# Recent questions and answers in Others

1 vote
1
(I) Each object in the active directory of windows 2000 has an access control list. (II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the following is true? only (I) only (II) both (I) and (II) None of the above
2
Which of the following statements is wrong? $2-$ phase Locking Protocols suffer from dead locks. Time-Stamp Protocols suffer from more aborts. Time-Stamp Protocols suffer from cascading roll back where as $2-$ locking Protocol donot. None of these
3
Which of the following statement is false? Every tree is a bipartite graph A tree contains a cycle A tree with $n$ nodes contains $(n-1)$ edges A tree is connected graph
4
A solution for the differential equation $x’(t) + 2x(t) = \delta(t)$ with initial condition $x(\overline{0}) = 0$ $e^{-2t}u(t)$ $e^{2t}u(t)$ $e^{-t}u(t)$ $e^{t}u(t)$
5
Hi everyone. I kindly request all the people who don't find this relevant please ignore this post and follow yourself just read it once it may be helpful. It's 4 and we all are going to appear for the GATE paper on 6, so i felt to talk something about what i felt is ... KE AGE JEET HAI " And we all are going to win our fear this time only. revise hard and just go, WIsh YoU BEst Of Luck .
6
Analysis of large database to retrive information is called : $OLTP$ $LAP$ $OLDP$ $TLPP$
7
The testing of software against $SRS$ is called : Acceptance testing Integration testing Regression testing Series testing
8
Bluetooth technology uses the transmission media. Radio links Microwave links $VSAT$ communication Optical fibre links
9
Which of the following is not collision Resolution Technique : Hash addressing​​​​​​​ Chainning Indexing None of these
10
_______synchronize critical resources to prevent deadlock. $P$- operator $V$- operator Semaphores Hard disk
11
The dynamic binding occurs during the: Compile time Run time Linking time Pre-processing time
12
$YACC$ builds up _____parsing table. $LALR$ $LR$ $SLR$ $LLR$
13
Which statements is wrong If linked origin $\neq$ translated origin, relocation must be performed by the linker If load $\neq$ linked origin, the loader must perform relocation A linker always perform relocation, whereas some loaders do not None of these
14
Problems with waterfall model are: Real projects rarely follow this model proposes It is often difficult for the customer Working model is available only in the end Developers are delayed unnecessarily Which of the following is true: $1$ and $4$ only $2$ and $3$ only $1$,$2$ and $3$ only $1$,$2$,$3$ and $4$
15
Amongst the logic families $DTL, TTL, ECL$ and $CMOS$, the family with the least power dissipation is : $CMOS$ $DTL$ $TTL$ $ECL$
16
The running time of using two-way merge-sort technique to sort a file of $n>1$ record is $2T (n/2) + \theta (n)$ $\text{lg}(n) + \theta(n)$ $\theta (n)$ $O(n)$
17
18
An Entity-relationship diagram is a tool to represent : Data model Process model Event model Customer model
19
The data hiding is taken care by : Abstraction Encapsulation Modularity Inheritance
20
Moving Process from main memory to disk is called : Caching Termination Swapping Interruption
21
The principle of Locality of reference justifies the use of : Virtual memory Interrupts Cache memory Secondary memory
22
Which of the following binary number is the same as its $2's$ complement : $1010$ $0101$ $1000$ $1001$
23
In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted as a child of the node “$g$” ? $1$ $3$ $7$ $8$
24
Which of the following statement is false ? Every tree is a bipertite graph A tree contains a cycle A tree with n nodes contains $n-1$ edges A tree is a connected graph
25
What is the time required to insert an element in a stack with linked implementation? $O \left(\log_{2}n \right)$ $O \left(n \right)$ $O \left(n \log_{2}n \right)$ $O \left(1 \right)$
26
Multi-valued dependency among attribute is checked at which level ? $2$ $NF$ $3$ $NF$ $4$ $NF$ $5$ $NF$
27
The logic expression $\overline{x}y\overline{z}+\overline{x}yz+xy\overline{z}+xyz$ reduces to : $\overline{x}z$ $xyz$ $y$ $yz$
28
Encryption and decryption are the functions of the _________ layer of $OSI$ model : transport session router presentation
29
Application of data structure queue is : Levelwise printing of tree Implementation of priority queues Function call implementation Depth first search in a graph
30
What is the difference between the Ethernet frame preamble field and the $IEEE$ $802.3$ preamble and start of frame frame Delimiter fields? $1$ byte $1$ bit $4$ bits $16$ bits
31
$T$ is a graph with n vertices. $T$ is connected and has exactly $n-1$ edges, then : $T$ is a tree $T$ contains no cycles Every pairs of vertices in $T$ is connected by exactly one path All of these
32
Let $A$ and $B$ be two arbitrary events, then : $P\left ( A\cap B \right )= P\left ( A \right )P\left ( B \right )$ $P\left ( P\cup B \right )= P\left ( A \right ) + P\left ( B \right )$ $P\left ( P\cup B \right )\leq P\left ( A \right ) + P\left ( B \right )$ $P\left ( A/ B \right )=P\left ( A\cap B \right )+P\left ( B \right )$
33
Which of the following is divisible by $4$? $100101100$ $1110001110001$ $11110011$ $10101010101010$
34
The bitwise $OR$ of $35$ with $7$ in $C$ will be : $35$ $7$ $42$ $39$
35
36
What will be the value of i for the following expression: $int$ $i=11, i=3$ ; $i+=\left ( f> 3 \right )?i \& 2:5$ ; $2$ $5$ $13$ $12$
37
One approach to standarolizing storing of data : $MIS$ $CODASYL$ Stuctured Programing None of the above
Which of the following statement is wrong? $2-$ phase locking protocol suffers from dead locks Time-Stamp protocol suffers from more abort Time stamp protocol suffers from cascading rollbacks where as $2-$ phase locking protocol do not None of these