# Recent questions tagged ugcnetjune2016ii

1
Consider the Breshenman's circle generation algorithm for plotting a circle with centre (0,0) and radius 'r' unit in first quadrant. If the current point is $(x_i, y_i)$ and decision parameter is $p_i$ then what will be the next point $(x_{i+1}, y_{i+1})$ and updates decision parameter $p_{i+1}$ ... $x_{i+1}=x_i-1; y_{i+1}=y_i; p_{i+1}=p_i+4x_i+10$
2
Given the following two statements: Strategic value of data mining is timestamping Information collection is an expensive process in building an expert system Which of the following options is correct? Both I and II are false Both I and II are true I is true, II is false I is false, II is true
1 vote
3
Consider the following two statements: Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse Data scrubling is a process of rejecting data from data warehouse to create indexes Which one of the following options is correct? I is true II is false I is false II is true Both I and II are false Both I and II are true
4
Pipelining improves performance by decreasing instruction latency eliminating data hazards exploiting instruction level parallelism decreasing the cache miss rate
5
Consider the following two statements: Business intelligence and Data warehousing is used for forecasting and Data mining Business intelligence and Data warehousing is used for analysis of large volumes of sales data Which one of the following options is correct? I is true , II is false Both I and II are true I is false II is false Both I and II are false
6
The extent to which a software tolerates the unexpected problems, is termed as Accuracy Reliability Correctness Robustness
7
The cyclomatic complexity of a flow graph V(G), in terms of predicate notes is P+1 P-1 P-2 P+2 Where P is the number of predicate nodes in flow graph V(G)
8
Which of the following is not included in the waterfall model? Requirement analysis Risk analysis Design Coding
9
The ____ model is preferred for software development when the requirements are not clear. Rapid Application Development Rational Unified Process Evolutionary Model Waterfall Model
10
If $S_1$ is total number of modules defined in the program architecture, $S_3$ is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is: $1+\frac{S_3}{S_1}$ $1-\frac{S_3}{S_1}$ $1+\frac{S_1}{S_3}$ $1-\frac{S_1}{S_3}$
11
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler reevaluates the process priority for every 'T' time units and declares next process to be scheduled ... and all arrive at time zero, then the schduler implements ___ criteria Priority scheduling Rond Robin Scheduling Shortest Job First FCFS
12
In UNIX, ____ creates three subdirectories; 'PIS' and two subdirectories 'progs' and 'data' from just created subdirectory 'PIS' mkdir PIS/progs PIS/data PIS mkdir PIS progs data mkdir PIS PIS/progs PIS/data mkdir PIS/progs data
13
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67 320 322 321 319
14
Suppose there are 4 processes in execution with 12 instances of a Resource R in a system: Teh maximum need of each process and current allocation are given below: Process Max. Need Current Allocation $P_1$ 8 3 $P_2$ 9 4 $P_3$ 5 2 $P_4$ 3 1 With reference to current allocation, is system safe? If so, what is the safe sequence? No Yes, $P_1P_2P_3P_4$ Yes, $P_4P_3P_1P_2$ Yes, $P_2P_1P_3P_4$
15
Consider the reference string: 0 1 2 3 0 1 4 0 1 2 3 4 If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are ____ and ___ respectively. 10, 9 9, 9 10, 10 9, 10
16
Which of the following is false? The grammar $S \rightarrow a \: Sb \mid bSa \mid SS \mid \in$, where $S$ is the only non-terminal symbol and $\in$ is the null string, is ambiguous SLR is powerful than LALR An LL(1) parser is a top-down parser YACC tool is an LALR(1) parser generator
17
Which of the following is not typically a benefit of dynamic linking? Reduction in overall program execution time Reduction in overall space consumption in memory Reduction in overall space consumption on disk Reduction in the cost of software updates I and IV I only II and III IV only
18
In ____, the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other. Loop unrolling Strength reductions Loop concatenation Loop jamming
19
The content of the accumulator after the execution of the following 8085 assembly language program, is: MVI A, 42H MVI B, 05h UGC: ADD B DCR B JNZ UGC ADI 25H HLT 82 H 78 H 76 H 47 H
20
The number of strings of length 4 that are generated by the regular expression $(0 \mid \epsilon ) 1^+ 2^{*}(3 \mid \epsilon)$, where $\mid$ is an alternation character, $\{+, *\}$ are quantification characters, and $\epsilon$ is the null string, is: 08 10 11 12
21
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ____ the critical angle equal to less than greater than less than or equal to
22
If there are $N$ people in the world and are using secret key encryption and decryption for privacy purpose, then the number of secret keys required will be $N$ $(N-1)$ $\frac{N(N-1)}{2}$ $\frac{N(N+1)}{2}$
23
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination Physical Transport Application Host-to-network
24
In a fully connected mesh network with 10 computers, total ___ number of cables are required and ____ number od ports are required for each device 40, 9 45, 10 45, 9 50, 10
25
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate? 100 Kbps 200 Kbps 400 Kbps 1000 Kbps
26
In how many ways can the string $A \cap B - A \cap B -A$ be fully paranthesized to yield an infix expression? 15 14 13 12
27
Which of the following is not an inherent application of stack? Implementation of recursion Evaluation of a postfix expression Job scheduling Reverse a string
Suppose you are given a binary tree with n nodes, such that each node has exactly eiter zero or two children. The maximum height of the tree will be $\frac{n}{2}-1$ $\frac{n}{2}+1$ $(n-1)/2$ $(n+1)/2$
Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: A B C D $a_1$ $b_1$ $c_1$ $d_1$ $a_2$ $b_3$ $c_3$ $d_1$ $a_1$ $b_2$ $c_1$ $d_2$ I:(B) II: ((B,C ... not equal to $d_2$) then which of hte above could not be the candidate key for the database table? I nad III only III and IV only II only I only