GATE Exam 2021 Computer Science and Information Technology (CS-2) Question Paper With Answer Key

GATE-2021

CS-2: Computer Science and Information Technology

GA-General Aptitude

Q.1 – Q.5 Multiple Choice Question (MCQ), carry ONE mark each (for each wrong answer: – 1/3).

1. Gauri said that she can play the keyboard __________ her sister.

(A)  as well as

(B)  as better as

(C)  as nicest as

(D)  as worse as

Answer: (A)

2. A transparent square sheet shown above is folded along the dotted line. The folded sheet will look like ________.

Answer: (B)

3. If θ is the angle, in degrees, between the longest diagonal of the cube and any one of the edges of the cube, then, cos θ =

(A)  1/2

(B)  1/√3

(C)  1/√2

(D)  √3/2

Answer: (B)

4. If  then the value of x is:

(A)  2

(B)  4

(C)  6

(D)  8

Answer: (B)

5. Pen : Write :: Knife : _________

Which one of the following options maintains a similar logical relation in the above?

(A)  Vegetables

(B)  Sharp

(C)  Cut

(D)  Blunt

Answer: (C)

Q.6 – Q. 10 Multiple Choice Question (MCQ), carry TWO marks each (for each wrong answer: – 2/3).

6. Listening to music during exercise improves exercise performance and reduces discomfort. Scientists researched whether listening to music while studying can help students learn better and the results were inconclusive. Students who needed external stimulation for studying fared worse while students who did not need any external stimulation benefited from music.

Which one of the following statements is the CORRECT inference of the above passage?

(A)  Listening to music has no effect on learning and a positive effect on physical exercise.

(B)  Listening to music has a clear positive effect both on physical exercise and on learning.

(C)  Listening to music has a clear positive effect on physical exercise. Music has a positive effect on learning only in some students.

(D)  Listening to music has a clear positive effect on learning in all students. Music has a positive effect only in some students who exercise.

Answer: (C)

7. A jigsaw puzzle has 2 pieces. One of the pieces is shown above. Which one of the given options for the missing piece when assembled will form a rectangle? The piece can be moved, rotated or flipped to assemble with the above piece.

Answer: (A)

8. The number of students in three classes is in the ratio 3:13:6. If 18 students are added to each class, the ratio changes to 15:35:21.

The total number of students in all the three classes in the beginning was:

(A)  22

(B)  66

(C)  88

(D)  110

Answer: (C)

9. The number of units of a product sold in three different years and the respective net profits are presented in the figure above. The cost/unit in Year 3 was ` 1, which was half the cost/unit in Year 2. The cost/unit in Year 3 was one-third of the cost/unit in Year 1. Taxes were paid on the selling price at 10%, 13% and 15% respectively for the three years. Net profit is calculated as the difference between the selling price and the sum of cost and taxes paid in that year.

The ratio of the selling price in Year 2 to the selling price in Year 3 is ________.

(A)  4:3

(B)  1:1

(C)  3:4

(D)  1:2

Answer: (A)

10. Six students P, Q, R, S, T and U, with distinct heights, compare their heights and make the following observations.

Observation I: S is taller than R.

Observation II: Q is the shortest of all.

Observation III: U is taller than only one student.

Observation IV: T is taller than S but is not the tallest.

The number of students that are taller than R is the same as the number of students shorter than ______.

(A)  T

(B)  R

(C)  S

(D)  P

Answer: (C)

Computer Science and Information Technology (CS, Set-2)

Q.1 – Q.10 Multiple Choice Question (MCQ), carry ONE mark each (for each wrong answer: – 1/3).

1. Let G be a connected undirected weighted graph. Consider the following two statements.

S1: There exists a minimum weight edge in G which is present in every minimum spanning tree of G.

S2: If every edge in  has distinct weight, then G has a unique minimum spanning tree.

Which one of the following options is correct?

(A)  Both S1 and S2 are true.

(B)  S1 is true and S2 is false.

(C)  S1 is false and S2 is true.

(D)  Both S1 and S2 are false.

Answer: (C)

2. Let H be a binary min-heap consisting of n elements implemented as an array. What is the worst case time complexity of an optimal algorithm to find the maximum element is H?

