UGC NET JULY 2016 Paper III

UGC NET JULY 2016 Paper III

Q1➡ |
Which of the following is a sequential circuit?
i ➥ Multiplexer
ii ➥ Decoder
iii ➥ Counter
iv ➥ Full adder

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q2➡ |
8085 microprocessor has ________ hardware interrupts.
i ➥ 2
ii ➥ 3
iii ➥ 4
iv ➥ 5

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q3➡ |
Which of the following in 8085 microprocessor performs HL = HL + DE ?
i ➥ DAD D
ii ➥ DAD H
iii ➥ DAD B
iv ➥ DAD SP

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q4➡ |
The register that stores all interrupt requests is:
i ➥ Interrupt mask register
ii ➥ Interrupt service register
iii ➥ Interrupt request register
iv ➥ Status register

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q5➡ |
The _______ addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction.
i ➥ Base indexed
ii ➥ Base indexed plus displacement
iii ➥ Indexed
iv ➥ Displacement

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q6➡ |
In _______ method, the word is written to the block in both the cache and main memory, in parallel.
i ➥ Write through
ii ➥ Write back
iii ➥ Write protected
iv ➥ Direct mapping

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q7➡ |
Which of the following statements concerning Object-Oriented databases is FALSE?
i ➥ Objects in an object-oriented database contain not only data but also methods for processing the data.
ii ➥ Object-oriented databases store computational instructions in the same place as the data.
iii ➥ Object-oriented databases are more adept at handling structured (analytical) data than relational databases.
iv ➥ Object-oriented databases store more types of data than relational databases and access that data faster.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q8➡ |
In distributed databases, location transparency allows for database users, programmers and administrators to treat the data as if it is at one location. A SQL query with location transparency needs to specify:
i ➥ Inheritances
ii ➥ Fragments
iii ➥ Locations
iv ➥ Local formats

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q9➡ |
Consider the relations R(A, B) and S(B, C) and the following four relational algebra queries over R and S:
I. ΠA, B (R ⨝ S)
II. R ⨝ ΠB(S)
III. R ∩ (ΠA(R) × ΠB(S))
IV. ΠA, R.B (R × S)
where R⋅B refers to the column B in table R.
One can determine that:
i ➥ I, III and IV are the same query.
ii ➥ II, III and IV are the same query.
iii ➥ I, II and IV are the same query.
iv ➥ I, II and III are the same query.

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q10➡ |
Which of the following statements is TRUE?
D1 : The decomposition of the schema R(A, B, C) into R1(A, B) and R2 (A, C) is always lossless.
D2 : The decomposition of the schema R(A, B, C, D, E) having AD → B, C → DE, B → AE and AE → C, into R1 (A, B, D) and R2 (A, C, D, E) is lossless.
i ➥ Both D1 and D2
ii ➥ Neither D1 nor D2
iii ➥ Only D1
iv ➥ Only D2

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q11➡ |
Consider the following ORACLE relations :
R (A, B, C) = {<1, 2, 3>, <1, 2, 0>, <1, 3, 1>, <6, 2, 3>, <1, 4, 2>, <3, 1, 4> }
S (B, C, D) = {<2, 3, 7>, <1, 4, 5>, <1, 2, 3>, <2, 3, 4>, <3, 1, 4>}.
Consider the following two SQL queries SQ1 and SQ2 :
SQ1 : SELECT R⋅B, AVG (S⋅B) FROM R, S WHERE R⋅A = S⋅C AND S⋅D < 7 GROUP BY R⋅B;
SQ2 : SELECT DISTINCT S⋅B, MIN (S⋅C) FROM S GROUP BY S⋅B HAVING COUNT (DISTINCT S⋅D) > 1;
If M is the number of tuples returned by SQ1 and N is the number of tuples returned by SQ2 then
i ➥ M = 4, N = 2
ii ➥ M = 5, N = 3
iii ➥ M = 2, N = 2
iv ➥ M = 3, N = 3

