PHD CS
PHD CS
me/vtuupdates
1 b 11 a 21 c 31 a 41 b
2 c 12 a 22 a 32 b 42 c
3 b 13 b 23 b 33 b 43 a
4 c 14 c 24 d 34 a 44 c
5 c 15 c 25 d 35 c 45 b
6 b 16 c 26 b 36 a 46 a
7 d 17 d 27 c 37 d 47 b
8 a 18 c 28 b 38 d 48 c
9 b 19 d 29 b 39 b 49 b
10 c 20 b 30 b 40 c 50 b
PART – II
Q.No Answer Q.No Answer Q.No Answer Q.No Answer Q.No Answer
51 C 61 D 71 C 81 A 91 B
52 B 62 D 72 D 82 D 92 B
53 C 63 C 73 A 83 D 93 B
54 D 64 C 74 A 84 D 94 C
55 A 65 B 75 C 85 B 95 C
56 C 66 C 76 D 86 C 96 B
57 B 67 B 77 B 87 C 97 D
58 B 68 D 78 A 88 B 98 C
59 A 69 B 79 A 89 B 99 B
60 B 70 B 80 C 90 C 100 D
PART – I
(Research Methodology)
[50 Marks]
1. What is the main objective of applied research?
a) Develop theories for future studies b) Solve specific, practical problems
c) Investigate unexplored phenomena d) Study the historical context of an issue
2. Which of the following steps is NOT part of the research process?
a) Defining the research problem b) Reviewing related literature
c) Avoiding data collection d) Formulating a hypothesis
3. Which of the following is NOT a characteristic of good research?
a) Systematic and logical b) Based on subjective interpretation
c) Replicable and verifiable d) Directed towards problem-solving
10. Which type of research design is best for studying cause-and-effect relationships?
a) Descriptive design b) Correlational design
c) Experimental design d) Exploratory design
Ver - A : CS/IS 1 of 12
12. Which is a preferred sampling method for the population of a finite size.
a) Systematic sampling
b) Purposive Sampling
c) Cluster Sampling
d) Area Sampling
14. Which classification of measurement scale represents ordered categories but does not have a
true zero point?
a) Nominal scale b) Ordinal scale
c) Interval scale d) Ratio scale
15. Which method is most suitable for collecting primary data when studying behaviour over time?
a) Case study method
b) Experimental method
c) Longitudinal survey
d) Secondary data collection
16. Which of the following is NOT a step in the data preparation process?
a) Editing b) Coding
c) Data collection d) Transcribing
18. Which measure of central tendency is best suited for categorical data?
a) Mean b) Median c) Mode d) Standard deviation
27. Which test is used to compare the means of two independent samples?
a) Chi-square test
b) Z-test for proportion
c) Two-sample t-test
d) ANOVA
29. Which hypothesis test is used to compare the variances of two populations?
a) Z-test for variance
b) F-test
c) Paired t-test
d) Chi-square test for independence
Ver - A : CS/IS 3 of 12
31. What does the analysis of variance (anova) primarily test for?
a) Differences in means across multiple groups
b) Differences in medians across two groups
c) Relationships between two variables
d) Equality of variances across groups
32. What is the main difference between one-way and two-way ANOVA?
a) One-way ANOVA tests one group, while two-way ANOVA tests two groups
b) One-way ANOVA examines one independent variable, while two-way ANOVA examines
two independent variables
c) Two-way ANOVA is only for experimental designs
d) One-way ANOVA includes interaction effects
36. Which of the following is a key characteristic of dependent and independent variables in linear
regression?
a) Dependent variable is predicted by the independent variable.
b) Both dependent and independent variables are random variables.
c) Independent variables depend on dependent variables.
d) Dependent variables are not affected by independent variables.
37. What problem arises when independent variables in a multiple regression model are highly
correlated with each other?
a) Heteroscedasticity
b) Homoscedasticity
c) Autocorrelation
d) Multicollinearity
Ver - A : CS/IS 4 of 12
40. Which of the following is a key difference between R-type and Q-type factor analysis?
a) R-type focuses on factors affecting the variables, while Q-type analyzes the variables' impact
on the factors
b) R-type is used when analyzing observations across multiple time periods, while Q-type
focuses on cross-sectional data
c) R-type factor analysis is applied to variables, whereas Q-type is applied to cases
(individuals)
d) There is no significant difference between R-type and Q-type factor analysis
42. The probability of the occurrence of a single event, such as P(A) or P(B), which takes a specific
value irrespective of the values of other events, i.e. unconditioned on any other events, is called?
a) Unconditional Probability
b) Marginal Probability
c) Conditional Probability
d) Joint Probability
44. What does the Axiom of Probability P(S) = 1 mean, where S is the sample space?
a) The probability of any event is 0.
b) The probability of the sample space is 0.
c) The probability of the sample space is 1.
d) The probability of any event is 1.
Ver - A : CS/IS 5 of 12
48. Under which condition can the binomial distribution be approximated by a normal distribution?
a) When the number of trials is very small
b) When the probability of success is very high
c) When the probability of success is close to 0.5
d) When the trials are dependent
*****
Ver - A : CS/IS 6 of 12
PART – II
Discipline Oriented Section
(Computer Science and Engineering /
Information Science and Engineering)
[50 MARKS]
a) 4 b) 8 c) 16 d) Runtime Error
52. A Binary search tree is generated by inserting the following elements in order,
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left sub tree and right sub tree of the root is ________
a) (4, 7) b) (7, 4) c) (8, 3) d) (3, 8)
53. A variant of the linked list in which none of the node contains NULL pointer is______
a) Singly linked list
b) Doubly linked list
c) Circular linked list
d) None
Ver - A : CS/IS 7 of 12
58. In the Rational Unified Process (RUP), which phase focuses on creating the architectural
foundation of the system?
