UGC NET CSA DEC 2015 Paper 3

UUGC NET CSA DEC 2015 Paper 3

Q1➡ |
The three outputs x1x2x3 from the 8 X 3 priority encoder are used to provide a vector address of the form 101x1x2x300. What is the second highest priority vector address in hexadecimal if the vector addresses are starting from the one with the highest priority ?
i ➥ BC
ii ➥ A4
iii ➥ BD
iv ➥ AC

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q2➡ |
What will be the output at PORT1 if the following program is executed ?
MVI B, 82H
MOV A, B
MOV C, A
MVI D, 37H
OUT PORT1
HLT
i ➥ 37H
ii ➥ 82H
iii ➥ B9H
iv ➥ 00H

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q3➡ |
Which of the following 8085 microprocessor hardware interrupt has the lowest priority?
i ➥ RST 6.5
ii ➥ RST 7.5
iii ➥ TRAP
iv ➥ INTR

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q4➡ |
A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 nsec and a memory cycle requires 250 nsec. What percentage of memory’s total operating time is required for refreshes?
i ➥ 0.64
ii ➥ 0.96
iii ➥ 2.00
iv ➥ 0.32

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q5➡ |
A DMA controller transfers 32-bit words to memory using cycle stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average rate of one million instructions per second. By how much will the CPU be slowed down because of the DMA transfer?
i ➥ 0.6%
ii ➥ 0.12%
iii ➥ 1.2%
iv ➥ 2.5%

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q6➡ |
A CPU handles interrupt by executing interrupt service subroutine ________.
i ➥ by checking interrupt register after execution of each instruction
ii ➥ by checking interrupt register at the end of the fetch cycle
iii ➥ whenever an interrupt is registered
iv ➥ by checking interrupt register at regular time interval

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q7➡ |
Given the following set of prolog clauses :
father(X, Y) :
parent(X, Y),
male(X),
parent(Sally, Bob),
parent(Jim, Bob),
parent(Alice, Jane),
parent(Thomas, Jane),
male(Bob),
male(Jim),
female(Salley),
female(Alice).
How many atoms are matched to the variable ‘X’ before the query father(X, Jane) reports a Result ?
i ➥ 1
ii ➥ 2
iii ➥ 3
iv ➥ 4

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q8➡ |
Forward chaining systems are ________ where as backward chaining systems are ________.
i ➥ Data driven, Data driven
ii ➥ Goal driven, Data driven
iii ➥ Data driven, Goal driven
iv ➥ Goal driven, Goal driven

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q9➡ |
Match the following w.r.t. programming language:
i ➥ (a)-(iii), (b)-(i), (c)-(ii), (d)-(iv)
ii ➥ (a)-(i), (b)-(iii), (c)-(ii), (d)-(iv)
iii ➥ (a)-(i), (b)-(iii), (c)-(iv), (d)-(ii)
iv ➥ (a)-(ii), (b)-(iv), (c)-(i), (d)-(iii)

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q10➡ |
The combination of an IP address and a port number is known as _______.
i ➥ network number
ii ➥ socket address
iii ➥ subnet mask number
iv ➥ MAC address

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q11➡ |
A network with a bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network?
i ➥ 2 Mbps
ii ➥ 60 Mbps
iii ➥ 120 Mbps
iv ➥ 10 Mbps

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q12➡ |
Consider a subnet with 720 routers. If a three-level hierarchy is chosen with eight clusters, each containing 9 regions of 10 routers, then the total number of entries in the routing table is _______.
i ➥ 25
ii ➥ 27
iii ➥ 53
iv ➥ 72

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q13➡ |
In a classful addressing, the IP addresses with 0 (zero) as network number :
i ➥ refers to the current network
ii ➥ refers to broadcast on the local network
iii ➥ refers to broadcast on a distant network
iv ➥ refers to loopback testing

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q14➡ |
In electronic mail, which of the following protocols allows the transfer of multimedia messages?
i ➥ IMAP
ii ➥ SMTP
iii ➥ POP3
iv ➥ MIME

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q15➡ |
A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ?
i ➥ 50
ii ➥ 200
iii ➥ 400
iv ➥ 800

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q16➡ |
In Activity – Selection problem, each activity ai has a start time si and a finish time fi where si ≤ fi. Activities ai and aj are compatible if:
i ➥ si ≥ fj
ii ➥ sj ≥ fi
iii ➥ si ≥ fj or sj ≥ fi
iv ➥ si ≥ fj and sj ≥ fi

