Compiled MCA-I 2016
Compiled MCA-I 2016
Compiled MCA-I 2016
MCA
SEMESTER I
1
FOR PRIVATE CIRCULATION
2
QUESTION BANK
FUNDAMENTALS OF
INFORMATION
TECHNOLOGY
MCA 101
3
QUESTION BANK
FUNDAMENTALS OF INFORMATION TECHNOLOGY - MCA 101
MCA I
UNIT – I
1 Adding inverters to all inputs and outputs of an AND gate produces the OR logic
function.
2 The EX-OR gate is sometimes referred to as the ‘any but not all gate”.
3 Excess codes are known as unit-distance codes.
4 Gray codes are weighted codes.
5 NAND and NOR gates are known as universal gates.
6 A truth table illustrates how the input level of a gate responds to all the possible output
level combinations.
7 A NOR gate output is LOW if any of its inputs is LOW.
8 As a rule, CMOS has the lowest power consumption of all IC families.
9 Good troubleshooting is done by looking at the input signal and how it interacts with
the circuits.
10 A NOR gate and an OR gate operate in exactly the same way.
11 In an AND gate output is LOW if all the inputs are HIGH.
12 An OR array is programmed by blowing fuses to eliminate selected variables from the
output functions.
13 An exclusive-NOR gate output is HIGH when the inputs are unequal.
14 An OR gate output is HIGH only if all the inputs are HIGH.
15 A waveform can be enabled or disabled by both AND and OR gates.
Ans. (1)(T), (2)(T), (3)(F), (4)(F), (5)(T), (6)(F), (7)(F), (8)(T), (9)(F), (10)(F), (11)(F),
(12)(T), (13)(F), (14)(F), (15)(T)
1 The output will be a LOW for any case when one or more inputs are zero in a(n):
(a) OR gate
(b) NOT gate
(c) AND gate
(d) NAND gate
2 The logic gate that will have HIGH or "1" at its output when any one of its inputs is
HIGH is a(n):
(a) OR gate
(b) AND gate
(c) NOR gate
4
(d) NOT gate
A B Y
0 0 0
0 1 1
1 0 1
1 1 1
(a) An exclusive NOR gate.
(b) A two-input AND gate.
(c) An exclusive OR gate.
(d) A two-input OR gate.
(a) X = A.(B + C)
(b) X = (A.B) + C
(c) X = A + (B.C)
(d) X=A+B+C
5
(a) 1011001
(b) 1010101
(c) 1101101
(d) 1001101
10 1010 + 1010 =?
(a) 10100
(b) 10101
(c) 11100
(d) 10010
11 Computers use the __________ number system to store data and perform calculations.
(a) Decimal
(b) Hexadecimal
(c) Binary
(d) Octal
6
16 What is the octal equivalent of the binary number: 10111101
(a) 675
(b) 275
(c) 572
(d) 573
19 Digital computers are more widely used as compared to analog computers, because
they are
(a) Less expensive
(b) Always more accurate and faster
(c) Useful over wider ranges of problem types
(d) Easier to maintain.
7
24 What is the RST for the TRAP?
(a) RST5.5
(b) RST4.5
(c) RST4
30 What is SIM?
(a) Select Interrupt Mask
(b) Sorting Interrupt Mask
(c) Set Interrupt Mask.
8
(d) None of the Above
9
(a) Address of Next Instruction
(b) Address of current instruction
(c) Address of Previous Instruction
(d) Address of Operand
41 The output of an AND gate with three inputs, A, B, and C, is HIGH when ________.
(a) A = 1, B = 1, C = 0
(b) A = 0, B = 0, C = 0
(c) A = 1, B = 1, C = 1
(d) A = 1, B = 0, C = 1
42 If a 3-input NOR gate has eight input possibilities, how many of those possibilities will
result in a HIGH output?
(a) 1
(b) 2
(c) 7
(d) 8
43 If a signal passing through a gate is inhibited by sending a LOW into one of the inputs,
and the Output is HIGH, the gate is a(n):
(a) AND
(b) NAND
(c) NOR
(d) OR
44 A device used to display one or more digital signals so that they can be compared to
expected timing diagrams for the signals is a:
(a) DMM
(b) spectrum analyzer
(c) logic analyzer
(d) frequency counter
45 When used with an IC, what does the term "QUAD" indicate?
(a) 2 circuits
(b) 4 circuits
(c) 6 circuits
(d) 8 circuits
10
(a) competitive with TTL
(b) three times that of TTL
(c) slower than TTL
(d) twice that of TTL
50 What does the small bubble on the output of the NAND gate logic symbol mean?
(a) Open collector output
(b) Tristate
(c) The output is inverted.
(d) None of the above
Ans. (1)(c), (2)(a), (3)(d), (4)(a), (5)(a), (6)(b), (7)(b), (8)(a), (9((b), (10)(a), (11)(c), (12)(b),
(13)(d), (14)(d), (15)(d), (16)(b), (17)(a), (18)(b), (19)(c), (20)(d), (21)(c), (22)(c),
(23)(c), (24)(b), (25)(b), (26)(b), (27)(a), (28)(b), (29)(a), (30)(c), (31)(d), (32)(a),
(33)(d), (34)(a), (35)(a), (36)(a), (37)(c), (38)(a), (39)(d), (40)(a), (41)(c), (42)(a),
(43)(b), (44)(c), (45)(b), (46)(d), (47)(a), (48)(b), (49)(b), (50)(c)
11
Ans. (1) (AB)’ = A’ + B’/(A + B)’ = A’B’), (2) (xy + x’y’), (3)(47), (4)(Analog),
(5)(Analog), (6)(Inverters/Not gate), (7)(NAND), (8)(F = (A + B+C+D)’, (9)(Three),
(10)(755)10)
1 Explain how the basic gates can be realized using universal gates.
2 What is a Hamming code and how is it used?
3 Explain odd and even parity check codes.
4 Explain addition and subtraction operations on signed binary numbers.
5 Explain the various buses in a microprocessor
6 Explain the architecture of 8085 microprocessor.
7 Discuss the Instruction set of 8085.
8 Discuss in detail why NAND & NOR are called Universal Gates.
9 Simplify (AB+C’)(A+B+C’)((A+B)’+C))’ and implement using NAND gates only.
10 Simplify [(x +y) (x’+z)]’ and neither implement using NOR gates only.
11 Give 9’s complement of following decimal numbers
a) 49
b) 245
c) 7865
12
2 Add following numbers using 2’s complement method
a) -48 and +31
b) -64 and +46
13 Discuss different operations that can be performed by 8085 microprocessor.
14 Explain instruction set and its various formats available in 8085.
15 What are different Logic Gates. Present truth table of following gates:
(i) AND (ii) OR (iii) NOT
16 What is meant by duality in Boolean algebra?
17 Express the following Boolean expression in their product – of – sums form. Ensure
that each term has all the literals.
(d)
( A.B ) .( A.C + B.C ) (e)
( A.B ) ( B + C )
(f) A + A.B + AC
.
UNIT - II
I Test Your Skills:
Ans. (1)(T), (2)(T), (3)(F), (4)(T), (5)(F), (6)(T), (7)(F), (8)(T), (9)(F), (10)(T), (11)(T),
(12)(T), (13)(F), (14)(T), (15)(T)
13
(b) Multiple Choice Questions:
8 Hard disk is a:
(a) Magnetic Device
14
(b) Mechanical Device
(c) Optical Device
(d) Magneto-Optical Device
9 Mouse is a:
(a) Input Device
(b) Output Device
(c) Storage Device
(d) Point & Draw Device
10 Which of the following is used in the Banking Industry for the processing of cheques?
(a) OMR
(b) OCR
(c) MICR
(d) Bar Code
11 How many steps are in the systems development life cycle (SDLC)?
(a) 4
(b) 5
(c) 6
(d) 10
12 The first step in the systems development life cycle (SDLC) is:
(a) Analysis.
(b) Design.
(c) Problem/Opportunity Identification.
(d) Development and Documentation.
13 Most modern software applications enable you to customize and automate various
features using small custom-built “miniprograms” called:
(a) macros
(b) code
(c) routines
(d) subroutines
14 How many steps are in the program development life cycle (PDLC)?
(a) 4
(b) 5
(c) 6
15
(d) 10
15 The make-or-buy decision is associated with the ____________ step in the SDLC.
(a) Problem/Opportunity Identification
(b) Design
(c) Analysis
(d) Development and Documentation
16 In the Analysis phase, the development of the ____________ occurs, which is a clear
statement of the goals and objectives of the project.
(a) documentation
(b) flowchart
(c) program specification
(d) design
18 Enhancements, upgrades, and bug fixes are done during the ____________ step in the
SDLC
(a) Maintenance and Evaluation
(b) Problem/Opportunity Identification
(c) Design
(d) Development and Documentation
20 Technical writers generally provide the ____________ for the new system.
(a) Programs
(b) Network
(c) Analysis
(d) Documentation
16
(d) Database administrators
22 ____________ spend most of their time in the beginning stages of the SDLC, talking
with end-users, gathering information, documenting systems, and proposing solutions.
(a) Systems analysts
(b) Project managers
(c) Network engineers
(d) Database administrators
23 ____________ manage the system development, assign staff, manage the budget and
reporting, and ensure that deadlines are met.
(a) Project managers
(b) Network engineers
(c) Graphic designers
(d) Systems analysts
25 Debugging is:
(a) Creating program code.
(b) Finding and correcting errors in the program code.
(c) Identifying the task to be computerized.
(d) Creating the algorithm.
26 Translating the problem statement into a series of sequential steps describing what the
program must do is known as:
(a) Coding.
(b) Debugging.
(c) Creating the algorithm.
(d) Writing documentation.
17
(c) Processing
(d) Storage
29 The problem statement includes the ____________, which lists specific input numbers
a program would typically expect the user to enter and precise output values that a
perfect program would return for those input values.
(a) Testing plan
(b) Error handler
(c) IPO cycle
(d) Input-output specification
31 What is a light pen?
(a) A Mechanical Input device
(b) Optical input device
(c) Electronic input device
(d) Optical output device
33 Coded entries which are used to gain access to a computer system are called
(a) Entry codes
(b) Passwords
(c) Security commands
(d) Code words
36. What type of resource is most likely to be a shared common resource in a computer
Network?
(a) Printers
(b) Speakers
18
(c) Floppy disk drives
(d) Keyboards
37 ALU is
(a) Arithmetic Logic Unit
(b) Array Logic Unit
(c) Application Logic Unit
(d) None of above
38. VGA is
(a) Video Graphics Array
(b) Visual Graphics Array
(c) Volatile Graphics Array
(d) Video Graphics Adapter
41 The phenomenon of having a continuous glow of a beam on the screen even after it is
removed is called as ?
(a) Fluorescence
(b) Persistence
(c) Phosphorescence
(d) Incandescence
19
44 .................. refers to pixel spacing.
(a) Pixmap
(b) Resolution
(c) Pixel depth
(d) Persistence
45 The distance from one pixel to the next pixel is called ...........
(a) Resolution
(b) Dot Pitch
(c) Pixmap
(d) ppi
47 The ratio of horizontal points to vertical points necessary to produce equal length lines
in both direction.
(a) Dot Pitch
(b) Resolution
(c) Aspect Ratio
(d) Height-Width Ratio
49 Which of the following can be defined as most recent and perhaps the most
comprehensive technique for solving computer problems.
(a) System Analysis
(B) System Data
(c) System Procedure
(d) System Record
20
Ans. (1)(c), (2)(a), (3)(d), (4)(b), (5)(d), (6)(d), (7)(a), (8)(a), (9)(a and d), (10)(c), 11)(c),
(12)(c), (13)(a), (14)(d), (15)(b), (16)(b), (17)(c), (18)(d), (19)(a), (20)(a), (21)(d),
(22)(d), (23)(a), (24)(a), (25)(d), (26)(b), (27)(c), (28)(b), (29)(d), (30)(a), (31)(b),
(32)(a), (33)(b), (34)(a), (35)(b), (36)(a), (37)(a), (38)(a), (39)(b), (40)(d), (41)(c),
(42)(b), (43)(c), (44)(b), (45)(a), (46)(d), (47)(c), (48) (c), (49)(a), (50)(d)
21
(a) Access time
(b) Seek time
(c) Latency
(d) Transfer rate
12 Define the terms hardware and software.
13 Both DO…WHILE and REPEAT…UNTIL are used for looping. Discuss the
difference between the two.
14 Discuss the advantages and limitations of pseudo code.
15 Draw a flowchart to add up all even numbers between 0 and 100.
16 What is an input interface? How it differs from output interface.
17 Explain with diagram the meaning of SDLC
18 Differentiate between compiler and interpreter.
19 Explain the different symbols used in flowchart. Draw a flowchart to print the sum of
first ten Multipliers of 5.
20 Describe the various types of memories used in computer systems.
21 What are decision tables and decision trees? Explain with an example of each.
22 What is SDLC? Describe all the stages of SDLC. Explain briefly the different levels of
testing.
23 Explain the Prototype Model for software development with diagram.
22
UNIT - III
Ans. (1)(F), (2)(T), (3)(F), (4)(F), (5)(T), (6)(F), (7)(F), (8)(T), (9)(T), (10)(T), (11)(T),
(12)(T), (13)(T), (14)(T), (15)(T)
23
(b) when the page is in the memory
(c) when the process enters the blocked state
(d) when the process is in the ready state
3 Which of the following will determine your choice of systems software for your
computer?
(a) Is the applications software you want to use compatible with it?
(b) Is it expensive?
(c) Is it compatible with your hardware?
(d) Both a and c
4 What is a shell?
(a) It is a hardware component
(b) It is a command interpreter
(c) It is a part in compiler
(d) It is a tool in CPU scheduling
5 The Hardware mechanism that enables a device to notify the CPU is called _________.
(a) Polling
(b) Interrupt
(c) System Call
(d) None of the above
6 Routine is not loaded until it is called. All routines are kept on disk in a relocatable load
format. The main program is loaded into memory & is executed. This type of loading is
called _________
(a) Static loading
(b) Dynamic loading
(c) Dynamic linking
(d) Overlays
24
(b) An extremely large secondary memory
(c) An illusion of extremely large main memory
(d) A type of memory used in super computers.
14 The solution to Critical Section Problem is: Mutual Exclusion, Progress and Bounded
Waiting.
(a) The statement is false
(b) The statement is true.
(c) The statement is contradictory.
(d) None of the above
15 A thread
(a) is a lightweight process where the context switching is low
(b) is a lightweight process where the context switching is high
(c) is used to speed up paging
(d) none of the above
25
(c) Idle
(d) Running
19 Which of the following file name extension suggests that the file is Backup copy of
another file ?
(a) TXT
(b) COM
(c) BAS
(d) BAK
20 Which technique was introduced because a single job could not keep both the CPU and
the I/O devices busy?
(a) Time-sharing
(b) Spooling
(c) Preemptive scheduling
(d) Multiprogramming
21 A critical region
(a) is a piece of code which only one process executes at a time
(b) is a region prone to deadlock
(c) is a piece of code which only a finite number of processes execute
(d) is found only in Windows NT operation system
22 The mechanism that bring a page into memory only when it is needed is called
________
(a) Segmentation
(b) Fragmentation
(c) Demand Paging
(d) Page Replacement
23 PCB is
(a) Program Control Block
26
(b) Process Control Block
(c) Process Communication Block
(d) None of the above
25 Switching the CPU to another Process requires to save state of the old process and
loading new process state is called as __________.
(a) Process Blocking
(b) Context Switch
(c) Time Sharing
(d) None of the above
30 An attribute of one table matching the primary key of another table is called:
(a) Foreign key
(b) Secondary key
(c) Candidate key
(d) Composite key
27
31 The term ‘page traffic’ describes
(a) number of pages in memory at a given instant.
(b) number of papers required to be brought in at a given page request.
(c) the movement of pages in and out of memory.
(d) number of pages of executing programs loaded in memory.
33 Which of the following will determine your choice of systems software for your
computer ?
34 Which technique was introduced because a single job could not keep both the CPU and
the I/O devices busy?
(a) Time-sharing
(b) SPOOLing
(c) Preemptive scheduling
(d) Multiprogramming
35 Routine is not loaded until it is called. All routines are kept on disk in a relocatable
load format. The main program is loaded into memory & is executed. This type of
loading is called _________
(a) Static loading
(b) Dynamic loading
(c) Dynamic linking
(d) Overlays
28
37 What is the name of the system database that contains descriptions of the data in the
database?
(a) Metadata
(b) Data dictionary
(c) Table
(d) None of the above
40 Which category of users need not be aware of the presence of the database system?
(a) DBA
(b) Naive
(c) Casual
(d) Application Programmers
41 The part of machine level instruction, which tells the central processor what has to be
done, is
(a) Operation code
(b) Address
(c) Flip-Flop
(d) None of the above
43 To avoid the race condition, the number of processes that may be simultaneously inside
their critical section is
29
(a) 8
(b) 1
(c) 16
(d) 0
45 Which command be used to ask you to confirm that you want to delete the directory?
(a) Deltree
(b) Deltree/f
(c) Del *.*/p
(d) Erase *.*
47 The deleted file in MS-DOS can be recovered if you use the command mention below
immediately, the command is:
(a) DO NOT DELETE
(b) NO DELETE
(c) UNDELETE
(d) ONDELETE
48 Technique which is used to retrieve data from disk in form of continuous blocks of
stream and eliminates seek time is classified as
(a) concurrent buffering
(b) parallel buffering
(c) single buffering
(d) double buffering
49 Which of the following is a unique tag, usually a number, identifies the file within the
file system.
(a) File identifier
(b) File name
(c) File type
(d) none of the mentioned
50 A unit of storage that can store one or more records in a hash file organization is
denoted as
30
(a) Buckets
(b) Disk pages
(c) Blocks
(d) Nodes
Ans. (1)(a), (2)(a), (3)(d), (4)(b), (5)(b), (6)(c), (7)(a), (8)(d), (9)(c), (10)(c), (11)(a), (12)(c),
(13)(d), (14)(b), (15)(a), (16)(b), (17)(b), (18)(a), (19)(d), (20)(d), (21)(a), (22)(c),
(23)(b), (24)(b), (25)(a), (26)(a), (27)(b), (28)(d), (29)(a & b), (30)(a), (31)(c), (32)(c),
(33)(a), (34)(d), (35)(b), (36)(b), (37)(b), (38)(a), (39)(a), (40)(b), (41)(a), (42)(c),
(43)(b), (44)(d), (45)(c), (46)(d), (47)(c), (48)(d), (49)(a), (50)(a).
1 __________ is the interval from the time of submission of a job to the system for
processing to the time of completion of the job.
2 A __________ is a program is execution.
3 In a _________system only job is processed by the system at a time and all the system
resources are exclusively available for the job until it completes.
4 __________mostly perform numerical calculations, with little I/O operations.
5 __________ is the concurrent execution of multiple jobs in a single user system.
6 A __________ defines the manner in which the various files of a database are linked
together.
7 The four major components of a DBMS are _________, __________, _________ &
_________.
8 __________, _________ & _________ are the three commonly used file organizations
in business data processing applications.
9 _______ is used to uniquely identify a relation.
10 Unix is having a _________ kernel. (monolithic/micro)
Ans. (1) (Turnaround time), (2) (Process), (3) (Uni-processing), (4) (CPU bound jobs),
(5) (Multitasking), (6) (Database model), (7) (DDL, DML, query language and report
generator) (8) (Sequential, direct and indexed sequential), (9) (Primary key),
(10) (monolithic)
31
6 What is a PCB? What does it typically contain?
7 What is time sharing? What is a time slice?
8 Differentiate between sequential access and random access files..
9 What is memory fragmentation problem? Differentiate between internal and external
fragmentation.
10 What is a database? How is it different from file?
11 What is a file management system?
12 What is a database model? Name the four commonly used database models.
13 What is the difference between a master file and a transaction file?
14 What is data integrity problem and how DB approach overcomes it?
15 What are the responsibilities of a database administration (DBA)?
16 Elaborate the differences between Traditional file system and DBMS.
17 How does a short-term scheduler work?
18 Define turnaround and wait-times.
19 How does a process differ from a program?
20 Define the following terms:
(a) Data independence
(b) Query processor
(c) DDL processor
(d) DML processor
(e) Run time database manage.
21 How is traditional file processing approach different than DBMS approach? Explain.
32
UNIT - IV
Ans. (1)(F), (2)(T), (3)(T), (4)(F), (5)(T), (6)(T), (7)(T), (8)(F), (9)(F), (10)(T), (11)(F),
(12)(F), (13)(T), (14)(F), (15)(T)
33
(a) Communications software
(b) Protocol
(c) Communication hardware
(d) All of above including access to transmission medium
6 The process of converting analog signals into digital signals so they can be processed
by a receiving computer is referred to as:
(a) Modulation
(b) Demodulation
(c) Synchronizing
(d) Digitizing
7 Which of the following communication modes support two-way traffic but in only one
direction at a time?
(a) Simplex
(b) half duplex
(c) three-quarters duplex
(d) all of the above
9 Which data communication method is used to transmit the data over a serial
communication link?
(a) Simplex
(b) Half-duplex
(c) Full-duplex
(d) None of above
10 What is the minimum number of wires needed to send data over a serial communication
link layer?
(a) 1
(b) 2
(c) 4
(d) 6
34
11 Which of the following types of channels moves data relatively slowly?
(a) wide band channel
(b) voice band channel
(c) narrow band channel
13 A communications device that combines transmissions from several I/O devices into
one line is :-
(a) Concentrator
(b) Modifier
(c) Multiplexer
(d) Full-duplex line
35
19 Which was the first satellite launched by COMSAT_________
(a) Early bird
(b) Intelsat I
(c) ATS-6
21 Protocols are:
(a) Agreements on how communication is to proceed
(b) Logical communication channel
(c) Physical communication channel
(d) Communication model
36
27 The information to be communicated in a data communications system is the _______.
(a) Medium
(b) Protocol
(c) Message
(d) Transmission
28 Frequency of failure and network recovery time after a failure are measures of the
_______ of a network.
(a) Performance
(b) Reliability
(c) Security
(d) Feasibility
33 By an intranet we mean
(a) a LAN of an organization
(b) a Wide Area Network connecting all branches of an organization
(c) a corporate computer network
(d) a network connecting all computers of an organization and using the internet
protocol
34 By an extranet we mean
(a) an extra fast computer network
37
(b) the intranets of two co-operating organizations interconnected via a secure
leased line
(c) an extra network used by an organization for higher reliability
(d) an extra connection to internet provided to co-operating organizati
(a) i and ii
(b) ii and iii
(c) iii and iv
(d) i and iv
38
40 A search engine is a program to search
(a) for information
(b) web pages
(c) web pages for specified index terms
(d) web pages for information using specified search terms
41. A network that needs human beings to manually route signals is called....
(a) Fiber Optic Network
(b) Bus Network
(c) T-switched network
(d) Ring network
44 Multipoint topology is
(a) Bus
(b) Star
(c) Mesh
(d) Ring
39
(b) Digital-to-analog
(c) Analog-to –analog
(d) Analog-to-digital
49 Which layer 1 devices can be used to enlarge the area covered by a single LAN
segment?
1. Switch
2. NIC
3. Hub
4. Repeater
5. RJ45 transceiver
(a) 1 only
(b) 1 and 3
(c) 3 and 4
(d) 5 only
Ans. (1)(d), (2)(c), (3)(d), (4)(d), (5)(d), (6)(d), (7)(b), (8)(e), (9)(c), (10)(b), (11)(c), (12)(c),
(13)(c), (14)(c), (15)(d), (16)(d), (17)(b), (18)(a), (19)(a), (20)(a), (21)(a), (22)(c),
(23)(d), (24)(b), (25)(b), (26)(b), (27)(c), (28)(b), (29)(c), (30)(b), (31)(c), (32)(c),
(33)(d), (34)(d), (35)(c), (36)(b), (37)(d), (38)(b), (39)(a), (40)(d), (41)(c), (42)(d),
(43)(a), (44)(a), (45)(a), (46)(c), (47)(b), (48)(a), (49)(c), (50)(e)
40
7 Routing is the functionality of __________ layer.
8 Hubs and repeaters are present in the _________ layer.
9 ________, ________, and ________ are types of guided media.
