Journey of a
Thousand Miles begins with One Click!!!
Ans .
D
Explanation : Transactional processing is an database application not an data warehouse application
Ans .
A
Explanation : no explanation
Ans .
C
Explanation : A table and matrix are both two dimentional.
Ans .
B
Explanation : A binary tree is a tree data structure in which each node has at most two child nodes.
The number of subtrees of a node is called the degree of the node. In a binary tree, all nodes have degree 0, 1, or 2.
The degree of a tree is the maximum degree of a node in the tree. A binary tree is of degree 2.
Ans .
B
Explanation : no explanation
Ans .
A
Explanation : log 2 (6 x 109 x 103 ) = 42.44 ⇒ 43 bits are required to assign a unique host address to each communicating device.
Ans .
C/D
Explanation : A client application generates an ephemeral port number for every TCP connection it sets up. An HTTP request connection is uniquely specified by the five parameters: (TCP, client IP address, ephemeral port #, server IP address, 80). The two applications in the above situations will have different ephemeral port #s and will thus be distinguishable to the server.
Ans .
B
Explanation : Size of received file = 1.5 megabyte = 1.5 * 10^6 bytes.
Maximum packet size (payload) = 1500 bytes.
IP packet contains TCP segment header (20 bytes) and IP packet header (20 bytes).
Hence data size in a packet = 1500 –20 –20 = 1460 bytes
Therefore, to receive a file of 1.5 megabytes, we need 1.5∗10ˆ6/1460=1027.397 packets.
That means total 1028 packets.
Now, overhead incurred = ((no of packet*payload-file size)/file size)*100
= ((1028∗1500−(1.5∗10ˆ6))/(1.5∗10ˆ6))*100 = (42000/(1.5∗10ˆ6))*100 = 2.8%
Ans .
B
Explanation : The data link layer is concerned with the transfer of frames of information across a single hop . The network layer involves the transfer of information across a network using multiple hops per path in general. The connection from a radio antenna to the laptops is direct, and thus a data link layer protocol is more suitable for this situation .
Ans .
D
Explanation : The parse tables SLR(l) and LALR(l) contains same number entries but the reduce in the tables may be different. As there is changes in reduce entries error entries will different.
Ans .
D
Explanation :The second pass generates the values, translates the opcode and operands and synthesizes the document.
Ans .
A
Explanation : The syntax phase processes the constructs and performs appropriate actions.
Ans .
C
Explanation : It is a rule to store the most significant bit of the result in the sign status flag. The first bit always signifies the sign of the result.
Ans .
B
Explanation : A bottom-up parsing builds a derivation by working from the input sentence to the start symbol S which generates rightmost derivation in reverse.
Ans .
B
Explanation : Let three process be P0, P1 and P2 with arrival times 0, 2 and 6 respectively and CPU burst times 10, 20 and 30 respectively. At time 0, P0 is the only available process so it runs. At time 2, P1 arrives, but P0 has the shortest remaining time, so it continues. At time 6, P2 arrives, but P0 has the shortest remaining time, so it continues. At time 10, P1 is scheduled as it is the shortest remaining time process. At time 30, P2 is scheduled. Only two context switches are needed. P0 to P1 and P1 to P2.
Ans .
C
Explanation : Critical section is the part of the program where shared or common resources are pooled so that there is no inconsistency or deadlocks during access of resources
Ans .
A
Explanation : If block size is large then seek time is less (fewer blocks to seek) and disk performance is improved, but remember larger block size also causes waste of disk space.
Ans .
C
Explanation : If block size is large then seek time is less (fewer blocks to seek) and disk performance is improved, but remember larger block size also causes waste of disk space.
48)32 bit virtual address results in large memory overhead in maintaining the page tables.
Ans .
C
Explanation : The basic need of a software product or a system is to provide good functionality and performance. Hence they are good software attributes.
Ans .
D
Explanation : Every software system has different requirements and features. Hence, the best software engineering depends on the type of product to be built.
Ans .
A
Explanation : Based on how and why the software products are being developed, software products can be of two types Generic and Customized.
Ans .
D
Explanation : The testing must be incorporated in every step of the development cycle to ensure a secure system and also which makes the system robust.
Ans .
A
Explanation : A software process is a sequence of activities that leads to the production of a software product. There are four fundamental activities that are common to all software processes. These activities are: Specification, Development, Validation, Evolution.
Ans .
C
Explanation : Maintaining excellent quality data is essential to ensure long-term customers relationships so data cleaning is necessary.
Ans .