a) Inception b) Elaboration
c) Construction d) Transition
59. Which type of testing ensures that previously developed and tested software still works after
changes?
a) Regression Testing
b) Acceptance Testing
c) Integration Testing
d) System Testing
60. Which of the following acts as a temporary storage location to hold an intermediate results for
mathematical and logical calculations
a) RAM
b) Accumulator
c) Program counter
d) Memory Address Register
61. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is ___________
a) Translation Lookaside Buffer’s
b) Registers
c) Page Tables
d) Cache
62. The bit used to signify that the cache location is updated is ________
a) Flag bit b) Reference bit
c) Update bit d) Dirty bit
63. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm
b) Floyd-Warshall algorithm
c) Depth First Search
d) Kruskal’s algorithm
64. In the N-Queens problem, what does backtracking do when a placed queen results in no valid
positions for the next queen?
a) Stops the program
b) Recalculates all possible placements for the queens
c) Removes the last placed queen and tries the next possibility
d) Ignores the invalid position and moves forward
65. Which data structures are used to formulate the Breadth-first Search (BFS)?
a) Stack b) Queue c) Heap d) Linked List
Ver - A : CS/IS 8 of 12
66. Which strategy is used to handle deadlocks by ensuring that at least one of the necessary
conditions for deadlock does not hold?
a) Deadlock Avoidance
b) Deadlock Detection and Recovery
c) Deadlock Prevention
d) Process Termination
67. Which disk scheduling algorithm minimizes the total seek time?
a) First-Come, First-Served (FCFS)
b) Shortest Seek Time First (SSTF)
c) Elevator (SCAN)
d) Circular SCAN (C-SCAN)
69. A system digitizes an analog signal with a maximum frequency of 4 kHz. According to the
Nyquist theorem, what is the minimum sampling rate required to avoid aliasing?
a) 4 kHz b) 8 kHz
c) 16 kHz d) 32 kHz
70. Using Go-Back-N ARQ with a window size of 4, how many frames can be sent before an
acknowledgment is required?
a) 1 frame b) 4 frames c) 5 frames d) 8 frames
71. Which layer in the OSI model is responsible for data presentation?
a) Network layer b) Session layer
c) Presentation layer d) Transport layer
Ver - A : CS/IS 9 of 12
76. The five items: A, B, C, D, and E are pushed in a stack, one after other starting from A. The
stack is popped four times and each element is inserted in a queue. The two elements are
deleted from the queue and pushed back on the stack. Now one item is popped from the stack.
The popped item is__________
a) A b) B c) C d) D
77. If an array is declared as int arr[5][5], how many elements can it store?
a) 5 b) 25 c) 10 d) 0
79. If R is a relation on set A= {1, 2, 3, 4} defined by R= {(x,y) ∣ x+y=5}, then which pairs belong
to R?
a) {(1,4),(2,3),(3,2),(4,1)}
b) {(1, 4), (2, 3), (4, 1)}
c) {(1, 4), (2, 3), (3, 2)}
d) {(1, 3), (2, 3), (4, 1)}
80. What is the Cartesian product of set A and set B, if the set A = {1, 2} and set B = {a, b}?
a) { (1, a), (1, b), (2, a), (b, b) }
b) { (1, 1), (2, 2), (a, a), (b, b) }
c) { (1, a), (2, a), (1, b), (2, b) }
d) { (1, 1), (a, a), (2, a), (1, b) }
82. Which of the following is a type of software testing that checks the functionality of the
software in real-world scenarios?
a) Unit testing
b) Integration testing
c) System testing
d) User acceptance testing
84. Modifying a software after it has been put into use is known as
a) Software modification b) Software change
c) Software reengineering d) Software maintenance
85. If a system uses memory-mapped I/O, how much addressable memory is available if the
address bus is 16 bits and 256 I/O addresses are reserved?
a) 65,536 bytes b) 65,280 bytes c) 32,768 bytes d) 32,512 bytes
86. Calculate the effective address for the instruction 'LOAD R1, 100(R2)' if the content of R2 is
200
a) 100 b) 200 c) 300 d) 400
87. Which of the following is an example of an I/O control method where the CPU polls each
device?
a) Interrupt-driven I/O
b) Direct Memory Access (DMA)
c) Programmed I/O
d) Memory-mapped I/O
88. Suppose you have coins of denominations 1, 3 and 4. You use a greedy algorithm, in which
you choose the largest denomination coin which is not greater than the remaining sum. For
which of the following sums, will the algorithm NOT produce an optimal answer?
a) 20 b) 6 c) 12 d) 5
91. What is the main disadvantage of the SSTF (Shortest Seek Time First) disk scheduling
algorithm?
a) It increases seek time compared to FCFS
b) It causes starvation for distant requests
c) It requires additional hardware support
d) It is less efficient than SCAN
92. Which of the following replacement policies suffers from Belady's anomaly?
a) LRU b) FIFO c) Optimal d) NRU
Ver - A : CS/IS 11 of 12
94. Which protocol type does Wi-Fi use for media access control?
a) FDMA b) CDMA c) CSMA/CA d) TDMA
95. In Ethernet addressing, if all the bits are 1s, the address is ____________
a) Unicast b) Multicast c) Broadcast d) None of these
97. Which phase of the Unified Process involves deploying the system to its users?
a) Inception b) Elaboration
c) Construction d) Transition
98. In a weather monitoring system the Observer pattern is implemented. The system has the
following components:
A WeatherStation object (subject) that notifies its observers whenever the temperature
changes.
There are 200 Display objects (observers) that are subscribed to the WeatherStation to receive
updates.