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q12➡ |
Semi-join strategies are techniques for query processing in distributed database system. Which of the following is a semi-join technique ?
i ➥ Only the joining attributes are sent from one site to another and then all of the rows are returned.
ii ➥ All of the attributes are sent from one site to another and then only the required rows are returned.
iii ➥ Only the joining attributes are sent from one site to another and then only the required rows are returned.
iv ➥ All of the attributes are sent from one site to another and then only the required rows are returned.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q13➡ |
Consider the Breshenham’s circle generation algorithm for plotting a circle with centre (0, 0) and radius ‘r’ units in first quadrant. If the current point is (xi , yi ) and decision parameter is pi then what will be the next point (xi + 1, yi + 1 + 1) and updated decision parameter pi + 1 for pi ≥ 0?
i ➥ xi + 1 = xi+ 1
yi + 1 = yi
pi + 1 = pi + 4xi + 6
ii ➥ xi + 1 = xi + 1
yi + 1 = yi – 1
pi + 1 = pi + 4(xi – yi) + 10
iii ➥ xi + 1 = xi
yi + 1 = yi – 1
pi + 1 = pi + 4(xi – yi) + 6
iv ➥ xi + 1 = xi – 1
yi + 1 = yi
pi + 1 = pi + 4(xi – yi) + 10

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q14➡ |
A point P(5, 1) is rotated by 90° about a pivot point (2, 2). What is the coordinate of new transformed point P′ ?
i ➥ (3, 5)
ii ➥ (5, 3)
iii ➥ (2, 4)
iv ➥ (1, 5)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q15➡ |
Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping algorithm. The rectangular window has a lower left-hand corner at (– 5, 1) and upper right-hand corner at (3, 7). Consider the following three lines for clipping with the given endpoint coordinates:
Line AB : A (– 6, 2) and B (–1, 8)
Line CD : C (– 1, 5) and D (4, 8)
Line EF : E (–2, 3) and F (1, 2)
Which of the following line(s) is/are candidate for clipping?
i ➥ AB
ii ➥ CD
iii ➥ EF
iv ➥ AB and CD

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q16➡ |
In perspective projection, if a line segment joining a point which lies in front of the viewer to a point in back of the viewer is projected to a broken line of infinite extent. This is known as _______.
i ➥ View confusion
ii ➥ Vanishing point
iii ➥ Topological distortion
iv ➥ Perspective foreshortening

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q17➡ |
Let us consider that the original point is (x, y) and new transformed point is (x′, y′). Further, Shx and Shy are shearing factors in the x and y directions. If we perform the y-direction shear relative to x = xref then the transformed point is given by _______.
i ➥ x′ = x + Shx ⋅ (y – yref)
y′ = y
ii ➥ x′ = x
y′ = y ⋅ Shx
iii ➥ x′ = x
y′ = Shy (x – xref) + y
iv ➥ x′ = Shy ⋅ y
y′ = y ⋅ (x – xref)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q18➡ |
Which of the following statement(s) is/are correct with reference to curve generation?
I. Hermite curves are generated using the concepts of interpolation.
II. Bezier curves are generated using the concepts of approximation.
III. The Bezier curve lies entirely within the convex hull of its control points.
IV. The degree of Bezier curve does not depend on the number of control points.
i ➥ I, II and IV only
ii ➥ II and III only
iii ➥ I and II only
iv ➥ I, II and III only

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q19➡ |
Given the following statements: (A) To implement Abstract Data Type, a programming language require a syntactic unit to encapsulate type definition. (B) To implement ADT, a programming language requires some primitive operations that are built in the language processor. (C) C++, Ada, Java 5.0, C#2005 provide support for parameterised ADT. Which one of the following options is correct ?
i ➥ (A), (B) and (C) are false.
ii ➥ (A) and (B) are true; (C) is false.
iii ➥ A) is true; (B) and (C) are false.
iv ➥ (A), (B) and (C) are true.

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q20➡ |
Match the following types of variables with the corresponding programming languages:
i ➥ (a)-(i), (b)-(iii), (c)-(iv), (d)-(ii)
ii ➥ (a)-(iv), (b)-(i), (c)-(iii), (d)-(ii)
iii ➥ (a)-(iii), (b)-(i), (c)-(iv), (d)-(ii)
iv ➥ (a)-(ii), (b)-(i), (c)-(iii), (d)-(iv)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q21➡ |
Which of the following is false regarding the evaluation of computer programming languages ?
i ➥ Application oriented features
ii ➥ Efficiency and Readability
iii ➥ Software development
iv ➥ Hardware maintenance cost

