Saturday 10 December 2016

List of Websites to Search and Apply for Jobs in India

1. BJS (Bangalore Job Seekers)

2. MRA Job Seekers
3. chetanasforum.com
4. freshersworld.com
5. indeed.com
6. linkedin.com/jobs/
7. monster.com
8. naukri.com
9. timesjobs.com
10. dice.com - US's leading tech Job site
11. ragns.com
12. simplyhired.com
13. glassdoor.com
14. shine.com
15. hired.com

16. instahyre.com - for start-up jobs
17. angel.co - for startup job, invest in a startup, or raise money

18. elitmus.com
19. myamcat.com
20. hackerrank.com
21. hackerearth.com
22. interviewbit.com

Please not that this list of websites to search and apply for jobs in India is not a complete list.

Friday 9 December 2016

Check Credit Card, Debit Card and Net Banking are Working or Not

If you want to confirm that your Indian credit card, debit card or net banking is working perfectly or not then here is the very best way to check it.

You need to visit below given link. Fill a small amount that you can pay freely and then do transaction. If your transaction become successful then your chose payment medium is working perfectly, else your chose payment medium is not working.

Please note that the successfully transacted amount will not be refunded back to you. So use a small amount like Rs 1. The link supports only Indian credit card, debit card and net banking.

Short Speech on Engineers for Primary School Children's

I had written this short and simple speech to teach to one small children student of class 2nd. This speech on 'engineers' is containing only simple sentences.

Speech Text

1. The world and our life without an engineer is like a train without wheels.
2. Engineers develop new technology.
3. Engineers create the interface between science and society.
4. Engineers are the backbone of development & technology.
5. There are many types of engineer.
6. The civil engineers work for buildings.
7. The computer engineers work for computers.
8. The electrical engineers work for electricity.
9. The mechanical engineer work for machines.
10. Their work named as engineering.
11. I like engineering.

Sunday 3 July 2016

ISRO 2016 Answer Key and Solutions Computer Science Scientist Engineer

The ISRO Computer Science (CS) Scientist Engineer test held on July 3, 2016 (Sunday). Total questions were 80 and test duration were 90 Minutes. Here is the solution of paper according to me of set B.
  • The Answer Key 2016 for All Sets by ISRO: Click here
  • For complete preparation for ISRO Computer Science visit my this article: Click Here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2015Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2014: Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2013Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2011Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2009Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2008Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2007Click here

41. Given the relations
employee (name, salary, deptno) and
department (deptno, deptname, address)
Which of the following queries cannot be expressed using the basic relational algebra operations (U, -, x, π, σ, p)?
(a) Department address of every employee
(b) Employees whose name is the same as their department name
(c) The sum of all employees’ salaries
(d) All employees of a given department


Correct Answer: (c)
Explanation: We can't generate relational algebra of aggregate function using basic operations.
Note: Same question had asked in GATE CS 2000 exam.
Reference: http://www.geeksforgeeks.org/database-management-system-set-1/

42. Trigger is
(a) Statement that enables to start any DBMS
(b) Statement that is executed by the user when debugging an application program
(c) The condition that the system tests for the validity of the database user
(d) Statement that is executed automatically by the system as a side effect of a modification to the database

Correct Answer: (d) 
Explanation: A database trigger is procedural code that is automatically executed in response to certain events on a particular table or view in a database.
Note: Same question asked in many exams.
Reference: https://en.wikipedia.org/wiki/Database_trigger

43. The order of a leaf node in a B+ tree is the maximum number of (value, data record pointer) pairs it can hold. Given that the block size is 1K bytes, data record pointer is 7 bytes long, the value field is 9 bytes long and a block pointer is 6 bytes long, what is the order of the leaf node?
(a) 63
(b) 64
(c) 67
(d) 68

Correct Answer: (a)
Explanation: Lets suppose order is n. A B+ tree leaf node contains following items:
  • n Value fields; here 9 bytes long it is
  • n data record pointers; here 7 bytes long 
  • 1 block pointer to point next block; here it is 6 bytes long
A B+ tree node size should <= block size
Here, n9 + n7 + 6 <= 1K
=> 9n + 7n + 6 <= 1024
=> 16n <= 1018
=> n <= 1018/16
=> n <= 63.625
=> n = 63
Note: Same question had asked in GATE 2007 CS exam.
Reference: http://gateoverflow.in/1261/gate2007_63

44. A clustering index is defined on the fields which are of type _________.
(a) Non-key and ordering
(b) Non-key and non-ordering
(c) Key and ordering
(d) Key and non-ordering

Correct Answer: (a)
Explanation: Clustering index is defined on an ordered data file. The data file is ordered on a non-key field.
  • Ordered data file means data have a specific order/sequence.
  • Data is ordered on basis of some non-key field instead a key field.
  • All the data that have same non-key value taken as a single cluster. 
Note: Same question had asked in GATE CS 2008.
Reference: http://gateoverflow.in/414/gate2008_16

45. The extent to which the software can continue to operate correctly despite the introduction of invalid inputs is called as
(a) Reliablity
(b) Robustness
(c) Fault tolerance
(d) Portability

Correct Answer: (b)
Explanation: robustness is the ability of a computer system to cope with errors during execution and cope with erroneous input. All other given options have different purposes and meaning.
Reference: https://en.wikipedia.org/wiki/Robustness_(computer_science)

46. Which one of the following is a functional requirement?
(a) Maintainability
(b) Portability
(c) Robustness
(d) None of the mentioned

Correct Answer: (d)
Explanation: Maintainability, Portability and Robustness all are non-functional requirements. Functional requirements are related to a functionality. A functionality is described as a set of inputs, the behavior, and outputs.
Reference: http://gateoverflow.in/55559/isro2016-62

47. Configuration management is not concerned with
(a) Controlling changes to the source code
(b) Choice of hardware configuration for an application
(c) Controlling documentation changes
(d) Maintaining versions of software

Correct Answer: (b)
Explanation: Configuration management is the task of tracking and controlling changes in the software. Option (b) is not relevant to software.
Reference: https://gateoverflow.in/55717/isro2016-63

48. A company needs to develop a strategy for software product development for which it has a choice of two programming languages L1 and L2. The number lines of code (LOC) developed using L2 is estimated to be twice of the LOC developed with L1. The product will have to be maintained for five years. Various parameters for the company are given in the table below.


