search
Log In

Recent questions tagged ugcnetsep2013iii

1 vote
1 answer
1
Which of the following statements is not true for UNIX Operating System? Major strength of UNIX Operating System is its open standards which enables large number of organizations ranging from academicia to industries to participate in its development UNIX kernel uses ... as files which simplify the management of I/O devices and files. The directories structure used is directed acyclic graph.
asked Jul 24, 2016 in Operating System jothee 983 views
2 votes
1 answer
2
Match the following for Windows Operating System: a. Hardware abstraction layer i. Starting all processes, emulation of different operating system, security functions, transform character based applications to graphical representation b. Kernel ii. Export a virtual memory interface, support for symmetric multiprocessing, administration, ... , c-ii, d-i a-ii, b-iii, c-iv, d-i a-iii, b-i, c-i, d-iv
asked Jul 24, 2016 in Operating System jothee 592 views
1 vote
1 answer
3
The portion of Windows 2000 operating system which is not portable is processor management user interface device management virtual memory management
asked Jul 24, 2016 in Operating System jothee 809 views
3 votes
1 answer
4
Which of the following shell scripts will produce the output “my first script”? for i in my first script { echo –i $i } for my first script; do echo –n; done for i in my first script; do echo –i $i; done for n in my first script; do echo –i $i; done
asked Jul 24, 2016 in Operating System jothee 502 views
2 votes
1 answer
5
Consider a main memory with three page frames for the following page reference string: 5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4 Assuming that the execution of process is initialized after loading page 5 in memory,, the number of page faults in FIFO and second chance replacement respectively are 8 and 9 10 and 11 7 and 9 9 and 8
asked Jul 24, 2016 in Operating System jothee 1.7k views
2 votes
1 answer
6
Consider the following set of processes with the length of CPU burst time in milliseconds (ms): Process A B C D E Burst time 6 1 2 1 5 Priority 3 1 3 4 2 Assume that processes are stored in ready queue in following order. A-B-C-D-E Using round robin scheduling with time slice of 1 ms, the average turn around time is 8.4 ms 12.4 ms 9.2 ms 9.4 ms
asked Jul 24, 2016 in Operating System jothee 2.4k views
2 votes
1 answer
7
A system contains 10 units of resource of same type. The resource requirement and current allocation of these resources for three processes P, Q and R are as follows: P Q R Maximum requirement 8 7 5 Current allocation 4 1 3 Now, consider the following resource ... a safe state, which of the following options must be satisfied? Only request I Only request II Only request III Request I and II
asked Jul 24, 2016 in Operating System jothee 958 views
2 votes
1 answer
8
Which of the following statements is not correct with respect to the distributed systems? Distributed system represents a global view of the network and considers it as a virtual uniprocessor system by controlling and managing resources across the network on all the sites. ... nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site.
asked Jul 24, 2016 in Distributed Computing jothee 732 views
2 votes
1 answer
9
The programming languages C and C++ are not strongly typed languages because Both C and C++ allow functions for which parameters are not type checked Both C and C++ allow functions for which parameters are type checked Both C and C++ allow functions for which parameters ... also the union types in these languages are not type checked. Union types in these (C and C++) languages are not type checked
asked Jul 24, 2016 in Programming jothee 441 views
3 votes
0 answers
10
Consider the following sequence of operations: Pointer p1 is set to point at a new heap-dynamic variable. Pointer p2 is assigned p1's value The heap dynamic variable pointed to by p1 is explicitly de-allocated but p2 is not changed by the operation This situation ... dangling pointer p2 becomes a dangling pointer Both p1 and p2 are now dangling pointers Neither p1 nor p2 is now a dangling pointer
asked Jul 24, 2016 in Programming and DS jothee 353 views
3 votes
1 answer
11
Consider the following transformation matrix for rotation(clockwise): $[T] = \begin{bmatrix} \cos\theta & \sin\theta & 0 & 0 \\ -\sin\theta & \cos\theta & 0 & 0 \\ 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 1 \end{bmatrix}$ This matrix rotates an object by an angle $\theta$ about: X-axis Y-axis Z-axis All of the above
asked Jul 24, 2016 in Computer Graphics jothee 944 views
2 votes
1 answer
12
The parametric representation of the line segment between the position vectors $P_1(2,3)$ and $P_2(5,4)$ is given as $x(t) = 2+ 7t, y(t)=0 \leq t \leq \infty \quad 3+7t$ $x(t) = 2+ 10t, y(t)=0 \leq t \leq 1 \quad 3+7t$ $x(t) = 2+ 3t, y(t)=0 \leq t \leq 1 \quad y(t)=3+t$ $t(x,y)=14t \quad 0 \leq t \leq 1$
asked Jul 24, 2016 in Computer Graphics jothee 1.1k views
2 votes
1 answer
13
The two color systems – the HSV and HLS are Hue, Saturation, Value and Hue, Lightness, Saturation High, Standard, Value and High Lightness, Saturation Highly, Saturated, Value and Highly, Lightened Saturation Highly, Standard, Value and Hue, Lightness, Saturation