If each observer object stores the temperature (which is an integer) and has additional
overhead of 4 bytes per observer for other attributes, calculate the total memory required to
store all observer objects
a) 800 bytes b) 1200 bytes c) 1600 bytes d) 2000 bytes
99. _________________ Design pattern converts the interface of a class into another interface
clients expect
a) Bridge method b) Adapter method
c) Proxy method d) Decorator method
*****
Ver - A : CS/IS 12 of 12
1 b 11 a 21 a 31 b 41 c
2 c 12 b 22 a 32 c 42 a
3 a 13 b 23 b 33 b 43 b
4 c 14 a 24 c 34 c 44 d
5 b 15 c 25 c 35 c 45 d
6 a 16 a 26 c 36 b 46 b
7 b 17 d 27 d 37 d 47 c
8 c 18 d 28 c 38 a 48 b
9 b 19 b 29 d 39 b 49 b
10 b 20 c 30 b 40 c 50 b
PART – II
Q.No Answer Q.No Answer Q.No Answer Q.No Answer Q.No Answer
51 B 61 A 71 D 81 C 91 C
52 B 62 D 72 D 82 B 92 D
53 B 63 D 73 C 83 C 93 A
54 C 64 D 74 C 84 D 94 A
55 C 65 B 75 B 85 A 95 C
56 B 66 C 76 C 86 C 96 D
57 D 67 C 77 B 87 B 97 B
58 C 68 B 78 D 88 B 98 A
59 B 69 B 79 B 89 A 99 A
60 D 70 C 80 B 90 B 100 C
PART – I
(Research Methodology)
[50 Marks]
1. Which of the following best defines a random experiment?
a) A process that results in one of a set of outcomes, with certainty.
b) A process with uncertain outcomes that can be repeated under identical conditions.
c) A deterministic process where outcomes are predictable.
d) A set of outcomes that always yield the same result.
2. The probability of the occurrence of a single event, such as P(A) or P(B), which takes a specific
value irrespective of the values of other events, i.e. unconditioned on any other events, is called?
a) Unconditional Probability b) Marginal Probability
c) Conditional Probability d) Joint Probability
4. What does the Axiom of Probability P(S) = 1 mean, where S is the sample space?
a) The probability of any event is 0.
b) The probability of the sample space is 0.
c) The probability of the sample space is 1.
d) The probability of any event is 1.
8. Under which condition can the binomial distribution be approximated by a normal distribution?
a) When the number of trials is very small
b) When the probability of success is very high
c) When the probability of success is close to 0.5
d) When the trials are dependent
Ver - B : CS/IS 1 of 12
11. What does the analysis of variance (anova) primarily test for?
a) Differences in means across multiple groups
b) Differences in medians across two groups
c) Relationships between two variables
d) Equality of variances across groups
12. What is the main difference between one-way and two-way ANOVA?
a) One-way ANOVA tests one group, while two-way ANOVA tests two groups
b) One-way ANOVA examines one independent variable, while two-way ANOVA examines
two independent variables
c) Two-way ANOVA is only for experimental designs
d) One-way ANOVA includes interaction effects
16. Which of the following is a key characteristic of dependent and independent variables in linear
regression?
a) Dependent variable is predicted by the independent variable.
b) Both dependent and independent variables are random variables.
c) Independent variables depend on dependent variables.
d) Dependent variables are not affected by independent variables.
Ver - B : CS/IS 2 of 12
17. What problem arises when independent variables in a multiple regression model are highly
correlated with each other?
a) Heteroscedasticity
b) Homoscedasticity
c) Autocorrelation
d) Multicollinearity
20. Which of the following is a key difference between R-type and Q-type factor analysis?
a) R-type focuses on factors affecting the variables, while Q-type analyzes the variables' impact
on the factors
b) R-type is used when analyzing observations across multiple time periods, while Q-type
focuses on cross-sectional data
c) R-type factor analysis is applied to variables, whereas Q-type is applied to cases
(individuals)
d) There is no significant difference between R-type and Q-type factor analysis
22. Which is a preferred sampling method for the population of a finite size.
a) Systematic sampling
b) Purposive Sampling
c) Cluster Sampling
d) Area Sampling
24. Which classification of measurement scale represents ordered categories but does not have a
true zero point?
a) Nominal scale b) Ordinal scale
c) Interval scale d) Ratio scale
Ver - B : CS/IS 3 of 12
25. Which method is most suitable for collecting primary data when studying behaviour over time?
a) Case study method
b) Experimental method
c) Longitudinal survey
d) Secondary data collection
26. Which of the following is NOT a step in the data preparation process?
a) Editing
b) Coding
c) Data collection
d) Transcribing
28. Which measure of central tendency is best suited for categorical data?
a) Mean
b) Median
c) Mode
d) Standard deviation
32. Which of the following steps is NOT part of the research process?
a) Defining the research problem
b) Reviewing related literature
c) Avoiding data collection
d) Formulating a hypothesis
Ver - B : CS/IS 4 of 12
35. Which research approach combines both qualitative and quantitative methods?
a) Descriptive research
b) Experimental research
c) Mixed-method research
d) Longitudinal research
40. Which type of research design is best for studying cause-and-effect relationships?
a) Descriptive design
b) Correlational design
c) Experimental design
d) Exploratory design
Ver - B : CS/IS 5 of 12
47. Which test is used to compare the means of two independent samples?
a) Chi-square test b) Z-test for proportion
c) Two-sample t-test d) ANOVA
49. Which hypothesis test is used to compare the variances of two populations?
a) Z-test for variance b) F-test
c) Paired t-test d) Chi-square test for independence
Ver - B : CS/IS 6 of 12
PART – II
Discipline Oriented Section
(Computer Science and Engineering /
Information Science and Engineering)
[50 MARKS]
51. What is the main disadvantage of the SSTF (Shortest Seek Time First) disk scheduling
algorithm?
a) It increases seek time compared to FCFS
b) It causes starvation for distant requests
c) It requires additional hardware support
d) It is less efficient than SCAN
52. Which of the following replacement policies suffers from Belady's anomaly?
a) LRU b) FIFO c) Optimal d) NRU
54. Which protocol type does Wi-Fi use for media access control?
a) FDMA b) CDMA c) CSMA/CA d) TDMA
55. In Ethernet addressing, if all the bits are 1s, the address is ____________
a) Unicast b) Multicast c) Broadcast d) None of these
57. Which phase of the Unified Process involves deploying the system to its users?
a) Inception b) Elaboration
c) Construction d) Transition
58. In a weather monitoring system the Observer pattern is implemented. The system has the
following components:
A WeatherStation object (subject) that notifies its observers whenever the temperature
changes.
