UGC NET Previous Years Question Solution Paper- Dec-2018

UGC NET Previous Years Question Solution Paper- Dec-2018

Q1➡
Consider the language L given by
L = { 2nk | k > 0 , and n is non − negative integer number }
The minimum number of states of finite automaton which accept the language L is
A ➥ n
B ➥ n+1
C ➥ 2n
D ➥ n (n + 1 )/2

Show Answer With Best Explanation

Answer: B
Explanation:


Q2➡ | Computer Graphics
In 3D Graphics, which of the following statements about perspective and parallel projection is/are true?
P: In a perspective projection, the farthest an object is from the center of projection, the smaller it appears.
Q: Parallel projection is equivalent to a perspective projection where the viewer is standing infinitely far away
R: Perspective projections do not preserve straight lines.
i ➥ P and R only
ii ➥ P,Q and R
iii ➥ Q and R only
iv ➥ P and Q only

Show Answer With Best Explanation

Answer: D
Explanation:


Q3➡
Which of the following is true for semi-dynamic environment?
A ➥ The environment itself does not change with the passage of time but the agent’s performance score does.
B ➥ The environment change while the agent is deliberating.
C ➥ Even if the environment changes with the passage of time while deliberating, the performance score does not change.
D ➥ Environment and performance score, both change simultaneously.

Show Answer With Best Explanation

Answer: A
Explanation:


Q4➡
Consider the following method :
int f(int m, int n, boolean x, boolean y)
{
int res=0;
if(m<0)
{ res=n-m;
}
else if(x || y)
{
res= -1;
if( n==m)
{
res =1;
}
}
Else
{
res=n;
}
return res;
} /*end of f */
A ➥ (3,2)
B ➥ (3,4)
C ➥ (4,3)
D ➥ (2,3)

Show Answer With Best Explanation

Answer: B
Explanation:


Q5➡
A ➥ x1 =2, x2 =0 and z = -4
B ➥ x1 =2, x2 =6 and z = -22
C ➥ x1 =0, x2 =2 and z = -6
D ➥ x1 =6, x2 =2 and z = -18

Show Answer With Best Explanation

Answer: A
Explanation:


Q6➡
If the frame buffer has 10-bits per pixel and 8-bits are allocated for each of the R,G and B components then what would be the size of the color lookup table(LUT)
A ➥ (210 +211 ) bytes
B ➥ (210 + 224 ) bytes
C ➥ (210 +28 ) bytes
D ➥ (28 + 29 ) bytes

Show Answer With Best Explanation

Answer: A
Explanation:


Q7➡
Consider the following problems:
(i) Whether a finite automaton halts on all inputs?
(ii) Whether a given Context Free Language is Regular?
(iii) Whether a Turing Machine computes the product of two numbers?
Which one of the following is correct?
A ➥ Only (i) and (iii) are undecidable problems
B ➥ (i), (ii) and (iii) are undecidable problems
C ➥ Only (i) and (ii) are undecidable problems
D ➥ Only (ii) and (iii) are undecidable problems

Show Answer With Best Explanation

Answer: D
Explanation:


Q8➡
Consider the following language:
L1 = { an+m bn am | n, m ≥ 0 }
L2 = { an+m bn+m an+m |n, m ≥ 0 }
Which one of the following is correct?
A ➥ Only L1 is Context Free Language
B ➥ Both L1 and L2 are Context Free Language
C ➥ Both L 1 and L 2 are not Context Free Language
D ➥ Only L2 is Context Free Language

Show Answer With Best Explanation

Answer: A
Explanation:


Q19➡ | Computer Graphics
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: C
Explanation:


Q20➡
A ➥ < 0.6, 0.8 >
B ➥ < 0.4, 0.8 >
C ➥ < 0.2, 0.8 >
D ➥ < 0.6, 0.4 >

Show Answer With Best Explanation

Answer: D
Explanation:


Q11➡
A ➥ (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
B ➥ (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)
C ➥ (a)-(ii), (b)-(i),(c)-(iii), (d)-(iv)
D ➥ (a)-(i), (b)-(ii), (c)-(iii), (d)-(iv)

Show Answer With Best Explanation

Answer: A
Explanation:


Q12➡
The number of substrings that can be formed from string given by
a d e f b g h n m p
is
A ➥ 56
B ➥ 10
C ➥ 55
D ➥ 45

Show Answer With Best Explanation

Answer: A
Explanation:


Q13➡
A survey has been conducted on methods of commuter travel. Each respondent was asked to check Bus, Train or Automobile as a major methods of travelling to work. More than one answer was permitted. The results reported were as follows : Bus 30 people; Train 35 people; Automobile 100 people; Bus and Train 15 people; Bus and Automobile 15 people; Train and Automobile 20 people; and all the three methods 5 people. How many people complete the survey form?
A ➥ 120
B ➥ 160
C ➥ 165
D ➥ 115

Show Answer With Best Explanation

Answer: A
Explanation:


Question 14➡ | Computer Network
An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
i ➥ 245.248.132.0/22 and 245.248.132.0/21
ii ➥ 245.248.136.0/21 and 245.248.128.0/22
iii ➥ 245.248.136.0/24 and 245.248.132.0/21
iv ➥ 245.248.128.0/21 and 245.248.128.0/22

Show Answer With Best Explanation

Answer: II

Explanation:

An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?