10 UTP stands for __________.
Ans. (1)(bandwidth), (2)(simplex, half duplex and full duplex), (3)(modulation), (4)(local
area network), (5)(IP addresses), (6)(32 bit), (7)(Network), (8)(Physical), (9)(Coaxial
cable, twisted pair & fiber optics), (10)(Unshielded Twisted Pair)
25 Briefly explain
(a) Repeater
41
(b) Bridge
(c) Router
(d) Gateway
1 Discuss the network topologies with their relative advantages and disadvantages.
2 Distinguish between LAN, MAN and WAN.
3 Explain guided media of transmission.
4 Discuss unguided media of transmission.
5 Explain the OSI model.
6 Distinguish between Guided and unguided media.
7 Explain various components of data communication systems.
8 Distinguish between asynchronous and synchronous data transmission.
9 What do you understand by WWW? Explain in detail.
10 Briefly explain
(a) Repeater
(b) Bridge
(c) Router
(d) Gateway
11 What is Internet? Give some uses of Internet. Also state the services provided by
Internet.
12 What are the different types of data transmission media? Briefly explain them.
13 What do you mean by term Network Topologies? Briefly explain them.
14 Write short notes on any two of the following:-
(a) IP Address
(b) Modem
(c) TCP
15 What is Internet? Give some uses of Internet. Also state the services provided by
Internet.
16 Explain guided media using various examples.
42
QUESTION BANK
PROGRAMMING IN C
MCA 103
43
QUESTION BANK
PROGRAMMING IN C - MCA - 103
MCA -I
UNIT - I
Ans. (1)(F), (2)(F), (3)(F), (4)(T), (5)(T), (6)(T), (7)(T), (8)(T), (9)(T), (10)(T), (11)(T),
(12)(F), (13)(T), (14)(F), (15)(T), (16)(T), (17)(T)
44
3 C keywords are reserved words by
(a) A compiler
(b) An interpreter
(c) Header file
(d) b and c.
7 If the program completes executing successfully, what value should the function main()
return?
(a) 0
(b) 1
(c) void
(d) main
45
9 The size of operator for an operand return the
(a) No of bits occupied by the operand.
(b) No of bytes occupied by the operand.
(c) No of words occupied by the operand.
(d) None of the above.
10 In type conversions, when one operand is unsigned int and the other operand is long it,
(a) Unsigned int operand will be converted into long int and the result will be long
int.
(b) Both operands will be converted to unsigned long int and the result will be
unsigned long int.
(c) Either a or b.
(d) Neither a nor b.
(a) x = 9 y =9
(b) x = 9 y =6
(c) x = 6 y =6
(d) None of the above.
46
14 for(;;) is used for
(a) infinite looping
(b) loop to be executed for n times.
(c) loop to be executed until the program terminates.
(d) none of the above.
17 The following code ‘for(;;)’ represents an infinite loop. It can be terminated by.
(a) break
(b) exit(0)
(c) abort()
(d) All of the mentioned
47
18 The keyword ‘break’ cannot be simply used within:
(a) do-while
(b) if-else
(c) for
(d) while
19 Which keyword is used to come out of a loop only for that iteration?
(a) break
(b) continue
(c) return
(d) None of the mentioned
48
int main()
{
printf("before continue ");
continue;
printf("after continue\n");
}
(a) Before continue after continue
(b) Before continue
(c) After continue
(d) Compile time error
23 The correct syntax for running two variables for loop simultaneously is.
(a) for (i = 0; i < n; i++)
for (j = 0; j < n; j += 5)
(b) for (i = 0, j = 0;i < n, j < n; i++, j += 5)
(c) for (i = 0; i < n;i++){}
for (j = 0; j < n;j += 5){}
(d) None of the mentioned
24 Which of the following cannot be used as LHS of the expression in for (exp1;exp2;
exp3)?
(a) Variable
(b) Function
(c) typedef
(d) Macros
(a) 1
(b) 2
(c) 12
(d) Run time error
49
26 How many times i value is checked in the below code?
#include <stdio.h>
int main()
{
int i = 0;
while (i < 3)
i++;
printf("In while loop\n");
}
(a) 2
(b) 3
(c) 4
(d) 1
27 The keyword used to transfer control from a function back to the calling function is
(a) Switch
(b) goto
(c) go back
(d) Return
50
30 What is the output of this C code?
#include <stdio.h>
int main()
{
int i = 0;
for (; ; ;)
printf("In for loop\n");
printf("After loop\n");
}
(a) Compile time error
(b) Infinite loop
(c) After loop
(d) Undefined behavior
31 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
char c=125;
c=c+10;
printf("%d",c);
return 0;
}
(a) 135
(b) +INF
(c) -121
(d) -8
32 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
float a=5.2;
if(a==5.2)
printf("Equal");
else if(a<5.2)
printf("Less than");
else
printf("Greater than");
return 0;
}
(a) Equal
(b) Less than
(c) Greater than
(d) Compiler error
33 What will be output if you will compile and execute the following c code?
#include<stdio.h>
51
int main(){
int i=4,x;
x=++i + ++i + ++i;
printf("%d",x);
return 0;
}
(a) 21
(b) 18
(c) 12
(d) Compiler error
34 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
int a=2;
if(a==2){
a=~a+2<<1;
printf("%d",a);
}
else{
break;
}
return 0;
}
(a) It will print nothing.
(b) -3
(c) -2
(d) Compiler error
35 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
int a=10;
printf("%d %d %d", a, a++, ++a);
return 0;
}
(a) 12 11 11
(b) 12 10 10
(c) 11 11 12
(d) 10 10 12
36 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
char *str="Hello world";
printf("%d",printf("%s",str));
52
return 0;
}
(a) 11Hello world
(b) 10Hello world
(c) Hello world10
(d) Hello world11
37 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
printf("%d",sizeof(5.2));
return 0;
}
(a) 2
(b) 4
(c) 8
(d) 10
38 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
int i=10;
static int x=i;
if(x==i)
printf("Equal");
else if(x>i)
printf("Greater than");
else
printf("Less than");
return 0;
}
(a) Equal
(b) Greater than
(c) Less than
(d) Compiler error
39 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
int array[]={10,20,30,40};
printf("%d",-2[array]);
return 0;
}
(a) -60
(b) -30
(c) 60
53
(d) Garbage value
40. What will be output if you will compile and execute the following c code?
#include <stdio.h>
#include <string.h>
int main(){
char c='\08';
printf("%d",c);
return 0;
}
(a) 8
(b) 8.
(c) 9
(d) Compiler error
54
46 Which of the following is a User-defined data type?
(a) typedef int Boolean;
(b) typedef enum {Mon, Tue, Wed, Thu, Fri} Workdays;
(c) struct {char name[10], int age};
(d) all of the mentioned
55
Ans. (1)(b), (2)(a), (3)(d), (4)(d), (5)(b), (6)(c), (7)(a), (8)(a), (9)(b), (10)(c), (11)(a),
(12)(c), (13)(c), (14)(a), (15)(b), (16)(c), (17)(a), (18)(b), (19)(b), (20)(d), (21)(d),
(22)(d), (23)(b), (24)(d), (25)(c), (26)(c), (27)(d), (28)(d), (29)(c), (30)(a), (31)(c),
(32)(b), (33)(a), (34)(d), (35)(a), (36)(d), (37)(c), (38)(d), (39)(b), (40)(d), (41)(c),
(42)(a), (43)(a), (44)(d), (45)(c), (46)(d), (47)(c), (48)(b), (49)(c), (50)(b)
1 C is a ______level language.
2 The maximum length of a variable in C is __________
3 Enumerated data type is a ________ data type.
4 A declaration float a, b; occupies ___________of memory.
5 The __________statement is used to give new names to existing types.
6 The _______ statement is used to alter the normal sequence of program execution by
unconditionally transferring control to some other part of the program.
Ans. (1) (middle), (2) (8), (3) (user defined), (4) (8 bytes), (5) (typedef), (6)(goto)
56
for(I = 0; i< 10; I = I + 1)
printf(“i is %d\n”,i);
24 Explain what happens when the following statement is executed?
If(abs(x)<smin)
x = (x>0)? xmin : -xmin;
Is this a compound statement? Is a compound statement embedded within this
statement?
What is a for(;;)? Explain with an example.
25 Is it possible to use multiple while statements with do statement, justify the answer with
an example.
26 Give the general syntax of conditional operator?
27 Which is relational operator?
28 Which are logical Operators?
29 Which are Bitwise Operators?
30 Which are unformatted input output functions?
31 Which are formatted input output functions?
32 What is the use of getchar() function?
33 What is the use of getch() function?
34 What is the use of getche() function?
35 Explain the difference between switch and nested if else with an example?
36 What is the difference between: int * const p; int const * p;
37 What is conditional compilation and where can it be used, explain with examples?
38 State the precautions that can be taken to prevent memory leakage when memory is
allocated dynamically in a function. What are the reasons behind the problems
encountered?
39 Use of global variables should be avoided but global constants are acceptable,
comment?
40 Differentiate between do while and while loop
57
12 Give suitable example describing how a switch case works.
13 Explain in detail about the looping structures with examples.
14 How does break and continue effect control transfer in looping structures. Explain with
examples.
15 What is the difference between arrays and pointers?
16 How many elements do the array int a [5] contain? Which is the first element and the
last one?
17 How can I dynamically allocate a multidimensional array?
18 Since array references decay into pointes, if arr is an array, what’s the difference
between arr and & arr?
19 Discuss the features of user-defined functions?
20 Clearly differentiate between function prototype, function definition and function call.
21 What do you understand by passing arguments by value, by reference and by Pointer
during function invocation? Explain with examples.
22 Explain the different storage classes in C
23 What is the difference between the function static and file static variables? Explain
with the help of an example.
24 What are functions? How to pass parameters in functions?
25 Write a program to find minimum and maximum number in an array.
26 Write a function to insert a node in a linked list. The position where insertion takes place
and the remaining data required by the function is to be passed as parameters to the
function.
27 Write a C program to remove all comments from a file containing C source code. Make
sure that comment indicators enclosed within a string literal are not removed.
28 State the problems associated with parameterized macros with examples.
29 Differentiate between structure and an union
30 Write short notes on any two:
a) Process Control.
b) getc() and putc()
c) scanf() and printf()
IV Practical Questions:
1 Write a program to find all the positive factors of a number.
2 Write a program to find the sum of the first N natural numbers using a for loop.
3 Read an integer and use a menu to find it’s square , square root, cube, cube root. Signal
all probable errors like square of a negative number, sign of zero etc. Use the menu to
exit the program. The menu should use case construct.
4 Write a program to check if a number is a perfect factorial or a Fibonacci number.
5 Write a program to find the prime numbers between two numbers A and B entered by
the user. Ensure that the value entered for A is less than that for B.
6 Write a function to perform linear search.
7 Write a Program to find factorial of a number using recursion.
8 Write a Program to using functions to convert a number from one base to another.
9 Implement bubble sort using arrays.
10 Write a program to implement matrix multiplication.
11 Write a program to implement binary search.
58
12 What is output of the following code and explain it.
main()
{
int x=100,y=200;
printf(“%”,(x>y)?x:y);
}
UNIT - II
Ans. (1)(T ), (2)(T ), (3)( F), (4)(T ), (5)( F), (6)(T ), (7)( F), (8)(T), (9)(T), (10)(T), (11)(T),
(12)(F), (13)(T), (14)(F), (15)(T), (16)(F), (17)(T), (18)(F)
59
for(b =0; b<=4;b++)
{
Printf(“%3d”,++a1[0]);
}
}
(a) 23456
(b) 12345
(c) 111111
(d) 122222
60
8 Describe the following array int s[5][6]
(a) s is a two-dimensional 30 element array(6 rows,5columns)
(b) s is a two-dimensional 30 element array(5 rows,6columns)
(c) s is a one-dimensional 30 element array(5 rows,6columns)
(d) none
#include<stdio.h>
int c[10]=[1,2,3,4,5,6,7,8,9,10};
main()
{ int a,b=0;
for(a=0;a<10;++a)
ff(c[a]%2==1) b+=c[a];
printf(‘%d”,b);
}
(a) 20
(b) 24
(c) 25
(d) 30
11 Which of the following is the correct way of passing an array “a” to the function call.
(a) f(int a[3])
(b) f(a)
(c) f(int a)
(d) none
12 Declare a pointer to a function that accepts three integer arguments and returns a
floating-point quantity
(a) float f(int a,int b,int c)
(b) float (*f)(int a,int b,int c)
(c) float f(int *a,int *b,int *c)
(d) none
61
14 & is _____________
(a) Binary operator
(b) Unary operator
(c) Conditional operator
(d) Assignment operator
16 Declare a function that accepts an argument, which is a pointer to an integer array and
returns character.
(a) char (*p(int a))[]
(b) char (p(int (*a)[])
(c) char p(int *a[])
(d) none
17 What is the output of this C code?
#include <stdio.h>
int main()
{
int c = 2 ^ 3;
printf("%d\n", c);
}
(a) 1
(b) 8
(c) 9
(d) 0
62
19 What is the output of this C code?
#include <stdio.h>
void main()
{
int x = 4;
int *p = &x;
int *k = p++;
int r = p - k;
printf("%d", r);
}
(a) 4
(b) 8
(c) 1
(d) Run time error
22 What will be the data type of the expression (a < 50) ? var1 : var2; provided a = int,
var1 = double, var2 = float
(a) int
(b) float
(c) double
(d) Cannot be determined
63
(c) exp3
(d). All of the mentioned
func(&s.a); //where s is a variable of type struct and a is the member of the struct.
(a) Compiler can access entire structure from the function.
(b) Individual member’s address can be displayed in structure.
(c) Individual member can be passed by reference in a function.
(d) Both (b) and (c).
64
29 Members of a union are accessed as________________.
(a) union-name. member
(b) union-pointer->member
(c) Both a & b
(d) None of the mentioned
31 What will be output if you will compile and execute the following c code?
#include<stdio.h>
int main(){
double far* p,q;
printf("%d",sizeof(p)+sizeof q);
return 0;
}
(a) 12
(b) 8
(c) 4
(d) 1
65
(d) math.h
34 How many bytes are occupied by near, far and huge pointers (DOS)?
(a) near=2 far=4 huge=4
(b) near=4 far=8 huge=8
(c) near=2 far=4 huge=8
(d) near=4 far=4 huge=8
36 What would be the equivalent pointer expression for referring the array element
a[i][j][k][l]
(a) ((((a+i)+j)+k)+l)
(b) *(*(*(*(a+i)+j)+k)+l)
(c) (((a+i)+j)+k+l)
(d) ((a+i)+j+k+l)
66
{
int *p;
p = (int *)malloc(20);
printf("%d\n", sizeof(p));
free(p);
return 0;
}
(a) 4
(b) 2
(c) 8
(d) Garbage value
40 Assume integer is 2 bytes wide. How many bytes will be allocated for the following
code?
#include<stdio.h>
#include<stdlib.h>
#define MAXROW 3
#define MAXCOL 4
int main()
{
int (*p)[MAXCOL];
p = (int (*) [MAXCOL])malloc(MAXROW *sizeof(*p));
return 0;
}
(a) 56 bytes
(b) 128 bytes
(c) 24 bytes
(d) 12 bytes
67
a = ~a;
printf("%d\n", a);
}
(a) -9
(b) -10
(c) -11
(d) 10
#include <stdio.h>
int main()
{
if (7 & 8)
printf("Honesty");
if ((~7 & 0x000f) == 8)
printf("is the best policy\n");
}
(a) Honesty is the best policy
(b) Honesty
(c) is the best policy
(d) No output
#include <stdio.h>
int main()
{
int i, n, a = 4;
scanf("%d", &n);
for (i = 0; i < n; i++)
a = a * 2;
}
68
(a) Logical Shift left
(b) No output
(c) Arithmetic Shift right
(d) bitwise exclusive OR
#include <stdio.h>
void main()
{
int x = 97;
int y = sizeof(x++);
printf("x is %d", x);
}
(a) x is 97
(b) x is 98
(c) x is 99
(d) Run time error
69
(d) Run time error
Ans. (1)(a), (2)(c), (3)(c), (4)(d), (5)(c), (6)(b), (7)(a),(8)(b), (9)(c), (10)(a), (11)(b), (12)(b),
(13)(d), (14)(b), (15)(b), (16)(b), (17)(a), (18)(c), (19)(c), (20)(a), (21)(a), (22)(c),
(23)(d), (24)(c), (25)(a), (26)(d), (27)(a), (28)(a), (29)(c), (30)(d), (31)(a), (32)(c),
(33)(c), (34)(a), (35)(d), (36)(b), (37)(a), (38)(a), (39)(b), (40)(c), (41)(a), (42)(c),
(43)(c), (44)(c), (45)(b), (46)(a), (47)(d), (48)(c), (49)(d), (50)(a)
Ans. (1)(actual), (2)(#), (3)(Directives), (4) (define symbolic statements and macros),
(5)(\), (6)(symbolic constant and macro identifier)
70
II Short Answer Type Questions:
1 What do you understand by pointer to a pointer? Can this be extended to any level?
Verify.
2 Explain the difference between malloc(), calloc() and realloc().
3 What is dynamic memory allocation? Discuss various library functions for it.
4 What are macros? Discuss its various types with the help of examples.
5 What is conditional compilation? Explain in detail.
6 Difference between pointers and arrays.
7 Discuss the important features of structures.
8 Write how to process the structure.
9 What is the purpose of typedef feature?
10 Write short notes on self-referential structures.
11 Discuss about pointers and structures.
12 An application stores points using rectangular / polar coordinates. Define a union that
can support these two formats for storing a point. Write functions to:
a. Convert from polar to rectangular storage.
b. Calculate the distance between two points
13 Define type casting. Explain using an example.
14 Differentiate between recursion & iteration. Explain using an example. Which can be
solved by both methods?
71
15 Declare an array of pointers and allocate memory to each of its elements. How would
you release the allocated memory?
16 Explain function callback with the help of an example.
17 Write any four string handling functions with examples.
18 Write a program that reads a file and counts the characters, spaces, tabs and new lines
in the file.
IV Practical Questions:
UNIT - III
1 The preprocessor is a program that processes the source code before compilation.
2 The program typed in the editor is the source code for the preprocessor.
3 The #define defines the macro templates.
4 The #undef undefines the macro.
5 With #include “stdio.h” the compiler searches the file in the entire system.
6 With #include <stdio.h> the compiler searches the file in the standard directory.
7 Conditional compilation means a few statements can be skipped from a compiler.
8 The #ifdef and #ifndef work exactly in the same manner.
9 The #error flags are user-defined messages.
10 The #pragma sets off/on warning and error messages.
11 Does there any function exist to convert the int or float to a string?
12 strrchr() standard library function will you use to find the last occurance of a character
in a string in C.
72
13 The purpose of fflush() function is to flushes only specified stream.
14 The fprintf() to display the output on the screen.
15 The function randomize() will returns a random number generator with a random value
based on time in Turbo C under DOS.
Ans. (1)(T), (2)(T), (3)(T), (4)(T), (5)(F), (6)(T), (7)(T), (8)(F), (9)(T), (10)(T), (11)(T),
(12)(T), (13)F), (14)(T), (15)(T)
(a) a
(b) b
(c) error
(d) abcd
73
(a) *(customer.name+2)
(b) (*pc).name[2]
(c) pc->name[2]
(d) above all
10 FILE is _______________
(a) Stack
(b) Pointer
(c) Union
(d) Structure
74
14 Strcat function adds null character
(a) Only if there is space
(b) Always
(c) Depends on the standard
(d) Depends on the compiler
18 Which of the following function sets first n characters of a string to a given character?
(a) strinit()
(b) strnset()
(c) strset()
(d) strcset()
20 Input/output function prototypes and macros are defined in which header file?
(a) conio.h
(b) stdlib.h
(c) stdio.h
(d) dos.h
21 Which standard library function will you use to find the last occurance of a character in
a string in C?
(a) strnchar()
(b) strchar()
75
(c) strrchar()
(d) strrchr()
22 What is stderr ?
(a) Standard error
(b) Standard error types
(c) Standard error streams
(d) Standard error definitions
23 Does there any function exist to convert the int or float to a string?
(a) Yes
(b) No
24 Which of the following function is used to find the first occurrence of a given string in
another string?
(a) strchr()
(b) strrchr()
(c) strstr()
(d) strnset()
25 Which mathematical function among the following does NOT require int parameters?
(a) div(x, y);
(b) srand(x);
(c) sqrt(x);
(d) All of the mentioned.
26 sin(x) returns
(a) sine of x where x is in radians
(b) sine of x where x is in degree
(c) cosine of x where x is in radians
(d) cosine of x where x is in degree
27 cos(x) returns
(a) sine of x where x is in radians
(b) sine of x where x is in degree
(c) cosine of x where x is in radians
(d) cosine of x where x is in degree
28 Which among the following mathematical function do not have a “double” return-type?
(a) srand(x);
(b) ceil(x);
(c) floor(x);
(d) Both (b) and (c);
29 function fabs defined math.h header file takes argument of type integer.
(a) true
76
(b) false
(c) Depends on the implementation
(d) Depends on the standard
31 What will be output if you will compile and execute the following c code?
#include<stdio.h>
#define max 5;
int main(){
int i=0;
i=max++;
printf("%d",i++);
return 0;
}
(a) 5
(b) 6
(c) 7
(d) 0
33 The library function used to find the last occurrence of a character in a string is
(a) strnstr()
(b) laststr()
(c ) strrchr()
(d) strstr()
77
(c) 7
(d) 2
35 What is stderr?
(a) standard error
(b) standard error types
(c) standard error streams
(d) standard error definitions
78
(a) 9, 4
(b) 27, 4
(c) 27, 6
(d) Error
43 Which is true?
(a) The symbolic constant EOF is defined in
(b) The value is typically -1,
(c) Both a & b
(d) Either a or b
79
int main()
{
char c = '�';
putchar(c);
}
(a) Compile time error
(b) Nothing
(c) 0
(d) Undefined behaviour
80
49 What is the output of this C code if
following commands are used to run and if myfile does not exist?
gcc -o test test.c
./test > myfile
#include <stdio.h>
int main(int argc, char **argv)
{
char c = 'd';
putchar(c);
printf(" %d\n", argc);
}
(a) d 2 in myfile
(b) d 1 in myfile
(c) Depends on the system
(d) Depends on the standard
Ans. (1)(d), (2)(a), (3)(d), (4)(c), (5)(c), (6)(d), (7)(a), (8)(a), (9)(c), (10)(d), (11)(a),
(12)(d), (13)(b), (14)(b), (15)(b), (16)(a), (17)(b), (18)(b), (19)(d), (20)(c), (21)(d),
(22)(c), (23)(a), (24)(c), (25)(c), (26)(a), (27)(c), (28)(a), (29)(b), (30)(d), (31)(d),
(32)(c), (33)(c), (34)(a), (35)(c), (36)(a), (37)(c), (38)(b), (39)(c), (40)(b), (41)(b),
(42)(c), (43)(c), (44)(d), (45)(b), (46)(b), (47)(c), (48)(b), (49)(b), (50)(a)
1 The file must be opened in ____________mode to add the new information at the end
of the file.
2 fopen function contains_____________number of arguments.
3 The_____________operator is used to access the members of a structure.
4 All variables inside a ________share storage space.
5 The _________ function copies one string to another.
6 The strcmp() returns __________ if both strings are identical.
7 The _________ function sets the file pointer associated with a stream to a new
position.
Ans. (1)(append), (2)(2), (3)(dot), (4)(union), (5)(strcpy), (6) (0), (7) (fseek)
81
i. fscanf
ii. fprintf
3 Describe the different I/O operations on files.
4 Discuss the important features of unformatted data files.
5 Write short notes on command line arguments.
6 Write about random access to files.
7 Write briefly about declaring and initializing string variables.
8 What is a field of a structure?
9 Explain the difference between the two member access operators: . and ->
10 What is a file? Why a file is called an external data structure?
11 Discuss some library functions from math.h.
12 How would you find size of a file using fseek and ftell?
13 How would you make a parent process suspend its execution until a child process
terminates? How does the parent get to know which child process terminated?
14 What is the difference between file open modes r+ and w+?
15 What is memory leakage? Give an example statement that can cause memory leakage
and explain it with the help of a diagram.
