search
Log In

Recent questions tagged ugcnetjune2013ii

1 vote
1 answer
1
The $mv$ command changes the inode the inode-number the directory entry both the directory entry and the inode
asked Jul 14, 2016 in Operating System jothee 1k views
1 vote
1 answer
2
Consider the following UNIX command: sort<in>temp; head-30<temp; nm temp Which of the following functions shall be performed by this command? Sort, taking the input from &ldquo;temp&rdquo;, prints 20 lines from temp and delete the file temp Sort eh file ... taking the input from &ldquo;temp&rdquo;, and then prints 30 lines from &ldquo;temp&rdquo; on terminal. Finally &ldquo;temp&rdquo; is removed.
asked Jul 14, 2016 in Others jothee 756 views
2 votes
1 answer
3
A virtual memory based memory management algorithm partially swaps out a process. This is an example of short term scheduling long term scheduling medium term scheduling mutual exclusion
asked Jul 14, 2016 in Others jothee 1.3k views
2 votes
1 answer
4
When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as handoff mobile switching mobile routing cell switching
asked Jul 14, 2016 in Graph Theory jothee 1.1k views
2 votes
1 answer
5
A set of processors $P1, P2, \dots Pk$ can execute in parallel if Bernstein&rsquo;s conditions are satisfied on a pairwise basis; that is $ P1 \parallel P2 \parallel P3 \parallel \dots \parallel Pk$ if and only if: $Pi \parallel Pj \text{ for all } i \neq j$ $Pi \parallel Pj \text{ for all } i =j+1$ $Pi \parallel Pj \text{ for all } i \leq j$ $Pi \parallel Pj \text{ for all } i \geq j$
asked Jul 14, 2016 in Others jothee 574 views
3 votes
2 answers
6
Which one of the following is decimal value of a signed binary number 1101010, if it is in 2&rsquo;s complement form? -42 -22 -21 -106
asked Jul 14, 2016 in Graph Theory jothee 1.6k views
2 votes
2 answers
7
A Boolean operator $\ominus$ is defined as follows: 1 $\ominus$ 1 =1, 1 $\ominus$ 0 = 0, 0 $\ominus$ 1 = 0 and 0 $\ominus$ 0 =1 What will be the truth value of the expression (x $\ominus$ y ) $\ominus$ z = x $\ominus$ (y $\ominus$ z)? Always true Always false Sometimes true True when x,y, z are all true
asked Jul 14, 2016 in Others jothee 1k views
5 votes
3 answers
8
How many different Boolean functions of degree 4 are there? $2^4$ $2^8$ $2^{12}$ $2^{16}$
asked Jul 14, 2016 in Digital Logic jothee 2.2k views
1 vote
1 answer
9
A test contains 100 true/false questions. How many different ways can a student answer the question on the test, if the answer may be left blank also. $^{100}P_2$ $^{100}C_2$ $2^{100}$ $3^{100}$
asked Jul 14, 2016 in Others jothee 979 views
3 votes
2 answers
10
Give as good a big-O estimate as possible for the following functions: $(n \log n+ n^2 )(n^3 +2) \text{ and } (n! +2^n) (n^3 + \log (n^2 +1))$ $O(n^5 + 2n^2) \text{ & } O(n^{3*}n!)$ $O(n^5) \text{ & } O(n^{3*}2^n)$ $O(n^5) \text{ & } O(n^{3*}n!)$ $O(n^5 + 2n^2) \text{& } O(n^{3*}2^n)$
asked Jul 14, 2016 in Computer Networks jothee 952 views
4 votes
3 answers
11
The relation &ldquo;devides&rdquo; on a set of positive integers is_____ Symmetric and transitive Anti symmetric and transitive Symmetric only Transitive only
asked Jul 14, 2016 in Set Theory & Algebra jothee 2.2k views
1 vote
2 answers
12
The task of correcting and preprocessing data is called as Data streaming Data cleaning Data mining Data storming
asked Jul 14, 2016 in Others jothee 931 views
1 vote
2 answers
13
Repository of information gathered from multiple sources, storing under unified scheme at a single site is called Data mining Meta Data Data warehousing Database
asked Jul 14, 2016 in Others jothee 908 views
2 votes
2 answers
14
The value of postfix expression: 834+-382/+*2$3+ is 17 131 64 52
asked Jul 14, 2016 in Others jothee 2.2k views
1 vote
1 answer
15
For a B-tree of height h and degree t, the total CPU time used to insert a node is O(h log t) O(t log h) O(t$^2$h) O(th)
asked Jul 14, 2016 in Others jothee 1.2k views
4 votes
2 answers
16
Given an open address hash table with load factor $\alpha <1$, the expected number of probes in a successful search is Atmost $\frac{1}{\alpha}$ In $( \frac{1-\alpha}{\alpha})$ Atmost $\frac{1}{\alpha}$ In $( \frac{1 }{1-\alpha})$ Atleast $\frac{1}{\alpha}$ In $( \frac{1 }{1-\alpha})$ Atleast $\frac{1}{\alpha}$ In $( \frac{\alpha }{1-\alpha})$
