Recent questions tagged ugcnetcse-june2015-paper2

3.0k
views
1 answers
1 votes
Which of the following is not valid with reference to Message Passing Interface(MPI)?MPI can run on any hardware platformThe programming model is a ... Comm - Size returns the total number of MPI processes in specified communication
5.9k
views
3 answers
6 votes
Which of the following statements is false about weak entity set?Weak entities can be deleted automatically when their strong entity is deletedWeak entity ... partitioned according to their relationship with tuples with a strong entity set
4.3k
views
4 answers
0 votes
Which of the following algorithms sort $n$ integers, having the range $0$ to $(n^2 -1)$, in ascending order in $O(n)$ time?Selection sortBubble sortRadix sortInsertion sort
1.8k
views
2 answers
0 votes
Which of the following statements is incorrect for Parallel Virtual Machine (PVM)?The PVM communication model provides asynchronous blocking send, asynchronous blocking ... of such messagesIn PVM model, the message order is not preserved
3.9k
views
2 answers
0 votes
In the case of parallelization, Amdahl's law states that if $P$ is the proportion of a program that can be made parallel and $(1-P)$ is the proportion that cannot be parallelized, then ... P)+\frac{P}{N}} \\$\dfrac{1}{P+\frac{(1-P)}{N}}$
3.2k
views
1 answers
1 votes
Which one from the following is highly associated activity of project planning?Keep track of the progressCompare the actual and planned progress and costsIdentify the activities, milestones and deliverables produced by a projectBoth B and C
4.9k
views
1 answers
0 votes
Cohesion is an extension of:Abstraction conceptRefinment conceptInformation hiding conceptModularity
2.9k
views
3 answers
1 votes
Which process model is also called as classic life cycle model?Waterfall modelRAD modelPrototyping modelIncremental model
3.1k
views
1 answers
2 votes
Which of the testing strategy requirements established during requirements analysis are validated against developed software?validation testingintegration testingregression testingsystem testing
1.9k
views
1 answers
3 votes
2.4k
views
1 answers
1 votes
What does the following command do? grep -vn "abc" xIt will print all of the lines in the file x that match the search string "abc"It will print all of the ... specific line numbers of the file x in which there is a match for string "abc"
12.1k
views
2 answers
3 votes
A LRU page replacement is used with $4$ page frames and eight pages. How many page faults will occur with the reference string $0172327103$ if the four frames are initially empty?$6$7$5$8$
3.1k
views
2 answers
3 votes
Let $P-i$ and $P_j$ two processes, R be the set of variables read from memory, and W be the set of variables written to memory. For the concurrent execution of two processes $p_i$ ... $W(P_i) \cap W(P_j) = \Phi$
9.9k
views
2 answers
3 votes
A disk drive has $100$ cylinders, numbered $0$ to $99$. Disk requests come to the disk driver for cylinders $12, 26, 24, 4, 42, 8$ and $50$ in that order. The ... seek time first (SSTF) algorithm?$0.984$ sec$0.396$ sec$0.738$ sec$0.42$ sec
4.5k
views
5 answers
4 votes
Which phase of compiler generates stream of atoms?Syntax AnalysisLexical AnalysisCode GenerationCode Optimization
3.7k
views
2 answers
1 votes
Which one of the following is false?LALR parser is Bottom-Up parserA parsing algorithm which performs a left to right scanning and a right most deviation is RL($1$)LR ... LL($1$), the $1$ indicates that there is a one symbol look-ahead
2.9k
views
1 answers
1 votes
If all the production rules have single non-terminal symbol on the left side, the grammar defined is:Context free grammarContext sensitive grammarUnrestricted grammarPhase grammar
2.6k
views
1 answers
1 votes
The translator which performs macro calls expansion is calledMacro processorMicro pre-processorMacro pre-processorDynamic linker
1.8k
views
1 answers
1 votes
Match the following: ... $a-iv, b-iii, c-ii, d-ii$
2.5k
views
1 answers
1 votes
Which of the following is/are restriction(s) in classless addressing?The number of addresses needs to be a power of $2$The mask needs to be included in ... address must be divisible by the number of addresses in the blockAll of the above
1.6k
views
1 answers
4 votes
What is the size of the 'total length' field in $IPv4$ diagram?$4$ bits$8$ bits$16$ bits$32$ bits
2.7k
views
2 answers
2 votes
Which of the following is not associated with the session layer?Dialog controlToken managementSemantics of the information transmittedsynchronization
2.0k
views
1 answers
1 votes
Match the following port numbers with their uses: ... $a-ii, b-iv, c-i, d-iii$
4.8k
views
2 answers
2 votes
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions?Session ... ProtocolReal-time Streaming ProtocolReal-time Transport Control ProtocolSession Initiation Protocol
6.2k
views
1 answers
2 votes
To determine the efficiency of an algorithm the time factor is measured byCounting micro secondsCounting number of key operationsCounting number of statementsCounting kilobytes of algorithm
1.5k
views
1 answers
3 votes
The average case occurs in Linear Search Algorithm whenThe item to be searched is in some where middle of the ArrayThe item to be searched is not in the arrayThe ... arrayThe item to be searched is either in the last or not in the array
2.1k
views
1 answers
2 votes
Level order Traversal of a rooted Tree can be done by starting from root and performing:Breadth First SearchDepth First SearchRoot SearchDeep Search
3.2k
views
1 answers
2 votes
Consider the given graphIts Minimum Cost Spanning Tree is ______
15.9k
views
2 answers
2 votes
For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as:Neighbour SetStrong Entity SetOwner Entity SetWeak Set
4.8k
views
1 answers
1 votes
Database application were directly built on top of file system to overcome the following drawbacks of using file-systems:Data redundancy and inconsistencyDifficulty in accessing dataData ... ii, and iii}$\text{i, ii, iii, and iv}$