Given 8 bit word 00111001. encoded in d8=0 d7=0 d6=1 d5=1 d4=1 d3=0 d2=0 d1=1.
parity is calculated as 01111 which are written as p8p4p2p1.
p1=1 p2=1 p4=1 p8=0
encode the string as
d8 d7 d6 d5 p8 d4 d3 d2 p4 d1 p2 p1.
001101001111.
check bit at other end is 1101.
c1=1 c2=0 c4=1 c8=1.
xor(1101,0111)=1010 . its decimal conversion is 10. so 10th bit is changed. 10th bit is d6.
so we flip it. and we get 00011001
Ans .
(B) 4x106 bytes/sec
Explanation :
Minimum bus cycle duration = 4 clock cycle.
maximum bus cycle rate= 8 MHZ/4= 2M/s where 1 MHZ= 1000000/sec.
maximum data transferred per bus cycle rate= 2bytes.
data transferred rate per second = data transferred per bus cycle* bus cycle rate.= 2bytes*2M/s
Ans .
(C) CALL 0038 H
Explanation :
Ans .
(C) ADOBE
Explanation :
010 for 2. 101 for 5 and similarly.
so we organize every thing as.
010101101000010111110.
Now this binary representation is grouped in to 4 to get the Hexadecimal notation.
0 1010 1101 0000 1011 1110 so after converting every group in HEX.
we get ADOBE.
Ans .
(D) 250 Kbytes/sec
Explanation :
CPU speed 1MIPS=10^6 instruction per sec
1 Cpu instruction =4 machine cycles(Avg)
1 memory read/access = 1 machine cycle
CPU utilization =90%
Programmed I/O
each byte transfer requires 4 cycles (instructions)
in status
check status
Branch
Read/Write data
max data transfer rate CPU speed /4 = 10^6/4=250 kbytes/sec
Ans .
(B) 9
Explanation :
The number of flipflop required to design a Modulo 272 counter is Log2 272. 8 flips flops do the work up to 256. hence we need 9 flip flops to achieve the task.
Ans .
(B) 3
Explanation :
Let relation R1 is composed of table emp(ssn,name, Superssn). A query like this can be made from single table like. Find the employee ssn, name, super visor ssn, supervisor name from emp table. An ssn will map to a single supervisor and a supervisor can map to many employee.
In many to many relationship like “a student can take many subjects and many students can take a subject”. it needs two table.eg. student(rollno,subject,name) where pk= roll no and subject. and fk = subject. Foreign key map to pk of subjet (Subjetid, Subjname, Roomno). Hence it required 3 tables
Ans .
(B) The average marks of male students is more than the average marks of the students in the University
Explanation :
Ans .
(B) Lossless preserving decomposition into BCNF is always possible
Explanation :
Table 1(A,B,C) with FD AB->C and C->B cannot be preserved when decomposition is done
Ans .
(A) Non key attribute V_name is dependent on V_no which is part of composite key
Explanation :
for lossless decomposition .Atleast one of the following dependencies should be in F+.
R1 intersction R2->R1. Eq. 1.
or
R1 intersection R2->R2. Eq2.
when a decompostion satisfies eq 1. given above then that will solve the R1 intersection R2 –>>(R1-R2).
when a decomposition satisfies eq2 given above then that will solve the R1 intersection R2 –>>(R2-R1).
Ans .
(C) (a) and (c) happens
Explanation :
Ans .
(A) The number of blocks used for index, and the size of index
Basic primitive of GKS are Polyline,polymarker, fillarea,text.
Ans .
(D) (d) only
Explanation :
In normalized device coordinate system lower left corner corresponds to (0,0) and upper rightcorner corresponds to (1,1).
Ans .
(A) (i) (ii) (iii) (iv) (v)
Explanation :
Ans .
(D) 5 final states among 6 states
Explanation :
Ans .
(C) (1 + 01)* (1 + 01)
Explanation :
Option A can yield string terminating with 0 hence it fails.
Option D an yield string 1001. Hence it also fails.
Option C. generates all string with length1,2,3,—– terminating with 1 and does not contain 00 substring.
Ans .
(D) q0 and q3 respectively
Explanation :
Accepted words are { ab, ba, aaab,abaa, aaba,bbba—–}
A and b are of odd length. Hence from diagram from the above transitions. option D is correct.
Ans .
(A) A ∧ B ∧ C ⇒ D
Explanation :
~Av(~Bv~C)vD.
~AV ~(B^C)VD.
~(A^B^C)VD.
We know A-> B = ~AV B.
So it turns out to be A^B^C->D.
Ans .
(B) PROLOG is a Strongly Typed Language.
Explanation :
Ans .
(B) The resolvent of two Horn clauses is a Horn Clause.
Explanation :
Ans .
(D) Circuit Switching
Explanation :
Ans .
(A) FIN
Explanation :
Ans .
(B) Transport and Tunnel
Explanation :
Ans .
