Qus : 1
CUET PG MCA PYQ
3
Which of the following is not an application of DFS?
1
Topological Sort 2
Determining Strongly Connected Components in a graph 3
Finding minimum distance to a node in an unweighted graph optimally 4
Solving Maze Problem Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution Topological Sort → Can be done using DFS (by finishing times). ✅
Strongly Connected Components (SCCs) → Kosaraju’s and Tarjan’s algorithms use DFS. ✅
Solving Maze Problem → DFS is a valid approach to explore paths in a maze. ✅
Finding minimum distance in an unweighted graph → This requires Breadth First Search (BFS) , not DFS, because BFS ensures the shortest path in an unweighted graph. ❌
Qus : 2
CUET PG MCA PYQ
2
Which of the following statement is true about IEEE754 representation of +0 and -0?
1
have the same sign bit, but different mantissa bits.
2
differ only in the sign bit; their exponent and mantissa bits are identical.
3
have the same representation because they are mathematically equivalent.
4
differ in both their exponent and mantissa bits.
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution EEE-754 Floating-Point Standard (+0 vs −0)
+0 and −0 are distinct bit patterns in IEEE-754.
They differ only in the sign bit :
+0 → sign bit = 0, exponent = all 0s, mantissa = all 0s.
−0 → sign bit = 1, exponent = all 0s, mantissa = all 0s.
The exponent and mantissa fields are identical (all zeros).
Mathematically, +0 and −0 compare equal, but they behave differently in some operations (e.g., 1/(+0) = +∞, 1/(−0) = −∞).
Qus : 3
CUET PG MCA PYQ
2
Which CPU scheduling algorithm prefers the process with the shortest burst time?
1
FCFS 2
SJF 3
Round Robin 4
Priority Scheduling Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution FCFS (First Come First Serve): Executes in the order processes arrive, no burst-time consideration.
SJF (Shortest Job First): Picks the process with the least CPU burst time → minimizes average waiting time.
Round Robin: Allocates equal time slices (quantum) cyclically, ignoring burst length.
Priority Scheduling: Selects based on priority value, not burst time (though burst time can be used as a priority heuristic).
Qus : 4
CUET PG MCA PYQ
4
Complete the following statement by choosing the correct option.
For a deadlock to occur, the four conditions namely Mutual Exclusion, Hold and wait, No preemption, circular
wait _________
1
May or may not hold 2
The circular wait does not implies hold and wait condition 3
Are completely independent 4
Must hold simultaneously Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution For a deadlock to occur in a system, the following Coffman’s conditions must all hold together :
Mutual Exclusion – At least one resource must be held in a non-shareable mode.
Hold and Wait – A process holding resources is waiting for additional resources.
No Preemption – Resources cannot be forcibly taken away; they are released only voluntarily.
Circular Wait – A closed chain of processes exists, each waiting for a resource held by the next process in the chain.
If even one of these is not satisfied, deadlock cannot occur .
Qus : 5
CUET PG MCA PYQ
1
The Dining Philosopher’ problem can be solved by:
1
Use of semaphores 2
Use of overlays 3
Mutual exclusion 4
Bounded waiting Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution Use of semaphores ✅
Because the Dining Philosopher problem is a classical synchronization problem , and it is solved using semaphores / monitors / mutex locks .
Overlays → related to memory management, not correct .
Mutual exclusion → is a requirement , but the standard answer in MCQs is semaphores .
Bounded waiting → is a condition , not the actual solution technique.
So the correct choice from the given options is "Use of semaphores."
Qus : 7
CUET PG MCA PYQ
3
In a binary search tree, the worst case time complexity of inserting
and deleting a key is:
1
$O(\log n)$ for insertion and $O(\log n)$ for deletion 2
$O(n)$ for insertion and $O(\log n)$ for deletion 3
$O(n)$ for insertion and $O(n)$ for deletion 4
$O(\log n)$ for insertion and $O(n)$ for deletion Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
• Insertion : To insert, we first locate the correct position.
This requires searching the tree = height \(h\).
Worst case: tree is skewed (\(h=n\)) → \(O(n)\).
• Deletion : To delete, we also search for the node (\(O(h)\)) and adjust pointers (constant).
Worst case: \(h=n\).
So, time = \(O(n)\).
✅ Therefore:
\[
\text{Insertion: } O(n), \quad \text{Deletion: } O(n)
\]
Qus : 8
CUET PG MCA PYQ
4
Match List-I with List-II
List-I List-II (A). Seek Time (I). Total number of bytes transferred, divided by the total time between the first request for service
and the completion of the last transfer
(B). Access Time (II). Time taken for the disk to rotate the desired sector to the disk head (C). Rotational
Latency (III). Seek Time + Rotational Latency (D). Disk
Bandwidth (IV). Time taken for the disk arm to move the heads to the cylinder containing the desired sector
Choose the
correct answer from the options given below:
1
(A) - (I), (B) - (II), (C) - (III), (D) - (IV) 2
(A) - (I), (B) - (III), (C) - (II), (D)-(IV)
3
(A) - (I), (B) - (II), (C) - (IV), (D) - (III) 4
(A) - (IV), (B) - (III), (C) - (II), (D) -(I) Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution (A) Seek Time → Time taken for the disk arm to move the heads to the cylinder containing the desired sector. Matches (IV)
(B) Access Time → Total time to access data = Seek Time + Rotational Latency. Matches (III)
(C) Rotational Latency → Time taken for the disk to rotate the desired sector under the head. Matches (II)
(D) Disk Bandwidth → Total number of bytes transferred / total time taken. Matches (I)
Final Matching
(A) → (IV)
(B) → (III)
(C) → (II)
(D) → (I)
Qus : 9
CUET PG MCA PYQ
2
In __________the search time is independent of the number of elements n.
1
Binary Search 2
Hashing
3
Linear Search 4
Jump search Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
We need to find the search method where the search time is independent of the number of elements \(n\).
• Binary Search: Time complexity \(O(\log n)\). Depends on \(n\). ❌
• Hashing: Average case \(O(1)\). Independent of \(n\) (worst case \(O(n)\)). ✅
• Linear Search: Time complexity \(O(n)\). Depends on \(n\). ❌
• Jump Search: Time complexity \(O(\sqrt{n})\). Depends on \(n\). ❌
Therefore:
\[
\text{Correct Answer: Hashing (Option 2).}
\]
Qus : 10
CUET PG MCA PYQ
1
The statements of pseudocode for searching the first element with key k in the linked list L are given below.