An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?

According to given Option,
valid allocation of addresses to A = 245.248.136.0/21 and
valid allocation of addresses to B = 245.248.128.0/22

So, Option(II) is correct.

More Discussion Explanation On YouTubeIP Address Help-Line

Q15➡
Suppose P,Q and R are co-operating processes satisfying Mutual Exclusion condition. Then if the process Q is executing in its critical section then
A ➥ Both ‘P’ and ‘R’ executes in critical section
B ➥ ‘P’ executes in critical section
C ➥ ‘R’ executes in critical section
D ➥ Neither ‘P’ nor ‘Q’ executes in their critical section

Show Answer With Best Explanation

Answer:D
Explanation:


Q16➡
Suppose for a process P, reference to pages in order are 1, 2, 4, 5,2,1,2,4. Assume that main memory can accommodate 3 pages and the main memory has already pages 1 and 2 in the order 1 – first, 2- second. At this moment, assume FIFO Page Replacement Algorithm is used then the number of page faults that occur to complete the execution of process P is
A ➥ 5
B ➥ 6
C ➥ 3
D ➥ 4

Show Answer With Best Explanation

Answer: A
Explanation:


Q17➡
A process residing in main memory and ready and waiting for execution, is kept on
A ➥ Wait Queue
B ➥ Job Queue
C ➥ Execution Queue
D ➥ Ready Queue

Show Answer With Best Explanation

Answer: D
Explanation:


Q18➡
Which of the following statements is/are false?
P: The clean-room strategy to software engineering is based on the incremental software process model.
Q: The clean-room strategy to software engineering is one of the ways to overcome “unconscious” copying of copyrighted code.
Choose the correct answer from the code given below:
A ➥ Neither P and Q
B ➥ Both P and Q
C ➥ Q only
D ➥ P only

Show Answer With Best Explanation

Answer: A
Explanation:


Q19➡
Which of the following statements is/are true?
P: Software Re-engineering is preferable for software products having high failure rates, having poor design and/or having poor code structure
Q: Software Reverse Engineering is the process of analyzing software with the objective of recovering its design and requirement specification.
A ➥ Both P and Q
B ➥ Q only
C ➥ P only
D ➥ Neither P nor Q

Show Answer With Best Explanation

Answer: A
Explanation:


Q20➡
A ➥ (a)-(iv),(b)-(iii), (c)- (ii), (d)-(i)
B ➥ (a)-(iii),(b)-(iv), (c)- (i), (d)-(ii)
C ➥ (a)-(ii),(b)-(iii), (c)- (iv), (d)-(i)
D ➥ (a)-(iii),(b)-(iv), (c)- (ii), (d)-(i)

Show Answer With Best Explanation

Answer: D
Explanation:


Question 21➡ | Computer Network
Consider the following two statements:
S1: TCP handles both congestion and flow control
S2: UDP handles congestion but not flow control
Which of the following option is correct with respect to the above statements (S1) and (S2)?
i ➥ Both S1 and S2 are correct
ii ➥ Neither S1 nor S2 is correct
iii ➥ S1 is not correct but S2 is correct
iv ➥ S1 is correct but S2 is not correct

Show Answer With Best Explanation

Answer: IV

Explanation:
UDP Operation:
• Connectionless Services
• Unreliable Services
• No flow Control
• No Error Control Except Checksum
• No Congestion Control Protocol
• No retransmission
• UDP is a message-oriented protocol.

TCP Operation:
• Connection Oriented Services
• reliable Services
• flow Control
• Error Control
• Congestion Control Protocol
• Retransmission
• TCP is a byte-oriented protocol.

Statements S1: TCP handles both congestion and flow control(True)
Statements S2: UDP handles congestion but not flow control(False)

So, Option(IV) is correct.

More Discussion Explanation On YouTubeTCP UDP Protocol Help-Line

Q22➡
Consider the statements below :
“ There is a country that borders both India and Nepal. “
Which of the following represents the above sentence correctly ?
A ➥ ∃c Country(c) ∧ Border(c, India) ∧ Border(c, Nepal)
B ➥ ∃c Country(c) ⇒ [ Border(c, India) ∧ Border(c, Nepal)]
C ➥ ∃c Border(Country(c), India ∧ Nepal)
D ➥ [∃c Country(c)] ⇒ [Border(c,India) ∧ Border(c, Nepal)]

Show Answer With Best Explanation

Answer: A
Explanation:


Q23➡
Consider R to be any regular language and L1 .L2 be any two context-free languages
Which one of the following is correct ?
A ➥ L1 ⋂ L2 is context free
B ➥ L1 is context free
C ➥ L1 − R is context free
D ➥ (L1 ⋃ L2 ) − R is context free