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q22➡ |
The symmetric difference of two sets S1 and S2 is defined as
S1⊖S2 = {x|x ∈ S1 or x ∈ S2, but x is not in both S1 and S2}
The nor of two languages is defined as nor (L1, L2) = {w|w |∈L1 and w |∈ L1}.
Which of the following is correct?
i ➥ The family of regular languages is closed under symmetric difference but not closed under nor.
ii ➥ The family of regular languages is closed under nor but not closed under symmetric difference.
iii ➥ The family of regular languages are closed under both symmetric difference and nor.
iv ➥ The family of regular languages are not closed under both symmetric difference and nor.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q23➡ |
The regular expression for the complement of the language L = {anbm|n ≥ 4, m ≤ 3} is:
i ➥ (λ + a + aa + aaa) b* + a* bbbb* + (a + b)* ba(a + b)*
ii ➥ (λ + a + aa + aaa) b* + a* bbbbb* + (a + b)* ab(a + b)*
iii ➥ (λ + a + aa + aaa) + a* bbbbb* + (a + b)* ab(a + b)*
iv ➥ (λ + a + aa + aaa)b* + a* bbbbb* + (a + b)* ba(a + b)*

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q24➡ |
Consider the following two languages : L1 = {0i1j| gcd (i, j) = 1} L2 is any subset of 0*. Which of the following is correct ?
i ➥ L1 is regular and L2* is not regular
ii ➥ L1 is not regular and L2* is regular
iii ➥ Both L1 and L2* are regular languages
iv ➥ Both L1 and L2* are not regular languages

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q25➡ |
If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ___________.
i ➥ 64 Kbps
ii ➥ 32 Mbps
iii ➥ 32 Kbps
iv ➥ 64 Mbps

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q26➡ |
Given the following statements:
(A) Frequency Division Multiplexing(FDM) is a technique that can be applied when the bandwidth of a link is greater than combined bandwidth of signals to be transmitted.
(B) Wavelength Division Multiplexing (WDM) is an analog multiplexing Technique to combine optical signals.
(C) WDM is a Digital Multiplexing Technique.
(D) TDM is a Digital Multiplexing Technique.
Which of the following is correct?
i ➥ (A), (B), (C) and (D) are true.
ii ➥ (A), (B), (C) and (D) are false.
iii ➥ (A), (B) and (D) are false; (C) is true.
iv ➥ (A), (B) and (D) are True; (C) is false.

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ________.
i ➥ 0.384
ii ➥ 0.184
iii ➥ 0.286
iv ➥ 0.586

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q28➡ |
Match the following:
i ➥ (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
ii ➥ (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)
iii ➥ (a)-(i), (b)-(iii), (c)-(ii), (iv)-(iv)
iv ➥ (a)-(ii), (b)-(i), (c)-(iv), (d)-(iii)

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q29➡ |
Assume that we need to download text documents at the rate of 100 pages per minute. A page is an average of 24 lines with 80 characters in each line and each character requires 8 bits. Then the required bit rate of the channel is _____.
i ➥ 1.636 Kbps
ii ➥ 1.636 Mbps
iii ➥ 3.272 Mbps
iv ➥ 3.272 Kbps

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q30➡ |
Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key:

Using ‘Z’ as bogus character.
i ➥ TAXERTZENZ
ii ➥ EXTRANETZZ
iii ➥ EZXZTRZANZET
iv ➥ EXTZRANZETZ

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q31➡ |
The number of different binary trees with 6 nodes is __.
i ➥ 6
ii ➥ 42
iii ➥ 132
iv ➥ 256

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q32➡ |
Let A[1…n] be an array of n distinct numbers. If i < j and A[i] > A[j], then the pair (i, j) is called an inversion of A. What is the expected number of inversions in any permutation on n elements ?
i ➥ θ(n)
ii ➥ θ(lgn)
iii ➥ θ(nlgn)
iv ➥ θ(n2)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q33➡ |
Which one of the following arrays represents a binary max-heap?
i ➥ [26, 13, 17, 14, 11, 9, 15]
ii ➥[26, 15, 14, 17, 11, 9, 13]
iii ➥ [26, 15, 17, 14, 11, 9, 13]
iv ➥ [26, 15, 13, 14, 11, 9, 17]

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q34➡ |
Match the following:
i ➥ (a)-(i), (b)-(ii), (c)-(iv), (d)-(iii)
ii ➥ (a)-(i), (b)-(iv), (c)-(ii), (d)-(iii)
iii ➥ (a)-(iii), (b)-(ii), (c)-(iv), (d)-(i)
iv ➥ (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q35➡ |
Suppose that we have numbers between 1 and 1,000 in a binary search tree and want to search for the number 364. Which of the following sequences could not be the sequence of nodes examined ?
i ➥ 925, 221, 912, 245, 899, 259, 363, 364
ii ➥ 3, 400, 388, 220, 267, 383, 382, 279, 364
iii ➥ 926, 203, 912, 241, 913, 246, 364
iv ➥ 3, 253, 402, 399, 331, 345, 398, 364