Arrange
them in the correct order.
(A) while (x!=NIL and x.key != k)
(B) x=L.head
(C) x=x.next
(D) return x
Choose the correct answer from the options given below:
1
(B), (A), (C), (D) 2
(A), (B), (C), (D) 3
(C), (B), (A), (D) 4
(B), (C), (A), (D) Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution Given statements:
(A) \(\; \text{while }(x \neq NIL \;\wedge\; x.key \neq k)\)
(B) \(\; x = L.head\)
(C) \(\; x = x.next\)
(D) \(\; \text{return } x\)
Correct order:
1. Initialize pointer: \((B)\) → \(x = L.head\)
2. Loop until end or key found: \((A)\) → \(\text{while}(x \neq NIL \;\wedge\; x.key \neq k)\)
3. Move to next node: \((C)\) → \(x = x.next\)
4. Return result: \((D)\) → \(\text{return }x\)
✅ Therefore, the correct sequence is:
\[
(B), (A), (C), (D)
\]
Qus : 11
CUET PG MCA PYQ
3
Arrange the following steps in the correct order to understand the functioning of a 3 to 8 line decoder.
(A). The encoder enable input is set to 1.
(B). The decoder activates one of its 8 output lines based on the input code.
(C). The input binary code is applied to the decoder.
(D). The decoder converts the 3-bit binary input into 8 possible outputs.
Choose the correct answer from the options given below:
1
(A), (B), (C), (D) 2
(A), (D), (C), (B) 3
(A), (C), (D), (B) 4
(A), (B), (D), (C) Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
To understand the functioning of a 3-to-8 line decoder:
• (A) Enable input is set to 1.
• (C) Apply the 3-bit binary input.
• (D) Decoder converts the 3-bit input into 8 possible outputs.
• (B) Finally, one of the 8 output lines is activated based on the input code.
✅ Therefore, the correct sequence is:
\[
(A), (C), (D), (B)
\]
Qus : 12
CUET PG MCA PYQ
2
Arrange the following time complexities in increasing order.
(A). Bubble sort (worst case)
(B). Deleting head node in singly linked list
(C). Binary search
(D). Worst case of merge sort
Choose the correct answer from the options given below:
1. (A), (B), (C), (D)
2. (B), (C), (D), (A)
3. (B), (A), (D), (C)
4. (C), (B), (D), (A)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
Step 1: Note the time complexities
(A) Bubble Sort (worst case): \(O(n^2)\)
(B) Deleting head node in singly linked list: \(O(1)\)
(C) Binary Search: \(O(\log n)\)
(D) Merge Sort (worst case): \(O(n \log n)\)
Step 2: Arrange in increasing order
\[
O(1)\;<\;O(\log n)\;<\;O(n \log n)\;<\;O(n^2)
\]
So:
\[
(B)\;<\;(C)\;<\;(D)\;<\;(A)
\]
Qus : 13
CUET PG MCA PYQ
1
The Quicksort and randomized Quicksort procedures differ in:
1. Selection of Pivot element
2. Worst case time complexity
3. Best case time Complexity
4. Final Output
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution The difference between Quicksort and Randomized Quicksort lies mainly in the way the pivot element is chosen. Let’s analyze each option:
Selection of Pivot element ✅
Quicksort : Pivot is chosen deterministically (e.g., always first element, last element, or middle element).
Randomized Quicksort : Pivot is chosen randomly (uniformly among available elements).
→ This is the key difference .
Worst case time complexity ❌
For both, the worst case is still O(n²) .
Randomization only reduces the chance of hitting the worst case often, but it does not eliminate it.
Best case time Complexity ❌
Final Output ❌
Qus : 16
CUET PG MCA PYQ
3
Consider a page reference string as: 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2. Assume that there are 3-page frames available.
Calculate the total number of page faults for the above reference string if
LRU policy is used for page replacement.
1.10
2.8
3.9
4.11
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution Using LRU with 3 frames on the string
7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2
gives page faults at: 7, 0, 1, 2, 3, 4, 2, 3, 0 → 9 faults .
Qus : 18
CUET PG MCA PYQ
2
What should be the minimum hamming distance dmin to guarantee correction of upto p errors in a given block code.
1. 2p
2. 2p+1
3. 2p-1
4. $2^{p-2}$
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
We know the relationship between minimum Hamming distance
\(d_{\min}\) and error correction capability \(p\):
\[
d_{\min} \;\geq\; 2p + 1
\]
This ensures the code can correct up to \(p\) errors .
✅ Correct answer:
\[
\boxed{2p+1}
\]
Qus : 19
CUET PG MCA PYQ
3
Details of a paging system for memory management are as follows:
Logical address space: 32 KB
Page Size: 4 KB
Physical Memory size: 64 KB
The number of pages in the logical address space and number of page frames in physical memory, respectively, are:
1. 4,16
2. 4,12
3. 8,16
4. 3,16
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
Step 1: Number of pages in logical address space
Number of pages =
Logical address space / Page size =
32 / 4 = 8
So, there are 8 pages .
Step 2: Number of page frames in physical memory
Number of frames =
Physical memory size / Page size =
64 / 4 = 16
So, there are 16 frames .
Step 3: Correct Option
Answer: (8, 16) → Option 3
Qus : 22
CUET PG MCA PYQ
4
Consider the following type of memories.
(A). Hard Disk Drive (HDD)
(B). Cache Memory
(C). Random Access Memory (RAM)
(D). Registers
Arrange the above memories according to their access speed (from fastest to slowest)
1. (D), (C), (B), (A)
2. (A), (C) (B), (D)
3. (B), (D), (C), (A)
4. (D), (B), (C), (A)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution We need to arrange memories from fastest to slowest in terms of access speed:
Registers (D): Fastest (located inside CPU).
Cache Memory (B): Next fastest (very close to CPU, faster than RAM).
RAM (C): Slower than cache.
Hard Disk Drive (A): Slowest (secondary storage).
