Vtu 2025
Vtu 2025
10. Which type of research design is best for studying cause-and-effect relationships?
a) Descriptive design b) Correlational design
c) Experimental design d) Exploratory design
Ver - A : CS/IS 1 of 12
12. Which is a preferred sampling method for the population of a finite size.
a) Systematic sampling
b) Purposive Sampling
c) Cluster Sampling
d) Area Sampling
14. Which classification of measurement scale represents ordered categories but does not have a
true zero point?
a) Nominal scale b) Ordinal scale
c) Interval scale d) Ratio scale
15. Which method is most suitable for collecting primary data when studying behaviour over time?
a) Case study method
b) Experimental method
c) Longitudinal survey
d) Secondary data collection
16. Which of the following is NOT a step in the data preparation process?
a) Editing b) Coding
c) Data collection d) Transcribing
18. Which measure of central tendency is best suited for categorical data?
a) Mean b) Median c) Mode d) Standard deviation
27. Which test is used to compare the means of two independent samples?
a) Chi-square test
b) Z-test for proportion
c) Two-sample t-test
d) ANOVA
29. Which hypothesis test is used to compare the variances of two populations?
a) Z-test for variance
b) F-test
c) Paired t-test
d) Chi-square test for independence
Ver - A : CS/IS 3 of 12
30. What is a null hypothesis (H0)?
a) A hypothesis that predicts a significant relationship between variables
b) A hypothesis that states there is no significant effect or relationship
c) A hypothesis tested only for large samples
d) A hypothesis that must always be true
31. What does the analysis of variance (anova) primarily test for?
a) Differences in means across multiple groups
b) Differences in medians across two groups
c) Relationships between two variables
d) Equality of variances across groups
32. What is the main difference between one-way and two-way ANOVA?
a) One-way ANOVA tests one group, while two-way ANOVA tests two groups
b) One-way ANOVA examines one independent variable, while two-way ANOVA examines
two independent variables
c) Two-way ANOVA is only for experimental designs
d) One-way ANOVA includes interaction effects
36. Which of the following is a key characteristic of dependent and independent variables in linear
regression?
a) Dependent variable is predicted by the independent variable.
b) Both dependent and independent variables are random variables.
c) Independent variables depend on dependent variables.
d) Dependent variables are not affected by independent variables.
37. What problem arises when independent variables in a multiple regression model are highly
correlated with each other?
a) Heteroscedasticity
b) Homoscedasticity
c) Autocorrelation
d) Multicollinearity
Ver - A : CS/IS 4 of 12
38. Which of the following is an example of a qualitative explanatory variable in regression
analysis?
a) Age of a person
b) Height of an individual
c) Weight of an individual
d) Type of education (e.g., High School, College, Graduate)
40. Which of the following is a key difference between R-type and Q-type factor analysis?
a) R-type focuses on factors affecting the variables, while Q-type analyzes the variables' impact
on the factors
b) R-type is used when analyzing observations across multiple time periods, while Q-type
focuses on cross-sectional data
c) R-type factor analysis is applied to variables, whereas Q-type is applied to cases
(individuals)
d) There is no significant difference between R-type and Q-type factor analysis
42. The probability of the occurrence of a single event, such as P(A) or P(B), which takes a specific
value irrespective of the values of other events, i.e. unconditioned on any other events, is called?
a) Unconditional Probability
b) Marginal Probability
c) Conditional Probability
d) Joint Probability
44. What does the Axiom of Probability P(S) = 1 mean, where S is the sample space?
a) The probability of any event is 0.
b) The probability of the sample space is 0.
c) The probability of the sample space is 1.
d) The probability of any event is 1.
Ver - A : CS/IS 5 of 12
45. Which of the following is true about a random variable?
a) It takes a fixed set of values.
b) It is a function that assigns a numerical value to each outcome in a sample space.
c) It has a deterministic relationship with other random variables.
d) It is not subject to probability distributions.
48. Under which condition can the binomial distribution be approximated by a normal distribution?
a) When the number of trials is very small
b) When the probability of success is very high
c) When the probability of success is close to 0.5
d) When the trials are dependent
*****
Ver - A : CS/IS 6 of 12
PART – II
Discipline Oriented Section
(Computer Science and Engineering /
Information Science and Engineering)
[50 MARKS]
a) 4 b) 8 c) 16 d) Runtime Error
52. A Binary search tree is generated by inserting the following elements in order,
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left sub tree and right sub tree of the root is ________
a) (4, 7) b) (7, 4) c) (8, 3) d) (3, 8)
53. A variant of the linked list in which none of the node contains NULL pointer is______
a) Singly linked list
b) Doubly linked list
c) Circular linked list
d) None
Ver - A : CS/IS 7 of 12
57. What is the purpose of a Use Case Diagram in UML?
a) To model the flow of data within the system
b) To show the system’s interactions with external entities
c) To define the class structure of the system
d) To represent the system's behavior over time
58. In the Rational Unified Process (RUP), which phase focuses on creating the architectural
foundation of the system?
a) Inception b) Elaboration
c) Construction d) Transition
59. Which type of testing ensures that previously developed and tested software still works after
changes?
a) Regression Testing
b) Acceptance Testing
c) Integration Testing
d) System Testing
60. Which of the following acts as a temporary storage location to hold an intermediate results for
mathematical and logical calculations
a) RAM
b) Accumulator
c) Program counter
d) Memory Address Register
61. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is ___________
a) Translation Lookaside Buffer’s
b) Registers
c) Page Tables
d) Cache
62. The bit used to signify that the cache location is updated is ________
a) Flag bit b) Reference bit
c) Update bit d) Dirty bit
63. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm
b) Floyd-Warshall algorithm
c) Depth First Search
d) Kruskal’s algorithm
64. In the N-Queens problem, what does backtracking do when a placed queen results in no valid
positions for the next queen?