C
Explanation : Because each record in a dimension table can describe many records in the fact table.
Ans .
A
Explanation : OLAP allows users to analyze database information from multiple database systems at one time.
Ans .
B
Explanation : The basic principle of interleaving is to spread burst errors over many code words. So fading causes bit errors to occur in bursts corresponding to the times when the channel is in a deep fade.
Ans .
C
Explanation : This cable is the most commonly used and is cheaper than others. It is lightweight, cheap, can be installed easily, and they support many different types of network.
29.
Speedup of a parallel program is:
Speedup= time required for non-parallel program execution/ time required for parallel version execution
Speedup= time required for parallel program execution/ time required for sequential version execution
Speedup= time required for non-parallel program execution/ time required for heterogeneous program execution
Speedup= time required for homogeneous non-parallel program execution/ time required for heterogeneous program execution
Ans .
A
Explanation : Speedup is a number that measures the relative performance of two systems processing the same problem. More technically, it is the improvement in speed of execution of a task executed on two similar architectures with different resources
30.
Efficiency of a parallel computer lies between:
0 and 900
1 and 100
0 and 100
0 and 1
Ans .
D
Explanation : The definition of parallel efficiency is indeed commonly defined as the speedup divided by the number of units of execution (processors, cores, ...) which will always be between 0 and 1 since the units of execution will increase in parallel computer.
31.
Which of the following statements is false ?
R - (Q U P) = (R - Q) - P
P - (R U Q) = (P - Q) - R
Q - (P U R) = (Q - R) - P
P - (Q U R) = (P - R) - Q
Ans .
A/B/C/D
Explanation : No specific explanation. Its a disjoint rule.
32.
- Let f: X -> Y and g: Y -> Z. Let h= g o f : X -> Z. Suppose g is one to one and onto. Which of the following is not true?
If f is one-to-one then h is one-to-one and onto
If f is not onto then h is not onto
If f is not one-to-one then h is not one-to-one
If f is one-to-one then h is one-to-one
Ans .
A
Explanation : If a function is one to one and onto then all the functions resulting from this function will be one to one and onto as well.
33.
Define an equivalence relation R on a set of positive integers I= {2,3,4,...20} by 'a R b' if largest primse divisor of 'a' is the larges prime divisor of 'b'.
The number of equivalence classes of R is :
8
10
9
11
Ans .
A
Explanation : An equivalence relation is a binary relation that is at the same time a reflexive relation, a symmetric relation and a transitive relation. As a consequence of these properties an equivalence relation provides a partition of a set into equivalence classes.
<
34.
Which one of the following is false?
There is unique minimal DFA for every regular language
Every NFA can be converted to an equivalent PDA
Complement of every context-free language is recursive
Every non-deterministic PDA can be converted to an equivalent deterministic PDA
Ans .
D
Explanation : Deterministic PDA cannot handle languages or grammars with ambiguity, but NDPDA can handle languages with ambiguity and any context-free grammar. So every nondeterministic PDA can not be converted to an equivalent deterministic PDA.
35.
Which one of the following is true?
If a language is context-free, it can always be accepted by a deterministic push-down automaton
The union of two context-free languages is context-free
The intersection of two context-free languages is context-free
The complement of a context-free language is context-free
Ans .
B
Explanation : If L1 and If L2 are two context free languages, their union L1 ∪ L2 will also be context free. This is a standard property of Context free grammars.
36.
In Octal, the twelve-bit two's complement of the hexadecimal number 2AF16
62518
52618
65128
65218
Ans .
D
Explanation :given is the number 2AF in base 16 and you want to know the two’s complement of that number for a 12bit representation written out in base 8.Let’s start with converting 2AF base 16 to binary: 0010 1010 1111. This should be easy enough, as each digit of a base 16 number represents exactly 4 digit of a binary number and you can easily look that up on the internet.The next step to convert this to it’s two’s complement, is to invert every single bit of it: 1101 0101 0000. Should also be very easy (Just as a side note: This is called the one’s complement).Now comes the most complicated part: We need to add 1 to the result we’ve got so far: 1101 0101 0001. As there was no need to propagate any carry bit, this was actually easier than I expected.Now, that we have the final result in base 2, we need to convert that to base 8. Luckily enough, in base 8 each digit represents exactly 3 bits of the base 2 representation, so as a first step, we group the binary digits a little bit different (in 3s instead of 4s) and we get: 110 101 010 001.
And finally we use the trick with the look up on the internet again - this time to convert our groups of 3 bits to octal digits: 6521.And so our final result is: 6521 in base 8.