(A)  Θ(1)

(B)  Θ(log n)

(C)  Θ(n)

(D)  Θ(n log n)

Answer: (C)

3. Consider the following ANSI C program:

Which one of the following phases in a seven-phase C complier will throw an error?

(A)  Lexical analyzer

(B)  Syntax analyzer

(C)  Semantic analyzer

(D)  Machine dependent optimizer

Answer: (C)

4. The format of the single-precision floating-point representation of a real number as per the IEEE 754 standard is as follows:

Which one of the following choices is correct with respect to the smallest normalized positive number represented using the standard?

(A)  exponent = 00000000 and nmantissa = 000000000000000000000000

(B)  exponent = 00000000 and nmantissa = 000000000000000000000001

(C)  exponent = 00000001 and nmantissa = 000000000000000000000000

(D)  exponent = 00000001 and nmantissa = 000000000000000000000001

Answer: (C)

5. Which one of the following circuits implements the Boolean function given below?

f(x, y, z) = m0 + m1 + m3 + m4 + m5 + m6, where mi­ is the ith minterm.

Answer: (A)

6. Consider the following statements S1 and S2 about the relational data model:

S1: A relation scheme can have at most one foreign key.

S2: A foreign key in a relation scheme R cannot be used to refer to tuples of R.

Which one of the following choices is correct?

(A)  Both S1 and S2 are true.

(B)  S1 is true and S2 is false.

(C)  S1 is false and S2 is true.

(D)  Both S1 and S2 are false.

Answer: (D)

7. Consider the three-may handshake mechanism followed during TCP connection establishment between hosts P and Q. Let X and Y be two random 32-bit starting sequence numbers chosen by P and Q respectively. Suppose P sends a TCP connection request message to Q with a TCP segment having SYN bit = 1, SEQ number = X, and ACK bit = 0. Suppose Q accepts the connection request. Which one of the following choices represents the information present in the TCP segment header that is sent by Q to P ?

(A)  SYN bit = 1, SEQ number = X + 1, ACK bit = 0, ACK number = Y, FIN bit =0

(B)  SYN bit = 0, SEQ number = X+1, ACK bit = 0, ACK number = Y, FIN bit = 1

(C)  SYN bit = 1, SEQ number = Y, ACK bit = 1, ACK number = X + 1, FIN bit = 0

(D)  SYN bit = 1, SEQ number = Y, ACK bit = 1, ACK number = X, FIN bit = 0

Answer: (C)

8. What is the worst-case number of arithmetic operations performed by recursive binary search on a sorted array of size n ?

(A)  Θ(√n)

(B)  Θ(log2(n))

(C)  Θ(n2)

(D)  Θ(n)

Answer: (B)

9. Let L ⊆ {0, 1}* be an arbitrary regular language accepted by a minimal DFA with k states. Which one of the following languages must necessarily be accepted by a minimal DFA with k states?

(A)  L – {01}

(B)  L ⋃ {01}

(C)  {0, 1}* − L

(D)  L ∙ L

Answer: (C)

10. Consider the following ANSI C program.

What is the output of the above program?

(A)  14

(B)  20

(C)  24

(D)  30

Answer: (C)

Q.11 – Q.15 Multiple Select Question (MSQ), carry ONE marks each (no negative marks).

11. Consider the following sets, where n ≥

S1: Set of all n × n matrices with entries from the set {a, b, c}

S2: Set of all functions from the set {0, 1, 2, …, n2 – 1} to the set {0, 1, 2}

Which of the following choice(s) is/are correct?

(A)  There does not exist a bijection from S1 to S2

(B)  There exists a surjection from S1 to S2.

(C)  There exists bijection from S1 to S2.

(D)  There does not exist an injection from S1 to S2

Answer: (B; C)

12. Let L1 be a regular language and L2 be a context-free language. Which of the following languages is/are context-free?

Answer: (B; C; D)

13. In the context of compilers, which of the following is/are NOT an intermediate representation of the source program?

(A)  Three address code

(B)  Abstract Syntax Tree (AST)

(C)  Control Flow Graph (CFG)

(D)  Symbol table

Answer: (D)

14. Which of the following statement(s) is/are correct in the context of CPU scheduling?

(A)  Turnaround time includes waiting time.