(C) OEWPNRCTTUEKMRO
Explanation :
Ans .
(C) 128 kbps
Explanation :
Ans .
(C) 65,495
Explanation :
Ans .
(D) Floyd-Warshall algorithm
Explanation :
Ans .
(C) Exponential time using dynamic programming algorithm or branch-and-bound algorithm.
Explanation :
Ans .
(A) lg(lg*n)
Explanation :
Ans .
(C) 88
Explanation :
Ans .
(D) θ(f(n) + g(n)) = max(f(n), g(n))
Explanation :
Ans .
(D) ceil(n/zh+1)
Explanation :
Ans .
(C) Public
Explanation :
Ans .
(D) void setContextType(String Type)
Explanation :
Ans .
(D) Applets are embedded in another applications.
Explanation :
Ans .
(C) + * ?
Explanation :
+ symbol for one or more time.
* for 0 or more time.
? for zero or more time
Ans .
(A) Document Type Definition
Explanation :
Ans .
(C) Encapsulation
Explanation :
The basic idea underlying modular design is to organize a complex system (such as a large program, an electronic circuit, or a mechanical device) as a set of distinct components that can be developed independently and then plugged together. Although this may appear a simple idea, experience shows that the effectiveness of the technique depends critically on the manner in which systems are divided into components and the mechanisms used to plug components together. The following design principles are particularly relevant to parallel programming. Ensure that modules hide information.
related functions that can benefit from a common implementation or that are used in many parts of a system.
functionality that is likely to change during later design or deployment.
aspects of a problem that are particularly complex, and/or.
code that is expected to be reused in other programs.
The benefits of modularity do not follow automatically from the act of subdividing a program. The way in which a program is decomposed can make an enormous difference to how easily the program can be implemented and modified. Experience shows that each module should encapsulate information that is not available to the rest of a program. This information hiding reduces the cost of subsequent design changes.
Ans .
(D) both (A) and (B)
Explanation :
Ans .
(B) Conciseness
Explanation :
Ans .
(B) Requirements elicitation
Explanation :
Ans .
(B) is carried out to port the existing software to a new environment.
Explanation :
Ans .
(D) All of the above
Explanation :
Ans .
(A) cohesion is functional and coupling is data type.
Explanation :
Ans .
(B) (iii) (i) (iv) (ii)
Explanation :
Ans .
(C) Processes are permanently assigned to a queue
Explanation :
Ans .
(C) It is a chip to map virtual address to physical address
Explanation :
Ans .
(B) Classical IPC problem
Explanation :
Ans .
(B) Linked
Explanation :
Ans .
(D) Any one of the above
Explanation :
Ans .
(B) (iii) (i) (iv) (ii)
Explanation :
Ans .
(A) (iii) (iv) (i) (ii)
Explanation :
Ans .
(B) (~P ∨ Q) ∧ (~Q∨ P)
Explanation :
P<->Q= (P->Q)^(Q->P). We know A->B is ~AvB.
Ans .
(C) Dynamic programming principle can be used to discard redundant partial paths.
Explanation :
Ans .
(B) (iv) (i) (ii) (iii)
Explanation :
Ans .
(B) (iv) (iii) (i) (ii)
Explanation :
Ans .
(C) S→0|0S|1SS|S1S|SS1
Explanation :
Ans .
(D) Both S1 and S2 are correct
Explanation :
Ans .
(C) Both G1 and G2 are ambiguous grammars
Explanation :
Let the string is aab.
it can be derived by.
S->AB->aAB->aaAB->aaεB->aaεbB->aaεbε.
and
we can derive in this way also.
S->aaB->aabB->aabε.
G1 is ambigious because we have two different tree structure.
Similarly G2.
let w=ab.
then S->A->ab.
and
S->B->abB->abε.
so we get two tree for a same string. so G2 is also ambigious.
f(A+B)= ((1+10,min(.3,.5)),((1+11),min(.3,1)),(1+12)min(.3,.5).
((2+10, min(.6,.5)),((2+11),min(.6,1)),((2+12)min(.6,.5)),
((3+10, .5),(14,1),(15,.5).
(4+10,.5),(4+11,.7),16(.5)
(5+10,.2),(16,.2),(17,.2)}.
after finding the minimum of A+B, find the max of duplicates.
{(11,.3),(12,max(.3,.5)),(13,max(.3,.6,.5)),(14,max(.5,1,.5)),(15,max(.5,.7,.2)), (16,max(.5,.2)),(17,.2).
so
{(11..3),(12,.5),(13,.6),(14,1),(15,.7),(16..5),(17,.2).
Ans .
(C) {(2,0.6), (3,1), (6,0.6), (11,0.3)}
Explanation :
Ans .
(A) (ii) (iii) (iv) (i)
Explanation :
Ans .
(D) Special execution environment used to run 16 bit Windows applications on 32 bit machines.
Explanation :
Ans .
(B) Both files i.e. file1 and file2 can be edited using ‘ex’ command to travel between files