Recent questions tagged ugcnetdec2015ii

1 vote
1
____ uses electronic means to transfer funds directly from one account to another rather than by cheque or cash M-Banking E-Banking O-Banking C-Banking
2
How many solutions are there for the equation $x+y+z+u=29$ subject to the constraints that $x \geq 1, \: \: y \geq 2 \: \: z \geq 3 \: \: and \: \: u \geq 0$? 4960 2600 23751 8855
3
Which of the following is not a software process model? Prototyping Iterative Timeboxiing Glassboxing
1 vote
4
In software testing, how the error, fault and failure are related to each other? Error leads to failure but fault is not related to error and failure Fault leads to failure but error is not related to fault and failure Error leads to fault and fault leads to failure Fault leads to error and error leads to failure
1 vote
5
The ____ transfers the executable image of a C++ program from hard disk to main memory Compiler Linker Debugger Loader
1 vote
6
Which of the following statements is false? Top-down parsers are LL parsers where first L stands for left-to-right scan and second L stands for a leftmost derivation (000)* is a regular expression that matches only strings containing an odd number of zeroes, including the empty string ... is, if L is any context-free language, then the language $L^R =\{w^R: w \varepsilon L\}$ is context-free
7
What will be the hexadecimal value in the register $ax$ (32-bit) after executing the following instructions? mov al, 15 mov ah, 15 xor al, al mov cl, 3 shr ax, cl 0F00 h 0F0F h 01E0 h FFFF h
1 vote
8
Loop unrolling is a code optimization technique: that avoids tests at every iteration of the loop that improves preformance by decreasing the number of instructions in a basic block that exchanges inner loops with outer loops that reorders operations to allow multiple computations to happen in parallel
9
Which of the following is not a congestion policy at network layer? Flow Control Policy Packet Discard Policy Packet Lifetime Management Policy Routing Algorithm
10
An ideal sort is an in-place-sort whose additional space requirement is O (log$_2$ n) O (nlog$_2$ n) O (1) O (n)
11
The number of disk pages access in B-tree search, where h is height, n is the number of keys and t is the minimum degree, is $\theta (\log_n h*t)$ $\theta (\log_t n*h)$ $\theta (\log_h n)$ $\theta (\log_t n)$
12
In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are shown as $x/y$, where $x$ is discovery time stamp and $y$ is finishing time stamp. It shows which of the following depth first forest? {a,b,e} {c,d,f,g,h} {a,b,e} {c,d,h} {f,g} {a,b,e} {f,g} {c,d} {h} {a,b,c,d} {e,f,g} {h}
13
The hash function used in double hashing is of the form: $h(k,i)=(h_1(k)+h_2(k)+i) \: mod \: m$ $h(k,i)=(h_1(k)+h_2(k)-i) \: mod \: m$ $h(k,i)=(h_1(k)+i \: h_2(k)) \: mod \: m$ $h(k,i)=(h_1(k)-i \: h_2(k)) \: mod \: m$
14
____ allows selection of the relevant information necessary for the data warehouse: The Top-Down View Data Warehouse View Datasource View Business Query View
1 vote
15
____ system is market oriented and is used for data analysis by knowledge workers including Managers, Executives adn Analysts. OLTP OLAP Data System Market System
1 vote
16
Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the time, that the proportion of persons having meningitis is $\frac{1}{50000}$, and that the proportion od people having stiff neck is $\frac{1}{20}$. Then the percentage of people who had meningtis and complain about stiff neck is: 0.01% 0.02% 0.04% 0.05%
1 vote
17
A data cube $C,$ has $n$ dimensions, and each dimensions has exactly $p$ distinct values in the base cuboid. Assume that there are no concept hierarchies associated with the dimensions. What is the maximum number of cells possible in the data cube, $C?$ $p^n$ $p$ $(2^n-1)(p+1)$ $(p+1)^n$
1 vote
18
In Unix, the login prompt can be changed by changing the contents of the file_____ contrab init gettydefs inittab
19
A system has 4 processes and 5 allocatable resources. The current allocation and maximum needs are as follows: Allocated Maximum Available Process A 1 0 2 1 1 1 1 2 1 3 0 0 x 1 1 Process B 2 0 1 1 0 2 2 2 1 0 Process C 1 1 0 1 0 2 1 3 1 0 Process D 1 1 1 1 0 1 1 2 2 1 The smallest value of x for which the above system in safe state is 1 3 2 0
20
Consider a disk with 16384 bytes per track having a rotation time of 16 msec and average seek time of 40 msec. What is the time in msec to read a block of 1024 bytes from this disk? 57 msec 49 msec 48 msec 17 msec
1 vote
21
Suppose that the number of instructions executed between page fault is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between the page faults is also doubled. Further, consider that a normal instruction ... page faults, how long would it take to run twice as much memory were available? 60 sec 30 sec 45 sec 10 sec
22
A virtual memory has a page size of 1K words,. There are eight pages and four blocks. The associative memory page table contains the following entries: Page Block 0 2 5 7 3 1 2 0 ... any page fault if referenced by the CPU? 1024, 3072, 4096, 6144 1234, 4012, 5000, 6200 1020, 3012, 6120, 8100 2021, 4050, 5112, 7100
23
Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5? 13 21 26 33
1 vote
24
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent cells. If 840 frequencies are available, how many can be used in a given cell? 280 210 140 120
25
Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is 400 bps 800 bps 1600 bps 3200 bps
1 vote
26
Which of the following fields in IPv 4 datagram is not related to fragmentation? Type of service Fragment offset Flags Indentification
1 vote
27
Which of the following services is not provided by wireless access point in 802.11 WLAN? Association Disassociation Error correction Integration
1 vote