16 How are system calls different from library functions? Explain.
17 Define GCC utility. Why do we use it? Explain using an example.
82
IV Practical Questions:
1 Write a program to convert the case of alphabets in a text file. Uppercase letters
should be converted to lower case and vice versa.
2 Write a program to store the data of students-name, register number and marks for 6
subjects. Display the data stored. Use a menu to enter the choice from the user to create
a new data file or read the contents of previously created file.
3 Define a preprocessor macro swap(t, x, y) that will swap two arguments x and y of a
given type t.
4 Define a preprocessor macro to select:
• the least significant bit from an unsigned char
• the nth (assuming least significant is 0) bit from an unsigned char.
5 Write a program that simulates throwing a six sided die
6 Write a program to compare two files and print out the lines where they differ. Hint:
look up appropriate string and file handling library routines. This should not be a very
long program
UNIT – IV
1 You have a new application on a CD-ROM that you wish to install. What should your
first step be?
Choose one:
(a) Read the installation instructions on the CD-ROM.
(b) Use the mount command to mount your CD-ROM as read-write.
(c) Use the unmount command to access your CD-ROM.
(d) Use the mount command to mount your CD-ROM as read-only.
2 You are covering for another system administrator and one of the users asks you to
restore a file for him. You locate the correct tarfile by checking the backup log but do
not know how the directory structure was stored. What command can you use to
determine this?
Choose one:
(a) tar fx tarfile dirname
(b) tar tvf tarfile filename
(c) tar ctf tarfile
(d) tar tvf tarfile
3 You have the /var directory on its own partition. You have run out of space. What
should you do? Choose one:
(a) Reconfigure your system to not write to the log files.
(b) Use fips to enlarge the partition.
83
(c) Delete all the log files.
(d) Delete the partition and recreate it with a larger size.
4 If you type the command cat dog &> cat what would you see on your display? Choose
one:
(a) Any error messages only.
(b) The contents of the file dog.
(c) The contents of the file dog and any error messages.
(d) Nothing as all output is saved to the file cat.
5 To scan a and b given below, which of the following scanf() statement will you use?
#include<stdio.h>
float a;
double b;
84
(b) A character string containing the name of the user & the second argument is the
mode.
(c) A character string containing file poniter & the second argument is the mode.
(d) None of the mentioned of the mentioned
11 When a C program is started, O.S environment is responsible for opening file and
providing pointer for that file?
(a) Standard input
(b) Standard output
(c) Standard error
(d) All of the mentioned
85
(c) w
(d) t
19 Which of the following statements about stdout and stderr are true?
(a) Same
(b) Both connected to screen always.
(c) Both connected to screen by default.
(d) stdout is line buffered but stderr is unbuffered.
86
(b) malloc(variable_name, 0)
(c) free();
(d) memalloc(variable_name, 0)
22 What is the size of array “line” used in fgets(line, maxline, *fp) function?
(a) maxline – 1
(b) maxline
(c) maxline + 1
(d) Size is dynamic
23 The function int fputs(char *line, FILE *fp) returns EOF when:
(a) ‘�’ character of array line is encountered
(b) ‘n’ character in array line is encountered
(c) ‘t’ character in array line is encountered
(d) When an error occurs
25 Which of the following is the right declaration for fgets inside the library?
(a) int *fgets(char *line, int maxline, FILE *fp);
(b). char *fgets(char *line, int maxline, FILE *fp);
(c) char *fgets(char *line, FILE *fp);
(d) int *fgets(char *line, FILE *fp);
87
29 Why do we write (int *) before malloc?
int *ip = (int *)malloc(sizeof(int));
88
(d) None of these
35 The child process completes execution,but the parent keeps executing, then the child
process is known as
(a) Orphan
(b) Zombie
(c) Body
(d) Dead
36 Which of the following commands can be used to change default permissions for files
and directories at the time of creation.
(a) Chmod
(b) Chown
(c) Umask
(d) Chgrp
37. The Octal number to be given along with chmod command to make a file readable,
writable and executable to the owner, readable and executable to group and others is:
(a) 000
(b) 755
(c) 744
(d) 555
38. The chmod ugo+rw note command can be represented in octal notation as
(a) chmod 555 note
(b) chmod 666 note
(c) chmod 444 note
(d) chmod 333 note
39. Which one of following provides conceptual support for function call?
89
(a) The system stack
(b) The processors registers
(c) The data segment
(d) The text segment
43 When a C program is started, O.S environment is responsible for opening file and
providing pointer for that file?
(a) Standard input
(b) Standard output
(c) Standard error
(d) All of the menitoned
90
(c) .c
(d) None of the mentioned
47 What is the output of this C code if there is no error in stream fp?
#include <stdio.h>
int main()
{
FILE *fp;
fp = fopen("newfile", "w");
printf("%d\n", ferror(fp));
return 0;
}
(a) Compilation error
(b) 0
(c) 1
(d) Any nonzero value
91
stderr = fp;
fprintf(stderr, "%s", "hello");
}
(a) Compilation error
(b) hello
(c) Undefined behaviour
(d) Depends on the standard
Ans. (1)(d), (2)(d), (3)(d), (4)(d), (5)(d), (6)(b),(7)(b), (8)(a), (9)(c), (10)(c), (11)(d), (12)(c),
(13)(b), (14)(d), (15)(c), (16)(d), (17)(a), (18)(d), (19)(c), (20)(a), (21)(c), (22)(b),
(23)(d), (24)(c), (25)(b) , (26)(a), (27)(b), (28)(a), (29)(b), (30(a), (31)(b), (32)(b),
(33)(c), (34)(a), (35)(b), (36)(c), (37)(b), (38)(b), (39(a), (40)(c), (41)(c), (42)(c),
(43)(d), (44)(b), (45)(c), (46)(d), (47)(b), (48)(b), (49)(d), (50)(b)
1 What is 'inode'?
2 Brief about the directory representation in LINUX]
3 What are the LINUX system calls for I/O?
4 How do you change File Access Permissions?
5 What is a FIFO?
6 Explain fork() system call.
7 List the system calls used for process management.
8 What are the process states in Unix?
9 Explain what happens when a new thread is created?
10 Explain why mutex locks are important in threading?
11. If a program contains four calls to fork( ) one after the other how many total processes
would get created?
12. What is the difference between a zombie process and an orphan process?
13. What purpose do the functions getpid( ), getppid( ), getpppid( ) serve?
14. What are the differences between process and thread?
15. Write a simple C program to demonstrate use of pthread basic functions
92
1 Explain how commands can be executed without invoking new process.
2 Explain any TEN built in functions with example.
3 Explain the structure of a Directory with inodes.
4 How will you set permissions for Owner, Group and Public?
5 Explain the file system hierarchy in LINUX System.
6 Explain what happens when a thread attempts to lock a mutex.
7 Explain two ways threads can deadlock.
8 Define ‘Make’ utility. What is the scope & used of make file. Explain using an
example.
9. Define the following commands
(a) Fork()
(b) Wait()
(c) Exec()
10. Write a program to copy the file contents into another file.
11. Write a program to demonstrate thread creation. The thread created should simply print
a fixed message as many times as required by the main program (pass data to the
thread).
12. Write a program that displays the contents of the directory (using system) that is
passed as command line parameter. The program should then display a menu providing
options to copy, move or delete the file. The desired operation should be carried
through a child process whose memory area is overlaid with the required shell
command.
13 Define file accessibility and directories regarding LINUX into C.
93
QUESTION BANK
DISCRETE MATHEMATICS
MCA 105
94
QUESTION BANK
DISCRETE MATHEMATICS – MCA 105
MCA I
UNIT - I
1 ØЄ{Ø}
2 ØЄ{ Ø,{Ø}}
3 {Ø} Є{Ø}
4 {Ø} Є{{ Ø}}
5 Ø Є{x}
6 If A∩B=B then B is properly contained in set B.
7 If R is an equivalence relation on a set A, the R-1 is also an equivalence relation.
8 Let X be a finite set with 100 elements and Y be a finite set with 2 elements. Then a
function f : X → Y can be an injection
9 Let A, B, C be three finite nonempty subsets of R. Then (A ∪ B) ∩ C and (A ∩ B) ∪ C
can have the same size.
10 Let X, Y be nonempty subsets of R and consider the function f : X → Y , f(x) = x 2 .
Then f can be a bijection.
11 Let X be a nonempty subset of N. Then a function f : X → X can be a surjection.
12 Let f : N → N and let A, B be finite subsets of N of 100 elements each. Then it is
possible for f(A ∪ B) to have 2 elements while f(A) ∪ f(B) has 3 elements.
13 The number of sequences of bits such that four of the bits are 0, three of the bits are 1,
and are such that they start with a 1 and end with two 0’s is 16.
14 Let X be a set with 2 elements and Y be a set with 3 elements. There are as many
functional binary relations with domain X and codomain Y as there are functions with
domain X and codomain Y.
15 The function f : N → N f(x) = 2x − 1 is a bijection.
Ans. (1)(T), (2)(T), (3)(F), (4)(T), (5)(F), (6)(T), (7)(F), (8)(F), (9)(T), (10)(T), (11)(T),
(12)(F), (13)(F), (14)(F), (15)(F)
1 The bit strings for the sets{1,2,3,4,5} and {1,3,5,7,9} are 11 1110 0000 and 10 1010
1010, respectively. Use bit strings to find the union and intersection of these sets.
(a) {1,3,5}
(b) {1,2,5}
(c) {4,7,9}
(d) {2,3,5}
95
2 A student is to answer 10 out of 13 questions in an exam. How many choices have he?
(a) 256
(b) 286
(c) 156
(d) 234
3 A sample of 80 car owners revealed that 24 owned station wagons and 62 owned cars
which are not station wagons. Find the number k people who owned both station wagon
and some other car.
(a) 7
(b) 4
(c) 6
(d) 8
4 Consider the relation | of division on the N of positive integers. Check whether the
relation is
(a) Reflexive
(b) Symmetric
(c) Antisymmetric
(d) Transitive.
(e) Both a) and d).
5 Find the number n of four-letter words that can be formed from the word
NUMERICAL
(a) 3024.
(b) 840.
(c) 1344.
(d) 504.
7 A students can take one of four mathematics sections and one of five English sections.
Find the number n of ways he can register for the two courses.
(a) 24.
(b) 28.
(c) 20.
(d) 18
96
(𝑐) 𝐴 ∩ 𝐵 ⊇ {2, 3} 𝑖𝑚𝑝𝑙𝑖𝑒𝑠 𝑡ℎ𝑎𝑡 {2, 3} ⊆ 𝐴 𝑎𝑛𝑑 {2, 3} ⊆ 𝐵.
(𝑑)𝐴 − 𝐵 ⊇ {3}𝑎𝑛𝑑 {2} ⊆ 𝐵 𝑖𝑚𝑝𝑙𝑖𝑒𝑠 𝑡ℎ𝑎𝑡 {2, 3} ⊆ 𝐴 ∪ 𝐵.
(𝑒) {2} ∈ 𝐴 𝑎𝑛𝑑 {3} ∈ 𝐴 𝑖𝑚𝑝𝑙𝑖𝑒𝑠 𝑡ℎ𝑎𝑡 {2, 3} ⊆ 𝐴.
9 Let A = {0, 1} × {0, 1} and B = {a, b, c}. Suppose A is listed in lexicographic order
based on 0 < 1 and B is in alphabetic order. If A × B × A is listed in lexicographic
order, then the next element after ((1, 0), c,(1, 1)) is
(a) ((1, 0), a,(0, 0))
(b) ((1, 1), c,(0, 0))
(c) ((1, 1), a,(0, 0))
(d) ((1, 1), a,(1, 1))
(e) ((1, 1), b,(1, 1))
12 Consider the true theorem, “For all sets A and B, if A ⊆ B then A ∩ Bc = ∅.” Which of
the following statements is NOT equivalent to this statement?
(a) 𝐹𝑜𝑟𝑎𝑙𝑙𝑠𝑒𝑡𝑠𝐴𝑐𝑎𝑛𝑑𝐵, 𝑖𝑓𝐴 ⊆ 𝐵𝑡ℎ𝑒𝑛𝐴𝑐 ∩ 𝐵𝑐 = ∅
(𝑏) 𝐹𝑜𝑟𝑎𝑙𝑙𝑠𝑒𝑡𝑠𝐴𝑎𝑛𝑑𝐵, 𝑖𝑓𝐴𝑐 ⊆ 𝐵𝑡ℎ𝑒𝑛𝐴𝑐 ∩ 𝐵𝑐 = ∅.
(𝑑) 𝐹𝑜𝑟𝑎𝑙𝑙𝑠𝑒𝑡𝑠𝐴𝑐𝑎𝑛𝑑𝐵𝑐 , 𝑖𝑓𝐴𝑐 ⊆ 𝐵𝑐𝑡ℎ𝑒𝑛𝐴𝑐 ∩ 𝐵 = ∅.
(𝑒) 𝐹𝑜𝑟𝑎𝑙𝑙𝑠𝑒𝑡𝑠𝐴𝑎𝑛𝑑𝐵, 𝑖𝑓𝐴𝑐 ⊇ 𝐵𝑡ℎ𝑒𝑛𝐴 ∩ 𝐵 = ∅.
13 The power set P((A × B) ∪ (B × A)) has the same number of elements as the power set
P((A × B) ∪ (A × B)) if and only if
(a) 𝐴 = 𝐵
(𝑏) 𝐴 = ∅ 𝑜𝑟 𝐵 = ∅
(𝑐) 𝐵 = ∅ 𝑜𝑟 𝐴 = 𝐵
(𝑑) 𝐴 = ∅ 𝑜𝑟 𝐵 = ∅ 𝑜𝑟 𝐴 = 𝐵
(𝑒) 𝐴 = ∅ 𝑜𝑟 𝐵 = ∅ 𝑜𝑟 𝐴 ∩ 𝐵 = ∅
97
(c) (253)(146)
(d) (325)(614)
(e) (614)(253)
15 Let f : X → Y
Consider the statement, “For all subsets C and D of Y , f−1(C∩ 𝐷𝑐 ) = f−1 (C) ∩
[𝑓 −1(D)]c. This statement is
(a) True and equivalent to: For all subsets C and D of Y , f −1(C − D) = f−1(C) −
f−1(D).
(b) False and equivalent to: For all subsets C and D of Y , f −1(C − D) = f−1(C) −
f−1(D).
(c) True and equivalent to: For all subsets C and D of Y , f−1(C − D) = f−1(C) −
[f−1(D)]c.
(d) False and equivalent to: For all subsets C and D of Y , f −1 (C − D) = f−1(C) − [f
−1
(D)]c.
(e) True and equivalent to: For all subsets C and D of Y , f−1(C − D) = [f−1(C)]c −
f−1(D).
16 Define f(n) = n/2+(1−(−1)n)/4 for all 𝑛 ∈ Z. Thus, f : Z → Z, Z the set of all integers.
Which is correct?
(a) f is not a function from Z → Z because n/2 does not belong to Z.
(b) f is a function and is onto and one-to-one.
(c) f is a function and is not onto but is one-to-one.
(d) f is a function and is not onto and not one-to-one.
(e) f is a function and is onto but not one-to-one.
17 The number of partitions of {1, 2, 3, 4, 5} into three blocks is S(5, 3) = 25. The total
number of functions f : {1, 2, 3, 4, 5} → {1, 2, 3, 4} with |Image(f)| = 3 is
(a) 4×6
(b) 4 × 25
(c) 25 × 6
(d) 4 × 25 × 6
(e) 3 × 25 × 6
98
(𝑑) 𝐴 − 𝐵 ⊇ {3, 4} 𝑎𝑛𝑑 {1, 2} ⊆ 𝐵 𝑖𝑚𝑝𝑙𝑖𝑒𝑠 𝑡ℎ𝑎𝑡 {1, 2, 3, 4} ⊆ 𝐴 ∪ 𝐵.
(𝑒) {2, 3} ⊆ 𝐴 ∪ 𝐵 𝑖𝑚𝑝𝑙𝑖𝑒𝑠 𝑡ℎ𝑎𝑡 𝑖𝑓 {2, 3} ∩ 𝐴 = ∅ 𝑡ℎ𝑒𝑛 {2, 3} ⊆ 𝐵.
20 Let A = {0, 1} × {0, 1} × {0, 1} and B = {a, b, c} × {a, b, c} × {a, b, c}. Suppose A is
listed in lexicographic order based on 0 < 1 and B is listed in lexicographic order based
on a < b < c. If A×B ×A is listed in lexicographic order, then the next element after ((0,
1, 1),(c, c, c),(1, 1, 1)) is
(a) ((1, 0, 1),(a, a, b),(0, 0, 0))
(b) ((1, 0, 0),(b, a, a),(0, 0, 0))
(c) ((1, 0, 0),(a, a, a),(0, 0, 1))
(d) ((1, 0, 0),(a, a, a),(1, 0, 0))
(e) ((1, 0, 0),(a, a, a),(0, 0, 0))
21 Consider the true theorem, “For all sets A, B, and C if A ⊆ B ⊆ C then C c⊆Bc⊆Ac ”.
Which of the following statements is NOT equivalent to this statement?
(a) F𝑜𝑟 𝑎𝑙𝑙 𝑠𝑒𝑡𝑠 𝐴𝑐 , 𝐵𝑐, 𝑎𝑛𝑑 𝐶𝑐, 𝑖𝑓 𝐴𝑐 ⊆ 𝐵𝑐 ⊆ 𝐶𝑐𝑡ℎ𝑒𝑛 𝐶 ⊆ 𝐵 ⊆ 𝐴.
(𝑏) 𝐹𝑜𝑟 𝑎𝑙𝑙 𝑠𝑒𝑡𝑠 𝐴𝑐, 𝐵, 𝑎𝑛𝑑 𝐶𝑐, 𝑖𝑓 𝐴𝑐 ⊆ 𝐵 ⊆ 𝐶𝑐𝑡ℎ𝑒𝑛 𝐶 ⊆ 𝐵𝑐 ⊆ 𝐴.
(𝑐) 𝐹𝑜𝑟 𝑎𝑙𝑙 𝑠𝑒𝑡𝑠 𝐴, 𝐵, 𝑎𝑛𝑑 𝐶𝑐, 𝑖𝑓 𝐴𝑐 ⊆ 𝐵 ⊆ 𝐶 𝑡ℎ𝑒𝑛 𝐶𝑐 ⊆ 𝐵𝑐 ⊆ 𝐴.
(𝑒) 𝐹𝑜𝑟 𝑎𝑙𝑙 𝑠𝑒𝑡𝑠 𝐴𝑐, 𝐵𝑐, 𝑎𝑛𝑑 𝐶𝑐, 𝑖𝑓 𝐴𝑐 ⊆ 𝐵𝑐 ⊆ 𝐶 𝑡ℎ𝑒𝑛 𝐶𝑐 ⊆ 𝐵 ⊆ 𝐴.
24 Let Σ = {x, y} be an alphabet. The strings of length seven over Σ are listed in dictionary
(lex) order. What is the first string after xxxxyxx that is a palindrome (same read
forwards and backwards)?
(a) xxxxyxy
(b) xxxyxxx
(c) xxyxyxx
(d) xxyyyxx
(e) xyxxxyx
99
25 Let σ = 681235947 and τ = 627184593 be permutations on {1, 2, 3, 4, 5, 6, 7, 8, 9} in
one-line notation (based on the usual order on integers). Which of the following is a
correct cycle notation for τ ◦ σ?
(a) (124957368)
(b) (142597368)
(c) (142953768)
(d) (142957368)
(e) (142957386)
26 Let S = {1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21}. What is the smallest integer N > 0 such
that for any set of N integers, chosen from S, there must be two distinct integers that
divide each other?
(a) 10
(b) 7
(c) 9
(d) 8
(e) 11
28 Define a binary relation R = {(0, 1), (1, 2), (2, 3), (3, 2), (2, 0)} on A = {0, 1, 2, 3}. The
directed graph (including loops) of the transitive closure of this relation has
(a) 16 arrows
(b) 12 arrows
(c) 8 arrows
(d) 6 arrows
(e) 4 arrows
30 Let N+2 denote the natural numbers greater than or equal to 2. Let mRn if gcd(m, n)
>1. The binary relation R on N2 is
(a) Reflexive, Symmetric, Not Transitive
(b) Reflexive, Not Symmetric, Transitive
(c) Reflexive, Symmetric, Transitive
100
(d) Reflexive, Not Symmetric, Not Transitive
(e) Not Reflexive, Symmetric, Not Transitive
35 The number of distinguishable permutations of the letters in the word BANANA are,
(a) 60.
(b) 36.
(c) 20.
(d) 10.
37 ~ q (p→q)→~ p is,
(a) Satisfiable.
(b) Unsatisfiable.
(c) Tautology.
(d) Invalid.
101
38 Which of the following is not a well formed formula?
(a) x P(x)→f (x) x
(b) ( ) x1x2x3 x1 = x2 x2 = x3 _ x1 = x3
(c) ~ (p →q)→q
(d) T P(a, b)→zQ(z)
39 The description of the shaded region in the following figure using the operations on
set is,
(a) C(A B)
(b) (C − ((A C)(CB)))(A B)
(c) (C − (A C)(C B))(A B)
(d) A BC − (C(A B))
41. Consider the statement form p q where p =“If Tom is Jane’s father then Jane is
Bill’s niece” and q =“Bill is Tom’s brother.” Which of the following statements is
equivalent to this statement?
(a) If Bill is Tom’s Brother, then Tom is Jane’s father and Jane is not Bill’s niece.
(b) If Bill is not Tom’s Brother, then Tom is Jane’s father and Jane is not Bill’s
niece.
(c) If Bill is not Tom’s Brother, then Tom is Jane’s father or Jane is Bill’s niece.
(d) If Bill is Tom’s Brother, then Tom is Jane’s father and Jane is Bill’s niece.
(e) If Bill is not Tom’s Brother, then Tom is not Jane’s father and Jane is Bill’s
niece.
42. Consider the statement, “If n is divisible by 30 then n is divisible by 2 and by 3 and by 5.”
Which of the following statements is equivalent to this statement?
(a) If n is not divisible by 30 then n is divisible by 2 or divisible by 3 or divisible by
5.
(b) If n is not divisible by 30 then n is not divisible by 2 or not divisible by 3 or not
divisible by 5.
(c) If n is divisible by 2 and divisible by 3 and divisible by 5 then n is divisible by
30.
(d) If n is not divisible by 2 or not divisible by 3 or not divisible by 5 then n is not
divisible by 30.
102
(e) If n is divisible by 2 or divisible by 3 or divisible by 5 then n is divisible by 30.
43. Which of the following statements is the contrapositive of the statement, “You win the
game if you know the rules but are not overconfident?”
(a) If you lose the game then you don’t know the rules or you are overconfident.
(b) A sufficient condition that you win the game is that you know the rules or you
are not overconfident.
(c) If you don’t know the rules or are overconfident you lose the game.
(d) If you know the rules and are overconfident then you win the game.
(e) A necessary condition that you know the rules or you are not overconfident is
that you win the game.
45. Consider the statement, “Given that people who are in need of refuge and consolation
are apt to do odd things, it is clear that people who are apt to do odd things are in need
of refuge and consolation.” This statement, of the form (P Q) (Q P), is
logically equivalent to
(a) People who are in need of refuge and consolation are not apt to do odd things.
(b) People are apt to do odd things if and only if they are in need of refuge and
consolation.
(c) People who are apt to do odd things are in need of refuge and consolation.
(d) People who are in need of refuge and consolation are apt to do odd things.
(e) People who aren’t apt to do odd things are not in need of refuge and
consolation.
103
47. Which of the following statements is NOT equivalent to the statement, “There exists
either a computer scientist or a mathematician who knows both discrete math and
Java.”
(a) There exists a person who is a computer scientist and who knows both discrete
math and Java or there exists a person who is a mathematician and who knows
both discrete math and Java.
(b) There exists a person who is a computer scientist or there exists a person who is
a mathematician who knows discrete math or who knows Java.
(c) There exists a person who is a computer scientist and who knows both discrete
math and Java or there exists a mathematician who knows both discrete math
and Java.