(B)  The goal is to only maximize CPU utilization and minimize throughput.

(C)  Round-robin policy can be used even when the CPU time required by each of the processes is not known apriori.

(D)  Implementing preemptive scheduling needs hardware support.

Answer: (A; C; D)

15. Choose the correct choice(s) regarding the following propositional logic assertion S:

S : ((P ⋀ Q) → R) → ((P ⋀ Q) → (Q → R))

(A)  S is neither a tautology nor a contradiction.

(B)  S is a tautology.

(C)  S is a contradiction.

(D)  The antecedent of S is logically equivalent to the consequent of S.

Answer: (B; D)

Q.16 – Q.25 Numerical Answer Type (NAT), carry ONE mark each (no negative marks).

16. Consider a complete binary tree with 7 nodes. Let A denote the set of first 3 elements obtained by performing Breadth-First Search (BFS) starting from the root. Let B denote the set of first 3 elements obtained by performing Depth-First Search (DFS) starting from the root.

The value of |A – B|  is _______

Answer: (1 to 1)

17. Consider the following deterministic finite automaton (DFA).

The number of strings of length 8 accepted by the above automaton is _________.

Answer: (256 to 256)

18. If x and y are two decimal digits and (0.1101)2 = (0.8xy5)10, the decimal value of x + y is ________

Answer: (3 to 3)

19. Consider a set-associative cache of size 2KB (1KB = 210 bytes) with cache block size of 64 bytes. Assume that the cache is byte-addressable and a 32-bit address is used for accessing the cache. If the width of the tag field is 22 bits, the associativity of the cache is _________.

Answer: (2 to 2)

20. Consider a computer system with DMA support. The DMA module is transferring one 8-bit character in one CPU cycle from a device to memory through cycle stealing at regular intervals. Consider a 2 MHz processor. If 0.5% processor cycles are used for DMA, the data transfer rate of the device is _______ bits per second.

Answer: (80000 to 80000)

21. A data file consisting of 1,50,000 student-records is stored on a hard disk with block size of 4096 bytes. The data file is sorted on the primary key RollNo. The size of a record pointer for this disk is 7 bytes. Each student-record has a candidate key attribute called ANum of size 12 bytes. Suppose an index file with records consisting of two ields, ANum value and the record pointer to the corresponding student record, is built and stored on the same disk. Assume that the records of data file and index file are not split across disk blocks. The number of blocks in the index file is ________.

Answer: (698 to 698)

22. For a given biased coin, the probability that the outcome of a toss is a head is 0.4. This coin is tossed 1,000 times. Let X denote the random variable whose value is the number of times that head appeared in these 1,000 tosses. The standard deviation of X (rounded to 2 decimal places) is ________.

Answer: (15.00 to 16.00)

23. Consider the following ANSI C function:

The value returned by SomeFunction (15, 255) is ______.

Answer: (15 to 15)

24. Suppose that P is a 4 × 5 matrix sch that every solution of the equation Px = 0 is a scalar multiple of [2 5 4 3 1]T. The rank of P is _______.

Answer: (4 to 4)

25. Suppose that f : ℝ → ℝ is a continuous function on the interval [−3, 3] and a differentiable function in the interval (−3, 3) such that for every x in the interval f'(x) ≤ If f(−3) = 7, then f(3) is at most _______.

Answer: (19 to 19)

Q.26 – Q.39 Multiple Choice Question (MCQ), carry TWO mark each (for each wrong answer: 2/3).

26. Consider the string abbccddeee. Each letter in the string must be assigned a binary code satisfying the following properties:

(1) For any two letters, the code assigned to one letter must not be a prefix of the code assigned to the other letter.

(2) For any two letters of the same frequency, the letter which occurs earlier in the dictionary order is assigned  a code whose length is at most the length of the code assigned to the other letter.

Among the set of all binary code assignments which satisfy the above two properties, what is the minimum length of the encoded string?

(A)  21

(B)  23

(C)  25

(D)  30

Answer: (B)

27. Assume a two-level inclusive cache hierarchy, L1 and L2, where L2 is the larger of the two. Consider the following statements.

S1 : Read misses in a write through L1 cache do not result in  writebacks of dirty lines to the L2.

