search
Log In

Recent questions tagged ugcnetjune2015ii

1 vote
1 answer
1
Which of the following is not valid with reference to Message Passing Interface(MPI)? MPI can run on any hardware platform The programming model is a distributed memory model All parallelism is implicit MPI- Comm - Size returns the total number of MPI processes in specified communication
asked Jul 31, 2016 in Distributed Computing jothee 1k views
3 votes
2 answers
2
Which of the following statements is false about weak entity set? Weak entities can be deleted automatically when their strong entity is deleted Weak entity set avoids the data duplication and consequent possible inconsistencies caused by duplicating the key of the ... included Tuples in a weak entity set are not partitioned according to their relationship with tuples with a strong entity set
asked Jul 31, 2016 in Databases jothee 1.9k views
0 votes
4 answers
3
Which of the following algorithms sort $n$ integers, having the range $0$ to $(n^2 -1)$, in ascending order in $O(n)$ time? Selection sort Bubble sort Radix sort Insertion sort
asked Jul 31, 2016 in Algorithms jothee 1.1k views
0 votes
2 answers
4
Which of the following statements is incorrect for Parallel Virtual Machine (PVM)? The PVM communication model provides asynchronous blocking send, asynchronous blocking receive, amd non-blocking receive function Message buffers are allocated dynamically The PVM communication model assumes that ... is no limit to the size or number of such messages In PVM model, the message order is not preserved
asked Jul 31, 2016 in Distributed Computing jothee 812 views
0 votes
2 answers
5
In the case of parallelization, Amdahl's law states that if $P$ is the proportion of a program that can be made parallel and $(1-P)$ is the proportion that cannot be parallelized, then the maximum speed-up that can be achieved by using $N$ processors is: $\dfrac{1}{(1-P)+N.P} \\$ $\dfrac{1}{(N-1)P+P} \\$ $\dfrac{1}{(1-P)+\frac{P}{N}} \\$ $\dfrac{1}{P+\frac{(1-P)}{N}}$
asked Jul 31, 2016 in CO and Architecture jothee 1.1k views
1 vote
1 answer
6
Which one from the following is highly associated activity of project planning? Keep track of the progress Compare the actual and planned progress and costs Identify the activities, milestones and deliverables produced by a project Both B and C
asked Jul 31, 2016 in IS&Software Engineering jothee 1k views
0 votes
1 answer
7
Cohesion is an extension of: Abstraction concept Refinment concept Information hiding concept Modularity
asked Jul 31, 2016 in IS&Software Engineering jothee 1.7k views
1 vote
3 answers
8
Which process model is also called as classic life cycle model? Waterfall model RAD model Prototyping model Incremental model
asked Jul 31, 2016 in IS&Software Engineering jothee 953 views
2 votes
1 answer
9
Which of the testing strategy requirements established during requirements analysis are validated against developed software? validation testing integration testing regression testing system testing
asked Jul 31, 2016 in IS&Software Engineering jothee 1.2k views
3 votes
1 answer
10
Match the following: ... $a-ii, b-i, c-iv, d-iii$ $a-iv, b-ii, c-iii, d-i$ $a-iii, b-i, c-iv, d-ii$
asked Jul 31, 2016 in IS&Software Engineering jothee 919 views
1 vote
1 answer
11
What does the following command do? grep -vn "abc" x It will print all of the lines in the file x that match the search string "abc" It will print all of the lines in file x that do not match the search string "abc" It will print the total number of lines in ... x that match the search string "abc" It will print the specific line numbers of the file x in which there is a match for string "abc"
asked Jul 31, 2016 in Operating System jothee 1.2k views
2 votes
2 answers
12
A LRU page replacement is used with $4$ page frames and eight pages. How many page faults will occur with the reference string $0172327103$ if the four frames are initially empty? $6$ $7$ $5$ $8$
asked Jul 31, 2016 in Operating System jothee 2.3k views
2 votes
2 answers
13
Let $P-i$ and $P_j$ two processes, R be the set of variables read from memory, and W be the set of variables written to memory. For the concurrent execution of two processes $p_i$ and $P_j$ which of the conditions are not true? $R(P_i) \cap W(P_j) = \Phi$ $W(P_i) \cap R(P_j) = \Phi$ $R(P_i) \cap R(P_j) = \Phi$ $W(P_i) \cap W(P_j) = \Phi$
asked Jul 31, 2016 in Operating System jothee 1.2k views
