>
Andhra Pradesh Post Graduate Engineering Common Entrance Test
>
Computer Science & Information Technology
List of top Computer Science & Information Technology Questions asked in Andhra Pradesh Post Graduate Engineering Common Entrance Test
A graph is self-complementary if it is isomorphic to its complement. For all self-complementary graphs on n vertices, \( n \) is _______.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Graph Theory
In propositional logic \( P ↔ Q \) is equivalent to \( \sim \) (denotes NOT) _______.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Propositional Logic
Dijkstra's algorithm fails for graphs with _______.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Graph Theory
Assume G is a simple undirected graph and some vertices of G are of odd degree. Add a node \( v \) to G and make it adjacent to each odd degree vertex of G, then the resultant graph is sure to be _______.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Graph Theory
A subgraph H of a graph G is called a clique if _______.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Graph Theory
In any Lattice $L$, $((a \wedge b) \vee a) \wedge b = \_\_\_$.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Software
Let a random variable X have a binomial distribution with mean 8 and standard deviation 2. If
$P(X<2) = \frac{k}{216}, \text{ then the value of } k \text{ is } \_\_\_$.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Binomial Expansion
Which of the following control fields in TCP header is used to specify whether the sender has no more data to transport?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Networks
Which protocol uses port 53 by default?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Networks
At which OSI layer does MAC address filtering occur?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Networks
Which routing algorithm guarantees shortest paths even with negative edge weights?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Networks
Which phase of the SDLC typically consumes the most resources?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Networks
The maximum number of keys in a B-tree of order 5 with height 3 is _______ .
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Cloud Computing
A _______ architecture assigns only a few essential functions to the kernel, including address spaces, Interprocess communication (IPC), and basic scheduling.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Operating Systems
In general, there will be _______ inodes than directories in Unix File system.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Architecture
To ensure that the _______ condition never occurs in the system, we must guarantee that, whenever a process requests a resource, it does not have any other resource.
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Cloud Computing
Which of the following frees the CPU from having to deal with transfer of memory to or from I/O device?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Architecture
A currently running process can be put on a ready queue or one of the I/O queues by each of the following except _______ .
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Operating Systems
In FCFS, I/O bound processes may have to wait long in the ready queue waiting for a CPU bound job to finish. This is known as _______ .
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Architecture
Which of the following component of program state is shared across threads in a multithreaded process?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Multithreading
Among priority inversion between two processes, one with high priority and other with low priority that share a critical section will cause which of the following problem?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Multithreading
Which of the following is not a three-address code statement?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Computer Architecture
A program uses environment variables to _______ .
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Operating Systems
Which is not a CPU scheduling criterion?
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Operating Systems
The primary advantage of user-level threads over kernel-level threads is _______ .
AP PGECET - 2025
AP PGECET
Computer Science & Information Technology
Multithreading
Prev
1
2
3
4
...
9
Next