a) Stops the program
b) Recalculates all possible placements for the queens
c) Removes the last placed queen and tries the next possibility
d) Ignores the invalid position and moves forward
65. Which data structures are used to formulate the Breadth-first Search (BFS)?
a) Stack b) Queue c) Heap d) Linked List
Ver - A : CS/IS 8 of 12
66. Which strategy is used to handle deadlocks by ensuring that at least one of the necessary
conditions for deadlock does not hold?
a) Deadlock Avoidance
b) Deadlock Detection and Recovery
c) Deadlock Prevention
d) Process Termination
67. Which disk scheduling algorithm minimizes the total seek time?
a) First-Come, First-Served (FCFS)
b) Shortest Seek Time First (SSTF)
c) Elevator (SCAN)
d) Circular SCAN (C-SCAN)
69. A system digitizes an analog signal with a maximum frequency of 4 kHz. According to the
Nyquist theorem, what is the minimum sampling rate required to avoid aliasing?
a) 4 kHz b) 8 kHz
c) 16 kHz d) 32 kHz
70. Using Go-Back-N ARQ with a window size of 4, how many frames can be sent before an
acknowledgment is required?
a) 1 frame b) 4 frames c) 5 frames d) 8 frames
71. Which layer in the OSI model is responsible for data presentation?
a) Network layer b) Session layer
c) Presentation layer d) Transport layer
Ver - A : CS/IS 9 of 12
74. The purpose of the factory method design pattern is to _______
a) To define an interface for creating objects without specifying their concrete classes
b) To encapsulate object creation
c) To manage object destruction
d) To provide a way for multiple inheritance
76. The five items: A, B, C, D, and E are pushed in a stack, one after other starting from A. The
stack is popped four times and each element is inserted in a queue. The two elements are
deleted from the queue and pushed back on the stack. Now one item is popped from the stack.
The popped item is__________
a) A b) B c) C d) D
77. If an array is declared as int arr[5][5], how many elements can it store?
a) 5 b) 25 c) 10 d) 0
79. If R is a relation on set A= {1, 2, 3, 4} defined by R= {(x,y) ∣ x+y=5}, then which pairs belong
to R?
a) {(1,4),(2,3),(3,2),(4,1)}
b) {(1, 4), (2, 3), (4, 1)}
c) {(1, 4), (2, 3), (3, 2)}
d) {(1, 3), (2, 3), (4, 1)}
80. What is the Cartesian product of set A and set B, if the set A = {1, 2} and set B = {a, b}?
a) { (1, a), (1, b), (2, a), (b, b) }
b) { (1, 1), (2, 2), (a, a), (b, b) }
c) { (1, a), (2, a), (1, b), (2, b) }
d) { (1, 1), (a, a), (2, a), (1, b) }
84. Modifying a software after it has been put into use is known as
a) Software modification b) Software change
c) Software reengineering d) Software maintenance
85. If a system uses memory-mapped I/O, how much addressable memory is available if the
address bus is 16 bits and 256 I/O addresses are reserved?
a) 65,536 bytes b) 65,280 bytes c) 32,768 bytes d) 32,512 bytes
86. Calculate the effective address for the instruction 'LOAD R1, 100(R2)' if the content of R2 is
200
a) 100 b) 200 c) 300 d) 400
87. Which of the following is an example of an I/O control method where the CPU polls each
device?
a) Interrupt-driven I/O
b) Direct Memory Access (DMA)
c) Programmed I/O
d) Memory-mapped I/O
88. Suppose you have coins of denominations 1, 3 and 4. You use a greedy algorithm, in which
you choose the largest denomination coin which is not greater than the remaining sum. For
which of the following sums, will the algorithm NOT produce an optimal answer?
a) 20 b) 6 c) 12 d) 5
91. What is the main disadvantage of the SSTF (Shortest Seek Time First) disk scheduling
algorithm?
a) It increases seek time compared to FCFS
b) It causes starvation for distant requests
c) It requires additional hardware support
d) It is less efficient than SCAN
92. Which of the following replacement policies suffers from Belady's anomaly?
a) LRU b) FIFO c) Optimal d) NRU
Ver - A : CS/IS 11 of 12
93. Thrashing occurs when :
a) The CPU is overloaded
b) Processes spend more time paging than executing
c) All processes are in a ready state
d) There is insufficient CPU scheduling
94. Which protocol type does Wi-Fi use for media access control?
a) FDMA b) CDMA c) CSMA/CA d) TDMA
95. In Ethernet addressing, if all the bits are 1s, the address is ____________
a) Unicast b) Multicast c) Broadcast d) None of these
97. Which phase of the Unified Process involves deploying the system to its users?
a) Inception b) Elaboration
c) Construction d) Transition
98. In a weather monitoring system the Observer pattern is implemented. The system has the
following components:
A WeatherStation object (subject) that notifies its observers whenever the temperature
changes.
There are 200 Display objects (observers) that are subscribed to the WeatherStation to receive
updates.