asked Jul 14, 2016 in Others jothee 1.2k views
2 votes
1 answer
17
Which is the correct statement(s) for Non Recursive predictive parser? $S1 : First(\alpha) = \{ t \mid \alpha_{\Rightarrow}$ * $t \beta \text{ for some string } \beta \} _{\Rightarrow}$ * $t \beta$ $S2: Follow(X) = \{ a \mid S_{\Rightarrow}$ * ... Both statements S1 and S2 are incorrect S1 is incorrect S2 is correct S1 is correct S2 is incorrect Both statements S1 and S2 are correct
asked Jul 14, 2016 in Others jothee 970 views
2 votes
3 answers
18
Given a Non-deterministic Finite Automaton (NFA) with states p and r as initial and final states respectively and transition table as given below: a b p - q q r s r r s s r s The minimum number of states required in Deterministic Finite Automaton (DFA) equivalent to NFA is 5 4 3 2
asked Jul 14, 2016 in Theory of Computation jothee 2.4k views
1 vote
1 answer
19
The equivalent production rules corresponding to the production rules $S \rightarrow S \alpha_1 \mid S \alpha_2 \mid \beta_1 \mid \beta_2$ is $S \rightarrow \beta_1 \mid \beta_2, A \rightarrow \alpha_1 A \mid \alpha_2 A \mid \lambda$ ...
asked Jul 14, 2016 in Compiler Design jothee 1.2k views
1 vote
1 answer
20
Given a grammar $S1 \rightarrow Sc, S \rightarrow SA \mid A, A \rightarrow aSb \mid ab$, there is a rightmost derivation $S1 \Rightarrow Sc \Rightarrow SAC \Rightarrow SaSbc$ Thus, $SaSbc$ is a right sentential form, and its handle is $SaS$ $bc$ $Sbc$ $aSb$
asked Jul 14, 2016 in Others jothee 925 views
1 vote
1 answer
21
Given the production rules of a grammar G1 as $S_1 \rightarrow AB \mid aaB$ $A \rightarrow a \mid Aa$ $B \rightarrow b$ and the production rules of a grammar G2 as $S_2 \rightarrow aS_2bS_2 \mid bS_2 aS_2 \mid \lambda$ Which of the following is correct ... is not ambiguous G1 is ambiguous and G2 is ambiguous G1 is not ambiguous and G2 is ambiguous G1 is not ambiguous and G2 is not ambiguous
asked Jul 14, 2016 in Compiler Design jothee 1.4k views
6 votes
2 answers
22
Given L1=L(a*baa*) L2=L(ab*). The regular expression corresponding to language L3=L1/L2 (right quotient) is given by a*b a*baa* a*ba* None of the above
asked Jul 14, 2016 in Theory of Computation jothee 2.5k views
1 vote
1 answer
23
In IPv4 header, the ____ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to identification fragment offset time to live header checksum
asked Jul 14, 2016 in Others jothee 1.5k views
2 votes
1 answer
24
In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for the three-layer hierarchy? 10 clusters, 24 regions and 20 routers 12 clusters, 20 regions and 20 routers 16 clusters, 12 regions and 25 routers 15 clusters, 16 regions and 20 routers
asked Jul 14, 2016 in Others jothee 4.6k views
1 vote
1 answer
25
In classful addressing, the IP address 190.255.254.254 belongs to Class A Class B Class C Class D
asked Jul 14, 2016 in Computer Networks jothee 1.2k views
1 vote
2 answers
26
In _____ substitution, a character in the plaintext is always changed to the same character in ciphertext, regardless of its position in the text. polyalphabetic monoalphabetic transpositional multialphabetic
asked Jul 14, 2016 in Others jothee 1.2k views
1 vote
3 answers
27
Which of the following addresses is used to deliver a message to the correct application program running on a host? Port IP Logical Physical
asked Jul 14, 2016 in Others jothee 1.2k views
1 vote
2 answers
28
If $D_1, D_2, \dots D_n$ are domains in a relational model, then the relation is a table, which is a subset of $D_1+D_2+ \dots +D_n$ $D_1 \times D_2 \times \dots \times D_n$ $D_1 \cup D_2 \cup \dots \cup D_n$ $D_1-D_2- \dots -D_n$
asked Jul 14, 2016 in Others jothee 885 views
1 vote
1 answer
29
Which normal form is considered as adequate for usual database design? 2NF 3NF 4NF 5NF
asked Jul 14, 2016 in Others jothee 497 views
2 votes
2 answers
30
A Network Schema restricts to one to many relationship permits to many to many relationship Stores Data in a Database Stores Data in a Relation
asked Jul 14, 2016 in Others jothee 1k views
...