So the correct order is:
( D ) , ( B ) , ( C ) , ( A )
Qus : 24
CUET PG MCA PYQ
3
In case of Binary search tree which of the following procedure's running time is distinct among all
1. TREE-SUCCESSOR (finds successor of the given node)
2. TREE-MAXIMUM (finds the node with maximum value)
3. INORDER- WALK (prints all elements of a tree in inorder manner)
4. TREE-MINIMUM (finds the node with minimum value)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
BST Procedure Time Complexities (MathJax):
1. TREE-SUCCESSOR: \( O(h) \)
2. TREE-MAXIMUM: \( O(h) \)
4. TREE-MINIMUM: \( O(h) \)
3. INORDER-WALK: \( \Theta(n) \)
Since \(O(h)\) differs from \( \Theta(n) \) and INORDER-WALK always visits all \(n\) nodes,
\[
\boxed{\text{Distinct running time: INORDER-WALK (Option 3)}}
\]
Qus : 26
CUET PG MCA PYQ
4
Match List I with List II :
LIST I LIST II A. (x+y)' I. 1 B. x+1 II. x'+y' C. (xy)' III. x'.y' D. x+0 IV. x
Choose the correct answer from the options given below:
1
A-II, B-I, C-III, D-IV 2
A-II, B-IV, C-I, D-III 3
A-III, B-I, C-IV, D-II 4
A-III, B-I, C-II, D-IV Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2022 PYQ
Solution
Qus : 27
CUET PG MCA PYQ
2
Which disk scheduling algorithm looks forthe track closest to the current head position?
1. LOOK
2. SSTF
3. FCFS
4. SCAN
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution Explanation:
SSTF (Shortest Seek Time First): Always serves the request that requires the minimum head movement from the current head position.
LOOK/SCAN: Move in one direction (like elevators), serving requests along the way.
FCFS: Serve requests in the order they arrive.
✅ Hence, SSTF is the correct choice.
Qus : 28
CUET PG MCA PYQ
1
Match List-I with List-II
List-I List-II (Algorithm/ Application) (Data Structure Used) (A). BFS (1). Stack (B). DFS (II). B Trees (C). Heap sort (III). Priority Queue (D). Storage on secondary storages devices (IV). Queue
Choose the
correct answer from the options given below:
1. (A) - (IV), (B)-(I), (C)-(III), (D) - (II)
2. (A)-(I), (B)-(III), (C)-(II), (D-(IV)
3. (A)-(I), (B)-(II), (C) - (IV), (D) (III)
4.(A)-(II), (B)-(IV), (C)-(I) (D)-(II)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Qus : 29
CUET PG MCA PYQ
2
Match List-I with List-II
List-1 List-II JK Flip Flop inputs Next State (A). 0 0 (I). Toggle (B). 0 1 (II). Set (C). 1 0 (III). Reset (D). 1 1 (IV). No Change
Choose the
correct answer from the options given below:
1. (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
2. (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
3. (A) - (IV), (B) - (III), (C) - (I), (D) - (II)
4. (A) - (I), (B) - (II), (C) - (IV), (D) - (III)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
JK Flip-Flop Truth Table (Inputs → Next State)
(A) 0 0 → (IV) No Change
(B) 0 1 → (III) Reset
(C) 1 0 → (II) Set
(D) 1 1 → (I) Toggle
✅ Correct Answer: Option 2
Qus : 30
CUET PG MCA PYQ
3
Consider a typical process Pi in the critical section. Arrange the following statements of code to make a valid general
structure.
(A). Critical section
(B). Remainder section
(C). Entry section
(D). Exit section
Choose the correct answer from the options given below:
1. (C), (B), (A), (D)
2. (C), (A), (B), (D)
3. (C), (A), (D), (B)
4. (C), (B), (D), (A)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution The general structure of a process with critical section is:
Entry section → request entry into the critical section.
Critical section → perform the critical task.
Exit section → leave and update status.
Remainder section → execute non-critical code.
Qus : 31
CUET PG MCA PYQ
1
Arrange the following layers of MS DOS operating system starting from inner most to outer most.
(A). ROM BIOS Device drivers
(B). Resident System Program
(C). MS DOS Device Drivers
(D). Application Program
Choose the correct answer from the options given below:
1. (A), (C), (B), (D)
2. (D), (B), (C), (A)
3. (B), (A), (D), (C)
4. (C), (B), (D), (A)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution In MS-DOS , the layering from innermost to outermost is:
ROM BIOS Device Drivers (lowest-level hardware interaction)
MS-DOS Device Drivers (software drivers loaded by OS)
Resident System Program (command.com, kernel parts)
Application Program (user programs)
(A) , (C), (B), (D)
Qus : 32
CUET PG MCA PYQ
1
External fragmentation occurs
1. When enough total memory space exists to satisfy a request, but it is not contiguous, storage is fragmented into a
large number of small holes.
2.When enough total memory space exists to satisfy a request, which is contiguous, storage is fragmented into a large
number of small holes.
3. When memory is empty.
4. Always.
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution External fragmentation happens when free memory is split into scattered blocks, so a large request cannot be allocated despite sufficient total free space.
Qus : 33
CUET PG MCA PYQ
3
Minimum number of 2:1 Multiplexers required to design a 16:1 Multiplexer is?
1
12 2
14 3
15 4
16 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
To implement an \(n:1\) multiplexer using only \(2:1\) multiplexers, the minimum number required is:
\[
\text{Number of 2:1 MUX} = n - 1
\]
For \(n = 16\):
\[
16 - 1 = 15
\]
✅ Therefore, the minimum number of \(2:1\) multiplexers required to design a \(16:1\) multiplexer is:
\[
\boxed{15}
\]
Qus : 34
CUET PG MCA PYQ
2
Match List-I with List-II
List - I
List - II
(CPU Scheduling Algorithm)
(Feature)
(A) FCFS
(I) FCFS + preemption
(B) Round Robin
(II) Allows the processes to move between queues
(C) Multi-level queue scheduling
(III) Often long average waiting time
(D) Multi-level Feedback Queue
(IV) Permanent assignment of processes to one specific queue
Choose the correct answer from the options given below:
1. (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
2. (A) - (III), (B) - (I), (C) - (IV), (D) - (II)
3. (A) - (I), (B) - (II), (C) - (IV), (D) - (III)
4. (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution List-I (Algorithms) and their correct features:
(A) FCFS (First Come First Serve) → It is non-preemptive and can cause long average waiting time if a long job arrives first.
⇒ Matches with (III) .
(B) Round Robin → It is essentially FCFS with preemption (time quantum).
⇒ Matches with (I) .
(C) Multi-level queue scheduling → Each process is permanently assigned to a fixed queue (like system, interactive, batch).
⇒ Matches with (IV) .
(D) Multi-level feedback queue → Allows processes to move between queues depending on behavior/CPU burst.
⇒ Matches with (II) .
