Recent questions tagged ugcnetdec2013ii

1 vote
1
Linux operating system uses Affinity scheduling Fair Preemptive Scheduling Hand Shaking Highest Penalty Ratio Next
2
Consider a disk queue with request for input/output to block cylinders 98, 183, 37, 122, 14, 124, 65, 67 in that order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The total number of head movements ... Time First (SSTF) and SCAN algorithms are respectively 236 and 252 cylinders 640 and 236 cylinders 235 and 640 cylinders 235 and 252 cylinders
1 vote
3
The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4-cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is 12 bits 15 bits 16 bits 20 bits
4
Consider a preemptive priority based scheduling algorithm based on dynamically changing priority. Larger priority number implies higher priority. When the process is waiting for CPU in the ready queue (but not yet started execution), its priority changes at a rate a=2. When it starts running, its priority changes at ... will respectively be 4, 5, 7 and 8 8, 2, 7 and 5 2, 5, 7 and 8 8, 2, 5 and 7
1 vote
5
Electronic Data Interchange Software consists of the following four layers: Business application, Internal format conversion, Network translator, EDI envelop Business application, Internal format conversion, EDI translator, EDI envelop Application layer, Transport layer, EDI translator, EDI envelop Application layer, Transport layer, IP layer, EDI envelop
6
The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organization. ISO ANSI ITU-T IEEE
1 vote
7
Match the following: List-I List-II a. Wireless Application Environment i. HTTP b. Wireless Transaction Protocol ii. IP c. Wireless Datagram Protocol iii. Scripts d. Wireless iv. UDP a-ii, b-iv, c-i, d-iii a-iv, b-iii, c-ii, d-i a-iv, b-iii, c-i, d-ii a-iii, b-i, c-iv, d-ii
1 vote
8
Active X controls are Pentium binary programs that can be embedded in Word pages URL pages Script pages Web pages
9
Which of the following statements are true ? A circuit that adds two bits, producing a sum bit and carry bit is called half adder. A circuit that adds two bits, producing a sum bit and carry bit is called full adder. A circuit that adds two bits and a carry bit producing a sum ... a Boolean variable as input and produces its complement is called an inverter. I & II II & III I, II, III I, III & IV
1 vote
10
A graph is non-planar if and only if it contains a subgraph homomorphic to $K_{3,2} \text{ or } K_5$ $K_{3,3} \text{ or } K_6$ $K_{3,3} \text{ or } K_5$ $K_{2,3} \text{ or } K_5$
1 vote
11
If n and r are non-negative integers and n $\geq$ r, then p(n+1, r) equals to $\frac{P(n,r)(n+1)}{(n+1-r)}$ $\frac{P(n,r)(n+1)}{(n-1+r)}$ $\frac{P(n,r)(n-1)}{(n+1-r)}$ $\frac{P(n,r)(n+1)}{(n+1+r)}$
1 vote
12
Let f and g be the functions from the set of integers defined by $f(x) = 2x+3$ and $g(x) =3x+2$. Then the composition of f and g and g and f is given as 6x+7, 6x+11 6x+11, 6x+7 5x+5, 5x+5 None of the above
13
Big-O estimate for $f(x)=(x+1) \log(x^2 +1) + 3x^2$ is given as $O(x \log x)$ $O(x^2)$ $O(x^3)$ $O(x^2 \log x)$
1 vote
14
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of positive integers. Determine the truth values of each of the following propositions: $\forall m \forall n P(m, n)$, $\exists m \forall n P(m,n)$ Both I and II are true Both I and II are false I-false & II-true I-true& II-false
1 vote
15
The sum of products expansion for the function $F(x,y,z)=(x+y)\overline{z}$ is given as $\overline{x}\;\overline{y}z + x y \overline{z} + \overline{x}y \overline{z}$ $xyz+xy\overline{z}+ x\overline{y}\; \overline{z}$ $x\overline{y}\;\overline{z}+ \overline{x}\;\overline{y}\;\overline{z}+ xy\overline{z}$ $xy\overline{z}+x\overline{y}\;\overline{z}+\overline{x}y\overline{z}$
1 vote
16
Given that $(292)_{10} = (1204)_x$ in some number system $x$. The base $x$ of that number system is 2 8 10 None of the above
1 vote
17
The dual of a Boolean expression is obtained by interchanging Boolean sums and Boolean products Boolean sums and Boolean products or interchanging $0's$ and $1's$ Boolean sums and Boolean products and interchanging $0's$ and $1's$ Interchanging $0's$ and $1's$
1 vote
18
The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned address is called Symbol resolution Parsing Assembly Relocation
19
Given the following statements: $S_1$: If $L$ is a regular language then the language $\{uv \mid u \in L, v \in L^R\}$ is also regular. $S_2$: $L=\{ww^R\}$ is regular language. Which of the following is true? $S_1$ is not correct and $S_2$ is not correct $S_1$ is not correct and $S_2$ is correct $S_1$ is correct and $S_2$ is not correct $S_1$ is correct and $S_2$ is correct
20
The context free grammar for the language: $L=\{a^n b^m \mid n \leq m + 3, n \geq 0, m \geq 0 \}$ is $S \rightarrow aaa \quad A; A \rightarrow aAb \mid B, B \rightarrow Bb \mid \lambda$ ... $S \rightarrow aaaA \mid aa \quad A \mid aA \mid \lambda, A \rightarrow aAb \mid B, B \rightarrow Bb \mid \lambda$
21
Given two sorted list of size 'm' and 'n' respectively. The number of comparisons needed in the worst case by the merge sort algorithm will be m $\times$ n max(m, n) min(m, n) m+n-1
1 vote
22
For any B-tree of minimum degree t $\geq$ 2, every node other than the root must have at least ____ keys and every node can have at most ____ keys. t-1, 2t+1 t+1, 2t+1 t-1, 2t-1 t+1, 2t-1
1 vote
23
______ is often used to prove the correctness of a recursive function. Diagnolization Communitivity Mathematical Induction Matrix Manipulation
24
If the queue is implemented with a linked list, keeping track of a front pointer, which of these pointers will change during an insertion into an non-empty queue? Neither of the pointer change Only front pointer changes Only rear pointer changes Both of the pointer changes
1 vote
25
What is the value of the postfix expression a b c d + - * (where a=8, b=4, c=2 and d=5) $-\frac{3}{8}$ $-\frac{8}{3}$ 24 -24
1 vote
26
_____ allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. Overloading Inheritance Polymorphism Encapsulation
1 vote
27
Which of the following operators cannot be overloaded in C++? * += == : :