.
2. In IMAP4, the user can search the contents of the email for a specific string of characters prior to downloading.
3. MIME is a supplementary protocol that allows ASCII data to be sent through email.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Networks
Consider the following set of processes with the length of the CPU burst time given in milliseconds:
The processes are assumed to have arrived in order P1, P2, P3, P4, P5 all at time 0. What is the waiting time of process P4 for Shortest Job First (SJF), non-preemptive priority scheduling, and Round Robin (Quantum=1) scheduling algorithms respectively?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Operating Systems
Prev
1
2
3
Next