ParameterLanguage L1 Language L2
Man years needed for development LOC/10000 LOC/10000
Development Cost per man year र 10, 00, 000  7, 50, 000
Maintenance Time 5 years 5 years
Cost of maintenance per year  1,00,000  50, 000

Total cost of the project includes cost of development and maintenance. What is the LOC for L1 for which of the cost of the project using L1 is equal to the cost of the project using L2?
(a) 10,000
(b) 5,000
(c) 7,500
(d) 75,000


Correct Answer: (b)
Explanation:
Let L1 = x
Then L2 will be = 2x
Find LOC for L1 for which cost using L1 is same to cost using L2
=> Cost using L1 = Cost using L2
=> (x/10000) * 10,00,000 + (5 * 1,00,000) = (2x/10000) * 7,50,000 + (5 * 50,000)
=> 100x + 5,00,000 = 150x + 2,50,000
=> 50x =  2,50,000
=> x = 5000
Note: Same question had asked in GATE CS 2011
Reference: http://gateoverflow.in/2107/gate2011_5

49. A company needs to develop a digital signal processing software for one of its newest inventions. The software is expected to have 20000 lines of code. The company needs to determine the effort in person-months needed to develop this software using the basic COCOMO model. The multiplicative factor for this model is given as 2.2 for the software development on embedded systems, while the exponentiation factor is given as 1.5. What is the estimated effort in person-months?
(a) 196.77
(b) 206.56
(c) 199.56
(d) 210.68


Correct Answer: (a)
Explanation:
LOC given = 20,000 => KLOC = 20
Effort applied (E) = ab X (KLOC)bb man-months
Where ab (multiplicative factor) given = 2.2
Where bb (exponentiation factor) given = 1.5
So solve, E = 2.2 X (20)1.5 man-months
=> E = 196.77
Reference: http://gateoverflow.in/55666/isro2016-65

50. In the spiral model of software development, the primary determinant in selecting activities in each iteration is
(a) Iteration size
(b) Cost
(c) Adopted process such as Rational Unified Process or Extreme Programming
(d) Risk

Correct Answer: (d)
Explanation: The spiral model is a risk-driven process model generator for software projects. Based on the unique risk patterns of a given project, the spiral model guides a team to adopt elements of one or more process models, such as incremental, waterfall, or evolutionary prototyping.
Note: Same question had also asked in GATE IT 2007 exam.
Reference: https://en.wikipedia.org/wiki/Spiral_model

51. Bit stuffing refers to
(a) Inserting a '0' in user stream to differentiate it with a flag
(b) Inserting a '0' in flag stream to avoid ambiguity
(c) Appending a nibble to the flag sequence
(d) Appending a nibble to the user data stream

Correct Answer: (a)
Explanation: The term "bit stuffing" broadly refers to a technique whereby extra bits are added to a data stream, which do not themselves carry any information, but either assist in management of the communications or deal with other issues. In computer networks, Zero-bit insertion is a particular type of bit stuffing used in some data transmission protocols to aid clock recovery from the data stream.
Note: Same question had asked in ISRO 2007 exam.
Reference: http://gateoverflow.in/49497/isro2007-24-isro2016-67

52. Dynamic routing protocol enable routers to:
(a) Dynamically discover and maintain routes
(b) Distribute routing updates to other routers
(c) Reach agreement with other routers about the network topology
(d) All of the above

Correct Answer: (d)
Explanation: all the options (a), (b), and (c) are basic needs to handle by the dynamic routing protocols.
Reference: https://en.wikipedia.org/wiki/Dynamic_routing

53. In Ethernet CSMA/CD, the special bit sequence is transmitted by media access management to handle collision is called
(a) Preamble
(b) Postamble
(c) Jam
(d) None of these

Correct Answer: (c)
Explanation: CSMA/CD uses a carrier sensing scheme in which a transmitting data station detects other signals while transmitting a frame, and stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame. The jam signal or jamming signal is a signal that carries a 32-bit binary pattern sent by a data station to inform the other stations of the collision and that they must not transmit.
Reference: https://en.wikipedia.org/wiki/Carrier_sense_multiple_access_with_collision_detection

54. Which network protocol allows hosts to dynamically get a unique IP number on each bootup?
(a) DHCP
(b) BOOTP
(c) RARP
(d) ARP

Correct Answer: (a)
Explanation:
  • Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP), both does allows hosts to dynamically get a unique IP Number. But differ in few things. BOOTP was designed to provide an IP address during the host is booting up while DHCP provide an IP address at any time when a host tries to connecting a server.
  • Reverse ARP (RARP) is used to get IP address corresponding to a MAC address.
  • Address Resolution Protocol (ARP) is used to get MAC address corresponding to an IP address. 
Reference: http://gateoverflow.in/55521/isro2016-06

55. In a token ring network, the transmission speed is 107 bps and the propagation speed is 200 m/μs. Then 1 bit delay in this network is equivalent to
(a) 500 m of cable
(b) 200 m of cable
(c) 20 m of cable
(d) 50 m of cable

Correct Answer: (c)
Explanation:
in 1 second, bits transmit =  107 bps
1 bit takes time to transmit = .10 μs
Propagation speed is = 200 m in 1 μs
So, 1 bit delay in network is =  200 m * .10 μs = 20 m of cable
Note: Same question had asked in GATE CS 2007 exam.
Reference: http://gateoverflow.in/1264/gate2007_66