Correct Matching:
( A ) − ( III ) , ( B ) − ( I ) , ( C ) − ( I V ) , ( D ) − ( II )
Qus : 35
CUET PG MCA PYQ
2
Consider the task of finding the shortest path in an unweighted graph by using BFS and DFS.
Which of the following statements are true?
(A). BFS always finds the shortest path.
(B). DFS always finds the shortest path.
(C). DFS does not guarantee finding the shortest path.
(D). BFS does not guarantee finding the shortest path.
Choose the correct answer from the options given below:
1. (B) and (D) only
2. (A) and (C) only
3. (A) and (B) only
4. (C) and (D) only
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution BFS (Breadth First Search) on an unweighted graph always explores level by level.
⇒ BFS always finds the shortest path. → (A) True
DFS (Depth First Search) explores deeply before backtracking. It can find a path, but not necessarily the shortest one.
⇒ DFS does not guarantee shortest path. → (C) True
(B) “DFS always finds the shortest path” → ❌ False.
(D) “BFS does not guarantee shortest path” → ❌ False.
✅ Correct Answer:
2. (A) and (C) only
Qus : 36
CUET PG MCA PYQ
2
Given the index i of a node in a heap, we can not compute:
1. Parent ()
2. Heap size
3. Left (i)
4. Right (i)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
In a binary heap (array representation):
Parent(i) = \(\left\lfloor \tfrac{i}{2} \right\rfloor\),
Left(i) = \(2i\),
Right(i) = \(2i+1\)
All three can be computed directly from the index i .
But the heap size depends on the total number of elements \((n)\),
which cannot be determined from i alone.
\(\therefore\) Correct Answer: (2) Heap size
Qus : 37
CUET PG MCA PYQ
4
All the elements that hash to the same slot are placed into the same linked list in :
1. Universal hashing
2. Linear Probing
3. Quadratic probing
4. Chaining
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution Linear Probing → collisions resolved by moving sequentially to next free slot.
Quadratic Probing → collisions resolved by quadratic jumps.
Universal Hashing → refers to a family of hash functions, not directly a collision handling method.
Chaining → collisions are handled by storing all elements in the same slot using a linked list (or another secondary structure).
Qus : 38
CUET PG MCA PYQ
1
Match List-I with List-II
List-I List-II (Algorithm) (Recurrence relation) (A).Binary Search (I). $T(n)=T(n/2)+c$ (where c is a constant) (B).Merge Sort (II). $T(n)=2T(n/2)+\Theta(n)$ (C). Quick sort (worst case partitioning) (III). $T(n)=T(n-1)+\Theta$ (n) (D). Linear Search (IV). $T(n)=T(n-1)+c$ (where c is a constant)
Choose the
correct answer from the options given below:
1. . (A) (I), (B) (II), (C) - (III), (D) - (IV)
2. (A) - (I), (B) - (III), (C) - (II), (D) - (IV)
3. (A) - (I), (B) -
(II), (C)-(IV), (D)-III
4. (A) (III), (B) - (IV), (C) - (I), (D) - (II)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution Binary Search → $T(n)=T(n/2)+c$ → (I)
- Merge Sort → $T(n)=2T(n/2)+\Theta(n)$ → (II)
- Quick Sort (worst case) → $T(n)=T(n-1)+\Theta(n)$ → (III)
- Linear Search → $T(n)=T(n-1)+c$ → (IV)
Correct Answer: Option (1)
Qus : 40
CUET PG MCA PYQ
2
Which of the following statements are TRUE, where |E| represents the number of edges.
(A). In case of a directed graph, the sum of lengths of all the adjacency list is E
(B). For an undirected graph, the sum of the lengths of all the adjacency list is 2|E|
(C). For a dense graph, adjacency matrix representation is preferable
(D). The memory requirement of the adjacency matrix of a graph is dependent on the number of edges
Choose the correct answer from the options given below:
1. (A), (B) and (D) only
2. (A), (B) and (C) only
3. (A), (B), (C) and (D)
4. (B), (C) and (D) only
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution - (A) ✅ True: In a directed graph, each edge appears once in exactly one adjacency list ⇒ total length = \(|E|\).
- (B) ✅ True: In an undirected graph, each edge appears twice (both endpoints) ⇒ total length = \(2|E|\).
- (C) ✅ True: For dense graphs \((|E| \approx \Theta(V^2))\), adjacency matrix is preferable (fast \(O(1)\) lookups, storage \(O(V^2)\)).
- (D) ❌ False: Adjacency matrix memory depends only on \(V^2\), not on \(|E|\).
Final Answer:
Option (2) — (A), (B) and (C) only
Qus : 41
CUET PG MCA PYQ
1
Consider implementation of database. Among the following options, choose the most appropriate data structure for this
1
B+ Tree 2
Linked list 3
Queue 4
Stack Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution When implementing a database , the most appropriate data structure depends on what part of the database you’re focusing on. Among common options, the standard and most suitable choice is:
B-Tree (or B+ Tree)
Used by almost all modern databases (MySQL, PostgreSQL, Oracle, etc.) to implement indexes .
Provides efficient search, insert, delete, and range queries in O(log n) time.
Optimized for disk storage and block reads, making it ideal for large datasets.
Other data structures used in databases:
Hash Tables
Used for hash indexes and quick equality lookups (e.g., WHERE id = 100).
Very fast for exact matches but not good for range queries.
Heaps
Linked Lists
Trie / Radix Trees
Qus : 42
CUET PG MCA PYQ
2
Mach the List - 1 with List - II
List - I
List - II
(A)Asynchronous
(I) A pulse that cause a logic device to be activated or change state
(B)Trigger
(II) The operation is not executed in step with the clock
(C) J-K Flip flop
(III) Flip flop and atleast set, reset toggle and hold modes of operation
(D) D Flip flop
(IV) Flip flop with atleast set and rest modes of operations.