Show Answer With Best Explanation

Answer: C
Explanation:


Q24➡
A ➥ (a)-(i), (b)-(ii), (c) -(iii), (d)-(iv)
B ➥ (a)-(iv), (b)-(iii), (c) -(ii), (d)-(i)
C ➥ (a)-(i), (b)-(iv), (c) -(iii), (d)-(ii)
D ➥ (a)-(iv), (b)-(i), (c) -(ii), (d)-(iii)

Show Answer With Best Explanation

Answer: D
Explanation:


Q25➡
Which of the following is not one of the principles of agile software development method ?
A ➥ Incremental delivery
B ➥ Customer involvement
C ➥ Embrace change
D ➥ Following the plan

Show Answer With Best Explanation

Answer:D
Explanation:


Q26➡
Consider a system with 2 level cache. Access times of Level 1, Level 2 cache and main memory are 0.5 ns, 5 ns and 100 ns respectively. The hit rates of Level1 and Level2 caches are 0.7 and 0.8 respectively. What is the average access time of the system ignoring the search time within cache?
A ➥ 24.35 ns
B ➥ 35.20 ns
C ➥ 7.55 ns
D ➥ 20.75 ns

Show Answer With Best Explanation

Answer:C
Explanation:


Q27➡
A Computer uses a memory unit with 256K word of 32 bits each. A binary instruction code is stored in one word of memory. The instruction has four parts: an indirect bit, an operation code and a register code part to specify one of 64 registers and an address part. How many bits are there in operation code, the register code part and the address part?
A ➥ 6,7,18
B ➥ 7,6,18
C ➥ 7,7,18
D ➥ 18,7,7

Show Answer With Best Explanation

Answer:B
Explanation:


Q28➡
An agent can improve its performance by
A ➥ Responding
B ➥ Observing
C ➥ Perceiving
D ➥ Learning

Show Answer With Best Explanation

Answer:D
Explanation:


Q29➡
In PERT/CPM , the merge event represents___________ of two or more events.
A ➥ Completion
B ➥ Splitting
C ➥ Joining
D ➥ Beginning

Show Answer With Best Explanation

Answer:A
Explanation:


Q30➡
Suppose a cloud contains software stack such as Operating system, Application software, etc. This model is referred as ______ model.
A ➥ IaaS
B ➥ PaaS
C ➥ SaaS
D ➥ MaaS

Show Answer With Best Explanation

Answer: C
Explanation:


Q31➡
In computers, Subtraction is generally carried out by.
A ➥ 9’s complement
B ➥ 10’s complement
C ➥ 1’s complement
D ➥ 2’s complement

Show Answer With Best Explanation

Answer:D
Explanation:


Q32➡
In Linux operating system environment _________ command is used to print a file.
A ➥ ptr
B ➥ print
C ➥ pr
D ➥ lpr

Show Answer With Best Explanation

Answer:D
Explanation:


Q33➡
Which of the following HTML5 codes will affect the horizontal as well as vertical alignment of the table content?
A ➥ < td style = “horizontal − align : center; vertical − align:middle;”> BASH </ td >
B ➥ < td align = “middle” valign = ” center” > BASH < /td >
C ➥ < td style = ” text − align : center; vertical − align : middle; ” > BASH < / td >
D ➥ < td halign = ” middle” valign = ” center” > BASH < / td >

Show Answer With Best Explanation

Answer:C
Explanation:


Q34➡
Dirty bit is used to show the
A ➥ Page with corrupted data
B ➥ Page that is modified after being loaded into cache memory
C ➥ Page with low frequency occurrence
D ➥ Wrong page

Show Answer With Best Explanation

Answer:B
Explanation:


Question 35➡ | Computer Network
Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a web page from a remote server, assuming that the host has been restarted.
i ➥ HTTP GET request, DNS query, TCP SYN
ii ➥ DNS query, TCP SYN, HTTP GET request
iii ➥ TCP SYN, DNS query, HTTP GET request
iv ➥ DNS query, HTTP Get request, TCP SYN

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTCP Help-Line

Q36➡
Consider the following postfix expression with single digit operands :
6 2 3 * / 4 2 * + 6 8 * –
The top two elements of the stack after second * is evaluated, are :
A ➥ 6, 2
B ➥ 8, 2
C ➥ 8, 1
D ➥ 6, 3

Show Answer With Best Explanation

Answer: C
Explanation:


Q37➡
_______ command is used to remove a relation from an SQL database
A ➥ Remove table
B ➥ Update table
C ➥ Drop table
D ➥ Delete table

Show Answer With Best Explanation

Answer:C
Explanation:


Q38➡
If a graph (G) has no loops or parallel edges and if the number of vertices(n) in the graph is n≥3, then the graph G is Hamiltonian if.
(i) deg(v) ≥n/3 for each vertex v
(ii) deg(v) + deg(w) ≥ n whenever v and w are not connected by an edge.
(iii) E (G) ≥ 1/3 (n − 1 )(n − 2 ) + 2
A ➥ ii) and (iii) only
B ➥ (ii) only
C ➥ (iii) only
D ➥ (i) and (iii) only

