61. A context free grammar for L={w|n0(w)>n1(w)} is given by:
(A) S→0|0S|1SS (B) S→0S|1S|0SS|1SS|0|1
(C) S→0|0S|1SS|S1S|SS1 (D) S→0S|1S|0|1
Answer: C
62. Given the following two statements:
S1: If L1 and L2 are recursively enumerable languages over ∑, then L1⋃L2 and L1⋂L2 are also recursively enumerable.
S2: The set of recursively enumerable languages is countable.
Which of the following is correct?
(A) S1 is correct and S2 is not correct
(B) S1 is not correct and S2 is correct
(C) Both S1 and S2 are not correct
(D) Both S1 and S2 are correct
Answer: D
63. Given the following grammars:
G1: S→AB|aaB
A→aA|ϵ
B→bB|ϵ
G2: S→A|B
A→aAb|ab
B→abB|ϵ
Which of the following is correct?
(A) G1 is ambiguous and G2 is unambiguous grammars
(B) G1 is unambiguous and G2 is ambiguous grammars
(C) Both G1 and G2 are ambiguous grammars
(D) Both G1 and G2 are unambiguous grammars
Answer: C
Explanation.
Let the string is aab.
it can be derived by.
S->AB->aAB->aaAB->aaεB->aaεbB->aaεbε.
and
we can derive in this way also.
S->aaB->aabB->aabε.
G1 is ambigious because we have two different tree structure.
Similarly G2.
let w=ab.
then S->A->ab.
and
S->B->abB->abε.
so we get two tree for a same string. so G2 is also ambigious.
64. Given the symbols A, B, C, D, E, F, G and H with the probabilities 1/30, 1/30, 1/30, 2/30, 3/30, 5/30, 5/30 and 12/30 respectively. The average Huffman code size in bits per symbol is:
(A) 67/30 (B) 70/34
(C) 76/30 (D) 78/30
Answer: C
65. The redundancy in images stems from:
(A) pixel decorrelation (B) pixel correlation
(C) pixel quantization (D) image size
Answer: B
66. In a binary Hamming code the number of check digits is r then number of message digits is equal to:
(A) 2r-1 (B) 2r-r-1
(C) 2r-r+1 (D) 2r+r-1
Answer: B
67. In the Hungarian method for solving assignment problem, an optimal assignment requires that the maximum number of lines that can be drawn through squares with zero opportunity cost be equal to the number of:
(A) rows or columns (B) rows+columns
(C) rows+columns-1 (D) rows+columns+1
Answer: A
68. Consider the following transportation problem:
The initial basic feasible solution of the above transportation problem using Vogel’s Approximation Method(VAM) is given below:
The solution of the above problem:
(A) is degenerate solution (B) is optimum solution
(C) needs to improve (D) is infeasible solution
Answer: B
69. Given the following statements with respect to linear programming problem:
S1: The dual of the dual linear programming problem is again the primal problem
S2: If either the primal or the dual problem has an unbounded objective function value, the other problem has no feasible solution
S3: If either the primal or dual problem has a finite optimal solution, the other one also possesses the same, and the optimal value of the objective functions of the two problems are equal.
Which of the following is true?
(A) S1 and S2 (B) S1 and S3
(B) S2 and S3 (D) S1, S2 and S2
Answer: D
70. Consider the two class classification task that consists of the following points:
Class C1: [1 1.5] [1 -1.5]
Class C2: [-2 2.5] [-2 -2.5]
The decision boundary between the two classes using single perceptron is given by:
(A) x1+x2+1.5=0 (B) x1+x2-1.5=0
(C) x1+1.5=0 (D) x1-1.5=0
Answer: C
Let A and B be two fuzzy integers defined as:
A={(1,0.3), (2,0.6), (3,1), (4,0.7), (5,0.2)}
B={(10,0.5), (11,1), (12,0.5)}
Using fuzzy arithmetic operation given by
(A) {(11,0.8), (13,1), (15,1)}
(B) {(11,0.3), (12,0.5), (13,1), (14,1), (15,1), (16,0.5), (17,0.2)}
(C) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,1), (16,0.5), (17,0.2)}
(D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}
Answer: D
- Suppose the function y and a fuzzy integer number around -4 for x are given as
y=(x-3)2+2
Around -4={(2,0.3), (3,0.6), (4,1), (5,0.6), (6,0.3)} respectively. Then f(Around -4) is given by:
(A) {(2,0.6), (3,0.3), (6,1), (11,0.3)}
(B) {(2,0.6), (3,1), (6,1), (11,0.3)}
(C) {(2,0.6), (3,1), (6,0.6), (11,0.3)}
(D) {(2,0.6), (3,0.3), (6,0.6), (11,0.3)}
Answer: C
- Match the following for unix system calls:
List-I List-II
(a) exec (i) Creates a new process
(b) brk (ii) Invokes another program overlaying memory
space with a copy of an executable file
(c) wait (iii) To increase or decrease the size of data region
(d) fork (iv) A process synchronizes with termination of child process
Codes:
(a) (b) (c) (d)
(A) (ii) (iii) (iv) (i)
(B) (iii) (ii) (iv) (i)
(D) (iv) (iii) (i) (ii)
Answer: A
- WOW32 is a:
(A) Win 32 API library for creating processes and threads.
(B) Special kind of file system to the NT name space.
(C) Kernel – mode objects accessible through Win32 API
(D) Special execution environment used to run 16 bit Windows applications on 32 – bit machines.
Answer: D
- The Unix command:
$ vi file1 file2
(A) Edits file1 and stores the contents of file1 in file2
(B) Both files i.e. file1 and file2 can be edited using ‘ex’ command to travel between files
(C) Both files can be edited using the ‘mv’ command to move between the files
(D) Edits file1 first, saves it and the edits file2
Answer: B