Choose the correct answer from the options given below:
1
[(A-I); (B-II); (C-III); (D-IV)] 2
[(A-II); (B-I); (C-III); (D-IV)] 3
[(A-III); (B-IV); (C-II); (D-I)] 4
[(A-I); (B-II); (C-IV); (D-III)] Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
List - I
List - II
(A) Asynchronous
(II) The operation is not executed in step with the clock
(B) Trigger
(I) A pulse that causes a logic device to be activated or change state
(C) J-K Flip Flop
(III) Flip flop with set, reset, toggle and hold modes
(D) D Flip Flop
(IV) Flip flop with at least set and reset modes
Final Answer: (A) → (II), (B) → (I), (C) → (III), (D) → (IV)
Correct Option: A–II, B–I, C–III, D–IV
Qus : 43
CUET PG MCA PYQ
2
Consider a system with 1K pages and 512 frames and each page is of size 2 KB. How many bits are required to represent the virtual address space memory:
1
20 bits 2
21 bits 3
11 bits 4
16 bits Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution To determine the number of bits required to represent the virtual address space:
Number of pages = 1K = $2^10$. Page size = 2 KB = $2^{11}$ bytes. Virtual address space = Number of pages × Page size = $2^{10}×2^{11}=2^{21}$ bytes. Bits required =21 bits.
Qus : 44
CUET PG MCA PYQ
2
Each node is having a successor node in ________________:
1
Singly linked list 2
Singly Circular Linked list 3
Double Linked list 4
Not possible in any linked list Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution Each node is having a successor node in a Linked List.
In a linked list , every node contains data and a pointer (or reference) to its successor node (the next node in the sequence).
The last node points to NULL (in a singly linked list) or back to the head (in a circular linked list).
Qus : 45
CUET PG MCA PYQ
2
How does the number of page frames affect and number of page faults for a given memory access pattern in FIFO page replacement algorithm?
1
Increasing the number of page frames decreases
the number of page faults.
2
Increasing the number of page frames may increase or decrease the number of page faults depending on the memory access pattern.
3
Increasing the number of page frames always increases the number of page faults
4
Increasing the number of page frames has no effect on the number of page faults
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution We are asked about FIFO (First-In First-Out) page replacement algorithm .
Key point:
Normally, increasing the number of page frames decreases the number of page faults (because more pages can be stored).
But in FIFO , there is a special anomaly called Belady’s Anomaly .
Checking the options:
Increasing the number of page frames decreases the number of page faults.
❌ Not always true (Belady’s anomaly exists).
Increasing the number of page frames may increase or decrease the number of page faults depending on the memory access pattern.
✅ This is correct (captures Belady’s anomaly).
Increasing the number of page frames always increases the number of page faults.
❌ Wrong.
Increasing the number of page frames has no effect.
❌ Wrong.
✅ Final Answer:
(2) Increasing the number of page frames may increase or decrease the number of page faults depending on the memory access pattern.
Qus : 46
CUET PG MCA PYQ
1
Arrange the following in increasing order of their per unit cost.
(A) DRAM
(B) Magnetic disk
(C) Optical disk
(D) SRAM
(E) Magnetic tape
Choose the correct answer from the options given below:
1
E, C, B, A, D
2
E, C, B, D, A
3
C, B, E, D, A 4
C, B, D, E, A
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Per unit cost comparison (lowest → highest):
(E) Magnetic tape → Cheapest (backup/archive storage)
(B) Magnetic disk → Hard disk, inexpensive
(C) Optical disk → CD/DVD/Blu-ray, costlier than HDD
(A) DRAM → Main memory, more expensive
(D) SRAM → Cache memory, fastest and most expensive
Final Order (increasing per unit cost):
E < B < C < A < D
Qus : 47
CUET PG MCA PYQ
1
Consider the following statements.
(A). Combinational logic circuits do not have memory, while sequential logic circuits have memory elements.
(B). Sequential logic circuits depend only on the current inputs,while combinational logic circuits depend on both
current and past inputs.
(C). Flip-flops and latches are examples of combinational logic circuits.
(D). Multiplexer is an example of combinational logic circuit.
Choose the correct statement/statements from the options given below:
1. (A) and (D) only
2. (A), (B) and (D) only
3. (A), (B), (C) and (D)
4. (B), (C) and (D) only
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
Solution
(A). ✅ Correct. Combinational logic circuits do not have memory. Sequential circuits include memory elements.
(B). ❌ Incorrect. Sequential circuits depend on both current and past inputs (via memory) , while combinational circuits depend only on current inputs.
(C). ❌ Incorrect. Flip-flops and latches are examples of sequential circuits , not combinational circuits.
(D). ✅ Correct. Multiplexer (MUX) is a combinational logic circuit.
Correct Statements: (A) and (D)
Answer: Option 1
Qus : 48
CUET PG MCA PYQ
4
Match List – I with List – II
List - I List - II (A) Flash Memory (I) Oldest and Slowest (B) PMOS (II) Used in large scale integration (LSI) (C) NMOS (III) Least power consumption (D) CMOS (IV) Non volatile RAM which is powered continuously
Choose the correct answer from the options given below:
1
(A – I); (B – IV); (C – III); (D – II)
2
(A – I); (B – IV); (C – II); (D – III)
3
(A – IV); (B – I); (C – III); (D – II)
4
(A – IV); (B – I); (C – II); (D – III)
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Solution:
List - I
List - II
Match
(A) Flash Memory
(IV) Non-volatile RAM which is powered continuously
A → IV
(B) PMOS
(I) Oldest and slowest
B → I
(C) NMOS
(II) Used in large scale integration (LSI)
C → II
(D) CMOS
(III) Least power consumption
D → III
Final Answer: (A) → (IV), (B) → (I), (C) → (II), (D) → (III)
Qus : 49
CUET PG MCA PYQ
2
A situation where two or more processes are blocked, waiting for resources held by each other is called:
1. Pooling
2. Deadlock
3. Thrashing
4. Paging
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
Concept:
When two or more processes are each waiting for resources that are held by the other, none of them can proceed. This situation is known as a deadlock .
Other terms:
- Pooling: Reusing resources like threads or connections.
- Thrashing: Excessive paging, leading to performance degradation.
- Paging: Memory management scheme for virtual memory.
Correct Answer: Deadlock
Answer: Option 2
Qus : 50
CUET PG MCA PYQ
2
To provide a memory capacity of 32K X 16 how many address lines and data lines are required?
1. address lines=14, data lines=16
2. address lines=15, data lines=16
3. address lines=14, data lines=4
4. address lines=15, data lines=4
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
Given: Memory capacity = 32K × 16
Step 1: 32K means 32 × 1024 = 32768 memory locations.
To address 32768 locations, we need:
$$\log_2(32768) = 15 \; \text{address lines}$$
Step 2: Each location stores 16 bits = 16 data lines.
Address lines required: 15
Data lines required: 16
Answer: Option 2
Qus : 52
CUET PG MCA PYQ
1
Consider a completely skewed (left / right) binary search tree with n elements. What is the worst case time complexity of searching an element in this tree?
