# Recent questions tagged ugcnetjune2013ii

1 vote
1
The $mv$ command changes the inode the inode-number the directory entry both the directory entry and the inode
1 vote
2
Consider the following UNIX command: sort<in>temp; head-30<temp; nm temp Which of the following functions shall be performed by this command? Sort, taking the input from &ldquo;temp&rdquo;, prints 20 lines from temp and delete the file temp Sort eh file ... taking the input from &ldquo;temp&rdquo;, and then prints 30 lines from &ldquo;temp&rdquo; on terminal. Finally &ldquo;temp&rdquo; is removed.
3
A virtual memory based memory management algorithm partially swaps out a process. This is an example of short term scheduling long term scheduling medium term scheduling mutual exclusion
4
When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as handoff mobile switching mobile routing cell switching
5
A set of processors $P1, P2, \dots Pk$ can execute in parallel if Bernstein&rsquo;s conditions are satisfied on a pairwise basis; that is $P1 \parallel P2 \parallel P3 \parallel \dots \parallel Pk$ if and only if: $Pi \parallel Pj \text{ for all } i \neq j$ $Pi \parallel Pj \text{ for all } i =j+1$ $Pi \parallel Pj \text{ for all } i \leq j$ $Pi \parallel Pj \text{ for all } i \geq j$
6
Which one of the following is decimal value of a signed binary number 1101010, if it is in 2&rsquo;s complement form? -42 -22 -21 -106
7
A Boolean operator $\ominus$ is defined as follows: 1 $\ominus$ 1 =1, 1 $\ominus$ 0 = 0, 0 $\ominus$ 1 = 0 and 0 $\ominus$ 0 =1 What will be the truth value of the expression (x $\ominus$ y ) $\ominus$ z = x $\ominus$ (y $\ominus$ z)? Always true Always false Sometimes true True when x,y, z are all true
8
How many different Boolean functions of degree 4 are there? $2^4$ $2^8$ $2^{12}$ $2^{16}$
1 vote
9
A test contains 100 true/false questions. How many different ways can a student answer the question on the test, if the answer may be left blank also. $^{100}P_2$ $^{100}C_2$ $2^{100}$ $3^{100}$
10
Give as good a big-O estimate as possible for the following functions: $(n \log n+ n^2 )(n^3 +2) \text{ and } (n! +2^n) (n^3 + \log (n^2 +1))$ $O(n^5 + 2n^2) \text{ & } O(n^{3*}n!)$ $O(n^5) \text{ & } O(n^{3*}2^n)$ $O(n^5) \text{ & } O(n^{3*}n!)$ $O(n^5 + 2n^2) \text{& } O(n^{3*}2^n)$
11
The relation &ldquo;devides&rdquo; on a set of positive integers is_____ Symmetric and transitive Anti symmetric and transitive Symmetric only Transitive only
1 vote
12
The task of correcting and preprocessing data is called as Data streaming Data cleaning Data mining Data storming
1 vote
13
Repository of information gathered from multiple sources, storing under unified scheme at a single site is called Data mining Meta Data Data warehousing Database
The value of postfix expression: 834+-382/+*2$3+ is 17 131 64 52 1 vote 1 answer 15 For a B-tree of height h and degree t, the total CPU time used to insert a node is O(h log t) O(t log h) O(t$^2$h) O(th) 4 votes 2 answers 16 Given an open address hash table with load factor$\alpha <1$, the expected number of probes in a successful search is Atmost$\frac{1}{\alpha}$In$( \frac{1-\alpha}{\alpha})$Atmost$\frac{1}{\alpha}$In$( \frac{1 }{1-\alpha})$Atleast$\frac{1}{\alpha}$In$( \frac{1 }{1-\alpha})$Atleast$\frac{1}{\alpha}$In$( \frac{\alpha }{1-\alpha})$2 votes 1 answer 17 Which is the correct statement(s) for Non Recursive predictive parser?$S1 : First(\alpha) = \{ t \mid \alpha_{\Rightarrow}$*$t \beta \text{ for some string } \beta \} _{\Rightarrow}$*$t \betaS2: Follow(X) = \{ a \mid S_{\Rightarrow}$* ... Both statements S1 and S2 are incorrect S1 is incorrect S2 is correct S1 is correct S2 is incorrect Both statements S1 and S2 are correct 2 votes 3 answers 18 Given a Non-deterministic Finite Automaton (NFA) with states p and r as initial and final states respectively and transition table as given below: a b p - q q r s r r s s r s The minimum number of states required in Deterministic Finite Automaton (DFA) equivalent to NFA is 5 4 3 2 1 vote 1 answer 19 The equivalent production rules corresponding to the production rules$S \rightarrow S \alpha_1 \mid S \alpha_2 \mid \beta_1 \mid \beta_2$is$S \rightarrow \beta_1 \mid \beta_2, A \rightarrow \alpha_1 A \mid \alpha_2 A \mid \lambda$... 1 vote 1 answer 20 Given a grammar$S1 \rightarrow Sc, S \rightarrow SA \mid A, A \rightarrow aSb \mid ab$, there is a rightmost derivation$S1 \Rightarrow Sc \Rightarrow SAC \Rightarrow SaSbc$Thus,$SaSbc$is a right sentential form, and its handle is$SaSbcSbcaSb$1 vote 1 answer 21 Given the production rules of a grammar G1 as$S_1 \rightarrow AB \mid aaBA \rightarrow a \mid AaB \rightarrow b$and the production rules of a grammar G2 as$S_2 \rightarrow aS_2bS_2 \mid bS_2 aS_2 \mid \lambda$Which of the following is correct ... is not ambiguous G1 is ambiguous and G2 is ambiguous G1 is not ambiguous and G2 is ambiguous G1 is not ambiguous and G2 is not ambiguous 6 votes 2 answers 22 Given L1=L(a*baa*) L2=L(ab*). The regular expression corresponding to language L3=L1/L2 (right quotient) is given by a*b a*baa* a*ba* None of the above 1 vote 1 answer 23 In IPv4 header, the ____ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to identification fragment offset time to live header checksum 2 votes 1 answer 24 In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for the three-layer hierarchy? 10 clusters, 24 regions and 20 routers 12 clusters, 20 regions and 20 routers 16 clusters, 12 regions and 25 routers 15 clusters, 16 regions and 20 routers 1 vote 1 answer 25 In classful addressing, the IP address 190.255.254.254 belongs to Class A Class B Class C Class D 1 vote 2 answers 26 In _____ substitution, a character in the plaintext is always changed to the same character in ciphertext, regardless of its position in the text. polyalphabetic monoalphabetic transpositional multialphabetic 1 vote 3 answers 27 Which of the following addresses is used to deliver a message to the correct application program running on a host? Port IP Logical Physical 1 vote 2 answers 28 If$D_1, D_2, \dots D_n$are domains in a relational model, then the relation is a table, which is a subset of$D_1+D_2+ \dots +D_nD_1 \times D_2 \times \dots \times D_nD_1 \cup D_2 \cup \dots \cup D_nD_1-D_2- \dots -D_n\$