Recent questions tagged ugcnetcse-dec2004-paper2

2 votes
2 answers
1
Which of the following is not collision resolution technique?Hash addressingChainingBoth (A) and (B)Indexing
0 votes
2 answers
2
Code optimization is responsibility of :Application programmerSystem programmerOperating systemAll of the above
0 votes
3 answers
3
Which activity is included in the first pass of two pass assemblers?Build the symbol tableConstruct the intermediate codeSeparate mnemonic opcode and operand fieldsNone o...
0 votes
1 answer
4
In two pass assembler the symbol table is used to store :Label and valueOnly valueMnemonicMemory Location
0 votes
2 answers
5
Semaphores are used to :Synchronise critical resources to prevent deadlockSynchronise critical resources to prevent contentionDo I/oFacilitate memory management
0 votes
2 answers
6
In which of the following storage replacement strategies, is a program placed in the largest available hole in the memory ?Best fitFirst fitWorst fitBuddy
1 votes
2 answers
7
Remote computing system involves the use of timesharing systems and :Real time processingBatch processingMultiprocessingAll of the above
0 votes
1 answer
8
Non modifiable procedures are calledSerially useable proceduresConcurrent proceduresReentrant proceduresTopdown procedures
0 votes
1 answer
12
Reliability of software is dependent on :Number of errors present in softwareDocumentationTesting suitesDevelopment Processes
0 votes
2 answers
13
In transform analysis, input portion is called :Afferent branchEfferent branchCentral TransformNone of the above
0 votes
1 answer
14
The Function Point $(FP)$ metric is :Calculated from user requirementsCalculated from Lines of codeCalculated from software’s complexity assessmentNone of the above
0 votes
1 answer
15
0 votes
2 answers
17
The cost of a parallel processing is primarily determined by :Time complexitySwitching complexityCircuit complexityNone of the above
0 votes
3 answers
18
0 votes
1 answer
19
The term hacker was originally associated with :A computer programVirusComputer professionals who solved complex computer problemsAll of the above
0 votes
1 answer
20
Which activity is not included in the first pass of two pass assemblers ?Build the symbol tableConstruct the intermediate codeSeparate mnemonic opcode and operand fieldsN...
1 votes
2 answers
21
0 votes
1 answer
22
0 votes
2 answers
23
The context-free languages are closed for :IntersectionUnionComplementationKleene Star(i) and (iv)(i) and (iii)(ii) and (iv)(ii) and (iii)
0 votes
1 answer
24
The following lists are the degrees of all the vertices of a graph :$1,2,3,4,5$$3,4,5,6,7$$1, 4, 5, 8, 6$$3,4,5,6$(i) and (ii)(iii) and (iv)(iii) and (ii)(ii) and (iv)
0 votes
2 answers
26
An example of a binary number which is equal to its $2$’s complement is :$1100$$1001$$1000$$1111$
1 votes
2 answers
27
When a tri-state logic device is in the third state, then :it draws low currentit does not draw any currentit draws very high currentit presents a low impedance
0 votes
1 answer
28
An example of a connective which is not associative is :$\text{AND}$$\text{OR}$$\text{EX-OR}$$\text{NAND}$
0 votes
1 answer
29
1 votes
2 answers
30
The characteristic equation of a $\text{T}$ flip-flop is :$Q_{n+1}=T\overline Q_n+\overline T Q_n$$Q_{n+1}=T+Q_n$$Q_{n+1}=TQ_n$$Q_{n+1}=\overline T$$\overline Q_n$The sym...