There are 200 Display objects (observers) that are subscribed to the WeatherStation to receive
updates.
If each observer object stores the temperature (which is an integer) and has additional
overhead of 4 bytes per observer for other attributes, calculate the total memory required to
store all observer objects
a) 800 bytes b) 1200 bytes c) 1600 bytes d) 2000 bytes
Ver - B : CS/IS 7 of 12
59. _________________ Design pattern converts the interface of a class into another interface
clients expect
a) Bridge method b) Adapter method
c) Proxy method d) Decorator method
62. Which of the following is a type of software testing that checks the functionality of the
software in real-world scenarios?
a) Unit testing
b) Integration testing
c) System testing
d) User acceptance testing
64. Modifying a software after it has been put into use is known as
a) Software modification
b) Software change
c) Software reengineering
d) Software maintenance
65. If a system uses memory-mapped I/O, how much addressable memory is available if the
address bus is 16 bits and 256 I/O addresses are reserved?
a) 65,536 bytes b) 65,280 bytes
c) 32,768 bytes d) 32,512 bytes
66. Calculate the effective address for the instruction 'LOAD R1, 100(R2)' if the content of R2 is
200
a) 100 b) 200
c) 300 d) 400
67. Which of the following is an example of an I/O control method where the CPU polls each
device?
a) Interrupt-driven I/O
b) Direct Memory Access (DMA)
c) Programmed I/O
d) Memory-mapped I/O
Ver - B : CS/IS 8 of 12
68. Suppose you have coins of denominations 1, 3 and 4. You use a greedy algorithm, in which
you choose the largest denomination coin which is not greater than the remaining sum. For
which of the following sums, will the algorithm NOT produce an optimal answer?
a) 20 b) 6
c) 12 d) 5
71. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is ___________
a) Translation Lookaside Buffer’s
b) Registers
c) Page Tables
d) Cache
72. The bit used to signify that the cache location is updated is ________
a) Flag bit b) Reference bit
c) Update bit d) Dirty bit
73. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm
b) Floyd-Warshall algorithm
c) Depth First Search
d) Kruskal’s algorithm
74. In the N-Queens problem, what does backtracking do when a placed queen results in no valid
positions for the next queen?
a) Stops the program
b) Recalculates all possible placements for the queens
c) Removes the last placed queen and tries the next possibility
d) Ignores the invalid position and moves forward
75. Which data structures are used to formulate the Breadth-first Search (BFS)?
a) Stack b) Queue
c) Heap d) Linked List
Ver - B : CS/IS 9 of 12
76. Which strategy is used to handle deadlocks by ensuring that at least one of the necessary
conditions for deadlock does not hold?
a) Deadlock Avoidance
b) Deadlock Detection and Recovery
c) Deadlock Prevention
d) Process Termination
77. Which disk scheduling algorithm minimizes the total seek time?
a) First-Come, First-Served (FCFS)
b) Shortest Seek Time First (SSTF)
c) Elevator (SCAN)
d) Circular SCAN (C-SCAN)
79. A system digitizes an analog signal with a maximum frequency of 4 kHz. According to the
Nyquist theorem, what is the minimum sampling rate required to avoid aliasing?
a) 4 kHz b) 8 kHz c) 16 kHz d) 32 kHz
80. Using Go-Back-N ARQ with a window size of 4, how many frames can be sent before an
acknowledgment is required?
a) 1 frame b) 4 frames c) 5 frames d) 8 frames
a) 4 b) 8 c) 16 d) Runtime Error
82. A Binary search tree is generated by inserting the following elements in order,
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left sub tree and right sub tree of the root is ________
a) (4, 7) b) (7, 4) c) (8, 3) d) (3, 8)
83. A variant of the linked list in which none of the node contains NULL pointer is______
a) Singly linked list b) Doubly linked list
c) Circular linked list d) None
Ver - B : CS/IS 10 of 12
88. In the Rational Unified Process (RUP), which phase focuses on creating the architectural
foundation of the system?
a) Inception b) Elaboration
c) Construction d) Transition
89. Which type of testing ensures that previously developed and tested software still works after
changes?
a) Regression Testing b) Acceptance Testing
c) Integration Testing d) System Testing
90. Which of the following acts as a temporary storage location to hold an intermediate results for
mathematical and logical calculations
a) RAM b) Accumulator
c) Program counter d) Memory Address Register
91. Which layer in the OSI model is responsible for data presentation?
a) Network layer b) Session layer c) Presentation layer d) Transport layer
96. The five items: A, B, C, D, and E are pushed in a stack, one after other starting from A. The
stack is popped four times and each element is inserted in a queue. The two elements are
deleted from the queue and pushed back on the stack. Now one item is popped from the stack.