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q17➡ |
Given two sequences X and Y :
X = < a, b, c, b, d, a, b >
Y = < b, d, c, a, b, a >
The longest common subsequence of X and Y is :
i ➥ < b, c, a >
ii ➥ < c, a, b >
iii ➥ < b, c, a, a >
iv ➥ < b, c, b, a >

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q18➡ |
If there are n integers to sort, each integer has d digits and each digit is in the set {1, 2, …, k}, radix sort can sort the numbers in :
i ➥ O(d n k)
ii ➥ O(d nk)
iii ➥ O((d +n) k)
iv ➥ O(d (n + k))

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q19➡ |
The solution of the recurrence relation
i ➥ O(lg n)
ii ➥ O(n)
iii ➥ O(n lg n)
iv ➥ None of the above

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q20➡ |
Floyd-Warshall algorithm utilizes _______ to solve the all-pairs shortest paths problem on a directed graph in _______ time.
i ➥ Greedy algorithm, θ (V3)
ii ➥ Greedy algorithm, θ (V2 lgn)
iii ➥ Dynamic programming, θ (V3)
iv ➥ Dynamic programming, θ (V2 lgn)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q21➡ |
Let n = 4 and (a1, a2, a3, a4) = (do, if, int, while). Let p(1 : 4) = (3/8, 3/8, 1/8, 1/8) and Let q(0 : 4) = (2/8, 3/8, 1/8, 1/8, 1/8) where p(i) and q(i) denotes the probability with which we search ai and the identifier x being searched satisfy ai < x < ai+1 respectively. The optimal search tree is given by:
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q22➡ |
The family of context sensitive languages is _______ under union and _______ under reversal.
i ➥ closed, not closed
ii ➥ not closed, not closed
iii ➥ closed, closed
iv ➥ not closed, closed

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q23➡ |
Match the following:
Net december 2015 toc questionMatch the following: A (a)-(i), (b)-(ii), (c)-(iii), (d)-(iv) B (a)-(i), (b)-(ii), (c)-(iv), (d)-(iii) C (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i) D (a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
i ➥ (a)-(i), (b)-(ii), (c)-(iii), (d)-(iv)
ii ➥ (a)-(i), (b)-(ii), (c)-(iv), (d)-(iii)
iii ➥ (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
iv ➥ (a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q24➡ |
The language of all non-null strings of a’s can be defined by a context free grammar as follows: S → aS|Sa|a The word a3 can be generated by ______ different trees.
i ➥ two
ii ➥ three
iii ➥ four
iv ➥ five

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q25➡ |
Which one of the following non-functional quality attributes is not highly affected by the architecture of the software?
i ➥ Performance
ii ➥ Reliability
iii ➥ Usability
iv ➥ Portability

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q26➡ |
The context free grammar given by
S → XYX
X → aX|bX|λ
Y → bbb
generates the language which is defined by regular expression:
i ➥ (a + b)*bbb
ii ➥ abbb(a + b)*
iii ➥ (a + b)*(bbb)(a + b)*
iv ➥ (a + b)(bbb)(a + b)*

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
There are exactly _______ different finite automata with three states x, y and z over the alphabet {a, b} where x is always the start state.
i ➥ 64
ii ➥ 56
iii ➥ 1024
iv ➥ 5832

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q28➡ |
Given the following two languages: L1 = {an b an |n > 0} L2 = {an b an bn + 1|n > 0} Which of the following is correct ?
i ➥ L1 is context free language and L2 is not context free language
ii ➥ L1 is not context free language and L2 is context free language
iii ➥ Both L1 and L2 are context free languages
iv ➥ Both L1 and L2 are not context free languages

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q29➡ |
Which of the following is used to make an Abstract class?
i ➥ Making at least one member function as pure virtual functions
ii ➥ Making at least one member function as virtual function
iii ➥ Declaring as Abstract class using virtual keyword
iv ➥ Declaring as Abstract class using static keyword

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q30➡ |
Match the following with reference to object oriented modelling:
i ➥ (a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
ii ➥ (a)-(iii), (b)-(iv), (c)-(i), (d)-(ii)
iii ➥ (a)-(iii), (b)-(i), (c)-(ii), (d)-(iv)
iv ➥ (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q31➡ |
In CRC based design, a CRC Team consists of:
(a)one or two users representatives
(b)several programmers
(c)project coordinators
(d)one or two system analysts
i ➥ (a) and (c)
ii ➥ (a), (b), (c) and (d)
iii ➥ (a), (c) and (d)
iv ➥ (a), (b) and (d)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q32➡ |
The end points of a given line are (0, 0) and (6, 18). Compute each value of y as x steps from 0 to 3, by using equation of straight line:
i ➥ For x = 0, y = 0; x = 1, y = 3; x = 2, y = 6; x = 3, y = 9
ii ➥ For x = 0, y = 1; x = 1, y = 3; x = 2, y = 4; x = 3, y = 9
iii ➥ For x = 0, y = 2; x = 1, y = 3; x = 2, y = 6; x = 3, y = 9
iv ➥ For x = 0, y = 0; x = 1, y = 3; x = 2, y = 4; x = 3, y = 6