If each observer object stores the temperature (which is an integer) and has additional
overhead of 4 bytes per observer for other attributes, calculate the total memory required to
store all observer objects
a) 800 bytes b) 1200 bytes c) 1600 bytes d) 2000 bytes
99. _________________ Design pattern converts the interface of a class into another interface
clients expect
a) Bridge method b) Adapter method
c) Proxy method d) Decorator method
*****
Ver - A : CS/IS 12 of 12
VTU-ETR Seat No. Question Paper Version : B
2. The probability of the occurrence of a single event, such as P(A) or P(B), which takes a specific
value irrespective of the values of other events, i.e. unconditioned on any other events, is called?
a) Unconditional Probability b) Marginal Probability
c) Conditional Probability d) Joint Probability
4. What does the Axiom of Probability P(S) = 1 mean, where S is the sample space?
a) The probability of any event is 0.
b) The probability of the sample space is 0.
c) The probability of the sample space is 1.
d) The probability of any event is 1.
8. Under which condition can the binomial distribution be approximated by a normal distribution?
a) When the number of trials is very small
b) When the probability of success is very high
c) When the probability of success is close to 0.5
d) When the trials are dependent
Ver - B : CS/IS 1 of 12
9. The Poisson distribution is typically used to model:
a) The number of successes in a fixed number of trials
b) The number of events occurring in a fixed interval of time or space
c) The time between events in a Poisson process
d) The number of distinct outcomes in a discrete sample
11. What does the analysis of variance (anova) primarily test for?
a) Differences in means across multiple groups
b) Differences in medians across two groups
c) Relationships between two variables
d) Equality of variances across groups
12. What is the main difference between one-way and two-way ANOVA?
a) One-way ANOVA tests one group, while two-way ANOVA tests two groups
b) One-way ANOVA examines one independent variable, while two-way ANOVA examines
two independent variables
c) Two-way ANOVA is only for experimental designs
d) One-way ANOVA includes interaction effects
16. Which of the following is a key characteristic of dependent and independent variables in linear
regression?
a) Dependent variable is predicted by the independent variable.
b) Both dependent and independent variables are random variables.
c) Independent variables depend on dependent variables.
d) Dependent variables are not affected by independent variables.
Ver - B : CS/IS 2 of 12
17. What problem arises when independent variables in a multiple regression model are highly
correlated with each other?
a) Heteroscedasticity
b) Homoscedasticity
c) Autocorrelation
d) Multicollinearity
20. Which of the following is a key difference between R-type and Q-type factor analysis?
a) R-type focuses on factors affecting the variables, while Q-type analyzes the variables' impact
on the factors
b) R-type is used when analyzing observations across multiple time periods, while Q-type
focuses on cross-sectional data
c) R-type factor analysis is applied to variables, whereas Q-type is applied to cases
(individuals)
d) There is no significant difference between R-type and Q-type factor analysis
22. Which is a preferred sampling method for the population of a finite size.
a) Systematic sampling
b) Purposive Sampling
c) Cluster Sampling
d) Area Sampling
24. Which classification of measurement scale represents ordered categories but does not have a
true zero point?
a) Nominal scale b) Ordinal scale
c) Interval scale d) Ratio scale
Ver - B : CS/IS 3 of 12
25. Which method is most suitable for collecting primary data when studying behaviour over time?
a) Case study method
b) Experimental method
c) Longitudinal survey
d) Secondary data collection
26. Which of the following is NOT a step in the data preparation process?
a) Editing
b) Coding
c) Data collection
d) Transcribing
28. Which measure of central tendency is best suited for categorical data?
a) Mean
b) Median
c) Mode
d) Standard deviation
32. Which of the following steps is NOT part of the research process?
a) Defining the research problem
b) Reviewing related literature
c) Avoiding data collection
d) Formulating a hypothesis
Ver - B : CS/IS 4 of 12
33. Which of the following is NOT a characteristic of good research?
a) Systematic and logical
b) Based on subjective interpretation
c) Replicable and verifiable
d) Directed towards problem-solving
35. Which research approach combines both qualitative and quantitative methods?
a) Descriptive research
b) Experimental research
c) Mixed-method research
d) Longitudinal research
40. Which type of research design is best for studying cause-and-effect relationships?
a) Descriptive design
b) Correlational design
c) Experimental design
d) Exploratory design
Ver - B : CS/IS 5 of 12
42. What does the Central Limit Theorem state?
a) The sampling distribution of the mean approaches a normal distribution as sample size
increases
b) The mean of the population equals the mean of the sample
c) The variance of the population is less than that of the sample
d) The sampling method used always determines the distribution
43. What is the standard error?
a) The difference between the sample mean and population mean
b) The standard deviation of the sampling distribution
c) The sum of all errors in data collection
d) The variance of a data set
44. What is the main goal of statistical inference?
a) To describe the collected data
b) To evaluate the quality of the data
c) To calculate the mean of the sample
d) To make predictions about the population based on the sample
47. Which test is used to compare the means of two independent samples?
a) Chi-square test b) Z-test for proportion
c) Two-sample t-test d) ANOVA
49. Which hypothesis test is used to compare the variances of two populations?
a) Z-test for variance b) F-test
c) Paired t-test d) Chi-square test for independence
Ver - B : CS/IS 6 of 12
PART – II
Discipline Oriented Section
(Computer Science and Engineering /
Information Science and Engineering)
[50 MARKS]
51. What is the main disadvantage of the SSTF (Shortest Seek Time First) disk scheduling
algorithm?
a) It increases seek time compared to FCFS
b) It causes starvation for distant requests
c) It requires additional hardware support
d) It is less efficient than SCAN
52. Which of the following replacement policies suffers from Belady's anomaly?
a) LRU b) FIFO c) Optimal d) NRU
54. Which protocol type does Wi-Fi use for media access control?
a) FDMA b) CDMA c) CSMA/CA d) TDMA
55. In Ethernet addressing, if all the bits are 1s, the address is ____________
a) Unicast b) Multicast c) Broadcast d) None of these
57. Which phase of the Unified Process involves deploying the system to its users?
a) Inception b) Elaboration
c) Construction d) Transition
58. In a weather monitoring system the Observer pattern is implemented. The system has the
following components:
A WeatherStation object (subject) that notifies its observers whenever the temperature
changes.