1
O(n) 2
O(1) 3
O(logn) 4
O(n logn) Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
A completely skewed BST (all nodes on one side) has height \(n\). Searching may traverse every node in the worst case.
Worst-case time complexity: \(O(n)\)
Qus : 53
CUET PG MCA PYQ
2
Which of the following scheduler/schedulers is/are also called CPU scheduler?
(A). Short Term Scheduler
(B). Long Term Scheduler
(C). Medium Term Scheduler
(D). Asymmetric Scheduler
Choose the correct answer from the options given below:
1. (A), (B) and (D) only
2. (A), (B) and (C) only
3. (A), (B), (C) and (D)
4. (A) only
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
Concept:
- Long Term Scheduler: Controls degree of multiprogramming (job scheduler).
- Medium Term Scheduler: Suspends/resumes processes (swapping).
- Short Term Scheduler: Selects process from ready queue and allocates CPU.
- The CPU Scheduler is another name for the Short Term Scheduler .
Hence: Only (A) is correct.
Correct Answer: Short Term Scheduler
Answer: Option 4
Qus : 54
CUET PG MCA PYQ
3
If we want to find last node of a singly linked list then the correct coding is
1
if (temp → link! = NULL) temp = temp → link
2
if (temp → data = = Num) temp = temp → link
3
while (temp → link! = NULL) temp = temp → link
4
While (temp → link! = data) temp = temp → link
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
To find the last node of a singly linked list, we must keep moving until the link (next pointer) becomes NULL. This ensures we stop exactly at the last node.
// Structure of node
struct Node {
int data;
struct Node* link;
};
// Function to get last node
struct Node* getLastNode(struct Node* head) {
struct Node* temp = head;
// Traverse until last node
while (temp -> link != NULL) {
temp = temp -> link;
}
return temp; // Now temp points to last node
}
Explanation:
Initialize a pointer temp with head.
Keep moving forward using temp = temp → link while temp → link != NULL.
When loop ends, temp is pointing to the last node .
Correct Code Logic:
while (temp → link != NULL) temp = temp → link;
Qus : 55
CUET PG MCA PYQ
1
Perform the arithmetic addition of the two decimal numbers given in List-I using the signed-complement system.
Match the corresponding output of
List-I with binary number representation given in
List-II. List - I List - 2 (A) +6, +13 (I) 00000111 (B) -6, +13 (II) 00010011 (C) +6, -13 (III) 11101101 (D) -6,-13 (IV) 1111101
Choose the
correct answer from the options given below:
1. (A) - (II), (B) - (I), (C) - (III), (D) - (IV)
2. (A) - (II), (B) - (I), (C) - (IV), (D) - (III)
3. (A) - (I), (B) - (II), (C) - (IV), (D) - (III)
4. (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
1
1 2
2 3
3 4
4 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2025 PYQ
Solution
Step 1: Perform decimal addition.
(A) +6 +13 = +19 → binary = 00010011 (matches II)
(B) -6 +13 = +7 → binary = 00000111 (matches I)
(C) +6 -13 = -7 → binary (2’s complement) = 11111001 , but given closest is 11101101 (matches III)
(D) -6 -13 = -19 → binary (2’s complement) ≈ 11101101 , but option provides 1111101 (matches IV)
Step 2: Matching pairs.
• (A) → (II)
• (B) → (I)
• (C) → (III)
• (D) → (IV)
Correct Matching: (A)-(II), (B)-(I), (C)-(III), (D)-(IV)
Answer: Option 1
Qus : 56
CUET PG MCA PYQ
1
The function represented by the k-map given below is
1
BC+AB+AC'
2
BC'+AB+AC'
3
B⊕C'
4
ABC Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
K-map (3 variables: A rows, BC columns in Gray order 00,01,11,10)
A \ BC 00 01 11 10
A=0 0 0 1 0
A=1 1 0 1 1
Groupings and terms:
Cells (A=1, BC=11) & (A=1, BC=10) → pair → AB
Cells (A=1, BC=00) & (A=1, BC=10) → pair → AC'
Cells (A=0, BC=11) & (A=1, BC=11) → pair → BC
Simplified function: \(F = AB \;+\; AC' \;+\; BC\)
Correct option: 1) BC + AB + AC'
Qus : 57
CUET PG MCA PYQ
3
Let A’ represent complement of A. Which of the following boolean expressions is/are true?
(A) A +AB=A
(B) (A+B)'= A'B'
(C) (A')'= A
(D) (AB)'= A'+B'
Choose the correct answer from the options given below:
1
(A), (B) and (D) only
2
(A) and (D) only
3
(A), (B) , (C) and (D)
4
(B) and (D) only
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Solution:
(A) \(A + AB = A(1 + B) = A \cdot 1 = A\) (Absorption law) ✅
(B) \((A + B)' = A'B'\) (De Morgan’s law: complement of sum is product of complements) ✅
(C) \((A')' = A\) (Double complement law) ✅
(D) \((AB)' = A' + B'\) (De Morgan’s law: complement of product is sum of complements) ✅
Final Answer: All are true — (A), (B), (C), (D) .
Qus : 58
CUET PG MCA PYQ
1
A logic circuit, that can odd two 1-bit numbers and produce output for sum and carry but cannot handle carry, input, is called ____________.
1
Half adder
2
Full adder
3
Multiplexer
4
Encoder
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
A circuit that adds two 1-bit numbers and produces outputs for Sum and Carry but does not handle carry input is called a Half Adder .
A B Sum (A⊕B) Carry (A·B)
0 0 0 0
0 1 1 0
1 0 1 0
1 1 0 1
Boolean Expressions:
Sum = \( A \oplus B \)
Carry = \( A \cdot B \)
Final Answer: The circuit is a Half Adder .
Qus : 59
CUET PG MCA PYQ
1
On a system using simple segmentation, following is the segment table:
Segment Limit Base 0 500 1000 1 200 2000 2 300 2500 3 100 1700
What is the physical address for the logical address 2, 212?
1
2712 2
512 3
2212 4
2800 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Logical address is given as (2, 212).
Segment
Limit
Base
Offset
Check
Physical Address
2
300
2500
212
212 < 300 → Valid
2500 + 212 = 2712
Final Answer: The physical address corresponding to logical address (2, 212) is 2712 .