The popped item is__________
a) A b) B c) C d) D
97. If an array is declared as int arr[5][5], how many elements can it store?
a) 5 b) 25 c) 10 d) 0
99. If R is a relation on set A= {1, 2, 3, 4} defined by R= {(x,y) ∣ x+y=5}, then which pairs belong
to R?
a) {(1,4),(2,3),(3,2),(4,1)}
b) {(1, 4), (2, 3), (4, 1)}
c) {(1, 4), (2, 3), (3, 2)}
d) {(1, 3), (2, 3), (4, 1)}
100. What is the Cartesian product of set A and set B, if the set A = {1, 2} and set B = {a, b}?
a) { (1, a), (1, b), (2, a), (b, b) }
b) { (1, 1), (2, 2), (a, a), (b, b) }
c) { (1, a), (2, a), (1, b), (2, b) }
d) { (1, 1), (a, a), (2, a), (1, b) }
*****
Ver - B : CS/IS 12 of 12
1 a 11 b 21 b 31 c 41 a
2 b 12 c 22 c 32 a 42 a
3 b 13 b 23 a 33 b 43 b
4 a 14 c 24 c 34 d 44 c
5 c 15 c 25 b 35 d 45 c
6 a 16 b 26 a 36 b 46 c
7 d 17 d 27 b 37 c 47 d
8 d 18 a 28 c 38 b 48 c
9 b 19 b 29 b 39 b 49 d
10 c 20 c 30 b 40 b 50 b
PART – II
Q.No Answer Q.No Answer Q.No Answer Q.No Answer Q.No Answer
51 C 61 B 71 A 81 D 91 C
52 D 62 B 72 D 82 D 92 B
53 A 63 B 73 D 83 C 93 C
54 A 64 C 74 D 84 C 94 D
55 C 65 C 75 B 85 B 95 A
56 D 66 B 76 C 86 C 96 C
57 B 67 D 77 C 87 B 97 B
58 A 68 C 78 B 88 D 98 B
59 A 69 B 79 B 89 B 99 A
60 C 70 D 80 C 90 B 100 B
PART – I
(Research Methodology)
[50 Marks]
1. What does the analysis of variance (anova) primarily test for?
a) Differences in means across multiple groups
b) Differences in medians across two groups
c) Relationships between two variables
d) Equality of variances across groups
6. Which of the following is a key characteristic of dependent and independent variables in linear
regression?
a) Dependent variable is predicted by the independent variable.
b) Both dependent and independent variables are random variables.
c) Independent variables depend on dependent variables.
d) Dependent variables are not affected by independent variables.
7. What problem arises when independent variables in a multiple regression model are highly
correlated with each other?
a) Heteroscedasticity
b) Homoscedasticity
c) Autocorrelation
d) Multicollinearity
Ver - C : CS/IS 1 of 12
10. Which of the following is a key difference between R-type and Q-type factor analysis?
a) R-type focuses on factors affecting the variables, while Q-type analyzes the variables' impact
on the factors
b) R-type is used when analyzing observations across multiple time periods, while Q-type
focuses on cross-sectional data
c) R-type factor analysis is applied to variables, whereas Q-type is applied to cases
(individuals)
d) There is no significant difference between R-type and Q-type factor analysis
12. Which of the following steps is NOT part of the research process?
a) Defining the research problem
b) Reviewing related literature
c) Avoiding data collection
d) Formulating a hypothesis
15. Which research approach combines both qualitative and quantitative methods?
a) Descriptive research
b) Experimental research
c) Mixed-method research
d) Longitudinal research
Ver - C : CS/IS 2 of 12
20. Which type of research design is best for studying cause-and-effect relationships?
a) Descriptive design
b) Correlational design
c) Experimental design
d) Exploratory design
22. The probability of the occurrence of a single event, such as P(A) or P(B), which takes a specific
value irrespective of the values of other events, i.e. unconditioned on any other events, is called?
a) Unconditional Probability
b) Marginal Probability
c) Conditional Probability
d) Joint Probability
24. What does the Axiom of Probability P(S) = 1 mean, where S is the sample space?
a) The probability of any event is 0.
b) The probability of the sample space is 0.
c) The probability of the sample space is 1.
d) The probability of any event is 1.
Ver - C : CS/IS 3 of 12
28. Under which condition can the binomial distribution be approximated by a normal distribution?
a) When the number of trials is very small
b) When the probability of success is very high
c) When the probability of success is close to 0.5
d) When the trials are dependent
Ver - C : CS/IS 4 of 12
37. Which test is used to compare the means of two independent samples?
a) Chi-square test b) Z-test for proportion
c) Two-sample t-test d) ANOVA
39. Which hypothesis test is used to compare the variances of two populations?
a) Z-test for variance
b) F-test
c) Paired t-test
d) Chi-square test for independence
Ver - C : CS/IS 5 of 12
42. Which is a preferred sampling method for the population of a finite size.
a) Systematic sampling
b) Purposive Sampling
c) Cluster Sampling
d) Area Sampling
44. Which classification of measurement scale represents ordered categories but does not have a
true zero point?
a) Nominal scale b) Ordinal scale
c) Interval scale d) Ratio scale
45. Which method is most suitable for collecting primary data when studying behaviour over time?
a) Case study method
b) Experimental method
c) Longitudinal survey
d) Secondary data collection
46. Which of the following is NOT a step in the data preparation process?
a) Editing b) Coding c) Data collection d) Transcribing
48. Which measure of central tendency is best suited for categorical data?
a) Mean b) Median
c) Mode d) Standard deviation
*****
Ver - C : CS/IS 6 of 12
PART – II
Discipline Oriented Section
(Computer Science and Engineering /
Information Science and Engineering)
[50 MARKS]
51. Which layer in the OSI model is responsible for data presentation?
a) Network layer b) Session layer
c) Presentation layer d) Transport layer
56. The five items: A, B, C, D, and E are pushed in a stack, one after other starting from A. The
stack is popped four times and each element is inserted in a queue. The two elements are
deleted from the queue and pushed back on the stack. Now one item is popped from the stack.
