Recent questions tagged ugcnetcse-june2016-paper2

2.7k
views
1 answers
4 votes
Given the following two statements:Strategic value of data mining is timestampingInformation collection is an expensive process in building an expert systemWhich of the following ... are trueI is true, II is falseI is false, II is true
2.4k
views
1 answers
1 votes
Consider the following two statements:Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouseData scrubling is a process of ... is false II is trueBoth I and II are falseBoth I and II are true
4.2k
views
3 answers
4 votes
Pipelining improves performance bydecreasing instruction latencyeliminating data hazardsexploiting instruction level parallelismdecreasing the cache miss rate
2.1k
views
2 answers
4 votes
Consider the following two statements:Business intelligence and Data warehousing is used for forecasting and Data miningBusiness intelligence and Data warehousing is used for ... are trueI is false II is falseBoth I and II are false
2.5k
views
1 answers
3 votes
The extent to which a software tolerates the unexpected problems, is termed asAccuracyReliabilityCorrectnessRobustness
2.5k
views
1 answers
4 votes
The cyclomatic complexity of a flow graph V(G), in terms of predicate notes isP+1P-1P-2P+2Where P is the number of predicate nodes in flow graph V(G)
5.0k
views
2 answers
3 votes
Which of the following is not included in the waterfall model?Requirement analysisRisk analysisDesignCoding
10.7k
views
2 answers
3 votes
The ____ model is preferred for software development when the requirements are not clear.Rapid Application DevelopmentRational Unified ProcessEvolutionary ModelWaterfall Model
2.9k
views
1 answers
4 votes
If $S_1$ is total number of modules defined in the program architecture, $S_3$ is the number of modules whose correct function depends on prior processing then the number of modules ... $1-\frac{S_1}{S_3}$
2.2k
views
2 answers
6 votes
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest ... the schduler implements ___ criteriaPriority schedulingRond Robin SchedulingShortest Job FirstFCFS
3.0k
views
1 answers
3 votes
In UNIX, ____ creates three subdirectories; 'PIS' and two subdirectories 'progs' and 'data' from just created subdirectory 'PIS'mkdir PIS/progs PIS/data PISmkdir PIS progs datamkdir PIS PIS/progs PIS/datamkdir PIS/progs data
20.5k
views
2 answers
5 votes
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67320322321319
4.3k
views
2 answers
3 votes
Suppose there are $4$ processes in execution with $12$ instances of a Resource $R$ in a system.The maximum need of each process and current allocation ... what is the safe sequence?NoYes, $P_1P_2P_3P_4$Yes, $P_4P_3P_1P_2$Yes, $P_2P_1P_3P_4$
8.5k
views
1 answers
3 votes
Consider the reference string:0 1 2 3 0 1 4 0 1 2 3 4If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are ____ and ___ respectively.10, 99, 910, 109, 10
2.0k
views
2 answers
4 votes
Which of the following is false?The grammar $S \rightarrow a \: Sb \mid bSa \mid SS \mid \in$, where $S$ is the only non-terminal symbol and $\in$ is ... than LALRAn LL(1) parser is a top-down parserYACC tool is an LALR(1) parser generator
3.1k
views
1 answers
3 votes
Which of the following is not typically a benefit of dynamic linking?Reduction in overall program execution timeReduction in overall space consumption in memoryReduction in ... in the cost of software updatesI and IVI onlyII and IIIIV only
9.6k
views
2 answers
3 votes
In ____, the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other.Loop unrollingStrength reductionsLoop concatenationLoop jamming
8.4k
views
2 answers
5 votes
The content of the accumulator after the execution of the following 8085 assembly language program, is: MVI A, 42H MVI B, 05hUGC:ADD B DCR B JNZ UGC ADI 25H HLT82 H78 H76 H47 H
5.9k
views
2 answers
5 votes
The number of strings of length 4 that are generated by the regular expression $(0 \mid \epsilon ) 1^+ 2^{*}(3 \mid \epsilon)$, where $\mid$ is an ... $\epsilon$ is the null string, is:08101112
4.0k
views
3 answers
3 votes
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ____ the critical angleequal toless thangreater thanless than or equal to
4.1k
views
2 answers
3 votes
If there are $N$ people in the world and are using secret key encryption and decryption for privacy purpose, then the number of secret keys required will be$N$(N-1)$\frac{N(N-1)}{2}$\frac{N(N+1)}{2}$
5.2k
views
2 answers
4 votes
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destinationPhysicalTransportApplicationHost-to-network
19.7k
views
4 answers
3 votes
In a fully connected mesh network with 10 computers, total ___ number of cables are required and ____ number od ports are required for each device40, 945, 1045, 950, 10
12.9k
views
3 answers
4 votes
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?100 Kbps200 Kbps400 Kbps1000 Kbps
7.0k
views
3 answers
5 votes
In how many ways can the string $A \cap B - A \cap B -A$ be fully paranthesized to yield an infix expression?15141312
3.8k
views
2 answers
3 votes
Which of the following is not an inherent application of stack?Implementation of recursionEvaluation of a postfix expressionJob schedulingReverse a string
14.8k
views
3 answers
3 votes
Suppose you are given a binary tree with n nodes, such that each node has exactly eiter zero or two children. The maximum height of the tree will be$\frac{n}{2}-1$\frac{n}{2}+1$(n-1)/2$(n+1)/2$
5.2k
views
1 answers
4 votes
Consider the following operations performed on a stack of size 5:Push (a); Pop(); Push(b); Push(c); Pop();Push(d); ... following statements is correct?Underflow occursStack operations are performed smoothlyOverflow occursNone of the above
6.8k
views
2 answers
7 votes
Consider the following database table having $\text{A, B, C}$ and $\text{D}$ as its four attributes and four possible candidate keys $\text{(I, II, III and IV)}$ for ... only$\text{III}$ and $\text{IV}$ only$\text{II}$ only$\text{I}$ only
2.9k
views
1 answers
3 votes
Consider the following two comments C1 and C2 on the relation R from an SQL database: C1 : drop table R;C2 : delete from RBoth C1 and C2 delete the schema RC2 ... also the schema for RI onlyI and II onlyII and III onlyI, II and III only