Show Answer With Best Explanation

Answer:B
Explanation:


Q39➡
Consider the following boolean equations :
(i). wx + w(x + y) + x(x + y)=x+wy
(ii). (wx’(y+xz’)+w’x’)y=x’y
What can you say about the above equations ?
A ➥ (i) is false and (ii) is true
B ➥ (i) is true and (ii) is false
C ➥ Both (i) and (ii) are false
D ➥ Both (i) and (ii) are true

Show Answer With Best Explanation

Answer:D
Explanation:


Q40➡
Data Scrubbing is ?
A ➥ A process to upgrade the quality of data before it is moved into a data warehouse
B ➥ A process to reject data from the data warehouse and to create necessary indexes.
C ➥ A process to lead the data in the warehouse and to create the necessary indexes.
D ➥ A process to upgrade the quality of data after it is moved into a data warehouse

Show Answer With Best Explanation

Answer: A
Explanation:


Q41➡
Consider a disk pack with 32 surfaces, 64 tracks and 512 sectors per pack. 256 bytes of data are stored in a bit serial manner in a sector. The number of bits required to specify a particular sector in the disk is
A ➥ 18
B ➥ 22
C ➥ 19
D ➥ 20

Show Answer With Best Explanation

Answer:D
Explanation:


Q42➡
Consider the following statements
S1: A heuristic is admissible if it never overestimates the cost to reach the goal
S2: A heuristic is monotonous if it follows triangle inequality property.
Which one of the following is true referencing the above statements?
A ➥ Both the statements S1 and S2 are true.
B ➥ Neither of the statements S1 and S2 are true
C ➥ Statement S1 is false but statement S2 is true.
D ➥ Statement S1 is true but statement S2 is false.

Show Answer With Best Explanation

Answer:A
Explanation:


Q43➡
The grammar S ⟶ (S) | SS | ∈ is not suitable for predictive parsing because the grammar is
A ➥ Ambiguous
B ➥ Left Recursive
C ➥ Right Recursive
D ➥ An Operator Grammar

Show Answer With Best Explanation

Answer:A
Explanation:


Q44➡
Consider the following two languages:
L 1 = {x | for some y with | y| = 2 |x| ,xy∈ L and L is regular language}
L 2 = { x | for some y such that |x| = |y|, xy∈ L and L is regular language}
Which one of the following is correct?
A ➥ Both L 1 and L 2 are regular languages
B ➥ Both L 1 and L 2 are not regular languages
C ➥ Only L 2 is regular language
D ➥ Only L 1 is regular language

Show Answer With Best Explanation

Answer:A
Explanation:


Q45➡
Consider the following statements :
(i) Auto increment addressing mode is useful in creating self-relocating code.
(ii) If auto addressing mode is included in an instruction set architecture, then an additional ALU is required for effective address calculation.
(iii) In auto increment addressing mode, the amount of increment depends on the size of the data item accessed.
Which of the above statements is/are true ?
Choose the Correct answer from the code given below:
Code:
A ➥ (ii) and (iii) only
B ➥ (i) and (ii) only
C ➥ iii) only
D ➥ (ii) only

Show Answer With Best Explanation

Answer:C
Explanation:


Q46➡
Consider the vocabulary with only four propositions A,B,C and D. How many models are there for the following sentence?
( ⌐ A ∨ ⌐ B ∨ ⌐ C ∨ ⌐ D)
A ➥ 7
B ➥ 8
C ➥ 16
D ➥ 15

Show Answer With Best Explanation

Answer:D
Explanation:


Q47➡
Consider the following statements related to AND-OR Search algorithm.
S 1 : A solution is a sub tree that has a goal node at every leaf.
S 2 : OR nodes are analogous to the branching in a deterministic environment
S 3 : AND nodes are analogous to the branching in a non-deterministic environment.
Which one of the following is true referencing the above statements?
Choose the correct answer from the code given below:
A ➥ S1- True, S2- True, S3- True
B ➥ S1- False, S2- True, S3- True
C ➥ S1- True, S2- True, S3- False
D ➥ S1- False, S2- True, S3- False

Show Answer With Best Explanation

Answer:A
Explanation:


Question 48➡ | Computer Network
Consider ISO-OSI network architecture reference model. Session layer of this model offer Dialog control, token management and __ as services.
i ➥ Synchronization
ii ➥ Asynchronization
iii ➥ Errors
iv ➥ Flow control

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeISO OSI Model Help-Line

Q49➡
A ➥ 17
B ➥ 13
C ➥ 16
D ➥ 14

Show Answer With Best Explanation

Answer:C
Explanation:


Q50➡ | Computer Graphics
In 3D Graphics, which of the following statement/s is/are true ?
P: Back-face culling is an example of an image-precision visible-surface determination.
Q: Z-Buffer is a 16-bit, 32-bit, or 64-bit field associated with each pixel in a frame buffer that can be used to determine the visible surface at each pixel.
i ➥ P only
ii ➥ Neither P nor Q
iii ➥ P and Q
iv ➥ Q only

