# Recent questions tagged ugcnetsep2013iii

1 vote
1
Which of the following statements is not true for UNIX Operating System? Major strength of UNIX Operating System is its open standards which enables large number of organizations ranging from academicia to industries to participate in its development UNIX kernel uses ... as files which simplify the management of I/O devices and files. The directories structure used is directed acyclic graph.
2
Match the following for Windows Operating System: a. Hardware abstraction layer i. Starting all processes, emulation of different operating system, security functions, transform character based applications to graphical representation b. Kernel ii. Export a virtual memory interface, support for symmetric multiprocessing, administration, ... , c-ii, d-i a-ii, b-iii, c-iv, d-i a-iii, b-i, c-i, d-iv
1 vote
Which of the following shell scripts will produce the output “my first script”? for i in my first script { echo –i $i } for my first script; do echo –n; done for i in my first script; do echo –i$i; done for n in my first script; do echo –i $i; done 2 votes 1 answer 5 Consider a main memory with three page frames for the following page reference string: 5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4 Assuming that the execution of process is initialized after loading page 5 in memory,, the number of page faults in FIFO and second chance replacement respectively are 8 and 9 10 and 11 7 and 9 9 and 8 2 votes 1 answer 6 Consider the following set of processes with the length of CPU burst time in milliseconds (ms): Process A B C D E Burst time 6 1 2 1 5 Priority 3 1 3 4 2 Assume that processes are stored in ready queue in following order. A-B-C-D-E Using round robin scheduling with time slice of 1 ms, the average turn around time is 8.4 ms 12.4 ms 9.2 ms 9.4 ms 2 votes 1 answer 7 A system contains 10 units of resource of same type. The resource requirement and current allocation of these resources for three processes P, Q and R are as follows: P Q R Maximum requirement 8 7 5 Current allocation 4 1 3 Now, consider the following resource ... a safe state, which of the following options must be satisfied? Only request I Only request II Only request III Request I and II 2 votes 1 answer 8 Which of the following statements is not correct with respect to the distributed systems? Distributed system represents a global view of the network and considers it as a virtual uniprocessor system by controlling and managing resources across the network on all the sites. ... nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site. 2 votes 1 answer 9 The programming languages C and C++ are not strongly typed languages because Both C and C++ allow functions for which parameters are not type checked Both C and C++ allow functions for which parameters are type checked Both C and C++ allow functions for which parameters ... also the union types in these languages are not type checked. Union types in these (C and C++) languages are not type checked 3 votes 0 answers 10 Consider the following sequence of operations: Pointer p1 is set to point at a new heap-dynamic variable. Pointer p2 is assigned p1's value The heap dynamic variable pointed to by p1 is explicitly de-allocated but p2 is not changed by the operation This situation ... dangling pointer p2 becomes a dangling pointer Both p1 and p2 are now dangling pointers Neither p1 nor p2 is now a dangling pointer 3 votes 1 answer 11 Consider the following transformation matrix for rotation(clockwise):$[T] = \begin{bmatrix} \cos\theta & \sin\theta & 0 & 0 \\ -\sin\theta & \cos\theta & 0 & 0 \\ 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 1 \end{bmatrix}$This matrix rotates an object by an angle$\theta$about: X-axis Y-axis Z-axis All of the above 2 votes 1 answer 12 The parametric representation of the line segment between the position vectors$P_1(2,3)$and$P_2(5,4)$is given as$x(t) = 2+ 7t, y(t)=0 \leq t \leq \infty \quad 3+7tx(t) = 2+ 10t, y(t)=0 \leq t \leq 1 \quad 3+7tx(t) = 2+ 3t, y(t)=0 \leq t \leq 1 \quad y(t)=3+tt(x,y)=14t \quad 0 \leq t \leq 1$2 votes 1 