56. The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet?
(a) 62 subnets and 262142 hosts
(b) 64 subnets and 262142 hosts
(c) 62 subnets and 1022 hosts
(d) 64 subnets and 1024 hosts


Correct Answer: (c)
Explanation:
  • In class B, first 2 octet are reserved for Network ID and remaining 2 octet for Host ID
  • So first 6 bits of 3rd octet are used for subnet and remaining 10 bits for hosts.
  • Maximum number of subnets  = 26 - 2 = 62
  • Note that 2 is subtracted because subnet values consisting of all zeros and all ones (broadcast).
  • And no of hosts = 210 - 2 = 1022
  • 2 is subtracted for Number of hosts is also. The address with all bits as 1 is reserved as broadcast address and address with all host id bits as 0 is used as network address of subnet.
Note: Same question had asked in GATE CS 2007.
Reference: http://gateoverflow.in/1265/gate2007_67

57. The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is
(a) 11001001000
(b) 11001001011
(c) 11001010
(d) 110010010011

Correct Answer: (a)
Explanation:
In CRC we send a dividend to receiver generated by CRC procedure at sender.
Dividend that require to send to receiver
= data unit padded by (number of divisor bits -1) remainder bits at sender

Data unit = 1100 1001
Divisor = 1001 because CRC polynomial is x3+1
Remainder = 011
Dividend that require to send to receiver = 1100 1001 011

1100 1001 000 <--- data unit's right side padded by 3 zero bits
1001                 <--- divisor
  1011              <--- result (note that XOR with the divisor done)
  1001               <--- divisor
      1000                <--- result
      1001               <--- divisor
            1100                <--- result
            1001               <--- divisor
              1010                <--- result
              1001               <--- divisor-----------------
              0011 <--- remainder (3 bits).  Division algorithm stops here as quotient is equal to zero.


Note: Same question had asked in GATE CS 2007 and similar question had asked in ISRO 2015.
Reference: http://gateoverflow.in/1266/gate2007_68

58. What is the maximum size of data that the application layer can pass on to the TCP layer below?
(a) Any size
(b) 216 bytes - the size of TCP header
(c) 216 bytes
(d) 1500 bytes


Correct Answer: (a)
Explanation: Application layer can send any size of data. There is no limit defined by standards. The lower layers divides the data if needed.

Note: Same question had asked in GATE CS 2008 
Reference: http://gateoverflow.in/412/gate2008-14-isro2016-74

59. Frames of 1000 bits are sent over a 106 bps duplex link between two hosts. The propagation time is 25 ms. Frames are to be transmitted into this link to maximally pack them in transit (within the link).
What is the minimum number of bits (i) that will be required to represent the sequence numbers distinctly? Assume that no time gap needs to be given between transmission of two frames.
(a) i = 2
(b) i = 3
(c) i = 4
(d) i = 5

Correct Answer: (d)
Explanation:
per second bits = 106
Number of bits in a frame = 1000
per second frames = 1000000 / 1000 = 1000
per millisecond frames = 1000/1000 = 1
Propagation time = 25 ms
Number of frames to send in 25 ms = 25
Bits need to represent sequence of 25 frames = log225 = 5
Note: Same question had asked in GATE CS 2009 
Reference: http://gateoverflow.in/1340/gate2009-57

60. Which of the following is TRUE only for XML but NOT for HTML?
(a) It is derived from SGML
(b) It describes content and layout
(c) It allows user defined tags
(d) It is restricted only to be used with web browsers


Correct Answer: None of These
Explanation:
All given options true for both HTML and XML. Since latest versions of HTML and web browsers we can also use user defined tags in HTML well.
Note: Same question had asked in GATE IT 2008 
Reference: http://gateoverflow.in/3279/gate2008-it_19

61. Consider a system with 2 level caches. Access times of Level 1 cache, Level 2 cache and main memory are 1ns, 10 ns, and 500 ns, respectively. The hit rates of Level 1 and Level 2 caches are 0.8 and 0.9, respectively. What is the average access time of the system ignoring the search time within the cache?
(a) 13.0 ns  (b) 12.8 ns  (c) 12.6 ns  (d) 12.4 ns 

Correct Answer: (c)
Explanation:
Formula to calculate avg access time: (h1 t1) + (1- h1) h2 t2 + (1 - h1) (1 - h2) tm
= (0.8 * 1 ns)  + ((1 - 0.8) * 0.9 * 10 ns) + ((1 - 0.8) * (1 - 0.9) * 500 ns)
= 0.8 ns + 1.8 ns +10 ns = 12.6 ns
Note: Same question asked in GATE IT 2004 exam. 
Reference: http://gateoverflow.in/3653/gate2004-it_12

62. If a class C is derived from class B, which is derived form class A, all through public inheritance, then a class C member function can access
(a) Only protected and public data of C and B
(b) Only protected and public data of C
(c) All data of C and private data of A and B
(d) Public and protected data of A and B and all data of C


Correct Answer: (d)
Explanation:
Accesspublic protected private
Same class yes yes yes
Derived classes yes yes no
Outside classes yes no no
Reference: http://gateoverflow.in/55530/isro2016-14

63. Which one of the following is correct about the statements given below?
I. All function calls are resolved at compile-time in C language.
II. All function calls are resolved at compile-time in C++.
(a) Only II is correct
(b) Both I and II are correct
(c) Only I is correct
(d) Both I and II are incorrect

Correct Answer: (c)
Explanation: The early binding (static binding) refers to compile time binding and late binding (dynamic binding) refers to runtime binding. C supports only Early Binding but C++ support both binding. Similar statements are:
I. All function calls are resolved at compile-time in Procedure Oriented Programming. TRUE
II. All function calls are resolved at compile-time in OOPS. FALSE
Note: This question asked in many exams.

