# Recent questions and answers in Unknown Category

1
In the software testing, the behavioural testing is called White box testing Black box testing Mutation testing Integration testing
1 vote
2
Consider a system with five processes $P_0$ through $P_4$ and three resource types $A, B$ and $C$. Resource type $A$ has seven instances, resource type $B$ has two instances and resource type $C$ ... the following allocation. If we implement Deadlock detection algorithm we claim that system is ________ Semaphore Deadlock state Circular wait Not in deadlock state
3
4
Which of the following is not a Clustering method? K-Means method Self Organizing feature map method K- nearest neighbor method Agglomerative method
5
What is the normal order of activities in which traditional software testing is organized? Integration Testing System Testing Unit Testing Validation Testing (c), (a), (b), (d) (c), (a), (d), (b) (d), (c), (b), (a) (b), (d), (a), (c)
1 vote
6
Which of the following is not a key issue stressed by an agile philosophy of software engineering? The importance of self-organizing teams as well as communication and collaboration between team members and customers Recognition that change represents opportunity Emphasis on rapid delivery of software that satisfies the customer Having a separate testing phase after a build phase
7
Which module gives control of the CPU to the process selected by the short-term schedular? Dispatcher Interrupt Schedular Threading
8
Software re-engineering is concerned with Re-constructing the original source code from the existing machine (low-level) code program and modifying it ti make it more user-friendly Scrapping the source code of a software and re-writing it entirely from scratch ... software systems to make them more maintainable Translating source code of an existing software to a new machine (low-level) language
9
Software does not wear-out in the traditional sense of the term, but software does tend to deteriorate as it evolves, because Software suffers from exposure to hostile environments Defects are more likely to arise after software has been used often Multiple change requests introduce errors in component interactions Software spare parts become harder to order
10
Match the following with respect to RDBMS: ... $(a)-iv; (b)-ii; (c)-iii; (d)-i$ $(a)-ii; (b)-iii; (c)-iv; (d)-i$
11
In SQL, ________ is an Aggregate function. SELECT CREATE AVG MODIFY
12
Which of the following is/are true with reference to ‘view’ in DBMS? A ‘view’ is a special stored procedure executed when certain event occurs A ‘view’ is a virtual table, which occurs after executing a pre-compiled query Only (a) is true Only (b) is true Both (a) and (b) are true Neither (a) nor (b) are true
13
Which of the following is not correct (in C++)? Class templates and function templates are instantiated in the same way Class templates differ from function templates in the way they are initiated Class template is initiated by defining an object using the template argument Class templates are generally used for storage classes
1 vote
14
Standard planning algorithms assume environment to be ______ Both deterministic and fully observable Neither deterministic nor fully observable Deterministic but not fully observable Not deterministic but fully observable
1 vote
15
If $b$ is the branching factor and $m$ is the maximum depth of the search tree, what is the space complexity of greedy search? $O (b+m)$ $O(bm)$ $O(b^m)$ $O(m^b)$
1 vote
16
The Bounded buffer problem is also known as ___________ Producer – consumer problem Reader – writer problem Dining Philosophers problem Both $(2)$ and $(3)$
1 vote
17
Context free grammar is not closed under Concatenation Complementation Kleene Star Union
1 vote
18
Which of the following is a valid reason for causing degeneracy in a transportation problem? Here $m$ is number of rows and $n$ is number of columns in transportation table. When the number of allocations is $m+n-1$ When two or more occupied cells become unoccupied ... allocations is less than $m+n-1$ When a loop cannot be drawn without using unoccupied cells, except the starting cell of the loop
1 vote
19
The Sigmoid activation function $f(t)$ is defined as $\dfrac{1}{\text{exp} (t) + \text{exp} (-t)}$ $t \text{ exp}(-t)$ $\dfrac{1}{1+ \text{exp} (t)}$ $\dfrac{1}{1+ \text{exp} (-t)}$
1 vote
20