(d) There exists a computer scientist who knows both discrete math and Java or
there exists a person who is a mathematician who knows both discrete math and
Java.
(e) There exists a person who is a computer scientist or a mathematician who
knows both discrete math and Java.
48. Which of the following is the negation of the statement, “For all odd primes p < q there
exists positive non-primes r < s such that p2 + q2 = r2 + s2.”
(a) For all odd primes p < q there exists positive non-primes r < s such that p2 + q2
≠ r2 + s2
(b) There exists odd primes p < q such that for all positive non-primes r < s, p2 + q2
= r2 + s2
(c) There exists odd primes p < q such that for all positive non-primes r < s, p2 + q2
≠ r2 + s2
(d) For all odd primes p < q and for all positive non-primes r < s, p2 + q2 ≠ r2 + s2.
(e) There exists odd primes p < q and there exists positive non-primes r < s such
that p2 + q2 ≠ r2 + s2
(1) and
(b) This assertion is true. The proof follows from the distributive law for .
104
(d) This assertion is true. To see why, let D = N, P(x) = “x is divisible by 6,” Q(x) =
“x is divisible by 3.” If x = 6, then x is divisible by both 3 and 6 so both
statements in the assertion have the same truth value for this x.
(a)
(b)
(c)
(d)
(e)
Ans. (1)(a), (2)(b), (3)(c), (4)(e), (5)(a), (6)(b), (7)(c),(8)(e), (9)(c), (10)(b), (11)(d), (12)(a),
(13)(d), (14)(b), (15)(a),(16) (e), (17)(d), (18) (a), (19)(b), (20)(e), (21)(d), (22)(a),
(23)(c), (24)(b), (25)(d), (26)(d), (27)(b), (28)(a), (29)(b), (30)(a), (31)(d), (32)(c),
(33)(d), (34)(c), (35)(a), (36)(b), (37)(c), (38)(b), (39)(b), (40)(a), (41)(b), (42)(d),
(43)(a), (44)(e), (45)(c), (46)(b), (47)(b), (48)(c), (49)(c), (50)(e)
Ans. (1)(2, 5), (2)(B=Ø), (3)(Ø), (4)({ Ø,{ Ø}), (5)(25), (6)(56), (7)(462)
1 What are the sets in the partition of the integers arising from congruence module 4?
Ans. [0] = {….-8,-4, 0, 4, 8,….} , [1] = {….-7,-3, 1, 5, 9,….},
[2] = {….-6,-2, 2, 6, 10,….} [3] = {….-5,-1, 3, 7, 11,….}
2 Among a group of 165 students, 8 are taking calculus, psychology & computer science;
33 are taking calculus & computer science, 20 are taking calculus & psychology, 24 are
105
taking psychology & computer science, 79 are taking calculus, 83 are taking
psychology, 63 are taking computer science. How many are taking none of the three
subjects?
Ans. 9
6 Let R denote the relation on the set N of natural numbers, where natural numbers m and
n satisfy mRn if and only if n = 2km for some integer k (which may be positive, zero or
negative). Is the relation R reflexive? Is it symmetric? Is it transitive? Is it an
equivalence relation? Is it a partial order? [Justify your answers.]
Ans. Yes, Yes, Yes, Yes, Yes
10 Let s be a positive integer. Prove that the closed interval [s;2s] contains a power of 2.
11 How many bit strings of length eight either start with a 1 bit or and end with the two
bits 00?
Ans. 32 ways
106
n( n + 1)
1+2+3+…..+n =
2
16 How many seven different person committees can be formed each containing three
women from an available set of 20 women and four men from an available set of 30
men?
Ans: 31,241,700 different committees
24 Define binary relation. How many binary relations are there on a set A with n
elements?
25 Find the minimum number of student in a class so that three of them are born on the
same day.
27 Let A be a set with n elements, find how many relations on A are there which (i)
symmetric and (ii) antisymmetric.
28 How many integers must you pick in order to be sure that at least two of them have the
same remainder when divided by 7?
29 Use proof by cases to show that|𝑥𝑦| = |𝑥||𝑦|, where x and y are real numbers.
30 How many solutions are there for the equation X+Y+Z=17, where X, Y, Z are non
negative integers.
107
32 How many solutions are there for the equation X+Y+Z=17, where X, Y, Z are non
negative integers.
33 Show that (A-C)⋂(C-B)=φ, without using Venn diagrams. Where A, B, C are non-
empty sets.
34 If R and S are relations from A to B such that R⊆S then prove that R-1⊆S-1.
35 Prove that 𝑝 → (𝑝⋁˅𝑞) is a tautology.
36 How many diagonals are there in a regular decagon?
37 Show that if any 5 numbers from 1 to 8 are chosen, then 2 of them will add up to 9.
38 How many ways are there to arrange 7 – sign and 5 + sign, such that no two + signs are
together?
39 A knight is a person who always tells a truth and knave always lies. We have two
people A and B such that A says “B is a knight”, B says “the two of us are opposite”.
What are A and B?
40 Let Z be the set of all integers and R be a relation defined on Z such that for any a,b ϵ
Z, aRb if and only if ab>=0. Is R an equivalence relation?
41 Show that a set of n elements can have 2n subsets.
42 Prove that |x y| = |x| |y| is true for all real numbers x and y.
43 A man wants to buy some pet birds. The pet store sells parrots, sparrows and mainas.
How many different selections are possible if the man wants to take home 7 birds.
Ans: 35
−𝟐
Ans: 𝟑
48 Let N={0, 1, 2, 3, …}. Define functions f, g and h from set N to N by f(n) = n+1, g(n)
= 2n, and
0 if n is even
h(n) = . Compute go(fog). Is the function h invertible? Is the
1 if n is odd
function f onto?
108
Ans: 4n+2,h is not one-one
51 How many ways are there to arrange 7 – sign and 5+ sign, such that no two + signs are
together?
Ans: 56
52 The set P ({a,b,c}) is partially ordered with respect to the subset relation. Find a chain
of length 3 in P.
3 For each of the following relations, determine whether or not that relation is reflexive,
symmetric, transitive, anti-symmetric, an equivalence relation, and/or a partial order,
giving appropriate reasons for your answers:-
(i) The relation P on the set Z of integers, where integers x and y satisfy xPy if and
only if x2y2;
(ii) The relation Q on the set Z of integers, where integers x and y satisfy xQy if and
only if x – y = k3 for some integer k;
(iii) The relation R on the set N of natural numbers, where natural numbers m and n
satisfy mRn if and only if m + 1 divides n + 1 (i.e., if and only if n+1 = k(m +1)
for some integer k);
(iv) The relation S on the set Z of integers, where integers x and y satisfy xSy if and
only if xy is even.
Ans. (i) reflexive, transitive, anti-symmetric
(ii) reflexive, symmetric
(iii) reflexive, anti- symmetric;
(v) symmetric
4 Let p <q be two consecutive odd primes. Prove that p+qis a composite number, having
at least three, not necessarily distinct, prime factors.
5 Find the transitive closure of the relation R where
MR =
109
1 0 1
0 1 0
1 1 0
Ans.
1 1 1
0 1 0
1 1 1
6 The nine entries of a 3×3 grid are filled with -1, 0, or 1. Prove that among the eight
resulting sums (three columns, three rows, or two diagonals) there will always be two
that add to the same number.
7 Given any set of ten natural numbers between 1 and 99 inclusive, prove that there are
two disjoint nonempty subsets of the set with equal sums of their elements.
8 Label one disc “1”, two discs “2”, three discs “3”, . . . , fifty discs “50”. Put these
1+2+3+···+50 = 1275 labeled discs in a box. Discs are then drawn from the box at
random without replacement. What is the minimum number of discs that must me
drawn in order to guarantee drawing at least ten discs with the same label?
Ans. 415
9 An urn has 900 chips, numbered 100 through 999. Chips are drawn at random and
without replacement from the urn, and the sum of their digits is noted. What is the
smallest number of chips that must be drawn in order to guarantee that at least three of
these digital sums be equal?
Ans. 3
10 An eccentric widow has five cats1. These cats have 16 kittens among themselves. What
is the largest integer n for which one can say that at least one of the five cats has n
kittens?
Ans. 4
11 No matter which fifty five integers may be selected from{1,2, . . . ,100}, prove that one
must select some two that differ by 10.
12 Prove that the sum of two rational numbers is rational.
13 Use a proof of cases to show that | xy | = | x| | y | where x & y are real numbers.
110
14 Show that these statements are equivalent:
P1: n is odd integer
P2: n2 is odd.
15 Prove by induction on n that the product 1 3 ... ( 2n −1) of the first n odd natural
numbers is equal to
( 2n ) ! .
2n n !
16 Prove by induction on n that (3n)! 26n−4 for the entire natural numbers n.
17 Show that
n
∑ C (i,k) = C (n + 1, k + 1)
i=k
18 Use PMI to prove the following
1+2+22+_ _ _ _ + 2n= 2n+1 - 1
positive integer n
19 Prove by induction on n that
4 i ( i + 1) = 27 ( 9n + 3n + 2 ) 4n − 2
n
i −1 1 2
i =1
111
If we do not go swimming, then we will take a canoe trip.
If we take a canoe trip, then we will be home by sunset.
𝑛
30 Use mathematical induction to show that 𝐻2𝑛 ≥ 1 + 2 whenever n is a nonnegative
1 1 1
integer. Where 𝐻𝑗 =1 + 2 + 3 + ⋯ … + 𝑗 .
31 Define function. Find the inverse of f(n) = 2(x-2)2 + 3 for all x<=2.
32 Find the number of integers between 1 and 100 that are divisible by any of the integer
2, 3, 5, 7.
33 Check the validity of the following argument :-
“If the labour market is perfect then the wages of all persons in a particular
employment will be equal. But it is always the case that wages for such persons are not
equal therefore the labour market is not perfect.”
34 What are the different types of quantifiers? Explain in brief.
Show that (x) (P(x)Q(x))→(x) P(x) (x) Q(x)
35 Define tautology and contradiction. Show that “If the sky is cloudy then it will rain and
it will not rain”, is not a contradiction.
36 How many words of 4 letters can be formed with the letters a, b, c, d, e, f, g and h,
when
(i) e and f are not to be included and
(ii) e and f are to be included.
Ans: 360, 1680
112
UNIT – II
Ans. (1)(T), (2)(F), (3)(T), (4)(F), (5)(T), (6)(T), (7)(T), (8)(F), (9)(T), (10)(F), (11)(F),
(12)(T), (13)(F), (14)(T), (15)(F)
113
4 Find all lower bounds of {15,45}.
(a) 3,5
(b) 5,9
(c) 15,5,3
(d) 15,24
114
(d) commutative law
17 Whether the relation R on the set of all integers is reflexive, symmetric, antisymmetric,
or transitive, where(x, y)ЄR if and only if xy ≥1
(a) Anti symmetric
(b) Transitive
(c) Symmetric
(d) Both Symmetric and transitive
18 Let N = {1, 2, 3, ….} be ordered by divisibility, which of the following subset is totally
ordered,
(a) (2, 6, 24).
(b) (3, 5, 15).
(c) (2, 9, 16).
115
(d) (4, 15, 30).
19 Let A = {2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16} and consider the divide relation
on A. Let C denote the length of the maximal chain, M the number of maximal
elements, and m the number of minimal elements. Which is true?
(a) C = 3, M = 8, m = 6
(b) C = 4, M = 8, m = 6
(c) C = 3, M = 6, m = 6
(d) C = 4, M = 6, m = 4
(a) (i)
(b) (ii)
(c) (iii)
(d) All of the above
116
23 Let R = {(a, a), (a, b), (b, b), (a, c), (c, c)} be a partial order relation on = {a, b, c}.
26 The inclusion of which of the following sets into S ={{1, 2} , {1, 2, 3}, {1, 3, 5} , {1, 2,
4}, {1, 2,3,4, 5}}is necessary and sufficient to make S a complete lattice under the
partial order defined by set containment?
(a) {1}
(b) {1},{2,3}
(c) {1},{1,3}
(d) {1},{1,3},{1,2,3,4},{1,2,3,5}
27 Let L be a set with a relation R which is transitive, anti-symmetric and reflexive and for
any two elements a, b Î L let the least upper bound lub (a, b) and the greatest lower
bound glb (a, b) exist. Which of the following is/are true?
(a) L is a poset
(b) L is a boolean algebra
(c) L is a lattice
(d) None of the above
117
a
b c d
e
29 A Poset is a lattice if for every pair of vertices
(a) GLB exists
(b) LUB exits
(c) Both (a) and (b)
(d) None of these
32 Let N = {1, 2, 3, ….} be ordered by divisibility, which of the following subset is totally
ordered,
(a) (2, 6, 24)
(b) (3, 5, 15)
(c) (2, 9, 16)
(d) (4, 15, 30)
118
35 For the sequence defined by the following recurrence relation with initial
condition , the explicit formula for Tnis
36 Let L be a lattice. Then for every a and b in L which one of the following is correct?
(a) a b = a b
(b) a (B C) = (a B) C
(c) a (b c) = a
(d) a (b c) = b
41 Let
m = “Juan is a math major,”
c = “Juan is a computer science major,”
g = “Juan’s girlfriend is a literature major,”
h = “Juan’s girlfriend has read Hamlet,” and
t = “Juan’s girlfriend has read The Tempest.”
119
Which of the following expresses the statement “Juan is a computer science major and
a math major, but his girlfriend is a literature major who hasn’t read both The Tempest
and Hamlet.”
(a) c m (g (⌐h ⌐t))
(b) c m (g (⌐h ⌐t))
(c) c m (g (⌐h ⌐t))
(d) c m (g (⌐h ⌐t))
(e) c m (g (h t))
42. The function ((p (r q)) ⌐ (⌐q ⌐r) is equal to the function
(a) qr
(b) ((p r) q)) (p r)
(c) (p q) (p r)
(d) (p q) ⌐ (p r)
(e) (p r) (p q)
43. The truth table for (p q) (p r) is the same as the truth table for
(a) (p q) (p r)
(b) (p q) r
(c) (p q) (p r)
(d) pq
(e) (p q) p
44. The Boolean function [⌐ (⌐p q) ⌐ (⌐p ⌐q)] (p r) is equal to the Boolean
function
(a) q
(b) pr
(c) pq
(d) r
(e) p
120
47. The truth table for a Boolean expression is specified by the correspondence (P,Q,R) →
S where (0, 0, 0) → 0, (0, 0, 1) → 1, (0, 1, 0) → 0, (0, 1, 1) → 1, (1, 0, 0) → 0, (1, 0, 1)
→0, (1, 1, 0) → 0, (1, 1, 1) → 1. A Boolean expression having this truth table is
(a) [(⌐P ⌐Q) Q] R
(b) [(⌐P ⌐Q) Q] R
(c) [(⌐P ⌐Q) ⌐Q] R
(d) [(⌐P ⌐Q) Q] R
(e) [(⌐P ⌐Q) Q] R
49. To show that the circuit corresponding to the Boolean expression (P Q) (⌐P Q)
(⌐P ⌐Q) can be represented using two logical gates, one shows that this Boolean
expression is equal to ⌐P Q. The circuit corresponding to (P Q R) (⌐P Q
R) (⌐P (⌐Q ⌐R) computes the same function as the circuit corresponding to
(a) (P Q) ⌐R
(b) P (Q R)
(c) ⌐P (Q R)
(d) (P ⌐Q) R
(e) ⌐P Q R
50. Using binary arithmetic, a number y is computed by taking the n-bit two’s complement
of x − c. If n is eleven, x = 101000010012 and c = 101012 then y =
(a) 011000011112
(b) 011000011002
(c) 011000111002
(d) 010001111002
(e) 011000000002
Ans. (1)(b), (2)(a), ( 3)(b), (4)(c), (5)(e), (6)(d), (7)(a), (8)(c), (9)(b), (10)(c), (11)(b), (12)(b),
(13)(a), (14)(d), (15)(b), (16)(a), (17)(d), (18) (a), (19)(a), (20)(a), (21)(c), (22)(d),
(23)(b), (24)(d), (25)(c), (26)(d), (27)(c), (28)(b), (29)(c), (30)(a), (31)(a), (32)(a),
(33)(b), (34)(c), (35)(b), (36)(b), (37)(a), (38)(d), (39)(a), (40)(b), (41)(c), (42)(a),
(43)(d), (44)(e), (45)(b), (46)(a), (47)(d), (48)(a), (49)(c), (50)(b),
121
5 ____________ many different Boolean functions are there of degree 7.
6 The proposition (pΛq) Λ-( pVq) is a ____________.
7 According to Distributive Law pV(qΛr)=________________.
l m
k
j
g
i h
d e f
a b c
2 Determine whether the posets with these Hasse diagrams are lattices.
122
g h
g
f
c d
e
e a
b d
f
b
a
(A) (B)
f h
b d
e
(C)
3 Show that lexicographic order in a partial ordering on the Cartesian products of two
posets.
4 ({1,3,6,9,12},|)
5 ({1,5,25, 125},|)
6 (Z,>)
7 ( P(S ), ) כ, where P(S) is the power set of a set S.
Ans. 4), 5) and 7) are lattices
8 Show that if the poset (S,R) is a lattice then the dual poset (S,R-1) is also a lattice.
9 Is he poset (Z+, |) a lattice?
10 Show that every non empty subset of a lattice has al.u.b& a. g. l. b.
11 Give an example of an infinite lattice with
(a) neither a least nor a greatest element
(b) a least but not a greatest element
123
(c) a greatest but not a least element
(d) both a least & a greatest element
Ans No
17 In Boolean algebra if a+b=1, and a.b=0, show that the complement of every a is unique.
18 Let D105 be the set of all divisors of D105. Draw a Hasse diagram of lattice D105.
19 Show that D20 is not a finite Boolean algebra with the partial order of divisibility.
20 Does the following Hasse diagram represent a lattice? Give reason.
21 The set P ({a,b,c} ) is partially ordered with respect to subset relation. Find a chain of
length 3 in P.
22 Find the solution of the recurrence relation an = 3 an-1 + 1 where a0 = 1.
23 Find the particular solution for the following recurrence relation an – 6an-1 + 9an-2 = 3n.
24 For any positive integer n, let In x 1 x n = . Let the relation “divides” be written as
a b iff a divides b or b = ac for some integer c. Draw the Hasse diagram and determine
whether I;< is a lattice.
25 Prove the following Boolean expression:
124
(x y) (x ~ y) (~ x z) = x z
26 Let L be a lattice then for every a and b in L
a b = b if and only if a<=b
27 Let L, be distributive Lattice, for any any a, b, c L, then show that
a b = a c and a b = a c imply b = c
28 The set P ({a,b,c}) is partially ordered with respect to the subset relation. Find a
chain of length 3 in P.
29 Show that D20 is not a finite Boolean algebra with the partial order of divisibility
30 Find the solution of recurrent relation an = 3an+1 where a0 = 1.
1 Every finite nonempty poset (S,≤) has at least one minimal element.
2 Show that lexicographic order is a partial ordering on the Cartesian products of two
posets.
3 Show that there is exactly one maximal element and minimal element in a poset with a
greatest and least element respectively.
4 Show that the poset(Z, ≤) , ahere x<y if and only if |x|<|y| is a well-founded but no a
totally ordered set.
(A poset (R, ≤) is well-founded if there is no infinite decreasing sequence of elements
in the poset, that is, elements x1, x2, …….. xnsuch that …..<xn<…< x2< x1)
7 Prove Distributive law , De Morgan’s law, Associative law, Commutative law for
lattices.
Ans.
125
8. xz'+y'z'+x'yz
9. y'+x'z
10. x+y'+z
11. xz'+x'y'
12. wyz+wxz'+wx'y'+w'x'y+w'xy'z
13. y'z'+wx'y+x'z'
Use Quine- McCluskey Method to minimize following sum of products expansions (14-
19):
14 xyz' + xy'z' + x'yz + x'y'z'.
15 xy'z + xy'z' + x'yz + x'y'z +x'y'z'.
16 xyz + xyz' + xy'z + xy'z' + x'yz + x'y'z + x'y'z'.
17 xyz' + xy'z' + x'y'z + x'y'z'.
18 wxyz + wxyz' + wxy'z' + wx'yz + wx'y'z + wx'y'z' + w'xy'z + w'x'yz + w'x'yz'
19 wxy'z'+ wx'yz+ wx'yz'+ wx'y'z+ w'xy'z'+ w'x'yz'+ w'x'y'z'.
Ans.
14. xz'+y'z'+x'yz
15. y'+x'z
16. x+y'+z
17. xz'+x'y'
18. wyz+wxz'+wx'y'+w'x'y+w'xy'z
19. y'z'+wx'y+x'z'
20 Consider a game in which two players take turns removing any positive number of
matches they want from one of the two piles of matches. The player who removes the
last match wins the game. Show that if two piles contain the same number of matches
initially, the second player can always guarantee a win.
21 Give a recursive definition of a n , where a is a nonzero real number and n is a
nonnegative integer.
22 Solve the following recurrence relations.
(a) an = an-1 + 3, a1 = 2
(b) pn = a – b pn-1
k
(c) an = 5an-1 – 6an-2
a0 = 7, a1 = 16
-b -ak+p0
k k+b
126
b =1 ,pn oscillated between p0 and p1
k
b>1 , the difference between successive prices increases.
k
23 With out constructing the truth tables, find the principle disjunctive normal forms of the
following statements p7(qr ) V ( p → q) .
24 If R is a relation on the set of integers such that (a,b)ЄR, if and only if 3a+4b=7n for
some integer n, prove that R is an equivalence relation.
25 Determine the number of integer solutions of the equation X1+ X2 +X3 +X4=32, Xi≥0,
1≤i≤4. Ans:6545
26 Prove that D42≡{S42,D}is a complemented lattice by finding the complement of all the
elements, Where S42 is the set of all divisor of the positive integer 42 and D is the
relation of division.
27 In the Boolean Algebra, show that (a+b′ )(b+c′)(c+a′)=(a′ +b)(b′ +c)(c′ +a)
30 Let 𝐿, ≤ be a bounded distributive lattice with 1 and 0 as unit and zero elements of L
respectively. (i) Prove the Demorgan’s Law. (ii) Show that if the complement of an
element in L exists then it is unique.
34 Show that every finite lattice has a least upper bound and a greatest lower bound.
36 Minimize the following sum of product expansion: 𝑥𝑦𝑧̅ + 𝑥𝑦̅𝑧̅ + 𝑥̅ 𝑦̅𝑧 + 𝑥̅ 𝑦̅𝑧̅.
127
38 Solve the difference equation ar – 5ar-1 + 6ar-2 = 2r + r, for r >=2 with the boundary
conditions a0 = 1 and a1 = 1
39 Let L1 be the lattice D6 (divisor of 6) = {1, 2, 3, 6} and let L2 be the lattice (P(S), ⊆)
where S = {a,b}. Show that two lattices are isomorphic.
41 Compute f(n) when n = 2k, where f satisfies the recurrence relation f(n) = 8f(n/2) + n2
with f(1) = 1.
42 Prove that (A, <), where A = {x|0 < x < 1} and is usual partial order of “less than or
equal to” is unbounded lattice. Also show that (A, <) is of finite length.
UNIT - III
128
6 The integers a and b are relatively prime if their greatest common divisor is 2.
7 If A = {1,2,3,4,5,6} then the cycles (1,2,5) and (3,4,6) are disjoint, whereas (1,2,5) and
(2,4,6) are not.
8 Every group of order 6 is cyclic.
9 Every element of the symmetric group S5 can be written as a product of disjoint
transpositions.
10 Every subgroup of an abelian group is normal.
11 For x in a group G, if x 6 = e, then o(x) = 6.
12 Every group of order 13 is cyclic.
13 For a, b ∈ Z, if there exist x, y ∈ Z such that ax + by = 5 then gcd(a, b) = 5.
14 The congruence 11x ≡ 14 mod 35 is solvable. True False NA c. The congruence 15x ≡
6 mod 18 has 3 solutions modulo 18. True False NA d. If ax ≡ 1 mod b has a solution,
then bx ≡ 1 mod a has a solution. True False NA e. For a, b, c ∈ Z, if a|c and b|c, then (a
+ b)|c
Ans. (1)(T), (2)(F), (3)(T), (4)(T), (5)(F), (6)(F), (7)(T), (8)(F), (9)(F), (10)(T), (11)(F),
(12)(T), (13)(F), (14)(F), (15)(T)
2 What group can be written as: (123), (132), (213), (231), (312), (321)?
(a) D6
(b) S3
(c) C3XC3
(d) A6
129
5 We receive the encrypted message 0981 0461. What is the decrypted message if it is
encrypted using RSA cipher from above question?