Reference: http://gateoverflow.in/55534/isro2016-79

64. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
(a) DNS lookup
(b) DNS hijacking
(c) DNS Spoofing
(d) None of the mentioned

Correct Answer: (c)
Explanation:
  • DNS lookup is the process by which a DNS record is returned from a DNS server.
  • DNS hijacking or DNS redirection is the practice of subverting the resolution of DNS.
  • DNS spoofing occurs when a DNS server accepts and uses incorrect information.
Reference: http://gateoverflow.in/55536/isro2016-16

65. Which of the following is true?
(a) √3 + √7 = √10
(b) √3 + √7 <= √10
(c) √3 + √7 < √10
(d) √3 + √7 > √10

Correct Answer: (d)
Explanation:
Lets solve it fast, do square both side and then see.
Square of LHS (√3 + √7)2 = 3 + 7 + 2√3√7 = 10 + something
Square of RHS (√10)2 = 10
Square of LHS > Square of RHS => LHS > RHS => √3 + √7 > √10

66. What is the sum to infinity of the series,
3 + 6x2 + 9x4 + 12x6 + ..... given |x| < 1 ? 
(a) 3 / (1 + x2)
(b) 3 / (1 + x2)2
(c) 3 / (1 - x2)2
(d) 3 / (1 - x2)

Correct Answer: (d)
Explanation: Given is Infinite Geometric Series. Need to find out sum. Lets do.
3 + 6x2 + 9x4 + 12x6 + .....
  • We can find the sum of all finite geometric series. But in the case of an infinite geometric series when the common ratio is greater than one, the terms in the sequence will get larger and larger and if you add the larger numbers, you won't get a final answer. The only possible answer would be infinity. 
  • So, we don't deal with the common ratio greater than one for an infinite geometric series. If the common ratio lies between −1 to 1, we can have the sum of an infinite geometric series.
  • In this question common ratio is x2, and |x| < 1. So common ratio is less than 1. Now can go to calculate sum by a available formula:
    Sum = a1 / (1− r)
    Sum = 3 / (1-
    x2)
Reference: http://hotmath.com/hotmath_help/topics/infinite-geometric-series.html

67. lim x → 0 (√(1+x) - √(1-x)) / x is given by
(a) 0
(b) -1
(c) 1

(d) 1/2

Correct Answer: (c)
Explanation: While solving given equation, indeterminate form 0/0 is occurring. Way to solve it, apply L'Hopital's Rule. Rule says, we need to do is differentiate the numerator and differentiate the denominator and then take the limit.
  • Differentiate  √(1+x) = 1 / 2√(x+1)
  • Differentiate  √(1-x) = - 1 / 2√(1-x)
  • Differentiate  x = 1
lim x → 0 ((1 / 2√(x+1)) + (1 / 2√(1-x))) / 1
= ((1/2) + (1/2)) = 1
Reference: http://www.derivative-calculator.net/


68. If (G, .) is a group such that (ab)-1 = a-1b-1, ∀ a, b ∈ G, then G is a/an
(a) Commutative semi group

(b) Abelian group
(c) Non-abelian group

(d) None of these

Correct Answer: (b)
Explanation: In abstract algebra, an abelian group, also called a commutative group, is a group in which the result of applying the group operation to two group elements does not depend on the order in which they are written. See the proof of given statement in question on clicking link below of reference.
Reference: http://math.bu.edu/people/tkohl/teaching/fall2002/ch2-17.pdf

69. A given connected graph G is a Euler Graph if and only if all vertices of G are of 
(a) Same degree
(b) Even degree
(c) Odd degree
(d) Different Degree

Correct Answer: (b)
Explanation: Euler proved that a necessary condition for the existence of Eulerian circuits is that all vertices in the graph have an even degree, and stated without proof that connected graphs with all vertices of even degree have an Eulerian circuit. The term Eulerian graph has two common meanings in graph theory. One meaning is a graph with an Eulerian circuit, and the other is a graph with every vertex of even degree.
Reference: https://en.wikipedia.org/wiki/Eulerian_path

70. Maximum number of edges in a n - node undirected graph without self-loops is
(a) n2
(b) n(n-1)/2
(c) n-1
(d) n(n+1)/2

Correct Answer: (b)
Explanation: There is no self loops and this is undirected graph. Then maximum number of edges will be:
(n * (n-1)) / 2
Reference: https://en.wikipedia.org/wiki/Graph_(discrete_mathematics)

71. The minimum number of NAND gates required to implement the Boolean function A + AB' + AB'C is equal to
(a) 0 (Zero)

(b) 1
(c) 4

(d) 7

Correct Answer: (a)
Explanation: For minimal number of gates required first minimize the given Boolean function:
A + AB' + AB'C
= A (1 + B' + B'C)
= A
=> We do not need any gate to implement this because output same as input. And we only need input A.

72. The minimum Boolean expression for the following circuit is 

(a) AB + AC + BC
(b) A + BC
(c) A + B
(d) A + B + C


Correct Answer: (a)
Explanation: Trace the circuit and write boolean expression as below:

A(B+C) + AB + (A+B)C
= AB + AC + AB + AC + BC 
= AB + AC + BC 

73. For a binary half-subtractor having two inputs A and B, the correct set of logical expression for the outputs D (= A minus B) and X (= borrow) are
(a) D = AB + A'B, X = A'B
(b) D = A'B + AB', X = AB'
(c) D = A'B + AB', X = A'B
(d) D = AB + A'B, X = AB'


Correct Answer: (c) 
Explanation: Half subtractor circuit is given below:

Difference D is always XOR of inputs and Borrow is always AND of complimented value of first input and value of second input.


D = A XOR B = A'B + AB'
X= A' AND B = A'B

74. Consider the following gate network

Which one of the following gates is redundant?
(a) Gate No. 1
(b) Gate No. 2
(c) Gate No. 3
(d) Gate No. 4

Correct Answer: (b)
Explanation: Boolean expression generated by given circuit is: w' + w'z + xyz' where w' + w'z will always be w'(1+z) = w'. So there is no importance of Gate no. 2 that is a AND gate and giving w'z because no significance of this.