Qus : 60
CUET PG MCA PYQ
4
Arrange the following in the increasing order of their asympotic complexities:
(A) Insertion sort (best case)
(B) Bubble sort (worst case)
(C) Binary Search (worst case)
(D) Merge sort (worst case)
1
A, C, B, D 2
D, A, C, B 3
A, B, C, D 4
C, A, D, B Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Qus : 62
CUET PG MCA PYQ
2
We can say that a schedule is conflict serializable?
(1) If a schedule T can be transformed into a serial schedule U by a series of swaps of conflicting operations.
(2) If a schedule T can be transformed into a serial schedule U by a series of swaps of nonconflicting operations.
(3) If a schedule T can be transformed into a non serial schedule U by a series of swaps of conflicting operations.
(4) If a schedule T can be transformed into a non serial schedule U by a series of swaps of non conflicting operations.
1
(1) 2
(2) 3
(3) 4
(4)
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Qus : 63
CUET PG MCA PYQ
2
The following integers are needed to be stored in ascending order using bubble sort.
5, 8, 22, 18, 1
Following are the results of various passes during the sorting process.
1
5, 1, 8, 18, 22
2
1, 5, 8, 18, 22
3
5, 8, 18, 1, 22
4
5, 8, 1, 18, 22
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Qus : 66
CUET PG MCA PYQ
4
What are the ways to implement a priority Queue?
(A) Arrays
(B) Fibonacci tree
(C) Heap Data Structure
(D) Linked list
Choose the correct answer from the options given below:
1
(A), (B) and (D) only
2
(B), (C) and (D) only
3
(A), (B), (C) and (D)
4
(A), (C) and (D) only
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Ways to Implement a Priority Queue
The correct answer is:
(A) Arrays, (C) Heap Data Structure, and (D) Linked List
Explanation:
Arrays:
Unsorted Array: Insertion is O(1), Deletion is O(n).
Sorted Array: Insertion is O(n), Deletion is O(1).
Heap Data Structure:
Binary heaps are commonly used for efficient implementation.
Insertion and Deletion take O(log n) time.
Linked List:
Can be implemented as sorted or unsorted.
Efficiency depends on the choice of implementation.
Why not Fibonacci Tree?
Fibonacci trees are not used directly for priority queues. However, Fibonacci heaps (a separate data structure) can implement priority queues efficiently.
Qus : 67
CUET PG MCA PYQ
3
An operating system cotains 4 user processor each requiring 5 units of resource R. The minimum number ofrequired units of R such that no deadlock will every occur is
1
20 2
4 3
17 4
15 Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution Minimum Number of Required Units of Resource R to Prevent Deadlock Number of processes (P) = 4 Maximum demand per process = 5 units Formula: R≥(P−1)×max demand+1 Substituting values: R≥(4−1)×5+1=3×5+1=15+1=16 Minimum required units of resource R = 16
Qus : 68
CUET PG MCA PYQ
4
Given below are two statements:
Statement I: 011010 is 2's complement representation of -37.
Statement II: 111(8) is octal representation of 73.
In the light of the above statements, choose the most appropriate answer from the
options given below :
1
Both Statement I and Statement II are true 2
Both Statement I and Statement II are false. 3
Statement I is true but Statement II is false. 4
Statement I is false but Statement II is true. Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2022 PYQ
Solution
Qus : 69
CUET PG MCA PYQ
2
The current allocation and Maximum requirement of different types of resources for four processes are given below:
Consider the following four statements.
(A) P2 → P4 → P1 → P3 is a safe sequence
(B)
P4 → P2 → P1 → P3 is a safe sequence
(C)
P4 → P2 → P3 → P1 is a safe sequence
(D) P1 → P4 → P2 → P3 is a safe sequence
Identify correct statements from the given options.
1
(A), (B) and (D) only
2
(A), (B) and (C) only
3
(B), (C) and (D) only
4
(A), (B), (C), (D)
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Banker's Algorithm Solution
Step 1: Need Matrix
The Need Matrix is calculated as:
Need = Max - Allocation
Process R1 R2 R3
P1 4 5 2
P2 1 0 1
P3 6 0 0
P4 0 1 0
Step 2: Initial Available Resources
The Available resources at the start are:
Step 3: Evaluate Each Sequence
Sequence (A): P2 → P4 → P1 → P3
P2: Need = [1, 0, 1], Available = [4, 4, 5]. Allocate resources. New Available = [7, 5, 7].
P4: Need = [0, 1, 0], Available = [7, 5, 7]. Allocate resources. New Available = [10, 7, 9].
P1: Need = [4, 5, 2], Available = [10, 7, 9]. Allocate resources. New Available = [14, 8, 11].
P3: Need = [6, 0, 0], Available = [14, 8, 11]. Allocate resources. New Available = [17, 12, 14].
Result: Sequence (A) is valid.
Sequence (B): P2 → P1 → P3 → P4
P2: Need = [1, 0, 1], Available = [4, 4, 5]. Allocate resources. New Available = [7, 5, 7].
P1: Need = [4, 5, 2], Available = [7, 5, 7]. Allocate resources. New Available = [11, 6, 9].
P3: Need = [6, 0, 0], Available = [11, 6, 9]. Allocate resources. New Available = [14, 10, 12].
P4: Need = [0, 1, 0], Available = [14, 10, 12]. Allocate resources. New Available = [17, 12, 14].
Result: Sequence (B) is valid.
Sequence (C): P4 → P2 → P3 → P1
P4: Need = [0, 1, 0], Available = [4, 4, 5]. Allocate resources. New Available = [7, 6, 7].
P2: Need = [1, 0, 1], Available = [7, 6, 7]. Allocate resources. New Available = [10, 7, 9].
P3: Need = [6, 0, 0], Available = [10, 7, 9]. Allocate resources. New Available = [14, 8, 11].
P1: Need = [4, 5, 2], Available = [14, 8, 11]. Allocate resources. New Available = [17, 12, 14].
Result: Sequence (C) is valid.
Sequence (D): P1 → P4 → P2 → P3
P1: Need = [4, 5, 2], Available = [4, 4, 5]. Cannot proceed as Need > Available.
Result: Sequence (D) is invalid.
Final Answer:
Safe Sequences: (A), (B), (C)
Invalid Sequence: (D)
Qus : 70
CUET PG MCA PYQ
1
Given below are two statements: one is labelled as Assertion A and the other is
labelled as Reason R.
Assertion A : Binary information is represented in digital in terms of 'zeros' and
'ones.
Reason R : Digital computers are electronic devices, which operate using
electrical voltages.