(a) HPEL
(b) HELP
(c) HLEP
(d) HPLE
9 In the symmetric group S5. How many elements are there in the conjugacy class of the
element (12)(34)?
(a) 60
(b) 15
(c) 24
(d) 30
10 What is the order of the dihedral group D6, the group of symmetries of a regular hexagon?
(a) 360
(b) 720
(c) 6
(d) 12
12 What is the order of the element a5 in the cyclic group of order 11 generated by a?
130
(a) 5
(b) 6
(c) 11
(d) 30
17 Let Z be the group of all integers under the operation of addition. Which of the
following subsets of Z is not a subgroup of Z?
(a) {0}
(b) {nЄZ: n≥0}
(c) {nЄZ: n is an even interger}
(d) {nЄZ: n is divisible by both 6 and 9 ≥0}
(e) Z
18 A cyclic group of order 15 has an element x such that the set {x3, x5, x9} has exactly
two elements. The number of elements in the set {x13n: n is a positive integer} is
(a) 3
(b) 5
(c) 8
(d) 15
(e) Infinite
131
(b) 169
(c) 9
(d) 5
20 What group can be written as: (123), (132), (213), (231), (312), (321)?
(a) D6
(b) S3
(c) C3XC3
(d) A6
132
27 The greatest common divisor of 27 and 72 is
(a) 27
(b) 9
(c) 1
(d) None of these
29 A group of objects can be arranged in 3 rows leaving 2 left, in 5 rows leaving 4 left,
and in 7 rows leaving 6 left. How many objects are there?
(a) 102+103K
(b) 104 + 105 k
(c) 105+104K
(d) None of these
33 In a finite group (G,*), the order of every subgroup (H,*) ………. the order of (G,*)
(a) Subtracts
(b) Adds to the
(c) Divides
(d) Is multiple of
133
(b) 1
(c) -1
(d) All of the above
35 If a group does not have identity element then we call the group as
(a) Uadragropu
(b) Monoid
(c) Commutative
(d) Associate
38 Let (G,.) be group with order n . What will be the possible order of the subgroups
(a) divisors of n
(b) n-1
(c) n/2
(d) all of the above
39 Let L be the least common multiple of 175 and 105. Among all of the common divisors
x>1 of 175 and 105, let D be the smallest. Which is correct of the following:
(a) D = 5 and L = 1050
(b) D = 5 and L = 35
(c) D = 7 and L = 525
(d) D = 5 and L = 525
(e) D = 7 and L = 1050
40 The Euclidean Algorithm is used to produce a sequence X1 > X2 > X3 > X4 > X5 = 0
of positive integers where Xt= qt+1Xt+1 +Xt+2, t = 1, 2, 3. The quotients are q2 = 3,
q3 = 2, and q4 = 2. Which of the following is correct?
(a) gcd(X1,X2) = −2X1 + 6X2
(b) gcd(X1,X2) = −2X1 −6X2
(c) gcd(X1,X2) = −2X1 −7X2
(d) gcd(X1,X2) = 2X1 + 7X2
(e) gcd(X1,X2) = −2X1 + 7X2
134
41 If n is a positive integer, then the remainder when is divided by 7 is
(a) 3
(b) 0
(c) 5
(d) 4
(e) None of these
(a) 13
(b) 16
(c) 15
(d) 14
(e) None of these
(a)
(b)
(c)
(d) None of the above
135
(e) 25 percent
48 Which of the following statements is logically equivalent to the statement, “If a and b
6= 0 are rational numbers and r 6= 0 is an irrational number, then a+br is irrational.”
(a) If a and b 6= 0 are rational and r 6= 0 is real, then a + br is rational only if r is
irrational.
(b) If a and b 6= 0 are rational and r 6= 0 is real, then a + br is irrational only if r is
irrational.
(c) If a and b 6= 0 are rational and r 6= 0 is real, then r is rational only if a + br is
rational.
(d) If a and b 6= 0 are rational and r 6= 0 is real, then a + br is rational only if r is
rational.
(e) If a and b 6= 0 are rational and r 6= 0 is real, then a + br is irrational only if r is
rational.
49 The number of primes of the form |n2 − 6n + 5| where n is an integer is
(a) 0
(b) 1
(c) 2
(d) 3
(e) 4
50 The Euclidean Algorithm is used to produce a sequence X1 > X2 > · · · > Xk−1 > Xk =
0 of positive integers where each Xt, 2 < t ≤ k, is the remainder gotten by dividing Xt−2
by Xt−1. If Xk−1 = 45 then the set of all (positive) common divisors of X1 and X2 is
(a) {1, 3, 5}
(b) {1, 3, 5, 9, 15, }
(c) {1, 9, 15, 45}
(d) {1, 3, 5, 15}
(e) {1, 3, 5, 9, 15, 45}
Ans. (1)(d), (2)(b), (3)(c), (4)(c), (5)(b), (6)(a), (7)(b), (8)(b), (9)(b), (10)(c), (11)(b), (12)(c),
(13) (b), (14)(d), (15)(a), (16)(a), (17)(b), (18)(a), (19)(d), (20)(b), (21)(c), (22)(a),
(23)(c), (24)(b), (25)(a), (26)(a), (27)(b), (28)(a), (29)(b), (30)(a), (31)(c), (32)(b),
(33)(c), (34)(a), (35)(b), (36)(a), (37)(a), (38)(a), (39)(d), (40)(e), (41)(e), (42)(e),
(43)(b), (44)(e), (45)(a), (46)(b), (47)(a), (48)(d), (49)(c), (50)(e).
136
(c) Fill in the Blanks:
Ans. (1)(normal), (2)(unique), (3)(abelian), (4)(normal subgroup), (5)(left coset, left coset),
(6)(x = 31, y = 44)
Let E denote the set {……,-6,-4,-2,0,2,4,6,……} of even integers, let + and _ denote
the usual arithmetic operations of addition and multiplication respectively, and let #
denote the binary operation on E defined by x # y = 1/2xy for all even integers x and y.
1 Is (E; +) a monoid?
2 Is (E;_) a monoid?
3 Is (E; #) a monoid?
[Briefly justify your answers.]
X denote the set {. . . ,−5,−3,−1, 1, 3, 5, . . .} of odd integers, and let # denote the
binary operation on X defined by x # y = 12 (xy − x − y + 3) for all odd integers x and
y.
137
13 Let (G,.) be a group. Prove that (𝑥𝑦)−1 = 𝑦 −1 𝑥 −1 .
14 State Fermat’s Little theorem.
15 Prove or Disprove that AUB is a group, where A and B are groups.
16 Prove that if gcd(a,b) = 1 then gcd (a2 , b2) = 1.
17 Consider (m,3m) encoding function where m = 4. For received word 011010011111, an
error will occur on not.
18 Show that any subgroup of a cyclic group is cyclic.
19 Show that every quotient group of a cyclic group is cyclic.
20 Determine the inverse element in the group (X, *), where binary operator * is defined
as a*b=a+b-1 for a, b € Z.
Ans: x = 4 & y = -1
138
17 Find the code words generated by the encoding function e:B2→B5 with respect to the
parity check matrix
0 1 1
H = 0 1 1
1 0 0
0 1 0
0 0 1
18 State and prove Euclid’s division algorithm.
19 Explain Euclidcan algorithm to find the gcd of two nos by taking example.
20 State and prove Fermat’s Little Theorem.
21 Show that in a subset H is a group (G,*) if a*b-1 is in H for all a,b in H, then H is a
subgroup of G.
22 Let (G,.) be a group. Let (H,.) be a subgroup of (G,.). Show that 𝐺 = 𝐻 ∪ 𝐻𝑎 ∪
𝐻𝑏_________ where 𝑎, 𝑏 ∈ 𝐺.
23 State and prove Lagrange’ theorem for groups.
24 Find the code words generated by the parity-check matrix given below
1 1 1
1 0 1
0 1 1 3 6
1 0 0 When the encoding function is E: B → 𝐵 .
0 1 0
[0 0 1]
25 Show that if a,b are arbitrary elements of a group G, then (ab)2=a2b2 if and only if G is
abelian.
26 Let (G,*) be a group. Let H = {a| a Є G and a*b = b*a for all b Є G }. Show that H is a
normal subgroup.
27 Is 8792002627912 a valid universal code? Explain.
28 Solve 34x = 60 (mod 98)
29 A code G contains 16 codewords: 0000000, 1111111, 1101000 and all its cyclic shifts,
0010111 and all its cyclic shifts. Show that (G ,) is a group code. Set up the coset table
to show that G can correct all single transmissions.
30 Encrypt the word ‘BOOK’ and’PARK’ using caeser cipher system f(p) = p + 3(mod
26).
31 If f is a homomorphism from a commutative semigroup (S, *) onto a semigroup(T, * ),
then show that (T, * ) is also commutative.
32 Let (S, *) be a semigroup. Consider a finite state machine M = (S, S F), where F = fx x
S and fx (y) = x * y for all x, y S Consider the relation R on S, x R y if and only if
there is some z S such that fz (x) = y. Show that R is an equivalence relation.
33 Give an example of cyclic group of finite order. How the concept of a cyclic group is
used in developing error correcting code?
34 If G is a group in which (ab) i = aibi for three consecutive integers i and any a, b in G,
then show that G is an abelian group.
35 Let G be a group. If A is subgroup of G, then G/A is a group.
36 Let (G, .) be a group. Let (H, .) be a subgroup of (G, .). Show that
= 𝐻⋃𝐻𝑎 … . . ⋃𝐻𝑏 , where 𝑎, 𝑏 ∈ 𝐺.
139
37 Let (G,*) be a group. Let H = {a| a Є G and a*b = b*a for all b Є G }. Show that H is a
normal subgroup.
38 Find the code words generated by the parity-check matrix given below
1 1 1
1 0 1
0 1 1
1 0 0
0 1 0
[0 0 1]
When the encoding function is E: B3→ 𝐵 6.
39 Explain Euclidean algorithm to find the g.c.d of two numbers by taking example.
UNIT - IV
Ans. (1)(T), (2)(F), (3)(T), (4)(T), (5)(T), (6)(F), (7)(T), (8)(F), (9)(T), (10)(T), (11)(T),
(12)(F), (13)(F), (14)(F), (15)(T)
140
(c) left -> right -> root
(d) right -> left -> root
3 If a graph can be drawn on a plane such that no two its edges intersect, that graph is
called:
(a) Dual graph
(b) Planer graph
(c) Non-planer graph
(d) None of the above
8 Indicate which, if any, of the following five graphs G = (V,E, Ø), |V | = 5, is not
isomorphic to any of the other four.
(a)
141
(b) which of the following subsets
(c)
(d)
9 Indicate which, if any, of the following five graphs G = (V,E, Ø), |V | = 5, is not
connected.
(a)
(b) .
(c)
(d)
10 Indicate which, if any, of the following five graphs G = (V,E, Ø), |V | = 5,have an
Eulerian circuit.
(a)
(b)
(c)
142
(i) Root B: J, H, K; (ii) H: P, Q, R; (iii) Q: S, T; (iv) K: L, M, N.
The postorder vertex sequence of this tree is
(a) J, P, S, T, Q, R, H, L, M, N, K, B.
(b) P, S, T, J, Q, R, H, L, M, N, K, B.
(c) P, S, T, Q, R, H, L, M, N, K, J, B.
(d) P, S, T, Q, R, J, H, L, M, N, K, B.
15 For which of the following does there exist a graph G = (V,E, Ø) satisfying the
specified conditions?
(a) A tree with 9 vertices and the sum of the degrees of all the vertices is 18.
(b) A graph with 5 components 12 vertices and 7 edges.
(c) A graph with 5 components 30 vertices and 24 edges.
(d) A graph with 9 vertices, 9 edges, and no cycles.
16 For which of the following does there exist a simple graph G = (V,E) satisfying the
specified conditions?
(a) It has 3 components 20 vertices and 16 edges.
(b) It has 6 vertices, 11 edges, and more than one component.
(c) It is connected and has 10 edges 5 vertices and fewer than 6 cycles.
(d) It has 7 vertices, 10 edges, and more than two components.
17 For which of the following does there exist a tree satisfying the specified constraints?
(a) A binary tree with 65 leaves and height 6.
(b) A binary tree with 33 leaves and height 5.
(c) A full binary tree with height 5 and 64 total vertices.
(d) A rooted tree of height 3, every vertex has at most 3 children. There are 40 total
vertices.
18 For which of the following does there exist a tree satisfying the specified constraints?
(a) A full binary tree with 31 leaves, each leaf of height 5.
(b) A rooted tree of height 3 where every vertex has at most 3 children and there are
41 total vertices.
(c) A full binary tree with 11 vertices and height 6.
(d) A binary tree with 2 leaves and height 100.
143
(c) 27
(d) 26
(e) 25
23 In each case the depth-first sequence of an ordered rooted spanning tree for a graph G is
given. Also given are the non-tree edges of G. Which of these spanning trees is a depth-
first spanning tree?
(a) 123242151 and {3, 4}, {1, 4}
(b) 123242151 and {4, 5}, {1, 3}
(c) 123245421 and {2, 5}, {1, 4}
(d) 123245421 and {3, 4}, {1, 4}
24 is
(a)
(b)
(c)
(d)
25 Compute the total number of bicomponents in all of the following three simple
graphs,G = (V,E) with |V | = 5. For each graph the edge sets are as follows:
E = {{1, 2}, {2, 3}, {3, 4}, {4, 5}, {1, 3}, {1, 5}, {3, 5} }
E = {{1, 2}, {2, 3}, {3, 4}, {4, 5}, {1, 3} }
E = {{1, 2}, {2, 3}, {4, 5}, {1, 3}}
(a) 4
(b) 5
(c) 6
(d) 7
144
(e) 8
27 What is the total number of additions and multiplications in the following code?
s := 0
for i := 1 to n
s:= s + i
for j:= 1 to i
s := s + j*i
next j
next i
s := s+10
(a) n
(b) n2
(c) n2 + 2n
(d) (n + 1)2
28 If a graph has any vertex of degree 3 then
(a) It must have Euler circuit
(b) It must have Hamiltonian circuit
(c) It does not have Euler circuit
30 Suppose that a connected planar simple graph has 30 edges. If a plane drawing of this
graph has 20 faces, how many vertices does the graph have?
(a) 12
(b) 13
(c) 14
145
the Euler path is
(a) abcdef
(b) abcf
(c) fdceab
(d) fdeabc
35 A binary Tree T has n leaf nodes. The number of nodes of degree 2 in T is:
(a) log n
(b) n
(c) n-1
(d) n+1
146
(d) 3
37 In an undirected graph the number of nodes with odd degree must be
(a) Zero
(b) Odd
(c) Prime
(d) Even
43 Suppose that a connected planar simple graph has 30 edges. If a plane drawing of this
graph has 20 faces, how many vertices does the graph have?
(a) 12
(b) 13
(c) 14
44 For the given pair of graphs whether it is
147
(a) Isomorphic
(b) Not isomorphic
148
48 Suppose that a connected planar simple graph has 15 edges. If a plane drawing of this
graph has 7 faces, how many vertices does this graph have?
(a) Vertices-edges+faces=2
(b) V - 15 +7=2
(c) V -8 = 2
(d) V =10
Ans. (1)(c), (2)(a), ( 3)(b), (4)(b), (5)(c), (6)(c), (7)(a),(8)(a), (9)(d), (10)(d), (11)(c), (12)(b),
(13)(a), (14)(b), (15)(b), (16)(d), (17)(d), (18)(d), (19)(a), (20)(d), (21)(a), (22)(c),
(23)(c), (24)(c), (25)(c), (26)(d), (27)(d), (28)(c), (29)(a), (30)(a),(31)(c), (32)(d),
(33)(d), (34)(b), (35)(a), (36)(a), (37)(d), (38)(d), (39)(a), (40)(d), (41)(c), (42)(a),
(43)(a), (44)(a), (45)(a), (46)(c), (47)(a), (48)(b), (49)(c), (50)(c),
1 The sum of the degree of the vertices of a graph G is equal to ______________ the
number of __________of G.
2 A finite connect6ed graph is Eulerian if and only if each vertex has_________degree.
3 A graph is said to k- regular if every vertex has degree________.
4 G is a __________________ graph with p vertices and q edges, where p≥3 if q≥3p-6.
149
Ans. (b)Yes (c)No (d)No (e)Yes (f)No (g)Yes
2 Consider the graph (representing the vertices and edges of an octohedron) which
consists of 6 vertices, which we shall label as a, b, c, d, e and f, and the following 12
edges: ab, bc, cd, da, ae, be, ce, de, af, bf, cf, and df.
(a) Write down an incidence and adjacency matrices for this graph, where the
vertices and edges are ordered as they are listed in the above specification (so
that a is the first vertex, b is the second, etc., ab is the first edge, bc is the second
etc.).
(b) Is this graph connected? [Justify your answer.]
(c) Is this graph complete? [Justify your answer.]
(d) Does this graph have an Euler circuit? If not, explain why not? If
so, specify such a circuit?
(e) Give an example of a Hamiltonian circuit in this graph.
(f) Give an example of a spanning tree for this graph.
Answer the following questions concerning the graph with vertices a,b, c, d, e
and f pictured above. [Justify all your answers.]
(a) Is the graph complete?
(b) Is the graph regular?
(c) Is the graph connected?
(d) Does the graph have an Eulerian circuit?
(e) Does the graph have a Hamiltonian circuit?
(f) Give an example of a spanning tree for the graph, specifying the vertices and
edges of the spanning tree.
(g) Given an example of an isomorphism between the graph pictured above and that
pictured below. (You should specify the isomorphism as a function between the
sets fa; b; c; d; e; fg and fu; v;w; x; y; zg of vertices of the two graphs.)
150
Ans. (a)No (b)Yes (c)Yes (d)No (e)Yes
4 Complete graph has n vertices, how many edges does it have? (Justify your answer.)
5 What is chromatic number? Explain with an example.
10 Give an example of a graph which contains aneulerian circuit that is also a Hamiltonian
circuit.
11 Give an example of a graph which contains a Hamiltonian circuit but not a eulerian
circuit.
12 Giving graphical representation discuss seven bridge problem. Was it possible for a
citizen to make a tour of the city and across each bridge exactly twice? Give reasons.
13 Giving graphical representation discuss seven bridge problem. Was it possible for a
citizen to make a tour of the city and across each bridge exactly twice? Give reasons.
14 Are the following graphs is isomorphic? Give reasons.
151
(i) Graph and tree
(ii) Subgraphs and isomorphic graphs
(iii) Connected and complete graph
d e f
23 Show that a disconnected graph has no spanning subtree.
24 A graph G has 21 Edges, 3 vertices of degree 4 and other vertices are of degree Find
the number of vertices in G. Ans:13
25 How many edges are there in an undirected graph with two vertices of degree 7, four
vertices of degree 5, and the remaining four vertices of degree is 6? Ans:29
26 Giving graphical representation discuss seven bridge problem. Was it possible for
a Citizen to make a tour of the City and across each bridge exactly twice? Give
reasons.
152
(e) (f) (g) (h)
2 A graph G is Eulerian if and only if it has at most one nontrivial component and its
vertices all have even degree.
3 Explain Königsberg Bridge problem?
4 Let G be a directed graph (or multigraph) with V vertices and N edges. Then
6 For any connected planar graph G =(V, E), the following formula holds
V -F - E =2
where F stands for the number of faces or regions .
153
7 Show that the component of a graph partition its vertex set.(In other words , show that
every vertex belongs to exactly one component.)
8 Find minimum spanning tree of the following graph using Dijkstra’s algorithm
B 6 D 2 H
3 2 E
6 G
3
3 A
5 4
4
C F
2 5
B G
6 2
E F D
A
2 2 3 3
C
2 H
7 4
154
once and return to a different place than where he started? What if the front door is
closed?
n2
16 Prove that the number of edges in a bipartite graph with n vertices is atmost
2
1 0 0 1
1 1 0 0
i. The incidence matrices of two pairs of graphs are as follows I G = ,
0 1 1 0
0 0 1 1
1 0 0 1
1 1 0 0
IH = .
0 1 1 0
0 0 1 1
155
vii. Define Eulerian graph. Prove that a non empty connected graph is Eulerian if its
vertices are all of even degree.
ix. Explain inorder, preorder, and postorder tree traversals with the help of an example.
32 Let G=(V,E) be an undirected graph with edges then show that 2E =∑ deg(V), V 𝜖 V.
33 Differentiate between
(i) Graph and tree
(ii) Subgraphs and isomorphic graphs
(iii) Connected and complete graph
156
QUESTION BANK
COMPUTER ORGANISATION
MCA 107
157
QUESTION BANK
COMPUTER ORGANISATION - MCA 107
MCA I
UNIT - I
1 x + 0 = x’
2 x + y = x.y
3 OR invert and invert AND are equivalent to NOR
4 When a flip flop is used to temporarily hold data, it is sometimes called latch.
5 The characteristic equation of T flip flop is –
Q (t + 1) = Q (t ) T
6 R2R1 denotes transfer of content of register R2 into R1.
7 The transfer of information from a memory word t2 outside environment is called write.
8 Selective complement operation complements bits in A where there are corresponding
1’s in B.
9 Clear operation compares words in A and B and produces an all 0’s result if two
numbers are unequal.
10 Circular shift circulates the bits of the register around the two ends without loss of
information.
11 AND is a universal Gate.
12 A Karnaugh’s Map is an alternative representation of truth table.
13 All basic Gates can be derived from NAND Gate.
14 All basic gates can be derived from NOR Gate.
15 Karnaughs’ Map helps in simplification of circuits.
16 Negative Logic represents level 1 with higher voltage than used for level 0.
17 Positive logic represents bit 0 with voltage less than that used for representing 1
18 Principle of duality allows us to construct rules involving OR from Rules involving
AND
19 ax+ax’ = a i.e Law of absorption is the basis of solving expression using K map.
20 K-Map becomes too complicated to use beyond five variables.
Ans. (1)( F), (2)(F), (3)(T), (4)(T), (5)(T), (6)(F), (7)(F), (8)(T), (9)(F), (10)(T), (11)(F),
(12)(T), (13)(T), (14)(T), (15)(T), (16)(F), (17)(T), (18)(T), (19)(T), (20)(T)
158
2 Which of the following codes are not reflective codes?
(a) 8421 Code
(b) Excess-3 Codes
(c) 2421 Code
(d) 5211 Code
7 Suppose that a bus has 16 data lines and requires 4 cycles of 250 nsecs each to transfer
data. The bandwidth of this bus would be 2 Megabytes/sec. If the cycle time of the bus
was reduced to 125 nsecs and the number of cycles required for transfer stayed the
same what would the bandwidth of the bus?
(a) 1 Megabyte/sec
(b) 4 Megabytes/sec
(c) 8 Megabytes/sec
(d) 2 Megabytes/sec
8 (2FAOC)16 is equivalent to
(a) (195 084)10
(b) (001011111010 0000 1100)2
(c) Both (a) and (b)
(d) None of these
159
(b) Excess 3-cod
(c) Binary number System
(d) None of these
160
17 Full adder is constructed by using …………….
(a) Two Half Adder& one OR gate
(b) two OR gate &one HA
(c) One HA & two OR gate
(d) One OR gate & one HA
18 ……….Are used for converting one type of number system in to other form.