75. The dynamic hazard problem occurs in
(a) Combinational circuit alone
(b) Sequential Circuit only
(c) Both (a) and (b)
(d) None of the above


Correct Answer: (c)
Explanation: A dynamic hazard is the possibility of an output changing more than once as a result of a single input change.
Note: Asked in many other exams.

76. The logic circuit given below converts a binary code y1, y2, y3 into
(a) Excess-3 code
(b) Gray code
(c) BCD code
(d) Hamming code

Correct Answer: None of these
Explanation: May figure in this question have mistake. None of the given option satisfies by this circuit.

If there x3 = y2 XOR y3 then this would be Gray code but here is x3 = y1 XOR y2 XOR y3 that doesn't looks relevant.

77. The circuit shown in the figure below is
(a) An oscillating circuit and its output is square wave(b) The one whose output remains stable in '1' state
(c) The one having output remains stable in '0' state
(d) Has a single pulse of three times propagation delay


Correct Answer: (a)
Explanation: Given circuit is having NOT gates. The NOT gate changes 0 state into '1' and '1' state into '0'. So its simple that given circuit is oscillating circuit.

78. If 12A7C16 = X8, then the value of X is
(a) 224174

(b) 425174
(c) 6173
(d) 225174


Correct Answer: (d)
Explanation: Lets to conversion from HEX (base-16) to OCT (base-8)
HEX to BINARY of given is: 0001 0010 1010 0111 1100
Start right to left to convert BINARY to OCT, take 3-3 bits for OCT digits
0001 0010 1010 0111 1100 => 225174

79. The Excess-3 Code is also called
(a) Cyclic Redundancy Code
(b) Weighted Code
(c) Self-Complementing Code
(d) Algebraic Code


Correct Answer: (c)
Explanation: The Excess‐3 is a self‐complementing, non-weighted code.
  • Excess-3 is a digital code related to BCD that is derived by adding 3 to each decimal digit and then converting the result of that addition to 4-bit binary. 
  • Since no definite weights can be assigned to the four digit position, excess-3 is an unweighted code that has advantages in certain arithmetic operations.
  • Example: Excess-3 code of 5 (0101) is 8 (1000). 
  • The key feature of the excess-3 code is that it is self-complementing. This means that the 1's complement of an excess-3 number is the excess-3 code for the 9's complement of the corresponding decimal number. 
  • The 9's complement of a decimal number is found by subtracting each digit in the number from 9. For example, the 9's complement of 4 is 5. The excess-3 code for decimal 4 is 0111. The 1's complement of this is 1000, which is the excess-3 code for the decimal 5 (and 5 is the 9's complement of 4).
http://www.belc.bu.edu.eg/belc/downloadcenter/coursescontent/logic_design/step/Copy%20of%20022.htm

80. The simplified Sum of Product form of the following Boolean expression
(P + Q' + R') (P + Q + R) (P + Q + R')
(a) (P'Q + R)
(b) (P + QR')
(c) (PQ' + R)
(d) (PQ + R)


Correct Answer: (b)
Explanation: Lets solve the given Boolean expression:
(P + Q' + R') (P + Q + R) (P + Q + R')
=> (PP + PQ + PR + Q'P + Q'Q + Q'R + R'P + R'Q + R'R) (P + Q + R')
=> (P + PQ + PR + Q'P + Q'R + R'P + R'Q) (P + Q + R')
=> (P(1 + Q + R + Q' + R') + Q'R + R'Q)) (P + Q + R')
=> (P + Q'R + R'Q) (P + Q + R')
=> (PP + PQ + PR' + Q'RP + Q'RQ + Q'RR' + R'QP + R'QQ + R'QR')
=> (P(1 + Q + R' + Q'R + R'Q) + Q'RQ + Q'RR' + R'QQ + R'QR')
=> (P + R'Q + QR')
=> (P + QR')

Saturday 18 June 2016

ISRO 2007 Answer Key and Solutions Computer Science Scientist Engineer

The ISRO Computer Science (CS) Scientist Engineer test held on April 22, 2007 (Sunday). Total questions were 80 and test duration were 90 Minutes. Here is the solution of paper according to me of set A.
  • The Answer Key 2007 for Set A Non-Official by Me: Click here (By ISRO not available)
  • For complete preparation for ISRO Computer Science visit my this article: Click Here 
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2016Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2015Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2014Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2013Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2011Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2009Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2008Click here

47. Which commands are used to control access over objects in relational databases?
(a) CASCADE & MVD
(b) GRANT & REVOKE
(c) QUE & QUIST
(d) None of these

Correct Answer: (b)
Explanation: The Data Control Language (DCL) is a subset of the SQL that allows database administrators to configure security access to relational databases. It consists of only three commands: GRANT, REVOKE, and DENY.
Reference: http://databases.about.com/od/Advanced-SQL-Topics/a/Data-Control-Language-Dcl.htm

48. Which of the following is aggregate function in SQL?
(a) Avg
(b) Select
(c) Ordered by
(d) distinct

Correct Answer: (a)
Explanation: SQL aggregate functions return a single value, calculated from values in a column. Useful aggregate functions: AVG() - Returns the average value. COUNT() - Returns the number of rows.
Reference: SQL Functions - W3Schools

50. A view of a database that appears to an application program is known as
(a) Schema
(b) Subschema
(c) Virtual table
(d) None of these

Correct Answer: (b)
Explanation: The external level is the user’s view of the database and closest to the users.This level describes that part of the database that is relevant to the user.