There are 200 Display objects (observers) that are subscribed to the WeatherStation to receive
updates.
If each observer object stores the temperature (which is an integer) and has additional
overhead of 4 bytes per observer for other attributes, calculate the total memory required to
store all observer objects
a) 800 bytes b) 1200 bytes c) 1600 bytes d) 2000 bytes
Ver - B : CS/IS 7 of 12
59. _________________ Design pattern converts the interface of a class into another interface
clients expect
a) Bridge method b) Adapter method
c) Proxy method d) Decorator method
62. Which of the following is a type of software testing that checks the functionality of the
software in real-world scenarios?
a) Unit testing
b) Integration testing
c) System testing
d) User acceptance testing
64. Modifying a software after it has been put into use is known as
a) Software modification
b) Software change
c) Software reengineering
d) Software maintenance
65. If a system uses memory-mapped I/O, how much addressable memory is available if the
address bus is 16 bits and 256 I/O addresses are reserved?
a) 65,536 bytes b) 65,280 bytes
c) 32,768 bytes d) 32,512 bytes
66. Calculate the effective address for the instruction 'LOAD R1, 100(R2)' if the content of R2 is
200
a) 100 b) 200
c) 300 d) 400
67. Which of the following is an example of an I/O control method where the CPU polls each
device?
a) Interrupt-driven I/O
b) Direct Memory Access (DMA)
c) Programmed I/O
d) Memory-mapped I/O
Ver - B : CS/IS 8 of 12
68. Suppose you have coins of denominations 1, 3 and 4. You use a greedy algorithm, in which
you choose the largest denomination coin which is not greater than the remaining sum. For
which of the following sums, will the algorithm NOT produce an optimal answer?
a) 20 b) 6
c) 12 d) 5
71. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is ___________
a) Translation Lookaside Buffer’s
b) Registers
c) Page Tables
d) Cache
72. The bit used to signify that the cache location is updated is ________
a) Flag bit b) Reference bit
c) Update bit d) Dirty bit
73. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm
b) Floyd-Warshall algorithm
c) Depth First Search
d) Kruskal’s algorithm
74. In the N-Queens problem, what does backtracking do when a placed queen results in no valid
positions for the next queen?
a) Stops the program
b) Recalculates all possible placements for the queens
c) Removes the last placed queen and tries the next possibility
d) Ignores the invalid position and moves forward
75. Which data structures are used to formulate the Breadth-first Search (BFS)?
a) Stack b) Queue
c) Heap d) Linked List
Ver - B : CS/IS 9 of 12
76. Which strategy is used to handle deadlocks by ensuring that at least one of the necessary
conditions for deadlock does not hold?
a) Deadlock Avoidance
b) Deadlock Detection and Recovery
c) Deadlock Prevention
d) Process Termination
77. Which disk scheduling algorithm minimizes the total seek time?
a) First-Come, First-Served (FCFS)
b) Shortest Seek Time First (SSTF)
c) Elevator (SCAN)
d) Circular SCAN (C-SCAN)
79. A system digitizes an analog signal with a maximum frequency of 4 kHz. According to the
Nyquist theorem, what is the minimum sampling rate required to avoid aliasing?
a) 4 kHz b) 8 kHz c) 16 kHz d) 32 kHz
80. Using Go-Back-N ARQ with a window size of 4, how many frames can be sent before an
acknowledgment is required?
a) 1 frame b) 4 frames c) 5 frames d) 8 frames
a) 4 b) 8 c) 16 d) Runtime Error
82. A Binary search tree is generated by inserting the following elements in order,
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left sub tree and right sub tree of the root is ________
a) (4, 7) b) (7, 4) c) (8, 3) d) (3, 8)
83. A variant of the linked list in which none of the node contains NULL pointer is______
a) Singly linked list b) Doubly linked list
c) Circular linked list d) None
Ver - B : CS/IS 10 of 12
84. If p and q are independent propositions, which of these is always false?
a) p∧¬q b) ¬p∧¬q c) p→q d) p↔¬q
88. In the Rational Unified Process (RUP), which phase focuses on creating the architectural
foundation of the system?
a) Inception b) Elaboration
c) Construction d) Transition
89. Which type of testing ensures that previously developed and tested software still works after
changes?
a) Regression Testing b) Acceptance Testing
c) Integration Testing d) System Testing
90. Which of the following acts as a temporary storage location to hold an intermediate results for
mathematical and logical calculations
a) RAM b) Accumulator
c) Program counter d) Memory Address Register
91. Which layer in the OSI model is responsible for data presentation?
a) Network layer b) Session layer c) Presentation layer d) Transport layer
96. The five items: A, B, C, D, and E are pushed in a stack, one after other starting from A. The
stack is popped four times and each element is inserted in a queue. The two elements are
deleted from the queue and pushed back on the stack. Now one item is popped from the stack.
