Q4➡| There are three cards in a box. Both sides of one card are black, both sides of one card are red, and the third card has one black side and one red side. We pick a card at random and observe only one side. What is the probability that the opposite side is the same colour as the one side we observed?
Q5➡| A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph. How many cliques are there in the graph shown below?
Q14➡| When a method in a subclass has the same name and type signatures as a method in the super class, then the method in the subclass _ the method in the super class.
Q17➡| Which of the following statement(s) is/are FALSE in the context of Relational DBMS ? I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data in the database. II. E-R diagrams are useful to logically model concepts. III. An update anomaly is when it is not possible to store information unless some other, unrelated information is stored as well. IV. SQL is a procedural language.
Q19➡| Consider the following two commands C1 and C2 on the relation R from an SQL database: C1 : drop table R; C2 : delete from R; Which of the following statements is TRUE ? I. Both C1 and C2 delete the schema for R. II. C2 retains relation R, but deletes all tuples in R. III. C1 deletes not only all tuples of R, but also the schema for R.
Q20➡| Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II,III and IV) for this table :
I : {B} II : {B, C} III : {A, D} IV : {C, D} If different symbols stand for different values in the table (e.g., d1 is definitely not equal to d2 ), then which of the above could not be the candidate key for the database table ?
Q22➡| Consider the following operations performed on a stack of size 5 : Push (a); Pop() ; Push(b); Push(c); Pop(); Push(d); Pop();Pop(); Push (e) Which of the following statements is correct?
Q23➡| Suppose you are given a binary tree with n nodes, such that each node has exactly either zero or two children. The maximum height of the tree will be
Q27➡| In a fully-connected mesh network with 10 computers, total _____ number of cables are required and______ number of ports are required for each device.
Q28➡| In TCP/IP Reference model, the job of _______layer is to permit hosts to inject packets into any network and travel them independently to the destination.
Q29➡| If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:
Q31➡| The number of strings of length 4 that are generated by the regular expression (0|∈)1 + 2* (3|∈), where | is an alternation character, {+, *} are quantification characters, and ∈ is the null string, is :
Q32➡| The content of the accumulator after the execution of the following 8085 assembly language program, is: MVI A, 42H MVI B, 05H UGC: ADD B DCR B JNZ UGC ADI 25H HLT
Q34➡| Which of the following is not typically a benefit of dynamic linking? I. Reduction in overall program execution time. II. Reduction in overall space consumption in memory. III. Reduction in overall space consumption on disk. IV. Reduction in the cost of software updates.
Q36➡| Consider the reference string 0 1 2 3 0 1 4 0 1 2 3 4 If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are and ______ respectively.
Q37➡| Suppose there are four processes in execution with 12 instances of a Resource R in a system. The maximum need of each process and current allocation are given below:
With reference to current allocation, is system safe ? If so, what is the safe sequence ?
Q38➡| If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are: 98, 37, 14, 124, 65, 67
Q40➡| A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler reevaluates the process priority for every ‘T’ time units and decides next process to be scheduled. If the process have no I/O operations and all arrive at time zero, then the scheduler implements ________ criteria.
Q41➡| If S 1 is total number of modules defined in the program architecture, S 3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is :
Q46➡| An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ___________.
Q47➡| Consider the following two statements : (A) Business intelligence and Data warehousing is used for forecasting and Data mining. (B) Business intelligence and Data warehousing is used for analysis of large volumes of sales data. Which one of the following options is correct ?
Q49➡| Consider the following two statements : (A) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse. (B) Data scrubling is a process of rejecting data from data warehouse to create indexes. Which one of the following options is correct ?
Q50➡| Given the following statements: (A) Strategic value of data mining is timestamping. (B) Information collection is an expensive process in building an expert system. Which of the following options is correct?