  • Most of the users of database are not concerned with all the information contained in the database. Instead, they need only a part of  the database relevant to them.
  • An subschema describes each external view. The subschema consists of the definition of the logical records and the relationships in the external view.
The sub-schemas appears to application program to perform the operations. 
Reference: http://gateoverflow.in/51119/view-of-database-that-appears-to-an-application-programmer

51. Armstrong's inference rule doesn't determine
(a) Reflexivity
(b) Augmentation
(c) Transivity
(d) Mutual dependency

Correct Answer: (d)
Explanation: We can derive additional functional dependencies from the initial set using inference rules. Armstrongs's Axioms are most basic inference rules. These are 3 rules:
  • Reflexivity: If Y is a subset of X, then X → Y
  • Augmentation: If X → Y, then XZ → YZ
  • Transitivity: If X → Y and Y → Z, then X → Z
Additionally there are secondary rules derived from above 3 rules:
  • Union: If X → Y and X → Z, then X → YZ
  • Decomposition: If X → YZ, then X → Y and X → Z
  • Pseudotransitivity: If X → Y and WY → Z, then WX → Z
  • Composition: If X → Y and Z → W, then XZ → YW

52. Which operation is used to extract specified columns from a table?
(a) Project
(b) Join
(c) Extract
(d) Substitute

Correct Answer: (a)
Explanation: Project operation (∏) is used to select (extract) columns from a table that satisfy a given conditions.
Reference: http://www.tutorialspoint.com/dbms/relational_algebra.htm

54. BCNF is not used for cases where a relation has
(a) Two (or more) candidate keys
(b) Two candidate keys and composite
(c) The candidate key overlap
(d) Two mutually exclusive foreign keys

Correct Answer: __
Explanation: To figure out correct option, following points require our attention:
  1. When a key is composed of more than one column, it is known as a composite key.
  2. A candidate key is a column (Simple Candidate Key), or set of columns (Composite Candidate Key), in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys.
  3. BCNF asks "are all attributes to the left of the arrows candidate keys?", if yes then its BCNF.
  4. Mutually Exclusive means can't happen at the same time.
And now check options one by one: 
  • Option (a) is a case for BCNF by seeing point 3 above.
  • Option (c) is a case for BCNF because there is candidate keys are overlapping (e.g. AB, AC, AD) and it is okay for BCNF.
Reference: https://www.gatementor.com/viewtopic.php?f=268&t=8444

60. Which of the following is correct with respect to Two phase commit protocol?
(a) Ensures serializability
(b) Prevents Deadlock
(c) Detects Deadlock
(d) Recover from Deadlock

Correct Answer: None of These
Explanation: Two-phase commit (2PC) protocol should not be confused with the two-phase locking (2PL) protocol, a concurrency control protocol. 2PL is a concurrency control method that guarantees serializability. 2PC is a distributed algorithm that coordinates all the processes that participate in a distributed atomic transaction.
Reference: https://en.wikipedia.org/wiki/Two-phase_commit_protocol

69. A rule in a limited entry decision table is a
(a) row of the table consisting of condition entries
(b) row of the table consisting of action entries
(c) column of the table consisting of condition entries and the corresponding action entries
(d) columns of the table consisting of conditions of the stub

Correct Answer: (c)
Explanation: The limited-entry decision table is the simplest to describe. The condition alternatives are simple Boolean values, and the action entries are check-marks, representing which of the actions in a given column are to be performed.
Reference: https://en.wikipedia.org/wiki/Decision_table


ISRO 2008 Answer Key and Solutions Computer Science Scientist Engineer

The ISRO Computer Science (CS) Scientist Engineer test held on May 4, 2008 (Sunday). Total questions were 80 and test duration were 90 Minutes. Here is the solution of paper according to me of set E.
  • The Answer Key 2008 for Set E Non-Official by Me: Click here (By ISRO not available)
  • For complete preparation for ISRO Computer Science visit my this article: Click Here 
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2016Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2015Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2014Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2013Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2011Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2009Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2007Click here

33. The join operation can be defined as
(a) a cartesian product of two relations followed by a selection
(b) a cartesian product of two relations
(c) a union of two relations followed by cartesian product of the two relations
(d) a union of two relations

Correct Answer: (a)
Explanation: Join is a combination of a Cartesian product followed by a selection process. A Join operation pairs two tuples from different relations, if and only if a given join condition is satisfied.
Reference: http://www.tutorialspoint.com/dbms/database_joins.htm

35. Embedded pointer provides
(a) An inverted index
(b) A secondary access path
(c) A physical record key
(d) A primary key

Correct Answer: (b)
Explanation: Embedded pointer is a pointer set in a data record that provides secondary access path.
Note: Same question again asked in ISRO 2013 CS exam.
Reference: http://gateoverflow.in/44407/isro-2013-61-isro2008-35

58. Checkpointing a job
(a) allows it to be completed successfully
(b) allows it to continue executing later
(c) prepares it for finishing
(d) occurs only when there is an error in it

Correct Answer: (b)
Explanation: Checkpointing is a method of periodically saving the state of a job so that, if for some reason, the job does not complete, it can be restarted from the saved state. Checkpoints can be taken either under the control of the user application or external to the application.
Reference: Checkpointing a job - IBM


Friday 17 June 2016

ISRO 2009 Answer Key and Solutions Computer Science Scientist Engineer

The ISRO Computer Science (CS) Scientist Engineer test held on April 26, 2009 (Sunday). Total questions were 80 and test duration were 90 Minutes. Here is the solution of paper according to me of set A.
  • The Answer Key 2009 for Set A Non-Official by Me: Click here (By ISRO not available)
  • For complete preparation for ISRO Computer Science visit my this article: Click Here 
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2016Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2015Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2014Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2013Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2011Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2008Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2007Click here

70. A locked database file can be
(a) Accessed by only one user
(b) Modified by users with the correct password
(c) Used to hide sensitive information
(d) Updated by more than one user

Correct Answer: (a)

Explanation: File locking is a mechanism that restricts access to a computer file by allowing only one user or process access at any specific time.
Reference: http://edugrip.blogspot.in/2012/07/database-management-system-multiple.html

71. Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time?
(a) Transaction log
(b) Query languages
(c) Report writer
(d) Data manipulation language