The popped item is__________
a) A b) B c) C d) D
97. If an array is declared as int arr[5][5], how many elements can it store?
a) 5 b) 25 c) 10 d) 0
99. If R is a relation on set A= {1, 2, 3, 4} defined by R= {(x,y) ∣ x+y=5}, then which pairs belong
to R?
a) {(1,4),(2,3),(3,2),(4,1)}
b) {(1, 4), (2, 3), (4, 1)}
c) {(1, 4), (2, 3), (3, 2)}
d) {(1, 3), (2, 3), (4, 1)}
100. What is the Cartesian product of set A and set B, if the set A = {1, 2} and set B = {a, b}?
a) { (1, a), (1, b), (2, a), (b, b) }
b) { (1, 1), (2, 2), (a, a), (b, b) }
c) { (1, a), (2, a), (1, b), (2, b) }
d) { (1, 1), (a, a), (2, a), (1, b) }
*****
Ver - B : CS/IS 12 of 12
VTU-ETR Seat No. Question Paper Version : C
6. Which of the following is a key characteristic of dependent and independent variables in linear
regression?
a) Dependent variable is predicted by the independent variable.
b) Both dependent and independent variables are random variables.
c) Independent variables depend on dependent variables.
d) Dependent variables are not affected by independent variables.
7. What problem arises when independent variables in a multiple regression model are highly
correlated with each other?
a) Heteroscedasticity
b) Homoscedasticity
c) Autocorrelation
d) Multicollinearity
Ver - C : CS/IS 1 of 12
8. Which of the following is an example of a qualitative explanatory variable in regression
analysis?
a) Age of a person
b) Height of an individual
c) Weight of an individual
d) Type of education (e.g., High School, College, Graduate)
10. Which of the following is a key difference between R-type and Q-type factor analysis?
a) R-type focuses on factors affecting the variables, while Q-type analyzes the variables' impact
on the factors
b) R-type is used when analyzing observations across multiple time periods, while Q-type
focuses on cross-sectional data
c) R-type factor analysis is applied to variables, whereas Q-type is applied to cases
(individuals)
d) There is no significant difference between R-type and Q-type factor analysis
12. Which of the following steps is NOT part of the research process?
a) Defining the research problem
b) Reviewing related literature
c) Avoiding data collection
d) Formulating a hypothesis
15. Which research approach combines both qualitative and quantitative methods?
a) Descriptive research
b) Experimental research
c) Mixed-method research
d) Longitudinal research
Ver - C : CS/IS 2 of 12
16. What is the primary purpose of a literature review in research?
a) To test hypotheses
b) To identify gaps in existing knowledge
c) To collect primary data
d) To summarize the results
20. Which type of research design is best for studying cause-and-effect relationships?
a) Descriptive design
b) Correlational design
c) Experimental design
d) Exploratory design
22. The probability of the occurrence of a single event, such as P(A) or P(B), which takes a specific
value irrespective of the values of other events, i.e. unconditioned on any other events, is called?
a) Unconditional Probability
b) Marginal Probability
c) Conditional Probability
d) Joint Probability
24. What does the Axiom of Probability P(S) = 1 mean, where S is the sample space?
a) The probability of any event is 0.
b) The probability of the sample space is 0.
c) The probability of the sample space is 1.
d) The probability of any event is 1.
Ver - C : CS/IS 3 of 12
25. Which of the following is true about a random variable?
a) It takes a fixed set of values.
b) It is a function that assigns a numerical value to each outcome in a sample space.
c) It has a deterministic relationship with other random variables.
d) It is not subject to probability distributions.
28. Under which condition can the binomial distribution be approximated by a normal distribution?
a) When the number of trials is very small
b) When the probability of success is very high
c) When the probability of success is close to 0.5
d) When the trials are dependent
Ver - C : CS/IS 4 of 12
33. What is the standard error?
a) The difference between the sample mean and population mean
b) The standard deviation of the sampling distribution
c) The sum of all errors in data collection
d) The variance of a data set
37. Which test is used to compare the means of two independent samples?
a) Chi-square test b) Z-test for proportion
c) Two-sample t-test d) ANOVA
39. Which hypothesis test is used to compare the variances of two populations?
a) Z-test for variance
b) F-test
c) Paired t-test
d) Chi-square test for independence
Ver - C : CS/IS 5 of 12
42. Which is a preferred sampling method for the population of a finite size.
a) Systematic sampling
b) Purposive Sampling
c) Cluster Sampling
d) Area Sampling
44. Which classification of measurement scale represents ordered categories but does not have a
true zero point?
a) Nominal scale b) Ordinal scale
c) Interval scale d) Ratio scale
45. Which method is most suitable for collecting primary data when studying behaviour over time?
a) Case study method
b) Experimental method
c) Longitudinal survey
d) Secondary data collection
46. Which of the following is NOT a step in the data preparation process?
a) Editing b) Coding c) Data collection d) Transcribing
48. Which measure of central tendency is best suited for categorical data?
a) Mean b) Median
c) Mode d) Standard deviation
*****
Ver - C : CS/IS 6 of 12
PART – II
Discipline Oriented Section
(Computer Science and Engineering /
Information Science and Engineering)
[50 MARKS]
51. Which layer in the OSI model is responsible for data presentation?
a) Network layer b) Session layer
c) Presentation layer d) Transport layer
56. The five items: A, B, C, D, and E are pushed in a stack, one after other starting from A. The
stack is popped four times and each element is inserted in a queue. The two elements are
deleted from the queue and pushed back on the stack. Now one item is popped from the stack.
