search
Log In

Recent questions tagged ugcnetdec2013ii

1 vote
1 answer
1
Linux operating system uses Affinity scheduling Fair Preemptive Scheduling Hand Shaking Highest Penalty Ratio Next
asked Jul 26, 2016 in Operating System jothee 1.3k views
4 votes
1 answer
2
Consider a disk queue with request for input/output to block cylinders 98, 183, 37, 122, 14, 124, 65, 67 in that order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The total number of head movements ... Time First (SSTF) and SCAN algorithms are respectively 236 and 252 cylinders 640 and 236 cylinders 235 and 640 cylinders 235 and 252 cylinders
asked Jul 26, 2016 in Operating System jothee 5.6k views
1 vote
1 answer
3
The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4-cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is 12 bits 15 bits 16 bits 20 bits
asked Jul 26, 2016 in Operating System jothee 2.4k views
8 votes
2 answers
4
Consider a preemptive priority based scheduling algorithm based on dynamically changing priority. Larger priority number implies higher priority. When the process is waiting for CPU in the ready queue (but not yet started execution), its priority changes at a rate a=2. When it starts running, its priority changes at ... will respectively be 4, 5, 7 and 8 8, 2, 7 and 5 2, 5, 7 and 8 8, 2, 5 and 7
asked Jul 26, 2016 in Operating System jothee 1.9k views
1 vote
1 answer
5
Electronic Data Interchange Software consists of the following four layers: Business application, Internal format conversion, Network translator, EDI envelop Business application, Internal format conversion, EDI translator, EDI envelop Application layer, Transport layer, EDI translator, EDI envelop Application layer, Transport layer, IP layer, EDI envelop
asked Jul 26, 2016 in Web Technologies jothee 1.2k views
0 votes
2 answers
6
The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organization. ISO ANSI ITU-T IEEE
asked Jul 26, 2016 in Web Technologies jothee 705 views
1 vote
1 answer
7
Match the following: List-I List-II a. Wireless Application Environment i. HTTP b. Wireless Transaction Protocol ii. IP c. Wireless Datagram Protocol iii. Scripts d. Wireless iv. UDP a-ii, b-iv, c-i, d-iii a-iv, b-iii, c-ii, d-i a-iv, b-iii, c-i, d-ii a-iii, b-i, c-iv, d-ii
asked Jul 26, 2016 in Computer Networks jothee 660 views
1 vote
1 answer
8
Active X controls are Pentium binary programs that can be embedded in Word pages URL pages Script pages Web pages
asked Jul 26, 2016 in Web Technologies jothee 386 views
2 votes
2 answers
9
Which of the following statements are true ? A circuit that adds two bits, producing a sum bit and carry bit is called half adder. A circuit that adds two bits, producing a sum bit and carry bit is called full adder. A circuit that adds two bits and a carry bit producing a sum ... a Boolean variable as input and produces its complement is called an inverter. I & II II & III I, II, III I, III & IV
asked Jul 26, 2016 in Digital Logic jothee 692 views
1 vote
4 answers
10
A graph is non-planar if and only if it contains a subgraph homomorphic to $K_{3,2} \text{ or } K_5$ $K_{3,3} \text{ or } K_6$ $K_{3,3} \text{ or } K_5$ $K_{2,3} \text{ or } K_5$
asked Jul 26, 2016 in Graph Theory jothee 1.3k views
1 vote
1 answer
11
If n and r are non-negative integers and n $\geq$ r, then p(n+1, r) equals to $\frac{P(n,r)(n+1)}{(n+1-r)}$ $\frac{P(n,r)(n+1)}{(n-1+r)}$ $\frac{P(n,r)(n-1)}{(n+1-r)}$ $\frac{P(n,r)(n+1)}{(n+1+r)}$
asked Jul 26, 2016 in Combinatory jothee 722 views
1 vote
2 answers
12
Let f and g be the functions from the set of integers defined by $f(x) = 2x+3$ and $g(x) =3x+2$. Then the composition of f and g and g and f is given as 6x+7, 6x+11 6x+11, 6x+7 5x+5, 5x+5 None of the above
asked Jul 26, 2016 in Set Theory & Algebra jothee 939 views
2 votes
2 answers
13
Big-O estimate for $f(x)=(x+1) \log(x^2 +1) + 3x^2 $ is given as $O(x \log x)$ $O(x^2)$ $O(x^3)$ $O(x^2 \log x)$
asked Jul 26, 2016 in Algorithms jothee 1.3k views
1 vote
1 answer
14
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of positive integers. Determine the truth values of each of the following propositions: $\forall m \forall n P(m, n)$, $\exists m \forall n P(m,n)$ Both I and II are true Both I and II are false I-false & II-true I-true& II-false
