# Recent questions tagged ugcnetdec2016ii

1 vote
1
Match the following w.r.t. Input/Output management: List-I List-II a. Device controller i. Extracts information from the controller register and store it in data buffer b. Device driver ii. I/O scheduling c. Interrupt handler iii. Performs data transfer d. Kernel I/O subsystem iv. Processing of I/O request ... d-ii a-ii; b-i; c-iv; d-iii a-iv; b-i; c-ii; d-iii a-i; b-iii; c-iv; d-ii
2
In a paging system, it takes $30$ ns to search translation Look-aside Buffer (TLB) and $90$ ns to access the main memory. If the TLB hit ratio is $70\%,$ the effective memory access time is $48$ ns $147$ ns $120$ ns $84$ ns
3
There are three processes P1, P2 and P3 sharing a semaphore for synchronising a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access the semaphore in following order: P2 needs to access ... P2 exits critical section Pi exits critical section The final value of semaphore will be: $0$ $1$ $-1$ $-2$
4
Which of the following statement(s) regarding a linker software is/are true? A function of a linker is to combine several object modules into a single load module. A function of a linker is to replace absolute references in an object module by symbolic references to locations in other modules. Only I Only II Both I and II Neither I nor II
1 vote
5
Consider the following statements related to compiler construction: Lexical Analysis is specified by context-free grammars and implemented by pushdown automata. Syntax Analysis is specified by regular expressions and implemented by finite-state machine. Which of the above statement(s) is/are correct? Only I Only II Both I and II Neither I nor II
–1 vote
6
Which of the following strings would match the regular expression: p+[3-5]*[xyz]? p443y p6y 3xyz p35z p353535x ppp5 I, III and Vl only IV, V and VI only II, IV and V only I, IV and V only
7
In link state routing algorithm after construction of link state packets, new routes are computed using: DES algorithm Dijkstra’s algorithm RSA algorithm Packets
8
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ______ automatically by server by exchanging information with neighbour nodes with back up database
9
Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP ... -iv; b-i; c-ii; d-iii a-iii; b-ii; c-i; d-iv a-ii; b-iii; c-iv; d-i a-iii; b-i; c-iv; d-ii
10
If $h$ is chosen from a universal collection of hash functions and is used to hash $n$ keys into a table of size $m,$ where $n≤m,$ the expected number of collisions involving a particular key $x$ is less than _____ $1$ $1/n$ $1/m$ $n/m$
11
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum element in a sorted array? Insertion-O(1), Deletion-O(1), Maximum-O(1), Minimum-O(1) Insertion-O(1), Deletion-O(1), Maximum-O(n), Minimum-O(n) Insertion-O(n), Deletion-O(n), Maximum-O(1), Minimum-O(1) Insertion-O(n), Deletion-O(n), Maximum-O(n), Minimum-O(n)
12
The order of a leaf node in a B+ tree is the maximum number of children it can have. Suppose that block size is 1 kilobytes, the child pointer takes 7 bytes long and search field value takes 14 bytes long. The order of the leaf node is _________ 16 63 64 65
13
Let M and N be two entities in an E-R diagram with simple single vale attributes. R1 and R2 are two relationships between M and N, whereas R1 is one-to-many and R2 is many-to-many. The minimum number of tables required to represent M, N, R1 and R2 in the relational model are _______ 4 6 7 3
14
Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints? An instructor Id. No. cannot be null, provided Instructor Id. No. being the ... , 2 and 3 are true 1 - false; 2 and 3 are true 1 and 2 are true; 3-false 1, 2 and 3 are false
1 vote
15
A binary $3-bit$ down counter uses $J-K$ flip-flops, $FF_i$ with inputs $J_i, K_i$ and outputs $Q_i, i=0,1,2$ respectively. The minimized expression for the input from following is $J_0=K_0=0$ $J_0=K_0=1$ $J_1=K_1=Q_0$ $J_1=K_1=Q’_0$ $J_2=K_2=Q_1Q_0$ $J_2=K_2=Q’_1Q’_0$ I, III, V I, IV, VI II, III, V II, V, VI
16
In propositional logic, if $(P→Q)\wedge (R→S)$ and $(P\vee R)$ are two premises such that $Y$ is the premise: $\begin{array}{c}( P \rightarrow Q) \wedge ( R \rightarrow S) \\ P \vee R \\ \hline \\ Y \\ \hline \end{array}$ $P\vee R$ $P\vee S$ $Q\vee R$ $Q\vee S$
1 vote
17
Consider a Hamiltonian Graph $G$ with no loops or parallel edges and with $|V(G)|=n≥3.$ Then which of the following is true? $deg(v) ≥ n/2$ for each vertex $v$ $|E(G)| ≥ 1/2(n-1)(n-2)+2$ $deg(v)+deg(w) ≥ n$ whenever $v$ and $w$ are not connected by an edge All of the above
18
How many multiples of $6$ are there between the following pairs of numbers? $0$ and $100$ and $-6$ and $34$ $16$ and $6$ $17$ and $6$ $17$ and $7$ $16$ and $7$
19
The functions mapping $R$ into $R$ are defined as: $f(x) = x^3-4x, g(x)=1/(x^2+1)$ and $h(x)=x^4$ Then find the value of the following composite functions: $hog(x)$ and $hogof(x)$ $(x^2+1)^4$ and $[(x^3-4x)^2+1]^4$ $(x^2+1)^4$ and $[(x^3-4x)^2+1]^{-4}$ $(x^2+1)^{-4}$ and $[(x^3-4x)^2+1]^4$ $(x^2+1)^{-4}$ and $[(x^3-4x)^2+1]^{-4}$
20
Match the following: List-I List-II a. Absurd i. Clearly impossible being contrary to some evident truth b. Ambiguous ii. Capable of more than one interpretation or meaning c. Axiom iii. An assertion that is accepted and used without a proof d. Conjecture iv. An opinion Preferably based on some experience or wisdom \begin ... -iv a-i; b-iii; c-iv; d-ii a-ii; b-iii; c-iv; d-i a-ii; b-i; c-iii; d-iv
21
Consider a sequence $F_{00}$ defined as: $F_{00} (0) = 1, \: F_{00}(1)=1$ $F_{00}(n) = \frac{10*F_{00}(n-1)+100}{F_{00}(n-2)} \text{ for } n \geq 2$ Then what shall be the set of values of the sequence $F_{00}$? (1, 110, 1200) (1, 110, 600, 1200) (1, 2, 55, 110, 600, 1200) (1, 55, 110, 600, 1200)
22
Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP)? ERP automates and integrates majority of business processes. ERP provides access to information in a Real Time Environment. ERP is inexpensive to implement. a, b and c are false. a and b false; c true. a and b true; c false a true; b and c are false
23
In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation required for W-CDMA is 2 MHz 20 KHz 5 KHz 5 MHz
24
Which of the following is/are true w.r.t. applications of mobile computing? Travelling of salesman Location awareness services a true; b false Both a and b are true Both a and b are false a false; b true
25
_______ refers loosely to the process of semi-automatically analysing large databases to find useful patterns. Datamining Data Warehousing DBMS Data mirroring
26
Match the following: List-I List-II a. Affiliate marketing i. Vendors ask partners to place logos on partner's site. If customers click, come to vendors and buy b. Viral Marketing ii. Spread your brand on the net by word-of-mouth. Receivers will send your information to their friends c. Group Purchasing iii. Aggregating ... d-iv a-iii; b-ii; c-iv; d-i a-ii; b-iii; c-iv; d-i a-ii; b-iii; c-i; d-iv
27
A software design pattern used to enhance the functionality of an object at run-time is: Adapter Decorator Delegation Proxy