(a) Encoder
(b) Logic gate
(c) Half adder
(d) FA
23 The decimal number is converted in to excess 3 codes by adding. to each decimal digit.
(a) 4
(b) 8
(c) 2
(d) 3
161
(d) none of these
25 110+110=…………
(a) 2
(b) 0
(c) 1
(d) none of these
30 An X-OR gate produces an output only when it’s two inputs are
(a) high
(b) Low
(c) Different
(d) Same
162
(a) A digital signal
(b) Analog signal
(c) Can be digital or analog signal
(d) Neither digital nor analog signal
38. A typical microcomputer has 65,536 registers in its memory. It will be specified as :
(a) 65,536 memory
(b) 65,536 K memory
(c) 64 K memory
(d) 8 K memory
39. Nibble is :
(a) A string of 4 bits
(b) A string of 8 bits
(c) A string of 16 bits
(d) A string of 64 bits
163
40. The high voltage level of a digital signal in negative logic is :
(a) 1
(b) 0
(c) Either 1 or 0
45. A floating point number that has a 0 in the MBS of mantissa is said to have
(a) Overflow
(a) Underflow
(b) Important Number
(c) Undefined
164
(d) 2K Registers
49. A group of bits that tell the computer to perform a specific operation is known as
(a) Instruction code
(b) Accumulator
(c ) Micro Operation
( d) Register
50. When CPU is executing a Program that is part of the Operating System, it is said to be
in
(a) Interrupt mode
(b) System mode
(c) Half mode
(d) Simplex mode
Ans. (1)(d), (2)(a), (3)(b), (4)(a), (5)(d), (6)(c), (7)(d), (8)(b), (9)(b), (10)(a), (11)(a), (12)(c),
(13)(a), (14)(b), (15)(d), (16)(c), (17)(a), (18)(a), (19)(b), (20)(a), (21)(c), (22)(d),
(23)(d), (24)(d), (25)(d), (26)(a), (27)(a), (28)(b), (29)(a), (30)(c), (31)(b),
(32)(b),(33)(a), (34)(b), (35)(b), (36)(c), (37)(b), (38)(a), (39)(a), (40)(b), (41)(c),
(42)(c), (43)(b), (44)(a), (45)(b), (46)(a), (47)(d), (48)(b), (49)(a), (50)(b)
165
16 ______________ is an example of sequential circuit.
17 Shift registers can be classified into _______________, _____________ and
_______________.
18 A register capable of shifting data both to the right and left is called a ________.
19 A positive edge triggered flip-flop changes state on the ___________ transition of the
clock pulse.
20 A _______________ J-K flip flop uses both the positive and the negative edge of the
clock pulse for data transfer.
166
26 Design a 4 bit incrementer circuit using full adders.
27 Define the term selective set with example.
28 It is stated that both an arithmetic shift left and logical Shift left correspond to
multiplication by 2when there is no overflow and if overflow occurs then arithmetic
and logical shift produce different results. State that these statements are true or false
taking 5 bits 2’s complement No.
29 An output program resides in memory starting from address 2300. It is executed after
the computer recognizes an interrupt. What instruction must be placed at address 1?
30 List the micro-operation tha transfer bit 1-8 of register A to bit 9-16 of register B and
bit 1-8 of register B to bit 9-16 of register A. Draw a block diagram of the hardware
required.
31 Which register keeps track of the instruction stored in program stored in memory?
167
(vi) Does the minimal product of sums expression equal to minimal sum of products
expression?
22 Construct a 5-to-32 line decoder with four 3-to-8 decoders using enable and one 2-to4
line decoder.
23 Design a 4-bit combinational circuit shifter. What is the value of output H in 4-bit
combinational circuit if input A is 1001, S=1, IR=1 and IL=0?
25. Design an arithmetic circuit with one selection variable S and two n-bit data inputs A
and B the circuit generates the following four arithmetic operations in conjunction with
the input carry Cin. Draw the logic diagram for the first two stages.
S Cin=0 Cin=1
1 D=A-1 D=A+B’+1
0 D=A+B D=A+1
UNIT - II
168
14. Stack can be created in memory as well as register.
15. More no of addressing modes add to the flexibility of the program
16. RISC system are preferred over CISC
17. One of the operands must reside in accumulator.
18. Array locations are referenced using indexed addressing mode
19. More number of registers in the CPU slows down the program execution.
20. Data dependency enhances the pipeline speed.
Ans. (1)(F), (2)(F), (3)(T), (4)(T), (5)(T), (6)(F), (7)(T), (8)(T), (9)(T), (10)(T), (11)(F),
(12)(F), (13)(F), (14)(T), (15)(T), (16)(T), (17)(T), (18)(T), (19)(F), (20)(F)
1 Stack is a _______
(a) LIFO
(b) FIFO
(c) LILO
(d) None of the above
6 When CPU is executing a Program that is part of the Operating System, it is said to be
in
(a) Interrupt mode
169
(b) System mode
(c) Half mode
(d) Simplex mode
170
(d) Simplex mode
17 A BSA instruction is
(a) Branch and store instruction
(b) Branch and save instruction
(c) Branch and shift instruction
(d) Branch and second instruction
18 A group of bits that tell the computer to perform a specific operation is known as
(a) Instruction code
(b) Micro-operation
(c) Accumulator
(d) register
19 The load instruction is mostly used to designate a transfer from memory to a processor
register known as
(a) Accumulator
(b) Instruction register
(c) Program counter
(d) Memory address register
20 Content of the program counter is added to the address part of the instruction in order
to obtain the effective address is called
(a) Relative addressing mode
(b) Index addressing mode
(c) Register addressing mode
171
(d) Implied addressing mode
25 After fetching the instruction from the memory, the binary code of the instruction goes
to
(a) Instruction register
(b) Program counter
(c) Accumulator
(d) Instruction pointer
172
28 Zero address instructions are applied in a special memory organization called
(a) Program counter
(b) Instruction decoder
(c) Stack
(d) None of the above
29 While performing the operations the ALU takes data from the temporary storage area
inside the CPU named
(a) Floppy disk
(b) RAM
(c) Registers
(d) CD
173
(c) Indirect
(d) Register
(e.) all of the above
35 Pipeline implement
(a) Fetch instruction
(b) Decode instruction
(c.) fetch operand
(d) Calculate operand
(e) Execute instruction
(f.) all of above
36 Which of the following code is used in present day computing was developed by IBM
corporation?
(a) ASCII
(b) Hollerith Code
(c ) Baudot code
(e) EBCDIC code
37. When a subroutine is called, the address of the instruction following the CALL
instructions stored in/on the
(a) stack pointer
(b) accumulator
(c) program counter
(d) stack
174
[b] In secondary storage
(c) In CPU
(d) In primary memory
42. What can be used to store one or more bits of data, which can accept and/or transfer
information serially?
(a) Register
(b) Flip flop
(c) Counter
(d) None of these
43. Which addressing mode execute its instructions within CPU without the necessity of
reference memory for operands?
(a) Implied Mode
(b) Immediate Mode
(c) Direct Mode
(d) Register Mode
45. . Which register holds the address for a stack whose value is supposed to be directed at
the topmost position?
(a) Stack Pointer
(b) Stack Register
(c). Both a & b
(d). None of the above
46 The instructions based on the stack operations are also known as 'zero address' or
'implied instructions', because _______.
(a) address gets updated automatically in stack pointer
(b ) processor can refer a memory stack without specifying the address
(c) both a & b
(d ) none of the above
47. What is another name of memory stack especially given for the fundamental function
performed by it?
(a ) Last-in-first-out (LIFO)
(b) First-in-last-out (FILO)
(c) First-in-first-out (FIFO)
(d) Last-in-last-out (LILO)
175
48. What does the last instruction of each subroutine that transfer the control to the
instruction in the calling program with temporary address storage , called as?
a. jump to subroutine
b. branch to subroutine
c. return from subroutine
d. call subroutine
Ans. (1)(a), (2)(b), (3)(b), (4)(d), (5)(c), (6)(b), (7)(d), (8)(d), (9)(b), (10)(a), (11)(c), (12)(d),
(13)(b), (14)(c), (15)(c), (16)(a), (17)(b), (18)(a), (19)(a), (20)(a), (21)(b), (22)(a),
(23)(c), (24)(c), (25)(a), (26)(b), (27)(a), (28)(c), (29)(c), (29)(a), (30)(d), (31)(d),
(32)(d), (3)(b), (34)(e), (35)(f), (36)(d), (37)(d), (38)(c), (39)(b), (40)(c), (41)(c),
(42)(d), (43)(d), (44)(a), (45)(a), (46)(c), (47) (a), (48)(c), (49)(a), (50)(a)
1 The control variables at any given time can be represented by a string of 1’s and 0’s
called a _______.
2 A memory that is part of control unit is called _______.
3 The next address generator is called a _______.
4 RISC stands for _______.
5 A _______ is a rule that transforms the instruction code into a control memory address.
6 Stack is a _______ (LIFO/FIFO)
7 _______ and _______ are the two stack operations.
8 The _______ is used to locate the operands needed for the operation.
9 In _______ the operands are specified implicitly in the instruction.
10 In _______, the content of an index register is added to address part of instruction to
obtain effective address.
11 A _______ sub-routine is a sub-routine that calls itself.
12 Privileged instructions can be executed in _______ mode.
13 The three major types of interrupts are _______, _______ and _______.
176
14 ___________ Architecture have a number of instructions typically form 100 to 250
instructions.
15 A ________ is a group of bits that instruct the computer to perform a specific operation.
16 The ________ is defined as the address of operand in instruction or target address.
17 The size of PC is _______ bits.
18 The ________ is the hardware implementation of a branch and save return address
operation.
19 D7 bit is 0 in ____________________________ instructions.
20 ___________ References to memory are required in direct addressing.
1 Differentiate between
(a) Implied Mode and Immediate Mode
(b) Relative addressing and Indexed addressing mode
2 Differentiate between RISC and CISC architecture.
3 Explain the concept of Overlapped Register Windows.
4 What is Instruction Cycle?
5 What are interrupts?
6 What is a Control Word?
7 What are the characteristics of RISC Computers?
8 What are the characteristics of CISC computes?
9 What is the difference between a direct and indirect address instruction?
10 What is micro programmed control?
11 What is hardwired control?
12 Differentiate between Hardwired and micro programmed control
13 What is a stack?
14 What is control memory?
15 Define parallelism in microinstruction.
16 Explain the use of subroutine with the help of suitable example
17 Justify the statement “Stack computer consists of an operation code only with no
address field”.
18 Explain the different types of mapping procedures in the organization of cache memory
with diagram.
19 Explain the difference between vectored and non-vectored interrupt. Explain stating
examples of each.
20 Briefly discuss the steps followed in designing a CPU.
21 A processor has 16 registers, an ALU with 16 logic and arithmetic functions and a
shifter with 8 operations, all connected by an internal processor. Design a micro-
instruction format to specify the various micro operation for the processor.
177
22 The content at the top of a memory stack is 5320. The content of the stack pointer SP is
3560. A two word call subroutine instruction is located in memory at address 1121.
What are the content of PC, SP and the top of the stack before the call instruction is
fetched from the memory.
23 A micro-programmed CPU has 1k words in control memory. Each instruction needs 8
microinstructions. Assuming that opcode is 5 bits, propose a mapping scheme to
generate a control memory address for each opcode.
24 How subroutine call is different from branching.
25 Formulate mapping procedures that provide 8 consecutive microinstructions for each
routine. The opcode has six bits and the control memory has 2048 words.
178
execution of the CLA instruction. Repeat 11 more times starting from each one of the
register reference instruction. The initial value of PC is hexadecimal 021.
19 An instruction is stored at location 300 with its address field at location 301. The
address field has the value 400. A processor register R1 contains the number 200.
Evaluate the effective address if the addressing mode of the instruction is
(i) Direct (ii) Immediate (iii) Relative (iv) Register indirect
(v) Index with R1 as the index register
20 Evaluate the given expression: 9 7 + 5 3 - /
21 Convert the following numerical arithmetic expression in reverse polish notation and
show the stack operations for evaluating the numerical result (3+4) [10 (2+6) + 8].
22 Give the organization of typical hardwired control unit and explain the functions
performed by the various blocks.
23 The content of PC in basic computer is 3AF (all numbers are in hexadecimal). The
content of AC is 7EC3. The content of memory at address 3AF is 932E. the content of
memory address 32E is 09AC. The content of memory at address 9AC is 8B9F.
(a) What is the instruction that will be fetched and executed next?
(b) Show the binary operation that will be performed in the AC when the
instruction is executed?
(c) Give the contents of registers PC, AR, DR, AC, and IR in hexadecimal and the
values of E, I, and the sequence counter SC in binary at the end of instruction
cycle.
24 With a neat block diagram, explain in detail about micro programmed control unit and
explain its operations.
25 An instruction at address 021 in the basic computer has I=0, and operation code of
AND instruction and an address part equal to 083(all numbers are in hexadecimal). The
memory word at address 083 contains the operand B8F2 and the content of AC is
A937. Go over the instruction cycle and determine the contents of the following
registers at the end of the execute phase: PC, AR, DR, AC, and IR. Repeat the problem
six more times starting with an operation code of another memory reference instruction.
26 A digital computer has a memory unit with 24 bits per word. The instruction set
consists of 190 different operations. Each instruction is stored in one word of memory
and consists of an op-code part and address part.
(i) How many bits are needed for operation code?
(ii) How many bits are left for the address part of an instruction?
(iii) How many words can be accommodated in the memory unit?
28 Design a common bus system for basic computer with 8 registers PC, AR, IR, TR, DR,
AC, OUTR, INPR and memory capacity of 4096 words and each word contain 16 bits
,input and output operations are performed using 8 bits.
29 Design micro program sequencer for a control memory.
30 Describe Timing and Control Unit.
179
UNIT - III
1 The interface registers communicate with the CPU through unidirectional data bus.
2 The two register selected inputs RSI and RSO are connected to two most significant
lines of address bus.
3 The strobe control method of asynchronous data transfer employs a single control line
to time each transfer.
4 The transfer of data between two units may be done in parallel or serial.
5 Serial transmission is always synchronous.
6 The operation of asynchronous communication interface is initialized by the CPU by
sending a byte to the control register.
7 A first in first out (FIFO) buffer is memory unit that stores information in such a
manner the item last in is the item first out.
8 Programmed I/O operations are the results of I/O instructions written in the computer
program.
9 A polling procedure is used to identify the highest priority source by software means.
10 The transfer of data between a fast storage device and memory is enhanced by the
speed of CPU.
11 Parallel processing is established by distributing data among multiple functional units.
12 The sequence of instruction read from memory constitutes an instruction stream.
13 MIMD represents an organization that includes many processing units under the
supervision of common control unit.
14 Flynn’s classification depends on distinction between the performance of control unit
and data processing unit.
15 Pipelining is a process of decomposing process into sub-operations with each sub-
process being executed in a special dedicated segment.
16 Long range weather forecasting makes use of vector processing.
17 A commercial computer with vector instructions and pipelined floating point arithmetic
operations is referred to as a PDA.
18 SIMD array processor is a computer with single processing unit operating in parallel.
19 NAND operation is used to selectively complement bits of an operand.
20 Arithmetic shifts conform to the rules of signed 2’s complement numbers.
Ans. (1)(F), (2)(F), (3)(T), (4)(T), (5)(F), (6)(T), (7)(F), (8)(T), (9)(T), (10)(F), (11)(T),
(12)(T), (13)(F), (14)(T), (15)(T), (16)(T), (17)(F), (18)(F), (19)(F), (20)(T)
180
(d) Addition
2 Hard disk is a:
(a) Magnetic Device
(b) Mechanical Device
(c) Optical Device
(d) Magneto-Optical Device
6 In a vectored interrupt
(a) The branch address is assigned to a fixed location in memory.
(b) The interrupting source supplies the branch information to the processor
through an interrupt vector.
(c) The branch address is obtained from a register in the processor
(d) None of the above
7 The communication between the components in a microcomputer takes place via the
address and
(a) I/O bus
(b) Data bus
(c) Interface
(d) Control lines
8 An interface that provides I/O transfer of data directly to and from the memory
peripheral is termed as
(a) Transfer interface
(b) Serial interface
(c) Bus request interface
(d) Direct memory access(DMA)
181
9 An interface that provides a method for transferring binary information between
internal storage and external devices is called
(a) I/O interface
(b) I/O bus
(c) Input interface
(d) Output interface
12 DMA interface unit eliminates the need to use CPU registers to transfer data from
(a) MAR to MBR
(b) MBR to MAR
(c) I/O units to memory
(d) Memory to I/O units
14 A control character is sent at the beginning as well as at the end of each block in the
synchronous transmission, in order to
(a) Synchronize the clock of transmitter and receiver
(b) Supply information needed to separate the incoming bits into individual
character
(c) Detect the error in transmission and received sysytem
(d) None of the above
182
16 During DMA acknowledgement cycle, CPU relinquishes
(a) Address bus only
(b) Address bus and control bus
(c) Control bus and data bus
(d) Data bus and address bus
19 The fetch and execution cycles are interleaved with the help of ________.
(a) Modification in processor architecture
(b) Clock
(c) Special unit
(d) Control unit
22 If a unit completes its task before the allotted time period, then
(a) It’ll perform some other task in the remaining time
(b) Its time gets reallocated to different task
(c) It’ll remain idle for the remaining time
(d) None of the mentioned
183
(d) Buffers
26 The situation where in the data of operands are not available is called ______.
(a) Data hazard
(b) Stock
(c) Deadlock
(d) Structural hazard
27 In case of only one memory operand, when a second operand is needed, as in the case
of an Add instruction, we use processor register called.........
(a) accumulator
(b) register
(c) operand
(d) source
28 Data transfer between the main memory and the CPU register takes place through two
registers namely.......
(a) General purpose register and MDR
(b) Accumulator and program counter
(c) MAR and MDR
(d) MAR and Accumulator
30 The instruction that cause transfer of data from one location to another without
changing the binary information content are ...
(a) Data transfer instruction
(b) Data manipulation instruction
(c) Register transfer instruction
184
(d) Program control instruction
33. The fetch and execution cycles are interleaved with the help of ________.
(a) Modification in processor architecture
(b) Clock
(c) Special unit
(d) Control unit
35. In pipelining the task which requires the least time is performed first.
(a) True
(b) False
36. If a unit completes its task before the allotted time period, then
(a) It’ll perform some other task in the remaining time
(b) Its time gets reallocated to different task
(c) It’ll remain idle for the remaining time
(d) None of the mentioned
37. To increase the speed of memory access in pipelining, we make use of _______.
(a) Special memory locations
(b) Special purpose registers
(c) Cache
(d) Buffers
38. The periods of time when the unit is idle is called as _____.
(a) Stalls
(b) Bubbles
(c) Hazards
185
(d) Both a and b
39. The contention for the usage of a hardware device is called as ______.
(a) Structural hazard
(b) Stalk
(c) Deadlock
(d) none of the mentioned
40. The situation where in the data of operands are not available is called ______.
(a) Data hazard
(b) Stock
(c) Deadlock
(d) Structural hazard
41. Which interface allows the cardinal provision of communicating with one particular
input-output device in addition to the programming capability for operating with
specific device?
(a) Parallel Peripheral Interface
(b) Serial Communication Interface
(c) Special Dedicated Interface
(d) Direct Memory Access Interface
42. Which lines are supposed to control or handle the transfer operation between two
devices in asynchronous mode by apprising the status of transfer using common bus ?
(a) Control Lines
(b) Data Lines
(c) Transfer Lines
(d) Handshake Lines
43 What registers are significantly incremented and decremented respectively for the
transmission of each byte by Direct Memory Access (DMA) ?
(a) Address Register & Byte Count Register
(b) Control Register & Byte Count Register
(c) Transmitter Register & Byte Count Register
(d) Status- Register & Byte Count Register
44. Which instruction indicates the transfer of program sequence to the address specified
by 16 bit value if Z flag =0 ?
(a) CZ Address
(b) CNZ Address
(c) CPE Address
(d) CPO Address
45 Which instruction is used to set the interrupt by maintaining the serial output bit in set
mode of operation?
(a) SIM
186
(b) STC
(c) SBI Data
(d) SUI Data
46. Which instruction set performs the dual operation of reading the status of interrupts as
well as serial input data bit ?
(a) RNZ
(b) RZ
(c) RPO
(d) RIM
47. Which type of branch instructions jump to a novel location from the continuation of
previous program upon its execution?
(a) Data Transfer Instructions
(b) Logic Instructions
(c) Bit-oriented Instructions
(d) Un - conditional Instructions
48. Which bit of micro-controller handles or controls the relationship between clock and
data in serial mode of operation in coordination with CPOL ?
(a) CPHA
(b) DORD
(c) MSTR
(d) SPE
49 . Which phenomenon occurs when WCOL bit operates in normal mode if the SPDR
register writes in premature form without affecting the operation during data transfer?
(a) Read Collision
(b) Bit Collision
(c) Write Collision
(d) Data Collision
Ans. (1)(a), (2)(a), (3)(d), (4)(c), (5)(c), (6)(b), (7)(b), (8)(d), (9)(a), (10)(b), (11)(c), (12)(d),
(13)(d), (14)(b), (15)(c), (16)(d), 17)(b), (18)(a), (19)(a), (20)(a), (21)(d), (22)(a),
(23)(c), (24)(c), (25)(a), (26)(b), (27)(d), (28)(c), (29)(c), (29)(b), (30)(a), (31)(c),
(32)(b), (33)(b), (34)(d), (35)(b), (36)(c), (37)(c), (38)(d), (39)(a), (40)(a), (41)(c),
(42)(d), (43)(a), (44)(b), (45)(a), (46)(d), (47)(d), (48)(a), (49)(c), (50)(d)
187
2 Three basic types of character printers are ________, ________ and ________.
3 ASCII stands for ________.
4 A ________ is issued to activate the peripheral and to inform it what to do.
5 A ________ is used to test various status conditions in the interface and the peripheral.
6 A ________ causes the interface to respond by transferring data from the bus into one
of its registers.
7 The ________ causes the interface to receive an item of data from peripheral and places
it in its buffer register.
8 There are ________ ways that computer buses can be used to communicate with
memory and I/O.
9 The isolated I/O method isolates ________ and ________.
10 In ________, the CPU has distinct i/p and o/p instruction and each of these instructions
is associated with address of an interface register.
Ans. (1)( peripherals), (2)( daisy wheel, dot matrix and laser), (3)( American Standard Code
for Information Interchange), (4)( control command), (5)( status command), (6)( data
output command), (7)( data input command), (8)( three), (9)( memory and I/O
addresses), (10)( Isolated I/O).
188
26 How does a processor handle an interrupt?
27 Distinguish synchronous bus and asynchronous bus.
28 Why I/O devices cannot be directly be connected to the system bus?
29 What is bus arbitration?
30 What is port? What are the types of port available?
31 What is a parallel port?
32 What is a serial port?
33 What is PCI bus?
34 What do you understand by parallel processing?
35 What is Flynn’s classification of parallel processing?
36 What do you understand by vector processing?
37 What is pipelining?
38 What is the difference between serial and parallel processing?
39 What is the role of cache memory in pipeline?
40 What is a pipeline hazard?
41 What is data hazard?
42 What is instruction or control hazard?
43 What do you mean by delayed branching?
44 What is branch folding?
45 What do you mean by branch penalty?
189
17 Explain the instruction cycle highlighting the sub-cycles and sequence of steps to be
followed. Also Illustrate memory read and writes operation.
18 What is the importance of I/O interface? Compare the features of SCSI and PCI
Interfaces.
19 Explain the use of vectored interrupts in processes. Why is priority handling desired in
interrupt controllers? How does the different priority scheme work?
20 Explain the following:
(a) Bus arbitration
(b) Printer process communication
(c) USB
(d) DMA
21 Why is read and write control lines in a DMA controller bidirectional? Under what
condition and for what purpose are they used as inputs?
22 Write short notes on any two.
(i) Instruction pipeline.
ii) DMA based data transfer.
21 Shift operation of data in a register.
22 Explain various possible hardware schemes that can be used in an instruction pipeline
in order to minimize the performance degradation caused by instruction branching.
23 Discuss DMA transfer in a computer system using block diagram in detail.
24 Design parallel priority Interrupt with 8 devices.
25 A commercial interface unit uses different manes for handshake lines associated with
the transfer of data from I/O devices into interface output handshake line is labeled IBF
(input buffer full). A low-level signal on STB loads data from the I/O bus into the
interface data register. A high level signal on IBF indicates that the data item has been
accepted by the interface. IBF goes low after an I/O read signal from the CPU when it
reads the content of the data register.
UNIT - IV
I Test Your Skills:
1 The fastest and most flexible cache organization uses an associative memory.
2 Associative memories are cheaper as compared to random-access-memories.
3 In direct mapping organization, each word of cache can store two or more words of
memory under some index address.