The popped item is__________
a) A b) B c) C d) D
57. If an array is declared as int arr[5][5], how many elements can it store?
a) 5 b) 25 c) 10 d) 0
Ver - C : CS/IS 7 of 12
58. Which of the binary tree traversal requires a Queue?
a) Level-order b) pre-order c) post-order d) in-order
59. If R is a relation on set A= {1, 2, 3, 4} defined by R= {(x,y) ∣ x+y=5}, then which pairs belong
to R?
a) {(1,4),(2,3),(3,2),(4,1)}
b) {(1, 4), (2, 3), (4, 1)}
c) {(1, 4), (2, 3), (3, 2)}
d) {(1, 3), (2, 3), (4, 1)}
60. What is the Cartesian product of set A and set B, if the set A = {1, 2} and set B = {a, b}?
a) { (1, a), (1, b), (2, a), (b, b) }
b) { (1, 1), (2, 2), (a, a), (b, b) }
c) { (1, a), (2, a), (1, b), (2, b) }
d) { (1, 1), (a, a), (2, a), (1, b) }
61. What is the main disadvantage of the SSTF (Shortest Seek Time First) disk scheduling
algorithm?
a) It increases seek time compared to FCFS
b) It causes starvation for distant requests
c) It requires additional hardware support
d) It is less efficient than SCAN
62. Which of the following replacement policies suffers from Belady's anomaly?
a) LRU b) FIFO c) Optimal d) NRU
64. Which protocol type does Wi-Fi use for media access control?
a) FDMA b) CDMA c) CSMA/CA d) TDMA
65. In Ethernet addressing, if all the bits are 1s, the address is ____________
a) Unicast b) Multicast c) Broadcast d) None of these
67. Which phase of the Unified Process involves deploying the system to its users?
a) Inception b) Elaboration c) Construction d) Transition
Ver - C : CS/IS 8 of 12
68. In a weather monitoring system the Observer pattern is implemented. The system has the
following components:
A WeatherStation object (subject) that notifies its observers whenever the temperature
changes.
There are 200 Display objects (observers) that are subscribed to the WeatherStation to receive
updates.
If each observer object stores the temperature (which is an integer) and has additional
overhead of 4 bytes per observer for other attributes, calculate the total memory required to
store all observer objects
a) 800 bytes b) 1200 bytes c) 1600 bytes d) 2000 bytes
69. _________________ Design pattern converts the interface of a class into another interface
clients expect
a) Bridge method b) Adapter method c) Proxy method d) Decorator method
72. Which of the following is a type of software testing that checks the functionality of the
software in real-world scenarios?
a) Unit testing
b) Integration testing
c) System testing
d) User acceptance testing
74. Modifying a software after it has been put into use is known as
a) Software modification
b) Software change
c) Software reengineering
d) Software maintenance
75. If a system uses memory-mapped I/O, how much addressable memory is available if the
address bus is 16 bits and 256 I/O addresses are reserved?
a) 65,536 bytes b) 65,280 bytes c) 32,768 bytes d) 32,512 bytes
76. Calculate the effective address for the instruction 'LOAD R1, 100(R2)' if the content of R2 is
200
a) 100 b) 200 c) 300 d) 400
Ver - C : CS/IS 9 of 12
77. Which of the following is an example of an I/O control method where the CPU polls each
device?
a) Interrupt-driven I/O
b) Direct Memory Access (DMA)
c) Programmed I/O
d) Memory-mapped I/O
78. Suppose you have coins of denominations 1, 3 and 4. You use a greedy algorithm, in which
you choose the largest denomination coin which is not greater than the remaining sum. For
which of the following sums, will the algorithm NOT produce an optimal answer?
a) 20 b) 6 c) 12 d) 5
81. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is ___________
a) Translation Lookaside Buffer’s
b) Registers
c) Page Tables
d) Cache
82. The bit used to signify that the cache location is updated is ________
a) Flag bit b) Reference bit
c) Update bit d) Dirty bit
83. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm
b) Floyd-Warshall algorithm
c) Depth First Search
d) Kruskal’s algorithm
84. In the N-Queens problem, what does backtracking do when a placed queen results in no valid
positions for the next queen?
a) Stops the program
b) Recalculates all possible placements for the queens
c) Removes the last placed queen and tries the next possibility
d) Ignores the invalid position and moves forward
85. Which data structures are used to formulate the Breadth-first Search (BFS)?
a) Stack b) Queue c) Heap d) Linked List
Ver - C : CS/IS 10 of 12
86. Which strategy is used to handle deadlocks by ensuring that at least one of the necessary
conditions for deadlock does not hold?
a) Deadlock Avoidance
b) Deadlock Detection and Recovery
c) Deadlock Prevention
d) Process Termination
87. Which disk scheduling algorithm minimizes the total seek time?
a) First-Come, First-Served (FCFS)
b) Shortest Seek Time First (SSTF)
c) Elevator (SCAN)
d) Circular SCAN (C-SCAN)
89. A system digitizes an analog signal with a maximum frequency of 4 kHz. According to the
Nyquist theorem, what is the minimum sampling rate required to avoid aliasing?
a) 4 kHz b) 8 kHz c) 16 kHz d) 32 kHz
90. Using Go-Back-N ARQ with a window size of 4, how many frames can be sent before an
acknowledgment is required?
a) 1 frame b) 4 frames c) 5 frames d) 8 frames
a) 4 b) 8 c) 16 d) Runtime Error
92. A Binary search tree is generated by inserting the following elements in order,
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left sub tree and right sub tree of the root is ________
a) (4, 7) b) (7, 4) c) (8, 3) d) (3, 8)
Ver - C : CS/IS 11 of 12
93. A variant of the linked list in which none of the node contains NULL pointer is______
a) Singly linked list b) Doubly linked list
c) Circular linked list d) None
98. In the Rational Unified Process (RUP), which phase focuses on creating the architectural
foundation of the system?
a) Inception b) Elaboration c) Construction d) Transition
99. Which type of testing ensures that previously developed and tested software still works after
changes?
a) Regression Testing b) Acceptance Testing
c) Integration Testing d) System Testing
100. Which of the following acts as a temporary storage location to hold an intermediate results for
mathematical and logical calculations
a) RAM
b) Accumulator
c) Program counter
d) Memory Address Register
*****
Ver - C : CS/IS 12 of 12
VTU-ETR Seat No. Question Paper Version : D
Ver - D : CS/IS 1 of 12
9. Which hypothesis test is used to compare the variances of two populations?
a) Z-test for variance b) F-test
c) Paired t-test d) Chi-square test for independence
12. The probability of the occurrence of a single event, such as P(A) or P(B), which takes a specific
value irrespective of the values of other events, i.e. unconditioned on any other events, is called?
a) Unconditional Probability
b) Marginal Probability
c) Conditional Probability
d) Joint Probability
14. What does the Axiom of Probability P(S) = 1 mean, where S is the sample space?
a) The probability of any event is 0.
b) The probability of the sample space is 0.
c) The probability of the sample space is 1.
d) The probability of any event is 1.