asked Jul 26, 2016 in Mathematical Logic jothee 495 views
1 vote
2 answers
15
The sum of products expansion for the function $F(x,y,z)=(x+y)\overline{z}$ is given as $\overline{x}\;\overline{y}z + x y \overline{z} + \overline{x}y \overline{z}$ $xyz+xy\overline{z}+ x\overline{y}\; \overline{z}$ $x\overline{y}\;\overline{z}+ \overline{x}\;\overline{y}\;\overline{z}+ xy\overline{z}$ $xy\overline{z}+x\overline{y}\;\overline{z}+\overline{x}y\overline{z}$
asked Jul 26, 2016 in Digital Logic jothee 1.5k views
1 vote
3 answers
16
Given that $(292)_{10} = (1204)_x$ in some number system $x$. The base $x$ of that number system is 2 8 10 None of the above
asked Jul 26, 2016 in Digital Logic jothee 2.4k views
1 vote
1 answer
17
The dual of a Boolean expression is obtained by interchanging Boolean sums and Boolean products Boolean sums and Boolean products or interchanging $0's$ and $1's$ Boolean sums and Boolean products and interchanging $0's$ and $1's$ Interchanging $0's$ and $1's$
asked Jul 26, 2016 in Digital Logic jothee 1.3k views
1 vote
1 answer
18
The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned address is called Symbol resolution Parsing Assembly Relocation
asked Jul 26, 2016 in Compiler Design jothee 714 views
2 votes
1 answer
19
Given the following statements: $S_1$: If $L$ is a regular language then the language $\{uv \mid u \in L, v \in L^R\}$ is also regular. $S_2$: $L=\{ww^R\}$ is regular language. Which of the following is true? $S_1$ is not correct and $S_2$ is not correct $S_1$ is not correct and $S_2$ is correct $S_1$ is correct and $S_2$ is not correct $S_1$ is correct and $S_2$ is correct
asked Jul 26, 2016 in Theory of Computation jothee 1.2k views
2 votes
2 answers
20
The context free grammar for the language: $L=\{a^n b^m \mid n \leq m + 3, n \geq 0, m \geq 0 \}$ is $S \rightarrow aaa \quad A; A \rightarrow aAb \mid B, B \rightarrow Bb \mid \lambda$ ... $S \rightarrow aaaA \mid aa \quad A \mid aA \mid \lambda, A \rightarrow aAb \mid B, B \rightarrow Bb \mid \lambda$
asked Jul 26, 2016 in Theory of Computation jothee 1k views
3 votes
1 answer
21
Given two sorted list of size 'm' and 'n' respectively. The number of comparisons needed in the worst case by the merge sort algorithm will be m $\times$ n max(m, n) min(m, n) m+n-1
asked Jul 25, 2016 in Algorithms jothee 4.1k views
1 vote
1 answer
22
For any B-tree of minimum degree t $\geq$ 2, every node other than the root must have at least ____ keys and every node can have at most ____ keys. t-1, 2t+1 t+1, 2t+1 t-1, 2t-1 t+1, 2t-1
asked Jul 25, 2016 in Algorithms jothee 1.6k views
1 vote
1 answer
23
______ is often used to prove the correctness of a recursive function. Diagnolization Communitivity Mathematical Induction Matrix Manipulation
asked Jul 25, 2016 in Others jothee 888 views
2 votes
1 answer
24
If the queue is implemented with a linked list, keeping track of a front pointer, which of these pointers will change during an insertion into an non-empty queue? Neither of the pointer change Only front pointer changes Only rear pointer changes Both of the pointer changes
asked Jul 25, 2016 in Programming jothee 1.4k views
1 vote
1 answer
25
What is the value of the postfix expression a b c d + - * (where a=8, b=4, c=2 and d=5) $-\frac{3}{8}$ $-\frac{8}{3}$ 24 -24
asked Jul 25, 2016 in Programming jothee 1k views
1 vote
1 answer
26
_____ allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. Overloading Inheritance Polymorphism Encapsulation
asked Jul 25, 2016 in Object Oriented Programming jothee 350 views
1 vote
1 answer
27
2 votes
1 answer
28
Which of the following has compilation error in C? int n=32 ; char ch=65 ; float f=(float) 3.2 ; none of the above
asked Jul 25, 2016 in Programming jothee 801 views
0 votes
2 answers
29
What does the following declaration mean? int (*ptr) [10]; ptr is an array of pointers of 10 integers ptr is a pointer to an array of 10 integers ptr is an array of 10 integers none of the above
asked Jul 25, 2016 in Programming jothee 751 views
2 votes
1 answer
30
Data Integrity control uses Upper and lower limits on numeric data Passwords to prohibit unauthorized access to files Data dictionary to keep the data Data dictionary to find last access data
asked Jul 25, 2016 in Databases jothee 1.6k views
...