Consider the following statements: UNIX provides three types of permissions Read Write Execute UNIX provides three sets of permissions permission for owner permission for group permission for others Which of the above statement/s is/are true? Only (a) Only (b) Both (a) and (b) Neither (a) nor (b)
1 vote
21
Which of the following routing technique / techniques is/are used in distributed systems? Fixed Routing Virtual Routing Dynamic Routing (a) only (a) and (b) only (c) only All (a), (b), (c)
1 vote
22
An undirected graph $G(V,E)$ contains $n(n>2)$ nodes named $v_1, v_2, \dots , v_n$. Two nodes $v_i$ and $v_j$ are connected if and only if $0< \mid i-j \mid \leq 2$. Each edge $(v_i, v_j)$ id assigned a weight $i+j$. The cost of the minimum spanning tree of such a graph with $10$ nodes is $88$ $91$ $49$ $21$
1 vote
23
Consider the recurrence relation: $\begin{array}{} T(n)& =8T \bigg( \dfrac{n}{2} \bigg) + Cn, \text{if } n>1 \\ & =b, \text{if } n=1 \end{array}$ Where $b$ and $c$ are constants. The order of the algorithm corresponding to above recurrence relation is $n$ $n^2$ $n \lg n$ $n^3$
24
When a subroutine is called, then address of the instruction following the CAL instruction is stored in/on the Stack pointer Accumulator Program counter Stack
25
If $f(x,y)=x^{3}y+e^{x},$ the partial derivatives, $\dfrac{\partial f}{\partial x},\dfrac{\partial f}{\partial y}$ are $3x^{2}y+1, \: x^{3}+1$ $3x^{2}y+e^{x}, \: x^{3}$ $x^{3}y+xe^{x}, \: x^{3}+e^{x}$ $2x^{2}y+\dfrac{e^{x}}{x}$
1 vote
26
The function $f(x)=x^{5}-5x^{4}+5x^{3}-1$ has one minima and two maxima two minima and one maxima two minima and two maxima one minima and one maxima
27
The materials $\begin{bmatrix} \cos\theta &-\sin \theta \\ \sin \theta & cos \theta \end{bmatrix}$ and $\begin{bmatrix} a & 0 \\ 0 & b \end{bmatrix}$ commute under the multiplication if $a=b \text{(or)} \theta =n\pi, \: n$ is an integer always never if $a\cos \theta \neq b\sin \theta$
28
$\displaystyle \lim_{x \rightarrow 0}\frac{1}{x^{6}} \displaystyle \int_{0}^{x^{2}}\frac{t^{2}dt}{t^{6}+1}=$? $1/4$ $1/3$ $1/2$ $1$
29
​​​​​​​Consider a vocabulary with only four propositions A, B, C and D. How many models are there for the following sentence? $\neg A \vee \neg B \vee \neg C \vee \neg D$ $7$ $8$ $15$ $16$
30
Consider the following minimax game tree search What will be the value probagated at the root? $3$ $4$ $5$ $6$
31
​​​​​​​______ system call creates new process in Unix. create create new fork fork new
32
​​​​​​​An attribute $A$ of datatype varchar($20$) has the value $‘xyz’$, and the attribute $B$ of datatype char($20$) has the value $“lmnop”$, then the attribute $A$ has _____ spaces and attribute $B$ has ____ spaces. $3, 5$ $20, 20$ $3, 20$ $20, 5$
33
​​​​​​​Data warehouse contains _____ data that is never found in operational environment. Summary Encoded Encrypted Scripted
34
​​​​​​​_______ command is used to remove a relation from SQL database. Drop table Delete table Remove table Update table
35
​​​​​​​Which of the following statement/s is/are true ? Facebook has the world’s largest Hadoop Cluster. Hadoop $2.0$ allows live stream processing of Real time data. Choose the correct answer from the code given below : $Code :$ (i) only (ii) only Both (i) and (ii) Neither (i) nor (ii)
36
In $3D$ Graphics, which of the following statements is/are true? P: Back-face culling is an example of image-precision visible-surface determination procedure. Q: Z- buffer is a $16$-bit, $32$-bit, or $64$ bit field associated with each pixel in a frame ... visible surfaces at each pixel Choose the correct answer from the code given below : $Code:$ P only Q only P and Q Neither P nor Q
37
A binary search tree is constructed by inserting the following numbers in order : $60, 25, 72, 15, 30, 68, 101, 13, 18, 47, 70, 34$ The number of nodes in the left subtree is $5$ $6$ $7$ $3$
For $x$ and $y$ are variables as declared below $\textit{double }x=0.005, \: y = – 0.01;$ What is the value of $\text{ceil }(x+y)$, where $\text{ceil }$ is a function to compute ceiling of a number? $1$ $0$ $0.005$ $0.5$
Consider the schema $R=(\text{S T U V})$ and the dependencies $S \rightarrow T, T \rightarrow U, U \rightarrow V$, and $V \rightarrow S.$ If $R=(R1 \text{ and } R2)$ be a decomposition such that $R1 \cap R2= \phi$ then decomposition is not in $\text{2 NF}$ in $\text{2 NF}$ but not in $\text{3 NF}$ in $\text{3 NF}$ but not in $\text{2 NF}$ in both $\text{2 NF}$ and $\text{3 NF}$