The popped item is__________
a) A b) B c) C d) D
57. If an array is declared as int arr[5][5], how many elements can it store?
a) 5 b) 25 c) 10 d) 0
Ver - C : CS/IS 7 of 12
59. If R is a relation on set A= {1, 2, 3, 4} defined by R= {(x,y) ∣ x+y=5}, then which pairs belong
to R?
a) {(1,4),(2,3),(3,2),(4,1)}
b) {(1, 4), (2, 3), (4, 1)}
c) {(1, 4), (2, 3), (3, 2)}
d) {(1, 3), (2, 3), (4, 1)}
60. What is the Cartesian product of set A and set B, if the set A = {1, 2} and set B = {a, b}?
a) { (1, a), (1, b), (2, a), (b, b) }
b) { (1, 1), (2, 2), (a, a), (b, b) }
c) { (1, a), (2, a), (1, b), (2, b) }
d) { (1, 1), (a, a), (2, a), (1, b) }
61. What is the main disadvantage of the SSTF (Shortest Seek Time First) disk scheduling
algorithm?
a) It increases seek time compared to FCFS
b) It causes starvation for distant requests
c) It requires additional hardware support
d) It is less efficient than SCAN
62. Which of the following replacement policies suffers from Belady's anomaly?
a) LRU b) FIFO c) Optimal d) NRU
64. Which protocol type does Wi-Fi use for media access control?
a) FDMA b) CDMA c) CSMA/CA d) TDMA
65. In Ethernet addressing, if all the bits are 1s, the address is ____________
a) Unicast b) Multicast c) Broadcast d) None of these
67. Which phase of the Unified Process involves deploying the system to its users?
a) Inception b) Elaboration c) Construction d) Transition
Ver - C : CS/IS 8 of 12
68. In a weather monitoring system the Observer pattern is implemented. The system has the
following components:
A WeatherStation object (subject) that notifies its observers whenever the temperature
changes.
There are 200 Display objects (observers) that are subscribed to the WeatherStation to receive
updates.
If each observer object stores the temperature (which is an integer) and has additional
overhead of 4 bytes per observer for other attributes, calculate the total memory required to
store all observer objects
a) 800 bytes b) 1200 bytes c) 1600 bytes d) 2000 bytes
69. _________________ Design pattern converts the interface of a class into another interface
clients expect
a) Bridge method b) Adapter method c) Proxy method d) Decorator method
72. Which of the following is a type of software testing that checks the functionality of the
software in real-world scenarios?
a) Unit testing
b) Integration testing
c) System testing
d) User acceptance testing
74. Modifying a software after it has been put into use is known as
a) Software modification
b) Software change
c) Software reengineering
d) Software maintenance
75. If a system uses memory-mapped I/O, how much addressable memory is available if the
address bus is 16 bits and 256 I/O addresses are reserved?
a) 65,536 bytes b) 65,280 bytes c) 32,768 bytes d) 32,512 bytes
76. Calculate the effective address for the instruction 'LOAD R1, 100(R2)' if the content of R2 is
200
a) 100 b) 200 c) 300 d) 400
Ver - C : CS/IS 9 of 12
77. Which of the following is an example of an I/O control method where the CPU polls each
device?
a) Interrupt-driven I/O
b) Direct Memory Access (DMA)
c) Programmed I/O
d) Memory-mapped I/O
78. Suppose you have coins of denominations 1, 3 and 4. You use a greedy algorithm, in which
you choose the largest denomination coin which is not greater than the remaining sum. For
which of the following sums, will the algorithm NOT produce an optimal answer?
a) 20 b) 6 c) 12 d) 5
81. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is ___________
a) Translation Lookaside Buffer’s
b) Registers
c) Page Tables
d) Cache
82. The bit used to signify that the cache location is updated is ________
a) Flag bit b) Reference bit
c) Update bit d) Dirty bit
83. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm
b) Floyd-Warshall algorithm
c) Depth First Search
d) Kruskal’s algorithm
84. In the N-Queens problem, what does backtracking do when a placed queen results in no valid
positions for the next queen?
a) Stops the program
b) Recalculates all possible placements for the queens
c) Removes the last placed queen and tries the next possibility
d) Ignores the invalid position and moves forward
85. Which data structures are used to formulate the Breadth-first Search (BFS)?
a) Stack b) Queue c) Heap d) Linked List
Ver - C : CS/IS 10 of 12
86. Which strategy is used to handle deadlocks by ensuring that at least one of the necessary
conditions for deadlock does not hold?
a) Deadlock Avoidance
b) Deadlock Detection and Recovery
c) Deadlock Prevention
d) Process Termination
87. Which disk scheduling algorithm minimizes the total seek time?
a) First-Come, First-Served (FCFS)
b) Shortest Seek Time First (SSTF)
c) Elevator (SCAN)
d) Circular SCAN (C-SCAN)
89. A system digitizes an analog signal with a maximum frequency of 4 kHz. According to the
Nyquist theorem, what is the minimum sampling rate required to avoid aliasing?
a) 4 kHz b) 8 kHz c) 16 kHz d) 32 kHz
90. Using Go-Back-N ARQ with a window size of 4, how many frames can be sent before an
acknowledgment is required?
a) 1 frame b) 4 frames c) 5 frames d) 8 frames
a) 4 b) 8 c) 16 d) Runtime Error
92. A Binary search tree is generated by inserting the following elements in order,
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left sub tree and right sub tree of the root is ________
a) (4, 7) b) (7, 4) c) (8, 3) d) (3, 8)
Ver - C : CS/IS 11 of 12
93. A variant of the linked list in which none of the node contains NULL pointer is______
a) Singly linked list b) Doubly linked list
c) Circular linked list d) None
98. In the Rational Unified Process (RUP), which phase focuses on creating the architectural
foundation of the system?
a) Inception b) Elaboration c) Construction d) Transition
99. Which type of testing ensures that previously developed and tested software still works after
changes?