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q36➡ |
A triangulation of a polygon is a set of T chords that divide the polygon into disjoint triangles. Every triangulation of n-vertex convex polygon has _____ chords and divides the polygon into _____ triangles.
i ➥ n – 2, n – 1
ii ➥ n – 3, n – 2
iii ➥ n – 1, n
iv ➥ n – 2, n – 2

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q37➡ |
Implicit return type of a class constructor is:
i ➥ not of class type itself
ii ➥ class type itself
iii ➥ a destructor of class type
iv ➥ a destructor not of class type

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q38➡ |
It is possible to define a class within a class termed as nested class. There are _____ types of nested classes.
i ➥ 2
ii ➥ 3
iii ➥ 4
iv ➥ 5

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q39➡ |
Which of the following statements is correct?
i ➥ Aggregation is a strong type of association between two classes with full ownership
ii ➥ Aggregation is a strong type of association between two classes with partial ownership.
iii ➥ Aggregation is a weak type of association between two classes with partial ownership.
iv ➥ Aggregation is a weak type of association between two classes with full ownership.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q40➡ |
Which of the following statements is correct?
(1) Every class containing abstract method must not be declared abstract.
(2) Abstract class cannot be directly initiated with ‘new’ operator.
(3) Abstract class cannot be initiated.
(4) Abstract class contains definition of implementation.
i ➥ (1)
ii ➥ (2)
iii ➥ (2) and (3)
iv ➥ All are correct.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q41➡ |
Which of the following statements is not correct?
i ➥ HTML is not screen precise formatting language.
ii ➥ HTML does not specify a logic.
iii ➥ DHTML is used for developing highly interactive web pages.
iv ➥ HTML is a programming language.

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q42➡ |
When one object reference variable is assigned to another object reference variable then
i ➥ a copy of the object is created.
ii ➥ a copy of the reference is created.
iii ➥ a copy of the reference is not created.
iv ➥ it is illegal to assign one object reference variable to another object reference variable.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q43➡ |
A server crashes on average once in 30 days, that is, the Mean Time Between Failures (MTBF) is 30 days. When this happens, it takes 12 hours to reboot it, that is, the Mean Time to Repair (MTTR) is 12 hours. The availability of server with these reliability data values is approximately :
i ➥ 96.3%
ii ➥ 97.3%
iii ➥ 98.3%
iv ➥ 99.3%

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q44➡ |
Match the software maintenance activities in List – I to its meaning in List – II.
i ➥ I-(b), II-(d), III-(c), IV-(a)
ii ➥ I-(b), II-(c), III-(d), IV-(a)
iii ➥ I-(c), II-(b), III-(d), IV-(a)
iv ➥ I-(a), II-(d), III-(b), IV-(c)

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q45➡ |
Match each application/software design concept in List – I to its definition in List – II.
i ➥ I-(b), II-(a), III-(d), IV-(c)
ii ➥ I-(b), II-(d), III-(a), IV-(b)
iii ➥ I-(d), II-(c), III-(b), IV-(a)
iv ➥ I-(d), II-(a), III-(c), IV-(b)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q46➡ |
Software safety is quality assurance activity that focuses on hazards that
i ➥ affect the reliability of a software component.
ii ➥ may cause an entire system to fail.
iii ➥ may result from user input errors.
iv ➥ prevent profitable marketing of the final product.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q47➡ |
Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing order of maturity ?
i ➥ Initial, Defined, Repeatable, Managed, Optimized.
ii ➥ Initial, Repeatable, Defined, Managed, Optimized.
iii ➥ Initial, Defined, Managed, Repeatable, Optimized.
iv ➥ Initial, Repeatable, Managed, Defined, Optimized.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q48➡ |
The number of function points of a proposed system is calculated as 500. Suppose that the system is planned to be developed in Java and the LOC/FP ratio of Java is 50. Estimate the effort (E) required to complete the project using the effort formula of basic COCOMO given below : E = a(KLOC)b Assume that the values of a and b are 2.5 and 1.0 respectively.
i ➥ 25 person months
ii ➥ 75 person months
iii ➥ 62.5 person months
iv ➥ 72.5 person months