S2 : Write allocate policy must be used in conjunction with write through caches and no-write allocate policy is used with writeback caches.

Which of the following statements is correct?

(A)  S1 is true and S­2 is false

(B)  S1 is false and S2 is true

(C)  S1 is true and S2 is true

(D)  S1 is false and S2 is false

Answer: (A)

28. Suppose we want to design a synchronous circuit that processes a string of 0’s and 1’s. Given a string, it produces another string by replacing the first 1 in any subsequence of consecutive 1’s by a 0. Consider the following example.

Input sequence: 00100011000011100

Output sequence : 00000001000001100

A Mealy Machine is a state machine where both the next state and the output are functions of the present state and the current input.

The above mentioned circuit can be designed as a two-state Mealy machine. The states in the Mealy machine can be represented using Boolean values 0 and 1. We denote the current state, the next state, the next incoming bit, and the output bit of the Mealy machine by the variables s, t, b and y respectively.

Assume the initial state of the Mealy machine is 0.

What are the Boolean expressions corresponding to t and y in terms of s and b?

Answer: (B)

29. In an examination, a student can choose the order in which two questions (QuesA and QuesB) must be attempted.

– If the first question is answered wrong, the student gets zero marks.

– If the first question is answered correctly and the second question is not answered correctly, the student gets the marks only for the first question.

-If both the questions are answered correctly, the student gets the sum of the marks of the two questions.

The following table shows the probability of correctly answering a question and the marks of the question respectively.

Assuming that the student always wants to maximize her expected marks in the examination, in which order should she attempt the questions and what is the expected marks for that order (assume that the questions are independent)?

(A)  First QuesA and then QuesB. Expected marks 14.

(B)  First QuesB and then QuesA. Expected marks 14.

(C)  First QuesB and then QuesA. Expected marks 22.

(D)  First QuesA and then QuesB. Expected marks 16.

Answer: (D)

30. Consider the following ANSI C code segment:

Assume that the variable y points to a struct (allocated on the heap) containing two fields f1 and f2, and the local variables x, y, z, p, q, and i are allotted registers. Common sub-expression elimination (CSE) optimization is applied on the code. The number of addition and dereference operations (of the form y ->f1 or  y->f2) in the optimized code, respectively, are:

(A)  403 and 102

(B)  203 and 2

(C)  303 and 102

(D)  303 and 2

Answer: (D)

31. The relation scheme given below is used to store information about the employees of a company, where empId is the key and deptId indicates the department to which the employee is assigned. Each employee is assigned to exactly one department.

Consider the following SQL query:

The above query gives, for each department in the company, the number of female employees whose salary is greater than the average salary of

(A)  employees in the department.

(B)  employees in the company.

(C)  female employees in the department.

(D)  female employees in the company.

Answer: (B)

32. Let S be the following schedule of operations of three transactions T1, T2 and T3 in a relational database system:

R2(Y), R1(X), R3(Z), R1(Y), W1(X), R2(Z), W2(Y), R3(X), W­3(Z)

Consider the statement P and Q below:

P: S is conflict-serializable.

Q: If T3 commits before T1 finishes, then S is recoverable.

Which one of the following choices is correct?

(A)  Both P and Q are true.

(B)  P is true and Q is false.

(C)  P is false and Q is true.

(D)  Both P and Q are false.

Answer: (B)

33. A bag has r red balls and b black balls. All balls are identical except for their colours. In a trial, a ball is randomly drawn from the bag, its colour is noted and the ball is placed back into the bag along with another ball of the same colour. Note that the number of balls in the bag will increase by one, after trial. A sequence of four such trials is conducted. Which one of the following choices gives the probability of drawing a red ball in the fourth trial?

Answer: (A)

34. Consider the cyclic redundancy check (CRC) based error detecting scheme having the generator polynomial X3 + X + 1. Suppose the message m4m3m2m1m0 = 11000 is to be transmitted. Check bits c2c1c0 are appended at the end of the message by the transmitter using the above CRC scheme. The transmitted bit string is denoted by m4m3m2m1m0c2c1c0. The value of the checkbit sequence c2c1c0 is

(A)  101

(B)  110

(C)  100

(D)  111

Answer: (C)

35. Consider the following ANSI C program:

Which one of the statements below is correct about the program?