2 votes
2 answers
14
A disk drive has $100$ cylinders, numbered $0$ to $99$. Disk requests come to the disk driver for cylinders $12, 26, 24, 4, 42, 8$ and $50$ in that order. The driver is currently serving a request at a cylinder $24$. A seek takes $6$ msec per cylinder moved. How much seek time is needed for shortest seek time first (SSTF) algorithm? $0.984$ sec $0.396$ sec $0.738$ sec $0.42$ sec
asked Jul 31, 2016 in Operating System jothee 2.9k views
3 votes
6 answers
15
Which phase of compiler generates stream of atoms? Syntax Analysis Lexical Analysis Code Generation Code Optimization
asked Jul 31, 2016 in Compiler Design jothee 1.8k views
1 vote
2 answers
16
Which one of the following is false? LALR parser is Bottom-Up parser A parsing algorithm which performs a left to right scanning and a right most deviation is RL($1$) LR parser is Bottom-Up parser In LL($1$), the $1$ indicates that there is a one symbol look-ahead
asked Jul 31, 2016 in Compiler Design jothee 1.1k views
1 vote
1 answer
17
If all the production rules have single non-terminal symbol on the left side, the grammar defined is: Context free grammar Context sensitive grammar Unrestricted grammar Phase grammar
asked Jul 31, 2016 in Theory of Computation jothee 978 views
1 vote
1 answer
18
The translator which performs macro calls expansion is called Macro processor Micro pre-processor Macro pre-processor Dynamic linker
asked Jul 31, 2016 in Compiler Design jothee 773 views
1 vote
1 answer
19
Match the following: ... $a-iii, b-iv, c-ii, d-i$ $a-iv, b-i, c-iii, d-ii$ $a-iv, b-iii, c-ii, d-ii$
asked Jul 31, 2016 in CO and Architecture jothee 785 views
1 vote
1 answer
20
Which of the following is/are restriction(s) in classless addressing? The number of addresses needs to be a power of $2$ The mask needs to be included in the address to define the block The starting address must be divisible by the number of addresses in the block All of the above
asked Jul 31, 2016 in Computer Networks jothee 960 views
3 votes
1 answer
21
What is the size of the 'total length' field in $IPv4$ diagram? $4$ bits $8$ bits $16$ bits $32$ bits
asked Jul 31, 2016 in Computer Networks jothee 815 views
1 vote
1 answer
22
Which of the following is not associated with the session layer? Dialog control Token management Semantics of the information transmitted synchronization
asked Jul 31, 2016 in Computer Networks jothee 1k views
1 vote
1 answer
23
Match the following port numbers with their uses: ... $a-iv, b-i, c-ii, d-iii$ $a-ii, b-i, c-iv, d-iii$ $a-ii, b-iv, c-iii, d-i$ $a-ii, b-iv, c-i, d-iii$
asked Jul 31, 2016 in Computer Networks jothee 755 views
1 vote
2 answers
24
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? Session Maintenance Protocol Real-time Streaming Protocol Real-time Transport Control Protocol Session Initiation Protocol
asked Jul 31, 2016 in Computer Networks jothee 1.2k views
2 votes
1 answer
25
To determine the efficiency of an algorithm the time factor is measured by Counting micro seconds Counting number of key operations Counting number of statements Counting kilobytes of algorithm
asked Jul 30, 2016 in Algorithms jothee 732 views
3 votes
1 answer
26
The average case occurs in Linear Search Algorithm when The item to be searched is in some where middle of the Array The item to be searched is not in the array The item to be searched is in the last of t he array The item to be searched is either in the last or not in the array
asked Jul 30, 2016 in Algorithms jothee 535 views
2 votes
2 answers
27
Level order Traversal of a rooted Tree can be done by starting from root and performing: Breadth First Search Depth First Search Root Search Deep Search
asked Jul 30, 2016 in Programming jothee 697 views
2 votes
1 answer
28
Consider the given graph Its Minimum Cost Spanning Tree is ______
asked Jul 30, 2016 in Graph Theory jothee 1.1k views
1 vote
2 answers
29
For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as: Neighbour Set Strong Entity Set Owner Entity Set Weak Set
asked Jul 30, 2016 in Databases jothee 3.1k views
1 vote
1 answer
30
Database application were directly built on top of file system to overcome the following drawbacks of using file-systems: Data redundancy and inconsistency Difficulty in accessing data Data isolation Integrity problems a a and d a, b, and c a, b, c, and d
asked Jul 30, 2016 in Databases jothee 1k views
...