37.
The truth table for (a v b) v (a ʌ c) is the same as the truth table for :
(a v b) ʌ (a v c)
(a v b) ʌ c
(a v b) ʌ (a ʌ c)
a v b
Ans .
D
Explanation : the truth table of (a v b) v (a ʌ c) is equal to a v b rest of option dont have same truth table.
38.
Which of the following property is true in the context of Well Formed Formulae (WFF) ? :
Each letter is a term
If x and y are terms then x = y is formulae
If P is a formulae then 7P is a formulae
All of the above
Ans .
B/A
Explanation :characteristic of well formed formulae
<
39.
A logic circuit which is used to change a BCD number into a decimal number :
Decoder
Encoder
Multiplexer
Demultiplexer
Ans .
A
Explanation :decoder is used to convert BCD number to decimal.
40.
Let an,an-1,...a1,a0 be the binary representation of a number b. Then b is divisible by 3 if:
number of 1's is divisible by 3
number of 0's is divisible by 3
number of 1's is divisible by 6
difference of alternate sum (a0 + a2 ...) - (a1 + a3 +..) is divisible by 3
Ans .
D
Explanation : No explanation
41.
Consider the C function given below : int f(int j) { static int i =50; int k; if(i==j) { printf("something"); k=f(i); return 0; } else return 0; } Which one of the following is true?
The function returns 0 for all values of j
The function prints the text something for all values of j
The function returns 0 when j = 50
The function will exhaust the runtime stack or run into a infinite loop when j=50
Ans .
D
Explanation :When j is 50, the function would call itself again and again as neither i nor j is changed inside the recursion.
42.
When does the void pointer in C gets de referenced :
When it doesn't point to a value
When it cast to another type of object
using delete keyword
None of the above mentioned
Ans .
B
Explanation : when we use casting of pointer to another type of object it goes to dereferencing.
43.
What is the meaning of the following declaration ? int (*m[8])(); :
m is pointer to function
m is array of pointer to function
m is pointer to such function which return type is array
m is pointer to array of function
Ans .
B
Explanation :the given declaration m is array pointer to function as defined in question
44.
What is size of generic pointer in C language :
0
1
2
null
Ans .
C
Explanation : Size of any type of pointer is 2 byte.
45.
If new operator is used then the constructor function is:
Copy constructor
Default constructor
Static constructor
Dynamic constructor
Ans .
D
Explanation :static constructor does not allows to chnage operator only dynamic constructor gives allowance.
46.
What will be the result of statement : Select * from employee where salary in (4000,8000) :
All employees whose salary is either 4000 or 8000
All employees whose salary is between 4000 and 8000
All employees whose salary is not between 4000 and 8000
None of the above
Ans .
A
Explanation : in these query the salary is given in paranthesis which means as either one salary is selected and hence employees whith these 4000 or 8000 is displayed
47.
Consider the class schema as follows class(course_id,dept_name,title,credits,sec_id,semester,year,building,room_number,capacity,time_slot_id) Choose the correct decomposition of class schema each of which is BCNF :
course, class_room,dept
course,credits,room
course_id,room_number,building
class_room,room_capacity,building
Ans .
C
Explanation :the given relation is in BCNF is given as it follows
X → Y is a trivial functional dependency (Y ⊆ X)
X is a superkey for schema R
48.
Rollback statement of SQL TCL :
Ends the transaction sucessfully
Aborts the database action sucessfully
Makes update permanent in the database
All of the above
Ans .
B
Explanation :Transaction Control Language(TCL) commands are used to manage transactions in database.These are used to manage the changes made by DML statements. It also allows statements to be grouped together into logical transactions.
49.
which of these expresses the number of entities to which another entity can be associated via a relationship set :
Mapping cardinality
Degree of relationship
Connectivity of relationship
Role
Ans .
A
Explanation : Mapping cardinality is also called as cardinality ratio.
50.
Consider R=(A,B,C,G,H,I) and the set F of functional dependencies, F= ( A-> B, A -> C, CG ->, CG -> I, B-> H). The correct members of closure of F are :
A->H, CG->HI, AG-> I
A->HI, CG ->A
AG -> BI
A -> B, B -> I
Ans .
A
Explanation : members of F are:
A H by transitivity from A B and B H
AG I by augmenting A C with G, to get AGCG and then transitivity with CG I
CGHI by augmenting CGI to infer CGCGI, and augmenting of CGH to infer CGIHI, and then transitivity