Correct Answer: (a)
Explanation: A transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system to guarantee ACID properties over crashes or hardware failures. Physically, a log is a file listing changes to the database, stored in a stable storage format.
Reference: https://en.wikipedia.org/wiki/Transaction_log

72. Purpose of 'Foreign Key' in a table is to ensure
(a) Null Integrity
(b) Referential Integrity
(c) Domain Integrity
(d) Null & Domain Integrity

Correct Answer: (b)
Explanation: A foreign key is a column (or columns) that references a column (most often the primary key) of another table. The purpose of the foreign key is to ensure referential integrity of the data.
Reference: https://www.1keydata.com/sql/sql-foreign-key.html

73. Which of the following scenarios may lead to an irrecoverable error in a database system?
(A) A transaction writes a data item after it is read by an uncommitted transaction
(B) A transaction reads a data item after it is read by an uncommitted transaction
(C) A transaction reads a data item after it is written by a committed transaction
(D) A transaction reads a data item after it is written by an uncommitted transaction

Correct Answer: (d)
Explanation:
  • In option D, there is dirty read. In case if transaction reading uncommited data commits and that uncommited transaction fails then irrecoverable error occurs.
  • In option B, there is no issue. Both transaction are reading data.
  • In option C, it is normal. Someone reading a item after committed write by someone.
  • In option A, it is recoverable. Here write committed after uncommitted read by someone, if again after read done in same uncommitted transaction then there will be phantom error only.
Note: Same question had asked in GATE 2003 CS exam.
Reference: http://gateoverflow.in/919/gate2003_29




ISRO 2011 Answer Key and Solutions Computer Science Scientist Engineer

The ISRO Computer Science (CS) Scientist Engineer test held on April 16, 2011 (Saturday). Total questions were 80 and test duration were 90 Minutes. Here is the solution of paper according to me of set A.
  • The Answer Key 2011 for Set A Non-Official by Me: Click here (By ISRO not available)
  • For complete preparation for ISRO Computer Science visit my this article: Click Here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2016Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2015Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2014Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2013Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2009Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2008Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2007Click here

15. What is the equivalent serial schedule for the following transactions?
(a) T1-T2-T3
(b) T3-T1-T2
(c) T2-T1-T3
(d) T1-T3-T2

Correct Answer: (b)

Explanation: There is easy approach is testing serializability using precedence graph. Do following steps:
  • For each transaction Ti participating in schedule S, create a node labelled Ti in the precedence graph. So the precedence graph contains T1, T2, T3.
  • For each case in S where Ti executes a write_item(X) then Tj executes a read_item(X), create an edge (Ti --> Tj) in the precedence graph.
  • For each case in S where Ti executes a read_item(X) then Tj executes a write_item(X), create an edge (Ti --> Tj) in the precedence graph.
  • For each case in S where Ti executes a write_item(X) then Tj executes a write_item(X), create an edge (Ti --> Tj) in the precedence graph.
To do above described process fast, just take transaction one by one and check that what variables are using the taken transaction and what conflict occurring for that variable with other transaction. If conflict then draw edge.
  • Take T1; It is using X and Y variables and these are not using by T3 after T1; So there will no outgoing edge from T1 to T3; But these variables using by T2 after T1 where R(X) - W(X) and many more conflicts so there will be outgoing edge from T1 to T2.
  • Take T2; It is using X, Y and Z variables and these are not using by T1 and T3 after T2; So there will no outgoing edges from T2 to T1 and T2 to T3.
  • Take T3; It is using Y and Z variables and these are using by T1 and T2 after T3 where R(Y)-W(Y) and many more conflicts with T1 and T2; So there will be outgoing edges from T3 to T1 and T3 to T1.
  • By seeing precedence graph serial schedule is T3 --> T1 --> T2.
Note: Similar question had asked in GATE CS 2003 exam.
Reference: https://en.wikipedia.org/wiki/Precedence_graph

21. Which type of DBMS provides support for maintaining several versions of the same entity?
(a) Relational Data Base Management Systems
(b) Hierarchical
(c) Object Oriented Data Base Management Systems
(d) Network

Correct Answer: (c)
Explanation: Some Object Oriented Systems provide support for maintaining several versions of the same object. An old version of an object that represents a tested and verified design should be retained until the new version is tested and verified.
Reference: Fundamentals of Database Systems - Page 726 - Ramez Elmasri - 2008

29. Which 'Normal Form' is based on the concept of 'full functional dependency' is
(a) First Normal Form
(b) Second Normal Form
(c) Third Normal Form
(d) Fourth Normal Form

Correct Answer: (b)
Explanation: Second Normal Form based on the concept of full functional dependency. A relational schema R is in 2NF if all non-key attributes are fully functional dependent on the primary key. In full functional dependency on removal of any attribute from primary key if it still hold dependency than the dependency is partial.
Reference: Fundamentals of Database Systems - Page 726 - Ramez Elmasri - 2008

53. In functional dependency, Armstrong's inference rules refers to
(a) Reflexive, Augmentation and Decomposition
(b) Transitive, Augmentation and Reflexive
(c) Augmentation, Transitive, Reflexive and Decomposition
(d) Reflexive, Transitive and Decomposition

Correct Answer: (b)
Explanation: We can derive additional functional dependencies from the initial set using inference rules. Armstrongs's Axioms are most basic inference rules. These are 3 rules:
  • Reflexivity: If Y is a subset of X, then X → Y
  • Augmentation: If X → Y, then XZ → YZ
  • Transitivity: If X → Y and Y → Z, then X → Z
Additionally there are secondary rules derived from above 3 rules:
  • Union: If X → Y and X → Z, then X → YZ
  • Decomposition: If X → YZ, then X → Y and X → Z
  • Pseudotransitivity: If X → Y and WY → Z, then WX → Z
  • Composition: If X → Y and Z → W, then XZ → YW
Referencehttps://en.wikipedia.org/wiki/Functional_dependency



