search
Log In

Recent questions tagged ugcnetjune2016ii

5 votes
1 answer
1
Consider the Breshenman's circle generation algorithm for plotting a circle with centre (0,0) and radius 'r' unit in first quadrant. If the current point is $(x_i, y_i)$ and decision parameter is $p_i$ then what will be the next point $(x_{i+1}, y_{i+1})$ and updates decision parameter $p_{i+1}$ ... $x_{i+1}=x_i-1; y_{i+1}=y_i; p_{i+1}=p_i+4x_i+10$
asked Aug 18, 2016 in Computer Graphics jothee 2k views
4 votes
2 answers
2
Given the following two statements: Strategic value of data mining is timestamping Information collection is an expensive process in building an expert system Which of the following options is correct? Both I and II are false Both I and II are true I is true, II is false I is false, II is true
asked Aug 16, 2016 in Others jothee 1.4k views
1 vote
1 answer
3
Consider the following two statements: Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse Data scrubling is a process of rejecting data from data warehouse to create indexes Which one of the following options is correct? I is true II is false I is false II is true Both I and II are false Both I and II are true
asked Aug 16, 2016 in Others jothee 1.1k views
4 votes
3 answers
4
Pipelining improves performance by decreasing instruction latency eliminating data hazards exploiting instruction level parallelism decreasing the cache miss rate
asked Aug 16, 2016 in CO and Architecture jothee 1.5k views
4 votes
2 answers
5
Consider the following two statements: Business intelligence and Data warehousing is used for forecasting and Data mining Business intelligence and Data warehousing is used for analysis of large volumes of sales data Which one of the following options is correct? I is true , II is false Both I and II are true I is false II is false Both I and II are false
asked Aug 16, 2016 in Others jothee 922 views
3 votes
1 answer
6
The extent to which a software tolerates the unexpected problems, is termed as Accuracy Reliability Correctness Robustness
asked Aug 16, 2016 in IS&Software Engineering jothee 1.4k views
4 votes
1 answer
7
The cyclomatic complexity of a flow graph V(G), in terms of predicate notes is P+1 P-1 P-2 P+2 Where P is the number of predicate nodes in flow graph V(G)
asked Aug 16, 2016 in IS&Software Engineering jothee 1.2k views
3 votes
2 answers
8
Which of the following is not included in the waterfall model? Requirement analysis Risk analysis Design Coding
asked Aug 16, 2016 in IS&Software Engineering jothee 1.2k views
3 votes
2 answers
9
The ____ model is preferred for software development when the requirements are not clear. Rapid Application Development Rational Unified Process Evolutionary Model Waterfall Model
asked Aug 16, 2016 in IS&Software Engineering jothee 2k views
3 votes
1 answer
10
If $S_1$ is total number of modules defined in the program architecture, $S_3$ is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is: $1+\frac{S_3}{S_1}$ $1-\frac{S_3}{S_1}$ $1+\frac{S_1}{S_3}$ $1-\frac{S_1}{S_3}$
asked Aug 16, 2016 in IS&Software Engineering jothee 1.3k views
6 votes
2 answers
11
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler reevaluates the process priority for every 'T' time units and declares next process to be scheduled ... and all arrive at time zero, then the schduler implements ___ criteria Priority scheduling Rond Robin Scheduling Shortest Job First FCFS
asked Aug 16, 2016 in Operating System jothee 1.1k views
3 votes
1 answer
12
In UNIX, ____ creates three subdirectories; 'PIS' and two subdirectories 'progs' and 'data' from just created subdirectory 'PIS' mkdir PIS/progs PIS/data PIS mkdir PIS progs data mkdir PIS PIS/progs PIS/data mkdir PIS/progs data
asked Aug 16, 2016 in Others jothee 1.1k views
4 votes
2 answers
13
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67 320 322 321 319
asked Aug 16, 2016 in Operating System jothee 6.9k views
3 votes
2 answers
14
Suppose there are 4 processes in execution with 12 instances of a Resource R in a system: Teh maximum need of each process and current allocation are given below: Process Max. Need Current Allocation $P_1$ 8 3 $P_2$ 9 4 $P_3$ 5 2 $P_4$ 3 1 With reference to current allocation, is system safe? If so, what is the safe sequence? No Yes, $P_1P_2P_3P_4$ Yes, $P_4P_3P_1P_2$ Yes, $P_2P_1P_3P_4$