a) Regression Testing b) Acceptance Testing
c) Integration Testing d) System Testing
100. Which of the following acts as a temporary storage location to hold an intermediate results for
mathematical and logical calculations
a) RAM
b) Accumulator
c) Program counter
d) Memory Address Register
*****
Ver - C : CS/IS 12 of 12
1 c 11 b 21 a 31 a 41 b
2 a 12 c 22 b 32 a 42 c
3 b 13 a 23 b 33 b 43 b
4 d 14 c 24 a 34 c 44 c
5 d 15 b 25 c 35 c 45 c
6 b 16 a 26 a 36 c 46 b
7 c 17 b 27 d 37 d 47 d
8 b 18 c 28 d 38 c 48 a
9 b 19 b 29 b 39 d 49 b
10 b 20 b 30 c 40 b 50 c
PART – II
Q.No Answer Q.No Answer Q.No Answer Q.No Answer Q.No Answer
51 A 61 C 71 B 81 C 91 D
52 D 62 B 72 B 82 D 92 D
53 D 63 C 73 B 83 A 93 C
54 D 64 D 74 C 84 A 94 C
55 B 65 A 75 C 85 C 95 B
56 C 66 C 76 B 86 D 96 C
57 C 67 B 77 D 87 B 97 B
58 B 68 B 78 C 88 A 98 D
59 B 69 A 79 B 89 A 99 B
60 C 70 B 80 D 90 C 100 B
PART – I
(Research Methodology)
[50 Marks]
1. Which of the following is an example of a non-sampling error?
a) Errors in calculating the standard error b) Errors due to small sample size
c) Errors due to incomplete responses d) Errors caused by random sampling
Ver - D : CS/IS 1 of 12
12. The probability of the occurrence of a single event, such as P(A) or P(B), which takes a specific
value irrespective of the values of other events, i.e. unconditioned on any other events, is called?
a) Unconditional Probability
b) Marginal Probability
c) Conditional Probability
d) Joint Probability
14. What does the Axiom of Probability P(S) = 1 mean, where S is the sample space?
a) The probability of any event is 0.
b) The probability of the sample space is 0.
c) The probability of the sample space is 1.
d) The probability of any event is 1.
Ver - D : CS/IS 2 of 12
18. Under which condition can the binomial distribution be approximated by a normal distribution?
a) When the number of trials is very small
b) When the probability of success is very high
c) When the probability of success is close to 0.5
d) When the trials are dependent
21. What does the analysis of variance (anova) primarily test for?
a) Differences in means across multiple groups
b) Differences in medians across two groups
c) Relationships between two variables
d) Equality of variances across groups
22. What is the main difference between one-way and two-way ANOVA?
a) One-way ANOVA tests one group, while two-way ANOVA tests two groups
b) One-way ANOVA examines one independent variable, while two-way ANOVA examines
two independent variables
c) Two-way ANOVA is only for experimental designs
d) One-way ANOVA includes interaction effects
Ver - D : CS/IS 3 of 12
26. Which of the following is a key characteristic of dependent and independent variables in linear
regression?
a) Dependent variable is predicted by the independent variable.
b) Both dependent and independent variables are random variables.
c) Independent variables depend on dependent variables.
d) Dependent variables are not affected by independent variables.
27. What problem arises when independent variables in a multiple regression model are highly
correlated with each other?
a) Heteroscedasticity
b) Homoscedasticity
c) Autocorrelation
d) Multicollinearity
30. Which of the following is a key difference between R-type and Q-type factor analysis?
a) R-type focuses on factors affecting the variables, while Q-type analyzes the variables' impact
on the factors
b) R-type is used when analyzing observations across multiple time periods, while Q-type
focuses on cross-sectional data
c) R-type factor analysis is applied to variables, whereas Q-type is applied to cases
(individuals)
d) There is no significant difference between R-type and Q-type factor analysis
32. Which is a preferred sampling method for the population of a finite size.
a) Systematic sampling
b) Purposive Sampling
c) Cluster Sampling
d) Area Sampling
Ver - D : CS/IS 4 of 12
34. Which classification of measurement scale represents ordered categories but does not have a
true zero point?
a) Nominal scale b) Ordinal scale
c) Interval scale d) Ratio scale
35. Which method is most suitable for collecting primary data when studying behaviour over time?
a) Case study method
b) Experimental method
c) Longitudinal survey
d) Secondary data collection
36. Which of the following is NOT a step in the data preparation process?
a) Editing b) Coding c) Data collection d) Transcribing
38. Which measure of central tendency is best suited for categorical data?
a) Mean b) Median c) Mode d) Standard deviation
42. Which of the following steps is NOT part of the research process?
a) Defining the research problem
b) Reviewing related literature
c) Avoiding data collection
d) Formulating a hypothesis
Ver - D : CS/IS 5 of 12
45. Which research approach combines both qualitative and quantitative methods?
a) Descriptive research
b) Experimental research
c) Mixed-method research
d) Longitudinal research
*****
Ver - D : CS/IS 6 of 12
PART – II
Discipline Oriented Section
(Computer Science and Engineering /
Information Science and Engineering)
[50 MARKS]
52. Which of the following is a type of software testing that checks the functionality of the
software in real-world scenarios?
a) Unit testing
b) Integration testing
c) System testing
d) User acceptance testing
54. Modifying a software after it has been put into use is known as
a) Software modification
b) Software change
c) Software reengineering
d) Software maintenance
55. If a system uses memory-mapped I/O, how much addressable memory is available if the
address bus is 16 bits and 256 I/O addresses are reserved?
a) 65,536 bytes b) 65,280 bytes
c) 32,768 bytes d) 32,512 bytes
56. Calculate the effective address for the instruction 'LOAD R1, 100(R2)' if the content of R2 is
200
a) 100 b) 200 c) 300 d) 400
57. Which of the following is an example of an I/O control method where the CPU polls each
device?