Thursday 16 June 2016

ISRO 2013 Answer Key and Solutions Computer Science Scientist Engineer

The ISRO Computer Science (CS) Scientist Engineer test held on May 12, 2013 (Sunday). Total questions were 80 and test duration were 90 Minutes. Here is the solution of paper according to me of set A.
  • The Final Answer Key 2013 for All Sets by ISRO: Click here 
  • For complete preparation for ISRO Computer Science visit my this article: Click Here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2016Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2015Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2014Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2011Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2009Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2008Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2007Click here

23. Which of the following is the highest isolation level in transaction management?
(a) Serializable
(b) Repeated Read
(c) Committed Read
(d) Uncommitted Read

Correct Answer: (a)

Explanation: Isolation means the the querying user must be able to get a complete, consistent picture of the data, unaffected by other user's actions. There are four isolation levels:
  • Serializable: It is highest isolation level. It requires read and write locks to be released at the end of the transaction. The range-locks must be acquired when a SELECT query uses a ranged WHERE clause, especially to avoid the phantom reads.
  • Repeatable reads: It keeps read and write locks until the end of the transaction. However, range-locks are not managed, so phantom reads (two identical queries are executed, and the collection of rows returned by the second query is different from the first) can occur.
  • Read committed: It restricts the reader from seeing any intermediate, uncommitted, dirty read. Keeps write locks until the end of the transaction, but read locks are released as soon as the SELECT operation is performed. Phantom reads can occur.
  • Read uncommitted: It is lowest isolation level. Dirty reads (read data that has been not yet committed) are allowed. One transaction may see not-yet-committed changes made by other transactions.
Reference: https://en.wikipedia.org/wiki/Isolation_(database_systems)

24. Consider the following relational schema:
Suppliers (sid:integer, sname:string, saddress:string)
Parts (pid:integer, pname:string, pcolor:string)
Catalog (sid:integer, pid:integer, pcost:real)

What is the result of the following query?

(SELECT Catalog.pid from suppliers, Catalog
WHERE Suppliers.sid = Catalog.pid)
MINUS
(SELECT Catalog.pid from suppliers, Catalog
WHERE Suppliers.sname <> 'Sachin' and Suppliers.sid = Catalog.sid)

(a) Pid of parts supplied by all except Sachin
(b) Pid of parts supplied only by Sachin
(c) Pid of parts available in catalog supplied by Sachin
(d) Pid of parts available in catalog supplied by all except Sachin

Correct Answer: None of These
Explanation: There is printing error in the question, so no any option is correct. Lets do solution by correcting the error. In 2nd line read like this "WHERE Supplier.sid = Catalog.sid". The 1st query (query before MINUS) gives list of all the suppliers who supply a part. And 2nd query (query after MINUS) gives all the parts that supplied by all except Sachin. So complete query gives Pids of parts available in catalog supplied by Sachin (option c).
Reference: http://gateoverflow.in/43857/isro-2013-24

25. Consider the following dependencies and the Book table in a relational database design.
Determine the normal form of the given relation.
ISBN -> Title
ISBN -> Publisher
Publisher -> Address
(a) First Normal Form
(b) Second Normal Form
(c) Third Normal Form
(d) BCNF

Correct Answer: (b)
Explanation: First find candidate key, for this follow easy approach suggested by stinaq.me, draw diagram of dependencies. The diagram shows that we need ISBN to reach every attribute of relation. So ISBN is only the candidate key in this relation. To find normal form, follow easy approach suggested by stinaq.me.
  • First normal form: Are all the attributes atomic? Yes.
  • Second normal form: Is there a non primary attribute that’s determined by parts of a candidate key? No.
  • Third normal form: Does a non primary attribute exists that is determined by another non primary attribute? Yes.
So, given relation is in Second Normal Form.
Reference: http://gateoverflow.in/16128/which-of-the-following-is-true

26. Calculate the order of leaf (Pleaf) and non leaf (P) nodes of a B+ tree based on the information given below
Search key field = 12 bytes
Record pointer = 10 bytes
Block pointer = 8 bytes
Block size = 1 KB

(a) Pleaf = 51 & P = 46
(b) Pleaf = 47 & P = 52 
(c) Pleaf = 46 & P = 51
(d) Pleaf = 52 & P = 47

Correct Answer: (c)
Explanation: A Btree is a balanced binary search tree that follows a multi-level index format. Index is stored on the disk along with the actual database files. Memory block size is given 1 KB (1024 bytes), any node size will not be more than this. Order of a leaf and non-leaf node helps to determine number total size of node. Here we need to find order n using total size of node 1 KB.
  • Any intermediary non-leaf node have n-1 search keys and n block pointers.
    ((n-1)*Search Key Field) + (n*Block Pointer) <= 1024 bytes
    ((n-1)*12) + (n*8) <= 1024 bytes
    12n - 12 + 8n <= 1024
    n <= 51.8
    So order of non-leaf node is 51  
  • The leaf node have n search key fields, n record pointers, block pointer to right leaf node.
    (n*Search Key Field) + (n*Record Pointer) + (1*Block Pointer) <= 1024 bytes
    (n*12) + (n*10) + (1*8) <= 1024 bytes
    12n + 10n + 8 <= 1024
    n <= 46.18
    So order of non-leaf node is 46
Note: Similar question had asked in GATE CS 2015 exam.
Reference: http://gateoverflow.in/8555/gate2015-3_46

27. The physical location of a record determined by a formula that transforms a file key into a record location is
(a) Hashed file
(b) B-Tree file
(c) Indexed file
(d) Sequential file

Correct Answer: (a)
Reference: http://gateoverflow.in/16991/physical-location-determined-formula-transforms-location

61. Embedded pointer provides
(a) An inverted index
(b) A secondary access path
(c) A physical record key
(d) A primary key

Correct Answer: (b)
Explanation: Embedded pointer is a pointer set in a data record that provides secondary access path.
Note: Same question had asked in ISRO 2008 CS exam.