Show Answer With Best Explanation

Answer: D
Explanation:


Q51➡
Consider the following recursive Java function f that takes two long arguments and returns a float value :
public static float f(long m, long n)
{
float result = (float) m / (float) n;
if (m < 0 || n < 0)
return 0⋅0f;
else
result += f(m2, n3);
result result;
}
Which of the following integers best approximates the value of f(2,3) ?
A ➥ 0
B ➥ 2
C ➥ 1
D ➥ 3

Show Answer With Best Explanation

Answer: B
Explanation:


Q52➡
The solution of recurrence relation : T(n)=2T(sqrt(n))+lg(n) is .
A ➥ O(lg (n) lg(lg(n)))
B ➥ O(lg (n))
C ➥ O(lg (n) lg(n))
D ➥ O(n lg (n))

Show Answer With Best Explanation

Answer:A
Explanation:


Q53➡
The Boolean expression A’⋅B+A.B’+A.B is equivalent to
A ➥ (A+B)’
B ➥ A.B
C ➥ A+B
D ➥ A’.B

Show Answer With Best Explanation

Answer:C
Explanation:


Q54➡
The clustering index is defined on the fields which are of type
A ➥ non-key and ordering
B ➥ key and non-ordering
C ➥ key and ordering
D ➥ non-key and non-ordering

Show Answer With Best Explanation

Answer:A
Explanation:


Q55➡
___________System call creates new process in Unix.
A ➥ Create new
B ➥ Fork
C ➥ Fork new
D ➥ Create

Show Answer With Best Explanation

Answer:B
Explanation:


Q56➡
Software coupling involves dependencies among pieces of software called modules. Which of the following are correct statements with respect to module coupling?
P: Common Coupling occurs when two modules share the same global data
Q: control Coupling occur when modules share a composite data structure and use only part of it.
R: Content coupling occurs when one module modifies or relies on the internal working of another module.

Choose the correct answer from the code given below:
A ➥ P and R only
B ➥ Q and R only
C ➥ P and Q only
D ➥ All of P,Q and R

Show Answer With Best Explanation

Answer: A
Explanation:


Q57➡
Suppose a system has 12 instances of some resources with n processes competing for that resource. Each process may require 4 instances of the resource. The maximum value of n for which the system never enters into deadlock is
A ➥ 6
B ➥ 5
C ➥ 4
D ➥ 3

Show Answer With Best Explanation

Answer:D
Explanation:


Q58➡
Consider the following Grammar G :
S ➝ A | B
A➝ a | c
B➝ b | c
Where {S,A,B} is the set of non-terminals, {a,b,c} is the set of terminals.
Which of the following statement(s) is/are correct ?
S 1 : LR(1) can parse all strings that are generated using grammar G.
S 2 : LL(1) can parse all strings that are generated using grammar G.
A ➥ Only S 1
B ➥ Only S 2
C ➥ Both S 1 and S 2
D ➥ Neither S 1 nor S 2

Show Answer With Best Explanation

Answer: D
Explanation:


Q59➡
The Software Requirement Specification(SRS) is said to be _ if and only if no subset of individual requirements described in it conflict with each other.
A ➥ Consistent
B ➥ Verifiable
C ➥ Correct
D ➥ Unambiguous

Show Answer With Best Explanation

Answer: A
Explanation:


Q60➡
Software products need perfective maintenance for which of the following reasons?
A ➥ To support the new features that users want it to support
B ➥ To overcome wear and tear caused by the repeated use of the software.
C ➥ When the customers need the product to run on new platforms
D ➥ To rectify bugs observed while the system is in use.

Show Answer With Best Explanation

Answer: A
Explanation:


Q61➡
In mathematical logic, which of the following are statements ?
(i) There will be snow in January.
(ii) What is the time now ?
(iii) Today is Sunday.
(iv) You must study Discrete Mathematics.
Choose the correct answer from the code given below:
Code:
A ➥ (ii) and (iv)
B ➥ (i) and (ii)
C ➥ (iii) and (iv)
D ➥ (i) and (iii)

Show Answer With Best Explanation

Answer: D
Explanation:


Question 62➡ | Computer Network
Which of the following statement/s is/are true?
(i) Firewall can screen traffic going into or out of an organization.
(ii) Virtual private networks cam simulate an old leased network to provide certain desirable properties.
Choose the correct answer from the code given below:
i ➥ A) (i) only
ii ➥ B) Neither (i) nor(ii)
iii ➥ C) Both (i) and (ii)
iv ➥ D) (ii) only

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFirewall Help-Line

Q63➡
The third generation mobile phone are digital and based on.
A ➥ Broadband CDMA
B ➥ CDMA
C ➥ D-AMPS
D ➥ AMPS

Show Answer With Best Explanation

Answer: A
Explanation:


Q64➡
Consider the following set of processes and the length of CPU burst time given in milliseconds:

Assume that processes being scheduled with Round-Robin Scheduling Algorithm with Time Quantum 4ms. Then The waiting time for P4 is _ ms.
A ➥ 6
B ➥ 12
C ➥ 4
D ➥ 0

Show Answer With Best Explanation

Answer: B
Explanation:


Q65➡
Consider the following sequence of two transactions on a bank account(A) with initial balance 20,000 that transfers 5,000 to another account (B) and then apply 10% interest.
(i) T1 start
(ii) T1 A old=20000 new 15,000
(iii) T1 B old=12000 new=17000
(iv) T1 commit
(v) T2 start
(vi) T2 A old=15000 new=16500
(vii) T2 commit
Suppose the database system crashes out just before log record (vii) is written. When the system is restricted, which one statement is true of the recovery process ?
A ➥ We must undo log record (vi) to set A to 16,500 and then redo log record (ii) and (iii).
B ➥ We need not redo records (ii) and (iii) because transaction T1 has committed.
C ➥ We must redo log record (vi) to set A to 16,500.
D ➥ We can apply redo and undo operation in arbitrary order because they are idempotent.

Show Answer With Best Explanation

Answer: A
Explanation:


Q66➡
Which of the following statements are true ?
(i) Every logic network is equivalent to one using just NAND gates or just NOR gates.
(ii) Boolean expressions and logic networks correspond to labelled acyclic digraphs.
(iii) No two Boolean algebras with n atoms are isomorphic.
(iv) Non-zero elements of finite Boolean algebras are not uniquely expressible as joins of atoms.
Choose the correct answer from the code given below:
CODE:
A ➥ (ii), (iii) and (iv) only
B ➥ (i), (ii) and (iii) only
C ➥ (i) and (iv) only
D ➥ (i) and (ii) only

Show Answer With Best Explanation

Answer: D
Explanation:


Q67➡
Which of the following statement/s is/are true ?
(i) Facebook has the world’s largest Hadoop cluster.
(ii) Hadoop 2.0 allows live stream processing of real time data
A ➥ Both (i) and (ii)
B ➥ (i) only
C ➥ (ii) only
D ➥ Neither (i) nor (ii)

Show Answer With Best Explanation

Answer: A
Explanation:


Q68➡
Consider the following pseudo-code fragment, where m is a non-negative integer that has been initialized:
p=0;
k=0;
while(k < m)
p = p + 2k;
k=k+1;
end while
Which of the following is a loop invariant for the while statement?
(Note: a loop variant for a while statement is an assertion that is true each time guard is evaluated during the execution of the while statement).
A ➥ p = 2k − 1 and 0≤k≤m
B ➥ p = 2k+1 − 1 and 0≤k≤m
C ➥ p = 2k+1 − 1 and 0≤k < m
D ➥ p = 2k − 1 and 0≤k < m

Show Answer With Best Explanation

Answer: A
Explanation:


Q35➡ | Computer Network
The host is connected to a department network which is a part of a university network. The university network, in turn, is part of the internet. The largest network, in which the Ethernet address of the host is unique, is
i ➥ The university network
ii ➥ The internet
iii ➥ The subnet to which the host belongs
iv ➥ The department network

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetworking Basic ConceptHelp-Line

Q70➡
A ➥ 6
B ➥ 5
C ➥ 4
D ➥ 3

Show Answer With Best Explanation

Answer: B
Explanation:


Q71➡
The elements 42, 25, 30, 40, 22, 35, 26 are inserted one by one in the given order into a max-heap. The resultant max-heap is stored in an array implementation as
A ➥ <42, 40, 35, 25, 22, 30, 26>
B ➥ <42, 35, 40, 22, 25, 30, 26>
C ➥ <42, 35, 40, 22, 25, 26, 30>
D ➥ <42, 40, 35, 25, 22, 26, 30>

Show Answer With Best Explanation

Answer: A
Explanation:


Q72➡
A ➥ AB’
B ➥ A’B’
C ➥ AB
D ➥ A’B’

Show Answer With Best Explanation

Answer: C
Explanation:

Q73➡

Which statements are true ?
P: For a line with slope m>1, we should change the outer loop in line (4) to be over y.
Q: Lines (10) and (12) update the decision variable d through an incremental evaluation of the line equation f.
R: The algorithm fails if d is ever 0.
Choose the correct answer from the code given below:
Code:

A ➥ P and Q only
B ➥ P,Q and R
C ➥ Q and R only
D ➥ P only

Show Answer With Best Explanation

Answer: A
Explanation:


Q74➡ | Computer Network
Suppose that everyone in a group of N people wants to communicate secretly with (N-1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
i ➥ 2N
ii ➥ N(N-1)
iii ➥ N(N-1)/2
iv ➥ (N-1) 2

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Miscellaneous Topic Help-Line

Q75➡
An attribute A of data type varchar(20) has the value ‘xyz’ and attribute B of data type char(20) has the value “Imnop” , then the attribute A has spaces and attribute B has spaces.
A ➥ 3, 5
B ➥ 20, 5
C ➥ 20 , 20
D ➥ 3 ,20

Show Answer With Best Explanation

Answer:D
Explanation:


Q76➡
Consider the C/C++ function f() given below:
void f(char w [ ] )
{
int x = strlen(w); //length of a string
char c;
For (int i = 0; i < x; i++)
{
c = w[i];
w[i] = w[x – i – 1];
w[x – i – 1] = c;
}
}
Which of the following is the purpose of f() ?
A ➥ It outputs the contents of the array in the original order.
B ➥ It output the contents of the array with the characters shifted over by one position.
C ➥ It outputs the contents of the array in the reverse order.
D ➥ It output the content of the array with the characters rearranged so they are no longer recognized a the words in the original phrase.