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q33➡ |
Which of the following graphic primitives are considered as the basic building blocks of computer graphics ?
(a)Points
(b)Lines
(c)Polylines
(d)Polygons
i ➥ (a) only
ii ➥ (a) and (b)
iii ➥ (a), (b) and (c)
iv ➥ (a), (b), (c) and (d)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q34➡ |
Javascript and Java has similar name because ______ is/are true.
(a)Javascripts syntax is loosely based on Java’s syntax
(b)Javascript is stripped down version of Java
(c)Java and Javascript are originated from the Island of Java
i ➥ (a) only
ii ➥ (a), (b) and (c)
iii ➥ (a) and (b)
iv ➥ (a) and (c)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q35➡ |
Which of the following statements are true with reference to the way of describing XML data?
(a)XML uses DTD to describe the data
(b)XML uses XSL to describe the data
(c)XML uses a description node to describe the data
i ➥ (a) only
ii ➥ (b) only
iii ➥ (a) and (b)
iv ➥ (a) and (c)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q36➡ |
Which of the following is/are correct with reference to Abstract class and interface ?
(a)A class can inherit only one Abstract class but may inherit several interfaces.
(b)An Abstract class can provide complete and default code but an interface has no code.
i ➥ (a) is true
ii ➥ (b) is true
iii ➥ Both (a) and (b) are true
iv ➥ Neither (a) nor (b) is true

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q37➡ |
Match the following with respect to various memory management algorithms:
i ➥ (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)
ii ➥ (a)-(ii), (b)-(iii), (c)-(i), (d)-(iv)
iii ➥ (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
iv ➥ (a)-(ii), (b)-(iii), (c)-(iv), (d)-(i)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q38➡ |
Function of memory management unit is:
i ➥ Address translation
ii ➥ Memory allocation
iii ➥ Cache management
iv ➥ All of the above

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q39➡ |
Consider a system with twelve magnetic tape drives and three processes P1, P2 and P3. Process P1 requires maximum ten tape drives, process P2 may need as many as four tape drives and P3 may need up to nine tape drives. Suppose that at time t1, process P1 is holding five tape drives, process P2 is holding two tape drives and process P3 is holding three tape drives. At time t1, system is in:
i ➥ safe state
ii ➥ unsafe state
iii ➥ deadlocked state
iv ➥ starvation state

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q40➡ |
In Unix operating system, special files are used to:
i ➥ buffer data received in its input from where a process reads
ii ➥ provide a mechanism to map physical device to file names
iii ➥ store list of file names plus pointers associated with i-nodes
iv ➥ store information entered by a user application program or utility program

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q41➡ |
Match the following in Unix file system:
i ➥ (a)-(iv), (b)-(i), (c)-(ii), (d)-(iii)
ii ➥ (a)-(i), (b)-(iii), (c)-(ii), (d)-(iv)
iii ➥ (a)-(iii), (b)-(i), (c)-(ii), (d)-(iv)
iv ➥ (a)-(iv), (b)-(ii), (c)-(i), (d)-(iii)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q42➡ |
In an operating system, indivisibility of operation means:
i ➥ Operation is interruptible
ii ➥ Race – condition may occur
iii ➥ Processor can not be preempted
iv ➥ All of the above

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q43➡ |
A horn clause is ______.
i ➥ A clause in which no variables occur in the expression
ii ➥ A clause that has at least one negative literal
iii ➥ A disjunction of a number of literals
iv ➥ A clause that has at most one positive literal

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q44➡ |
In Propositional Logic, given P and P → Q, we can infer __.
i ➥ ~Q
ii ➥ Q
iii ➥ P ∧ Q
iv ➥ ~ P ∧ Q

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q45➡ |
Reasoning strategies used in expert systems include _______.
i ➥ Forward chaining, backward chaining and problem reduction
ii ➥ Forward chaining, backward chaining and boundary mutation
iii ➥ Forward chaining, backward chaining and back propagation
iv ➥ Backward chaining, problem reduction and boundary mutation

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q46➡ |
Language model used in LISP is ______.
i ➥ Functional programming
ii ➥ Logic programming
iii ➥ Object oriented programming
iv ➥ All of the above