Ver - D : CS/IS 2 of 12
18. Under which condition can the binomial distribution be approximated by a normal distribution?
a) When the number of trials is very small
b) When the probability of success is very high
c) When the probability of success is close to 0.5
d) When the trials are dependent
21. What does the analysis of variance (anova) primarily test for?
a) Differences in means across multiple groups
b) Differences in medians across two groups
c) Relationships between two variables
d) Equality of variances across groups
22. What is the main difference between one-way and two-way ANOVA?
a) One-way ANOVA tests one group, while two-way ANOVA tests two groups
b) One-way ANOVA examines one independent variable, while two-way ANOVA examines
two independent variables
c) Two-way ANOVA is only for experimental designs
d) One-way ANOVA includes interaction effects
Ver - D : CS/IS 3 of 12
26. Which of the following is a key characteristic of dependent and independent variables in linear
regression?
a) Dependent variable is predicted by the independent variable.
b) Both dependent and independent variables are random variables.
c) Independent variables depend on dependent variables.
d) Dependent variables are not affected by independent variables.
27. What problem arises when independent variables in a multiple regression model are highly
correlated with each other?
a) Heteroscedasticity
b) Homoscedasticity
c) Autocorrelation
d) Multicollinearity
30. Which of the following is a key difference between R-type and Q-type factor analysis?
a) R-type focuses on factors affecting the variables, while Q-type analyzes the variables' impact
on the factors
b) R-type is used when analyzing observations across multiple time periods, while Q-type
focuses on cross-sectional data
c) R-type factor analysis is applied to variables, whereas Q-type is applied to cases
(individuals)
d) There is no significant difference between R-type and Q-type factor analysis
32. Which is a preferred sampling method for the population of a finite size.
a) Systematic sampling
b) Purposive Sampling
c) Cluster Sampling
d) Area Sampling
Ver - D : CS/IS 4 of 12
33. Which of the following is a probability sampling method?
a) Convenience sampling
b) Stratified random sampling
c) Quota sampling
d) Judgmental sampling
34. Which classification of measurement scale represents ordered categories but does not have a
true zero point?
a) Nominal scale b) Ordinal scale
c) Interval scale d) Ratio scale
35. Which method is most suitable for collecting primary data when studying behaviour over time?
a) Case study method
b) Experimental method
c) Longitudinal survey
d) Secondary data collection
36. Which of the following is NOT a step in the data preparation process?
a) Editing b) Coding c) Data collection d) Transcribing
38. Which measure of central tendency is best suited for categorical data?
a) Mean b) Median c) Mode d) Standard deviation
42. Which of the following steps is NOT part of the research process?
a) Defining the research problem
b) Reviewing related literature
c) Avoiding data collection
d) Formulating a hypothesis
Ver - D : CS/IS 5 of 12
43. Which of the following is NOT a characteristic of good research?
a) Systematic and logical
b) Based on subjective interpretation
c) Replicable and verifiable
d) Directed towards problem-solving
45. Which research approach combines both qualitative and quantitative methods?
a) Descriptive research
b) Experimental research
c) Mixed-method research
d) Longitudinal research
*****
Ver - D : CS/IS 6 of 12
PART – II
Discipline Oriented Section
(Computer Science and Engineering /
Information Science and Engineering)
[50 MARKS]
52. Which of the following is a type of software testing that checks the functionality of the
software in real-world scenarios?
a) Unit testing
b) Integration testing
c) System testing
d) User acceptance testing
54. Modifying a software after it has been put into use is known as
a) Software modification
b) Software change
c) Software reengineering
d) Software maintenance
55. If a system uses memory-mapped I/O, how much addressable memory is available if the
address bus is 16 bits and 256 I/O addresses are reserved?
a) 65,536 bytes b) 65,280 bytes
c) 32,768 bytes d) 32,512 bytes
56. Calculate the effective address for the instruction 'LOAD R1, 100(R2)' if the content of R2 is
200
a) 100 b) 200 c) 300 d) 400
57. Which of the following is an example of an I/O control method where the CPU polls each
device?
a) Interrupt-driven I/O
b) Direct Memory Access (DMA)
c) Programmed I/O
d) Memory-mapped I/O
58. Suppose you have coins of denominations 1, 3 and 4. You use a greedy algorithm, in which
you choose the largest denomination coin which is not greater than the remaining sum. For
which of the following sums, will the algorithm NOT produce an optimal answer?