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q49➡ |
In UNIX, processes that have finished execution but have not yet had their status collected are known as ________.
i ➥ Sleeping processes
ii ➥ Stopped processes
iii ➥ Zombie processes
iv ➥ Orphan processes

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q50➡ |
In Unix operating system, when a process creates a new process using the fork () system call, which of the following state is shared between the parent process and child process?
i ➥ Heap
ii ➥ Stack
iii ➥ Shared memory segments
iv ➥ Both Heap and Stack

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q51➡ |
Which of the following information about the UNIX file system is not correct?
i ➥ Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks.
ii ➥ An i-node contains accounting information as well as enough information to locate all the disk blocks that holds the file’s data.
iii ➥ Each i-node is 256-bytes long.
iv ➥ All the files and directories are stored in data blocks.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q52➡ |
Which of the following options with reference to UNIX operating system is not correct?
i ➥ INT signal is sent by the terminal driver when one types and it is a request to terminate the current operation.
ii ➥ TERM is a request to terminate execution completely. The receiving process will clean up its state and exit.
iii ➥ QUIT is similar to TERM, except that it defaults to producing a core dump if not caught.
iv ➥ KILL is a blockable signal.

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q53➡ |
A multicomputer with 256 CPUs is organized as 16 × 16 grid. What is the worst case delay (in hops) that a message might have to take ?
i ➥ 16
ii ➥ 15
iii ➥ 32
iv ➥ 30

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q54➡ |
Suppose that the time to do a null remote procedure call (RPC) (i.e. 0 data bytes) is 1.0 msec, with an additional 1.5 msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K RPCs ?
i ➥ 49 msec
ii ➥ 80 msec
iii ➥ 48 msec
iv ➥ 100 msec

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q55➡ |
Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata M. Consider the relation RM defined by M. As all states are reachable from the start state, RM has _ equivalence classes.
i ➥ 2
ii ➥ 4
iii ➥ 5
iv ➥ 6

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q56➡ |
Let L = {0n1n|n ≥ 0} be a context free language. Which of the following is correct ?
i ➥ L’ is context free and Lk is not context free for any k ≥ 1.
ii ➥ L’ is not context free and Lk is not context free for any k ≥ 1.
iii ➥ Both L’ and Lk is for any k ≥ 1 are context free.
iv ➥ Both L’ and Lk is for any k ≥ 1 are not context free.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q57➡ |
Given a Turing Machine M = ({q0, q1, q2, q3}, {a, b}, {a, b, B}, δ, B, {q3}) Where δ is a transition function defined as δ(q0, a) = (q1, a, R) δ(q1, b) = (q2, b, R) δ(q2, a) = (q2, a, R) δ(q3, b) = (q3, b, R) The language L(M) accepted by the Turing Machine is given as:
i ➥ aa*b
ii ➥ abab
iii ➥ aba*b
iv ➥ aba*

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q58➡ |
Consider a discrete memoryless channel and assume that H(x) is the amount of information per symbol at the input of the channel; H(y) is the amount of information per symbol at the output of the channel; H(x|y) is the amount of uncertainty remaining on x knowing y; and I (x; y) is the information transmission. Which of the following does not define the channel capacity of a discrete memoryless channel ?
i ➥ max I(x; y)
p(x)
ii ➥ max [H(y) – H(y|x)]
p(x)
iii ➥ max [H(x) – H(x|y)]
p(x)
iv ➥ max H(x|y)
p(x)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q59➡ |
Consider a source with symbols A, B, C, D with probability 1/2, 1/4, 1/8, 1/8 respectively. What is the average number of bits per symbol for the Huffman code generated from above information ?
i ➥ 2 bits per symbol
ii ➥ 1.75 bits per symbol
iii ➥ 1.50 bits per symbol
iv ➥ 1.25 bits per symbol

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q60➡ |
Which of the following is used for the boundary representation of an image object?
i ➥ Quad Tree
ii ➥ Projections
iii ➥ Run length coding
iv ➥ Chain codes

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q61➡ |
The region of feasible solution of a linear programming problem has a _______ property in geometry, provided the feasible solution of the problem exists.
i ➥ concavity
ii ➥ convexity
iii ➥ quadratic
iv ➥ polyhedron

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q62➡ |
Consider the following statements:
(a) Revised simplex method requires lesser computations than the simplex method.
(b) Revised simplex method automatically generates the inverse of the current basis matrix.
(c) Less number of entries are needed in each table of revised simplex method than usual simplex method.
Which of these statements are correct?
i ➥ (a) and (b) only
ii ➥ (a) and (c) only
iii ➥ (b) and (c) only
iv ➥ (a), (b) and (c)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q63➡ |
The following transportation problem: is