(A)  Upon execution, the program creates a linked-list of five nodes.

(B)  Upon execution, the program goes into an infinite loop.

(C)  It has a missing return which will be reported as an error by the compiler.

(D)  It dereferences an uninitialized pointer that may result in a run-time error.

Answer: (D)

36. Consider the following two statements about regular languages:

S1: Every infinite regular language contains an undecidable language as a subset.

S2: Every finite language is regular.

Which one of the following choices is correct ?

(A)  Only S1 is true.

(B)  Only S2 is true.

(C)  Both S1 and S2

(D)  Neither S1 nor S2 is true.

Answer: (C)

37. For two n-dimensional real vectors P and Q, the operation s(P, Q) is defined as follows:

Let ℒ be a set of 10-dimensional non-zero real vectors such that for every pair of distinct vectors P, Q, ∈ ℒ s(P, Q) = 0.

(A)  9

(B)  10

(C)  11

(D)  100

Answer: (B)

38. For a statement S in a program, in the context of liveness analysis, the following sets are defined:

USE(S) : the set of variables used in S

IN(S) : the set of variables that are live at the entry of S

OUT(S) : the set of variables that are live at the exit of S

Consider a basic block that consists of two statements, S1 followed by S2. Which one of the following statements is correct?

(A)  OUT(S1) = IN(S2)

(B)  OUT(S1) =  IN(S1) ⋃ USE(S1)

(C)  OUT(S1) = IN (S2) ⋃ OUT(S2)

(D)  OUT(S1) = USE(S1) ⋃ IN(S2)

Answer: (A)

39. For constants a ≥ 1 and b > 1, consider the following recurrence defined on the non-negative integers:

Which one of the following options is correct about the recurrence T(n)?

Answer: (C)

Q.40 – Q.47 Multiple Select Question (MSQ), carry TWO mark each (no negative marks).

40. Suppose the following functional dependencies hold on a relation U with attributes P, Q, R, S, and T.

P → QR

RS → T

Which of the following functional dependencies can be inferred from the above functional dependencies?

(A)  PS → T

(B)  R → T

(C)  P → R

(D)  PS → R

Answer: (A; C; D)

41. For a string 𝓌, we define 𝓌R to be the reverse of 𝓌. For example if 𝓌 = 01101 then 𝓌R = 10110.

Which of the following languages is/are context-free?

Answer: (B; C; D)

42. Consider the following multi-threaded code segment (in a mix of C and pseudocode), invoked by two processes P1 and P2, and each of the processes spawns two threads T1 and T2:

Which of the following statement(s) is/are correct?

(A)  Both P1 and P2 will print the value of x as 2.

(B)  At least one of P1 and P2 will print the value of x as 4.

(C)  At least one of the threads will print the value of y as 2.

(D)  Both T1 and T2, in both the processes, will print the value of y as 1.

Answer: (A; D)

43. Consider a computer system with multiple shared resource types, with one instance per resource type. Each instance can be owned by only one process at a time. Owning and freeing of resources are done by holding a global lock (L). The following scheme is used to own a resource instance:

Which of the following choice(s) about the above scheme is/are correct?

(A)  The scheme ensures that deadlocks will not occur.

(B)  The scheme may lead to live-lock.

(C)  The scheme may lead to starvation.

(D)  The scheme violates the mutual exclusion property.

Answer: (A; B; C)

44. If the numerical value of a 2-byte unsigned integer on a little endian computer is 255 more than that on a big endian computer, which of the following choices represent(s) the unsigned integer on a little endian computer?

(A)  0x6665

(B)  0x0001

(C)  0x4243

(D)  0x0100

Answer: (A; D)

45. Consider a computer network using the distance vector routing algorithm in its network layer. The partial topology of the network is as shown below.

The objective is to find the shortest-cost path from the router R to routers P and Q. Assume that R does not initially known the shortest routes to P and Q. Assume that R has three neighbouring routers denotes as X, Y, and Z. During one iteration, R measures its distance to its neighbours X, Y, and Z as 3, 2, and 5, respectively. Router R gets routing vectors from its neighbours that indicate that the distance to router P from routers X, Y and Z are 7, 6, and 5 respectively. The routing vector also indicates that the distance to router Q from routers X, Y, and Z are 4, 6, and 8, respectively. Which of the following statement(s) is/are correct with respect to the new routing table of R, after updation during this iteration?