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q47➡ |
In constraint satisfaction problem, constraints can be stated as ______.
i ➥ Arithmetic equations and inequalities that bind the values of variables
ii ➥ Arithmetic equations and inequalities that doesn’t bind any restriction over variables
iii ➥ Arithmetic equations that impose restrictions over variables
iv ➥ Arithmetic equations that discard constraints over the given variables

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q48➡ |
As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has the following advantages:
i ➥ It has a high level of flexibility
ii ➥ It doesn’t require cash up-front
iii ➥ It is a business investment
iv ➥ Little risk of obsolescence

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q49➡ |
Consider the conditional entropy and mutual information for the binary symmetric channel. The input source has alphabet X={0,1} and associated probabilities {1/2, 1/2}. The channel matrix
is where p is the transition probability. Then the conditional entropy is given by:
i ➥ 1
ii ➥ plog(p) – (1 – p)log(1 – p)
iii ➥ 1 + p log(p) + (1 – p)log(1 – p)
iv ➥ 0

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q50➡ |
Which of the following is not a lossy compression technique?
i ➥ JPEG
ii ➥ MPEG
iii ➥ FFT
iv ➥ Arithmetic coding

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q51➡ |
Blind image deconvolution is ____________.
i ➥ Combination of blur identification and image restoration
ii ➥ Combination of blur identification and image restoration
iii ➥ Combination of blur and non-blur image
iv ➥ None of the above

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q52➡ |
A basic feasible solution of a linear programming problem is said to be ______ if at least one of the basic variables is zero.
i ➥ degenerate
ii ➥ non-degenerate
iii ➥ infeasible
iv ➥ unbounded

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q53➡ |
Consider the following conditions:
(a)The solution must be feasible, i.e. it must satisfy all the supply and demand constraints.
(b)The number of positive allocations must be equal to m+n-1, where m is the number of rows and n is the number of columns.
(c)All the positive allocations must be in independent positions.
The initial solution of a transportation problem is said to be non-degenerate basic feasible solution if it satisfies:
i ➥ (a) and (b) only
ii ➥ (a) and (c) only
iii ➥ (b) and (c) only
iv ➥ (a), (b) and (c)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q54➡ |
Consider the following transportation problem:

The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel’s Approximation method is:
i ➥ 1450
ii ➥ 1465
iii ➥ 1480
iv ➥ 1520

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q55➡ |
The character set used in Windows 2000 operating system is __
i ➥ 8 bit ASCII
ii ➥ Extended ASCII
iii ➥ 16 bit UNICODE
iv ➥ 12 bit UNICODE

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q56➡ |
In Unix, the command to enable execution permission for file “mylife” by all is _______.
i ➥ Chmod ugo + X myfile
ii ➥ Chmod a + X myfile
iii ➥ Chmod + X myfile
iv ➥ All of the above

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q57➡ |
What will be the output of the following Unix command ? $rm chap0[1 – 3]
i ➥ Remove file chap0[1 – 3]
ii ➥ Remove file chap01, chap02, chap03
iii ➥ Remove file chap[1 – 3]
iv ➥ None of the above

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q58➡ |
Which of the following statements regarding the features of the object-oriented approach to databases are true?
(a)The ability to develop more realistic models of the real world.
(b)The ability to represent the world in a non-geometric way.
(c)The ability to develop databases using natural language approaches.
(d)The need to split objects into their component parts.
(e)The ability to develop database models based on location rather than state and behaviour.
i ➥ (a), (b) and (c)
ii ➥ (b), (c) and (d)
iii ➥ (a), (d) and (e)
iv ➥ (c), (d) and (e)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q59➡ |
Consider the following database table:
Create table test( one integer, two integer, primary key(one), unique(two), check(one >= 1 and <= 10), check(two >= 1 and <= 5))
How many data records/tuples atmost can this table contains?
i ➥ 5
ii ➥ 10
iii ➥ 15
iv ➥ 50

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q60➡ |
Suppose ORACLE relation R(A, B) currently has tuples {(1, 2), (1, 3), (3, 4)} and relation S(B, C) currently has {(2, 5), (4, 6), (7, 8)}. Consider the following two SQL queries SQ1 and SQ2 :
SQ1: Select *
From R Full Join S
On R.B = S.B;
SQ2: Select *
From R Inner Join S
On R.B = S.B;
The numbers of tuples in the result of the SQL query SQ1 and the SQL query SQ2 are given by:
i ➥ 2 and 6 respectively
ii ➥ 6 and 2 respectively
iii ➥ 2 and 4 respectively
iv ➥ 4 and 2 respectively

