>
Common University Entrance Test
>
Data Science A.I Cyber Security and Computer Sci.
List of top Data Science A.I Cyber Security and Computer Sci. Questions asked in Common University Entrance Test
If x ∈ [0, 1], and f(x) and g(x) are defined as: f(x) = sin(cos(πx/4)) and g(x) = cos(sin(πx/4)) then:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Set Theory & Algebra
The simultaneous equations on the Boolean variables x, y, z, and w are: x + y + z = 1, xy = 0, x + y + w = 1, xy + z = 0. The solution for x, y, z, and w, respectively, is:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
Which of the following statements are not true?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
An FPGA with an embedded logic function that cannot be programmed is said to be:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
Let A be a 2 × 2 matrix with elements
\(a_{11} = a_{12} = a_{21} = +1\)
and
\(a_{22} = −1\)
. Then the eigenvalues of matrix A
2
are
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Set Theory & Algebra
Match List I with List II
LIST I
LIST II
(A) lim
x→1
(1 − x)
1/x
(I) e
(B) lim
x→0
1/x ln(1 − x)
(II) 1
(C) lim
x→0
(1 + x
2
)
1/x
(III) 0
(D) lim
x→∞
(1 + 1/x)
x
(IV) 2
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
Equation x
2
− 1 = 0 is required to be solved using Newton Raphson’s method with an initial guess x0 = −1. Then after one step of Newton’s method, the estimate x1 of the solution will be given by
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
Match List I with List II.
LIST I
LIST II
(A) Unification
(I) Variable can be done with a constant, another variable, or a function.
(B) Deep backtracking
(II) The entire conjunctive goal is executed.
(C) Forward movement
(III) Choose subgoal with possible unifier.
(D) Shallow backtracking
(IV) Previous subgoal to find alternative solutions.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Consider the FOL sentence F: ∀x(∃y R(x, y)). Assuming non-empty logical domains, which of the sentences below are implied by F?
(A) ∃y(∃x R(x, y))
(B) ∃y(∀x R(x, y))
(C) ∀y(∃x R(x, y))
(D) ¬∃x(∀y ¬R(x, y))
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
What is a perception check?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
What is meant by factoring?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
In a Class B subnet, we know the IP address of one host and the mask as given below: IP address = 125.134.112.66 Mask = 255.255.224.0 What is the first address (Network address)?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Networks
Let Σ be a finite non-empty alphabet and let 2Σ* be the power set of Σ*. Which one of the following is true?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Set Theory & Algebra
Match List I with List II.
LIST I
LIST II
(A) A* Algorithm
(I) Space complexity is O4, where d = depth of the deepest optimal solution.
(B) Recursive Best First Search
(II) Incomplete even if the search space is finite.
(C) Recursive Best First Search
(III) Optimal, if the optimal solution is reachable, otherwise returns the best reachable optimal solution.
(D) SMA* Algorithm
(IV) Computation and space complexity is too high.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
Let P be a regular language and Q be a context-free language such that Q ⊆ P. Then which of the following is always regular?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Which of the following languages are context-free?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Finite Languages satisfy the pumping lemma by having n = .
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Which of the following 'Laws' is Asimov’s first and most important law of robotics?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Deallocation of stack of thread and register contexts will take place.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Operating Systems
Match List I with List II.
List I
List II
A. Segmentation
I. Memory is viewed as a collection of logical address spaces.
B. Unsegmented paged memory
II. Virtual address is the same as the physical address.
C. Segmented unpaged memory
III. Memory is viewed as a paged linear address space.
D. Segmented paged memory
IV. Manages the allocation of memory within a partition.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Operating Systems
In a two-level memory hierarchy, the access time of the cache memory is 12 nsec and the access time of the main memory is 1.5 msec. The hit ratio is 0.98. What is the average access time of the two-level memory system?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Organization and Architecture
If L and L are recursively enumerable, then L is:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
In case of DMA, after the completion of the transfer, the processor is required to be notified of the completion. This is done through.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
Match List I with List II.
List I
List II
A. Supervisor mode
I. Entered when the processor encounters a software interrupt instruction
B. Abort Mode
II. Entered in response to memory fault
C. Fast Interrupt Mode
III. Entered whenever the processor receives an interrupt signal from a designated fast interrupt source
D. Interrupt Mode
IV. Entered whenever the processor receives an interrupt signal from any other source
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
Choose the correct answer from the options given below:
(A). RAID 3 requires only a single redundant disk.
(B) In RAID 4 scheme, two different parity calculations are carried out and stored in separate blocks on different disks.
(C) RAID 5 distributes the parity strips across all disks.
(D) In RAID 2, the number of redundant disks are proportional to the log of the number of data disks.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Organization and Architecture
Prev
1
2
3
Next