(A)  The distance from R to P will be stored as 10.

(B)  The distance from R to Q will be stored as 7.

(C)  The next hop router for a packet from R to P is Y.

(D)  The next hop router for a packet from R to Q is Z.

Answer: (B; C)

46. Consider the following directed graph:

Which of the following is/are correct about the graph?

(A)  The graph does not have a topological order.

(B)  A depth-first traversal starting at vertex S classifies three directed edges as back edges.

(C)  The graph does not have a strongly connected component.

(D)  For each pair of vertices u and v, there is a directed path from u to v.

Answer: (A; B)

47. Which of the following regular expressions represent(s) the set of all binary numbers that are divisible by three? Assume that string ϵ is divisible by three.

(A)  (0 + 1(01*0)*1)*

(B)  (0 + 11 + 10(1 + 00)*01)*

(C)  (0*(1(01*0)*1)*)*

(D)  (0 + 11 + 11(1 + 00)*00)*

Answer: (A; B; C)

Q.48 – Q.55 Numerical Answer Type (NAT), carry TWO mark each (no negative marks).

48. Consider a three-level page table to translate a 39-bit virtual address to a physical address as shown below.

The page is size is 4KB(1KB = 210 bytes) and page table entry size at every level is 8 bytes. A process P is currently using 2GB (1GB = 230 bytes) virtual memory which is mapped to 2GB of physical memory. The minimum amount of memory required for the page table of P across all levels is ______KB.

Answer: (4108 to 4108)

49. Consider the following ANSI C program.

The output of the program upon execution is ________

Answer: (60 to 60)

50. Let S be a set consisting of 10 elements. The number of tuples of the form (A, B) such that A and B are subsets of S, and A ⊆ B is ________

Answer: (59049 to 59049)

51. Consider the following augmented grammar with {#, @, <, >, a, b, c} as the set of terminals.

Answer: (8 to 8)

52. Consider a Boolean function f(w, x, y, z) such that

f(w, 0, 0, z) = 1

f(1, x, 1, z) = x + z

f(w, 1, y, z) = wz +  y

The number of literals in the minimal sum-of-products expression of f is _________

Answer: (6 to 6)

53. Consider a pipelined processor with 5 stages, Instruction Fetch (IF), Instruction Decode (ID), Execute (EX), Memory Access (MEM), and Write Back (WB). Each stage of the pipeline, except the EX stage, takes one cycle. Assume that the ID stage merely decodes the instruction and the register read is performed in the EX stage. The EX stage takes one cycle for ADD instruction and two cycles for MUL instruction. Ignore pipeline register latencies.

ADD, MUL, ADD, MUL, ADD, MUL, ADD, MUL

Assume that every MUL instruction is data-dependent on the ADD instruction just before it and every ADD instruction (except the first ADD) is data-dependent on the MUL instruction just before it. The Speedup is defined as follows:

The Speedup achieved in executing the given instruction sequence on the pipelined processor (rounded to 2 decimal places) is _________.

Answer: (1.87 to 1.88)

54. Consider a network using the pure ALOHA medium access control protocol, where each frame is of length 1,000 bits. The channel transmission rate is 1 Mbps (= 106 bits per second). The aggregate number of transmissions across all the nodes (including new frame transmissions and retransmitted frames due to collisions) is modeled as a Poisson process with a rate of 1,000 frames per second. Throughput is defined as the average number of frames successfully transmitted per second. The throughput of the network (rounded to the nearest integer) is _________.

Answer: (130 to 140)

55. In a directed acyclic graph with a source vertex s, the quality-score of a directed path is defined to be the product of the weights of the edges on the path. Further, for a vertex v other than s, the quality-score of v is defined to be the maximum among the quality-scores of all the paths from s to v. The quality-score of s is assumed to be 1.

The sum of the quality-scores of all the vertices in the graph shown above is_________.

Answer: (929 to 929)

© Copyright Entrance India - Engineering and Medical Entrance Exams in India | Website Maintained by Firewall Firm - IT Monteur