Ans .
D
Ans .
C
Continuously varying signal representatiom
Ans .
A
2^12 locations = 4096
Ans .
C
After RESET instruction the processor execution will initialize from 0000H.
Ans .
C
Internally, the overflow flag is usually generated by an exclusive or of the internal carry into and out of the sign bit. As the sign bit is the same as the most significant bit of a number considered unsigned, the overflow flag is "meaningless" and normally ignored when unsigned numbers are added or subtracted.
Ans .
A
privacy invasion
Ans .
A
Transaction hold shared lock on data item A .So any number of transaction can read that the data from the requesting item using shared locking .So transaction B request will immediately granted.
Ans .
A
A trigger is like a stored procedure that Oracle Database invokes automatically whenever a specified event occurs.
Ans .
C
The SGA is a group of shared memory structures, known as SGA components, that contain data and control information for one Oracle Database instance.
Ans .
B
the redo log files are used for instance recovery
Ans .
A
they can display realistic shaded scenes
Ans .
D
The basic geometric objects in computer graphics are usually called primitives or graphics output primitives
Ans .
A
The basic idea is to test the Z-depth of each surface to determine the closest (visible) surface.
Ans .
B
Top lef
Ans .
A
Ray Casting is often used to implement CSG operation when objects are described with boundary representation.
Ans .
D
kernel process and supervisor process
Ans .
B
main() and yyerror() are recommended funv=ctions to be defined in user programme specification of Unix System.
Ans .
B
(r*s*)* = (r+s)*
Ans .
B
ab, ba, aab
Ans .
A
Coroutines are computer-program components that generalize subroutines for non-preemptive multitasking, by allowing multiple entry points for suspending and resuming execution at certain locations.
Ans .
B
In Selective Reject (or Selective Repeat), maximum size of window must be half of the maximum sequence number.
Ans .
D
128,0
Ans .
B Denial-of-service (DoS) attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them.
Ans .
D
4, 24.07 dB
Ans .
A,B
Flow control is local phenomenon whicle congestion control is global phenomenon
Flow control uses timers whicle congetion control uses retransmissions
Ans .
D
As in bubble sort always we swap the adjacent keys if they are not in desired order
Ans .
D
As the first statement is true according to the definition of linear algorithms, the second is false as 30 operations are not needed.
Ans .
C
Worst-case performance :O(n2)
Best-case performance :O(n log n) (simple partition) or O(n) (three-way partition and equal keys)
Average performance :O(n log n)
Ans .
B
Ans .
B
(i)3 COL : Given a graph G can be painted in 3 Colours. : NP complete
(ii) COLO : Given a graph G Find Chromatic Number of G. : NP Hard
(iii) COLC : Given a graph Find Optimal Colouring of G. : NP Hard
Ans .
C
The ternary operators cannot be overloaded,
Ans .
A
Data member of derived class of X
Ans .
A
Constructors are not virtual
Ans .
B
allm objects are destroid when program is terminated
Ans .
D
In access control in a protected derivation, visibility modes will change as public and protected become protected
Ans .
C
reliability is most important aspect of software design.
Ans .
C
major characteristics of agil process is:document is minimal
Ans .
B
Ans .
D
Ans .
B
In case of distributed memory parallel System, Which of the techniques used for compile time transformation for accessing remote data
Ans .
B
In a system there are several process executives, in this scenario which process can be affected by the execution
Ans .
C
The Operating System memory management "Compassion" is defined as :
Ans .
A
Consider a following program code fragment
main()
{
if(fork() > 0)
sleep(100);
}
Result in the creation of :
Ans .
B
Suppose there is system consisting of 4 resources of same time that are shared by 3 processes each of which needs at most 2 resources under this condition whether system will be in ............
Ans .
B
Prospector is application of :
Ans .
B
{7(a-> B), B-> 7 } is for :
Ans .
C
|---t1----|
                          |---t2----|
The two temporal t1 and t2 will :
Ans .
B
Which of the following is a AI search
Ans .
D
Which of the following is a knowledge representation
Ans .
D
In the following FSM
is equivalent to :
Ans .
B
Write a regular expression which is starting with 10 followed by any number of 0's and 1's to :?
Ans .
D
The regular expression (R+S)* is equivalent to :
Ans .
C
The following regular expression P -> 0P1/1/ e will give :
Ans .
D
The Turing machine used for ............
Ans .
D
Which of following are properties of channel capacity for an input alphabet x and output alphabet y ?
(i) c >= 0
(ii) c <= log|x|
(iii) c >= log|y|
Ans .
A
The data contains five different symbols whose occurrence are as shown below :
Symbol : A   B   C   D   E
Frequency : 24   12   10   8   8
How much bit of space is required to store above data, when these symbols are coding as per Huffman coding
Ans .
B
Linear Code is a :
Ans .
B
Which of statement is/are correct ?
(i) In fourier transformed images, at location F(0,0) average value of input image is available
(ii) High pass filter is useful to reduce small dots
Ans .
A
when compressing images which of the following redundancy/ redundancies need to be addressed ?
Ans .
D
Consider following Linear Programming Problem :
Maximize : Z = 20 x1 + 10 x2
Subject to : x1 + 2x2 <= 40
        3x1 + x2 >= 30
        4x1 + 3x2 >= 60
        x1, x2 >= 0
Q.61 Which of following points are in feasible region ?
Ans .
B
The dual of this problem
Ans .
C
Consider the following Transformation :
Ans .
B
Consider following assignment problem :
This problem has 2 optimal solutions. But in both solutions following assignment pairs are common :
Ans .
D
Consider a following network with origin at O and destination at T
In this network :
Ans .
B
In case of linear separability problem , the classes of pattern with ........ vector can be separated with......... Surfaces
Ans .
B
Which of following are true for neural networks ?
(i) Functiong of artificial neural network and biological neuron are similar
(ii) Time required to train a network depends on its size
(iii) Neural networks learn by example
Ans .
C
In multilayer Perception , hidden nodes are :
Ans .
B
Which of following are true for neural networks ?
Ans .
D
Let X be universe discourse, C be a class of subsets of X, and E, F belongs to C then for a fuzzy measure g : C->R, Which of the following is additive ?
Ans .
D
In a single processor system, there are four units of resource A, B and C, Which are to be shared by 3 processes. The current scenario is described by allocation matrix, Which gives no of resources of each type allocated to each process and request matrix, Which gives no of resources requested by each process to complete execution . Which process will complete first and which will be last ?
Ans .
A
The unlink system call is used in UNIX as a unlink (Path name) Which of following statements are true ?
File is no more accessible
Call removes inode entry for that file
Call removes directory entry for that file
Call releases block to that file
Ans .
C
Which of the following statements are true for variables in shell programming ?
Variables are declared before assigning value
Variables are case sensitive
To extract contents, variable name should be pressed by $
Clear command is used to clear list of variables
Ans .
B
The first and last message received by Window5 Procedure in Win32 Window5 programming are :
Ans .
D
Which of following is true for timer messages in WIN32 Window5 programming ?
Timer messages are not queued but sent directly
Window5 combines multiple WM_TIMER messages
Busy application is not guaranteed to receive timer message
Timer messages are asynchronous
Ans .
B