asked Aug 16, 2016 in Operating System jothee 2.5k views
3 votes
1 answer
15
Consider the reference string: 0 1 2 3 0 1 4 0 1 2 3 4 If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are ____ and ___ respectively. 10, 9 9, 9 10, 10 9, 10
asked Aug 16, 2016 in Operating System jothee 2.6k views
4 votes
2 answers
16
Which of the following is false? The grammar $S \rightarrow a \: Sb \mid bSa \mid SS \mid \in$, where $S$ is the only non-terminal symbol and $\in$ is the null string, is ambiguous SLR is powerful than LALR An LL(1) parser is a top-down parser YACC tool is an LALR(1) parser generator
asked Aug 16, 2016 in Compiler Design jothee 927 views
3 votes
1 answer
17
Which of the following is not typically a benefit of dynamic linking? Reduction in overall program execution time Reduction in overall space consumption in memory Reduction in overall space consumption on disk Reduction in the cost of software updates I and IV I only II and III IV only
asked Aug 16, 2016 in Operating System jothee 1.6k views
3 votes
2 answers
18
In ____, the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other. Loop unrolling Strength reductions Loop concatenation Loop jamming
asked Aug 16, 2016 in Compiler Design jothee 2.4k views
4 votes
2 answers
19
The content of the accumulator after the execution of the following 8085 assembly language program, is: MVI A, 42H MVI B, 05h UGC: ADD B DCR B JNZ UGC ADI 25H HLT 82 H 78 H 76 H 47 H
asked Aug 16, 2016 in Others jothee 3.8k views
5 votes
2 answers
20
The number of strings of length 4 that are generated by the regular expression $(0 \mid \epsilon ) 1^+ 2^{*}(3 \mid \epsilon)$, where $\mid$ is an alternation character, $\{+, *\}$ are quantification characters, and $\epsilon$ is the null string, is: 08 10 11 12
asked Aug 16, 2016 in Theory of Computation jothee 3.6k views
3 votes
3 answers
21
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ____ the critical angle equal to less than greater than less than or equal to
asked Aug 16, 2016 in Computer Networks jothee 1.6k views
3 votes
2 answers
22
If there are $N$ people in the world and are using secret key encryption and decryption for privacy purpose, then the number of secret keys required will be $N$ $(N-1)$ $\frac{N(N-1)}{2}$ $\frac{N(N+1)}{2}$
asked Aug 16, 2016 in Computer Networks jothee 1.9k views
4 votes
2 answers
23
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination Physical Transport Application Host-to-network
asked Aug 16, 2016 in Computer Networks jothee 2.8k views
3 votes
4 answers
24
In a fully connected mesh network with 10 computers, total ___ number of cables are required and ____ number od ports are required for each device 40, 9 45, 10 45, 9 50, 10
asked Aug 16, 2016 in Computer Networks jothee 2.2k views
4 votes
3 answers
25
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate? 100 Kbps 200 Kbps 400 Kbps 1000 Kbps
asked Aug 16, 2016 in Computer Networks jothee 5k views
5 votes
2 answers
26
In how many ways can the string $A \cap B - A \cap B -A$ be fully paranthesized to yield an infix expression? 15 14 13 12
asked Aug 16, 2016 in Algorithms jothee 4.1k views
3 votes
2 answers
27
Which of the following is not an inherent application of stack? Implementation of recursion Evaluation of a postfix expression Job scheduling Reverse a string
asked Aug 16, 2016 in DS jothee 1.7k views
3 votes
3 answers
28
Suppose you are given a binary tree with n nodes, such that each node has exactly eiter zero or two children. The maximum height of the tree will be $\frac{n}{2}-1$ $\frac{n}{2}+1$ $(n-1)/2$ $(n+1)/2$
asked Aug 16, 2016 in DS jothee 2.8k views
4 votes
1 answer
29
Consider the following operations performed on a stack of size 5: Push (a); Pop(); Push(b); Push(c); Pop(); Push(d); Pop(); Pop(); Push(e) Which of the following statements is correct? Underflow occurs Stack operations are performed smoothly Overflow occurs None of the above
asked Aug 16, 2016 in DS jothee 1.8k views
7 votes
1 answer
30
Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: A B C D $a_1$ $b_1$ $c_1$ $d_1$ $a_2$ $b_3$ $c_3$ $d_1$ $a_1$ $b_2$ $c_1$ $d_2$ I:(B) II: ((B,C ... not equal to $d_2$) then which of hte above could not be the candidate key for the database table? I nad III only III and IV only II only I only
asked Aug 16, 2016 in Databases jothee 3.6k views
...