The above solution of a given transportation problem is
i ➥ infeasible solution
ii ➥ optimum solution
iii ➥ non-optimum solution
iv ➥ unbounded solution

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q64➡ |
Let R and S be two fuzzy relations defined as:

Then, the resulting relation, T, which relates elements of universe X to elements of universe Z using max-min composition is given by
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q65➡ |
Compute the value of adding the following two fuzzy integers :
A = {(0.3, 1), (0.6, 2), (1, 3), (0.7, 4), (0.2, 5)}
B = {(0.5, 11), (1, 12), (0.5, 13)}
Where fuzzy addition is defined as μA+B (z)= maxx + y = z(min (μA(x), μB(x)))
Then, f (A + B) is equal to
i ➥ {(0.5, 12), (0.6, 13), (1, 14), (0.7, 15), (0.7, 16), (1, 17), (1, 18)}
ii ➥ {(0.5, 12), (0.6, 13), (1, 14), (1, 15), (1, 16), (1, 17), (1, 18)}
iii ➥ {(0.3, 12), (0.5, 13), (0.5, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
iv ➥ {(0.3, 12), (0.5, 13), (0.6, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q66➡ |
A perceptron has input weights W1 = – 3.9 and W2 = 1.1 with threshold value T = 0.3. What output does it give for the input x1 = 1.3 and x2 = 2.2 ?
i ➥ – 2.65
ii ➥ – 2.30
iii ➥ 0
iv ➥ 1

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q67➡ |
What is the function of following UNIX command ?
WC – l <a >b&
i ➥ It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process.
ii ➥ It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.
iii ➥ It counts the errors during the execution of a process, a, and puts the result in process b.
iv ➥ It copies the ‘l’ numbers of lines of program from file, a, and stores in file b.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q68➡ |
Which of the following statements is not correct with reference to cron daemon in UNIX O.S. ?
i ➥ The cron daemon is the standard tool for running commands on a predetermined schedule.
ii ➥ It starts when the system boots and runs as long as the system is up.
iii ➥ Cron reads configuration files that contain list of command lines and the times at which they invoked.
iv ➥ Crontab for individual users are not stored.

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q69➡ |
In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements:
I. A mode of 641 (octal) means that the owner can read and write the file, other members of the owner’s group can read it, and users can execute only.
II. A mode of 100 (octal) allows the owner to execute the file, but prohibits all other access.
Which of the following options is correct with reference to the above statements ?
i ➥ Only I is correct.
ii ➥ Only II is correct.
iii ➥ Both I and II are correct.
iv ➥ Both I and II are incorrect.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q70➡ |
Consider the statement,
“Either – 2 ≤ x ≤ – 1 or 1 ≤ x ≤ 2”.
The negation of this statement is
i ➥ x < – 2 or 2 < x or – 1 < x < 1
ii ➥ x < – 2 or 2 < x
iii ➥ – 1 < x < 1
iv ➥ x ≤ – 2 or 2 < x or – 1 < x < 1

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q71➡ |
Which of the following is characteristic of an MIS?
i ➥ Provides guidance in identifying problems, finding and evaluating alternative solutions, and selecting or comparing alternatives.
ii ➥ Draws on diverse yet predictable data resources to aggregate and summarize data.
iii ➥ High volume, data capture focus.
iv ➥ Has as its goal the efficiency of data movement and processing and interfacing different TPS.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q72➡ |
How does randomized hill-climbing choose the next move each time?
i ➥ It generates a random move from the moveset, and accepts this move.
ii ➥ It generates a random move from the whole state space, and accepts this move.
iii ➥ It generates a random move from the moveset, and accepts this move only if this move improves the evaluation function.
iv ➥ It generates a random move from the whole state space, and accepts this move only if this move improves the evaluation function.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q73➡ |
Consider the following game tree in which root is a maximizing node and children are visited left to right. What nodes will be pruned by the alpha-beta pruning ?

i ➥ I
ii ➥ HI
iii ➥ CHI
iv ➥ GHI

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q74➡ |
Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an adjacent empty space. Given the initial state

which of the following state cannot be reached?
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q75➡ |
A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as
i ➥ Data dictionary
ii ➥ Reference mechanism
iii ➥ Inference engine
iv ➥ Control strategy

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Leave a Reply

Your email address will not be published.

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?