answer 13 The two color systems &ndash; the HSV and HLS are Hue, Saturation, Value and Hue, Lightness, Saturation High, Standard, Value and High Lightness, Saturation Highly, Saturated, Value and Highly, Lightened Saturation Highly, Standard, Value and Hue, Lightness, Saturation 1 vote 1 answer 14 Which of the following is/are fundamental method(s) of antialiasing? Increase of sample rate Treating a pixel as a finite area rather than as a point Decrease of sample rate I and II II and III I only II only 1 vote 1 answer 15 A diametric projection is said to be trimetric projection when two of the three foreshortening factors are equal and third is arbitrary all of the three foreshortening factors are equal all of the three foreshortening factors are arbitrary Which of the above is true? I and II II and III I only III only 2 votes 1 answer 16 Which of the following graphics devices are known as active graphics devices? Alphanumeric devices Thumb wheels Digitizers Joystics I and II III and IV I, II and III I, II, III and IV 2 votes 1 answer 17 A _____ can forward or block packets based on the information in the network layer and transport layer header Proxy firewall Firewall Packet filter firewall Message digest firewall 1 vote 1 answer 18 If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B 1 vote 1 answer 19 If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division? 1111110000 1111111010 111111000 111111 1 vote 1 answer 20 MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes _____ frames. Temporal Voice Spatial Redundant 2 votes 1 answer 21 What is the output of the following program? #include<stdio.h> main() { int a, b =0; static int c[10]={1, 2, 3, 4, 5, 6, 7, 8, 9, 0}; for (a=0; a<10; ++a) int ((c[a]%2)==0) b+=c[a]; printf(“%d”, b); } 15 25 45 20 2 votes 1 answer 22 Consider the following two function declarations: int *f() int (*f)() Which of the following is true? Both are identical The first is a correct declaration and the second is wrong Both are different ways of declaring pointer to a function The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer 1 vote 1 answer 23 Sixty reusable components were available for an application. If only 70% of these components can be used, rest 30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs. 14, what will be risk of exposure if risk probability is 80%? Rs. 25, 200 Rs. 20, 160 Rs. 25, 160 Rs. 20, 400 1 vote 2 answers 24 Match the following: a. i. One to One Relationship b. ii. Relationship c. iii. Many to Many Relationship d. iv. Many to One Relationship a-iii, b-iv, c-ii, d-i a-iv, b-iii, c-ii, d-i a-ii, b-iii, c-iv, d-i a-iii, b-iv, c-i, d-ii 1 vote 1 answer 25 Match the following: a. Create i. The E-R model b. Select ii. Relationship Model c. Rectangle iii. DDL d. Record iv. DML a-iii, b-iv, c-i, d-ii a-iv, b-iii, c-ii, d-i a-iv, b-iii, c-i, d-ii a-iii, b-iv, c-ii, d-i 1 vote 0 answers 26 Consider the following schemas: Branch_Schema = (branch_name, assets, city) Customer_Schema = (customer_name, street, city) Deposit_Schema = (branch_name, account_number, customer_name, balance) Borrow_Schema = (branch_name, loan_number, customer_name, amount) Which of the following tuple relational calculus ... amount]>12000} { t$\mid$[?]$\in$borrow(t(customer_name)[?] s[amount] > 12000} 2 votes 1 answer 27 In _____, modules A and B make use of a common data type, but perhaps perform different operations on it. Data coupling Stamp coupling Control coupling Content coupling 0 votes 1 answer 28 Improving processing efficiency or performance or restructuring of software to improve changeability is known as Corrective maintenance Perfective maintenance Adaptive maintenance Code maintenance 0 votes 1 answer 29 The failure intensity for a basic model as a function of failures experienced is given as$\lambda (\mu) - \lambda_0[1-(\mu)/(V_0)]$where$\lambda_0$is the initial failure intensity at the start of the execution,$\mu\$ is the average or expected number of failures at a ... Then the decrement of failures intensity per failure will be 10 per CPU hr 0.1 per CPU hr -0.1 per CPU hr 90 per CPU hr