asked Jul 24, 2016 in Computer Graphics jothee 694 views
1 vote
1 answer
14
Which of the following is/are fundamental method(s) of antialiasing? Increase of sample rate Treating a pixel as a finite area rather than as a point Decrease of sample rate I and II II and III I only II only
asked Jul 24, 2016 in Computer Graphics jothee 1.1k views
1 vote
1 answer
15
A diametric projection is said to be trimetric projection when two of the three foreshortening factors are equal and third is arbitrary all of the three foreshortening factors are equal all of the three foreshortening factors are arbitrary Which of the above is true? I and II II and III I only III only
asked Jul 24, 2016 in Computer Graphics jothee 823 views
2 votes
1 answer
16
Which of the following graphics devices are known as active graphics devices? Alphanumeric devices Thumb wheels Digitizers Joystics I and II III and IV I, II and III I, II, III and IV
asked Jul 24, 2016 in Computer Graphics jothee 693 views
2 votes
1 answer
17
A _____ can forward or block packets based on the information in the network layer and transport layer header Proxy firewall Firewall Packet filter firewall Message digest firewall
asked Jul 24, 2016 in Computer Networks jothee 1.1k views
1 vote
1 answer
18
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B
asked Jul 24, 2016 in Others jothee 1.2k views
1 vote
1 answer
19
If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division? 1111110000 1111111010 111111000 111111
asked Jul 24, 2016 in Computer Networks jothee 1.9k views
1 vote
1 answer
20
MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes _____ frames. Temporal Voice Spatial Redundant
asked Jul 24, 2016 in Computer Graphics jothee 1.4k views
2 votes
1 answer
21
What is the output of the following program? #include<stdio.h> main() { int a, b =0; static int c[10]={1, 2, 3, 4, 5, 6, 7, 8, 9, 0}; for (a=0; a<10; ++a) int ((c[a]%2)==0) b+=c[a]; printf(“%d”, b); } 15 25 45 20
asked Jul 24, 2016 in Programming and DS jothee 966 views
2 votes
1 answer
22
Consider the following two function declarations: int *f() int (*f)() Which of the following is true? Both are identical The first is a correct declaration and the second is wrong Both are different ways of declaring pointer to a function The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer
asked Jul 24, 2016 in Programming and DS jothee 829 views
1 vote
1 answer
23
Sixty reusable components were available for an application. If only 70% of these components can be used, rest 30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs. 14, what will be risk of exposure if risk probability is 80%? Rs. 25, 200 Rs. 20, 160 Rs. 25, 160 Rs. 20, 400
asked Jul 24, 2016 in IS&Software Engineering jothee 927 views
1 vote
2 answers
24
Match the following: a. i. One to One Relationship b. ii. Relationship c. iii. Many to Many Relationship d. iv. Many to One Relationship a-iii, b-iv, c-ii, d-i a-iv, b-iii, c-ii, d-i a-ii, b-iii, c-iv, d-i a-iii, b-iv, c-i, d-ii
asked Jul 24, 2016 in Databases jothee 345 views
1 vote
1 answer
25
Match the following: a. Create i. The E-R model b. Select ii. Relationship Model c. Rectangle iii. DDL d. Record iv. DML a-iii, b-iv, c-i, d-ii a-iv, b-iii, c-ii, d-i a-iv, b-iii, c-i, d-ii a-iii, b-iv, c-ii, d-i
asked Jul 24, 2016 in Databases jothee 694 views
1 vote
0 answers
26
Consider the following schemas: Branch_Schema = (branch_name, assets, city) Customer_Schema = (customer_name, street, city) Deposit_Schema = (branch_name, account_number, customer_name, balance) Borrow_Schema = (branch_name, loan_number, customer_name, amount) Which of the following tuple relational calculus ... amount]>12000} { t $\mid$ [?] $\in$ borrow(t(customer_name)[?] s[amount] > 12000}
asked Jul 24, 2016 in Databases jothee 383 views
2 votes
1 answer
27
In _____, modules A and B make use of a common data type, but perhaps perform different operations on it. Data coupling Stamp coupling Control coupling Content coupling
asked Jul 24, 2016 in IS&Software Engineering jothee 947 views
0 votes
1 answer
28
Improving processing efficiency or performance or restructuring of software to improve changeability is known as Corrective maintenance Perfective maintenance Adaptive maintenance Code maintenance
asked Jul 24, 2016 in IS&Software Engineering jothee 1k views
0 votes
1 answer
29
The failure intensity for a basic model as a function of failures experienced is given as $\lambda (\mu) - \lambda_0[1-(\mu)/(V_0)]$ where $\lambda_0$ is the initial failure intensity at the start of the execution, $\mu$ is the average or expected number of failures at a ... Then the decrement of failures intensity per failure will be 10 per CPU hr 0.1 per CPU hr -0.1 per CPU hr 90 per CPU hr
asked Jul 24, 2016 in IS&Software Engineering jothee 1.4k views
1 vote
1 answer
30
Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a program works correctly for all the other values in that class. This is used _____ to partition the program in the form of classes to reduce the number of test cases required for designing the test cases in the white box testing all of the above
asked Jul 24, 2016 in IS&Software Engineering jothee 564 views
...