Show Answer With Best Explanation

Answer: A
Explanation:


Q77➡
The relation ≤ and < on a boolean algebra are defined as : x ≤ y and only if x ∨ y = y x < y means x ≤ y but x ≠ y x ≥ y means y ≤ x and x > y means y <x
Consider the above definitions, which of the following is not true in the boolean algebra ?
(i)If x ≤ y and y ≤ z, then x ≤ z
(ii)If x ≤ y and y ≤ x, then x=y
(iii)If x < y and y < z, then x ≤ y
(iv)If x < y and y < z, then x < y
Choose the correct answer from the code given below:
Code:
A ➥ (ii) and (iii) only
B ➥ (i) and (ii) only
C ➥ (iv) only
D ➥ (iii) only

Show Answer With Best Explanation

Answer:D
Explanation:


Q78➡
The K-coloring of an undirected graph G=(V,E) is a function
C: V➝{0,1,……,K-1} such that c(u)≠c(v) for every edge (u,v) ∈ E
Which of the following is not correct?
A ➥ G is 2-colorable
B ➥ G has no cycles of odd length
C ➥ G is bipartite
D ➥ G has cycle of odd length

Show Answer With Best Explanation

Answer:D
Explanation:


Q79➡
Data warehouse contains___________ data that is never found in operational environment.
A ➥ Summary
B ➥ Encrypted
C ➥ Encoded
D ➥ Scripted

Show Answer With Best Explanation

Answer: A
Explanation:


Q80➡
A ➥ (a)-(i), (b)-(ii), (c)-(iv), (d)-(iii)
B ➥ (a)-(i), (b)-(iii), (c)-(iv), (d)-(ii)
C ➥ (a)-(ii), (b)-(iii), (c)-(iv), (d)-(i)
D ➥ (a)-(iii), (b)-(ii), (c)-(iv), (d)-(i)

Show Answer With Best Explanation

Answer: C
Explanation:


Q81➡
A legacy software system has 940 modules. The latest release require that 90 of these modules be changed. In addition, 40 new modules were added and 12 old modules were removed. Compute the software maturity index for the system.
A ➥ 0.524
B ➥ 0.923
C ➥ 0.725
D ➥ 0.849

Show Answer With Best Explanation

Answer:D
Explanation:


Q82➡
A ➥ (a)-(iii), (b)-(i), (c)-(iv), (d)-(ii)
B ➥ (a)-(iii), (b)-(i), (c)-(ii), (d)-(iv)
C ➥ (a)-(i), (b)-(iii), (c)-(iv), (d)-(ii)
D ➥ (a)-(i), (b)-(iii), (c)-(ii), (d)-(iv)

Show Answer With Best Explanation

Answer: B
Explanation:


Q83➡
What does the following java function perform ? (Assume int occupies four bytes of storage)
public static int f(int a)
{
//Pre-conditions : a>0 and no overflow/underflow occurs
int b=0;
for(int i=0; i<32; i++) {
b=b <<1;
b= b | (a & 1);
a = a >>> 1; // This is a logical shift
}
Return b;
}
A ➥ Return the int that represents the number of 1’s in the binary representation of integer a.
B ➥ Return the int that represents the number of 0’s in the binary representation of integer a.
C ➥ Return the int that has the binary representation of integer a.
D ➥ Return the int that has the reversed binary representation of integer a.

Show Answer With Best Explanation

Answer:D
Explanation:


Q84➡
Consider two sequences X and Y :
X = <0,1,2,1,3,0,1 >
Y = <1,3,2,0,1,0 >
The length of longest common subsequence between X and Y is
A ➥ 5
B ➥ 4
C ➥ 3
D ➥ 2

Show Answer With Best Explanation

Answer: B
Explanation:


Q85➡
The second smallest of n elements can be found with ______ comparisons in worst case.
A ➥ 3n/2
B ➥ n-1
C ➥ lg n
D ➥ n + ceil(lg n) -2

Show Answer With Best Explanation

Answer:D
Explanation:


Q86➡
Consider the following x86 – assembly language instructions :
MOV AL, 153
NEG AL

The contents of the destination register AL (in 8-bit binary notation), the status of Carry Flag(CF) and Sign Flag(SF) after the execution of above instructions, are
A ➥ AL = 0110 0111; CF = 0; SF =1
B ➥ AL = 0110 0110; CF = 0; SF =0
C ➥ AL = 0110 0111; CF = 1; SF =0
D ➥ AL = 0110 0110; CF = 1; SF =1