a) Interrupt-driven I/O
b) Direct Memory Access (DMA)
c) Programmed I/O
d) Memory-mapped I/O
58. Suppose you have coins of denominations 1, 3 and 4. You use a greedy algorithm, in which
you choose the largest denomination coin which is not greater than the remaining sum. For
which of the following sums, will the algorithm NOT produce an optimal answer?
a) 20 b) 6 c) 12 d) 5
Ver - D : CS/IS 7 of 12
a) 4 b) 8 c) 16 d) Runtime Error
62. A Binary search tree is generated by inserting the following elements in order,
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left sub tree and right sub tree of the root is ________
a) (4, 7) b) (7, 4) c) (8, 3) d) (3, 8)
63. A variant of the linked list in which none of the node contains NULL pointer is______
a) Singly linked list b) Doubly linked list
c) Circular linked list d) None
Ver - D : CS/IS 8 of 12
68. In the Rational Unified Process (RUP), which phase focuses on creating the architectural
foundation of the system?
a) Inception b) Elaboration
c) Construction d) Transition
69. Which type of testing ensures that previously developed and tested software still works after
changes?
a) Regression Testing b) Acceptance Testing
c) Integration Testing d) System Testing
70. Which of the following acts as a temporary storage location to hold an intermediate results for
mathematical and logical calculations
a) RAM b) Accumulator
c) Program counter d) Memory Address Register
71. What is the main disadvantage of the SSTF (Shortest Seek Time First) disk scheduling
algorithm?
a) It increases seek time compared to FCFS
b) It causes starvation for distant requests
c) It requires additional hardware support
d) It is less efficient than SCAN
72. Which of the following replacement policies suffers from Belady's anomaly?
a) LRU b) FIFO
c) Optimal d) NRU
74. Which protocol type does Wi-Fi use for media access control?
a) FDMA b) CDMA
c) CSMA/CA d) TDMA
75. In Ethernet addressing, if all the bits are 1s, the address is ____________
a) Unicast b) Multicast
c) Broadcast d) None of these
77. Which phase of the Unified Process involves deploying the system to its users?
a) Inception b) Elaboration
c) Construction d) Transition
Ver - D : CS/IS 9 of 12
78. In a weather monitoring system the Observer pattern is implemented. The system has the
following components:
A WeatherStation object (subject) that notifies its observers whenever the temperature
changes.
There are 200 Display objects (observers) that are subscribed to the WeatherStation to receive
updates.
If each observer object stores the temperature (which is an integer) and has additional
overhead of 4 bytes per observer for other attributes, calculate the total memory required to
store all observer objects
a) 800 bytes b) 1200 bytes c) 1600 bytes d) 2000 bytes
79. _________________ Design pattern converts the interface of a class into another interface
clients expect
a) Bridge method
b) Adapter method
c) Proxy method
d) Decorator method
81. Which layer in the OSI model is responsible for data presentation?
a) Network layer
b) Session layer
c) Presentation layer
d) Transport layer
Ver - D : CS/IS 10 of 12
86. The five items: A, B, C, D, and E are pushed in a stack, one after other starting from A. The
stack is popped four times and each element is inserted in a queue. The two elements are
deleted from the queue and pushed back on the stack. Now one item is popped from the stack.
The popped item is__________
a) A b) B c) C d) D
87. If an array is declared as int arr[5][5], how many elements can it store?
a) 5 b) 25 c) 10 d) 0
89. If R is a relation on set A= {1, 2, 3, 4} defined by R= {(x,y) ∣ x+y=5}, then which pairs belong
to R?
a) {(1,4),(2,3),(3,2),(4,1)}
b) {(1, 4), (2, 3), (4, 1)}
c) {(1, 4), (2, 3), (3, 2)}
d) {(1, 3), (2, 3), (4, 1)}
90. What is the Cartesian product of set A and set B, if the set A = {1, 2} and set B = {a, b}?
a) { (1, a), (1, b), (2, a), (b, b) }
b) { (1, 1), (2, 2), (a, a), (b, b) }
c) { (1, a), (2, a), (1, b), (2, b) }
d) { (1, 1), (a, a), (2, a), (1, b) }
91. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is ___________
a) Translation Lookaside Buffer’s
b) Registers
c) Page Tables
d) Cache
92. The bit used to signify that the cache location is updated is ________
a) Flag bit b) Reference bit
c) Update bit d) Dirty bit
93. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm
b) Floyd-Warshall algorithm
c) Depth First Search
d) Kruskal’s algorithm
Ver - D : CS/IS 11 of 12
94. In the N-Queens problem, what does backtracking do when a placed queen results in no valid
positions for the next queen?
a) Stops the program
b) Recalculates all possible placements for the queens
c) Removes the last placed queen and tries the next possibility
d) Ignores the invalid position and moves forward
95. Which data structures are used to formulate the Breadth-first Search (BFS)?
a) Stack
b) Queue
c) Heap
d) Linked List
96. Which strategy is used to handle deadlocks by ensuring that at least one of the necessary
conditions for deadlock does not hold?
a) Deadlock Avoidance
b) Deadlock Detection and Recovery
c) Deadlock Prevention
d) Process Termination
97. Which disk scheduling algorithm minimizes the total seek time?
a) First-Come, First-Served (FCFS)
b) Shortest Seek Time First (SSTF)
c) Elevator (SCAN)
d) Circular SCAN (C-SCAN)
99. A system digitizes an analog signal with a maximum frequency of 4 kHz. According to the
Nyquist theorem, what is the minimum sampling rate required to avoid aliasing?
a) 4 kHz b) 8 kHz
c) 16 kHz d) 32 kHz
100. Using Go-Back-N ARQ with a window size of 4, how many frames can be sent before an
acknowledgment is required?
a) 1 frame b) 4 frames
c) 5 frames d) 8 frames
*****
Ver - D : CS/IS 12 of 12