In the light of the above statements, choose the most appropriate answer from the
options given below:
1
Both A and R are correct and R is the correct explanation of A. 2
Both A and R are correct but R is not the correct explanation of A. 3
A is correct but R is not correct. 4
A is not correct but R is correct. Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2022 PYQ
Solution
Qus : 71
CUET PG MCA PYQ
1
Match List – I with List – II
List - I (Algorithms) List - II (Complexity) (A) Bellman - Ford algorithm (with adjacencylist representation)
(I) $O(|V|^2)$ (B)
Dijkstra Algorithm
(II) O((V+E) logV) (C)
Prim’s Algorithm
(III) O(mn) (D)
Topological sorting (with adjacency list representation)
(IV) O(m+n)
Choose the correct answer from the options given below:
1
(A – III); (B – I); (C – II); (D – IV)
2
(A – II); (B – IV); (C – III); (D – I)
3
(A – III); (B – IV); (C – I); (D – II)
4
(A – II); (B – I); (C – III); (D – IV)
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Qus : 76
CUET PG MCA PYQ
1
In a processor, while executing an instruction
A. Programme Counter is used to hold the address of next instruction.
B. Instruction register holds the instruction for execution.
C. Memory Address Register is used to perform address translation.
D. Memory Data Register is used to perform data operation
E. Clock generates control signals.
Choose the correct answer from the options given below:
1
Only A and B are true 2
Only C and D are true 3
Only A, B and E are true 4
Only B, C, and D are true Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2022 PYQ
Solution
Qus : 78
CUET PG MCA PYQ
1
Match List – I with List – II
List - I List - II (A) Critical Region (I) Circular Wait (B) Working Set (II) Condition variable (C) Deadlock (III) Principle of locality (D) Wait/Signal (IV) Mutual Exclusion
Choose the correct answer from the options given below:
1
(A – IV); (B – III); (C – I); (D – II)
2
(A – IV); (B – III); (C – II); (D – I)
3
(A – III); (B – IV); (C – II); (D – I)
4
(A – III); (B – IV); (C – I); (D – II)
Go to Discussion
CUET PG MCA Previous Year PYQ
CUET PG MCA CUET 2024 PYQ
Solution
Matching List-I with List-II:
List - I
List - II
Explanation
Critical Region
Mutual Exclusion (IV)
The critical region ensures mutual exclusion, allowing only one process to access a shared resource at a time.
Working Set
Principle of Locality (III)
The working set is a concept used in memory management, based on the principle of locality to predict the set of pages a process is likely to use.
Deadlock
Circular Wait (I)
One of the necessary conditions for a deadlock is circular wait, where processes are waiting for resources held by one another in a circular chain.
Wait/Signal
Condition Variable (II)
The wait and signal operations are synchronization mechanisms associated with condition variables in multi-threaded environments.
Final Answer:
(A) → (IV), (B) → (III), (C) → (I), (D) → (II)
[{"qus_id":"11322","year":"2022"},{"qus_id":"11324","year":"2022"},{"qus_id":"11327","year":"2022"},{"qus_id":"11328","year":"2022"},{"qus_id":"11329","year":"2022"},{"qus_id":"11330","year":"2022"},{"qus_id":"11471","year":"2022"},{"qus_id":"11472","year":"2022"},{"qus_id":"11475","year":"2022"},{"qus_id":"11479","year":"2022"},{"qus_id":"11490","year":"2022"},{"qus_id":"11672","year":"2024"},{"qus_id":"11676","year":"2024"},{"qus_id":"11677","year":"2024"},{"qus_id":"11679","year":"2024"},{"qus_id":"11680","year":"2024"},{"qus_id":"11681","year":"2024"},{"qus_id":"11684","year":"2024"},{"qus_id":"11690","year":"2024"},{"qus_id":"11692","year":"2024"},{"qus_id":"11697","year":"2024"},{"qus_id":"11698","year":"2024"},{"qus_id":"11700","year":"2024"},{"qus_id":"11701","year":"2024"},{"qus_id":"11710","year":"2024"},{"qus_id":"11716","year":"2024"},{"qus_id":"11718","year":"2024"},{"qus_id":"11720","year":"2024"},{"qus_id":"11721","year":"2024"},{"qus_id":"11724","year":"2024"},{"qus_id":"11725","year":"2024"},{"qus_id":"11726","year":"2024"},{"qus_id":"11727","year":"2024"},{"qus_id":"11729","year":"2024"},{"qus_id":"11732","year":"2024"},{"qus_id":"11733","year":"2024"},{"qus_id":"11734","year":"2024"},{"qus_id":"11736","year":"2024"},{"qus_id":"11739","year":"2024"},{"qus_id":"11740","year":"2024"},{"qus_id":"11745","year":"2024"},{"qus_id":"12066","year":"2025"},{"qus_id":"12067","year":"2025"},{"qus_id":"12069","year":"2025"},{"qus_id":"12070","year":"2025"},{"qus_id":"12072","year":"2025"},{"qus_id":"12074","year":"2025"},{"qus_id":"12075","year":"2025"},{"qus_id":"12078","year":"2025"},{"qus_id":"12080","year":"2025"},{"qus_id":"12081","year":"2025"},{"qus_id":"12082","year":"2025"},{"qus_id":"12084","year":"2025"},{"qus_id":"12086","year":"2025"},{"qus_id":"12088","year":"2025"},{"qus_id":"12091","year":"2025"},{"qus_id":"12092","year":"2025"},{"qus_id":"12093","year":"2025"},{"qus_id":"12094","year":"2025"},{"qus_id":"12095","year":"2025"},{"qus_id":"12096","year":"2025"},{"qus_id":"12100","year":"2025"},{"qus_id":"12102","year":"2025"},{"qus_id":"12104","year":"2025"},{"qus_id":"12105","year":"2025"},{"qus_id":"12109","year":"2025"},{"qus_id":"12111","year":"2025"},{"qus_id":"12112","year":"2025"},{"qus_id":"12117","year":"2025"},{"qus_id":"12118","year":"2025"},{"qus_id":"12119","year":"2025"},{"qus_id":"12121","year":"2025"},{"qus_id":"12122","year":"2025"},{"qus_id":"12124","year":"2025"},{"qus_id":"12125","year":"2025"},{"qus_id":"12193","year":"2025"},{"qus_id":"12196","year":"2025"},{"qus_id":"12198","year":"2025"},{"qus_id":"12200","year":"2025"},{"qus_id":"12202","year":"2025"},{"qus_id":"12206","year":"2025"}]