a) 20 b) 6 c) 12 d) 5
Ver - D : CS/IS 7 of 12
59. The worst case time complexity of quick sort is ______
a) O(n ) b) O(n2)
c) O(n log n) d) O(log n)
a) 4 b) 8 c) 16 d) Runtime Error
62. A Binary search tree is generated by inserting the following elements in order,
50, 15, 62, 5, 20, 58, 91, 3, 8, 37, 60, 24
The number of nodes in the left sub tree and right sub tree of the root is ________
a) (4, 7) b) (7, 4) c) (8, 3) d) (3, 8)
63. A variant of the linked list in which none of the node contains NULL pointer is______
a) Singly linked list b) Doubly linked list
c) Circular linked list d) None
Ver - D : CS/IS 8 of 12
68. In the Rational Unified Process (RUP), which phase focuses on creating the architectural
foundation of the system?
a) Inception b) Elaboration
c) Construction d) Transition
69. Which type of testing ensures that previously developed and tested software still works after
changes?
a) Regression Testing b) Acceptance Testing
c) Integration Testing d) System Testing
70. Which of the following acts as a temporary storage location to hold an intermediate results for
mathematical and logical calculations
a) RAM b) Accumulator
c) Program counter d) Memory Address Register
71. What is the main disadvantage of the SSTF (Shortest Seek Time First) disk scheduling
algorithm?
a) It increases seek time compared to FCFS
b) It causes starvation for distant requests
c) It requires additional hardware support
d) It is less efficient than SCAN
72. Which of the following replacement policies suffers from Belady's anomaly?
a) LRU b) FIFO
c) Optimal d) NRU
74. Which protocol type does Wi-Fi use for media access control?
a) FDMA b) CDMA
c) CSMA/CA d) TDMA
75. In Ethernet addressing, if all the bits are 1s, the address is ____________
a) Unicast b) Multicast
c) Broadcast d) None of these
77. Which phase of the Unified Process involves deploying the system to its users?
a) Inception b) Elaboration
c) Construction d) Transition
Ver - D : CS/IS 9 of 12
78. In a weather monitoring system the Observer pattern is implemented. The system has the
following components:
A WeatherStation object (subject) that notifies its observers whenever the temperature
changes.
There are 200 Display objects (observers) that are subscribed to the WeatherStation to receive
updates.
If each observer object stores the temperature (which is an integer) and has additional
overhead of 4 bytes per observer for other attributes, calculate the total memory required to
store all observer objects
a) 800 bytes b) 1200 bytes c) 1600 bytes d) 2000 bytes
79. _________________ Design pattern converts the interface of a class into another interface
clients expect
a) Bridge method
b) Adapter method
c) Proxy method
d) Decorator method
81. Which layer in the OSI model is responsible for data presentation?
a) Network layer
b) Session layer
c) Presentation layer
d) Transport layer
Ver - D : CS/IS 10 of 12
85. Which of the following is TRUE?
a) Every relation in 3NF is also in BCNF
b) A relation R is in 3NF if every non-prime attribute of R is fully functionally dependent on
every key of R
c) Every relation in BCNF is also in 3NF
d) No relation can be in both BCNF and 3NF
86. The five items: A, B, C, D, and E are pushed in a stack, one after other starting from A. The
stack is popped four times and each element is inserted in a queue. The two elements are
deleted from the queue and pushed back on the stack. Now one item is popped from the stack.
The popped item is__________
a) A b) B c) C d) D
87. If an array is declared as int arr[5][5], how many elements can it store?
a) 5 b) 25 c) 10 d) 0
89. If R is a relation on set A= {1, 2, 3, 4} defined by R= {(x,y) ∣ x+y=5}, then which pairs belong
to R?
a) {(1,4),(2,3),(3,2),(4,1)}
b) {(1, 4), (2, 3), (4, 1)}
c) {(1, 4), (2, 3), (3, 2)}
d) {(1, 3), (2, 3), (4, 1)}
90. What is the Cartesian product of set A and set B, if the set A = {1, 2} and set B = {a, b}?
a) { (1, a), (1, b), (2, a), (b, b) }
b) { (1, 1), (2, 2), (a, a), (b, b) }
c) { (1, a), (2, a), (1, b), (2, b) }
d) { (1, 1), (a, a), (2, a), (1, b) }
91. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is ___________
a) Translation Lookaside Buffer’s
b) Registers
c) Page Tables
d) Cache
92. The bit used to signify that the cache location is updated is ________
a) Flag bit b) Reference bit
c) Update bit d) Dirty bit
93. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm
b) Floyd-Warshall algorithm
c) Depth First Search
d) Kruskal’s algorithm
Ver - D : CS/IS 11 of 12
94. In the N-Queens problem, what does backtracking do when a placed queen results in no valid
positions for the next queen?
a) Stops the program
b) Recalculates all possible placements for the queens
c) Removes the last placed queen and tries the next possibility
d) Ignores the invalid position and moves forward
95. Which data structures are used to formulate the Breadth-first Search (BFS)?
a) Stack
b) Queue
c) Heap
d) Linked List
96. Which strategy is used to handle deadlocks by ensuring that at least one of the necessary
conditions for deadlock does not hold?
a) Deadlock Avoidance
b) Deadlock Detection and Recovery
c) Deadlock Prevention
d) Process Termination
97. Which disk scheduling algorithm minimizes the total seek time?
a) First-Come, First-Served (FCFS)
b) Shortest Seek Time First (SSTF)
c) Elevator (SCAN)
d) Circular SCAN (C-SCAN)
99. A system digitizes an analog signal with a maximum frequency of 4 kHz. According to the
Nyquist theorem, what is the minimum sampling rate required to avoid aliasing?
a) 4 kHz b) 8 kHz
c) 16 kHz d) 32 kHz
100. Using Go-Back-N ARQ with a window size of 4, how many frames can be sent before an
acknowledgment is required?
a) 1 frame b) 4 frames
c) 5 frames d) 8 frames
*****
Ver - D : CS/IS 12 of 12