4 When a CPU finds a word in cache during a read operation, the main memory is not
involved in transfer.
5 In write back method, only the cache location is updated during a write operation.
6 An address space issued by a programmer is called physical address space.
7 When a page fault occurs in a virtual memory system, it signifies that the page
referenced by the CPU is not in main memory.
190
8 A multi processor system with common shared memory is called loosely couple
system.
9 The time slice algorithm allocates a fixed length time slice of bus time that is offered
sequentially to each processor in round robin fashion.
10 The LRU algorithm gives the least priority to the requesting device that has not used
the bus for the longest interval.
11. Associative and content addressable memory are same.
12. L1,L2 are cache memory
13. Cache Memory are based on the concept of locality of reference.
14. ROM is also RAM.
15 TRAP is software Interrupt
16. Daisy chaining has advantage of parallel priority interrupt
17. Using DMA CPU can be freed for other task while I/O is transferring data to memory
18. Registers are faster than Cache
19. Cache coherence is a major issue in cache memory
20. CAM is used for searching
Ans. (1)(T), (2)(F), (3)(T), (4)(T), (5)(T), (6)(F), (7)(T), (8)(F), (9)(T), (10)(F), (11)(t),
(12)(T), (13)(T), (14)(T), (15)(T), (16)(F), (17)(T), (18)(T), (19)(T), (20)(T)
2 ROM is:
(a) Non-Volatile
(b) Random Access Device
(c) Programmable
(d) All of the above
191
5 Page fault occur when:
(a) Page is corrupted by application software
(b) Page is in memory
(c) Page is not in memory
(d) Divide by 0
192
(a) Because 8085 processor has 8 bit ALU.
(b) Because 8085 processor has 8 bit data bus.
(c) Both (a) and (b).
15 What is SIM?
(a) Select Interrupt Mask
(b) Sorting Interrupt Mask
(c) Set Interrupt Mask.
193
(b) Signed numbers go out of their range after an arithmetic operation
(c) Carry and sign flags are set
(d) During subtraction
24 The advantage of memory mapped I/O over I/O mapped I/O is,
(a) Faster
(b) Many instructions supporting memory mapped I/O
(c) Require a bigger address decoder
(d) All the above
26 In 8086 microprocessor the following has the highest priority among all type interrupts.
(a) NMI
(b) DIV 0
(c) TYPE 255
(d) OVER FLOW
30 The set of control lines for both input and output in a microprocessor are known as:-
(a) Address Bus
(b) Data Bus
(c) Control Bus
(d) Switches
194
31. The smallest entity of memory is called as _______ .
(a) Cell
(b) Block
(c) Instance
(d) Unit
32. The collection of the above mentioned entities where data is stored is called as ______ .
(a) Block
(b) Set
(c) Word
(d) Byte
34. If a system is 64 bit machine , then the length of each word will be ____ .
(a) 4 bytes
(b) 8 bytes
(c) 16 bytes
(d) 12 bytes
36. When using the Big Endian assignment to store a number, the sign bit of the number is
stored in _____.
(a) The higher order byte of the word
(b) The lower order byte of the word
(c) Can’t say
(d) None of the above
37. To get the physical address from the logical address generated by CPU we use ____.
(a) MAR
(b) MMU
(c) Overlays
(d) TLB
38. _____ method is used to map logical addresses of variable length onto
physical memory.
(a) Paging
195
(b) Overlays
(c) Segmentation
(d) Paging with segmentation
39. During transfer of data between the processor and memory we use ______ .
(a) Cache
(b) TLB
(c) Buffers
(d) Registers
40. Physical memory is divided into sets of finite size called as ______ .
(a) Frames
(b) Pages
(c) Blocks
(d) Vectors
41. Which parameter/s is/ are of relevant importance regarding the time interval of memory
cycle specified by the microprocessor?
(a) internal clock frequency and access time
(b) external clock frequency and access time
(c) internal as well as external clock frequencies
(d) only access time
42. Which form of special control unit enables the memory to adjust or set its own timing
of memory cycle in the microprocessors?
(a) set
(b) reset
(c) ready
(d) enable
43. Which among the below stated operating condition implies that the contents of register
C get deliver to a memory byte at the definite address specified by AR ?
(a) M [AR] → C
(b) M [AR] ← C
(c) AR → M[C]
(d) AR ← M[C]
44. Which add instruction/s occupy the three memory bytes in accordance to the various
length format acquired at the stage of microprocessor sequencing?
(a) Add B to A
(b) Add immediate operand to A
(c) Add operand specified by an address to A
(d) All of the above
45. Which data-bus has a proficiency of reducing the number of accesses to memory in
response to the speed related shortcomings displayed by 8-bit microprocessor?
(a) 8 - bit data bus
196
(b) 16 - bit data bus
(c) 24 - bit data bus
(d) 32 - bit data bus
46. How many memory cycles should the microprocessor undergo for an execution of
instructions, especially the instruction include the address of the operand?
(a) 2 memory cycles
(b) 4 memory cycles
(c) 8 memory cycles
(d) any number depending upon the number of operands in the instruction
47. Which category of microprocessor instructions detect the status conditions in registers
and accordingly exhibit the variations in program sequence on the basis of detected
results?
(a) Transfer Instructions
(b) Operation Instructions
(c) Control Instructions
(d) All of the above
48. The push and pop instructions belonging to the category of transfer instructions of
microprocessor perform data transformation between _______.
(a) two registers
(b) processor register and memory stack
(c) processor register and interface register
(d) interface register and memory word
Ans. (1)(b), (2)(d), (3)(d), (4)(a), (5)(c), (6)(c), (7)(c), (8)(c), (9)(b), (10)(b), (11)(b), (12)(a),
(13)(b), (14)(a), (15)(c), (16)(b), (17)(b), (18)(a), (19)(c), (20)(b), (21)(c), (22)(c),
(23)(b), (24)(d), (25)(b), (26)(a), (27)(b), (28)(a), (29)(b), (30)(d) (31)(a), (32)(c),
(33)(b), (34)(e), (35)(f), (36)(d), (37)(d), (38)(c), (39)(d), (40)(a)(41)(a)(42)c)(43)(b),
(44)(c), (45)(b), (46)(b), (47)(c), (48)b), (49)(c), (50)(a)
197
(c) Fill in the Blanks:
1 The memory unit that communicates directly with the CPU is called ________.
2 Devices that provide backup storage are called ________.
3 A special very high speed memory used to increase the speed of processing is called
________.
4 Block size in auxiliary memory ranges from ________ words.
5 Cache block size ranges from ________ words.
6 The existence of two or more programs in different parts of memory at the same time is
________.
7 RAM chips are available in two operating modes ________ and ________.
8 ROM stands for ________.
9 The initial program to start the computer is stored in ________.
10 The most common auxiliary memory devices used in computer systems are ________
and ________.
11 A memory unit accessed by content is called ________.
12 In associative memory, the ________ register provides a mask for choosing a
particular field in argument word.
13 References to memory at any given interval of time tend to be confined within few
localized areas in memory. This concept is known as ________.
14 The performance of cache memory is frequently measured in terms of quantity called
________.
15 Three types of mapping with reference to the cache organization are ________,
________ and ________.
Ans. (1)(main memory), (2)(auxiliary memory), (3)(cache memory), (4)(256 to 2048), (5)(1
to 16), (6)(multiprogramming), (7)(static and dynamic), (8)(Read Only Memory),
(9)(bootstrap loader), (10)(magnetic disks and tapes), (11)(content addressable
memory), (12)(key), (13)(locality of reference), (14)(hit ratio), (15) (associative, direct
and set associative)
1 Why is the Cache memory used between central processing unit and main memory?
2 What is CAM?
3 What is meant by cache coherence?
4 Write short notes on:
(a) Cache memory
(b) Virtual memory
5 What do you understand by RAM?
6 What is ROM?
7 What is a bootstrap loader?
8 Differentiate between static RAM and dynamic RAM.
9 What are Magnetic disks?
10 What are Magnetic tapes?
198
11 What is Auxiliary Memory?
12 What is locality of reference?
13 What is hit ratio?
14 How does cache is initialized?
15 Differentiate between address space and memory space.
16 Define Memory Access time for a computer system with two levels of caches.
17 Define memory cycle time.
18 What are the enhancements used in the memory management?
19 What is RAID?
20 Define data stripping?
21 How the data is organized in the disk?
22 Define latency time.
23 What is the significance of TLB?
24 What is Memory management hardware?
25 Differentiate between ROM, PROM and EPROM.
26. Explain the different types of mapping procedures in the organization of cache
memory with diagram.
27 Explain the difference between vectored and non-vectored interrupt. Explain stating
examples of each.
28 Differentiate between virtual and cache memory.
29 Discuss the different ways in which ROM can be programmed.
30 What is the significance of initializing cache? How is it done?
31 Differentiate between the terms external, internal and software interrupts.
32 A two-way set associative cache memory uses blocks of 4 words. The cache can
accommodate a total of 2048 words from main memory. The main memory size is 128k
32. what are the sizes of :-
(i) TAG (ii) Index (iii) Data (iv) Cache memory ?
199
(b) How many bits are there in each word of cache and how are they divided in
functions?
(c) How many blocks can the cache accommodate?
13 A two-way set associative cache memory uses blocks of four words. The cache can
accommodate a total of 2048 words from main memory. The main memory size is
128K X 32.
(a) Formulate all pertinent information required to construct the cache
memory.
(b) What is the size of the cache memory?
14 What is the transfer rate of an eight-track magnetic tape whose speed is 120 inches per
second and whose density is 1600 bits per inch?
15 Discuss the various mapping techniques used in cache memories.
16 A computer system has a main memory consisting of 16 M words. It also has a
32Kword cache organized in the block-set-associative manner, with 4 blocks per set
and 128 words per block.
(a) Calculate the number of bits in each of the TAG, SET and WORD fields of the
main memory address format
(b) How will the main memory address look like for a fully associative mapped
cache?
17 Give the structure of semiconductor RAM memories. Explain the read and write
operations in detail
18 Explain the organization of magnetic disks in detail.
19 Write a short note on PCI.
20 A digital computer has a memory unit of 64K*16 and a cache memory of 1K words.
The cache uses direct mapping with a block size of four words. How many bits are
there in the tag, index, block and word fields of the address format? How many blocks
can the caches accommodate?
21 A virtual memory system has an address space of 8K words, a memory space of 4K
words, and page and block sizes of 1K words. The following page reference changes
occur during a given interval.
4 2 0 1 2 6 1 4 0 1 0 2 3 5 7
(a) Determine the pages that are resident in main memory after each page reference
change if the replacement algorithm used is (i) FIFO (ii) LRU
(b) Also find the number of page faults in each case.
200
24 What do you understand by physical and logical address space? Explain the concept of
virtual memory mapping.
25 What are multiprocessors? What are its characteristics? Explain MIMD systems.
26 Discuss different interconnection structure of microprocessor
27 What do you mean by Cache memory? Explain in detail mapping procedures used
while considering organization of Cache memory.
28 Consider the 20 bit logical address. The 4-bit segment number can specify one of 16
possible segments. The 8-bit word field implies a page size of 256 words and the 8 bit
word field implies a page size of 256 words.
201
QUESTION BANK
MCA 109
202
QUESTION BANK
PRINCIPLES AND PRACTICES OF MANAGEMENT - MCA 109
MCA I
UNIT - I
Ans. (1)(F), (2)(T), (3)(T), (4)(T), (5)(F), (6)(T), (7)(T), (8)(T), (9)(T), (10)(T), (11)(F),
(12)(F), (13)(T), (14)(F), (15)(F)
1 Which of the following pairs of the administrative thinkers have described the scientific
management as the psychological organization theory?
(a) Simon and Argyris
(b) Simon and Likert
(c) March Barnard
(d) March and Simon
203
3 Human Relations theory does not lay emphasis on
(a) Principles
(b) People
(c) Human Motivation
(d) Informal group functions
10 In addition to Place, Labor and Money which other internal environment Factor
influences Management?
(a) Technology
(b) Machines
204
(c) Scientists
(d) Professionals
11 The following four different approaches to management thinking were developed in the
first half of the 20th century:
(a) Scientific management, general administrative, quantitative, and contingency
approach.
(b) Scientific management, general administrative, quantitative, and organizational
behavior.
(c) General administrative, globalization, organizational behavior, and quantitative.
(d) Systems approach, scientific management, general administrative, and
organizational behaviour.
(e) Scientific management, Hawthorne Studies, quantitative, and organizational
behaviour.
12 When we classify managers according to their level in the organization they are
described as_______.
(a) Functional, staff and line managers
(b) Top managers, middle managers and supervisors
(c) High level and lower level managers
(d) General managers and administrative managers
13 Frederick Taylor and Frank and Lillian Gilbreth were advocates of an approach to
management involving the use of scientific method, known as:
(a) The quantitative approach.
(b) Management science.
(c) Scientific management.
(d) The contingency approach.
15 Some of the other fields of study that affect management theory or practice include:
(a) Political science, philosophy, anthropology and sociology
(b) Zoology, psychology, sociology and philosophy.
(c) Anthropology, astrology, political science and psychology.
(d) Political science, sociology, typography and economics.
205
(d) W. Edwards Deming
18 Division of labor, authority hierarchy, formal selection, formal rules and regulations,
impersonality, and career orientation are all features of:
(a) Weber's ideal type bureaucracy.
(b) General administrative theory.
(c) Fayol's principles of management.
(d) Taylor's principles of management.
21 Which one of the following is NOT the main concern of ‘Scientific Management’?
(a) Production
(b) Efficiency
(c) Mechanistic Methods
(d) Rationality
22 Which one of the following concepts are not associated with Scientific Management?
(a) Mental Revolution
(b) Unity of Command
(c) Time and Motion Study
206
(d) Differential Piece rate plan
25 ___________ roles involve people and other duties that are ceremonial and symbolic in
nature.
(a) Informational.
(b) Interpersonal.
(c) Decisional.
(d) All of the given options
207
(d) none of the given
32 Acknowledging mail, doing external board work, performing other activities that
involve outsiders all are examples of
(a) figurehead
(b) leader
(c) Liaison
(d) None of the given
33 Seeks and receives wide variety of internal and external information to develop
thorough understanding of organization and environment is a function of
(a) Monitor
(b) Disseminator
(c) Spokesperson
(d) None of the given
35 If a manager gives information regarding organization policies and actions then he/she
is performing an ______ role.
(a) Interpersonal
(b) Informational
(c) Decisional
(d) None of the given
208
d. Integration
39 Which of the following functions or activities requires recruiting and placing qualified
personnel needed for the organization so that it may achieve its objectives and goals?
(a) Planning
(b) Staffing
(c) Organizing
(d) Controlling
40 Who studied the nature of specific jobs, and broke the tasks into basic work units with
the end result providing the one right way to perform the job?
(a) Douglas M. McGregor
(b) Frederick W. Taylor
(c) Henry L. Gantt
(d) Henry L. Gantt
41 In the past three to four decades, many management theorists, and writers have made
remarkable contribution in the study of management. By studying the various
approaches to management analysis, we can understand the concept of management
and have a better understanding of managerial functions. Which approach to
management emphasizes managing people by understanding their individual
psychological needs?
(a) Empirical Approach
(b) Decision Theory Approach
(c) Management Science Approach
(d) Interpersonal Behavior Approach
(e) Contingency Approach.
42. The communication process is made up of various components. Which of the following
is the actual physical product from the source?
(a) Feedback
(b) Filter
(c) Message
(d) Channel
209
(e) Understanding
43. Which of the following would not be an accurate depiction of the differences between
strategic and tactical planning?
(a) Strategic planning is developed mainly by upper-level management and
tactical planning is generally developed by lower-level management
(b) Facts for strategic planning are generally easier to gather than facts for
tactical planning
(c) Strategic plans generally contain less detail than tactical plans
(d) Strategic plans generally cover a longer period of time than tactical plans
(e) Managers who are engaged in the development of strategic plans tend to work
in more uncertainty than those managers engaged in the development of
tactical plans.
45. The conflict-resolution approach that corresponds with a high level of assertiveness and
a low level of cooperativeness, is referred to as
(a) Compromising
(b) Collaborating
(c) Forcing
(d) Avoiding
(e) Accommodating.
46. Mr. Sunil works for “Energy Engineering Works.” Apart from the regular
compensation, the company provides him with things such as tuition reimbursement,
recreational opportunities etc. What is the name given to these things of value?
(a) Incentives
(b) Benefits
(c) Rewards
(d) Compensation
(e) Social benefits.
47. The fact that 70-80 percent of a manager’s time is taken up by his interactions with
others, highlights the need for effective communication for successful management.
Which of the following strategies is not likely to improve communication effectiveness?
(a) Avoiding non-verbal cues
(b) Using simple, unambiguous language
(c) Using active listening techniques
(d) Using appropriate and consistent nonverbal cues
(e) Using the feedback loop in the communication process.
210
48. Two factor theory of motivation provides useful insights into the relationship between
individual and situational or hygiene factors. Which of the following is a hygiene factor?
(a) Achievement
(b) Interpersonal relations
(c) Recognition
(d) Challenging work
(e) Increased responsibility.
Ans. (1)(d), (2)(c), (3)(a), (4)(d), (5)(d), (6)(c), (7)(c), (8)(d), (9)(c), (10)(b), (11)(b), (12)(b),
(13)(c), (14)(d), (15)(a), (16)(d), (17)(b), (18)(a), (19)(a), (20)(b), (21)(d), (22)(b), (23)(a),
(24)(c), (25)(b), (26)(c), (27)(b), (28)(c), (29)(b), (30)(a), (31)(b), (32)(c), (33)(a), (34)(c),
(35)(b), (36)(d), (37)(c), (38)(a), (39)(b), (40)(b), (41)(d), (42)(c), (43)(b), (44)(e), (45)(c),
(46)(b), (47)(a), (48)(b), (49)(d), (50)(c)
211
5. The ________ principle, which is the inherent process in organization through which
authority, the antecedent coordinative principle, permeates the entire organized
structure.
1 Management Vs Administration.
2 Conceptual skills and Technical skills
3 Unity of command Vs Unity of direction
4 Contingency Approach Vs Systems approach
5 Interpersonal and Informational role of manager.
6 Delegation of authority & Responsibility
212
III Long Answer Type Questions:
213
(b) Management as a Profession.
22 What do you mean by ‘Levels of Management’? Briefly describe the different levels of
management.
23 Discuss Henry Mintzberg’s classification of basic roles performed by Managers in
Modern Organizations.
24 Write an explanatory note on the skills required by managers.
25 What functions and duties are associated with top & middle management in modern
industrial unit? Explain briefly.
26 Who is a manager? What are the qualities of a successful manager?
27. “The job of a supervisor is more difficult than that of higher level managers”. Explain
what are major functions of supervisor?
28. What do you mean by multiple chief executive system? Discuss various functions
performed by chief executives.
29. Assess contributions of Barnard and Simon to the management thought.
30. Management is the effective utilization of human and material resources to achieve the
enterprise objectives.” Discuss.
31 What do you understand by scientific approach to management? Describe the salient
features of Taylor’s scheme of scientific management and discuss their validity today.
32 “The emerging trend of separation of management from ownership and increasing
professionalization of management has led to a debate as to whether or not
management is a profession.” Discuss.
33 “A good manager does not wait for things to happen, he makes them happen.”
Comment.
34 “Managers are not born.” Elucidate.
35 Narayan Murthy of Infosys Technology is regarded as one of the best managers in
India. Name the characteristics and behaviours that made Murthy so admired.
36 “A manager has many roles to play. Each of these roles demands a variety of skills”.
Discuss.
37 Why does technical skill become less important as a person rises in organizational
hierarchy?
38 “The most useful method of classifying managerial functions is to group them around
planning, organising, staffing, directing and controlling.” Comment.
39 “Management is a complex functional concept of which the main elements are:
Planning, Organising, Staffing, Directing, Coordinating, Reporting and Budgeting
(POSDCORB). Discuss.
40. If Taylor’s scientific principles are still found in many work settings today, does this
mean that management really has not changed in the last ninety years. Explain.
41 Management is both a science and an art. Explain this statement.
42 Discuss the human behavior approach to management .What are its contribution to the
theory of management?
43 Do you suggest professionalization of management in India. Give arguments in favour
of and against professionalization of management in India.
44 Is management the art of getting things done through and with people?
45 Management is a distinct process, consisting of planning, organizing, actuating and
controlling performance to determine and accomplish objectives by the use of people
214
and resources.” In the light of this definition, explain the meaning and significance of
management.
46 “Management is concerned with ideas, things and people.” Comment.
47 How would you argue that management is important for all organizations.
48 What are the skills and skill mixtures which managers at different levels need to
possess.
49 Critically examine Hnery Mintzberg’s Managerial roles approach to present day
management.
50 How can organizations develop the competencies of their management.
51 Discuss the principles of management given by Henry Fayol.
52 Discuss the concept of social responsibility. Is it different from ethical behavior.
Explain.
53 What managerial skills are required at different levels of management. explain taking
examples for each level
54 Discuss the evolution of management in light of the early contributions.
55 Explain the social systems approach in detail.
56 Explain the skills required by a manager for getting things done from others.
UNIT - II
I Test Your Skills:
Ans. (1)(T), (2)(T), (3)(F), (4)(T), (5)(T), (6)(F), (7)(T), (8)(T), (9)(F), (10)(F), (11)(F),
(12)(F), (13)(F), (14)(F), (15)(F)
215
(b) Multiple Choice Questions:
1 What is the term used to define the number of subordinates directly controlled by a
manager?
(a) Division management
(b) Departmentation
(c) Sphere of influence
(d) Span of management
5 One of the factors which learning organizations possess is a climate of openness and
the other factor is
(a) Motivation
(b) Closeness
(c) Trust
(d) Delegation
216
8. _________ plans have clearly defined objectives.
(a) Directional
(b) Flexible
(c) Specific
(d) Standing
9. Strategic planning:
(a) Addresses the organization's basic mission or business, issuing broad statements
of purpose or direction that have a long lead time.
(b) Involves managers in each unit of an organization who are responsible for
achieving the unit's objectives within a specified period of time.
(c) Looks specifically at resources, finances, and market conditions to determine
ways to accomplish the overall plans of the organization.
(d) Determines the day-to-day operations within an organization.
12. ___________________ are those plans that are extended beyond three years.
(a) Short Term Plans
(b) Long Term Plans
(c) Specific Plans
(d) Strategic Plan
217
(e) None of the above
17. What is the more formal term for what is known as 'Plan B'?
(a) A catastrophe plan
(b) A crisis plan
(c) A contingency plan
(d) A calamity plan
(e) A circumstantial plan
(f) A convergence plan
18. "Developing plans to integrate and coordinate activities "is include in ------------
(a) Organizing
(b) leading
(c) Controlling
(d) Planning
(e) Assurance
19. _______________ goals and plans typically involve time periods of 1 to 3 years.
Strategic
(a) Tactical
(b) Operational
(c) none of the given options
20. _______________ goals and plans can be for as short a period as 1 week or as long as
1 year.
(a) Strategic
(b) Tactical
(c) Operational
218
21. Desired outcomes for individuals groups or entire organizations.
(a) goals
(b) plans
23. In __________ planning nothing is written down & there is little or no sharing of
goals with others in organization.
(a) formal
(b) informal
25. A _____________ is a broad declaration of the basic unique purpose and scope of
operations that distinguishes the organization from others of this type.
(a) mission statement
(b) bank statement
(c) financial statement
(d) none of the given options
26. ___________ plans are those that are organization wide establish overall objectives
and position an organization in terms of its environment.
(a) Strategic
(b) Operational plans
(c) Short-term plans
(d) Specific plans
27. __________ plans are plans that specify details on how overall ob jectives are to be
achieved.
(a) Strategic
(b) Operational
(c) Specific
(d) Directional
28. ____________ goals and plans generally involve time periods of 3-5 years.
(a) Strategic
(b) Tactical
(c) Operational
(d) none of the given options
219
29. A process of setting mutually agreed-upon goals and using those goals to evalute
employee performance.
