# Recent questions tagged ugcnetdec2008ii

1 vote
1
(I) Each object in the active directory of windows 2000 has an access control list. (II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the following is true? only (I) only (II) both (I) and (II) None of the above
2
An example of a data mining algorithm which uses squared error score function is : CART algorithm back propagation algorithm a priori algorithm vector space algorithm
3
E-commerce involves : Electronic Data Interchange Electronic mail Electronic Bulletin Boards All of the above
4
Assertion (A): Cellular telephone systems can handle a multitude of users . Reasoning (R): Cellular telephone systems permit extensive frequency reuse in a small local area . Both (A) and (R) are true and (R) is the correct explanation for (A) (B) Both (A) and (R) are true but (R) is not the correct explanation (A) is true but (R) is false (A) is false but (R) is true
5
$COCOMO$ model is used for: product quality estimation product complexity estimation product cost estimation all of the above
6
Which level is called as “defined” in capability maturity model? level $0$ level $3$ level $4$ level $1$
1 vote
7
Software Quality Assurance ($SQA$) encompasses : verification validation both verification and validation none of the above
8
If the executing program size is greater than the existing $RAM$ of a computer, it is still possible to execute the program if the $OS$ supports : multitasking virtual memory paging system none of the above
9
In which of the following, ready to execute processes must be present in $RAM$ ? multiprocessing multiprogramming multitasking all of the above
1 vote
10
Which of the following $OS$ treats hardware as a file system? $UNIX$ $DOS$ $Windows$ $NT$ None of the above
11
Which of the following are Assembler Directives? (i) EQU (ii) ORIGIN (iii) START (iv) END (ii), (iii) and (iv) (i), (iii) and (iv) (iii) and (iv) (i), (ii), (iii) and (iv)
1 vote
12
In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register ? absolute mode immediate mode indirect mode index mode
13
An assembly program contains : imperative and declarative statements imperative and assembler directives imperative and declarative statements as well as assembler directives declarative statements and assembler directives
14
A conventional $LAN$ bridge specifies only the functions of $OSI$ : layers 1 and 2 layers 1 through 3 all layers none of the above
15
A high performance switching and multiplexing technology that utilizes fixed length packets to carry different types of traffic is: ATM ADSL SONET None of the above
1 vote
16
If $(rear==maxsize-1)$ $rear=0;$ else $rear=rear+1;$ is required in : circular queue linear queue stack deque
17
In a heap, every element is ___________ of all the elements in the subtree. maximum minimum sum product
18
Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose R1 and R2 form a decomposition of R. Then the decomposition is a lossless join decomposition of R provided that: R1∩R2→R1 is in F+ R1∩R2→R2 is in F+ both R1∩R2→R1 and R1∩R2→R2 functional dependencies are in F+ at least one from R1∩R2→R1 and R1∩R2→R2 is in F+
1 vote
19
Aggregation is : an abstraction through which relationships are treated as lower level entities an abstraction through which relationships are treated as higher level entities an abstraction through which relationships are not treated at all as entities none of the above
20
An entity has: (i) a set of properties (ii) a set of properties and values for all the properties (iii) a set of properties and the values for some set of properties may non-uniquely identify an entity (iv) a set of properties and the values for some set of properties may uniquely identify an entity Which of the above are valid? (i) only (ii) only (iii) only (iv) only
21
How many constructors can a class have ? zero 1 2 any number
22
When a language has the capability to produce new data types, it is said to be : extensible encapsulated overloaded none of the above
23
A copy constructor is invoked when : a function returns by value an argument is passed by value a function returns by reference none of the above
24
The output of the program code main() { int x=0; while (x<=10) for(;;) if(++x%10==0) break; printf(“x=%d”,x); } is : x=1 compilation error x=20 none of the above
25
Which one of the following describes correctly a static variable? It cannot be initialized It is initialized once at the commencement of execution and cannot be changed at run time It retains its value during the life of the program None of the above
26
An example of distributed OS is: Amoeba UNIX MS-DOS MULTICS
1 vote
27
An example of a non pre-emptive scheduling algorithm is : Round Robin Priority Scheduling Shortest job first 2 level scheduling
1 vote
If holes are half as large as processes, the fraction of memory wasted in holes is : $2/3$ $1/2$ $1/3$ $1/5$
N processes are waiting for $I/O$. A process spends a fraction $p$ of its time in $I/O$ wait state. The $CPU$ utilization is given by : 1-p-N 1-pN pN p-N