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q61➡ |
Consider the following three SQL queries (Assume the data in the people table):
(a)Select Name from people where Age > 21;
(b)Select Name from people where Height > 180;
(c)Select Name from people where (Age > 21) or (Height > 180);
If the SQL queries (a) and (b) above, return 10 rows and 7 rows in the result set respectively, then what is one possible number of rows returned by the SQL query (c)?
i ➥ 3
ii ➥ 7
iii ➥ 10
iv ➥ 21

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q62➡ |
The distributed system is a collection of (P)and communication is achieved in distributed system by (Q), where (P) and (Q) are:
i ➥ Loosely coupled hardware on tightly coupled software and disk sharing, respectively.
ii ➥ Tightly coupled hardware on loosely coupled software and shared memory, respectively
iii ➥ Tightly coupled software on loosely coupled hardware and message passing, respectively
iv ➥ Loosely coupled software on tightly coupled hardware and file sharing, respectively.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q63➡ |
Consider the following three tables R, S and T. In this question, all the join operations are natural joins (⨝). (π) is the projection operation of a relation:

Possible answer tables for this question are given as below :

What is the resulting table πAB(R⨝T) ⨝ πRC(S⨝T)?
i ➥ (a)
ii ➥ (b)
iii ➥ (c)
iv ➥ (d)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q64➡ |
Consider the two class classification task that consists of the following points:
Class C1 : [-1, -1], [-1, 1], [1, -1]
Class C2 : [1, 1]
The decision boundary between the two classes C1 and C2 using single perceptron is given by:
i ➥ x1 – x2 – 0.5 = 0
ii ➥ x1 + x2 – 0.5 = 0
iii ➥ 0.5(x1 + x2) – 1.5 = 0
iv ➥ x1 + x2 – 0.5 = 0

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q65➡ |
Consider a standard additive model consisting of rules of the form of
If x is Ai AND y is Bi THEN z is Ci.
Given crisp inputs x = x0, y = y0, the output of the model is:
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q66➡ |
A bell-shaped membership function is specified by three parameters (a, b, c) as follows:
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q67➡ |
Which of the following is/are the principal components of a memory-tube display ?
(a)Flooding gun
(b)Collector
(c)Phosphorus grains
(d)Ground
i ➥ (a) and (b)
ii ➥ (c) only
iii ➥ (d) only
iv ➥ All the above

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q68➡ |
Which of the following steps is/are not required for analog to digital conversion?
(a)Sensing
(b)Conversion
(c)Amplification
(d)Conditioning
(e)Quantization
i ➥ (a) and (b)
ii ➥ (c) and (d)
iii ➥ (a), (b) and (e)
iv ➥ None of the above

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q69➡ |
Which raster locations would be chosen by Bresenham’s algorithm when scan converting a line from (1, 1) to (8, 5)?
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q70➡ |
Consider a unit square centred at the origin. The coordinates of the square are translated by a factor (1/2, 1) and rotated by an angle of 90°. What shall be the coordinates of the new square?
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q71➡ |
Which of the following is/are the components of a CRT?
(a)Electron Gun
(b)Control Electrode
(c)Focusing Electrode
(d)Phosphor Coated Screen
i ➥ (a) and (d)
ii ➥ (a), (b) and (d)
iii ➥ (a), (b), (c) and (d)
iv ➥ (a), (c) and (d)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q72➡ |
Which one of the following statements is incorrect?
i ➥ Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management.
ii ➥ Reliability of a software specifies the probability of failure-free operation of that software for a given time duration.
iii ➥ The reliability of a system can also be specified as the Mean Time To Failure (MTTF)
iv ➥ In white-box testing, the test cases are decided from the specifications or the requirements

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q73➡ |
Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect?
i ➥ “Requirement validation” is one of the activities in the requirements phase.
ii ➥ “Prototyping” is one of the methods for requirement analysis.
iii ➥ “Modelling-oriented approach” is one of the methods for specifying the functional specifications
iv ➥ “Function points” is one of the most commonly used size metric for requirements.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q74➡ |
______ tag is an extension to HTML that can enclose any number of Javascript statements.
i ➥ < SCRIPT >
ii ➥ < BODY >
iii ➥ < HEAD >
iv ➥ < TITLE >

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q75➡ |
Consider a language A defined over the alphabet Σ={0, 1} as A={0⌊n/2⌋1n :n>=0}. The expression ⌊n/2⌋ means the floor of n/2, or what you get by rounding n/2 down to the nearest integer.
Which of the following is not an example of a string in A?
i ➥ 011
ii ➥ 0111
iii ➥ 0011
iv ➥ 001111

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Leave a Reply

Your email address will not be published.

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?