(a) Management by objectives(MBO)
(b) planning
(c) Well-Designed goals
(d) none of the given options
32. Setting difficult goals increases the _________ that they will not be reached.
(a) risk
(b) stress
(c) dishonesty and cheating
(d) self-confidence
33. Failure to meet high goals may undermine the ____________ of organizational
members.
(a) self-confidence
(b) dishonesty and cheating
(c) stress
(d) risk
220
36. _______ plans are plans that cover one year or less.
(a) Short-term
(b) Long-term
(c) Specific
(d) Directional
40 Which of the following does not from part of the several internal benefits of objectives,
goals and a sense of mission.
(a) Basis of control
(b) Basis to resolve disputes
(c) Motivation
(d) None of the above.
41. Information that originates outside the organization is known as external information.
Which of the following is/are example(s) of external information in an organization?
(a) Daily receipts and expenditures
(b) Salesperson Quotas
(c) Descriptions of customer satisfaction with products and services
(d) Quantity of an item in hand or in inventory
(e) Cost and selling price of the company’s item.
221
42. Which of the following decision-making models emphasizes short-run solution of a
problem rather than long-term goal accomplishment?
(a) Rational model
(b) Satisficing model
(c) Incremental model
(d) Garbage-can model
(e) Decision tree.
43. Sofia works in one of seven research and development departments at General
Automobile Corporation. This would suggest that General Automobiles has a
(a) Functional structure
(b) Divisional structure
(c) Flat structure
(d) High degree of centralization
(e) Tall structure
44. Which of the following information processing systems gives the output in the form of
summary and exception reports that are useful to the managers?
(a) Decision support system
(b) Management information system
(c) Office automation system
(d) Transaction processing system
(e) Executive support system.
45. In which of Likert’s four systems of leadership, managers do not have complete
confidence and trust in subordinates but nevertheless, solicit advice from subordinates
while retaining the right to make final decision?
(a) Participative leadership style
(b) Benevolent-authoritative leadership style
(c) Consultative leadership style
(d) Exploitative-authoritative leadership style
(e) Trait theory of leadership style.
222
47. Ratio analysis helps a manager to compare the performance of the organization with its
previous performance or the performance of its competitors. Which of the following is
a ratio of creditors’ contribution to that of the owners?
(a) Current ratio
(b) Debt-equity ratio
(c) Return on investment (ROI)
(d) Net profit margin
(e) Inventory turnover
48. Which of the following inventory techniques uses cards to monitor inventory
movement?
(a) ABC Analysis
(b) JIT Approach
(c) Kanban
(d) Kaizen
(e) Economic Order Quantity.
49. A decision support system (DSS) is an interactive computer system used to plan and
make decisions. Which of the following is/are true with regard to Decision Support
System (DSS)?
I. Executive decisions are the focal points in DSS.
II. DSS specializes in easy-to-use software.
III. DSS employs interactive processing.
IV. The control and use of DSS rests with the central information
management department.
50. Which of the following is/are postulates of the path – goal theory?
I. The leader clearly defines the path to goal attainment for subordinates.
II. The leader motivates subordinates to participate in decision-making.
III. The leader sets clear and specific goals for subordinates.
IV. The leader suitably rewards employees as per their performance.
Ans. (1)(d), (2)(b), (3)(a), (4)(a), (5)(c), (6)(d), (7)(d), (8)(a), (9)(c), (10)(c), (11)(b), (12)(b),
(13)(b), (14)(d), (15)(c), (16)(c), (17)(c), (18)(d), (19)(a), (20)(c), (21)(a), (22)(a),
223
(23)(b), (24)(b), (25)(a), (26)(a), (27)(b), (28)(a), (29)(a), (30)(a), (31)(a), (32)(a),
(33)(a), (34)(c), (35)(d), (36)(a), (37)(a), 38(c), 39(a), 40(b), (41)(c), (42)(c), (43)(b),
(44)(b), (45)(c), 46(e), 47(b), 48(c), 49(d), 50(e)
1. ________, weakness, threats, opportunities are the long form SWOT analysis.
2. _________ is the specialization where the economists consider necessary for efficiency
in the use of labour.
3. Advantage of delegation of authority results in prompt ________.
4. Business ________ is the calculation of probable events to provide against future.
5. ________ behaviour is obtained when there is a one-way transmission of orders from
superior to subordinates.
224
6 Policies and Procedures
7 Policies and Rules
8 Strategies and Tactics
225
22 Compare line, functional and line and staff organizations. Which of these will be
appropriate for a large organization?
23 “Planning is a mere ritual in a fast changing environment.” Comment.
24. “Planning is the primary requisite of every management function whether it is
organizing, staffing, directing or controlling.” Discuss and define planning. Also, give
the benefits of efficient planning.
25 Planning is waste of time and money. Comment.
26. ‘Decision making involves choice from among alternative solutions.” Comment.
27. Groups always make better decisions than individuals. Comment.
28. “The management of every enterprise has to evolve its own organization structure the
form of which mainly depends upon the activities of the business, competence of
personnel and the philosophy of management.” Discuss and give popular types of
organization.
29. “Despite their shortcomings, committees are an important device for management.”
Critically examine this statement.
30. Why lone people do not cooperate with staff experts? How can the two be made to
work together harmoniously.
31 Define corporate planning. Explain briefly various types of corporate planning.
32 Explain the meaning of organization as a structure and state briefly its principles.
33 What do you mean by span of control? Explain Graicunas theory of span of control.
34 What are the obstacles in delegation of authority. What steps must be taken to make
delegation more effective.
35 Discuss the role of planning in a modern business organization. Enumerate the steps
involved in the planning process.
36 Define planning. Discuss the limitations of planning. What measures do you suggest to
overcome these limitations.
37 “Planning is the basis for control.” Comment.
38 What is economic forecasting. Explain the various techniques of economic forecasting.
39. “Effective forecasting precedes planning.” Comment.
40 What is organizational structure? Why is it required? Explain matrix organizational
structure.
41 Explain the concept of span of control with the help of an example of an organization.
42 Explain the concept of delegation. Discuss the principles associated with it.
43 “Authority and responsibility go hand in hand. One is incomplete without the other.”
Explain.
44 Explain the different forms of organisation structure. Give example of an industry for
each of them.
UNIT - III
1. In Division of work, economists consider necessary for efficiency in the use of labour.
2. It is possible to make a permanent change in the behaviour of person.
226
3. Money alone can motivate employees to put in best performance.
4. A psychological test or selection test is designed to measure selected psychological
factors.
5. Collective bargaining is done with the object of reaching an agreement between the
parties.
6. Delegation of authority does not allow subordinate to develop
7 Economic considerations do not affect the choice of span.
8 Event management is a modern activity.
9 The objective of paternalistic leadership to help, guide, protect followers.
10 Delegation and decentralization are closely related
11 Necessary rigidity is required in the control design.
12 The 3-needs theory is about motivators in an organization.
13 Service sector has expanded because of explosion in information technology.
14 There are five channels through which corporate governance may bear.
15 An SBU is a relatively independent business unit.
Ans-(1)(T), (2)(T), (3)(F), (4)(T), (5)(T), (6)(F), (7)(F), (8)(T), (9)(T), (10)(T), (11)(F),
(12)(T), (13)(T), (14)(T), (15)(T)
1. Name the specialization where the economists consider necessary for efficiency in the
use of labour :-
a) Division of task
b) Division of man power
c) Division of techniques
d) Division of work
4 The process, which is aimed at seeking change in attitudes, stereotypes and perceptions,
that groups hold of each other is called
(a) Organizational development
(b) Inter-group development
(c) T-groups
(d) Team-building
227
5. Job analysis deals with
(a) Job description and Job Specification
(b) Job description
(c) Manpower Planning
(d) Recruitment and Selection
10. The best match between job description and job specification is
(a) Recruitment
(b) Selection
(c) Job Analysis
(d) Both recruitment and selection
228
13. Employment exchange and trade unions are the sources of
(a) Internal recruitment
(b) External recruitment
16. Training employees while they are performing the job is known as
(a) On-the-job training
(b) Off-the-job training
18. Wages are paid to workers on the basis of individual or group output in
(a) Piece rate system
(b) Time rate system
20. ________________ need involves the desire to affiliate with and be accepted by others.
(a) Esteem
(b) Belongingness
(c) Safety
(d) Self Actualization
21. Needs that impel creativity and innovation, along with the desire to have a productive
impact on our surroundings are___________ needs.
(a) Existence
(b) Relatedness
(c) Growth
(d) None of the Above
229
(b) McClelland
(c) Douglas McGregor
(d) J. Stacey Adams
25. Challenging goals usually lead to__________ performance from individuals and
groups.
(a) Higher
(b) Lower
(c) Excellent
(d) None of the Above
26. The theory that an individual tends to act in a certain way, with the expectation that the
act will be followed by a given outcome and according to the attractiveness of the
outcome is_____.
(a) Equity theory
(b) Three-needs theory
(c) Motivation-hygiene theory
(d) Expectancy theory
27. Which of the following statements would a Theory X manager consider to be true?
(a) The average person can learn to accept and even seek responsibility
(b) Employees will shirk responsibility
(c) Employees will exercise self-direction if they are committed to the objectives
(d) Employees view work as being as natural as play
29. According to Abraham Maslow, the most elevated type of need is_____.
(a) Self-actualization
230
(b) Physiological
(c) Esteem
(d) Safety
30. Ali is working in XYZ Company, he desires to get himself secure from crimes,
company lay offs and other adverse impacts. We can say that he fulfils the _________
need.
(a) Self Actualization
(b) Social need
(c) Esteem
(d) Safety
31. In-------------- theory management assumes that employees may be ambitious, self-
motivated, and anxious to accept greater responsibility, and exercise self-control, self-
direction, autonomy and empowerment.
(a) Theory Y manager
(b) Theory X manager
(c) Theory Z manager
(d) All of the above
32. ________________ need involves the desire to affiliate with and be accepted by others.
(a) Esteem
(b) Belongingness
(c) Safety
(d) Self-Actualization
33. Seema desires for friendship, love, and a sense of belonging, we can say that she fulfils
the_______
(a) Physical need
(b) Self Actualization
(c) Social need
(d) Esteem
34. If the average human being prefers to be directed, wishes to avoid responsibility, has
relatively little ambition and wants security above all, the management attitude would
be:
(a) Theory Y manager
(b) Theory X manager
(c) Theory Z manager
(d) All of the given options
231
36 The availability of data for evaluating the effectiveness of HR activities has been
_______ over time because of the adoption of HRIS.
(a) increasing
(b) decreasing
(c) staying about the same
(d) fluctuating about a steady average
42. Which of the following is not true with regard to functional authority?
(a) Functional authority is the authority staff members have over line members
within the limits of their functions
232
(b) Functional authority has the same effect as line authority but it doesn’t have the
right that line authority has, to punish violations or deviations in order to ensure
compliance
(c) Functional authority is limited to those areas where a staff member has some
technical competence
(d) The use of functional authority should be restricted to the procedural aspects of
a function
(e) Functional authority is in sync with the principle of unity of command.
43. Creativity is an important factor in managing people. Which of the following is not true
with regard to the creative process?
(a) Creativity is the ability to develop new ideas
(b) The creative process starts with unconscious scanning
(c) Intuition connects the unconscious with the conscious
(d) Insight leads to intuition
(e) Insight is tested against organizational reality.
45. Which of the following techniques for improving productivity aims at reducing costs by
analyzing and improving individual operations of a product or service?
(a) Work simplification
(b) Time-event network
(c) Value engineering
(d) Total Quality Management
(e) Quality Circle.
.46. Span of control an important factor, which is to be taken into account when undertaking
organizational design. Maintaining a large span of control within an organization is most
effective in all except one of the following situations?
(a) When subordinates prefer autonomy
(b) When tasks are routine
(c) When jobs are similar but have varying performance measures
(d) When subordinates are highly trained
(e) When managers are competent.
233
47. Functional job analysis is a widely used systematic job analysis approach. Which of the
following dimensions of an individual’s job does functional job analysis focus on?
I. Data, people and jobs pertaining to the individual’s job.
II. Interpersonal relationships required to perform the job.
III. Tools and equipment used by the worker.
IV. Products and services produced by the worker.
(a) Only (I) above
(b) Only (III) above
(c) Both (II) and (IV) above
(d) (I), (III) and (IV) above
(e) All (I), (II), (III) and (IV) above.
48. Organizational culture is the collection of shared values, beliefs, rituals, stories, myths
and specialized language that foster a feeling of community among organization
members. Which of the following is not a characteristic of organization culture?
(a) It differentiates one organization from another
(b) It defines the internal environment of an organization
(c) It ensures consistency in the behavior of organization members
(d) It remains absolutely stable throughout the life of an organization
(e) It is perceived by the organization members as well as by outsiders.
50. Which of the following are the characteristics of the planning process usually adopted
in Japanese Management style?
I. Long-term orientation.
II. Individual decision-making.
III. Decisions flowing from bottom to top and back.
IV. Slow decision-making.
(a) Both (I) and (II) above
(b) Both (I) and (III) above
(c) Both (II) and IV) above
(d) (I), (III) and (IV) above
(e) (II), (III) and (IV) above.
Ans-(1)(d), (2)(b), (3)(a), (4)(c), (5)(a), (6)(a), (7)(b), (8)(a), (9)(a), (10)(b), (11)(a), (12)(a),
(13)(b), (14)(a), (15)(b), (16)(a), (17)(b), (18)(a), (19)(c), (20)(b), (21)(c), (22)(a), (23)(b),
(24)(c), (25)(a), (26)(a), (27)(b), (28)(d), (29)(a), (30)(d), (31)(a), (32)(b), (33)(c), (34)(b),
234
(35)(d), (36)(a), (37)(b), (38)(b), (39)(a), (40)(c), (41)(d), (42)(e), (43)(d), (44)(b), (45)(c),
(46)(c), (47)(d), (48)(d), (49)(e), (50)(d)
1. Positive motivation makes people willing to do their work in the best way they can and
improve their _________________.
2. Physical needs are at the base of the hierarchy theory of motivation while self
actualisation needs are at the ________.
3. Under the types of motivators, non-financial motivators are encouragement, freedom
________.
4. One of the merits of ________ is that it recognizes importance of various individual
needs and motivation, and yields a contingency model.
5. Costliness of the _______________ is the overriding factor determining the extent of
decentralization
235
24 What is meant by training? How is it different from development?
25 What do you understand by matrix organization.
236
22 State the importance of training for employees. Discuss the different methods of
training managerial personnel.
23 Explain the obstacles to effective appraisal. What are the essentials of effective
appraisal.
24 What is the meaning, nature and importance of direction as a managerial function.
25 What is supervision. What are the different functions performed by supervisor.
26 What are the qualities of a good supervisor. Explain the supervisor’s role in
management.
27 Explain the meaning and advantages of job enrichment. In what ways can a job be
enriched.
28 What is motivation? Explain Herzberg’s two factor theory of motivation.
29 Differentiate between Recruitment and selection.
30 Training and Development are different from each other. Explain.
31 Is pay related to job performance. Explain the different ways adopted by companies for
appraising the performance of the employees.
32 Discuss the different approaches to improve motivation level.
UNIT - IV
237
Ans-(1)(T),(2)(F), (3)(T), (4)(T), (5)(T), (6)( T), (7)(F), (8)(F), (9)(T), (10)(T), (11)(F),
(12)(F), (13)(T), (14)(T), (15)(T)
3 One of the most helpful mechanisms for refining a spoken or written communication is
called the
(a) Grapevine
(b) Counseling service
(c) Five C.s
(d) Complaint system
a) Balance
b) Ends and means
c) Equilibrium
d) Equality
7. One who tries to bring discipline and order through formal structures, plans and processes
and tries to monitor performance against plans is a
(a) Leader
(b) Manager
(c) Co-ordinator
(d) Team-player
8 If the followers are able and unwilling, then the leader will have to use the
(a) Authoritarian style
238
(b) Participative style
(c) Situational style
(d) Strategic style
10. Leadership can_______ subordinates to help the organization achieve its goals.
(a) Motivate
(b) Communicate
(c) Direct
(d) All of the above
11. Leaders who inspire followers to transcend their own self-interests for the good of
the organization, and are capable of having a profound and extraordinary effect on
followers are_____ leaders.
(a) Transactional
(b) Transformational
(c) Democratic
(d) Autocratic
12. Which leadership theory suggests that management style should adapt itself to
changing circumstances?
(a) Contingency theory
(b) Delegation theory
(c) Autocratic theory
(d) Participatory theory
13. Inspiring and motivating workers to work hard to achieve organizational goals is called
______________________.
(a) Planning
(b) Organizing
(c) Leading
(d) Controlling
14. Which of the following type of leader is likely to have the most profound effect on his
or her followers? Select correct option:
(a) Educational
(b) Directive
(c) Transformational
(d) Transactional
239
15. Which of the following is NOT true of charismatic leaders?
Select correct option:
(a) They have behavior that is unconventional
(b) They are willing to take high personal risk
(c) They have a vision and the ability to articulate the vision
(d) They show consistency with their followers’ behaviors
16. Leaders who guide or motivate their followers in the direction of established goals
by clarifying role and task requirements are _____ leaders.
(a) Transactional
(b) Transformational
(c) Democratic
(d) Autocratic
20. Leaders who create a shared vision with their followers are:
(a) Transactional leaders
(b) Transformational leaders
1. __________ is a communication that flows from a higher level to one or more lower
levels in the organization.
(a) Horizontal communication
(b) Upward communication
(c) Downward communication
(d) None of given option
240
(a) Upward communication
(b) Downward communication
(c) Lateral communication
(d) Diagonal communication
6. When information flows amongst people working at the same level, it is known as
(a) Vertical communication
(b) Horizontal communication
(c) Diagonal Communication
241
11. ___________ involves allocating resources by detailing what activities have to be
done, the order in which they are to be completed, who is to do each, and when they are
to be completed.
(a) Benchmarking
(b) Budgeting
(c) Scheduling
(d) Competitor intelligence
12. Monitoring progress towards goal achievement and taking corrective action when
needed is called
(a) Controlling.
(b) Planning
(c) Forecasting
(d) Directing
14. Control over the activities while they are in process is:
(a) Feed forward Control
(b) Concurrent control
(c) Feedback Control
242
39 Which of these is not a principle of great man theory?
a) Leaders are born not made.
b) Great men rise up in times of crisis.
c) We can learn from the biographies of great
d) All of the above
41. Managers making ethical decisions may belong to any of the three levels of moral
development. Which of the following stages describes the conventional level of moral
development?
(a) Following rules only when it is in one’s immediate interest
(b) Valuing rights of others and upholding absolute values and rights, regardless of the
majority's opinion
(c) Sticking to rules to avoid physical punishment
(d) Living up to what is expected by people who are close to oneself
(e) Following self-chosen ethical principles even if they violate the law.
42. Direct control is the control that is exercised after the deviations from plans have occurred.
Which of the following is not an underlying assumption of direct control?
(a) Performance can be measured
(b) Personal responsibility is absent
(c) The time expenditure is warranted
(d) Mistakes can be discovered in time
(e) The individual who is responsible will take corrective steps.
43. Which function of management involves filling, and keeping filled, the positions in the
organization structure?
(a) Organizing
(b) Planning
(c) Staffing
(d) Controlling
(e) Leading.
243
45. In an organization, a superior has the right to get tasks accomplished by his subordinates,
but the responsibility remains with the superior. This principle which intends to eliminate
the practice of “passing the buck”, is known as
(a) Authority on par with responsibility
(b) Hierarchy of authority
(c) Unity of direction
(d) Downward delegation of authority
(e) Unity of command.
46. Robert Owen was one of the prominent contributors to preclassical management thought.
Which of the following did Robert Owen advocate/propose?
(a) Division of labor
(b) Legislative reforms to improve working conditions of labor
(c) Profit-sharing plan
(d) Study of management
(e) Emphasis on the importance of business skills for running a business.
49. Why do such companies as Ford, Federal Express, Boeing, or Proctor & Gamble put
together cross-functional teams?
(a) Because each member has unique knowledge that adds value to the overall decision
(b) Because it is cheaper than hiring consultants
(c) Because decisions can be reached at almost twice the speed of other decision
format styles
(d) Because it diffuses risk (blame) of a wrong decision choice
(e) Because of inadequate availability of manpower.
244
(c) There is better face-to-face communication with local interests
(d) There is improved environmental monitoring
(e) It improves coordination in a region.
1. ___________ is the most effective person are alike in one crucial way, they all have a
high degree of emotional intelligence.
2. Managerial function of control is the ________ and correction of performance of
various activities.
3. Profiting both qualitatively and quantitatively the competencies of the organization is
called ___________ planning.
4. According to situational leadership approach, the style that denotes a high-task and a
low-relationship style is _________.
245
21 Explain the communication process.
22 Explain David Mcclelland’s Three need theory
1. How might the manager of a restaurant use concurrent controls to ensure that the
restaurants providing customers with the highest quality food and service? What
feedback control should be useful? Justify your answers.
2. Describe the elements of the communication process. Give an example of each part of
the model as it exists in the classroom during communication between teacher and
students
3. What are the barriers to communication and how can we overcome them.
4. ”Communication is sharing of understanding”. Discuss the merits and demerits of oral
and written communication.
5. “The existence of variety of communication media does not itself guarantee the success
of communication”. Comment.
6. ”Change is the process of an organization” are inevitable in the light of innovation
adoption.” Discuss in detail.
7. What do you understand by change in product design/product modification? Why does
the necessity for changing product design arise?
8. “Building culture for change is a time – consuming exercise and involves lot of
efforts”. Explain.
9. “Before initiating the change process, it is very important to diagnose/assess the
organizational capability to change”. Is it true? Discuss.
10. Bring out the distinction between Maslow and Herzberg theories of motivation. What is
the role of money in motivating the managers?
11. “A good leader is one who understands his subordinates, their need and their sources of
satisfaction”. Comment on this statement and highlight the traits of effective leaders.
12. (a) Briefly identify the major styles from Blake and Mouton’s Managerial Grid.
13. (b) Mention some of the needed skills for leaders / managers to be effective.
14. Briefly explain techniques that management may use to overcome resistance to change.
15. Explain:
246
19. “Planning is meaningless without control and control is aimless without planning”.
Explain the statement with examples.
20. How will you check the effectiveness of the communication system prevailing in your
organization.
21. Discuss the major advantages and disadvantages of Management by Exception.
22. Briefly explain operational research techniques for taking managerial decisions
23. Explain Graicuna’s theory of Span of Control with suitable example.
24. Explain in detail various forces of change.
25. “Different leadership styles exist among leaders in different times and in different
situations.” Discuss and give the important leadership styles.
26. Critically examine the statement “If you want to control everything, you may end up
controlling nothing.”
27. “Organisational change has to be managed on technological, social and economic
dimensions.” Elaborate. What precautions must be taken in a democratic set up to make
a change acceptable to the personnel?
28. “Despite the development of high speed electronic devices, communications are not
successful in many cases.” Discuss.
29. “If communicate has not understood, the communicator has not communicated.” In the
light of this statement, give suggestions for making communication effective.
30. Communication and coordination are two faces of the same coin. Explain with suitable
examples.
31. “Leadership is the driving force which gets things done.” Explain.
32. Compare and contrast system 1 and system 4 of leadership.
33. “Organizational controls interfere with the freedom organizational members.”
Comment.
34. What is statistical Quality control? Discuss its techniques and advantages.
35. “Educated employees do not like autocratic leadership, but it is necessary with
uneducated employees.” Discuss.
36. “Communication is merely a sum of saying and listening processes.” Is this definition
complete? Discuss.
37. “Controlling as a function of management means the measurement and correction of
performance of activities of subordinates.” Discuss and give the requirements of an
effective control system.
38. Explain the various behavioural theories of leadership. Elaborate on the trait theory of
leadership.
39. How does maturity level of employees affect leader behavior according to Hersey and
Blanchard’s situational leadership theory.
40. What is communication? What are the common barriers to effective communication in
an organisation?
247
41. Describe the various communication networks which facilitate flow of communication
in an organization.
42. Identify important leadership styles and indicate the conditions in which a particular
style is appropriate to be used.
43. What do you mean by managerial control? Identify few aids used in management
controlling.
44. What is the need of change in an organization? Explain trends in organizational change.
45. Explain the communication process and the various communication channels in detail.
46. Explain the concept of controlling and the different types of control.
248