Show Answer With Best Explanation

Answer: B
Explanation:


Q87➡
A box contains six red balls and four green balls. Four balls are selected at random from the box. What is the probability that two of the selected balls will be red and two will be green ?
A ➥ 3/7
B ➥ 1/9
C ➥ 1/35
D ➥ 1/14

Show Answer With Best Explanation

Answer: A
Explanation:


Q88➡
let r= a(a + b)*, s=aa*b and t=a*b be three regular expressions. Consider the following:
(i) L(s) ⊆ L(r) and L(s) ⊆ L(t)
(ii). L(r) ⊆ L(s) and L(s) ⊆ L(t)
Choose the correct answer from the code given below:
Code:
A ➥ Neither (i) nor (ii) is correct
B ➥ Only (i) is correct
C ➥ Only (ii) is correct
D ➥ Both (i) and (ii) are correct

Show Answer With Best Explanation

Answer: A
Explanation:


Q89➡
A binary search tree is constructed by inserting the following numbers in order:
60, 25, 72, 15, 30, 68, 101, 13, 18, 47, 70, 34
The number of nodes is the left subtree is.
A ➥ 3
B ➥ 5
C ➥ 7
D ➥ 6

Show Answer With Best Explanation

Answer: C
Explanation:


Q90➡
To overcome difficulties in Readers-Writers problem, which of the following statement/s is/are true?
i) Writers are given exclusive access to shared objects
ii) Readers are given exclusive access to shared objects
iii) Both readers and writers are given exclusive access to shared objects.
Choose the correct answer from the code given below:
A ➥ (ii) only
B ➥ (i) only
C ➥ (i) only
D ➥ Both (ii)&(iii)

Show Answer With Best Explanation

Answer: B
Explanation:


Q91➡
A ➥ (a)-(iv), (b)-(i), (c) -(ii), (d)-(iii)
B ➥ (a)-(i), (b)-(iv), (c) -(ii), (d)-(iii)
C ➥ (a)-(iv), (b)-(ii), (c) -(i), (d)-(iii)
D ➥ (a)-(i), (b)-(iv), (c) -(iii), (d)-(ii)

Show Answer With Best Explanation

Answer: A
Explanation:


Q92➡
The decimal floating point number -40.1 represented using IEEE-754 32-bit representation and written in hexadecimal form is
A ➥ 0xC2206666
B ➥ 0xC2006000
C ➥ 0xC2006666
D ➥ 0xC2206000

Show Answer With Best Explanation

Answer: A
Explanation:


Q93➡
In a ternary tree, the number of internal nodes of degree 1,2 and 3 is 4,3 and 3 respectively. The number of leaf nodes in the ternary tree is
A ➥ 9
B ➥ 10
C ➥ 11
D ➥ 12

Show Answer With Best Explanation

Answer: B
Explanation:


Q94➡
A ➥ 2
B ➥ 3
C ➥ 1
D ➥ 0

Show Answer With Best Explanation

Answer: A
Explanation:


Q95➡
Which of the following problem is decidable for recursive language (L) ?
A ➥ Is w∈L, where w is a string ?
B ➥ Is L=R, where R is given regular set ?
C ➥ Is L = Σ* ?
D ➥ Is L = ф ?

Show Answer With Best Explanation

Answer: A
Explanation:


Q96➡
Consider the singly linked list. What is the worst case time complexity of the best-known algorithm to delete the node a, pointer to this node is q, from the list ?
A ➥ O(n)
B ➥ O(n lg n)
C ➥ O(lg n)
D ➥ O(1)

Show Answer With Best Explanation

Answer: A
Explanation:


Q97➡ | Computer Network
Which of the following statement/s is/are true ?
(i) windows XP supports both peer-peer and client-server networks.
(ii) Windows XP implements Transport protocols as drivers that can be loaded and uploaded from the system dynamically.
i ➥ Both (i) and (ii)
ii ➥ Neither (i) nor (ii)
iii ➥ (ii) only
iv ➥ (i) only

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMiscellaneous Topic Help-Line

Q98➡
Consider the schema R=(A, B, C, D, E, F) on which the following functional dependencies hold :
A➝B
B,C➝D
E➝C
D➝A
What are the candidate keys of R ?
A ➥ AE and BE
B ➥ AE, BE and DE
C ➥ AEF, BEF and BCF
D ➥ AEF, BEF and DEF

Show Answer With Best Explanation

Answer: D
Explanation:


Q99➡
The four byte IP Address consists of
A ➥ Host Address
B ➥ Both Network and Host Address
C ➥ AEF, BEF and BCF
D ➥ Neither network nor Host Address

Show Answer With Best Explanation

Answer: B
Explanation:


Q100➡
A ➥ Both S1 and S2 are true
B ➥ Only S2 is true
C ➥ Only S1 is true
D ➥ Neither S1 nor S2 is true

Show Answer With Best Explanation

Answer: C
Explanation:


error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?